Please enable JavaScript to use CodeHS

Standards Mapping

for CompTIA IT Fundamentals

33

Standards in this Framework

33

Standards Mapped

100%

Mapped to Course

Standard Lessons
1.1
Compare and contrast notational systems.
  1. 5.2 Bits, Text, and Numbers
1.2
Compare and contrast fundamental data types and their characteristics.
  1. 13.1 Programming Concepts
1.3
Illustrate the basics of computing and processing.
  1. 4.1 Operating Systems
  2. 6.3 Peripheral Devices
  3. 6.4 Storage Options
1.4
Explain the value of data and information.
  1. 1.4 Cyber Ethics and Laws
  2. 8.1 Data as a Resource
1.5
Compare and contrast common units of measure.
  1. 4.3 Comparing Operating Systems
  2. 5.3 Encoding Images in Binary
  3. 6.5 Network Devices
1.6
Explain the troubleshooting methodology.
  1. 7.1 Communication is Key!
  2. 7.2 Troubleshooting Methodology
2.1
Classify common types of input/output device interfaces.
  1. 6.3 Peripheral Devices
2.2
Given a scenario, set up and install common peripheral devices to a laptop/PC.
  1. 6.3 Peripheral Devices
2.3
Explain the purpose of common internal computing components.
  1. 6.1 Internal Components
2.4
Compare and contrast common Internet service types.
  1. 6.5 Network Devices
  2. 6.7 Network Options
2.5
Compare and contrast storage types.
  1. 6.4 Storage Options
2.6
Compare and contrast common computing devices and their purposes.
  1. 1.6 Cybersecurity Essentials
  2. 4.1 Operating Systems
  3. 4.5 Laptops and Tablets
  4. 6.1 Internal Components
2.7
Explain basic networking concepts.
  1. 5.4 What is the Internet?
  2. 5.5 IP Addresses
  3. 5.6 Routing and Packets
  4. 5.7 How Do Websites Work?
  5. 5.8 OSI Model
  6. 6.5 Network Devices
  7. 6.7 Network Options
  8. 6.9 Lab: Mobile Device Connectivity
2.8
Given a scenario, install, configure and secure a basic wireless network.
  1. 6.7 Network Options
  2. 6.8 Lab: SOHO Devices
3.1
Explain the purpose of operating systems.
  1. 4.1 Operating Systems
3.2
Compare and contrast components of an operating system.
  1. 4.3 Comparing Operating Systems
3.3
Explain the purpose and proper use of software.
  1. 4.6 Software and Applications
  2. 4.7 Software Licenses
3.4
Explain methods of application architecture and delivery models.
  1. 4.6 Software and Applications
  2. 4.7 Software Licenses
3.5
Given a scenario, configure and use web browsers.
  1. 1.5 Personal Data Security
  2. 4.9 Browser Configuration
3.6
Compare and contrast general application concepts and uses.
  1. 4.6 Software and Applications
  2. 4.7 Software Licenses
4.1
Compare and contrast programming language categories.
  1. 8.2 Using Databases
  2. 13.1 Programming Concepts
4.2
Given a scenario, use programming organizational techniques and interpret logic.
  1. 13.2 Programming with Karel
  2. 13.3 Looping
  3. 13.4 Branching
  4. 13.6 Organizational Techniques
4.3
Explain the purpose and use of programming concepts.
  1. 13.1 Programming Concepts
  2. 13.5 Arrays and Objects
5.1
Explain database concepts and the purpose of a database.
  1. 8.2 Using Databases
5.2
Compare and contrast various database structures.
  1. 8.2 Using Databases
5.3
Summarize methods used to interface with databases.
  1. 8.2 Using Databases
6.1
Summarize confidentiality, integrity and availability concerns.
  1. 1.6 Cybersecurity Essentials
6.2
Explain methods to secure devices and best practices.
  1. 1.5 Personal Data Security
  2. 1.7 Common Cyber Attacks and Prevention
  3. 4.8 Application Security
  4. 4.9 Browser Configuration
  5. 4.10 System Administration
6.3
Summarize behavioral security concepts.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Personal Data and Collection
  3. 1.5 Personal Data Security
  4. 4.10 System Administration
6.4
Compare and contrast authentication, authorization, accounting and non-repudiation concepts.
  1. 1.6 Cybersecurity Essentials
  2. 4.10 System Administration
6.5
Explain password best practices.
  1. 1.5 Personal Data Security
6.6
Explain common uses of encryption.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.2 Symmetric Encryption
  3. 2.4 Authentication Methods
  4. 5.7 How Do Websites Work?
  5. 8.1 Data as a Resource
6.7
Explain business continuity concepts.
  1. 5.6 Routing and Packets
  2. 6.4 Storage Options
  3. 8.6 Checking for Vulnerabilities
  4. 8.7 Risky Business