Standards in this Framework
| Standard | Description |
|---|---|
| A.1 | Review school safety policies and procedures. |
| A.2 | Review classroom safety rules and procedures. |
| A.3 | Review safety procedures for using equipment in the classroom. |
| A.4 | Identify major causes of work-related accidents in office environments. |
| A.5 | Demonstrate safety skills in an office/work environment. |
| B.1 | Identify the purpose and goals of a Career and Technology Student Organization (CTSO). |
| B.2 | Explain how CTSOs are integral parts of specific clusters, majors, and/or courses. |
| B.3 | Explain the benefits and responsibilities of being a member of a CTSO. |
| B.4 | List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. |
| B.5 | Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. |
| C.1 | Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation. |
| C.2 | Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. |
| C.3 | Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks. |
| C.4 | Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; cyberbullying, illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment). |
| C.5 | Discuss legal issues and the terms of use related to copyright laws, fair use laws, Creative Commons, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal use. |
| C.6 | Describe ethical and legal practices of safeguarding the confidentiality of business-related information. |
| C.7 | Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks. |
| D.1 | Demonstrate punctuality. |
| D.2 | Demonstrate self-representation. |
| D.3 | Demonstrate work ethic. |
| D.4 | Demonstrate respect. |
| D.5 | Demonstrate time management. |
| D.6 | Demonstrate integrity. |
| D.7 | Demonstrate leadership. |
| D.8 | Demonstrate teamwork and collaboration. |
| D.9 | Demonstrate conflict resolution. |
| D.10 | Demonstrate perseverance. |
| D.11 | Demonstrate commitment. |
| D.12 | Demonstrate a healthy view of competition. |
| D.13 | Demonstrate a global perspective. |
| D.14 | Demonstrate health and fitness. |
| D.15 | Demonstrate self-direction. |
| D.16 | Demonstrate lifelong learning. |
| E.1 | Demonstrate effective speaking and listening skills. |
| E.2 | Demonstrate effective reading and writing skills. |
| E.3 | Demonstrate mathematical reasoning. |
| E.4 | Demonstrate job-specific mathematics skills. |
| E.5 | Demonstrate critical-thinking and problem-solving skills. |
| E.6 | Demonstrate creativity and resourcefulness. |
| E.7 | Demonstrate an understanding of business ethics. |
| E.8 | Demonstrate confidentiality. |
| E.9 | Demonstrate an understanding of workplace structures, organizations, systems, and climates. |
| E.10 | Demonstrate diversity awareness. |
| E.11 | Demonstrate job acquisition and advancement skills. |
| E.12 | Demonstrate task management skills. |
| E.13 | Demonstrate customer-service skills. |
| F.1 | Differentiate the functions and applications of various network topologies. Mesh; Bus; Ring; Star; Hybrid; Point-to-point; Point-to-multipoint; Client-server; Peer-to-peer. |
| F.2 | Explain the functions and applications of various network devices: Router; Bridge; Switch; Hub; Multilayer switch; Firewall; Access point (wireless/wired); Content filter; Modems |
| F.3 | Differentiate between common network infrastructures, e.g., LAN, WAN, WLAN, PAN, MAN. |
| F.4 | Identify networking media between devices, e.g., copper, fiber-optic, wireless. |
| G.1 | Analyze functions at the different OSI layers. Layer 1 – Physical; Layer 2 – Data link; Layer 3 – Network; Layer 4 – Transport; Layer 5 – Session; Layer 6 – Presentation; Layer 7 – Application |
| G.2 | Analyze devices at the different OSI layers. Hubs; Repeaters; Network Interface Cards; Media; Bridges; Switches; Routers; Firewalls |
| G.3 | Differentiate between protocols based upon appropriate functions and layers. |
| G.4 | Identify the applications and services at the different OSI layers, e.g., email, host configuration, file transfer, web services, network services and management, transport, and control. |
| H.1 | Differentiate various operating systems used in networking. |
| H.2 | Explain how major operating systems use hardware and networking protocols, e.g., traffic, collision domains. |
| I.1 | Differentiate wiring pattern standards EIA/TIA 568A/568B. |
| I.2 | Compare and contrast appropriate Ethernet standards. e.g., 10BaseX, IEEE 802.3. |
| I.3 | Differentiate internet access technologies, e.g., DSL, cable, broadband, dial-up, and satellite. (See IEEE 802.7) |
| I.4 | Deploy an appropriate cabling solution using copper connectors, copper cables, fiber connectors, fiber cables, media converters, and tools. |
| J.1 | Differentiate various wireless technologies, e.g., infrared, radio waves, satellite, microwave. |
| J.2 | Differentiate wireless standards (See IEEE). |
| J.3 | Determine configuration settings of wireless hardware equipment, software, and security. |
| J.4 | Given a scenario, implement the appropriate wireless technologies and configurations. |
| K.1 | Analyze functions at the different TCP/IP layers. Network Access; Internet; Transport; Application |
| K.2 | Differentiate between protocols based upon appropriate functions and layers. |
| K.3 | Identify the applications and services at the different TCP/IP layers, e.g., email, host configuration, file transfer, web services, and transport. |
| K.4 | Differentiate TCP/IPv4 vs. TCP/IPv6. |
| L.1 | Examine and classify IP addressing schemes, e.g., IPv4, IPv6, classful address ranges, and subnet mask. |
| L.2 | Examine and classify MAC addressing schemes. |
| L.3 | Configure IP address on client/server hardware and software. |
| L.4 | Configure MAC address on client/server hardware and software. |