Standards in this Framework
| Standard | Description |
|---|---|
| 1.1 | Explain the basics of computing. |
| 1.2 | Identify notational systems. |
| 1.3 | Compare and contrast common units of measure. |
| 1.4 | Explain the troubleshooting methodology. |
| 2.1 | Explain common computing devices and their purposes. |
| 2.2 | Explain the purpose of common internal computing components. |
| 2.3 | Compare and contrast storage types. |
| 2.4 | Given a scenario, install and configure common peripheral devices. |
| 2.5 | Compare and contrast common types of input/output device interfaces. |
| 2.6 | Compare and contrast virtualization and cloud technologies. |
| 2.7 | Compare and contrast common internet service types. |
| 2.8 | Identify basic networking concepts. |
| 2.9 | Explain the basic capabilities of a small wireless network. |
| 3.1 | Identify components of an OS. |
| 3.2 | Explain the purpose of operating systems. |
| 3.3 | Explain the purpose and proper use of software. |
| 3.4 | Given a scenario, configure and use web browser features. |
| 3.5 | Identify common uses of artificial intelligence (AI). |
| 4.1 | Compare and contrast programming language categories. |
| 4.2 | Identify fundamental data types and their characteristics. |
| 4.3 | Explain the purpose and use of programming concepts. |
| 4.4 | Identify programming organizational techniques and logic concepts. |
| 5.1 | Explain the value of data and information. |
| 5.2 | Explain database concepts and the purpose of a database. |
| 5.3 | Compare and contrast various database structures. |
| 5.4 | Explain basic data backup concepts. |
| 6.1 | Explain fundamental security concepts and frameworks. |
| 6.2 | Explain methods to secure devices and security best practices. |
| 6.3 | Explain password best practices. |
| 6.4 | Identify common use cases for encryption. |
| 6.5 | Given a scenario, configure security settings for a small wireless network. |