Please enable JavaScript to use CodeHS

Standards Mapping

for Rhode Island 6-8


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Use diagrams and/or pseudocode to plan, analyze, solve and/or code complex problems as algorithms.
  1. 1.10 Top Down Design
  2. 1.11 Variables
  3. 1.19 Putting Together Control Structures
  4. 3.3 Comments & Pseudocode
  5. 11.6 Top Down Design and Decomposition in Karel
  6. 11.13 Control Structures Example
  7. 11.14 More Karel Examples and Testing
  8. 11.16 Karel Challenges
Create clearly named variables that represent different data. Perform operations on data stored in variables.
  1. 1.11 Variables
  2. 1.12 User Input
  3. 1.13 Parameters
  4. 3.4 Variables
  5. 14.3 Operators
Organize data into an appropriate data structure in a program.
  1. 1.11 Variables
  2. 1.12 User Input
Design programs that combine control structures, including nested loops and compound conditionals.
  1. 1.19 Putting Together Control Structures
  2. 11.13 Control Structures Example
  3. 11.14 More Karel Examples and Testing
  4. 11.16 Karel Challenges
  5. 14.1 For Loops
  6. 14.2 While Loops
  7. 14.3 Operators
  8. 14.4 If/Else Statements
Decompose computational problems to facilitate the design and implementation of programs.
  1. 1.10 Top Down Design
  2. 1.19 Putting Together Control Structures
  3. 3.3 Comments & Pseudocode
  4. 11.6 Top Down Design and Decomposition in Karel
  5. 11.7 Commenting Your Code
  6. 11.13 Control Structures Example
  7. 11.14 More Karel Examples and Testing
  8. 11.16 Karel Challenges
  9. 14.5 Functions
  10. 15.1 micro:bit Challenges
Create procedures with parameters to organize code and make it easier to reuse.
  1. 1.13 Parameters
  2. 14.5 Functions
Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
  1. 15.4 Final Project
Test and debug a program to ensure it runs as intended.
  1. 7.6 Test
  2. 14.1 For Loops
  3. 14.2 While Loops
  4. 14.3 Operators
  5. 14.4 If/Else Statements
  6. 14.5 Functions
  7. 15.1 micro:bit Challenges
Describe choices made during development of computational artifacts.
  1. 1.6 Comments
  2. 3.3 Comments & Pseudocode
  3. 15.1 micro:bit Challenges
  4. 15.4 Final Project
Identify improvements to the design of computing devices, based on an analysis of how users interact with the devices.
  1. 7.6 Test
  2. 15.4 Final Project
Design projects that combine hardware and software components to collect and use data to perform a function.
  1. 3.4 Variables
  2. 15.1 micro:bit Challenges
  3. 15.2 Explore a New Sensor
  4. 15.4 Final Project
Identify and fix problems with computing devices and their components using a systematic troubleshooting method or guide.
  1. 2.6 Troubleshooting
Model the role of protocols in transmitting data across networks and the Internet.
  1. 9.6 Packets and Protocols
Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 4.1 Digital Footprint and Reputation
  2. 4.4 Privacy & Security
  3. 13.2 What is Cybersecurity?
Describe social engineering attacks and the potential risks associated with them.
  1. 13.3 Impact of Cybersecurity
Describe risks of using free and open services.
  1. 4.4 Privacy & Security
Explain physical and digital security measures that protect electronic information.
  1. 4.4 Privacy & Security
Demonstrate how multiple methods of encryption provide secure transmission of information.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
Describe which actions to take and not to take when an application or device reports a problem or behaves unexpectedly.
  1. 2.6 Troubleshooting
Collect data using computational tools or online sources and transform the data to make it more useful and reliable.
  1. 7.2 Empathy
Create and refine computational models based on generated or gathered data.
  1. 1.20 Using Data to Refine Game Mechanics
Discuss potential visible biases that could exist in a dataset and how these biases could affect analysis conclusions.
Store, retrieve, and share data to collaborate, using a cloud-based system.
Describe various low-level data transformations and identify which result in a loss of information.
Use software tools to create artifacts that engage users over time.
Conduct searches over multiple types of digital information.
  1. 4.5 Project: Public Service Announcement
Describe the different formats of software components that support common tasks in software tools.
  1. 2.3 Software
Compare and contrast tradeoffs associated with computing technologies that affect people’s everyday activities and career options.
  1. 9.7 The Impact of the Internet
  2. 13.2 What is Cybersecurity?
Discuss issues of bias and accessibility in the design of existing technologies.
  1. 7.2 Empathy
  2. 9.7 The Impact of the Internet
Discuss how laws control use and access to intellectual property, and mandate broad access to information technologies.
  1. 6.6 Copyright
Collaborate and strategize with many online contributors when creating a computational or digital artifact.
  1. 4.5 Project: Public Service Announcement