Checkfu

Standard set

Computer Systems

CTE (2020-)Grades 11, 10CSP ID: 7F04837D00D949AFA7035E4273ADA9ECStandards: 210

Standards

Showing 210 of 210 standards.

Filter by depth

Depth 0

Safety

Depth 0

Career Exploration

Depth 0

Hardware

Depth 0

Operating Systems

Depth 0

Safe Mode and Command Prompt 

Depth 0

Preventative Maintenance Procedures

Depth 0

Security

Depth 0

Networking

Depth 0

Servers

Depth 0

Printers and Peripheral Devices 

Depth 0

Laptops

Depth 0

Mobile Devices

Depth 0

Troubleshooting

Depth 0

Customer Service and Client Relations

1

Depth 1

Accurately read, interpret, and demonstrate adherence to safety rules, including rules published by the (1) National Science Teachers Association (NSTA), (2) rules pertaining to electrical safety, (3) Internet safety, (4) Occupational Safety and Health Administration (OSHA) guidelines, and (5) state and national code requirements. Be able to distinguish between rules and explain why certain rules apply.

2

Depth 1

Identify and explain the intended use of safety equipment available in the classroom. For example, demonstrate how to properly inspect, use, and maintain safe operating procedures with tools and equipment. 

3

Depth 1

Explore the types of technical certifications recognized in the information technology (IT) industry. Write a brief paper that distinguishes between vendor neutral and vendor specific certifications, providing examples of each. Explain why earning technical certification is advantageous to IT professionals. Cite evidence from technical literature and industry standards to support claims. 

4

Depth 1

Locate and access the Computer Technology Industry Association (CompTIA) website and analyze its structure, policies, and requirements for CompTIA A+ certification. Identify what steps are required to obtain the certification, and explain how to prepare for the examination. 

5

Depth 1

Research the following storage devices and backup media. Create a table or other graphic organizer that lists examples of each device and details their purpose, characteristics, and proper maintenance. Demonstrate proper installation and configuration of each device while using the appropriate media.

6

Depth 1

Identify and explain the following motherboard components. Citing specific examples, write a brief paper differentiating between the components and describing the purpose, properties, and characteristics of each.

7

Depth 1

Given an assignment with defined hardware specifications, identify the appropriate power supply. Noting the following technical components, write a text explaining the various types of power supply that were considered. Citing specific evidence, explain the characteristics of each and how the final selection was determined. Install the appropriate power supply.

8

Depth 1

Explore various types of central processing units (CPU). Describe the following characteristics of the CPU types. Identify appropriate cooling methods (e.g., heat sink, fans, thermal paste, liquidbased) for each type discussed and justify the selection with supporting evidence.

9

Depth 1

Investigate the following memory types. Create a table or other graphic organizer that describes, compares, and contrasts each type. Explain the memory compatibility and speed, as well as the appropriate application of each memory type. Cite evidence supporting each application prescribed. 

10

Depth 1

Research the features and requirements of Microsoft operating systems. Write a brief paper that compares and contrasts the operating systems. Drawing on multiple resources, explain why it is important to know this information when installing and configuring an operating system. 

11

Depth 1

Identify and explain various alternatives to install and configure an operating system. For a given assignment, install and configure an operating system by selecting the most appropriate method. Upon completion of the work, write an explanation and justify the actions by citing supporting evidence from technical manuals and industry standards. The explanation should include, but is not limited to, information on the following: 

12

Depth 1

Demonstrate an understanding of how to apply the following command line tools to identify problems with networking and operating systems. For a given assignment, follow the multistep process to execute an appropriate command and justify why it was selected to perform a specific action.

13

Depth 1

Demonstrate the proper selection and use of the following operating system features and tools. For a given assignment, explain the selection of the tools and the results. 

14

Depth 1

Demonstrate the proper application of the following control panel utilities that are common to all Microsoft operating systems, as well as those specific to unique Windows operating systems. Write a text describing the utilities and explain the results of the various applications. 

15

Depth 1

Identify and describe the differences among the following basic operating system security settings. Write a brief paper that discusses when each setting is most applicable. Provide specific examples to support the claims.

16

Depth 1

Demonstrate an understanding and application of safe mode versus the command prompt. Describe specific scenarios when the safe mode should be used to solve a problem, as well as provide specific examples of the types of tasks that can be completed using the command prompt. Also, describe when the safe mode should be used with the command prompt. For example, safe mode can be used to solve problems with corrupted and/or malicious applications. 

17

Depth 1

Create and execute a plan for preventative maintenance for a computer system. The plan should include a schedule and description of the following procedures. Write a justification that explains to a client why preventative maintenance is important.

18

Depth 1

Research and describe the most common security threats to computer systems, such as social engineering, malware, phishing, viruses, etc. Investigate and distinguish among the following common prevention methods to secure a computer system. For a given scenario, identify the most applicable best practice to secure a workstation as well as describe methods for data destruction and disposal. Implement these practices and write a justification for each scenario solution. Provide supporting evidence for each solution, drawing on technical texts and industry standards. Prevention methods include:

19

Depth 1

Identify and describe the following fundamental principles of a small office / home office (SOHO) network (wireless and wired router). 

