Introduction to Information Technology



Similar documents
Network Technologies

Information Technology Pathways

Introduction to Information Technology Course Number 10009

Introduction to Education and Training

Computer Programming I & II*

Information Technology Career Cluster Introduction to Digital Technology Course Number

Information Technology Career Cluster Networking Systems and Support Course Number:

Introduction to Law and Public Safety 1

Web Development I & II*

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Manitoba Curriculum Framework of Outcomes. Networking & Cyber Security Grades 9 11

Certified Information Systems Auditor (CISA)

Cisco CCNA Discovery Grades 11-12

Huawei One Net Campus Network Solution

Computer Science 1301 Computer Literacy. Student Learning Outcomes

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

CHAPTER 10: COMPUTER SECURITY AND RISKS

Chapter 5. Data Communication And Internet Technology

Security in Wireless Local Area Network

Information Technology Career Cluster Introduction to Digital Technology Course Number

Adaptive Radio. Cognitive Radio

Progress Record. Course 21 (V) Associate of Applied Science in Computer Information Technology and Systems Management

Chapter 7 Information System Security and Control

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

Computer Information Systems

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

Computer and Information Science

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Course Overview and Outline

INTRODUCTION TO INFORMATION TECHNOLOGY CSIT Class Hours: 3.0 Credit Hours: 4.0 Laboratory Hours: 3.0 Revised: August 24, 2012

Internet threats: steps to security for your small business

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Government and Public Administration Career Cluster Government Public Administration: State and Federal Issues Course Number 29.

Virtual Enterprise International

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

Computers Are Your Future Prentice-Hall, Inc.

Science, Technology, Engineering, Mathematics Career Cluster Foundation of Electronics Course Number

ICTTEN5204A Produce technical solutions from business specifications

Certified Cyber Security Analyst VS-1160

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Ohio Supercomputer Center

Sports and Entertainment Management

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

It provides the performance indicators to evaluate the level of knowledge and competence of teacher to apply ICT in the educational setting.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Introduction Chapter 1. Uses of Computer Networks

One LAR Course Credits: 3. Page 4

Computer Network Engineering

Section 12 MUST BE COMPLETED BY: 4/22

Administrative Management

Depth and Excluded Courses

BOARD OF EDUCATION POLICY

dect provides high protection against unauthorized access

Business Management & Administration Career Cluster Human Resources Principles Course Number:

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

3.28F LICENSED PERSONNEL EMPLOYEE INTERNET USE AGREEMENT

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

Iowa. CONTENT STANDARDS and BENCHMARKS. Business and Administration

CIS 253. Network Security

Research Topics in the National Cyber Security Research Agenda

COURSE OUTLINE Survey of Operating Systems

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

Broadcasting Radio Broadcasting 2

Computer Ethics. (Ethics) Ethics in Computer System (COMPUTER ETHICS AND COMPUTER SECURITY) Computer Ethics and Computer Security

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

CAREER EXPLORATION FIELD STUDY DPC #11913 (10 credits)

Massachusetts Technology Literacy Standards

IT Clinical Internship

Introduction to Basics of Communication Protocol

E-Booking at London International Airport

Mobile Devices and Malicious Code Attack Prevention

Adair County College and Career Readiness Standards 1 Course: Help Desk. Help Desk

Seamless ICT Infrastructure Security.

1.1 Electronic Computers Then and Now

Transportation, Distribution and Logistics Career Cluster Logistics Operations Course Number

COMMERCIAL PHOTOGRAPHY Basic Digital Photography

BUSINESS AND INFORMATION TECHNOLOGY ADVANCED WEB DESIGN GRADES 11-12

Multiplexing on Wireline Telephone Systems

Special Topics in Security and Privacy of Medical Information. Reminders. Last lecture: Recap. Sujata Garera. Project part 1 submission

Security and Risk Analysis of VoIP Networks

Managing Information Resources and IT Security

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

Marketing Career Cluster Marketing Management Course Number

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other:

Georgia Department of Education

Graphic Design 2 Grades 9-12

CASTLE HIGH SCHOOL BUSINESS DEPARTMENT COURSE DESCRIPTIONS

Enabling the secure use of RFID

Business Subject Matter Requirements. Part I: Content Domains for Subject Matter Understanding and Skill in Business

Usages of Selected Antivirus Software in Different Categories of Users in selected Districts

Health Science Career Cluster Surgical Technician I Course Number:

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES FIELD 050: COMPUTER SCIENCE

Transcription:

Introduction to Information Technology Career Cluster Information Technology Course Code 10009 Prerequisite(s) Recommended that a student has taken from the Foundation Courses Computer Applications. Credit.5 Program of Study and Sequence Intro to Information Technology is recommended as a prerequisite for two career pathways in the Information Technology: 1) Programming; 2) Networking and Hardware. Student Organization SkillsUSA Coordinating Work Based Tours, Guest Speakers, Job Shadowing Learning Industry Certifications None Dual Credit or Dual TBD Enrollment Teacher Certification K 12 Educational Technology; K 12 Classroom Technology Resources Course Description: Introduction to Information Technology prepares students with knowledge and background of technology careers, programming, and hardware. This course explores new and emerging technologies for both professional and personal use. Program of Study Application Introduction to Information Technology is recommended as a prerequisite for two pathways: Programming and Networking & Hardware. 1

Course Standards Indicator # IT 1. Understand the need and impact of technology. One IT 1.1 Define the relationship between electronic devices and computers Example: List electronic devices that you have used in the last two weeks and how those devices synchronize with computer technology One IT 1.2 Describe the functional areas in which computers assist people. Example: Explain how computers can assist people Research artificial intelligence Research the impact of social networking through the Internet Explain how technology impacts our entertainment One IT 1.3 Describe how technology is impacting community Research how technology connects people List ways in which etiquette plays a role in technology and communication Research flash mobs and how technology assist this activity One IT 1.4 List physical and mental health dangers associated with computer use Research physical health concerns caused by technology usage Research mental health and addiction caused by technology usage Explain what can be done to avoid health problems 2

