Please enable JavaScript to use CodeHS

Standards Mapping

for Virginia 8

13

Standards in this Framework

10

Standards Mapped

76%

Mapped to Course

Standard Lessons
8.1
The student will construct programs to accomplish a task as a means of creative expression or scientific exploration using a block based or text based programming language, both independently and collaboratively a) combining control structures such as if-statements and loops including nested conditionals and loops; b) using clearly named variables that represent different data types, including numeric and non-numeric data, and perform operations on their values; and c) create procedures with parameters.
  1. 2.9 For Loops
  2. 2.10 If Statements
  3. 2.11 If/Else Statements
  4. 2.12 While Loops in Karel
  5. 2.13 Control Structures Example
  6. 3.2 Challenge Problems
  7. 5.2 Variables
  8. 5.3 User Input
  9. 5.4 Basic Math in JavaScript
  10. 5.5 Using Graphics in JavaScript
  11. 7.1 Booleans
  12. 7.2 Logical Operators
  13. 7.3 Comparison Operators
  14. 7.4 If Statements
  15. 7.5 For Loops in JavaScript
  16. 7.6 General For Loops
  17. 7.7 For Loop Practice
  18. 7.9 While Loops
  19. 7.10 Loop and a Half
  20. 9.1 Functions and Parameters 1
  21. 9.2 Functions and Parameters 2
  22. 9.3 Functions and Parameters 3
  23. 9.6 Timers
  24. 9.7 Random Circles
  25. 9.8 Random Ghosts
  26. 9.9 Bouncing Ball
  27. 9.10 Mouse Events: Mouse Clicked
  28. 15.1 Mouse Events: Mouse Moved
  29. 15.2 Drawing Lines
  30. 15.3 Key Events
  31. 15.4 Crazy Ball Game
8.2
The student will systematically test and refine programs using a range of test cases.
  1. 2.10 If Statements
  2. 2.11 If/Else Statements
  3. 2.12 While Loops in Karel
  4. 2.13 Control Structures Example
  5. 3.2 Challenge Problems
  6. 5.3 User Input
  7. 5.4 Basic Math in JavaScript
  8. 7.2 Logical Operators
  9. 7.3 Comparison Operators
  10. 7.4 If Statements
  11. 7.5 For Loops in JavaScript
  12. 7.9 While Loops
  13. 9.2 Functions and Parameters 2
  14. 9.3 Functions and Parameters 3
  15. 9.4 Functions and Return Values 1
  16. 9.5 Functions and Return Values 2
  17. 9.6 Timers
  18. 9.7 Random Circles
  19. 9.8 Random Ghosts
  20. 9.9 Bouncing Ball
  21. 9.10 Mouse Events: Mouse Clicked
  22. 15.1 Mouse Events: Mouse Moved
  23. 15.2 Drawing Lines
  24. 15.3 Key Events
  25. 15.4 Crazy Ball Game
8.3
The student will explain how effective communication between participants is required for successful collaboration when developing programs.
8.4
The student will use flowcharts and/or pseudo code to address complex problems as algorithms.
  1. 2.6 Top Down Design and Decomposition in Karel
  2. 3.2 Challenge Problems
8.5
The student will, using the elements of computing devices such as primary memory, secondary storage, processor, input and output devices, and network connectivity; analyze the advantages and limitations of a given computing system.
8.6
The student will identify physical and digital security measures used protect electronic information.
  1. 1.3 Privacy & Security
8.7
The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions.
  1. 1.1 What is Cybersecurity?
  2. 1.2 The CIA Triad
  3. 1.3 Privacy & Security
  4. 1.8 Hacking Ethics
8.8
The student will explain the difference between a model and a simulation, and create computational models to conduct simulations.
8.9
The student will describe tradeoffs between allowing information to be public, and keeping information private.
  1. 1.2 The CIA Triad
  2. 1.7 Creative Credit & Copyright
8.10
The student will evaluate online and print sources for appropriateness and credibility.
  1. 1.4 Information Literacy
  2. 1.7 Creative Credit & Copyright
8.11
The student will discuss the social impacts and ethical considerations associated with the field of cybersecurity.
  1. 1.8 Hacking Ethics
8.12
The student will explore careers related to the field of cybersecurity.
  1. 1.1 What is Cybersecurity?
8.13
The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues.
  1. 1.2 The CIA Triad
  2. 1.3 Privacy & Security