Please enable JavaScript to use CodeHS

Standards Mapping

for South Carolina IT Fundamentals

Clear selection Print / Download

98

Standards in this Framework

90

Standards Mapped

91%

Mapped to Course

Standard Lessons
A.1
Identify major causes of work-related accidents in offices.
  1. Fundamentals of Cybersecurity
  2. 18.4 Personal Safety
  3. Advanced Cybersecurity
  4. 20.4 Personal Safety
A.2
Demonstrate appropriate ergonomic practices.
A.3
Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 1.7 Common Cyber Attacks and Prevention
  4. 2.4 Authentication Methods
  5. 4.8 Application Security
  6. 4.9 Browser Configuration
  7. Florida Discovering Computer Science
  8. 1.9 Application Security
A.4
Identify potential abuse and unethical uses of computers and networks.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. 1.5 Personal Data Security
  4. 1.6 Cybersecurity Essentials
  5. 1.7 Common Cyber Attacks and Prevention
A.5
Explain the consequences of illegal, social, and unethical uses of information technologies (e.g., piracy; illegal downloading; licensing infringement; and inappropriate uses of software, hardware, and mobile devices).
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.4 Cyber Ethics and Laws
A.6
Differentiate between freeware, shareware, and public domain software copyrights.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
  3. Georgia Introduction to Software Technology
  4. 5.5 Software Licenses
  5. Florida Discovering Computer Science
  6. 3.9 Software Licenses
A.7
Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, Creative Commons, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
A.8
Identify netiquette including the use of email, social networking, blogs, texting, and chatting.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
A.9
Describe ethical and legal practices in business professions such as safeguarding the confidentiality of business-related information.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. 1.5 Personal Data Security
A.10
Discuss the importance of cyber safety and the impact of cyber bullying.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
  1. Fundamentals of Cybersecurity
  2. 18.1 Student Organizations
  3. Advanced Cybersecurity
  4. 20.1 Student Organizations
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
  1. Fundamentals of Cybersecurity
  2. 18.1 Student Organizations
  3. Advanced Cybersecurity
  4. 20.1 Student Organizations
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
  1. Fundamentals of Cybersecurity
  2. 18.1 Student Organizations
  3. Advanced Cybersecurity
  4. 20.1 Student Organizations
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
  1. Fundamentals of Cybersecurity
  2. 18.1 Student Organizations
  3. Advanced Cybersecurity
  4. 20.1 Student Organizations
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
  1. Fundamentals of Cybersecurity
  2. 18.1 Student Organizations
  3. Advanced Cybersecurity
  4. 20.1 Student Organizations
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation.
  1. Fundamentals of Cybersecurity
  2. 4.11 Command Line Interface
  3. 8.2 Using Databases
  4. Florida Discovering Computer Science
  5. 3.10 Command Line Interface
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. 1.5 Personal Data Security
  4. 1.6 Cybersecurity Essentials
  5. 1.7 Common Cyber Attacks and Prevention
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; cyberbullying, illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.4 Cyber Ethics and Laws
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, Creative Commons, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal and professional use.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-related information.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. 1.5 Personal Data Security
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 1.7 Common Cyber Attacks and Prevention
  4. 2.4 Authentication Methods
  5. 4.8 Application Security
  6. 4.9 Browser Configuration
  7. Florida Discovering Computer Science
  8. 1.9 Application Security
D.1
Demonstrate creativity and innovation.
  1. Fundamentals of Cybersecurity
  2. 3.1 Create an Escape Room
  3. 9.1 The Game of Risk
D.2
Demonstrate critical thinking and problem-solving skills.
  1. Fundamentals of Cybersecurity
  2. 3.1 Create an Escape Room
  3. 7.2 Troubleshooting Methodology
  4. 9.1 The Game of Risk
D.3
Demonstrate initiative and self-direction.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Georgia Introduction to Software Technology
  7. 6.1 Communication is Key!
  8. 6.2 Building a Knowledge Base
  9. 6.3 Star in a Video!
D.4
Demonstrate integrity.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Georgia Introduction to Software Technology
  7. 6.1 Communication is Key!
  8. 6.2 Building a Knowledge Base
  9. 6.3 Star in a Video!
D.5
Demonstrate work ethic.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Georgia Introduction to Software Technology
