Please enable JavaScript to use CodeHS

Standards Mapping

for Nebraska IT Fundamentals

58

Standards in this Framework

45

Standards Mapped

77%

Mapped to Course

Standard Lessons
CIS.HS.12.1.a
Identify and distinguish the differences between input and output devices.
  1. 6.3 Peripheral Devices
CIS.HS.12.1.b
Identify and explain how various components meet the needs of the user.
  1. 6.1 Internal Components
  2. 6.3 Peripheral Devices
  3. 6.4 Storage Options
  4. 6.7 Network Options
CIS.HS.12.1.c
Identify and analyze emerging technologies.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 5.9 Impact of the Internet
CIS.HS.12.1.d
Identify storage options.
  1. 6.4 Storage Options
CIS.HS.12.1.e
Identify the process to configure permissions for files and folders.
  1. 4.10 System Administration
CIS.HS.12.1.f
Explain multiple methods of moving digital files.
  1. 4.11 Command Line Interface
CIS.HS.12.2.a
Identify the correct hardware to connect with external components.
  1. 6.1 Internal Components
  2. 6.3 Peripheral Devices
CIS.HS.12.2.b
Determine and evaluate recommended hardware devices to solve specific problems.
  1. 6.4 Storage Options
  2. 6.7 Network Options
  3. 6.11 Network Management
CIS.HS.12.2.c
Troubleshoot basic computer hardware problems.
  1. 7.2 Troubleshooting Methodology
CIS.HS.12.2.d
Find and analyze resources to answer basic troubleshooting questions. technologies for various tasks.
  1. 7.2 Troubleshooting Methodology
CIS.HS.12.2.e
Develop criteria for purchasing or upgrading computer system hardware.
  1. 6.4 Storage Options
  2. 6.7 Network Options
CIS.HS.12.2.f
Identify and analyze proper input
  1. 4.11 Command Line Interface
  2. 6.3 Peripheral Devices
  3. 6.10 Network Communication
CIS.HS.12.3.a
Identify and analyze software appropriate for specific tasks.
  1. 4.6 Software and Applications
  2. 4.7 Software Licenses
CIS.HS.12.3.b
Research and analyze software installation and upgrade options.
  1. 4.6 Software and Applications
  2. 4.7 Software Licenses
  3. 4.8 Application Security
CIS.HS.12.3.c
Troubleshoot potential problems with software installation (i.e. bloatware).
  1. 4.7 Software Licenses
  2. 4.8 Application Security
  3. 4.9 Browser Configuration
CIS.HS.12.3.d
Compare and contrast the functions, features, and limitations of different operating systems and utilities (i.e.,open source and mobile proprietary operating systems).
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
  3. 4.7 Software Licenses
CIS.HS.12.4.a
Identify the components (e.g., wires, cables, routers, etc.) that make up the Internet.
  1. 6.3 Peripheral Devices
  2. 6.5 Network Devices
CIS.HS.12.4.b
Describe the types of Internet connections.
  1. 6.7 Network Options
CIS.HS.12.4.c
Explain Transmission Control Protocol/Internet Protocol (TCP/IP).
  1. 5.6 Routing and Packets
  2. 5.8 OSI Model
CIS.HS.12.4.d
Identify and compare different types of web technologies: blogs, wikis, podcasts, RSS feeds, etc.
CIS.HS.12.4.e
Explain browser cache and the process of clearing it.
  1. 4.9 Browser Configuration
CIS.HS.12.5.a
Define basic networking terminology.
  1. 6.11 Network Management
CIS.HS.12.5.b
Describe the characteristics and uses of networks, network devices, and components.
  1. 6.7 Network Options
  2. 6.11 Network Management
CIS.HS.12.5.c
Identify the purpose of networks and their functionality.
  1. 6.5 Network Devices
  2. 6.7 Network Options
CIS.HS.12.5.d
Identify tools, diagnostic procedures, and troubleshooting techniques for networks.
  1. 6.7 Network Options
  2. 6.10 Network Communication
  3. 6.11 Network Management
CIS.HS.12.5.e
