Standards in this Framework
| Standard | Description |
|---|---|
| A.1 | Identify major causes of work-related accidents in offices. |
| A.2 | Demonstrate appropriate ergonomic practices. |
| A.3 | Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks. |
| A.4 | Identify potential abuse and unethical uses of computers and networks. |
| A.5 | Explain the consequences of illegal, social, and unethical uses of information technologies (e.g., piracy; illegal downloading; licensing infringement; and inappropriate uses of software, hardware, and mobile devices). |
| A.6 | Differentiate between freeware, shareware, and public domain software copyrights. |
| A.7 | Discuss computer crimes, terms of use, and legal issues such as copyright laws, fair use laws, and ethics pertaining to scanned and downloaded clip art images, Creative Commons, photographs, documents, video, recorded sounds and music, trademarks, and other elements for use in Web publications. |
| A.8 | Identify netiquette including the use of email, social networking, blogs, texting, and chatting. |
| A.9 | Describe ethical and legal practices in business professions such as safeguarding the confidentiality of business-related information. |
| A.10 | Discuss the importance of cyber safety and the impact of cyber bullying. |
| B.1 | Identify the purpose and goals of a Career and Technology Student Organization (CTSO). |
| B.2 | Explain how CTSOs are integral parts of specific clusters, majors, and/or courses. |
| B.3 | Explain the benefits and responsibilities of being a member of a CTSO. |
| B.4 | List leadership opportunities that are available to students through participation in CTSO conferences, competitions, community service, philanthropy, and other activities. |
| B.5 | Explain how participation in CTSOs can promote lifelong benefits in other professional and civic organizations. |
| C.1 | Demonstrate proficiency and skills associated with the use of technologies that are common to a specific occupation. |
| C.2 | Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes. |
| C.3 | Identify potential abuse and unethical uses of laptops, tablets, computers, and/or networks. |
| C.4 | Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; cyberbullying, illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment). |
| C.5 | Discuss legal issues and the terms of use related to copyright laws, fair use laws, Creative Commons, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal and professional use. |
| C.6 | Describe ethical and legal practices of safeguarding the confidentiality of business-related information. |
| C.7 | Describe possible threats to a laptop, tablet, computer, and/or network and methods of avoiding attacks. |
| D.1 | Demonstrate creativity and innovation. |
| D.2 | Demonstrate critical thinking and problem-solving skills. |
| D.3 | Demonstrate initiative and self-direction. |
| D.4 | Demonstrate integrity. |
| D.5 | Demonstrate work ethic. |
| D.6 | Demonstrate conflict resolution skills. |
| D.7 | Demonstrate listening and speaking skills. |
| D.8 | Demonstrate respect for diversity. |
| D.9 | Demonstrate customer service orientation. |
| D.10 | Demonstrate teamwork. |
| E.1 | Demonstrate global or “big picture” thinking. |
| E.2 | Demonstrate career and life management skills and goal-making. |
| E.3 | Demonstrate continuous learning and adaptability skills to changing job requirements. |
| E.4 | Demonstrate time and resource management skills. |
| E.5 | Demonstrates information literacy skills. |
| E.6 | Demonstrates information security skills. |
| E.7 | Demonstrates information technology skills. |
| E.8 | Demonstrates knowledge and use of job-specific tools and technologies. |
| E.9 | Demonstrate job-specific mathematics skills. |
| E.10 | Demonstrates professionalism in the workplace. |
| E.11 | Demonstrate reading and writing skills. |
| E.12 | Demonstrates workplace safety. |
| F.1 | Compare and contrast notational systems (e.g., binary, hexadecimal, ASCII, unicode). |
| F.2 | Compare and contrast fundamental data types and their characteristics. |
| F.3 | Illustrate the basics of computing and processing. |
| F.4 | Explain the value of data and information. |
| F.5 | Compare and contrast common units of measure (e.g., bit/byte, KB, MB, GB). |
| F.6 | Explain the troubleshooting methodology. |
| G.1 | Classify common types of input/output device interfaces (e.g., networking, peripheral device, graphic device). |
| G.2 | Design efficient device placement to create optimum airflow, humidity, temperature, and dust accumulation. |
| G.3 | Differentiate various computer connector/ports, (e.g., video, eSATA, thunderbolt, USB, HDMI, ethernet, RJ-45, RJ-11, audio, and power). |
| G.4 | Set up and install peripheral devices to a laptop or PC. |
| G.5 | Identify the primary causes of electrostatic discharge and ways to mitigate the effects of ESD on electronic devices. |
