Please enable JavaScript to use CodeHS

Standards Mapping

for Florida IT Fundamentals

97

Standards in this Framework

59

Standards Mapped

60%

Mapped to Course

Standard Lessons
16.01
Describe and use current and emerging computer technology and software to perform personal and business related tasks.
  1. 4.6 Software and Applications
16.02
Describe the types of communications and networking systems used in workplace environments.
  1. 6.7 Network Options
  2. 6.10 Network Communication
16.03
Locate and use software application reference materials such as on-line help, vendor bulletin boards, tutorials, and manuals.
  1. 7.2 Troubleshooting Methodology
  2. 7.3 Building a Knowledge Base
  3. 7.4 Star in a Video!
16.04
Troubleshoot problems with computer hardware peripherals.
  1. 6.3 Peripheral Devices
  2. 7.2 Troubleshooting Methodology
16.05
Describe ethical, privacy, and security issues and problems associated with computers and information systems.
  1. 1.4 Cyber Ethics and Laws
  2. 1.5 Personal Data Security
16.06
Demonstrate proficiency in using the basic features of GUI browsers.
  1. 4.9 Browser Configuration
16.07
Configure computer systems to protect against various low-level attacks.
  1. 1.7 Common Cyber Attacks and Prevention
  2. 4.8 Application Security
17.01
Identify the most common computer operating systems.
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
17.02
Describe and use industry accepted file naming conventions; particularly in NTFS, ext4, FAT, and ReFS file systems.
  1. 4.1 Operating Systems
17.03
Demonstrate proficiency with file management tasks (e.g., folder creation, file creation, backup, copy, delete, open, save).
  1. 4.10 System Administration
  2. 4.11 Command Line Interface
17.04
Demonstrate a working knowledge of standard file formats.
  1. 4.4 Compatibility
17.05
Compare and contrast various operating systems (e.g., Android iOS, Windows, Mac, and Linux).
  1. 4.3 Comparing Operating Systems
17.06
Differentiate between different operating systems and applications.
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
  3. 4.6 Software and Applications
17.07
Compare and contrast open source and proprietary software.
  1. 4.7 Software Licenses
17.08
Explain how system utilities are used to maintain computer performance.
  1. 4.11 Command Line Interface
  2. 6.11 Network Management
17.09
Evaluate criteria for selecting an operating system.
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
17.10
Configure various operating systems from their default settings to low, medium, and high security level settings.
18.01
Explain how information technology impacts the operation and management of business and society.
  1. 5.9 Impact of the Internet
18.02
Identify and describe the various ways of segmenting the IT industry (e.g., hardware vs. software, server vs. client, business vs. entertainment, stable vs. mobile).
  1. 4.1 Operating Systems
  2. 8.3 Security in Coding
18.03
Describe how digital technologies (social media) are changing both work and personal lifestyles.
  1. 1.1 Digital Footprint and Responsibility
  2. 5.9 Impact of the Internet
18.04
Demonstrate an understanding of configuring social media used for business to meet various business requirements.
18.05
Demonstrate an awareness of Cloud based infrastructure including SaaS (Software as a Service) and their impact on the IT industry.
19.01
Explain software hierarchy and its impact on microprocessors as it relates to the limitation and/or increase in security.
19.02
Explain the need for, and use of, peripherals and how they can compromise security.
  1. 6.3 Peripheral Devices
19.03
Demonstrate proficiency installing and using plug-and-play peripherals and explain their associated security risks.
  1. 6.3 Peripheral Devices
19.04
Identify the basic concepts of computer maintenance and upgrades and their relevance as it relates to security.
  1. 4.8 Application Security
20.01
Explain the need for and use of compilers.
  1. 13.1 Programming Concepts
20.02
Identify the three types of programming design approaches (e.g., top-down, structured, object-oriented).
20.03
Compare the various types or classes of programming languages (e.g., compiled, interpretive).
  1. 13.1 Programming Concepts
20.04
Differentiate among source code, machine code, interpreters, and compilers.
20.05
Characterize the major categories of programming languages and how they are used.
  1. 13.1 Programming Concepts
20.06
Create a model flowchart for a computer program using software applications like RAPTOR or MS VISIO.
  1. 20.2 Plan and Design
20.07
Describe the stages in the software development life cycle and explain how to successfully implement them.
  1. 20.1 Software Development Life Cycle
20.08
Compare security and vulnerabilities of various programming languages.
  1. 8.3 Security in Coding
21.01
Compare and contrast emerging technologies and describe how they impact the security of business in the global marketplace (e.g., wireless, wireless web, cell phones, portables/handhelds, vehicles, home networks, peer-to-peer, IoT, embedded systems, AI).
  1. 5.9 Impact of the Internet
21.02
Adhere to published best practices for protecting personal identifiable information when using the Internet.
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
21.03
Identify trends related to the secure use of information technology in people’s personal and professional lives.
  1. 1.6 Cybersecurity Essentials
  2. 1.7 Common Cyber Attacks and Prevention
21.04
Characterize how the rapid pace of change in information technology impacts our society’s ability to keep the appropriate level of security.
22.01
Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software.
  1. 5.8 OSI Model
22.02
Describe the purpose of the OSI model and each of its layers.
  1. 5.8 OSI Model
22.03
Explain specific functions belonging to each OSI model layer.
  1. 5.8 OSI Model
22.04
Understand how two network nodes communicate through the OSI model.
  1. 5.8 OSI Model
22.05
Discuss the structure and purpose of data packets and frames.
  1. 5.6 Routing and Packets
22.06
Describe the two types of addressing covered by the OSI model.
  1. 5.5 IP Addresses
  2. 5.8 OSI Model
23.01
Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software.
23.02
Describe the purpose of the TCP/IP model and each of its layers.
23.03
Explain specific functions belonging to each TCP/IP model layer.
23.04
Understand how two network nodes communicate through the TCP/IP model.
23.05
Describe the two types of addressing covered by the TCP/IP model.
24.01
Identify the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling).
  1. 6.1 Internal Components
24.02
Use common computer and programming terminology.
  1. 4.1 Operating Systems
  2. 5.1 Computers Speak Binary
  3. 13.1 Programming Concepts
25.01
Identify and describe web terminology.
  1. 5.4 What is the Internet?
  2. 5.5 IP Addresses
  3. 5.6 Routing and Packets
  4. 5.7 How Do Websites Work?
  5. 5.8 OSI Model
25.02
Define Universal Resource Locators (URLs) and associated protocols (e.g., http, ftp, telnet, mailto) and their associated secure protocols (e.g. https, ftps, ssh).
  1. 21.4 Viewing Websites
25.03
Compare and contrast the types of Internet domains (e.g., .com, .org, .edu, .gov, .net, .mil).
25.04
Demonstrate proficiency using search engines, including Boolean search strategies.
  1. 1.3 Can All Information Be Trusted?
25.05
Demonstrate proficiency using various secure web tools (e.g., downloading of files, transfer of files, SSH, PDF).
25.06
Compare and contrast the roles of web servers and web browsers.
  1. 4.9 Browser Configuration
  2. 5.7 How Do Websites Work?
25.07
Compare and contrast MS Web Servers and Linux Web Servers.
26.01
Describe cyber-bullying and its impact on perpetrators and victims.
  1. 1.1 Digital Footprint and Responsibility
26.02
Differentiate between viruses and malware, specifically their sources, ploys, and impact on personal privacy and computer operation, and ways to avoid infection.
  1. 1.7 Common Cyber Attacks and Prevention
26.03
Describe risks associated with sexting, related legal issues, social engineering aspects, prevention methods, and reporting of offenses.
  1. 1.4 Cyber Ethics and Laws
26.04
Describe the risks associated with online gaming and ways to reduce these risks.
26.05
Describe the intellectual property rights, ethics and legalities of downloading music or videos from the Internet.
  1. 1.3 Can All Information Be Trusted?
26.06
Describe various risks associated with social networking sites and ways to reduce these risks.
  1. 1.1 Digital Footprint and Responsibility
  2. 1.2 Personal Data and Collection
26.07
Describe the risks associated with various conferencing programs and ways to reduce these risks.
26.08
Adhere to cyber safety practices with regard to conducting Internet searches, email, chat rooms, and other social network websites.
27.01
Compare and contrast the appropriate use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music).
  1. 4.6 Software and Applications
27.02
Demonstrate proficiency in the use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music).
  1. 8.2 Using Databases
28.01
Describe email capabilities and functions.
  1. 16.6 Working with Email
28.02
Identify components of an email message.
  1. 16.6 Working with Email
28.03
Identify the components of an email address.
  1. 16.6 Working with Email
28.04
Identify when to use different email options.
  1. 16.6 Working with Email
28.05
Attach a file to an email message.
28.06
Forward an email message.
28.07
Use an address book if an address book is available via the school’s Outlook server for the student to use.
28.08
Reply to an email message.
28.09
Use the Internet to perform email activities.
28.10
Identify the appropriate use of email and demonstrate related email etiquette.
  1. 16.6 Working with Email
28.11
Recognize a fraudulent email and deal with it appropriately.
  1. 1.7 Common Cyber Attacks and Prevention
28.12
Identify common problems associated with widespread use of email.
28.13
Create folders to organize email.
29.01
Produce a presentation that includes music, animation, and digital photography and present it using appropriate technology.
29.02
Using presentation software, create a multimedia presentation that incorporates shot and edited video, animation, music, narration and adheres to good design principles, use of transitions, and effective message conveyance.
29.03
Demonstrate knowledge of the roles and responsibilities of a multimedia production team (e.g., project manager, creative or design director, content experts, writers, graphic designers, animators, sound designers, videographer, interface designers/programmers).
29.04
Collaborate with team members to plan, edit, evaluate, and present a multimedia presentation where individuals on the team function in specific production roles.
29.05
Create a self-running presentation with synchronized audio, convert presentation slides (e.g., PowerPoint) into streaming ASF files for use on the web.
30.01
Determine work priorities, the audience, project budgets, project specifications, and the production schedule.
30.02
Evaluate and select appropriate software packages and multimedia tools to complete assigned tasks.
30.03
Present and defend design projects.
31.01
Locate, comprehend and evaluate key elements of oral and written information.
31.02
Draft, revise, and edit written business technology documents using correct grammar, punctuation and vocabulary (e.g., Business Continuity and Disaster Recovery plan, Incident Response plan, IT reports and procedures manuals).
31.03
Present information formally and informally to instruct others on Computer Security Awareness and Victim Prevention.
32.01
Demonstrate knowledge of arithmetic operations.
  1. 5.2 Bits, Text, and Numbers
  2. 5.3 Encoding Images in Binary
32.02
Construct charts/tables/graphs using functions and data and relate it to IT risk and business continuity.
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
32.03
Demonstrate an understanding of binary numbers and ASCII characters.
  1. 5.1 Computers Speak Binary
  2. 5.2 Bits, Text, and Numbers
  3. 5.3 Encoding Images in Binary
33.01
Discuss the role of creativity in constructing scientific questions, methods and explanations.
33.02
Formulate scientifically investigable questions, construct investigations, collect and evaluate data, and develop scientific recommendations based on findings.