  7. 6.1 Communication is Key!
  8. 6.2 Building a Knowledge Base
  9. 6.3 Star in a Video!
D.6
Demonstrate conflict resolution skills.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. Georgia Introduction to Software Technology
  4. 6.1 Communication is Key!
D.7
Demonstrate listening and speaking skills.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Georgia Introduction to Software Technology
  7. 6.1 Communication is Key!
  8. 6.2 Building a Knowledge Base
  9. 6.3 Star in a Video!
D.8
Demonstrate respect for diversity.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 5.9 Impact of the Internet
  4. 8.1 Data as a Resource
D.9
Demonstrate customer service orientation.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Georgia Introduction to Software Technology
  7. 6.1 Communication is Key!
  8. 6.2 Building a Knowledge Base
  9. 6.3 Star in a Video!
D.10
Demonstrate teamwork.
  1. Fundamentals of Cybersecurity
  2. 3.1 Create an Escape Room
  3. 9.1 The Game of Risk
E.1
Demonstrate global or “big picture” thinking.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 5.9 Impact of the Internet
E.2
Demonstrate career and life management skills and goal-making.
  1. Fundamentals of Cybersecurity
  2. 18.2 Alternative Learning Opportunities
  3. 18.3 Resume and Interview Prep
  4. Advanced Cybersecurity
  5. 20.2 Alternative Learning Opportunities
  6. 20.3 Resume and Interview Prep
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
  1. Fundamentals of Cybersecurity
  2. 18.2 Alternative Learning Opportunities
  3. 18.3 Resume and Interview Prep
  4. Advanced Cybersecurity
  5. 20.2 Alternative Learning Opportunities
  6. 20.3 Resume and Interview Prep
E.4
Demonstrate time and resource management skills.
  1. Fundamentals of Cybersecurity
  2. 3.1 Create an Escape Room
  3. 7.3 Building a Knowledge Base
  4. 7.4 Star in a Video!
  5. Georgia Introduction to Software Technology
  6. 6.2 Building a Knowledge Base
  7. 6.3 Star in a Video!
E.5
Demonstrates information literacy skills.
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
  3. Florida Discovering Computer Science
  4. 1.4 Can All Information Be Trusted?
E.6
Demonstrates information security skills.
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. 1.5 Personal Data Security
  4. 1.6 Cybersecurity Essentials
  5. 1.7 Common Cyber Attacks and Prevention
E.7
Demonstrates information technology skills.
  1. Fundamentals of Cybersecurity
  2. 5.1 Computers Speak Binary
  3. 6.1 Internal Components
  4. 7.2 Troubleshooting Methodology
  5. Georgia Introduction to Software Technology
  6. 4.1 Internal Components
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Georgia Introduction to Software Technology
  7. 6.1 Communication is Key!
  8. 6.2 Building a Knowledge Base
  9. 6.3 Star in a Video!
E.9
Demonstrate job-specific mathematics skills.
  1. Fundamentals of Cybersecurity
  2. 2.3 Asymmetric Encryption
  3. 5.1 Computers Speak Binary
  4. 5.2 Bits, Text, and Numbers
  5. 8.2 Using Databases
  6. 8.3 Security in Coding
E.10
Demonstrates professionalism in the workplace.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Georgia Introduction to Software Technology
  7. 6.1 Communication is Key!
  8. 6.2 Building a Knowledge Base
  9. 6.3 Star in a Video!
E.11
Demonstrate reading and writing skills.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
  5. 7.4 Star in a Video!
  6. Georgia Introduction to Software Technology
  7. 6.1 Communication is Key!
  8. 6.2 Building a Knowledge Base
  9. 6.3 Star in a Video!
E.12
Demonstrates workplace safety.
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
  3. 18.4 Personal Safety
  4. Advanced Cybersecurity
  5. 20.4 Personal Safety
F.1
Compare and contrast notational systems (e.g., binary, hexadecimal, ASCII, unicode).
  1. Fundamentals of Cybersecurity
  2. 5.1 Computers Speak Binary
  3. 5.2 Bits, Text, and Numbers
  4. 5.3 Encoding Images in Binary
F.2
Compare and contrast fundamental data types and their characteristics.
  1. Fundamentals of Cybersecurity
  2. 14.3 Variables and Types
  3. Advanced Cybersecurity
  4. 12.3 Variables and Types
  5. CompTIA Tech+ Prep
  6. 2.3 Variables and Types
  7. Florida Discovering Computer Science
  8. 4.4 Variables and Types
F.3
Illustrate the basics of computing and processing.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.6 Software and Applications
  4. Georgia Introduction to Software Technology
  5. 5.4 Software and Applications
F.4
Explain the value of data and information.
  1. Fundamentals of Cybersecurity
  2. 8.1 Data as a Resource
F.5
Compare and contrast common units of measure (e.g., bit/byte, KB, MB, GB).
  1. Fundamentals of Cybersecurity
  2. 5.1 Computers Speak Binary
F.6
Explain the troubleshooting methodology.
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
G.1
Classify common types of input/output device interfaces (e.g., networking, peripheral device, graphic device).
