Please enable JavaScript to use CodeHS

Standards Mapping

for Texas Principles of Information Technology

66

Standards in this Framework

40

Standards Mapped

60%

Mapped to Course

Standard Lessons
130.302.1A
identify and demonstrate work behaviors and qualities that enhance employability and job advancement such as regular attendance, attention to proper attire, maintenance of a clean and safe work environment, pride in work, flexibility, and initiative
130.302.1B
employ effective verbal and nonverbal communication skills
  1. 3.1 Project: Public Service Announcement
130.302.1C
employ effective reading and writing skills
  1. 3.1 Project: Public Service Announcement
  2. 10.2 Support Practice
130.302.1D
solve problems and think critically
  1. 3.1 Project: Public Service Announcement
  2. 10.2 Support Practice
130.302.1E
demonstrate leadership skills and function effectively as a team member
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
130.302.1F
identify and implement proper safety procedures
130.302.1G
demonstrate planning and time-management skills such as storyboarding and project management, including initiating, planning, executing, monitoring and controlling, and closing a project
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
130.302.2A
identify job opportunities and accompanying job duties and tasks
130.302.2B
research careers of personal interest along with the education, job skills, and experience required to achieve personal career goals
130.302.2C
describe the functions of resumes and portfolios
130.302.3A
identify and describe functions of various evolving and emerging technologies
  1. 4.1 Cryptography, Cryptology, Cryptanalysis
  2. 4.2 History of Cryptography
  3. 8.1 Introduction to the Internet
  4. 8.12 Impact of the Internet
130.302.3B
send and receive text information and file attachments using electronic methods such as email, electronic bulletin boards, and instant message services
130.302.3C
demonstrate effective Internet search strategies, including keywords and Boolean logic, using various available search engines
  1. 2.5 Information Literacy
130.302.3D
identify the various components of a Uniform Resource Locator;
  1. 24.13 Viewing Websites
130.302.3E
demonstrate ability to effectively test acquired information from the Internet for accuracy, relevance, and validity
  1. 2.5 Information Literacy
130.302.3F
explain issues concerning computer-based threats such as computer viruses, malware, and hacking
  1. 1.1 Module Overview - Cybersecurity
  2. 1.2 What is Cybersecurity?
  3. 1.3 Impact of Cybersecurity
  4. 2.4 Privacy & Security
  5. 2.5 Information Literacy
130.302.3G
explain issues concerning Internet safety such as identity theft, online predators, cyber-bullying, and phishing
  1. 2.2 Cyberbullying
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
  4. 2.5 Information Literacy
130.302.4A
identify major hardware components and their functions
  1. 9.1 Internal Components
130.302.4B
use available reference tools as appropriate
130.302.4C
connect and use a variety of peripheral devices such as mouse, keyboard, microphone, digital camera, and printer.
  1. 9.2 Peripheral Devices
130.302.5A
differentiate between systems and application software
  1. 6.1 Operating Systems
  2. 6.4 Software and Applications
130.302.5B
identify and explain major operating system fundamentals and components such as disk operations, graphical user interface components, and hardware drivers
  1. 6.1 Operating Systems
  2. 6.2 Comparing Operating Systems
130.302.5C
explain the purpose of file types across software products
130.302.5D
demonstrate use of computer numbering systems and internal data representation such as identifying the hexadecimal value of a color
  1. 8.2 Notational Systems
  2. 8.3 Data Representation
130.302.5E
compare and contrast open source and proprietary software
  1. 6.5 Software Licenses
130.302.5F
explain use of system management tools
  1. 6.8 System Administration
130.302.5G
apply proper file management techniques such as creating, naming, organizing, copying, moving, and deleting files
130.302.5H
use appropriate file protection and security
  1. 6.8 System Administration
130.302.5I
explain the process for discovering, quarantining, and removing viruses from a computer system.
  1. 6.6 Application Security
130.302.6A
