for South Carolina IT Fundamentals — South Carolina IT Fundamentals (New)
Total Standards: 98Mapped: 90Completion: 91%
A.1
Identify major causes of work-related accidents in offices.
12.4 Personal Safety
A.2
Demonstrate appropriate ergonomic practices.
A.3
Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
A.4
Identify potential abuse and unethical uses of computers and networks.
1.4 Cyber Ethics and Laws
1.5 Personal Data Security
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
A.5
Explain the consequences of illegal, social, and unethical uses of information technologies (e.g., piracy; illegal downloading; licensing infringement; and inappropriate uses of software, hardware, and mobile devices).
1.1 Digital Footprint and Responsibility
1.4 Cyber Ethics and Laws
A.6
Differentiate between freeware, shareware, and public domain software copyrights.
4.7 Software Licenses
A.7
Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, Creative Commons, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications.
1.4 Cyber Ethics and Laws
A.8
Identify netiquette including the use of email, social networking, blogs, texting, and chatting.
1.1 Digital Footprint and Responsibility
A.9
Describe ethical and legal practices in business professions such as safeguarding the confidentiality of business-related information.
1.4 Cyber Ethics and Laws
1.5 Personal Data Security
A.10
Discuss the importance of cyber safety and the impact of cyber bullying.
1.1 Digital Footprint and Responsibility
B.1
Identify the purpose and goals of a Career and Technology Student Organization (CTSO).
12.1 Student Organizations
B.2
Explain how CTSOs are integral parts of specific clusters, majors, and/or courses.
12.1 Student Organizations
B.3
Explain the benefits and responsibilities of being a member of a CTSO.
12.1 Student Organizations
B.4
List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities.
12.1 Student Organizations
B.5
Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations.
12.1 Student Organizations
C.1
Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation.
4.11 Command Line Interface
8.2 Using Databases
C.2
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes.
1.1 Digital Footprint and Responsibility
C.3
Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks.
1.4 Cyber Ethics and Laws
1.5 Personal Data Security
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
C.4
Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; cyberbullying, illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment).
1.1 Digital Footprint and Responsibility
1.4 Cyber Ethics and Laws
C.5
Discuss legal issues and the terms of use related to copyright laws, fair use laws, Creative Commons, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal and professional use.
1.4 Cyber Ethics and Laws
C.6
Describe ethical and legal practices of safeguarding the confidentiality of business-related information.
1.4 Cyber Ethics and Laws
1.5 Personal Data Security
C.7
Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks.
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
D.1
Demonstrate creativity and innovation.
3.1 Create an Escape Room
9.1 The Game of Risk
D.2
Demonstrate critical thinking and problem-solving skills.
3.1 Create an Escape Room
7.2 Troubleshooting Methodology
9.1 The Game of Risk
D.3
Demonstrate initiative and self-direction.
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
D.4
Demonstrate integrity.
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
D.5
Demonstrate work ethic.
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
D.6
Demonstrate conflict resolution skills.
7.1 Communication is Key!
D.7
Demonstrate listening and speaking skills.
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
D.8
Demonstrate respect for diversity.
1.6 Cybersecurity Essentials
5.9 Impact of the Internet
8.1 Data as a Resource
D.9
Demonstrate customer service orientation.
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
D.10
Demonstrate teamwork.
3.1 Create an Escape Room
9.1 The Game of Risk
E.1
Demonstrate global or “big picture” thinking.
1.6 Cybersecurity Essentials
5.9 Impact of the Internet
E.2
Demonstrate career and life management skills and goal-making.
12.2 Alternative Learning Opportunities
12.3 Resume and Interview Prep
E.3
Demonstrate continuous learning and adaptability skills to changing job requirements.
12.2 Alternative Learning Opportunities
12.3 Resume and Interview Prep
E.4
Demonstrate time and resource management skills.
3.1 Create an Escape Room
7.3 Building a Knowledge Base
7.4 Star in a Video!
E.5
Demonstrates information literacy skills.
