1.1 |
Compare and contrast notational systems. |
-
10.2 Notational Systems
-
10.3 Data Representation
|
1.2 |
Compare and contrast fundamental data types and their characteristics. |
-
4.1 Programming Concepts
|
1.3 |
Illustrate the basics of computing and processing. |
-
11.2 Peripheral Devices
-
11.4 Storage Options
|
1.4 |
Explain the value of data and information. |
-
2.6 Creative Credit & Copyright
-
8.3 The Value of Data
|
1.5 |
Compare and contrast common units of measure. |
-
7.2 Comparing Operating Systems
-
7.3 Compatibility
|
1.6 |
Explain the troubleshooting methodology. |
-
12.1 Methodology
-
12.2 Support Practice
|
2.1 |
Classify common types of input/output device interfaces. |
-
11.2 Peripheral Devices
-
11.3 Network Devices
|
2.2 |
Given a scenario, set up and install common peripheral devices to a laptop/PC. |
-
11.2 Peripheral Devices
|
2.3 |
Explain the purpose of common internal computing components. |
-
7.2 Comparing Operating Systems
-
7.3 Compatibility
-
11.1 Internal Components
|
2.4 |
Compare and contrast common Internet service types. |
-
11.3 Network Devices
-
11.5 Network Options
|
2.5 |
Compare and contrast storage types. |
-
11.4 Storage Options
|
2.6 |
Compare and contrast common computing devices and their purposes. |
-
1.2 What is Cybersecurity?
|
2.7 |
Explain basic networking concepts. |
-
11.3 Network Devices
-
11.5 Network Options
|
2.8 |
Given a scenario, install, configure and secure a basic wireless network. |
-
11.5 Network Options
-
12.2 Support Practice
|
3.1 |
Explain the purpose of operating systems. |
-
7.1 Operating Systems
|
3.2 |
Compare and contrast components of an operating system. |
-
7.2 Comparing Operating Systems
-
7.3 Compatibility
|
3.3 |
Explain the purpose and proper use of software. |
-
7.4 Software and Applications
-
7.5 Software Licenses
|
3.4 |
Explain methods of application architecture and delivery models. |
-
7.4 Software and Applications
-
7.5 Software Licenses
|
3.5 |
Given a scenario, configure and use web browsers. |
-
7.7 Browser Configuration
|
3.6 |
Compare and contrast general application concepts and uses. |
-
7.4 Software and Applications
-
7.5 Software Licenses
|
4.1 |
Compare and contrast programming language categories. |
-
4.1 Programming Concepts
|
4.2 |
Given a scenario, use programming organizational techniques and interpret logic. |
-
4.2 Programming with Karel
-
4.3 Looping
-
4.4 Branching
-
4.6 Organizational Techniques
|
4.3 |
Explain the purpose and use of programming concepts. |
-
4.1 Programming Concepts
-
4.5 Arrays and Objects
|
5.1 |
Explain database concepts and the purpose of a database. |
-
8.4 Databases
-
8.6 What is SQL?
-
8.7 Basic Querying in SQL
-
8.8 Filtering Queries in SQL
|
5.2 |
Compare and contrast various database structures. |
-
8.7 Basic Querying in SQL
-
8.8 Filtering Queries in SQL
-
8.10 SQL Injection Overview
-
8.11 Types of SQLi and Prevention
|
5.3 |
Summarize methods used to interface with databases. |
-
8.4 Databases
-
8.7 Basic Querying in SQL
-
8.8 Filtering Queries in SQL
|
6.1 |
Summarize confidentiality, integrity and availability concerns. |
-
1.4 The CIA Triad
-
5.1 Cryptography, Cryptology, Cryptanalysis
|
6.2 |
Explain methods to secure devices and best practices. |
-
7.6 Application Security
|
6.3 |
Summarize behavioral security concepts. |
-
2.1 Digital Footprint and Reputation
-
2.3 Internet Safety
-
2.4 Privacy & Security
|
6.4 |
Compare and contrast authentication, authorization, accounting and non-repudiation concepts. |
-
1.4 The CIA Triad
-
7.8 System Administration
|
6.5 |
Explain password best practices. |
-
2.4 Privacy & Security
|
6.6 |
Explain common uses of encryption. |
-
5.1 Cryptography, Cryptology, Cryptanalysis
-
5.2 History of Cryptography
-
6.1 Project: Classic Cipher Newscast
|
6.7 |
Explain business continuity concepts. |
-
10.7 Routing
-
11.4 Storage Options
|