130.272. Principles of Information Technology a. General requirements. This course is recommended for students in Grades 9-10. Introduction to Computers & Information Technology 1 Introduction. Students develop computer literacy skills to adapt to emerging technologies used in the global marketplace. Students implement personal and interpersonal skills to prepare for a rapidly evolving workplace environment. Students enhance reading, writing, computing, b. communication, and reasoning skills and apply them to the information technology environment. c. Knowledge and skills. The student demonstrates the necessary skills for career development, employability, and successful completion of course outcomes. The student is expected to: identify and demonstrate positive work behaviors that enhance employability and job advancement such as regular attendance, promptness, attention to proper attire, maintenance of a clean and safe work A. environment, appropriate voice, and pride in work; App. D pp. D-7-D-8, D-10-D-12 B. identify and demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, listening attentively to speakers, and willingness to learn new knowledge and skills; C. employ effective reading and writing skills; D. employ effective verbal and nonverbal communication skill; E. solve problems and think critically; F. demonstrate leadership skills and function effectively as a team member; G. identify and implement proper safety procedures; App. C p. C-14, App. D pp. D-7-D-8 Word-Processing Activity 5 p. 162, Presentation Activity 2 p. 286 Presentation Activities 1-2, pp. 285-286, App. C pp. C-7-C-9 Spreadsheet Activity 3 p. 195, Database Activity 3 p. 227, App. C pp. C-4-C-5, C-7 App. C pp. C-9-C-10, C-14, Web Activity 3 p. 420 Ch. 2 p. 17, Ch. 3 p. 30, App. B pp. B-2-B-7, App. D pp. D-11-D-12 Texas Principles of Information Technology 1
2 demonstrate an understanding of legal and ethical responsibilities in relation to the field of information H. technology; and I. demonstrate planning and time-management skills such as project management and storyboarding. The student identifies various employment opportunities in the information technology field. The student is expected to: A. identify job opportunities and accompanying job duties and tasks; research careers of personal interest along with the education, job skills, and experience required to B. achieve personal career goals; and C. describe understanding of the functions of resumés and portfolios. Ch. 9 p. 108, Ch. 10 p. 117, Ch. 34 pp. 464-466, Word-Processing Activity 3 p. 160, Web Activity 1 p. 417 App. C pp. C-6, C-13, Spreadsheet Activity 4-5, pp. 196-199 "Career Corner" features, App. D pp. D-2, D-4-D-5 Presentation Activity 3 pp. 287-288 Operating System Activity 4 p. 96, App. D pp. D-9-D-10, D-12 3 The student uses emerging technologies to exchange information. The student is expected to: Ch. 4 pp. 42-43, Ch. 6 pp. 68-69, "Real-World Tech" features, Presentation Activity 4, pp. 288- A. identify and describe functions of various new and emerging technologies; 289 send and receive text information and file attachments using electronic methods such as email, electronic E-mail Activities 1-3 pp. 444-447, B. bulletin boards, and instant message services; App. C p. C-13 demonstrate effective Internet search strategies, including keywords and Boolean logic using various Ch. 29 p. 396, Ch. 30 pp. 409-410, C. available search engines; Web Activity 1 p. 417 D. dissect and identify the various components of a Uniform Resource Locator; Ch. 29 p. 394 demonstrate ability to effectively test acquired information from the Internet for accuracy, relevance, and Ch. 30 pp. 410-411, Database E. validity; Activities 2-3 pp. 226-227 Ch. 27 p. 376, Ch. 31 p. 429, Ch. explain issues concerning Internet security protocols such as computer viruses, online predators, hacking, 32 pp. 440-441, Ch. 33 pp. 454- F. and identity theft; 455, App. C p. C-13 define and identify unethical practices such as hacking, phone fraud, online piracy, and data vandalism; Ch. 33 pp. 454-455, 457, App. C p. G. and C-13 Texas Principles of Information Technology 2
4 H. demonstrate ethical use of Internet and online resources, including citation of source. The student demonstrates knowledge of the hardware components associated with information systems. The student is expected to: Ch. 34 pp. 464-466, Web Activity 1 p. 417 5 A. identify the different computer classifications such as minicomputer, mainframe, and microcomputer; Ch. 2 pp. 22-24 identify major hardware components and their functions such as the central processor unit, input and B. output peripherals, and storage systems and devices; Ch. 1 pp. 7-9, Ch. 2 pp. 16-17 Ch. 10 pp. 118-119, Operating C. use available reference tools such as user manuals, both online and written, as appropriate; System Activity 6 p. 98 D. demonstrate understanding of the process of connecting peripheral devices; and Ch. 1 p. 9 Operating System Activity 4 p. 96, demonstrate proficiency in the use of a variety of input devices such as mouse, keyboard, microphone, Multimedia Activities 3, 5 pp. E. digital camera, printer, scanner, and optical disk reader. 315,317, App. A p. A-15 The student demonstrates knowledge of the different software associated with information systems. The student is expected to: A. differentiate between systems and application software; Ch. 1 pp. 11-12 B. identify and understand major operating system fundamentals and components; Ch. 7 pp. 74-79 C. identify the function and operation of compilers and interpreters; Ch. 2 p. 19 D. identify various computer languages and how the languages are used in software development; Ch. 2 pp. 18-19 recognize data representation in software development such as string, numeric, character, integer, and E. date; Ch. 2 p. 19 F. demonstrate understanding of file extensions and the purpose of file types across software products; Ch. 8 pp.88-89 G. recognize computer numbering systems and internal data representation; Ch. 1 pp. 4-5, Ch. 2 p. 18 H. identify appropriate use of application software; Ch. 9 p. 102 I. identify new and emerging classes of software; Ch. 9 pp. 103-104 J. identify open source and proprietary licenses; Ch. 9 pp. 106-108 Operating System Activities 1-3 K. demonstrate proper use of system management tools; and pp. 93-95 demonstrate proper file management techniques such as creating, naming, organizing, copying, moving, L. and deleting files. Operating System Activity 1 p. 93 Texas Principles of Information Technology 3
