1.01 |
Describe and use current and emerging computer technology and software to perform personal and business related tasks. |
Lessons
|
1.02 |
Describe the types of communications and networking systems used in workplace environments. |
Lessons
|
1.03 |
Locate and use software application reference materials such as on-line help, vendor bulletin boards, tutorials, and manuals. |
Lessons
|
1.04 |
Troubleshoot problems with computer hardware peripherals. |
Lessons
|
1.05 |
Describe ethical, privacy, and security issues and problems associated with computers and information systems. |
Lessons
|
1.06 |
Demonstrate proficiency in using the basic features of GUI browsers. |
Lessons
|
1.07 |
Configure computer systems to protect against various low-level attacks. |
Lessons
|
2.01 |
Identify the most common computer operating systems. |
Lessons
|
2.02 |
Describe and use industry accepted file naming conventions; particularly in NTFS, ext4, FAT, and ReFS file systems. |
Lessons
|
2.03 |
Demonstrate proficiency with file management tasks (e.g., folder creation, file creation, backup, copy, delete, open, save). |
Lessons
|
2.04 |
Demonstrate a working knowledge of standard file formats. |
Lessons
|
2.05 |
Compare and contrast various operating systems (e.g., Android iOS, Windows, Mac, and Linux). |
Lessons
|
2.06 |
Differentiate between different operating systems and applications. |
Lessons
|
2.07 |
Compare and contrast open source and proprietary software. |
Lessons
|
2.08 |
Explain how system utilities are used to maintain computer performance. |
Lessons
|
2.09 |
Evaluate criteria for selecting an operating system. |
Lessons
|
2.10 |
Configure various operating systems from their default settings to low, medium, and high security level settings. |
Lessons
|
3.01 |
Explain how information technology impacts the operation and management of business and society. |
Lessons
|
3.02 |
Identify and describe the various ways of segmenting the IT industry (e.g., hardware vs. software, server vs. client, business vs. entertainment, stable vs. mobile). |
Lessons
|
3.03 |
Describe how digital technologies (social media) are changing both work and personal lifestyles. |
Lessons
|
3.04 |
Demonstrate an understanding of configuring social media used for business to meet various business requirements. |
Lessons
|
3.05 |
Demonstrate an awareness of Cloud based infrastructure including SaaS (Software as a Service) and their impact on the IT industry. |
Lessons
|
4.01 |
Explain software hierarchy and its impact on microprocessors as it relates to the limitation and/or increase in security. |
Lessons
|
4.02 |
Explain the need for, and use of, peripherals and how they can compromise security. |
Lessons
|
4.03 |
Demonstrate proficiency installing and using plug-and-play peripherals and explain their associated security risks. |
Lessons
|
4.04 |
Identify the basic concepts of computer maintenance and upgrades and their relevance as it relates to security. |
Lessons
|
5.01 |
Explain the need for and use of compilers. |
Lessons
|
5.02 |
Identify the three types of programming design approaches (e.g., top-down, structured, object-oriented). |
Lessons
|
5.03 |
Compare the various types or classes of programming languages (e.g., compiled, interpretive). |
Lessons
|
5.04 |
Differentiate among source code, machine code, interpreters, and compilers. |
Lessons
|
5.05 |
Characterize the major categories of programming languages and how they are used. |
Lessons
|
5.06 |
Create a model flowchart for a computer program using software applications like RAPTOR or MS VISIO. |
Lessons
|
5.07 |
Describe the stages in the software development life cycle and explain how to successfully implement them. |
Lessons
|
5.08 |
Compare security and vulnerabilities of various programming languages. |
Lessons
|
6.01 |
Compare and contrast emerging technologies and describe how they impact the security of business in the global marketplace (e.g., wireless, wireless web, cell phones, portables/handhelds, vehicles, home networks, peer-to-peer, IoT, embedded systems, AI). |
Lessons
|
6.02 |
Adhere to published best practices for protecting personal identifiable information when using the Internet. |
Lessons
|
6.03 |
Identify trends related to the secure use of information technology in people’s personal and professional lives. |
Lessons
|
6.04 |
Characterize how the rapid pace of change in information technology impacts our society’s ability to keep the appropriate level of security. |
Lessons
|
7.01 |
Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software. |
Lessons
|
7.02 |
Describe the purpose of the OSI model and each of its layers. |
Lessons
|
7.03 |
Explain specific functions belonging to each OSI model layer. |
Lessons
|
7.04 |
Understand how two network nodes communicate through the OSI model. |
Lessons
|
7.05 |
Discuss the structure and purpose of data packets and frames. |
Lessons
|
7.06 |
Describe the two types of addressing covered by the OSI model. |
Lessons
|
8.01 |
Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software. |
Lessons
|
8.02 |
Describe the purpose of the TCP/IP model and each of its layers. |
Lessons
|
8.03 |
Explain specific functions belonging to each TCP/IP model layer. |
Lessons
|
8.04 |
Understand how two network nodes communicate through the TCP/IP model. |
Lessons
|
8.05 |
Describe the two types of addressing covered by the TCP/IP model. |
Lessons
|
9.01 |
