Standards in this Framework
| Standard | Description |
|---|---|
| F1 | Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces. |
| F2 | Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork. |
| F3 | Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing. |
| F4 | Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway. |
| F5 | Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork. |
| F6 | Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience. |
| F7 | Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback. |
| 1 | Investigate and report on the history and evolution of computers. |
| 2 | Identify computer peripherals and common ports related to input and output. |
| 3 | Identify the internal components of a computer and explain their functions. |
| 4 | Locate, disassemble, and reassemble the internal components of a computer. |
| 5 | Diagnose common issues related to computer hardware, utilizing the troubleshooting process. |
| 6 | Describe the binary, hexadecimal, and ASCII notational systems used in computers. |
| 7 | Identify different types of software. |
| 8 | Compare and contrast different types of operating systems. |
| 9 | Describe virtual machines and their purposes. |
| 10 | Contrast command line interface (CLI) and graphical user interface (GUI). |
| 11 | Describe various kinds of software licenses and their uses. |
| 12 | Explain the importance of cybersecurity for individuals, organizations, businesses, and governments. |
| 13 | Compare and contrast various types of malware. |
| 14 | Explain the use of cryptography in ensuring the confidentiality and integrity of both data in transit and data at rest. |
| 15 | Explain the importance of the CIA triad (confidentiality, integrity, and availability) and how it applies to cybersecurity. |
| 16 | Demonstrate effective practices for protecting personal information and securing transactions. |
| 17 | Explain system access controls and the difference between authentication and authorization. |
| 18 | Describe various means of accessing a computing system. |
| 19 | Describe various methods of protecting access to computer systems and data, including physical security and electronic entry systems. |
| 20 | Describe the concept of a digital footprint. |
| 21 | Describe and discuss online etiquette and safety. |
| 22 | Identify the types of facts about individuals that are considered personally identifiable information (PII). |
| 23 | Explain what types of information should and should not be shared online and on social media. |
| 24 | Discuss the responsible and legal use of technology systems and digital content. |
| 25 | Describe cyberbullying and its consequences. |
| 26 | Explain the importance of using safety procedures with mobile devices. |
| 27 | Configure safe web browser settings to protect personal privacy. |
| 28 | Identify the key components that allow users to access the Internet. |
| 29 | Compare and contrast clients, servers, and databases. |
| 30 | Identify networking cable media technologies. |
| 31 | Perform calculations to identify location of the logical and physical address of a computing device, including MAC and IP addresses. |
| 32 | Describe various ways to connect to wireless networks and explain how consumers may determine the best devices to use for accessing them. |
| 33 | Explain the purpose of the Domain Name System (DNS). |
| 34 | Explain how network systems are connected and used. |