Please enable JavaScript to use CodeHS

Standards Mapping

for CompTIA Tech+

31

Standards in this Framework

31

Standards Mapped

100%

Mapped to Course

Standard Lessons
1.1
Explain the basics of computing.
  1. 6.1 Internal Components
  2. 6.3 Peripheral Devices
  3. 6.4 Storage Options
1.2
Identify notational systems.
  1. 5.1 Computers Speak Binary
  2. 5.2 Bits, Text, and Numbers
  3. 5.3 Encoding Images in Binary
  4. 13.6 IT Concepts Items
1.3
Compare and contrast common units of measure.
  1. 5.2 Bits, Text, and Numbers
  2. 6.5 Network Devices
1.4
Explain the troubleshooting methodology.
  1. 7.2 Troubleshooting Methodology
2.1
Explain common computing devices and their purposes.
  1. 1.6 Cybersecurity Essentials
  2. 4.4 Compatibility
  3. 4.5 Laptops and Tablets
  4. 13.5 System Administration Items
2.2
Explain the purpose of common internal computing components.
  1. 6.1 Internal Components
  2. 6.4 Storage Options
  3. 6.5 Network Devices
2.3
Compare and contrast storage types.
  1. 6.4 Storage Options
2.4
Given a scenario, install and configure common peripheral devices.
  1. 6.3 Peripheral Devices
2.5
Compare and contrast common types of input/output device interfaces.
  1. 6.3 Peripheral Devices
  2. 6.7 Network Options
  3. 13.8 IT Infrastructure Items
2.6
Compare and contrast virtualization and cloud technologies.
  1. 4.1 Operating Systems
  2. 13.7 Cloud Computing
2.7
Compare and contrast common internet service types.
  1. 6.7 Network Options
2.8
Identify basic networking concepts.
  1. 6.5 Network Devices
  2. 6.7 Network Options
2.9
Explain the basic capabilities of a small wireless network.
  1. 6.7 Network Options
3.1
Identify components of an OS.
  1. 4.1 Operating Systems
  2. 4.3 Comparing Operating Systems
3.2
Explain the purpose of operating systems.
  1. 4.1 Operating Systems
3.3
Explain the purpose and proper use of software.
  1. 4.6 Software and Applications
  2. 4.7 Software Licenses
3.4
Given a scenario, configure and use web browser features.
  1. 1.5 Personal Data Security
  2. 4.9 Browser Configuration
  3. 13.5 System Administration Items
3.5
Identify common uses of artificial intelligence (AI).
  1. 1.3 Can All Information Be Trusted?
  2. 13.2 Introduction to Artificial Intelligence
  3. 13.3 Artificial Intelligence and Machine Learning
4.1
Compare and contrast programming language categories.
  1. 8.3 Security in Coding
  2. 14.1 The Language of Computers
4.2
Identify fundamental data types and their characteristics.
  1. 14.1 The Language of Computers
  2. 14.3 Variables and Types
  3. 14.12 Lists (Arrays) and Objects
4.3
Explain the purpose and use of programming concepts.
  1. 14.3 Variables and Types
  2. 14.10 Functions
  3. 14.11 String Methods
  4. 14.12 Lists (Arrays) and Objects
4.4
Identify programming organizational techniques and logic concepts.
  1. 14.1 The Language of Computers
  2. 14.5 Comments
  3. 14.6 Branching: If Statements
  4. 14.7 Looping: While Loops
  5. 14.8 Looping: For Loops
  6. 14.9 Flowcharts and Pseudocode
  7. 14.11 String Methods
  8. 14.12 Lists (Arrays) and Objects
5.1
Explain the value of data and information.
  1. 8.1 Data as a Resource
5.2
Explain database concepts and the purpose of a database.
  1. 8.2 Using Databases
  2. 13.9 Data Security Items
5.3
Compare and contrast various database structures.
  1. 8.2 Using Databases
  2. 13.9 Data Security Items
5.4
Explain basic data backup concepts.
  1. 4.8 Application Security
6.1
Explain fundamental security concepts and frameworks.
  1. 1.5 Personal Data Security
  2. 1.6 Cybersecurity Essentials
6.2
Explain methods to secure devices and security best practices.
  1. 1.5 Personal Data Security
  2. 1.6 Cybersecurity Essentials
  3. 1.7 Common Cyber Attacks and Prevention
  4. 8.5 Environmental Controls
6.3
Explain password best practices.
  1. 1.7 Common Cyber Attacks and Prevention
  2. 13.4 Cybersecurity and You Items
6.4
Identify common use cases for encryption.
  1. 2.1 Cryptography: Then, Now, and Future
  2. 2.3 Asymmetric Encryption
  3. 2.4 Authentication Methods
  4. 8.1 Data as a Resource
  5. 13.5 System Administration Items
6.5
Given a scenario, configure security settings for a small wireless network.
  1. 6.7 Network Options
  2. 13.8 IT Infrastructure Items