Standards in this Framework
Standard | Description |
---|---|
1.01 | Describe and use current and emerging computer technology and software to perform personal and business related tasks. |
1.02 | Describe the types of communications and networking systems used in workplace environments. |
1.03 | Locate and use software application reference materials such as on-line help, vendor bulletin boards, tutorials, and manuals. |
1.04 | Troubleshoot problems with computer hardware peripherals. |
1.05 | Describe ethical, privacy, and security issues and problems associated with computers and information systems. |
1.06 | Demonstrate proficiency in using the basic features of GUI browsers. |
1.07 | Configure computer systems to protect against various low-level attacks. |
2.01 | Identify the most common computer operating systems. |
2.02 | Describe and use industry accepted file naming conventions; particularly in NTFS, ext4, FAT, and ReFS file systems. |
2.03 | Demonstrate proficiency with file management tasks (e.g., folder creation, file creation, backup, copy, delete, open, save). |
2.04 | Demonstrate a working knowledge of standard file formats. |
2.05 | Compare and contrast various operating systems (e.g., Android iOS, Windows, Mac, and Linux). |
2.06 | Differentiate between different operating systems and applications. |
2.07 | Compare and contrast open source and proprietary software. |
2.08 | Explain how system utilities are used to maintain computer performance. |
2.09 | Evaluate criteria for selecting an operating system. |
2.10 | Configure various operating systems from their default settings to low, medium, and high security level settings. |
3.01 | Explain how information technology impacts the operation and management of business and society. |
3.02 | Identify and describe the various ways of segmenting the IT industry (e.g., hardware vs. software, server vs. client, business vs. entertainment, stable vs. mobile). |
3.03 | Describe how digital technologies (social media) are changing both work and personal lifestyles. |
3.04 | Demonstrate an understanding of configuring social media used for business to meet various business requirements. |
3.05 | Demonstrate an awareness of Cloud based infrastructure including SaaS (Software as a Service) and their impact on the IT industry. |
4.01 | Explain software hierarchy and its impact on microprocessors as it relates to the limitation and/or increase in security. |
4.02 | Explain the need for, and use of, peripherals and how they can compromise security. |
4.03 | Demonstrate proficiency installing and using plug-and-play peripherals and explain their associated security risks. |
4.04 | Identify the basic concepts of computer maintenance and upgrades and their relevance as it relates to security. |
5.01 | Explain the need for and use of compilers. |
5.02 | Identify the three types of programming design approaches (e.g., top-down, structured, object-oriented). |
5.03 | Compare the various types or classes of programming languages (e.g., compiled, interpretive). |
5.04 | Differentiate among source code, machine code, interpreters, and compilers. |
5.05 | Characterize the major categories of programming languages and how they are used. |
5.06 | Create a model flowchart for a computer program using software applications like RAPTOR or MS VISIO. |
5.07 | Describe the stages in the software development life cycle and explain how to successfully implement them. |
5.08 | Compare security and vulnerabilities of various programming languages. |
6.01 | Compare and contrast emerging technologies and describe how they impact the security of business in the global marketplace (e.g., wireless, wireless web, cell phones, portables/handhelds, vehicles, home networks, peer-to-peer, IoT, embedded systems, AI). |
6.02 | Adhere to published best practices for protecting personal identifiable information when using the Internet. |
6.03 | Identify trends related to the secure use of information technology in people’s personal and professional lives. |
6.04 | Characterize how the rapid pace of change in information technology impacts our society’s ability to keep the appropriate level of security. |
7.01 | Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software. |
7.02 | Describe the purpose of the OSI model and each of its layers. |
7.03 | Explain specific functions belonging to each OSI model layer. |
7.04 | Understand how two network nodes communicate through the OSI model. |
7.05 | Discuss the structure and purpose of data packets and frames. |
7.06 | Describe the two types of addressing covered by the OSI model. |
8.01 | Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software. |
8.02 | Describe the purpose of the TCP/IP model and each of its layers. |
8.03 | Explain specific functions belonging to each TCP/IP model layer. |
8.04 | Understand how two network nodes communicate through the TCP/IP model. |
8.05 | Describe the two types of addressing covered by the TCP/IP model. |