  1. Fundamentals of Cybersecurity
  2. 6.3 Peripheral Devices
  3. 6.5 Network Devices
  4. Georgia Introduction to Software Technology
  5. 4.2 Peripheral Devices
  6. Florida Discovering Computer Science
  7. 3.3 Peripheral Devices
  8. 3.5 Network Devices
G.2
Design efficient device placement to create optimum airflow, humidity, temperature, and dust accumulation.
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
G.3
Differentiate various computer connector/ports, (e.g., video, eSATA, thunderbolt, USB, HDMI, ethernet, RJ-45, RJ-11, audio, and power).
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
  3. Florida Discovering Computer Science
  4. 3.5 Network Devices
G.4
Set up and install peripheral devices to a laptop or PC.
  1. Fundamentals of Cybersecurity
  2. 6.3 Peripheral Devices
  3. Georgia Introduction to Software Technology
  4. 4.2 Peripheral Devices
  5. Florida Discovering Computer Science
  6. 3.3 Peripheral Devices
G.5
Identify the primary causes of electrostatic discharge and ways to mitigate the effects of ESD on electronic devices.
G.6
Identify situations where various power peripherals should be used (e.g., UPS, surge protector, power strip).
G.7
Explain the purpose of common internal computing components (e.g., motherboard/system board, RAM, CPU, storage, NIC).
  1. Fundamentals of Cybersecurity
  2. 6.1 Internal Components
  3. 6.4 Storage Options
  4. 6.5 Network Devices
  5. Georgia Introduction to Software Technology
  6. 4.1 Internal Components
  7. Florida Discovering Computer Science
  8. 3.4 Storage Options
  9. 3.5 Network Devices
G.8
Compare and contrast common Internet service types (e.g., fiber optic, cable, DSL).
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
  3. Florida Discovering Computer Science
  4. 3.6 Network Options
G.9
Compare and contrast storage types (e.g., volatile vs. non-volatile, local storage types, local network storage types, cloud storage).
  1. Fundamentals of Cybersecurity
  2. 6.4 Storage Options
  3. Florida Discovering Computer Science
  4. 3.4 Storage Options
G.10
Compare and contrast common computing devices and their purposes (e.g., mobile phones. gaming consoles, IoT (internet of things), security systems, IP (internet protocol) camera).
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.5 Laptops and Tablets
G.11
Explain basic networking concepts (e.g., DNS, LAN vs WAN, IP address, HTTP/S, POP, IMAP, SMTP, modem, switch, firewall, VOIP).
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
  3. 5.6 Routing and Packets
  4. 6.5 Network Devices
  5. Florida Discovering Computer Science
  6. 2.2 IP Addresses
  7. 2.3 Routing and Packets
  8. 3.5 Network Devices
G.12
Explain the basic features and functions of wireless devices (e.g., airdrop, unlocking/security, bluetooth pairing, wireless connection setup, mail configuration, airplane mode).
G.13
Configure and secure a basic wireless network.
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
  3. Florida Discovering Computer Science
  4. 3.6 Network Options
G.14
Describe Material Safety Data Sheets (MSDS).
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
H.1
Explain the purpose of operating systems.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
H.2
Compare and contrast common mobile and desktop operating systems and their functions and features for Android, Linux, iOS, Windows, and Chrome OS.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.3 Comparing Operating Systems
H.3
Compare and contrast components of an operating system (e.g., File systems and features, File management, Services, Processes, Drivers, Utilities, Interfaces).
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.3 Comparing Operating Systems
H.4
Explain the purpose and proper use of software (e.g., Productivity software, Collaboration Software, Business software, virtualization, open source).
  1. Fundamentals of Cybersecurity
  2. 4.6 Software and Applications
  3. Georgia Introduction to Software Technology
  4. 5.4 Software and Applications
H.5
Describe software compatibility in relationship to operating systems.
  1. Fundamentals of Cybersecurity
  2. 4.4 Compatibility
H.6
Identify common file types and their extensions (e.g., documents, audio, images, video, executables, and compression formats).
H.7
Explain methods of application architecture and delivery models (e.g., Application delivery methods, Network required, Application architecture).
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
  3. Georgia Introduction to Software Technology
  4. 5.5 Software Licenses
  5. Florida Discovering Computer Science
  6. 3.9 Software Licenses
H.8
Given a scenario, configure and use web browsers.
  1. Fundamentals of Cybersecurity
  2. 4.9 Browser Configuration
H.9
Compare and contrast general application concepts and uses.
  1. Fundamentals of Cybersecurity
  2. 4.6 Software and Applications
