Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
CIS.HS.12.1.a
Identify and distinguish the differences between input and output devices. |
|
CIS.HS.12.1.b
Identify and explain how various components meet the needs of the user. |
|
CIS.HS.12.1.c
Identify and analyze emerging technologies. |
|
CIS.HS.12.1.d
Identify storage options. |
|
CIS.HS.12.1.e
Identify the process to configure permissions for files and folders. |
|
CIS.HS.12.1.f
Explain multiple methods of moving digital files. |
|
CIS.HS.12.2.a
Identify the correct hardware to connect with external components. |
|
CIS.HS.12.2.b
Determine and evaluate recommended hardware devices to solve specific problems. |
|
CIS.HS.12.2.c
Troubleshoot basic computer hardware problems. |
|
CIS.HS.12.2.d
Find and analyze resources to answer basic troubleshooting questions. technologies for various tasks. |
|
CIS.HS.12.2.e
Develop criteria for purchasing or upgrading computer system hardware. |
|
CIS.HS.12.2.f
Identify and analyze proper input |
|
CIS.HS.12.3.a
Identify and analyze software appropriate for specific tasks. |
|
CIS.HS.12.3.b
Research and analyze software installation and upgrade options. |
|
CIS.HS.12.3.c
Troubleshoot potential problems with software installation (i.e. bloatware). |
|
CIS.HS.12.3.d
Compare and contrast the functions, features, and limitations of different operating systems and utilities (i.e.,open source and mobile proprietary operating systems). |
|
CIS.HS.12.4.a
Identify the components (e.g., wires, cables, routers, etc.) that make up the Internet. |
|
CIS.HS.12.4.b
Describe the types of Internet connections. |
|
CIS.HS.12.4.c
Explain Transmission Control Protocol/Internet Protocol (TCP/IP). |
|
CIS.HS.12.4.d
Identify and compare different types of web technologies: blogs, wikis, podcasts, RSS feeds, etc. |
|
CIS.HS.12.4.e
Explain browser cache and the process of clearing it. |
|
CIS.HS.12.5.a
Define basic networking terminology. |
|
CIS.HS.12.5.b
Describe the characteristics and uses of networks, network devices, and components. |
|
CIS.HS.12.5.c
Identify the purpose of networks and their functionality. |
|
CIS.HS.12.5.d
Identify tools, diagnostic procedures, and troubleshooting techniques for networks. |
|
CIS.HS.12.5.e
Describe the process of configuring, optimizing, and upgrading of networks. |
|
CIS.HS.12.5.f
Explore and use cloud computing. |
|
CIS.HS.12.5.g
Research and analyze basic network security solutions. |
|
CIS.HS.12.5.h
Design a theoretical network environment and create protocols on deploying and maintaining the network. |
|
CIS.HS.12.6.a
Design and create database tables and relationships. |
|
CIS.HS.12.6.b
Create database columns and specify properties. |
|
CIS.HS.12.6.c
Name tables and fields in conformance with naming conventions. |
|
CIS.HS.12.6.d
Insert, update, and delete records in a database. |
|
CIS.HS.12.6.e
Import data into databases and transfer data between databases. |
|
CIS.HS.12.6.f
Organize and store database files in a structured environment for users. |
|
CIS.HS.12.6.g
Control user access to data and log access to the database by user and type of transaction. |
|
CIS.HS.12.6.h
Backup, verify, and recover data in a database. |
|
CIS.HS.12.6.i
Generate and print forms, reports, and results of queries (i.e., calculated fields, functions). |
|
CIS.HS.12.7.a
Identify and define programming terminology. |
|
CIS.HS.12.7.b
Explain the importance of life-long learning as a programmer. |
|
CIS.HS.12.7.c
Analyze the strengths and weaknesses of different languages for solving a specific problem. |
|
CIS.HS.12.7.d
Write code that uses logical operators (e.g., and, or, not, loops). |
|
CIS.HS.12.7.e
Write code that uses conditional control structures (e.g., if, if‐then‐else). |
|
CIS.HS.12.7.f
Test and debug code. |
|
CIS.HS.12.7.g
Identify and analyze protocols to maintain the integrity of programs. |
|
CIS.HS.12.8.a
Identify the goals, objectives, and purposes of cybersecurity first principles. |
|
CIS.HS.12.8.b
Identify different types of security threats and vulnerabilities. |
|
CIS.HS.12.8.c
Identify and analyze policies procedures for security, privacy, and risk management. |
|
CIS.HS.12.8.d
Explain intellectual property laws (e.g., copyright, trademark). |
|
CIS.HS.12.8.e
Identify and analyze confidentiality concerns. |
|
CIS.HS.12.8.f
Discuss risk loss and prevention methods. |
|
CIS.HS.12.8.g
Analyze and evaluate passwords. |
|
CIS.HS.12.8.h
Identify personal risks and create personal protocols to differentiate between home and work. |
|
CIS.HS.12.9.a
Identify information technologies used in various industries. |
|
CIS.HS.12.9.b
Discuss the impact of technology on all career fields. |
|
CIS.HS.12.9.c
Identify common tasks within the information technology career fields in occupations. |
|
CIS.HS.12.9.d
Discuss career opportunities in information technology career fields. |
|
CIS.HS.12.9.e
Describe the impact of technological change and the importance of lifelong learning in this career field. |
|