9.01 | Identify the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling). |
9.02 | Use common computer and programming terminology. |
10.01 | Identify and describe web terminology. |
10.02 | Define Universal Resource Locators (URLs) and associated protocols (e.g., http, ftp, telnet, mailto) and their associated secure protocols (e.g. https, ftps, ssh). |
10.03 | Compare and contrast the types of Internet domains (e.g., .com, .org, .edu, .gov, .net, .mil). |
10.04 | Demonstrate proficiency using search engines, including Boolean search strategies. |
10.05 | Demonstrate proficiency using various secure web tools (e.g., downloading of files, transfer of files, SSH, PDF). |
10.06 | Compare and contrast the roles of web servers and web browsers. |
10.07 | Compare and contrast MS Web Servers and Linux Web Servers. |
11.01 | Describe cyber-bullying and its impact on perpetrators and victims. |
11.02 | Differentiate between viruses and malware, specifically their sources, ploys, and impact on personal privacy and computer operation, and ways to avoid infection. |
11.03 | Describe risks associated with sexting, related legal issues, social engineering aspects, prevention methods, and reporting of offenses. |
11.04 | Describe the risks associated with online gaming and ways to reduce these risks. |
11.05 | Describe the intellectual property rights, ethics and legalities of downloading music or videos from the Internet. |
11.06 | Describe various risks associated with social networking sites and ways to reduce these risks. |
11.07 | Describe the risks associated with various conferencing programs and ways to reduce these risks. |
11.08 | Adhere to cyber safety practices with regard to conducting Internet searches, email, chat rooms, and other social network websites. |
12.01 | Compare and contrast the appropriate use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music). |
12.02 | Demonstrate proficiency in the use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music). |
13.01 | Describe email capabilities and functions. |
13.02 | Identify components of an email message. |
13.03 | Identify the components of an email address. |
13.04 | Identify when to use different email options. |
13.05 | Attach a file to an email message. |
13.06 | Forward an email message. |
13.07 | Use an address book if an address book is available via the school’s Outlook server for the student to use. |
13.08 | Reply to an email message. |
13.09 | Use the Internet to perform email activities. |
13.10 | Identify the appropriate use of email and demonstrate related email etiquette. |
13.11 | Recognize a fraudulent email and deal with it appropriately. |
13.12 | Identify common problems associated with widespread use of email. |
13.13 | Create folders to organize email. |
14.01 | Produce a presentation that includes music, animation, and digital photography and present it using appropriate technology. |
14.02 | Using presentation software, create a multimedia presentation that incorporates shot and edited video, animation, music, narration and adheres to good design principles, use of transitions, and effective message conveyance. |
14.03 | Demonstrate knowledge of the roles and responsibilities of a multimedia production team (e.g., project manager, creative or design director, content experts, writers, graphic designers, animators, sound designers, videographer, interface designers/programmers). |
14.04 | Collaborate with team members to plan, edit, evaluate, and present a multimedia presentation where individuals on the team function in specific production roles. |
14.05 | Create a self-running presentation with synchronized audio, convert presentation slides (e.g., PowerPoint) into streaming ASF files for use on the web. |
15.01 | Determine work priorities, the audience, project budgets, project specifications, and the production schedule. |
15.02 | Evaluate and select appropriate software packages and multimedia tools to complete assigned tasks. |
15.03 | Present and defend design projects. |
16.01 | Locate, comprehend and evaluate key elements of oral and written information. |
16.02 | Draft, revise, and edit written business technology documents using correct grammar, punctuation and vocabulary (e.g., Business Continuity and Disaster Recovery plan, Incident Response plan, IT reports and procedures manuals). |
16.03 | Present information formally and informally to instruct others on Computer Security Awareness and Victim Prevention. |
17.01 | Demonstrate knowledge of arithmetic operations. |
17.02 | Construct charts/tables/graphs using functions and data and relate it to IT risk and business continuity. |
17.03 | Demonstrate an understanding of binary numbers and ASCII characters. |
18.01 | Discuss the role of creativity in constructing scientific questions, methods and explanations. |
18.02 | Formulate scientifically investigable questions, construct investigations, collect and evaluate data, and develop scientific recommendations based on findings. |