Identify the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling). |
Lessons
|
9.02 |
Use common computer and programming terminology. |
Lessons
|
10.01 |
Identify and describe web terminology. |
Lessons
|
10.02 |
Define Universal Resource Locators (URLs) and associated protocols (e.g., http, ftp, telnet, mailto) and their associated secure protocols (e.g. https, ftps, ssh). |
Lessons
|
10.03 |
Compare and contrast the types of Internet domains (e.g., .com, .org, .edu, .gov, .net, .mil). |
Lessons
|
10.04 |
Demonstrate proficiency using search engines, including Boolean search strategies. |
Lessons
|
10.05 |
Demonstrate proficiency using various secure web tools (e.g., downloading of files, transfer of files, SSH, PDF). |
Lessons
|
10.06 |
Compare and contrast the roles of web servers and web browsers. |
Lessons
|
10.07 |
Compare and contrast MS Web Servers and Linux Web Servers. |
Lessons
|
11.01 |
Describe cyber-bullying and its impact on perpetrators and victims. |
Lessons
|
11.02 |
Differentiate between viruses and malware, specifically their sources, ploys, and impact on personal privacy and computer operation, and ways to avoid infection. |
Lessons
|
11.03 |
Describe risks associated with sexting, related legal issues, social engineering aspects, prevention methods, and reporting of offenses. |
Lessons
|
11.04 |
Describe the risks associated with online gaming and ways to reduce these risks. |
Lessons
|
11.05 |
Describe the intellectual property rights, ethics and legalities of downloading music or videos from the Internet. |
Lessons
|
11.06 |
Describe various risks associated with social networking sites and ways to reduce these risks. |
Lessons
|
11.07 |
Describe the risks associated with various conferencing programs and ways to reduce these risks. |
Lessons
|
11.08 |
Adhere to cyber safety practices with regard to conducting Internet searches, email, chat rooms, and other social network websites. |
Lessons
|
12.01 |
Compare and contrast the appropriate use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music). |
Lessons
|
12.02 |
Demonstrate proficiency in the use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music). |
Lessons
|
13.01 |
Describe email capabilities and functions. |
Lessons
|
13.02 |
Identify components of an email message. |
Lessons
|
13.03 |
Identify the components of an email address. |
Lessons
|
13.04 |
Identify when to use different email options. |
Lessons
|
13.05 |
Attach a file to an email message. |
Lessons
|
13.06 |
Forward an email message. |
Lessons
|
13.07 |
Use an address book if an address book is available via the school’s Outlook server for the student to use. |
Lessons
|
13.08 |
Reply to an email message. |
Lessons
|
13.09 |
Use the Internet to perform email activities. |
Lessons
|
13.10 |
Identify the appropriate use of email and demonstrate related email etiquette. |
Lessons
|
13.11 |
Recognize a fraudulent email and deal with it appropriately. |
Lessons
|
13.12 |
Identify common problems associated with widespread use of email. |
Lessons
|
13.13 |
Create folders to organize email. |
Lessons
|
14.01 |
Produce a presentation that includes music, animation, and digital photography and present it using appropriate technology. |
Lessons
|
14.02 |
Using presentation software, create a multimedia presentation that incorporates shot and edited video, animation, music, narration and adheres to good design principles, use of transitions, and effective message conveyance. |
Lessons
|
14.03 |
Demonstrate knowledge of the roles and responsibilities of a multimedia production team (e.g., project manager, creative or design director, content experts, writers, graphic designers, animators, sound designers, videographer, interface designers/programmers). |
Lessons
|
14.04 |
Collaborate with team members to plan, edit, evaluate, and present a multimedia presentation where individuals on the team function in specific production roles. |
Lessons
|
14.05 |
Create a self-running presentation with synchronized audio, convert presentation slides (e.g., PowerPoint) into streaming ASF files for use on the web. |
Lessons
|
15.01 |
Determine work priorities, the audience, project budgets, project specifications, and the production schedule. |
Lessons
|
15.02 |
Evaluate and select appropriate software packages and multimedia tools to complete assigned tasks. |
Lessons
|
15.03 |
Present and defend design projects. |
Lessons
|
16.01 |
Locate, comprehend and evaluate key elements of oral and written information. |
Lessons
|
16.02 |
Draft, revise, and edit written business technology documents using correct grammar, punctuation and vocabulary (e.g., Business Continuity and Disaster Recovery plan, Incident Response plan, IT reports and procedures manuals). |
Lessons
|
16.03 |
Present information formally and informally to instruct others on Computer Security Awareness and Victim Prevention. |
Lessons
|
17.01 |
Demonstrate knowledge of arithmetic operations. |
Lessons
|
17.02 |
Construct charts/tables/graphs using functions and data and relate it to IT risk and business continuity. |
Lessons
|
17.03 |
Demonstrate an understanding of binary numbers and ASCII characters. |
Lessons
|
18.01 |
Discuss the role of creativity in constructing scientific questions, methods and explanations. |
Lessons
|
18.02 |
Formulate scientifically investigable questions, construct investigations, collect and evaluate data, and develop scientific recommendations based on findings. |
Lessons
|