CIS.HS.12.1.a |
Identify and distinguish the differences between input and output devices. |
Lessons
|
CIS.HS.12.1.b |
Identify and explain how various components meet the needs of the user. |
Lessons
|
CIS.HS.12.1.c |
Identify and analyze emerging technologies. |
Lessons
|
CIS.HS.12.1.d |
Identify storage options. |
Lessons
|
CIS.HS.12.1.e |
Identify the process to configure permissions for files and folders. |
Lessons
|
CIS.HS.12.1.f |
Explain multiple methods of moving digital files. |
Lessons
|
CIS.HS.12.2.a |
Identify the correct hardware to connect with external components. |
Lessons
|
CIS.HS.12.2.b |
Determine and evaluate recommended hardware devices to solve specific problems. |
Lessons
|
CIS.HS.12.2.c |
Troubleshoot basic computer hardware problems. |
Lessons
|
CIS.HS.12.2.d |
Find and analyze resources to answer basic troubleshooting questions. technologies for various tasks. |
Lessons
|
CIS.HS.12.2.e |
Develop criteria for purchasing or upgrading computer system hardware. |
Lessons
|
CIS.HS.12.2.f |
Identify and analyze proper input |
Lessons
|
CIS.HS.12.3.a |
Identify and analyze software appropriate for specific tasks. |
Lessons
|
CIS.HS.12.3.b |
Research and analyze software installation and upgrade options. |
Lessons
|
CIS.HS.12.3.c |
Troubleshoot potential problems with software installation (i.e. bloatware). |
Lessons
|
CIS.HS.12.3.d |
Compare and contrast the functions, features, and limitations of different operating systems and utilities (i.e.,open source and mobile proprietary operating systems). |
Lessons
|
CIS.HS.12.4.a |
Identify the components (e.g., wires, cables, routers, etc.) that make up the Internet. |
Lessons
|
CIS.HS.12.4.b |
Describe the types of Internet connections. |
Lessons
|
CIS.HS.12.4.c |
Explain Transmission Control Protocol/Internet Protocol (TCP/IP). |
Lessons
|
CIS.HS.12.4.d |
Identify and compare different types of web technologies: blogs, wikis, podcasts, RSS feeds, etc. |
Lessons
|
CIS.HS.12.4.e |
Explain browser cache and the process of clearing it. |
Lessons
|
CIS.HS.12.5.a |
Define basic networking terminology. |
Lessons
|
CIS.HS.12.5.b |
Describe the characteristics and uses of networks, network devices, and components. |
Lessons
|
CIS.HS.12.5.c |
Identify the purpose of networks and their functionality. |
Lessons
|
CIS.HS.12.5.d |
Identify tools, diagnostic procedures, and troubleshooting techniques for networks. |
Lessons
|
CIS.HS.12.5.e |
Describe the process of configuring, optimizing, and upgrading of networks. |
Lessons
|
CIS.HS.12.5.f |
Explore and use cloud computing. |
Lessons
|
CIS.HS.12.5.g |
Research and analyze basic network security solutions. |
Lessons
|
CIS.HS.12.5.h |
Design a theoretical network environment and create protocols on deploying and maintaining the network. |
Lessons
|
CIS.HS.12.6.a |
Design and create database tables and relationships. |
Lessons
|
CIS.HS.12.6.b |
Create database columns and specify properties. |
Lessons
|
CIS.HS.12.6.c |
Name tables and fields in conformance with naming conventions. |
Lessons
|
CIS.HS.12.6.d |
Insert, update, and delete records in a database. |
Lessons
|
CIS.HS.12.6.e |
Import data into databases and transfer data between databases. |
Lessons
|
CIS.HS.12.6.f |
Organize and store database files in a structured environment for users. |
Lessons
|
CIS.HS.12.6.g |
Control user access to data and log access to the database by user and type of transaction. |
Lessons
|
CIS.HS.12.6.h |
Backup, verify, and recover data in a database. |
Lessons
|
CIS.HS.12.6.i |
Generate and print forms, reports, and results of queries (i.e., calculated fields, functions). |
Lessons
|
CIS.HS.12.7.a |
Identify and define programming terminology. |
Lessons
|
CIS.HS.12.7.b |
Explain the importance of life-long learning as a programmer. |
Lessons
|
CIS.HS.12.7.c |
Analyze the strengths and weaknesses of different languages for solving a specific problem. |
Lessons
|
CIS.HS.12.7.d |
Write code that uses logical operators (e.g., and, or, not, loops). |
Lessons
|
CIS.HS.12.7.e |
Write code that uses conditional control structures (e.g., if, if‐then‐else). |
Lessons
|
CIS.HS.12.7.f |
Test and debug code. |
Lessons
|
CIS.HS.12.7.g |
Identify and analyze protocols to maintain the integrity of programs. |
Lessons
|
CIS.HS.12.8.a |
Identify the goals, objectives, and purposes of cybersecurity first principles. |
Lessons
|
CIS.HS.12.8.b |
Identify different types of security threats and vulnerabilities. |
Lessons
|
CIS.HS.12.8.c |
Identify and analyze policies procedures for security, privacy, and risk management. |
Lessons
|
CIS.HS.12.8.d |
Explain intellectual property laws (e.g., copyright, trademark). |
Lessons
|
CIS.HS.12.8.e |
Identify and analyze confidentiality concerns. |
Lessons
|
CIS.HS.12.8.f |
Discuss risk loss and prevention methods. |
Lessons
|
CIS.HS.12.8.g |
Analyze and evaluate passwords. |
Lessons
|
CIS.HS.12.8.h |
Identify personal risks and create personal protocols to differentiate between home and work. |
Lessons
|
CIS.HS.12.9.a |
Identify information technologies used in various industries. |
Lessons
|
CIS.HS.12.9.b |
Discuss the impact of technology on all career fields. |
Lessons
|
CIS.HS.12.9.c |
Identify common tasks within the information technology career fields in occupations. |
Lessons
|
CIS.HS.12.9.d |
Discuss career opportunities in information technology career fields. |
Lessons
|
CIS.HS.12.9.e |
Describe the impact of technological change and the importance of lifelong learning in this career field. |
Lessons
|