Please enable JavaScript to use CodeHS

Standards Mapping

for Nebraska IT Fundamentals

58

Standards in this Framework

42

Standards Mapped

72%

Mapped to Course

Standard Lessons
CIS.HS.12.1.a
Identify and distinguish the differences between input and output devices.
  1. 10.2 Peripheral Devices
CIS.HS.12.1.b
Identify and explain how various components meet the needs of the user.
  1. 10.1 Internal Components
  2. 10.2 Peripheral Devices
  3. 10.3 Network Devices
  4. 10.4 Storage Options
  5. 10.5 Network Options
CIS.HS.12.1.c
Identify and analyze emerging technologies.
  1. 9.10 Impact of the Internet
CIS.HS.12.1.d
Identify storage options.
  1. 10.4 Storage Options
CIS.HS.12.1.e
Identify the process to configure permissions for files and folders.
  1. 7.8 System Administration
CIS.HS.12.1.f
Explain multiple methods of moving digital files.
  1. 7.9 Command Line Interface
CIS.HS.12.2.a
Identify the correct hardware to connect with external components.
  1. 10.1 Internal Components
  2. 10.2 Peripheral Devices
  3. 10.3 Network Devices
CIS.HS.12.2.b
Determine and evaluate recommended hardware devices to solve specific problems.
  1. 10.4 Storage Options
  2. 10.5 Network Options
  3. 10.7 Network Management
CIS.HS.12.2.c
Troubleshoot basic computer hardware problems.
  1. 11.1 Methodology
  2. 11.2 Support Practice
CIS.HS.12.2.d
Find and analyze resources to answer basic troubleshooting questions. technologies for various tasks.
  1. 11.1 Methodology
  2. 11.2 Support Practice
CIS.HS.12.2.e
Develop criteria for purchasing or upgrading computer system hardware.
  1. 10.4 Storage Options
  2. 10.5 Network Options
CIS.HS.12.2.f
Identify and analyze proper input
  1. 7.9 Command Line Interface
  2. 10.2 Peripheral Devices
  3. 10.6 Network Communication
CIS.HS.12.3.a
Identify and analyze software appropriate for specific tasks.
  1. 7.4 Software and Applications
  2. 7.5 Software Licenses
CIS.HS.12.3.b
Research and analyze software installation and upgrade options.
  1. 7.4 Software and Applications
  2. 7.5 Software Licenses
  3. 7.6 Application Security
CIS.HS.12.3.c
Troubleshoot potential problems with software installation (i.e. bloatware).
  1. 7.3 Compatibility
  2. 7.5 Software Licenses
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
CIS.HS.12.3.d
Compare and contrast the functions, features, and limitations of different operating systems and utilities (i.e.,open source and mobile proprietary operating systems).
  1. 7.1 Operating Systems
  2. 7.2 Comparing Operating Systems
  3. 7.5 Software Licenses
CIS.HS.12.4.a
Identify the components (e.g., wires, cables, routers, etc.) that make up the Internet.
  1. 9.4 Internet Hardware and Sending Information
  2. 10.2 Peripheral Devices
  3. 10.3 Network Devices
CIS.HS.12.4.b
Describe the types of Internet connections.
  1. 9.4 Internet Hardware and Sending Information
  2. 9.7 Routing
  3. 9.8 Packets & Protocols
  4. 10.5 Network Options
CIS.HS.12.4.c
Explain Transmission Control Protocol/Internet Protocol (TCP/IP).
  1. 9.6 Domain Name System (DNS)
  2. 9.7 Routing
  3. 9.8 Packets & Protocols
CIS.HS.12.4.d
Identify and compare different types of web technologies: blogs, wikis, podcasts, RSS feeds, etc.
CIS.HS.12.4.e
Explain browser cache and the process of clearing it.
  1. 7.7 Browser Configuration
CIS.HS.12.5.a
Define basic networking terminology.
  1. 9.1 Introduction to the Internet
  2. 9.5 Internet Addresses
  3. 9.7 Routing
  4. 9.8 Packets & Protocols
  5. 10.7 Network Management
CIS.HS.12.5.b
Describe the characteristics and uses of networks, network devices, and components.
  1. 9.4 Internet Hardware and Sending Information
  2. 10.5 Network Options
  3. 10.7 Network Management
CIS.HS.12.5.c
Identify the purpose of networks and their functionality.
  1. 9.1 Introduction to the Internet
  2. 9.5 Internet Addresses
  3. 9.6 Domain Name System (DNS)
