Standards in this Framework
Standard | Description |
---|---|
F1 | Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces. |
F2 | Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork. |
F3 | Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing. |
F4 | Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway. |
F5 | Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork. |
F6 | Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience. |
F7 | Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback. |
1 | Investigate and report on the history and evolution of computers. |
2 | Identify computer peripherals and common ports related to input and output. |
3 | Identify the internal components of a computer and explain their functions. |
4 | Locate, disassemble, and reassemble the internal components of a computer. |
5 | Diagnose common issues related to computer hardware, utilizing the troubleshooting process. |
6 | Describe the binary, hexadecimal, and ASCII notational systems used in computers. |
7 | Identify different types of software. |
8 | Compare and contrast different types of operating systems. |
9 | Describe virtual machines and their purposes. |
10 | Contrast command line interface (CLI) and graphical user interface (GUI). |
11 | Describe various kinds of software licenses and their uses. |
12 | Explain the importance of cybersecurity for individuals, organizations, businesses, and governments. |
13 | Compare and contrast various types of malware. |
14 | Explain the use of cryptography in ensuring the confidentiality and integrity of both data in transit and data at rest. |
15 | Explain the importance of the CIA triad (confidentiality, integrity, and availability) and how it applies to cybersecurity. |
16 | Demonstrate effective practices for protecting personal information and securing transactions. |
17 | Explain system access controls and the difference between authentication and authorization. |
18 | Describe various means of accessing a computing system. |
19 | Describe various methods of protecting access to computer systems and data, including physical security and electronic entry systems. |
20 | Describe the concept of a digital footprint. |
21 | Describe and discuss online etiquette and safety. |
22 | Identify the types of facts about individuals that are considered personally identifiable information (PII). |
23 | Explain what types of information should and should not be shared online and on social media. |
24 | Discuss the responsible and legal use of technology systems and digital content. |
25 | Describe cyberbullying and its consequences. |
26 | Explain the importance of using safety procedures with mobile devices. |
27 | Configure safe web browser settings to protect personal privacy. |
28 | Identify the key components that allow users to access the Internet. |
29 | Compare and contrast clients, servers, and databases. |
30 | Identify networking cable media technologies. |
31 | Perform calculations to identify location of the logical and physical address of a computing device, including MAC and IP addresses. |
32 | Describe various ways to connect to wireless networks and explain how consumers may determine the best devices to use for accessing them. |
33 | Explain the purpose of the Domain Name System (DNS). |
34 | Explain how network systems are connected and used. |