1.3 Can All Information Be Trusted?
E.6
Demonstrates information security skills.
1.2 Personal Data and Collection
1.5 Personal Data Security
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
E.7
Demonstrates information technology skills.
5.1 Computers Speak Binary
6.1 Internal Components
7.2 Troubleshooting Methodology
E.8
Demonstrates knowledge and use of job-specific tools and technologies.
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
E.9
Demonstrate job-specific mathematics skills.
2.3 Asymmetric Encryption
5.1 Computers Speak Binary
5.2 Bits, Text, and Numbers
8.2 Using Databases
8.4 Security in Coding
E.10
Demonstrates professionalism in the workplace.
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
E.11
Demonstrate reading and writing skills.
7.1 Communication is Key!
7.2 Troubleshooting Methodology
7.3 Building a Knowledge Base
7.4 Star in a Video!
E.12
Demonstrates workplace safety.
8.6 Environmental Controls
12.4 Personal Safety
F.1
Compare and contrast notational systems (e.g., binary, hexadecimal, ASCII, unicode).
5.1 Computers Speak Binary
5.2 Bits, Text, and Numbers
5.3 Encoding Images in Binary
F.2
Compare and contrast fundamental data types and their characteristics.
10.4 Variables and Types
16.3 Variables and Types
F.3
Illustrate the basics of computing and processing.
4.1 Operating Systems
4.6 Software and Applications
F.4
Explain the value of data and information.
8.1 Data as a Resource
F.5
Compare and contrast common units of measure (e.g., bit/byte, KB, MB, GB).
5.1 Computers Speak Binary
F.6
Explain the troubleshooting methodology.
7.2 Troubleshooting Methodology
G.1
Classify common types of input/output device interfaces (e.g., networking, peripheral device, graphic device).
6.3 Peripheral Devices
6.5 Network Devices
G.2
Design efficient device placement to create optimum airflow, humidity, temperature, and dust accumulation.
8.6 Environmental Controls
G.3
Differentiate various computer connector/ports, (e.g., video, eSATA, thunderbolt, USB, HDMI, ethernet, RJ-45, RJ-11, audio, and power).
6.5 Network Devices
G.4
Set up and install peripheral devices to a laptop or PC.
6.3 Peripheral Devices
G.5
Identify the primary causes of electrostatic discharge and ways to mitigate the effects of ESD on electronic devices.
G.6
Identify situations where various power peripherals should be used (e.g., UPS, surge protector, power strip).
G.7
Explain the purpose of common internal computing components (e.g., motherboard/system board, RAM, CPU, storage, NIC).
6.1 Internal Components
6.4 Storage Options
6.5 Network Devices
G.8
Compare and contrast common Internet service types (e.g., fiber optic, cable, DSL).
6.7 Network Options
G.9
Compare and contrast storage types (e.g., volatile vs. non-volatile, local storage types, local network storage types, cloud storage).
6.4 Storage Options
G.10
Compare and contrast common computing devices and their purposes (e.g., mobile phones. gaming consoles, IoT (internet of things), security systems, IP (internet protocol) camera).
1.6 Cybersecurity Essentials
4.5 Laptops and Tablets
G.11
Explain basic networking concepts (e.g., DNS, LAN vs WAN, IP address, HTTP/S, POP, IMAP, SMTP, modem, switch, firewall, VOIP).
5.5 IP Addresses
5.6 Routing and Packets
6.5 Network Devices
G.12
Explain the basic features and functions of wireless devices (e.g., airdrop, unlocking/security, bluetooth pairing, wireless connection setup, mail configuration, airplane mode).
G.13
Configure and secure a basic wireless network.
6.7 Network Options
G.14
Describe Material Safety Data Sheets (MSDS).
8.6 Environmental Controls
H.1
Explain the purpose of operating systems.
