Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
16.01
Describe and use current and emerging computer technology and software to perform personal and business related tasks. |
|
16.02
Describe the types of communications and networking systems used in workplace environments. |
|
16.03
Locate and use software application reference materials such as on-line help, vendor bulletin boards, tutorials, and manuals. |
|
16.04
Troubleshoot problems with computer hardware peripherals. |
|
16.05
Describe ethical, privacy, and security issues and problems associated with computers and information systems. |
|
16.06
Demonstrate proficiency in using the basic features of GUI browsers. |
|
16.07
Configure computer systems to protect against various low-level attacks. |
|
17.01
Identify the most common computer operating systems. |
|
17.02
Describe and use industry accepted file naming conventions; particularly in NTFS, ext4, FAT, and ReFS file systems. |
|
17.03
Demonstrate proficiency with file management tasks (e.g., folder creation, file creation, backup, copy, delete, open, save). |
|
17.04
Demonstrate a working knowledge of standard file formats. |
|
17.05
Compare and contrast various operating systems (e.g., Android iOS, Windows, Mac, and Linux). |
|
17.06
Differentiate between different operating systems and applications. |
|
17.07
Compare and contrast open source and proprietary software. |
|
17.08
Explain how system utilities are used to maintain computer performance. |
|
17.09
Evaluate criteria for selecting an operating system. |
|
17.10
Configure various operating systems from their default settings to low, medium, and high security level settings. |
|
18.01
Explain how information technology impacts the operation and management of business and society. |
|
18.02
Identify and describe the various ways of segmenting the IT industry (e.g., hardware vs. software, server vs. client, business vs. entertainment, stable vs. mobile). |
|
18.03
Describe how digital technologies (social media) are changing both work and personal lifestyles. |
|
18.04
Demonstrate an understanding of configuring social media used for business to meet various business requirements. |
|
18.05
Demonstrate an awareness of Cloud based infrastructure including SaaS (Software as a Service) and their impact on the IT industry. |
|
19.01
Explain software hierarchy and its impact on microprocessors as it relates to the limitation and/or increase in security. |
|
19.02
Explain the need for, and use of, peripherals and how they can compromise security. |
|
19.03
Demonstrate proficiency installing and using plug-and-play peripherals and explain their associated security risks. |
|
19.04
Identify the basic concepts of computer maintenance and upgrades and their relevance as it relates to security. |
|
20.01
Explain the need for and use of compilers. |
|
20.02
Identify the three types of programming design approaches (e.g., top-down, structured, object-oriented). |
|
20.03
Compare the various types or classes of programming languages (e.g., compiled, interpretive). |
|
20.04
Differentiate among source code, machine code, interpreters, and compilers. |
|
20.05
Characterize the major categories of programming languages and how they are used. |
|
20.06
Create a model flowchart for a computer program using software applications like RAPTOR or MS VISIO. |
|
20.07
Describe the stages in the software development life cycle and explain how to successfully implement them. |
|
20.08
Compare security and vulnerabilities of various programming languages. |
|
21.01
Compare and contrast emerging technologies and describe how they impact the security of business in the global marketplace (e.g., wireless, wireless web, cell phones, portables/handhelds, vehicles, home networks, peer-to-peer, IoT, embedded systems, AI). |
|
21.02
Adhere to published best practices for protecting personal identifiable information when using the Internet. |
|
21.03
Identify trends related to the secure use of information technology in people’s personal and professional lives. |
|
21.04
Characterize how the rapid pace of change in information technology impacts our society’s ability to keep the appropriate level of security. |
|
22.01
Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software. |
|
22.02
Describe the purpose of the OSI model and each of its layers. |
|
22.03
Explain specific functions belonging to each OSI model layer. |
|
22.04
Understand how two network nodes communicate through the OSI model. |
|
22.05
Discuss the structure and purpose of data packets and frames. |
|
22.06
Describe the two types of addressing covered by the OSI model. |
|
23.01
Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software. |
|
23.02
Describe the purpose of the TCP/IP model and each of its layers. |
|
23.03
Explain specific functions belonging to each TCP/IP model layer. |
|
23.04
Understand how two network nodes communicate through the TCP/IP model. |
|
23.05
Describe the two types of addressing covered by the TCP/IP model. |
|
24.01
Identify the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling). |
