Please enable JavaScript to use CodeHS

Standards Mapping

for Arkansas Business Intelligence

51

Standards in this Framework

33

Standards Mapped

64%

Mapped to Course

Standard Lessons
1.1.1
Identify and discuss successful professionals and their involvement in either DECA, FBLA or TSA.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
  3. Advanced Cybersecurity
  4. 20.1 Student Organizations
1.1.2
Discuss and evaluate CTSO activities which reinforce and connect real-world application to the curriculum taught in the classroom.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
  3. Advanced Cybersecurity
  4. 20.1 Student Organizations
1.1.3
Discuss and evaluate CTSO activities which reinforce and connect real-world application to the curriculum taught in the classroom.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
  3. Advanced Cybersecurity
  4. 20.1 Student Organizations
1.1.4
Research professional organizations for business intelligence related careers and discuss the importance of membership and participation in professional organizations for career development and growth and how they connect to CTSOs.
  1. Fundamentals of Cybersecurity
  2. 16.1 Student Organizations
  3. Advanced Cybersecurity
  4. 20.1 Student Organizations
1.2.1
Understand the difference between business professional, business casual and casual.
1.2.2
Identify appropriate dress for different occupations, meetings and scenarios.
  1. Fundamentals of Cybersecurity
  2. 16.3 Resume and Interview Prep
  3. Advanced Cybersecurity
  4. 20.3 Resume and Interview Prep
2.1.1
Demonstrate effective communication skills.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
  5. 16.3 Resume and Interview Prep
  6. Advanced Cybersecurity
  7. 20.3 Resume and Interview Prep
2.1.2
Comprehend and explain the importance of punctuality and attendance.
2.1.3
Identify traits important to success such as initiative, positive attitude, enthusiasm, self-confidence, etc.
3.1.1
Analyze one’s current digital presence.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
3.1.2
Prepare/update a professional digital portfolio.
4.1.1
Analyze personal interests and skills needed for success.
4.1.2
Identify professional certifications available for various careers and levels of professionals in the business intelligence field.
5.1.1
Compare and contrast the three major forms of business ownership.
5.1.2
Examine the decision-making skills needed for each form of business ownership.
6.1.1
Examine ethical and unethical business practices.
  1. Data Science with Sheets
  2. 3.1 Data Privacy
  3. 3.2 Big Data and Bias
  4. 3.3 Responsible Data Science
  5. Data Science with Python
  6. 2.2 Big Data and Bias
6.1.2
Identify and discuss the ways data can be broken down, interpreted, and shared with technical and non-technical stakeholders to improve business decisions.
  1. Data Science with Python
  2. 4.1 Data Science for Business
  3. 4.7 Business Report
7.1.1
Use various data types (e.g., Booleans, characters, integers, floating points, strings) in appropriate situations within a program. Note: This could be using Booleans (e.g., true or false) when working with selection, integers and/or floats when performing math calculations, strings when working with text data).
  1. Data Science with Python
  2. 7.4 Mathematical Operators
  3. Advanced Cybersecurity
  4. 12.3 Variables and Types
  5. 12.5 Mathematical Operators
  6. 13.1 Booleans
  7. 13.2 If Statements
  8. 13.5 Floating Point Numbers and Rounding
  9. Introduction to Python Programming
  10. 3.2 Variables and Types
  11. 3.4 Mathematical Operators
  12. 5.1 Booleans
  13. 5.2 If Statements
  14. 5.5 Floating Point Numbers and Rounding
7.1.2
Create and use variables within a program.
  1. Advanced Cybersecurity
  2. 12.3 Variables and Types
  3. Introduction to Python Programming
  4. 3.2 Variables and Types
7.1.3
Construct expressions using arithmetic operators (e.g., +, -, *, /, and %) and numeric data types within a program.
  1. Data Science with Python
  2. 7.4 Mathematical Operators
  3. Advanced Cybersecurity
  4. 12.5 Mathematical Operators
  5. Introduction to Python Programming
  6. 3.4 Mathematical Operators
7.1.4
Construct Boolean expressions using relational (e.g., <, >, <=, >=, ==, and !=) and logical operators (e.g., AND, OR, and NOT) within a program. Note: Commonly used with iteration and selection.