Indicator # IT 2. Understand computer hardware required to meet specific needs. One IT 2.1 Understand how computer information is represented. Explain how computers represent data Research the history of binary and machine language Convert decimal to binary and binary to decimal One IT 2.2 Identify hardware components and their relationship to computer usage. Research hardware requirements for five top pieces of software Identify input, output, storage, and processing devices List the computing and hardware needs for your future information technology career Two IT 2.3 Understand different types of memory and storage Explain differences between volatile and non volatile memory Explain differences between magnetic, optical and solid state storage One IT 2.4 Identify input and output devices to meet the needs of users Identify input devices and how they connect to the computer Identify output devices and how they connect to the computer Explain how input and output devices can help individuals with disabilities Research new ideas for input and output devices 3

Two IT 2.5 Understand the decision making process involved in purchasing computer systems Identify a need the computer might solve. Research minimum requirements for software and usage of the computer Research cost of computers at different computer stores to meet the needs of low, middle, and high end users. 4

Indicator # IT 3. Understand software solutions for personal and professional use. Two IT 3.1 Explain how software is created, distributed, installed, and maintained. Explain the difference between system and application software and list examples of each. List the steps to the software development process Research different types of programming languages and identify their differences and what they are used for Discuss software copyright and licensing issues Explain the impact that Freeware, Open Source Software, and Alternative Licensing has on software development One IT 3.2 Describe the functions of system software and operating systems Explain the purpose for system software List major operating systems and their features Two IT 3.3 Describe different types and purposes of productivity software List popular productivity software and its manufacturer Identify what software is needed for different careers Research artificial intelligence software Explain the Turing Test 5

Indicator # IT 4. Understand technology used for the Internet. One IT 4.1 Describe how the Internet developed Research the history of the Internet List major Internet milestones One Two IT 4.2 Explain how hardware, protocols, and software work together to create the Internet Identify hardware used within the Internet infrastructure Identify key Internet protocols and how they transport information Identify the different layers of the open systems interconnection (OSI) model IT 4.3 Explain the underlying structures and technologies used to support the Internet. Explain how a user connects to the Internet Identify different Internet connections and how they differ Explain web basics and how information is created and transmitted 6

Indicator # IT 5. Understand computer network and telecommunications technologies. Career Cluster: Information Technology One IT 5.1 Understand the fundamentals of data communications Identify the types of signals and transmission capacities used in telecommunications One IT 5.2 List the types of media, devices, and software needed for networking services. Identify types of networking media, their differences, and limitations Identify hardware required within a network for data transmission Identify network operating systems and management software Create common networking media One IT 5.3 List and describe the popular forms of wireless technologies Identify types of wireless devices and how they transmit information Explain how cell phones transmit voice and data Explain how GPS devices work and assist people Research the impact radio frequency identification (RFID) has on personal and business applications 7

Indicator # IT 6. Understand the needs and uses for digital media. One IT 6.1 Understand the uses of digital media. Identify common digital formats Covert digital files from one format to another Explain copyright issues regarding digital media Two IT 6.2 Discuss how interactive media is used to educate and entertain. Explain how interactive media is used in education Explain the impact of simulators on training individuals Research interactive media advances in home entertainment. 8

Indicator# IT 7. Understand computer crime and information security. One IT 7.1 Describe methods of keeping electronic devices secure Identity types of machine level security procedures Research the impact of biometrics authentication, e.g. retinal scanning. Two IT 7.2 Discuss the threats and defenses for networks Define multiuser systems and how to protect them Explain common threats to wireless networks Explain how and why it is important to secure wireless networks Research methods on stealing wireless connections Three IT 7.3 Describe the threats posed by hackers, software, scams and the methods of defending against them Research famous hackers and the damage they caused Identify popular methods of attacks Explain the types of viruses and how they are spread Identify key frauds, scams, and hoaxes and how to research validity of information 9

Indicator # IT 8. Understand technology ethics in a global society. Two IT 8.1 Describe the negative and positive impacts of social media Research laws and censorship issues regarding technology Explain content filtering and how it is used Identity technology issues related to freedom of speech Two IT 8.2 Explain the ways in which technology is used to invade personal privacy Research technologies that are considered invasion of personal privacy Research technologies and the digital footprints left by them Research how the Patriot Act has impacted invasion of personal privacy devices One IT 8.3 Identify ethical issues related to digital technology Explain how ethics play a role in personal, professional, and governmental use of technology Discuss the socioeconomic digital divide Discuss accommodations needed to assist individuals with disabilities to access technology 10

Indicator # IT 9. Explore careers in information technology. One IT 9.1 Identify skills, interests, and abilities related to information technology. Job shadowing, guest speakers, and online resources Two Three Two IT 9.2 Compare personal interest survey results with information technology occupations Example: Use South Dakota MyLife to research and compare careers IT 9.3 Research labor market information for information technology. Write a short essay citing demographics, wages and geographical locations IT 9.4 Demonstrate necessary job skills needed for Information and Technology industries Attendance and punctuality Positive attitude Positive work ethic Use of proper social skills Display ability to work as part of team and take direction from others 11

Indicator # IT 10. Demonstrate knowledge of the software development process. IT 10.1 Apply tools for developing software applications Introduce students to an editor to create a program Create Hello World IT 10.2 Demonstrate knowledge of programming structures Use online resources to create and debug a block program. 12