  4. 9.7 Routing
  5. 9.8 Packets & Protocols
  6. 10.5 Network Options
CIS.HS.12.5.d
Identify tools, diagnostic procedures, and troubleshooting techniques for networks.
  1. 10.5 Network Options
  2. 10.6 Network Communication
  3. 10.7 Network Management
CIS.HS.12.5.e
Describe the process of configuring, optimizing, and upgrading of networks.
  1. 10.5 Network Options
  2. 10.6 Network Communication
  3. 10.7 Network Management
CIS.HS.12.5.f
Explore and use cloud computing.
  1. 10.4 Storage Options
CIS.HS.12.5.g
Research and analyze basic network security solutions.
  1. 10.6 Network Communication
  2. 10.7 Network Management
CIS.HS.12.5.h
Design a theoretical network environment and create protocols on deploying and maintaining the network.
CIS.HS.12.6.a
Design and create database tables and relationships.
  1. 8.4 Databases
  2. 8.6 What is SQL?
CIS.HS.12.6.b
Create database columns and specify properties.
CIS.HS.12.6.c
Name tables and fields in conformance with naming conventions.
CIS.HS.12.6.d
Insert, update, and delete records in a database.
CIS.HS.12.6.e
Import data into databases and transfer data between databases.
CIS.HS.12.6.f
Organize and store database files in a structured environment for users.
CIS.HS.12.6.g
Control user access to data and log access to the database by user and type of transaction.
CIS.HS.12.6.h
Backup, verify, and recover data in a database.
CIS.HS.12.6.i
Generate and print forms, reports, and results of queries (i.e., calculated fields, functions).
CIS.HS.12.7.a
Identify and define programming terminology.
  1. 4.1 Programming Concepts
  2. 4.3 Looping
  3. 4.4 Branching
  4. 4.5 Arrays and Objects
CIS.HS.12.7.b
Explain the importance of life-long learning as a programmer.
  1. 13.1 After Fundamentals of Cybersecurity
CIS.HS.12.7.c
Analyze the strengths and weaknesses of different languages for solving a specific problem.
  1. 4.1 Programming Concepts
CIS.HS.12.7.d
Write code that uses logical operators (e.g., and, or, not, loops).
  1. 4.3 Looping
CIS.HS.12.7.e
Write code that uses conditional control structures (e.g., if, if‐then‐else).
  1. 4.4 Branching
CIS.HS.12.7.f
Test and debug code.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 4.5 Arrays and Objects
CIS.HS.12.7.g
Identify and analyze protocols to maintain the integrity of programs.
CIS.HS.12.8.a
Identify the goals, objectives, and purposes of cybersecurity first principles.
CIS.HS.12.8.b
Identify different types of security threats and vulnerabilities.
  1. 1.2 What is Cybersecurity?
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 8.9 Common Security Problems
CIS.HS.12.8.c
Identify and analyze policies procedures for security, privacy, and risk management.
CIS.HS.12.8.d
Explain intellectual property laws (e.g., copyright, trademark).
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
CIS.HS.12.8.e
Identify and analyze confidentiality concerns.
  1. 1.4 The CIA Triad
CIS.HS.12.8.f
Discuss risk loss and prevention methods.
CIS.HS.12.8.g
Analyze and evaluate passwords.
  1. 2.4 Privacy & Security
CIS.HS.12.8.h
Identify personal risks and create personal protocols to differentiate between home and work.
CIS.HS.12.9.a
Identify information technologies used in various industries.
CIS.HS.12.9.b
Discuss the impact of technology on all career fields.
  1. 1.3 Impact of Cybersecurity
  2. 9.10 Impact of the Internet
  3. 13.1 After Fundamentals of Cybersecurity
CIS.HS.12.9.c
Identify common tasks within the information technology career fields in occupations.
  1. 13.1 After Fundamentals of Cybersecurity
CIS.HS.12.9.d
Discuss career opportunities in information technology career fields.
  1. 13.1 After Fundamentals of Cybersecurity
CIS.HS.12.9.e
Describe the impact of technological change and the importance of lifelong learning in this career field.
  1. 13.1 After Fundamentals of Cybersecurity