| G.6 | Identify situations where various power peripherals should be used (e.g., UPS, surge protector, power strip). |
| G.7 | Explain the purpose of common internal computing components (e.g., motherboard/system board, RAM, CPU, storage, NIC). |
| G.8 | Compare and contrast common Internet service types (e.g., fiber optic, cable, DSL). |
| G.9 | Compare and contrast storage types (e.g., volatile vs. non-volatile, local storage types, local network storage types, cloud storage). |
| G.10 | Compare and contrast common computing devices and their purposes (e.g., mobile phones. gaming consoles, IoT (internet of things), security systems, IP (internet protocol) camera). |
| G.11 | Explain basic networking concepts (e.g., DNS, LAN vs WAN, IP address, HTTP/S, POP, IMAP, SMTP, modem, switch, firewall, VOIP). |
| G.12 | Explain the basic features and functions of wireless devices (e.g., airdrop, unlocking/security, bluetooth pairing, wireless connection setup, mail configuration, airplane mode). |
| G.13 | Configure and secure a basic wireless network. |
| G.14 | Describe Material Safety Data Sheets (MSDS). |
| H.1 | Explain the purpose of operating systems. |
| H.2 | Compare and contrast common mobile and desktop operating systems and their functions and features for Android, Linux, iOS, Windows, and Chrome OS. |
| H.3 | Compare and contrast components of an operating system (e.g., File systems and features, File management, Services, Processes, Drivers, Utilities, Interfaces). |
| H.4 | Explain the purpose and proper use of software (e.g., Productivity software, Collaboration Software, Business software, virtualization, open source). |
| H.5 | Describe software compatibility in relationship to operating systems. |
| H.6 | Identify common file types and their extensions (e.g., documents, audio, images, video, executables, and compression formats). |
| H.7 | Explain methods of application architecture and delivery models (e.g., Application delivery methods, Network required, Application architecture). |
| H.8 | Given a scenario, configure and use web browsers. |
| H.9 | Compare and contrast general application concepts and uses. |
| I.1 | Compare and contrast programming language categories. |
| I.2 | Use programing organizational techniques and interpret logic. |
| I.3 | Explain the purpose and use of programming concepts. |
| J.1 | Explain database concepts and the purpose of a database. |
| J.2 | Compare and contrast various database structures (e.g., structured vs. semi-structured vs. non-structured, relational databases, non-relational databases). |
| J.3 | Summarize methods used to interface with databases (e.g., relational methods such as data manipulation or data definition, database access methods, export/import). |
| K.1 | Research and discuss common security threats found in IT. |
| K.2 | Summarize confidentiality, integrity and availability concerns (e.g., confidentiality, integrity, availability concerns). |
| K.3 | Explain methods to secure devices and best practices (e.g., antivirus software, enabling passwords, validating legitimate sources, removal of malicious software). |
| K.4 | Summarize methods and concepts used in IT behavioral security concepts. a. Expectations of privacy when using various computing applications or devices b. Acceptable Use Policy and Procedures c. Handlings of confidential information |
| K.5 | Compare and contrast authentication, non-repudiation, authorization, and accounting concepts (e.g., biometrics, video, digital signatures). |
| K.6 | Explain password best practices (e.g., length, complexity). |
| K.7 | Explain common uses of encryption (e.g., HTTPS, VPN). |
| K.8 | Explain business continuity concepts (e.g., disaster recovery, redundancy, data backup, contingency plans). |
| L.1 | Research the field of emerging technologies. |
| L.2 | Identify the following emerging technologies and their purpose (e.g., AR/VR, Artificial Intelligence, blockchain, chatbots, cloud computing, dynamic network analysis, gesturebased interaction, marketing automation, podcasting, predictive analytic, predictive sales, streaming media (audio/video), telepresence ). |
| L.3 | Research and present an emerging technology to solve a real-world problem. |
| M.1 | Apply strategies for identifying routine hardware and software problems current to everyday life. |
| M.2 | Identify compatibility issues and describe operational problems caused by hardware errors. |
| M.3 | Explain how technology can be used to solve problems. |
| M.4 | Explain the software development process used to solve problems. |
| M.5 | Explore commonly used documentation tools for design specifications (e.g., flowcharts, visual and textual storyboards). |
| N.1 | Compare and contrast careers in IT/IS with their education, training requirements, industry certifications and salary ranges. |
| N.2 | Describe how computing enhances other career fields. |
| N.3 | Connect with colleges and companies by using various networking platforms. |