Standards in this Framework
Standard | Description |
---|---|
CIS.HS.12.1.a | Identify and distinguish the differences between input and output devices. |
CIS.HS.12.1.b | Identify and explain how various components meet the needs of the user. |
CIS.HS.12.1.c | Identify and analyze emerging technologies. |
CIS.HS.12.1.d | Identify storage options. |
CIS.HS.12.1.e | Identify the process to configure permissions for files and folders. |
CIS.HS.12.1.f | Explain multiple methods of moving digital files. |
CIS.HS.12.2.a | Identify the correct hardware to connect with external components. |
CIS.HS.12.2.b | Determine and evaluate recommended hardware devices to solve specific problems. |
CIS.HS.12.2.c | Troubleshoot basic computer hardware problems. |
CIS.HS.12.2.d | Find and analyze resources to answer basic troubleshooting questions. technologies for various tasks. |
CIS.HS.12.2.e | Develop criteria for purchasing or upgrading computer system hardware. |
CIS.HS.12.2.f | Identify and analyze proper input |
CIS.HS.12.3.a | Identify and analyze software appropriate for specific tasks. |
CIS.HS.12.3.b | Research and analyze software installation and upgrade options. |
CIS.HS.12.3.c | Troubleshoot potential problems with software installation (i.e. bloatware). |
CIS.HS.12.3.d | Compare and contrast the functions, features, and limitations of different operating systems and utilities (i.e.,open source and mobile proprietary operating systems). |
CIS.HS.12.4.a | Identify the components (e.g., wires, cables, routers, etc.) that make up the Internet. |
CIS.HS.12.4.b | Describe the types of Internet connections. |
CIS.HS.12.4.c | Explain Transmission Control Protocol/Internet Protocol (TCP/IP). |
CIS.HS.12.4.d | Identify and compare different types of web technologies: blogs, wikis, podcasts, RSS feeds, etc. |
CIS.HS.12.4.e | Explain browser cache and the process of clearing it. |
CIS.HS.12.5.a | Define basic networking terminology. |
CIS.HS.12.5.b | Describe the characteristics and uses of networks, network devices, and components. |
CIS.HS.12.5.c | Identify the purpose of networks and their functionality. |
CIS.HS.12.5.d | Identify tools, diagnostic procedures, and troubleshooting techniques for networks. |
CIS.HS.12.5.e | Describe the process of configuring, optimizing, and upgrading of networks. |
CIS.HS.12.5.f | Explore and use cloud computing. |
CIS.HS.12.5.g | Research and analyze basic network security solutions. |
CIS.HS.12.5.h | Design a theoretical network environment and create protocols on deploying and maintaining the network. |
CIS.HS.12.6.a | Design and create database tables and relationships. |
CIS.HS.12.6.b | Create database columns and specify properties. |
CIS.HS.12.6.c | Name tables and fields in conformance with naming conventions. |
CIS.HS.12.6.d | Insert, update, and delete records in a database. |
CIS.HS.12.6.e | Import data into databases and transfer data between databases. |
CIS.HS.12.6.f | Organize and store database files in a structured environment for users. |
CIS.HS.12.6.g | Control user access to data and log access to the database by user and type of transaction. |
CIS.HS.12.6.h | Backup, verify, and recover data in a database. |
CIS.HS.12.6.i | Generate and print forms, reports, and results of queries (i.e., calculated fields, functions). |
CIS.HS.12.7.a | Identify and define programming terminology. |
CIS.HS.12.7.b | Explain the importance of life-long learning as a programmer. |
CIS.HS.12.7.c | Analyze the strengths and weaknesses of different languages for solving a specific problem. |
CIS.HS.12.7.d | Write code that uses logical operators (e.g., and, or, not, loops). |
CIS.HS.12.7.e | Write code that uses conditional control structures (e.g., if, if‐then‐else). |
CIS.HS.12.7.f | Test and debug code. |
CIS.HS.12.7.g | Identify and analyze protocols to maintain the integrity of programs. |
CIS.HS.12.8.a | Identify the goals, objectives, and purposes of cybersecurity first principles. |
CIS.HS.12.8.b | Identify different types of security threats and vulnerabilities. |
CIS.HS.12.8.c | Identify and analyze policies procedures for security, privacy, and risk management. |
CIS.HS.12.8.d | Explain intellectual property laws (e.g., copyright, trademark). |
CIS.HS.12.8.e | Identify and analyze confidentiality concerns. |
CIS.HS.12.8.f | Discuss risk loss and prevention methods. |
CIS.HS.12.8.g | Analyze and evaluate passwords. |
CIS.HS.12.8.h | Identify personal risks and create personal protocols to differentiate between home and work. |
CIS.HS.12.9.a | Identify information technologies used in various industries. |
CIS.HS.12.9.b | Discuss the impact of technology on all career fields. |
CIS.HS.12.9.c | Identify common tasks within the information technology career fields in occupations. |
CIS.HS.12.9.d | Discuss career opportunities in information technology career fields. |
CIS.HS.12.9.e | Describe the impact of technological change and the importance of lifelong learning in this career field. |