Describe the process of configuring, optimizing, and upgrading of networks.
  1. 6.7 Network Options
  2. 6.10 Network Communication
  3. 6.11 Network Management
CIS.HS.12.5.f
Explore and use cloud computing.
  1. 6.4 Storage Options
CIS.HS.12.5.g
Research and analyze basic network security solutions.
  1. 6.10 Network Communication
  2. 6.11 Network Management
CIS.HS.12.5.h
Design a theoretical network environment and create protocols on deploying and maintaining the network.
CIS.HS.12.6.a
Design and create database tables and relationships.
  1. 8.2 Using Databases
CIS.HS.12.6.b
Create database columns and specify properties.
  1. 8.2 Using Databases
CIS.HS.12.6.c
Name tables and fields in conformance with naming conventions.
  1. 8.2 Using Databases
CIS.HS.12.6.d
Insert, update, and delete records in a database.
CIS.HS.12.6.e
Import data into databases and transfer data between databases.
CIS.HS.12.6.f
Organize and store database files in a structured environment for users.
CIS.HS.12.6.g
Control user access to data and log access to the database by user and type of transaction.
CIS.HS.12.6.h
Backup, verify, and recover data in a database.
CIS.HS.12.6.i
Generate and print forms, reports, and results of queries (i.e., calculated fields, functions).
CIS.HS.12.7.a
Identify and define programming terminology.
  1. 13.3 Looping
  2. 13.4 Branching
  3. 13.5 Arrays and Objects
CIS.HS.12.7.b
Explain the importance of life-long learning as a programmer.
CIS.HS.12.7.c
Analyze the strengths and weaknesses of different languages for solving a specific problem.
CIS.HS.12.7.d
Write code that uses logical operators (e.g., and, or, not, loops).
  1. 13.3 Looping
CIS.HS.12.7.e
Write code that uses conditional control structures (e.g., if, if‐then‐else).
  1. 13.4 Branching
CIS.HS.12.7.f
Test and debug code.
  1. 13.3 Looping
  2. 13.4 Branching
  3. 13.5 Arrays and Objects
CIS.HS.12.7.g
Identify and analyze protocols to maintain the integrity of programs.
CIS.HS.12.8.a
Identify the goals, objectives, and purposes of cybersecurity first principles.
CIS.HS.12.8.b
Identify different types of security threats and vulnerabilities.
  1. 4.8 Application Security
CIS.HS.12.8.c
Identify and analyze policies procedures for security, privacy, and risk management.
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
CIS.HS.12.8.d
Explain intellectual property laws (e.g., copyright, trademark).
  1. 4.7 Software Licenses
CIS.HS.12.8.e
Identify and analyze confidentiality concerns.
  1. 1.2 Personal Data and Collection
  2. 1.5 Personal Data Security
CIS.HS.12.8.f
Discuss risk loss and prevention methods.
  1. 8.6 Checking for Vulnerabilities
  2. 8.7 Risky Business
CIS.HS.12.8.g
Analyze and evaluate passwords.
  1. 1.5 Personal Data Security
CIS.HS.12.8.h
Identify personal risks and create personal protocols to differentiate between home and work.
  1. 1.5 Personal Data Security
CIS.HS.12.9.a
Identify information technologies used in various industries.
CIS.HS.12.9.b
Discuss the impact of technology on all career fields.
  1. 5.9 Impact of the Internet
CIS.HS.12.9.c
Identify common tasks within the information technology career fields in occupations.
  1. 7.1 Communication is Key!
  2. 7.3 Building a Knowledge Base
  3. 7.4 Star in a Video!
CIS.HS.12.9.d
Discuss career opportunities in information technology career fields.
  1. 7.1 Communication is Key!
  2. 10.1 After Fundamentals of Cybersecurity
CIS.HS.12.9.e
Describe the impact of technological change and the importance of lifelong learning in this career field.
  1. 10.1 After Fundamentals of Cybersecurity
  2. 16.2 Alternative Learning Opportunities