Please enable JavaScript to use CodeHS

Standards Framework

for California Information Support and Services Pathway

40

Standards in this Framework

Standard Description
A1.1 Describe how technology is integrated into business processes.
A1.2 Identify common organizational, technical, and financial risks associated with the implementation and use of information and communication systems.
A1.3 Model business processes using tools such as organization charts, flowcharts, and timelines.
A1.4 Analyze and design business processes in a cycle of continual improvement.
A2.1 Identify and list the criteria and processes for evaluating the functions of information systems.
A2.2 Investigate, evaluate, select, and use major types of software, services, and vendors.
A2.3 Install software and setup hardware.
A2.4 Define and use appropriate naming conventions and file management strategies.
A3.1 Identify and apply multiple ways to transfer information and resources (e.g., text, data, audio, video, still images) between software programs and systems.
A3.2 Validate and cite Internet resources.
A3.3 Recognize where processes are running in a networked environment (e.g., client access, remote access).
A3.4 Identify and describe the layered nature of computing and networking such as the Open Systems Interconnect (OSI) model.
A3.5 Use multiple online search techniques and resources to acquire information.
A3.6 Describe and contrast the differences between various Internet protocols: hypertext transfer protocol (http), hypertext transfer protocol secure (https), file transfer protocol (ftp), simple mail transfer protocol (smtp).
A4.1 Use different systems and associated utilities to perform such functions as file management, backup and recovery, and execution of programs.
A4.2 Use a command line interface.
A4.3 Automate common tasks using macros or scripting.
A4.4 Evaluate the systems-development life cycle and develop appropriate plans to maintain a given system after assessing its impact on resources and total cost of ownership (TCO).
A5.1 Follow laws, regulatory guidelines, policies, and procedures to ensure the security and integrity of information systems.
A5.2 Identify potential attack vectors and security threats.
A5.3 Take preventative measures to reduce security risks (e.g., strong passwords, avoid social engineering ploys, limit account permissions).
A5.4 Use security software and hardware to protect systems from attack and alert of potential threats, anti-malware software, and firewalls.
A6.1 Use available resources to identify and resolve problems using knowledge bases, forums, and manuals.
A6.2 Use a logical and structured approach to isolate and identify the source of problems and to resolve problems.
A6.3 Use specific problem solving strategies appropriate to troubleshooting, eliminating possibilities, or guess and check.
A6.4 Evaluate support needs for different data and systems configurations.
A6.5 Evaluate solution methods recognizing the trade-offs of troubleshooting vs. reloading, reimaging, or restoring to factory defaults using a sandbox environment.
A6.6 Distinguish types of symptoms and which component’s issue could exhibit those symptoms: the user, hardware, network, or software.
A6.7 Diagram the underlying processes of a system that are likely involved in a problem.
A7.1 Recognize the scope of duties ICT support staff have and tiered levels of support.
A7.2 Describe and apply the principles of a customer-oriented service approach to supporting users.
A7.3 Use technical writing and communication skills to work effectively with diverse groups of people, including users with less technical abilities.
A7.4 Document technical support provided such as using a ticketing system.
A7.5 Train users to assist them in being self-supporting: formal classes, one-on-one interactions, and process and how-to guides.
A8.1 Develop the purpose and scope of a project.
A8.2 Acquire, use, and manage necessary internal and external resources when supporting various organizational systems.
A8.3 Use various tools to manage projects involving the development of information and communication systems.
A8.4 Analyze business problems by using functional and cost-benefit perspectives.
A8.5 Design, develop, implement, and monitor a project by creating and integrating technologies.
A8.6 Use a systematic method of continual improvement; plan, do, check, act (PDCA), total quality (TQ), or Six Sigma.