Please enable JavaScript to use CodeHS

Standards Mapping

for CompTIA Tech+

31

Standards in this Framework

31

Standards Mapped

100%

Mapped to Course

Standard Lessons
1.1
Explain the basics of computing.
  1. 9.1 Internal Components
  2. 9.2 Peripheral Devices
  3. 9.4 Storage Options
1.2
Identify notational systems.
  1. 8.2 Notational Systems
  2. 29.8 IT Concepts Items
1.3
Compare and contrast common units of measure.
  1. 8.2 Notational Systems
  2. 9.3 Network Devices
1.4
Explain the troubleshooting methodology.
  1. 10.1 Methodology
  2. 10.2 Support Practice
2.1
Explain common computing devices and their purposes.
  1. 6.3 Compatibility
  2. 29.6 More Operating Systems
  3. 29.7 System Administration Items
2.2
Explain the purpose of common internal computing components.
  1. 9.1 Internal Components
  2. 9.3 Network Devices
  3. 9.4 Storage Options
2.3
Compare and contrast storage types.
  1. 9.4 Storage Options
2.4
Given a scenario, install and configure common peripheral devices.
  1. 9.2 Peripheral Devices
2.5
Compare and contrast common types of input/output device interfaces.
  1. 9.2 Peripheral Devices
  2. 9.5 Network Options
  3. 29.10 IT Infrastructure Items
2.6
Compare and contrast virtualization and cloud technologies.
  1. 6.1 Operating Systems
  2. 29.9 Cloud Computing
2.7
Compare and contrast common internet service types.
  1. 9.5 Network Options
2.8
Identify basic networking concepts.
  1. 9.3 Network Devices
  2. 9.5 Network Options
2.9
Explain the basic capabilities of a small wireless network.
  1. 9.5 Network Options
3.1
Identify components of an OS.
  1. 6.1 Operating Systems
  2. 6.2 Comparing Operating Systems
3.2
Explain the purpose of operating systems.
  1. 6.1 Operating Systems
  2. 6.2 Comparing Operating Systems
3.3
Explain the purpose and proper use of software.
  1. 6.4 Software and Applications
  2. 6.5 Software Licenses
3.4
Given a scenario, configure and use web browser features.
  1. 6.7 Browser Configuration
  2. 29.2 Personal Data Security
  3. 29.7 System Administration Items
3.5
Identify common uses of artificial intelligence (AI).
  1. 29.3 Introduction to Artificial Intelligence
  2. 29.4 Artificial Intelligence and Machine Learning
4.1
Compare and contrast programming language categories.
  1. 20.1 Programming Concepts
4.2
Identify fundamental data types and their characteristics.
  1. 20.1 Programming Concepts
4.3
Explain the purpose and use of programming concepts.
  1. 20.3 Looping
  2. 20.4 Branching
  3. 20.5 Arrays and Objects
4.4
Identify programming organizational techniques and logic concepts.
  1. 20.3 Looping
  2. 20.4 Branching
  3. 20.6 Organizational Techniques
5.1
Explain the value of data and information.
  1. 29.11 Data as a Resource
5.2
Explain database concepts and the purpose of a database.
  1. 7.2 What is SQL?
  2. 29.12 Data Security Items
5.3
Compare and contrast various database structures.
  1. 29.12 Data Security Items
5.4
Explain basic data backup concepts.
  1. 6.6 Application Security
6.1
Explain fundamental security concepts and frameworks.
  1. 1.2 What is Cybersecurity?
  2. 1.4 The CIA Triad
  3. 29.2 Personal Data Security
6.2
Explain methods to secure devices and security best practices.
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 6.6 Application Security
  4. 7.4 Common Security Problems
  5. 29.2 Personal Data Security
6.3
Explain password best practices.
  1. 2.4 Privacy & Security
  2. 29.5 Cybersecurity and You Items
6.4
Identify common use cases for encryption.
  1. 4.1 Cryptography, Cryptology, Cryptanalysis
  2. 4.3 Basic Crypto Systems: Caesar Cipher
  3. 4.6 Hash Functions
  4. 29.7 System Administration Items
  5. 29.11 Data as a Resource
6.5
Given a scenario, configure security settings for a small wireless network.
  1. 9.5 Network Options
  2. 29.10 IT Infrastructure Items