  3. Georgia Introduction to Software Technology
  4. 5.4 Software and Applications
I.1
Compare and contrast programming language categories.
  1. Advanced Cybersecurity
  2. 12.8 Programming Languages
  3. Florida Discovering Computer Science
  4. 4.10 Programming Languages
I.2
Use programing organizational techniques and interpret logic.
  1. Fundamentals of Cybersecurity
  2. 14.1 The Language of Computers
  3. 14.9 Flowcharts and Pseudocode
  4. Advanced Cybersecurity
  5. 12.1 The Language of Computers
  6. 12.8 Programming Languages
  7. CompTIA Tech+ Prep
  8. 2.1 The Language of Computers
  9. 2.9 Flowcharts and Pseudocode
  10. Florida Discovering Computer Science
  11. 4.1 The Language of Computers
  12. 4.10 Programming Languages
I.3
Explain the purpose and use of programming concepts.
  1. Advanced Cybersecurity
  2. 12.8 Programming Languages
  3. Florida Discovering Computer Science
  4. 4.10 Programming Languages
J.1
Explain database concepts and the purpose of a database.
  1. Fundamentals of Cybersecurity
  2. 13.9 Data Security Items
  3. Advanced Cybersecurity
  4. 11.1 Databases and Cybersecurity
  5. CompTIA Tech+ Prep
  6. 1.9 Data Security Items
J.2
Compare and contrast various database structures (e.g., structured vs. semi-structured vs. non-structured, relational databases, non-relational databases).
  1. Fundamentals of Cybersecurity
  2. 13.9 Data Security Items
  3. CompTIA Tech+ Prep
  4. 1.9 Data Security Items
J.3
Summarize methods used to interface with databases (e.g., relational methods such as data manipulation or data definition, database access methods, export/import).
  1. Fundamentals of Cybersecurity
  2. 13.9 Data Security Items
  3. CompTIA Tech+ Prep
  4. 1.9 Data Security Items
K.1
Research and discuss common security threats found in IT.
  1. Fundamentals of Cybersecurity
  2. 1.7 Common Cyber Attacks and Prevention
K.2
Summarize confidentiality, integrity and availability concerns (e.g., confidentiality, integrity, availability concerns).
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
K.3
Explain methods to secure devices and best practices (e.g., antivirus software, enabling passwords, validating legitimate sources, removal of malicious software).
  1. Fundamentals of Cybersecurity
  2. 1.7 Common Cyber Attacks and Prevention
K.4
Summarize methods and concepts used in IT behavioral security concepts. a. Expectations of privacy when using various computing applications or devices b. Acceptable Use Policy and Procedures c. Handlings of confidential information
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
K.5
Compare and contrast authentication, non-repudiation, authorization, and accounting concepts (e.g., biometrics, video, digital signatures).
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
K.6
Explain password best practices (e.g., length, complexity).
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
K.7
Explain common uses of encryption (e.g., HTTPS, VPN).
  1. Fundamentals of Cybersecurity
  2. 2.2 Symmetric Encryption
  3. 2.4 Authentication Methods
K.8
Explain business continuity concepts (e.g., disaster recovery, redundancy, data backup, contingency plans).
  1. Fundamentals of Cybersecurity
  2. 8.7 Risky Business
L.1
Research the field of emerging technologies.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
L.2
Identify the following emerging technologies and their purpose (e.g., AR/VR, Artificial Intelligence, blockchain, chatbots, cloud computing, dynamic network analysis, gesture￾based interaction, marketing automation, podcasting, predictive analytic, predictive sales, streaming media (audio/video), telepresence ).
  1. Florida Discovering Computer Science
  2. 2.5 Emerging Technologies and Society
L.3
Research and present an emerging technology to solve a real-world problem.
  1. Florida Discovering Computer Science
  2. 2.5 Emerging Technologies and Society
M.1
Apply strategies for identifying routine hardware and software problems current to everyday life.
  1. Fundamentals of Cybersecurity
  2. 7.2 Troubleshooting Methodology
M.2
Identify compatibility issues and describe operational problems caused by hardware errors.
M.3
Explain how technology can be used to solve problems.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
M.4
Explain the software development process used to solve problems.
  1. Georgia Introduction to Software Technology
  2. 5.6 Software Development
M.5
Explore commonly used documentation tools for design specifications (e.g., flowcharts, visual and textual storyboards).
  1. Georgia Introduction to Software Technology
  2. 5.6 Software Development
N.1
Compare and contrast careers in IT/IS with their education, training requirements, industry certifications and salary ranges.
  1. Fundamentals of Cybersecurity
  2. 10.1 After Fundamentals of Cybersecurity
N.2
Describe how computing enhances other career fields.
N.3
Connect with colleges and companies by using various networking platforms.