CTE22.IT.ITF.26
Explain the importance of encryption for data security and describe ways it is commonly used.
Explain the importance of encryption for data security and describe ways it is commonly used.
Explain the importance of encryption for data security and describe ways it is commonly used.
Explain cybersecurity concepts as they relate to a network.
Explain why it is important for businesses to secure and protect their data and describe scenarios which might result in compromised data.
Examples: human error (social engineering, sharing password), physical compromise of devices (spoofing devices)
Compare and contrast notational systems.
Examples: binary, hexadecimal, decimal, ASCII, Unicode
Compare and contrast interpreted, compiled, query, and assembly programming language categories.
Examples: scripting languages, scripted languages, markup languages
Use programming organizational techniques and demonstrate programming procedures.
Examples: scripting languages, scripted languages, markup languages, branching, looping
Explain the purpose and use of programming concepts including identifiers, containers, functions, and objects.
Compare and contrast fundamental data types and their characteristics.
Examples: characters, strings, integers, floats, Boolean
Design a step-by-step plan (algorithm) to solve a given problem.
Example: Recipe for creating brownies from a box mix: Follow the three to five step process written on the back of the box.
Identify decision structures that control program flow.
Examples: Determine the exact output of a program from a flow chart.
Explain techniques for code commenting and documentation.
Example: inserting meta text in source code
Design a program that uses mathematical operations, data, functions, looping and iteration, sequencing, abstraction, lists, and selection.
Examples: if-else statements, comparison, other operators
Gather and interpret research data to predict changes in the information technology labor market.
Incorporate safety procedures in handling, operating, and maintaining tools and machinery; handling materials; utilizing personal protective equipment; maintaining a safe work area; and handling hazardous materials and forces.
Demonstrate effective workplace and employability skills, including communication, awareness of diversity, positive work ethic, problem-solving, time management, and teamwork.
Explore the range of careers available in the field and investigate their educational requirements, and demonstrate job-seeking skills including resume-writing and interviewing.
Advocate and practice safe, legal, responsible, and ethical use of information and technology tools specific to the industry pathway.
Participate in a Career and Technical Student Organization (CTSO) to increase knowledge and skills and to enhance leadership and teamwork.
Use technology to collaborate with peers and/or experts to create digital artifacts that can be published online for a target audience.
Formulate new ideas, solve problems, or create products through the design and engineering process by utilizing testing, prototypes, and user feedback.
Install and configure kernel modules based on given requirements.
Explain the Linux boot process.
Examples: boot loaders, boot options, boot modules and files
Create and ensure an effective network connection in the Linux environment.
Examples: using diagnostic tools to check network connectivity, running network commands in the terminal to show device information such as IP address
Gather and share information on virtualization and cloud solutions in a Linux environment.
Identify and manage storage technologies used in Linux environments.
Examples: file system types, device mapper, tools, file system hierarchy
Configure localization options within the Linux environment.
Examples: file locations, commands, environment variables, character sets
Install and configure software used in the Linux environment based on computer specifications and user’s needs.
Examples: package types, installation tools, build tools, repositories, acquisition commands
Create and manage users and groups in the Linux environment given various sets of criteria.
Examples: creation, modification, profiles, queries, quotas
Create and manage files in the Linux environment, including modifying and redirecting.
Examples: text editors, file and directory operations, output redirection. text processing, file readers
Manage services within Linux based on given scenarios.
Examples: system management, sysVinit
Explain the role of servers in a Linux environment.
Explain the graphical user interfaces available in Linux.
Examples: servers, remote desktop, console redirection, accessibility
Automate and schedule jobs in a Linux environment in given scenarios.
Configure a Linux device in a given scenario.
Examples: use monitoring and configuration tools, hot pluggable devices
Analyze Linux system properties and rectify any system issues in a given scenario.
Examples: monitoring and configuration of network, command line prompt, storage, memory