  1. Data Science with Python
  2. 7.8 Comparison Operators
  3. 7.9 Logical Operators
  4. Advanced Cybersecurity
  5. 13.3 Comparison Operators
  6. 13.4 Logical Operators
  7. Introduction to Python Programming
  8. 5.3 Comparison Operators
  9. 5.4 Logical Operators
7.1.5
Apply appropriate typecasting or conversion methods to convert between different data types, when necessary, within a program.
  1. Data Science with Python
  2. 1.7 Pandas DataFrames
  3. Advanced Cybersecurity
  4. 12.4 User Input
  5. Introduction to Python Programming
  6. 3.3 User Input
7.1.6
Perform operations that encode/decode data from one form into another form (e.g., binary to hexadecimal, numeric values to colored pixels, and/or numbers to ASCII/Unicode representations).
  1. Fundamentals of Cybersecurity
  2. 5.1 Computers Speak Binary
  3. 5.2 Bits, Text, and Numbers
  4. 5.3 Encoding Images in Binary
7.1.7
Use data structures (e.g., arrays, lists, and maps) to store and manipulate multiple values and perform operations on the stored values.
  1. Data Science with Python
  2. 1.6 Measures of Spread
  3. 1.7 Pandas DataFrames
  4. Introduction to Python Programming
  5. 12.1 Tuples
  6. 12.2 Lists
  7. 13.1 2d Lists
  8. 13.4 Dictionaries
  9. 14.1 Project: Guess the Word
7.1.8
Create programs that use control structures, including selection and iteration. Note: Selection can be if statements and switch cases. Iteration can be while and for loops.
  1. Data Science with Python
  2. 7.11 For Loops
  3. Advanced Cybersecurity
  4. 13.2 If Statements
  5. Introduction to Python Programming
  6. 2.9 For Loops
  7. 2.10 If Statements
  8. 2.11 If/Else Statements
  9. 2.12 While Loops in Karel
  10. 2.13 Control Structures Example
  11. 2.17 Karel Challenges
  12. 5.2 If Statements
  13. 6.1 Project: Quiz Game
  14. 7.1 While Loops
  15. 7.2 For Loops
  16. 7.4 Nested Control Structures
  17. 8.1 Project: Password Authenticator
7.1.9
Create procedures/functions to modularize code for reusability and organization within a program.
  1. Data Science with Python
  2. 7.14 Functions
  3. 7.15 Functions and Parameters
  4. 7.17 Functions and Return Values
  5. Introduction to Python Programming
  6. 2.4 Functions in Karel
  7. 9.1 Functions
  8. 9.2 Functions and Parameters
  9. 9.4 Functions and Return Values
8.1.1
Explore the benefits that financial technology (Fintech), such as digital payment systems and automated financial analytics, can have on a business.
8.1.2
Explore the role and benefit of business intelligence tools (e.g., IBM Cognos Analytics and Google Data Studio) in empowering businesses to analyze data and gain valuable insights for informed decision-making.
8.1.3
Examine how mobile technology has revolutionized the way businesses operate, enabling flexibility, improved communication, enhanced customer experiences, and access to real-time information.
8.1.4
Explore how cybersecurity technologies (e.g., intrusion detection and prevention systems, encryption, and data loss prevention tools) can safeguard businesses against evolving threats and ensure the protection of critical data and systems.
  1. Fundamentals of Cybersecurity
  2. 2.1 Cryptography: Then, Now, and Future
  3. 4.8 Application Security
  4. 4.10 System Administration
  5. 8.1 Data as a Resource
8.1.5
Examine how technologies derived from artificial intelligence and machine learning applications (e.g., Generative Pre-trained Transformers) can improve data analysis and productivity in performing common business tasks.
8.1.6
Investigate the impact of emerging technologies (e.g., blockchain, virtual and augmented reality, and remote work tools) on businesses by unlocking new possibilities and driving transformative change.
9.1.1
Use formulas and functions (e.g., AVG, MIN, MAX, COUNT, and SUM) within a spreadsheet software to use logical reasoning to draw conclusions and apply mathematical problem-solving skills to create suitable formulas to solve problems.
  1. Data Science with Sheets
  2. 2.1 Spreadsheet Basics
  3. 2.5 Pivot Tables
  4. 2.6 Statistical Measures
9.1.2
Use a spreadsheet software to aid with data analysis and reporting by creating visualizations (e.g., charts).
  1. Data Science with Sheets
  2. 2.4 Data Visualizations
  3. 4.2 Final Project
9.1.3
