Please enable JavaScript to use CodeHS

Standards Mapping

for Texas Web Communications

37

Standards in this Framework

22

Standards Mapped

59%

Mapped to Course

Standard Lessons
130.315.1A
(A) demonstrate proficiency in the use of local and online collaboration;
  1. 5.1 Project: Classic Cipher Newscast
130.315.1B
(B) create websites using web editors or web authoring programs;
130.315.1C
(C) evaluate the accessibility and usability of original websites; and
130.315.1D
(D) conceptualize possible technologies based on current technical trends.
  1. 1.3 Impact of Cybersecurity
  2. 7.8 Impact of the Internet
130.315.2A
(A) analyze and implement the proper and acceptable use of digital/virtual communications technologies such as instant messaging (IM), chat, email, and social networking;
  1. 2.3 Internet Safety
130.315.2B
(B) define and implement the acquisition, sharing, and use of files taking into consideration primary ownership and copyright;
  1. 2.6 Creative Credit & Copyright
  2. 3.1 Project: Public Service Announcement
130.315.2C
(C) apply decisions regarding the selection, acquisition, and sharing of uniform resource locators (URLs) used in research, taking into consideration their quality, appropriateness, and effectiveness; and
  1. 2.5 Information Literacy
  2. 7.7 Viewing a Webpage
130.315.2D
(D) solve problems using critical-thinking strategies.
  1. 4.4 Basic Crypto Systems: Caesar Cipher
  2. 4.5 Basic Crypto Systems: Cracking Caesar
  3. 4.6 Basic Crypto Systems: Vigenere Cipher
  4. 4.9 Hash Function Development
  5. 6.7 Basic Querying in SQL
  6. 6.8 Filtering Queries in SQL
  7. 8.1 Project: Secure the Company's Network
  8. 9.1 Final Course Project
130.315.3A
(A) verify the accuracy, validity, and currency of acquired information;
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
130.315.3B
(B) conduct effective searches using Boolean operators;
  1. 2.3 Internet Safety
130.315.3C
(C) acquire and use appropriate vocabulary terms;
  1. 3.1 Project: Public Service Announcement
130.315.3D
(D) cite sources appropriately using established methods;
  1. 2.6 Creative Credit & Copyright
130.315.3E
(E) model ethical and legal acquisition of digital information following guidelines in the student code of conduct, including plagiarism and copyright laws;
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
130.315.3F
(F) identify and discuss emerging technologies and their impact;
  1. 1.3 Impact of Cybersecurity
  2. 7.8 Impact of the Internet
130.315.3G
(G) understand Internet history and structure and how they impact current use; and
  1. 7.1 Introduction to the Internet
  2. 7.7 Viewing a Webpage
  3. 7.8 Impact of the Internet
130.315.3H
(H) demonstrate appropriate use of grammar, spelling, and vocabulary when creating original work.
130.315.4A
(A) demonstrate the transfer and adaptation of knowledge through the creation of original work;
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
  4. 9.1 Final Course Project
130.315.4B
(B) evaluate and implement security measures such as firewalls and Hypertext Transfer Protocol Secure (HTTPS) to protect original work;
  1. 7.6 Packets & Protocols
  2. 7.10 Securing a Network
  3. 8.1 Project: Secure the Company's Network
  4. 9.1 Final Course Project
130.315.4C
(C) analyze and follow timelines needed to create, edit, and present original work;
  1. 3.1 Project: Public Service Announcement
  2. 5.1 Project: Classic Cipher Newscast
  3. 8.1 Project: Secure the Company's Network
  4. 9.1 Final Course Project
130.315.4D
(D) verify current licensing issues for software being used for the creation of original work;
130.315.4E
(E) identify and evaluate the design and functionality of web pages using rubrics;
130.315.4F
(F) optimize web information for fast download such as dial-up and high speed Internet and mobile devices; and
130.315.4G
(G) evaluate original work through self-, peer, and professional review of websites.
130.315.5A
(A) engage in online activities that follow appropriate behavioral, communication, and privacy guidelines, including ethics, personal security, and verbiage determined by the intended audience;
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
  4. 2.4 Privacy & Security
  5. 2.7 Hacking Ethics
130.315.5B
(B) understand the negative impact of inappropriate technology use, including online bullying and harassment;
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
  4. 2.4 Privacy & Security
130.315.5C
(C) implement online security guidelines, including identity protection, limited personal information sharing, and password protection of a secure website; and
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
  4. 2.4 Privacy & Security
  5. 7.9 Network Attacks
  6. 7.10 Securing a Network
130.315.5D
(D) advocate and practice safe, legal, and responsible use of information and technology.
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
  4. 2.5 Information Literacy
  5. 2.6 Creative Credit & Copyright
  6. 3.1 Project: Public Service Announcement
  7. 8.1 Project: Secure the Company's Network
  8. 9.1 Final Course Project
130.315.6A
(A) demonstrate knowledge of hardware such as scanners, cameras, printers, video cameras, and external hard drives;
130.315.6B
(B) identify the parts of a computer and explain their functions;
130.315.6C
(C) summarize the need, functionality, and use of servers;
  1. 6.4 Clients and Servers
130.315.6D
(D) identify the advantages and disadvantages of running a personal web server versus using a web server provider;
130.315.6E
(E) differentiate and appropriately use various input, processing, output, and primary/secondary storage devices;
130.315.6F
(F) create and implement universally accessible documents;
130.315.6G
(G) analyze bandwidth issues as they relate to audience, servers, connectivity, and cost;
  1. 6.4 Clients and Servers
  2. 7.2 Internet Hardware and Sending Information
130.315.6H
(H) establish a folder/directory hierarchy for storage of a web page and its related or linked files;
130.315.6I
(I) follow file and folder naming conventions, including spacing, special characters, and capitalization; and
130.315.6J
(J) identify basic design principles when creating a website.