Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
F1
Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces. |
|
F2
Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork. |
|
F3
Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing. |
|
F4
Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway. |
|
F5
Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork. |
|
F6
Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience. |
|
F7
Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback. |
|
1
Investigate and report on the history and evolution of computers. |
|
2
Identify computer peripherals and common ports related to input and output. |
|
3
Identify the internal components of a computer and explain their functions. |
|
4
Locate, disassemble, and reassemble the internal components of a computer. |
|
5
Diagnose common issues related to computer hardware, utilizing the troubleshooting process. |
|
6
Describe the binary, hexadecimal, and ASCII notational systems used in computers. |
|
7
Identify different types of software. |
|
8
Compare and contrast different types of operating systems. |
|
9
Describe virtual machines and their purposes. |
|
10
Contrast command line interface (CLI) and graphical user interface (GUI). |
|
11
Describe various kinds of software licenses and their uses. |
|
12
Explain the importance of cybersecurity for individuals, organizations, businesses, and governments. |
|
13
Compare and contrast various types of malware. |
|
14
Explain the use of cryptography in ensuring the confidentiality and integrity of both data in transit and data at rest. |
|
15
Explain the importance of the CIA triad (confidentiality, integrity, and availability) and how it applies to cybersecurity. |
|
16
Demonstrate effective practices for protecting personal information and securing transactions. |
|
17
Explain system access controls and the difference between authentication and authorization. |
|
18
Describe various means of accessing a computing system. |
|
19
Describe various methods of protecting access to computer systems and data, including physical security and electronic entry systems. |
|
20
Describe the concept of a digital footprint. |
|
21
Describe and discuss online etiquette and safety. |
|
22
Identify the types of facts about individuals that are considered personally identifiable information (PII). |
|
23
Explain what types of information should and should not be shared online and on social media. |
|
24
Discuss the responsible and legal use of technology systems and digital content. |
|
25
Describe cyberbullying and its consequences. |
|
26
Explain the importance of using safety procedures with mobile devices. |
|
27
Configure safe web browser settings to protect personal privacy. |
|
28
Identify the key components that allow users to access the Internet. |
|
29
Compare and contrast clients, servers, and databases. |
|
30
Identify networking cable media technologies. |
|
31
Perform calculations to identify location of the logical and physical address of a computing device, including MAC and IP addresses. |
|
32
Describe various ways to connect to wireless networks and explain how consumers may determine the best devices to use for accessing them. |
|
33
Explain the purpose of the Domain Name System (DNS). |
|
34
Explain how network systems are connected and used. |
|