6 The student analyzes network systems. The student is expected to: identify hardware associated with telecommunications and data networking such as servers, routers, Ch. 25 pp. 344, 347-349, 351, Ch. A. switches, hubs, and network connectors; 26 pp. 360-361 identify and describe various types of networks such as peer-to-peer, local area networks, wide area Ch. 25 pp. 347-348, 350, Ch. 26 B. networks, wireless token ring, and Ethernet; pp. 360-361 C. identify and describe functions of network operating systems; and Ch. 25 p. 349 D. explain troubleshooting techniques for various network connection issues. App. A p. A-13 7 The student applies word-processing technology. The student is expected to: Ch. 9-12 Key Terms pp. 102, 106, 109, 116, 118, 121, 128, 131, 134, A. identify the terminology associated with word-processing software and its functions; 137, 144, 147, 153 B. improve the touch-system skill using the keyboard and keypad to input data; App. B pp. B-8-B-37 C. edit a variety of text documents using functions such as pagination, appropriate white space, tab settings, and font style, size, and color; Word-Processing Activities 1-3 pp. 158-160 D. create professional letters using advanced word-processing features; Word-Processing Activity 4 p. 161 apply formatting techniques to a multipage research paper using approved publication standards such as Ch. 12 p. 145, Web Activity 2 pp. E. American Psychological Association and Modern Language Association; 419-420 produce desktop publishing documents incorporating both text and graphics such as business cards, Word-Processing Activities 1, 5 F. newsletters with mastheads, and advertisement flyers; and pp. 158, 162 Ch. 12 p. 155, Word-Processing Activity 3 p. 160, App. A pp. A-39- G. demonstrate file protection and security. A-40 8 The student applies spreadsheet technology. The student is expected to: A. identify the terminology associated with spreadsheet software and its functions; format and organize numerical content to perform mathematical processes such as addition, subtraction, B. multiplication, and division; percentages and decimals; and order of operations principle; employ both student-created formulas and preprogrammed functions to produce documents such as C. budget, payroll, statistical tables, and personal checkbook register; Ch. 9-10, 13-14 Key Terms pp. 102, 106, 109, 116, 118, 121, 164, 167, 170, 173, 180, 183, 185, 188 Ch. 13 pp. 170-172, Spreadsheet Activities 2, 4 pp. 194, 196-197 Spreadsheet Activities 2, 4 pp. 194, 196-197 Texas Principles of Information Technology 4
create and analyze spreadsheets incorporating advanced features such as lookup tables, nested IF D. statements, subtotals, cell protection, conditional formatting, charts, and graphs; and edit a variety of spreadsheets by performing data management procedures using simple and multiple E. search parameters to locate, sort, search, and filter data. 9 The student applies database technology. The student is expected to: Ch. 13 p. 169, Ch. 14 pp. 184, 188-190, Spreadsheet Activities 2, 4-5, 7 pp. 194, 196-200 Spreadsheet Activities 3, 5 pp. 195, 198-199 Ch. 9-10, 15-16 Key Terms pp. 102, 106, 109, 116, 118, 121, 202, A. identify the terminology associated with database software and its functions; 205, 208, 214, 217, 220 B. create, populate, edit, maintain, and save database files; Database Activity 1 p. 225 C. differentiate the nature and interrelationships of fields and records; Ch. 15 p. 202 perform data management procedures such as locating, sorting, searching, querying, organizing, and D. outputting data; Ch. 15 pp. 209-210, Database Activities 2-3, pp. 226-227 E. use data management procedures using multiple search parameters; and Database Activity 3, p. 227 Database Activities 3-4, pp. 227- F. produce organized reports with calculated figures. 228 10 The student applies presentation management technology. The student is expected to: Ch. 19-20 Key Terms pp. 262, 265, A. identify the terminology associated with presentation software and its functions; 274, 277, 280 Presentation Activity 2 pp. 285- B. create, save, edit, and produce presentations with appropriate handouts and speaker notes; and 286 Presentation Activity 4 p. 288, C. create a non-linear presentation incorporating links, hyperlinks, audio, and graphics. Multimedia Activity 3 p. 315 11 The student applies design and web publishing techniques. The student is expected to: A. identify the terminology associated with web page editing software and its functions; Ch. 30 pp. 406-408 Ch. 21-22 Key Terms pp. 292, 295, B. identify the terminology associated with interactive media; 298, 304, 306, 308 C. identify and describe design principles such as contrast, repetition, alignment, and proximity; Ch. 17 pp. 238-239 D. identify and describe types and styles of typeface used for publications such as serif and sans serif; and Ch. 11 p. 135 E. create a web page containing links, graphics, and text. Web Activity 5 p. 422 Texas Principles of Information Technology 5
12 The student understands and demonstrates legal and ethical procedures as they apply to the use of information technology. The student is expected to: Word-Processing Activity 3 p. A. demonstrate ethical use of online resources; 160, Web Activity 1 pp. 417-418 B. adhere to copyright rules and regulations; Web Activity 1 pp. 417-418 C. differentiate between copyright and trademarks; Ch. 34 p. 465 D. explain the concept of intellectual property; Ch. 34 p. 465 E. examine the consequences of plagiarism; and Ch. 34 pp. 464-465 F. describe the function of a non-disclosure agreement. Ch. 34 p. 465 Texas Principles of Information Technology 6