Use advanced functions (e.g., VLOOKUP, COUNTIF, and IFERROR), conditional formatting (e.g., IF, AND, OR, and BETWEEN), and filtering techniques to analyze and manipulate data using a spreadsheet software.
9.1.4
Create programs using a text-based programming language to manage files (e.g., create, delete, move, search, and compress files) and to increase productivity in the business workplace.
  1. Introduction to Python Programming
  2. 15.4 Reading All Lines from File
  3. 15.5 Writing to File
10.1.1
Research different database management systems (e.g, MySQL, SQlite, Microsoft SQL Server, Access, and Oracle Database) to manage and interact with a database.
  1. Fundamentals of Cybersecurity
  2. 8.2 Using Databases
  3. Advanced Cybersecurity
  4. 11.1 Databases and Cybersecurity
10.1.2
Use a database management system to create basic databases and perform basic operations (e.g., selecting, inserting, updating, and deleting data) on the database.
  1. Fundamentals of Cybersecurity
  2. 8.2 Using Databases
  3. Advanced Cybersecurity
  4. 11.2 Getting Started in SQL
  5. 11.3 Basic Querying in SQL
10.1.3
Use a text-based programming language to create basic databases and tables and perform basic operations (e.g., selecting, inserting, updating, and deleting data) on the database.
  1. Advanced Cybersecurity
  2. 11.2 Getting Started in SQL
  3. 11.4 Filtering Queries in SQL
10.1.4
Create and execute statements using a declarative language (e.g., Structured Query Language) to create simple databases and perform basic operations (e.g., selecting, inserting, updating, and deleting data) on the database.
  1. Fundamentals of Cybersecurity
  2. 8.2 Using Databases
  3. Advanced Cybersecurity
  4. 11.2 Getting Started in SQL
10.1.5
Explore and use various sources of data that can be collected and used for business decisions and operations (e.g., competitor's web pages, financial statements, surveys and questionnaires, market research reports, and publicly available datasets).
  1. Data Science with Python
  2. 4.1 Data Science for Business
  3. 4.5 Your Business Data
  4. 4.6 Bias in Data Analytics
  5. 4.7 Business Report
10.1.6
Create programs using a text-based programming language to transfer data from a data source (e.g., csv, spreadsheets, and online data repositories) into a database.
10.1.7
Create programs using a text-based programming language that perform data analysis on data stored in a database.
  1. Data Science with Python
  2. 2.3 Importing and Filtering Data
  3. 2.4 Conditional Filtering
  4. 2.5 Data Cleaning
  5. 2.6 Exploring with Visualizations
  6. 2.7 Interpret and Present
11.1.1
Define automation and determine when a task or operation could benefit from automation.
11.1.2
Automate simple business tasks and operations (e.g. data entry, performing calculations, invoice processing, or sending automated emails).
11.1.3
Create a basic business application using a text-based programming language that solves a business-related issue. Notes: For example, considering the context of a Small Business Enterprise (SBE), creating a Point of Sale (POS) system could serve as a viable application.
12.1.1
Identify and explain the impacts of malware (e.g., ransomware), hacking, phishing, intellectual property theft, and identity theft can have on a business.
  1. Fundamentals of Cybersecurity
  2. 1.7 Common Cyber Attacks and Prevention
  3. 8.6 Checking for Vulnerabilities
  4. 8.7 Risky Business
12.1.2
Explore appropriate security controls (e.g., security awareness training, antivirus and anti-malware software, access control systems, and information security policies) to protect business information.
  1. Fundamentals of Cybersecurity
  2. 4.8 Application Security
  3. 4.9 Browser Configuration
  4. 4.10 System Administration
  5. 8.7 Risky Business
13.1.1
Describe common network concepts (e.g., IP address, topology, protocols, bandwidth, and latency).
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
  3. 5.6 Routing and Packets
  4. 5.7 How Do Websites Work?
  5. 6.5 Network Devices
13.1.2
Describe common network hardware (e.g., modems, routers, switches, firewalls, and servers) that can be used in a business.
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
13.1.3
Describe common network security (e.g., firewalls and virtual private networks).
  1. Fundamentals of Cybersecurity
  2. 6.10 Network Communication