Please enable JavaScript to use CodeHS

Standards Framework

for Nebraska IT Fundamentals


Standards in this Framework

Standard Description
CIS.HS.12.1.a Identify and distinguish the differences between input and output devices.
CIS.HS.12.1.b Identify and explain how various components meet the needs of the user.
CIS.HS.12.1.c Identify and analyze emerging technologies.
CIS.HS.12.1.d Identify storage options.
CIS.HS.12.1.e Identify the process to configure permissions for files and folders.
CIS.HS.12.1.f Explain multiple methods of moving digital files.
CIS.HS.12.2.a Identify the correct hardware to connect with external components.
CIS.HS.12.2.b Determine and evaluate recommended hardware devices to solve specific problems.
CIS.HS.12.2.c Troubleshoot basic computer hardware problems.
CIS.HS.12.2.d Find and analyze resources to answer basic troubleshooting questions. technologies for various tasks.
CIS.HS.12.2.e Develop criteria for purchasing or upgrading computer system hardware.
CIS.HS.12.2.f Identify and analyze proper input
CIS.HS.12.3.a Identify and analyze software appropriate for specific tasks.
CIS.HS.12.3.b Research and analyze software installation and upgrade options.
CIS.HS.12.3.c Troubleshoot potential problems with software installation (i.e. bloatware).
CIS.HS.12.3.d Compare and contrast the functions, features, and limitations of different operating systems and utilities (i.e.,open source and mobile proprietary operating systems).
CIS.HS.12.4.a Identify the components (e.g., wires, cables, routers, etc.) that make up the Internet.
CIS.HS.12.4.b Describe the types of Internet connections.
CIS.HS.12.4.c Explain Transmission Control Protocol/Internet Protocol (TCP/IP).
CIS.HS.12.4.d Identify and compare different types of web technologies: blogs, wikis, podcasts, RSS feeds, etc.
CIS.HS.12.4.e Explain browser cache and the process of clearing it.
CIS.HS.12.5.a Define basic networking terminology.
CIS.HS.12.5.b Describe the characteristics and uses of networks, network devices, and components.
CIS.HS.12.5.c Identify the purpose of networks and their functionality.
CIS.HS.12.5.d Identify tools, diagnostic procedures, and troubleshooting techniques for networks.
CIS.HS.12.5.e Describe the process of configuring, optimizing, and upgrading of networks.
CIS.HS.12.5.f Explore and use cloud computing.
CIS.HS.12.5.g Research and analyze basic network security solutions.
CIS.HS.12.5.h Design a theoretical network environment and create protocols on deploying and maintaining the network.
CIS.HS.12.6.a Design and create database tables and relationships.
CIS.HS.12.6.b Create database columns and specify properties.
CIS.HS.12.6.c Name tables and fields in conformance with naming conventions.
CIS.HS.12.6.d Insert, update, and delete records in a database.
CIS.HS.12.6.e Import data into databases and transfer data between databases.
CIS.HS.12.6.f Organize and store database files in a structured environment for users.
CIS.HS.12.6.g Control user access to data and log access to the database by user and type of transaction.
CIS.HS.12.6.h Backup, verify, and recover data in a database.
CIS.HS.12.6.i Generate and print forms, reports, and results of queries (i.e., calculated fields, functions).
CIS.HS.12.7.a Identify and define programming terminology.
CIS.HS.12.7.b Explain the importance of life-long learning as a programmer.
CIS.HS.12.7.c Analyze the strengths and weaknesses of different languages for solving a specific problem.
CIS.HS.12.7.d Write code that uses logical operators (e.g., and, or, not, loops).
CIS.HS.12.7.e Write code that uses conditional control structures (e.g., if, if‐then‐else).
CIS.HS.12.7.f Test and debug code.
CIS.HS.12.7.g Identify and analyze protocols to maintain the integrity of programs.
CIS.HS.12.8.a Identify the goals, objectives, and purposes of cybersecurity first principles.
CIS.HS.12.8.b Identify different types of security threats and vulnerabilities.
CIS.HS.12.8.c Identify and analyze policies procedures for security, privacy, and risk management.
CIS.HS.12.8.d Explain intellectual property laws (e.g., copyright, trademark).
CIS.HS.12.8.e Identify and analyze confidentiality concerns.
CIS.HS.12.8.f Discuss risk loss and prevention methods.
CIS.HS.12.8.g Analyze and evaluate passwords.
CIS.HS.12.8.h Identify personal risks and create personal protocols to differentiate between home and work.
CIS.HS.12.9.a Identify information technologies used in various industries.
CIS.HS.12.9.b Discuss the impact of technology on all career fields.
CIS.HS.12.9.c Identify common tasks within the information technology career fields in occupations.
CIS.HS.12.9.d Discuss career opportunities in information technology career fields.
CIS.HS.12.9.e Describe the impact of technological change and the importance of lifelong learning in this career field.