Standards in this Framework
Standard | Description |
---|---|
1.1.1 | Demonstrate the proper use of safety devices |
1.1.2 | Research the environmental impact of production |
1.1.3 | Research local, state, and federal regulations related to material handling |
1.1.4 | Demonstrate secure disposal of technology materials |
1.1.5 | Describe Material Safety Data Sheets (MSDS) |
1.1.6 | Explain the relationship between organization and safety |
1.1.7 | Demonstrate an organized work environment |
1.1.8 | Demonstrate electrical safety (e.g., grounding, ESD (static), etc.) |
1.1.9 | Apply installation safety (e.g., lifting, overhead movements, etc.) |
1.1.10 | Analyze emergency procedures (building layout, fire escape plan, safety/emergency exits, fail open/close, alert systems) |
1.2.1 | Explain common tools used in computer repair |
1.2.2 | Demonstrate the use of common networking and repair tools |
1.2.3 | Select the proper tool for diagnostic and troubleshooting procedures |
1.2.4 | Compare and contrast fire suppression systems in IT environments |
1.2.5 | Describe the purpose of Heating, Ventilation, and Air Conditioning (HVAC) systems for IT systems |
2.1.1 | Analyze legal issues in technology |
2.1.2 | Evaluate intellectual property laws |
2.1.3 | Explain differences between licensing, copyright, and infringement |
2.1.4 | Explain the differences between restricted content, prohibited or illegal content |
2.1.5 | Examine state, federal, and international regulations related to technology (e.g.; legal holds, disposal methods, data retention, discoverability, data protection, etc.) |
2.2.1 | Analyze acceptable use policies |
2.2.2 | Explain the difference between technology policies, privacy standards, and best practices |
2.2.3 | Explain data and privacy encryption issues related to using technology |
2.2.4 | Evaluate appropriate consent policies to monitoring various stakeholders |
2.2.5 | Explain appropriate data classification |
2.3.1 | Communicate with customers to ensure understanding of customer requirements, scope, and concerns |
2.3.2 | Utilize appropriate documentation systems |
2.3.3 | Explain the purpose of business agreements (i.e., memos of understanding, service level agreement, statement of work, master services agreement) |
3.1.1 | Categorize system unit components (e.g., power supply connectors, motherboard characteristics, form factors, CPU features, memory module attributes, and expansion business types) |
3.1.2 | Use industry standard vocabulary to identify components |
3.2.1 | Select and install appropriate system unit components to meet customer specifications |
3.2.2 | Interpret BIOS/UEFI settings for basic hardware components |
3.2.3 | Configure the settings of basic hardware components |
3.2.4 | Troubleshoot basic hardware components and resolve issues |
3.3.1 | Categorize audio and video device components, connectors, and cables |
3.3.2 | Install appropriate sound and video cards to match specifications and end-user requirements |
3.3.3 | Configure display and video settings |
3.3.4 | Manage sound card and audio device settings |
3.4.1 | Identify external device components, connectors, and cables |
3.4.2 | Connect external devices using the appropriate connectors and cables |
3.4.3 | Manage device driver updates and roll back drivers |
3.4.4 | Enable or disable devices |
3.4.5 | Install drivers for external devices |
3.4.6 | Prepare devices for safe removal |
3.4.7 | Manipulate system utilities to configure storage and external devices |
3.5.1 | Install SOHO multifunction device / printers and configure appropriate settings |
3.5.2 | Compare and contrast differences between the various print technologies and the associated imaging process |
3.5.3 | Perform appropriate printer maintenance |
4.1.1 | Use industry standard vocabulary in relation to operating systems (OS) |
4.1.2 | Compare and contrast Microsoft Windows Operating Systems |
4.1.3 | Install and secure operating systems |
4.1.4 | Install and configure Windows networking |
4.2.1 | Explain various features and tools of operating systems |
4.2.2 | Apply appropriate command line tools |
4.2.3 | Select appropriate operating system features and tools based on customer requirements |
4.2.4 | Configure Windows Update Settings |
4.2.5 | Configure local users and groups for a Windows networking system |
4.2.6 | Configure User Access Control (UAC) |
4.2.7 | Use Windows Control Panel utilities |
4.2.8 | Perform common preventive maintenance procedures using the appropriate Windows OS tools |
4.2.9 | Troubleshoot common PC security issues using best practices |
4.3.1 | Explain key terms and acronyms used in diagnostic testing and troubleshooting |
4.3.2 | Identify common symptoms for a given discrepancy |
4.3.3 | Develop a solution for a given discrepancy |
4.3.4 | Document the solution |
4.4.1 | Identify common features and functionality of the Mac OS and Linux operating systems |
4.4.2 | Set up and use client-side virtualization |
4.4.3 | Identify basic cloud concepts |
4.4.4 | Summarize the properties and purpose of services provided by networked hosts |
4.4.5 | Identify basic features of mobile operating systems |
4.4.6 | Install and configure basic mobile device network connectivity and email |
4.4.7 | Summarize methods and data related to mobile device synchronization |
4.4.8 | Compare and contrast methods to secure mobile devices |
4.4.9 | Explain the characteristics of various types of other mobile devices |
4.4.10 | Compare and contrast accessories, features, and ports of mobile and IoT devices |
4.4.11 | Troubleshoot common mobile OS and tablet software/hardware issues |
4.5.1 | Compare and contrast laptops, tablets, and computer form factors |
4.5.2 | Explain current trends in laptops and tablet applications |
4.5.3 | Compare laptop and tablet operating systems |
4.5.4 | Explain the function of components within the display of a laptop and tablet |
4.5.5 | Compare and contrast accessories, features, and ports of laptops and tablets |
5.1.1 | Describe the OSI model and relate to hardware in a network |
5.1.2 | Implement the appropriate industry policy and procedures |
5.1.3 | Compare and contrast the ports and protocols (HTTP, NetBIOS, SMTP, TCP, UDP, etc.) |
5.1.4 | Configure and apply appropriate ports and protocols (FTP, SSH, Telnet, DHCP, TFTP, etc.) |
5.1.5 | Utilize appropriate wired connections |
5.1.6 | Utilize appropriate wireless connections |
5.2.1 | Describe encapsulation/de-encapsulation |
5.2.2 | Explain modulation techniques |
5.2.3 | Apply numbering systems (e.g., binary, octal, hexadecimal) |
5.2.4 | Demonstrate addressing and subnetting techniques |
5.2.5 | Compare broadband/baseband |
5.2.6 | Compare and contrast bit rates vs. baud rates |
5.2.7 | Describe CDMA |
5.2.8 | Explain the difference between CSMA/CD-CSMA/CA |
5.2.9 | Describe wavelength |
5.2.10 | Apply TCP/IP suite (TCP, UDP, ICMP) |
5.3.1 | Compare Main (MDF) and intermediate distribution frame (IDF) |
5.3.2 | Implement a cable management solution |
5.3.3 | Analyze and create a power management plan (i.e., power converters, circuits, UPS {Power redundancy}, inverters, load capacity, etc.) |
5.3.4 | Determine proper airflow for optimal performance |
5.3.5 | Utilize correct rack systems for location and operation |
5.3.6 | Employ consistent labeling methodologies (port, system, circuit, patch panel) |
5.3.7 | Develop a plan to monitor rack security and environmental conditions |
6.3.3 | Troubleshoot and resolve common wireless issues |
6.3.4 | Troubleshoot and resolve common copper and fiber cable issues |
6.3.5 | Troubleshoot and resolve common network issues |
6.3.6 | Troubleshoot and resolve common security issues |
6.3.7 | Troubleshoot and resolve common WAN issues |