CTE22.IT.EITC.17e
Describe local, state, and national CTSO programs, events, and conferences.
Describe local, state, and national CTSO programs, events, and conferences.
Describe local, state, and national CTSO programs, events, and conferences.
Utilize research to create and present a recruitment video for a selected CTSO that presents interesting facts, describes the benefits of membership, and outlines the leadership, educational, and service opportunities it affords.
Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces.
Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork.
Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing.
Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway.
Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork.
Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience.
Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback.
Investigate and report on the history and evolution of computers.
Identify computer peripherals and common ports related to input and output.
Identify the internal components of a computer and explain their functions.
Examples: central processing unit (CPU), random access memory (RAM), motherboard, hard drive, heat sinks
Locate, disassemble, and reassemble the internal components of a computer.
Diagnose common issues related to computer hardware, utilizing the troubleshooting process.
Describe the binary, hexadecimal, and ASCII notational systems used in computers.
Identify different types of software.
Examples: application software, operating systems, utility software
Compare and contrast different types of operating systems.
Examples: Windows, Linux, Windows server
Describe virtual machines and their purposes.
Contrast command line interface (CLI) and graphical user interface (GUI).
Describe various kinds of software licenses and their uses.
Explain the importance of cybersecurity for individuals, organizations, businesses, and governments.
Compare and contrast various types of malware.
Examples: virus, worm, ransomware
Explain the use of cryptography in ensuring the confidentiality and integrity of both data in transit and data at rest.
Gather and report on historic ciphers used in early cryptography.
Investigate the role of encryption methods in emerging technologies.
Example: quantum computing
Explain the importance of the CIA triad (confidentiality, integrity, and availability) and how it applies to cybersecurity.
Demonstrate effective practices for protecting personal information and securing transactions.
Explain the importance of password security.
Explain system access controls and the difference between authentication and authorization.
Describe various means of accessing a computing system.
Examples: biometrics, key cards, multi-factor authentication
Describe various methods of protecting access to computer systems and data, including physical security and electronic entry systems.
Examples: locked doors, key entry doors, guard, receptionist, mantraps
Describe the concept of a digital footprint.
Describe and discuss online etiquette and safety.
Identify the types of facts about individuals that are considered personally identifiable information (PII).
Explain what types of information should and should not be shared online and on social media.