Standards in this Framework
Standard | Description |
---|---|
CSF.1 | Perform safe practices within the classroom: a) Accurately read and interpret safety rules, including but not limited to rules pertaining to electrical safety, Occupational Safety and Health Administration (OSHA) guidelines, internet safety, and state and national code requirements, b) Identify and explain the intended use of safety equipment available in the classroom, c) Demonstrate how to properly inspect, use, and maintain safe operating procedures with tools and equipment, d) Incorporate sa... |
CSF.2 | Identify various fields within information technology and their respective career opportunities: a) Recognize the work typically performed, tools and technology used, and nature of work environment, b) Identify potential certification opportunities, c) Find membership organizations associated with the careers, d) Understand the necessary education associated within the careers, e) Research security clearance requirements associated within the careers. |
CSF.3 | Demonstrate basic understanding of electrical circuits and devices. |
CSF.4 | Distinguish between the binary and hexadecimal counting systems: a) Use appropriate units, b) Provide examples of each system within the IT setting. |
CSF.5 | Explain the functions of gates in logistic circuits. |
CSF.6 | Identify basic hardware components and their functions: a) Hardware used for input and output, b) Hardware inside the computer case, c) Motherboard, d) Processor and the chipset, e) Storage devices, f) Expansion cards, g) Electrical system. |
CSF.7 | Outline the evolution of the internet. |
CSF.8 | Explain basic web terminology and concepts: a) Server, b) Domain name system (DNS), c) Internet service provider (ISP), d) Hardware and software connective devices, e) Cloud computing, f) Remote access protocols, g) Map protocols, h) Content management systems (CMS), i) Cascading style sheets (CSS), j) Social networking terms. |
CSF.9 | Compare and contrast the general capabilities of a variety of operating systems: a) Summarize the evolution of operating systems. |
CSF.10 | Explain the types of networks and what a client-server environment is. |
CSF.11 | Evolution of cloud computing. |
CSF.12 | Identify roles in cloud computing: a) Cloud computing customer, b) Cloud service provider, c) Cloud service partner. |
CSF.13 | Four main deployment models for cloud technology: a) Public, b) Private, c) Community, d) Hybrid. |
CSF.14 | Describe how virtualization, storage, networking, and databases in cloud technologies are used. |
CSF.15 | Internet of Things. |
CSF.16 | Databases, data collection systems, data analytics and other strategies that optimize statistical efficiency quality. |
CSF.17 | Explain the steps of the web design and development process. |
CSF.18 | Identify the specific activities involved at each step of the troubleshooting process. |
CSF.19 | Create a flowchart that would guide code development that incorporates decisions and/or paths to solve a problem. |
CSF.20 | Explain various roles and responsibilities for members of a web design and development team. |
CSF.21 | Synthesize common principles and templates for successful project management. |
CSF.22 | Identify the skills that are required to communicate effectively with a client. |
CSF.23 | Identify appropriate writing techniques and style for web publications. |
CSF.24 | Given a specific client’s vision, create a simple website using a content management system. |
CSF.25 | Research various social, legal, and ethical issues encountered by IT professionals: a) Copyright laws, b) Open source software. |
CSF.26 | Organization of Materials: a) Demonstrate effective use of file and folder management techniques to maintain directory structures for a website. |
CSF.27 | Determine security fundamentals on confidentiality, availability, and integrity. |
CSF.28 | Identify various security breaches that can occur with the internet. |
CSF.29 | Enterprise-level security. |
CSF.30 | Encryption. |
CSF.31 | Protocols that can be implemented to secure websites. |
CSF.32 | Compare and contrast personal privacy issues versus employers’ rights to regulate computing resources. |
CSF.33 | Identify various security practices for computer and network systems: a) Controlled access to secure resources and computer resources, b) Encryption techniques, c) Basic input/output systems (BIOS) features, d) Strategies for dealing with malware. |
CSF.34 | Explain why various languages exist. |
CSF.35 | Explain the steps involved in the software development life cycle and why it is iterative. |