4.1 Operating Systems
H.2
Compare and contrast common mobile and desktop operating systems and their functions and features for Android, Linux, iOS, Windows, and Chrome OS.
4.1 Operating Systems
4.3 Comparing Operating Systems
H.3
Compare and contrast components of an operating system (e.g., File systems and features, File management, Services, Processes, Drivers, Utilities, Interfaces).
4.1 Operating Systems
4.3 Comparing Operating Systems
H.4
Explain the purpose and proper use of software (e.g., Productivity software, Collaboration Software, Business software, virtualization, open source).
4.6 Software and Applications
H.5
Describe software compatibility in relationship to operating systems.
4.4 Compatibility
H.6
Identify common file types and their extensions (e.g., documents, audio, images, video, executables, and compression formats).
H.7
Explain methods of application architecture and delivery models (e.g., Application delivery methods, Network required, Application architecture).
4.7 Software Licenses
H.8
Given a scenario, configure and use web browsers.
4.9 Browser Configuration
H.9
Compare and contrast general application concepts and uses.
4.6 Software and Applications
I.1
Compare and contrast programming language categories.
10.7 Programming Languages
I.2
Use programing organizational techniques and interpret logic.
10.2 The Language of Computers
10.7 Programming Languages
16.1 The Language of Computers
16.9 Flowcharts and Pseudocode
I.3
Explain the purpose and use of programming concepts.
10.7 Programming Languages
J.1
Explain database concepts and the purpose of a database.
8.3 Data Security Items
J.2
Compare and contrast various database structures (e.g., structured vs. semi-structured vs. non-structured, relational databases, non-relational databases).
8.3 Data Security Items
J.3
Summarize methods used to interface with databases (e.g., relational methods such as data manipulation or data definition, database access methods, export/import).
8.3 Data Security Items
K.1
Research and discuss common security threats found in IT.
Explain methods to secure devices and best practices (e.g., antivirus software, enabling passwords, validating legitimate sources, removal of malicious software).
1.7 Common Cyber Attacks and Prevention
K.4
Summarize methods and concepts used in IT behavioral security concepts. a. Expectations of privacy when using various computing applications or devices b. Acceptable Use Policy and Procedures c. Handlings of confidential information
1.5 Personal Data Security
K.5
Compare and contrast authentication, non-repudiation, authorization, and accounting concepts (e.g., biometrics, video, digital signatures).
1.5 Personal Data Security
K.6
Explain password best practices (e.g., length, complexity).
1.5 Personal Data Security
K.7
Explain common uses of encryption (e.g., HTTPS, VPN).
2.2 Symmetric Encryption
2.4 Authentication Methods
K.8
Explain business continuity concepts (e.g., disaster recovery, redundancy, data backup, contingency plans).
8.8 Risky Business
L.1
Research the field of emerging technologies.
5.9 Impact of the Internet
L.2
Identify the following emerging technologies and their purpose (e.g., AR/VR, Artificial Intelligence, blockchain, chatbots, cloud computing, dynamic network analysis, gesturebased interaction, marketing automation, podcasting, predictive analytic, predictive sales, streaming media (audio/video), telepresence ).
11.2 Emerging Technologies and Society
L.3
Research and present an emerging technology to solve a real-world problem.
11.2 Emerging Technologies and Society
M.1
Apply strategies for identifying routine hardware and software problems current to everyday life.
7.2 Troubleshooting Methodology
M.2
Identify compatibility issues and describe operational problems caused by hardware errors.
M.3
Explain how technology can be used to solve problems.
5.9 Impact of the Internet
M.4
Explain the software development process used to solve problems.
10.8 Software Development
M.5
Explore commonly used documentation tools for design specifications (e.g., flowcharts, visual and textual storyboards).
10.8 Software Development
N.1
Compare and contrast careers in IT/IS with their education, training requirements, industry certifications and salary ranges.
11.1 After IT Fundamentals
N.2
Describe how computing enhances other career fields.
N.3
Connect with colleges and companies by using various networking platforms.