identify hardware associated with telecommunications and data networking such as servers, routers, switches, and network connectors
  1. 8.4 Internet Hardware and Sending Information
  2. 9.3 Network Devices
  3. 24.13 Viewing Websites
130.302.6B
identify and describe various types of networks such as peer-to-peer, local area networks, wide area networks, wireless, and Ethernet
  1. 9.5 Network Options
130.302.6C
identify functions of network operating systems
130.302.6D
explain troubleshooting techniques for various network connection issues
  1. 10.1 Methodology
  2. 10.2 Support Practice
130.302.7A
identify the terminology associated with word-processing software
130.302.7B
edit a variety of text documents using functions such as pagination, appropriate white space, tab settings, and font style, size, and color
130.302.7C
create professional documents such as memorandums, technical manuals, or proposals using advanced word-processing features
130.302.8A
identify the terminology associated with spreadsheet software
130.302.8B
use numerical content to perform mathematical calculations
130.302.8C
use student-created and preprogrammed functions to produce documents such as budget, payroll, statistical tables, and personal checkbook register
130.302.8D
identify, generate, and describe the function of comma separated value files
130.302.8E
create and analyze spreadsheets incorporating advanced features such as lookup tables, nested IF statements, subtotals, cell protection conditional formatting, charts, and graphs
130.302.8F
perform sorting, searching, and data filtering in documents
130.302.9A
identify the function of compilers and interpreters
  1. 10.2 Support Practice
130.302.9B
explain the difference between the operation of compilers and interpreters
  1. 10.2 Support Practice
130.302.9C
identify various computer languages and how the languages are used in software development
  1. 10.2 Support Practice
130.302.9D
recognize data representation in software development such as string, numeric, character, integer, and date;
  1. 10.2 Support Practice
130.302.9E
identify and explain the concept of algorithms
130.302.9F
describe the flow of a structured algorithm, including linear and iterative instructions such as using a flow chart
  1. 20.6 Organizational Techniques
130.302.10A
identify the terminology associated with database software and database functions
130.302.10B
explore the application of databases
130.302.10C
identify and explain the purpose and elements of a query language
  1. 7.2 What is SQL?
130.302.10D
identify and explain the purpose of fields and records
  1. 7.2 What is SQL?
  2. 7.3 Basic Querying in SQL
130.302.10E
describe the process of constructing a query, including multiple search parameters
  1. 7.3 Basic Querying in SQL
130.302.11A
identify the terminology and functions of presentation software
130.302.11B
create, save, edit, and produce presentations incorporating advanced features such as links, hyperlinks, audio, and graphics
130.302.12A
identify the terminology associated with web page development and interactive media
  1. 24.1 Introduction to HTML
  2. 24.13 Viewing Websites
130.302.12B
identify and explain design elements such as typeface, color, shape, texture, space, and form
130.302.12C
identify and explain design principles such as unity, harmony, balance, scale, and contrast
130.302.12D
identify and explain common elements of Hyper Text Markup Language (HTML) such as tags, stylesheets, and hyperlinks
  1. 24.1 Introduction to HTML
  2. 24.2 Structure of an HTML Page
130.302.12E
create a web page containing links, graphics, and text using appropriate design principles
  1. 24.15 Your First Website
130.302.13A
explain and demonstrate ethical use of technology and online resources
  1. 2.6 Creative Credit & Copyright
130.302.13B
adhere to intellectual property laws
  1. 2.6 Creative Credit & Copyright
130.302.13C
explain the concept of intellectual property laws, including copyright, trademarks, and patents and consequences of violating each type of law
  1. 2.6 Creative Credit & Copyright
130.302.13D
examine the consequences of plagiarism
  1. 2.6 Creative Credit & Copyright
130.302.13E
identify and explain unethical practices such as hacking, online piracy, and data vandalism
  1. 1.4 The CIA Triad
  2. 2.7 Hacking Ethics
130.302.13F
demonstrate ethical use of online resources, including citation of source
  1. 2.5 Information Literacy