Please enable JavaScript to use CodeHS

Standards Mapping

for California Information Support and Services Pathway

40

Standards in this Framework

22

Standards Mapped

55%

Mapped to Course

Standard Lessons
A1.1
Describe how technology is integrated into business processes.
  1. 6.1 IT Helpdesk
  2. 6.2 Working with Customers
  3. 6.6 Compliance Laws
  4. 6.8 Emerging Technology and IT
A1.2
Identify common organizational, technical, and financial risks associated with the implementation and use of information and communication systems.
  1. 6.6 Compliance Laws
  2. 6.7 Asset Management
  3. 8.7 Internal Threats
A1.3
Model business processes using tools such as organization charts, flowcharts, and timelines.
A1.4
Analyze and design business processes in a cycle of continual improvement.
A2.1
Identify and list the criteria and processes for evaluating the functions of information systems.
A2.2
Investigate, evaluate, select, and use major types of software, services, and vendors.
  1. 2.6 Software and Applications
A2.3
Install software and setup hardware.
  1. 2.1 Software vs. Hardware
  2. 2.6 Software and Applications
A2.4
Define and use appropriate naming conventions and file management strategies.
  1. 2.4 File and Folder Management
A3.1
Identify and apply multiple ways to transfer information and resources (e.g., text, data, audio, video, still images) between software programs and systems.
A3.2
Validate and cite Internet resources.
A3.3
Recognize where processes are running in a networked environment (e.g., client access, remote access).
  1. 5.13 Network Management
A3.4
Identify and describe the layered nature of computing and networking such as the Open Systems Interconnect (OSI) model.
A3.5
Use multiple online search techniques and resources to acquire information.
A3.6
Describe and contrast the differences between various Internet protocols: hypertext transfer protocol (http), hypertext transfer protocol secure (https), file transfer protocol (ftp), simple mail transfer protocol (smtp).
  1. 5.7 Packets & Protocols
  2. 5.8 Protocols and Standards
A4.1
Use different systems and associated utilities to perform such functions as file management, backup and recovery, and execution of programs.
  1. 2.4 File and Folder Management
  2. 6.9 Environmental Controls
A4.2
Use a command line interface.
  1. 5.12 Network Communication
A4.3
Automate common tasks using macros or scripting.
A4.4
Evaluate the systems-development life cycle and develop appropriate plans to maintain a given system after assessing its impact on resources and total cost of ownership (TCO).
  1. 2.8 Software Development
A5.1
Follow laws, regulatory guidelines, policies, and procedures to ensure the security and integrity of information systems.
  1. 1.3 Privacy & Security
  2. 1.6 Common Security Problems
  3. 8.3 Network Attacks
  4. 8.4 Malware Types and Prevention
  5. 8.5 Common Network Attacks
A5.2
Identify potential attack vectors and security threats.
  1. 1.3 Privacy & Security
  2. 1.6 Common Security Problems
  3. 8.3 Network Attacks
  4. 8.4 Malware Types and Prevention
  5. 8.5 Common Network Attacks
A5.3
Take preventative measures to reduce security risks (e.g., strong passwords, avoid social engineering ploys, limit account permissions).
  1. 1.3 Privacy & Security
A5.4
Use security software and hardware to protect systems from attack and alert of potential threats, anti-malware software, and firewalls.
  1. 8.4 Malware Types and Prevention
A6.1
Use available resources to identify and resolve problems using knowledge bases, forums, and manuals.
  1. 6.3 Building a Knowledge Base
  2. 6.4 Star in a Video!
A6.2
Use a logical and structured approach to isolate and identify the source of problems and to resolve problems.
  1. 4.1 Methodology
A6.3
Use specific problem solving strategies appropriate to troubleshooting, eliminating possibilities, or guess and check.
  1. 4.1 Methodology
A6.4
Evaluate support needs for different data and systems configurations.
  1. 6.5 Keeping a Database
A6.5
Evaluate solution methods recognizing the trade-offs of troubleshooting vs. reloading, reimaging, or restoring to factory defaults using a sandbox environment.
A6.6
Distinguish types of symptoms and which component’s issue could exhibit those symptoms: the user, hardware, network, or software.
A6.7
Diagram the underlying processes of a system that are likely involved in a problem.
A7.1
Recognize the scope of duties ICT support staff have and tiered levels of support.
  1. 6.1 IT Helpdesk
  2. 6.2 Working with Customers
  3. 6.3 Building a Knowledge Base
  4. 6.6 Compliance Laws
  5. 6.7 Asset Management
A7.2
Describe and apply the principles of a customer-oriented service approach to supporting users.
  1. 6.1 IT Helpdesk
  2. 6.2 Working with Customers
  3. 6.3 Building a Knowledge Base
  4. 6.4 Star in a Video!
A7.3
Use technical writing and communication skills to work effectively with diverse groups of people, including users with less technical abilities.
  1. 6.1 IT Helpdesk
  2. 6.3 Building a Knowledge Base
  3. 7.1 IT Department Proposal
A7.4
Document technical support provided such as using a ticketing system.
  1. 4.2 Support Practice
A7.5
Train users to assist them in being self-supporting: formal classes, one-on-one interactions, and process and how-to guides.
A8.1
Develop the purpose and scope of a project.
A8.2
Acquire, use, and manage necessary internal and external resources when supporting various organizational systems.
A8.3
Use various tools to manage projects involving the development of information and communication systems.
A8.4
Analyze business problems by using functional and cost-benefit perspectives.
A8.5
Design, develop, implement, and monitor a project by creating and integrating technologies.
A8.6
Use a systematic method of continual improvement; plan, do, check, act (PDCA), total quality (TQ), or Six Sigma.