Please enable JavaScript to use CodeHS

Standards Mapping

for CompTIA Tech+

31

Standards in this Framework

31

Standards Mapped

100%

Mapped to Course

Standard Lessons
1.1
Explain the basics of computing.
  1. 6.1 Internal Components
  2. 6.3 Peripheral Devices
  3. 6.4 Storage Options
1.2
Identify notational systems.
  1. 5.1 Computers Speak Binary
  2. 5.2 Bits, Text, and Numbers
  3. 5.3 Encoding Images in Binary
1.3
Compare and contrast common units of measure.
  1. 5.2 Bits, Text, and Numbers
  2. 6.5 Network Devices
1.4
Explain the troubleshooting methodology.
  1. 7.2 Troubleshooting Methodology
2.1
Explain common computing devices and their purposes.
  1. 1.6 Cybersecurity Essentials
  2. 4.4 Compatibility
  3. 4.5 Laptops and Tablets
2.2
Explain the purpose of common internal computing components.
  1. 6.1 Internal Components
  2. 6.4 Storage Options
  3. 6.5 Network Devices
2.3
Compare and contrast storage types.
  1. 6.4 Storage Options
2.4
Given a scenario, install and configure common peripheral devices.
  1. 6.3 Peripheral Devices
2.5
Compare and contrast common types of input/output device interfaces.
  1. 6.3 Peripheral Devices
  2. 6.7 Network Options
2.6
Compare and contrast virtualization and cloud technologies.
  1. 4.1 Operating Systems
2.7
Compare and contrast common internet service types.
  1. 6.7 Network Options
2.8
Identify basic networking concepts.
  1. 6.5 Network Devices
  2. 6.7 Network Options
2.9
Explain the basic capabilities of a small wireless network.
  1. 6.7 Network Options
3.1
Identify components of an OS.
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
3.2
Explain the purpose of operating systems.
  1. 4.1 Operating Systems
3.3
Explain the purpose and proper use of software.
  1. 4.6 Software and Applications
  2. 4.7 Software Licenses
3.4
Given a scenario, configure and use web browser features.
  1. 4.9 Browser Configuration
3.5
Identify common uses of artificial intelligence (AI).
  1. 1.3 Can All Information Be Trusted?
4.1
Compare and contrast programming language categories.
  1. 13.1 Programming Concepts
4.2
Identify fundamental data types and their characteristics.
  1. 13.1 Programming Concepts
4.3
Explain the purpose and use of programming concepts.
  1. 13.5 Arrays and Objects
4.4
Identify programming organizational techniques and logic concepts.
  1. 13.3 Looping
  2. 13.4 Branching
  3. 13.6 Organizational Techniques
5.1
Explain the value of data and information.
  1. 8.1 Data as a Resource
5.2
Explain database concepts and the purpose of a database.
  1. 8.2 Using Databases
5.3
Compare and contrast various database structures.
  1. 8.2 Using Databases
5.4
Explain basic data backup concepts.
  1. 4.8 Application Security
6.1
Explain fundamental security concepts and frameworks.
  1. 1.6 Cybersecurity Essentials
6.2
Explain methods to secure devices and security best practices.
  1. 1.5 Personal Data Security
  2. 1.6 Cybersecurity Essentials
  3. 1.7 Common Cyber Attacks and Prevention
6.3
Explain password best practices.
  1. 1.7 Common Cyber Attacks and Prevention
6.4
Identify common use cases for encryption.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.3 Asymmetric Encryption
  3. 2.4 Authentication Methods
  4. 8.1 Data as a Resource
6.5
Given a scenario, configure security settings for a small wireless network.
  1. 6.7 Network Options