|
24.02
Use common computer and programming terminology. |
|
25.01
Identify and describe web terminology. |
|
25.02
Define Universal Resource Locators (URLs) and associated protocols (e.g., http, ftp, telnet, mailto) and their associated secure protocols (e.g. https, ftps, ssh). |
|
25.03
Compare and contrast the types of Internet domains (e.g., .com, .org, .edu, .gov, .net, .mil). |
|
25.04
Demonstrate proficiency using search engines, including Boolean search strategies. |
|
25.05
Demonstrate proficiency using various secure web tools (e.g., downloading of files, transfer of files, SSH, PDF). |
|
25.06
Compare and contrast the roles of web servers and web browsers. |
|
25.07
Compare and contrast MS Web Servers and Linux Web Servers. |
|
26.01
Describe cyber-bullying and its impact on perpetrators and victims. |
|
26.02
Differentiate between viruses and malware, specifically their sources, ploys, and impact on personal privacy and computer operation, and ways to avoid infection. |
|
26.03
Describe risks associated with sexting, related legal issues, social engineering aspects, prevention methods, and reporting of offenses. |
|
26.04
Describe the risks associated with online gaming and ways to reduce these risks. |
|
26.05
Describe the intellectual property rights, ethics and legalities of downloading music or videos from the Internet. |
|
26.06
Describe various risks associated with social networking sites and ways to reduce these risks. |
|
26.07
Describe the risks associated with various conferencing programs and ways to reduce these risks. |
|
26.08
Adhere to cyber safety practices with regard to conducting Internet searches, email, chat rooms, and other social network websites. |
|
27.01
Compare and contrast the appropriate use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music). |
|
27.02
Demonstrate proficiency in the use of various software applications (e.g., word processing, desktop publishing, graphics design, web browser, email, presentation, database, scheduling, financial management, Java applet, music). |
|
28.01
Describe email capabilities and functions. |
|
28.02
Identify components of an email message. |
|
28.03
Identify the components of an email address. |
|
28.04
Identify when to use different email options. |
|
28.05
Attach a file to an email message. |
|
28.06
Forward an email message. |
|
28.07
Use an address book if an address book is available via the school’s Outlook server for the student to use. |
|
28.08
Reply to an email message. |
|
28.09
Use the Internet to perform email activities. |
|
28.10
Identify the appropriate use of email and demonstrate related email etiquette. |
|
28.11
Recognize a fraudulent email and deal with it appropriately. |
|
28.12
Identify common problems associated with widespread use of email. |
|
28.13
Create folders to organize email. |
|
29.01
Produce a presentation that includes music, animation, and digital photography and present it using appropriate technology. |
|
29.02
Using presentation software, create a multimedia presentation that incorporates shot and edited video, animation, music, narration and adheres to good design principles, use of transitions, and effective message conveyance. |
|
29.03
Demonstrate knowledge of the roles and responsibilities of a multimedia production team (e.g., project manager, creative or design director, content experts, writers, graphic designers, animators, sound designers, videographer, interface designers/programmers). |
|
29.04
Collaborate with team members to plan, edit, evaluate, and present a multimedia presentation where individuals on the team function in specific production roles. |
|
29.05
Create a self-running presentation with synchronized audio, convert presentation slides (e.g., PowerPoint) into streaming ASF files for use on the web. |
|
30.01
Determine work priorities, the audience, project budgets, project specifications, and the production schedule. |
|
30.02
Evaluate and select appropriate software packages and multimedia tools to complete assigned tasks. |
|
30.03
Present and defend design projects. |
|
31.01
Locate, comprehend and evaluate key elements of oral and written information. |
|
31.02
Draft, revise, and edit written business technology documents using correct grammar, punctuation and vocabulary (e.g., Business Continuity and Disaster Recovery plan, Incident Response plan, IT reports and procedures manuals). |
|
31.03
Present information formally and informally to instruct others on Computer Security Awareness and Victim Prevention. |
|
32.01
Demonstrate knowledge of arithmetic operations. |
|
32.02
Construct charts/tables/graphs using functions and data and relate it to IT risk and business continuity. |
|
32.03
Demonstrate an understanding of binary numbers and ASCII characters. |
|
33.01
Discuss the role of creativity in constructing scientific questions, methods and explanations. |
|
33.02
Formulate scientifically investigable questions, construct investigations, collect and evaluate data, and develop scientific recommendations based on findings. |
|