20

Depth 1

Given scenarios for both wired and wireless small office home office (SOHO) networks, develop and execute an appropriate plan to secure the network. The plan should address, but is not limited, to the following:

21

Depth 1

Create a document that explains the purpose and components of a server. Include descriptions of the various types of servers (e.g., file, email, web, etc.) and the hardware specifications required to support each type. Using multiple resources, cite evidence to support the information identified and discussed. For example, a file server used in a home office will not require as much RAM (random access memory) as one that supports a large office building.

22

Depth 1

Explore and distinguish among the following printer types. Briefly describe their similarities and differences, as well as the imaging process required for applicable printer types. Explain why it is important to know this information when installing and configuring printers. 

23

Depth 1

For a given assignment, write and execute a plan to install, configure, and maintain a printer that is most appropriate for each of the following example situations. Explain and justify the selection with supporting evidence from technical manuals and computer systems texts.

24

Depth 1

Distinguish among and describe the following peripheral devices commonly found in computer systems. Install and configure these devices conforming to technical manuals and industry standards.

25

Depth 1

Identify and explain the following laptop components. Citing specific examples, write a brief paper differentiating between the components and describing the purpose, properties, characteristics, and proper maintenance of each. Demonstrate proper installation and configuration of each component. For example, replace an optical drive in a laptop.

26

Depth 1

Compare and contrast the following components within the display of a laptop and the laptop features. Citing specific examples, write a brief paper differentiating between the components and describing the purpose and characteristics of each. Demonstrate the execution of the features. For example, turn on the keyboard back light.

27

Depth 1

Explore the following basic features of mobile operating systems. Write a brief paper that compares and contrasts these systems on the following features. Drawing on multiple resources, explain why it is important to know this information when installing and configuring an operating system. 

28

Depth 1

Research and describe the most common security threats related to mobile devices. Investigate and distinguish among the following common prevention methods to secure a mobile device. 

29

Depth 1

Investigate a simple problem and create a flowchart, or other graphic illustration, that explains the following steps representing a general troubleshooting theory. 

30

Depth 1

Given a problem related to the following components, follow the troubleshooting theory using appropriate tools. Identify the problem and document the findings and resolution. Include an explanation of the common symptoms, diagnostic procedures, and specific tools used that led to the problem resolution. 

31

Depth 1

Compare and contrast the processes of servicing customers on the phone, online, on-site, or in a shop. Based on the findings, write a brief description of how to service a customer in each of these situations. Include the following in the description:

5.a

Depth 2

Optical drives 

5.b

Depth 2

Combo drives and burners

5.c

Depth 2

Connection types

5.d

Depth 2

Hard drives

5.e

Depth 2

Solid state / flash drives

5.f

Depth 2

RAID types

5.g

Depth 2

Floppy drive

5.h

Depth 2

Tape drive

5.i

Depth 2

Media capacity

6.a

Depth 2

Expansion slots

6.b

Depth 2

RAM slots

6.c

Depth 2

CPU sockets

6.d

Depth 2

Chipsets

6.e

Depth 2

Jumpers

6.f

Depth 2

Power connections and types

6.g

Depth 2

Fan connectors 

6.h

Depth 2

Front panel connectors

6.i

Depth 2

Bus speeds

7.a

Depth 2

Connector types and their voltages

7.b

Depth 2

Specifications (e.g., wattage, size, number of connectors, etc.)

7.c

Depth 2

Dual voltage options

8.a

Depth 2

Speeds

8.b

Depth 2

Cores

8.c

Depth 2

Cache size/type 

8.d

Depth 2

Hyperthreading

8.e

Depth 2

Virtualization support

8.f

Depth 2

Architecture (32-bit vs 64-bit)

8.g

Depth 2

Integrated GPU

9.a

Depth 2

DDR

9.b

Depth 2

DDR2

9.c

Depth 2

DDR3

9.d

Depth 2

SDRAM

9.e

Depth 2

SODIMM

9.f

Depth 2

RAMBUS

9.g

Depth 2

DIMM

9.h

Depth 2

Parity vs. non-parity

9.i

Depth 2

ECC vs. non ECC

9.j

Depth 2

RAM configurations

9.k

Depth 2

Single sided vs. double sided

11.a

Depth 2

Boot methods (e.g., USB, CD-ROM, DVD, PXE)

11.b

Depth 2

Type of installations (e.g., creating image, unattended installation, upgrade, multiboot, etc.) 

11.c

Depth 2

Partitioning (e.g., dynamic, basic, primary, extended, logical) 

11.d

Depth 2

File system types/formatting (e.g., FAT, FAT32, NTFS, CDFS, quick format vs. full format)

11.e

Depth 2

Loading alternate third party drivers

11.f

Depth 2

Workgroup vs. Domain group

11.g

Depth 2

Driver installation

11.h

Depth 2

Factory recovery partition

12.a

Depth 2

Networking (e.g., PING, TRACERT, NETSTAT, IPCONFIG, NET, NSLOOKUP, NBTSTAT) 

12.b

Depth 2

Operating system (e.g., TASKKILL, BOOTREC, SHUTDOWN, TASKLIST, MD, RD, CD, DEL, FORMAT, COPY, XCOPY, ROBOCOPY, DISKPART, SFC, CHKDSK)

13.a

Depth 2

Administrative (e.g., local security policy, Windows firewall, performance monitor, etc.)

13.b

Depth 2

MSCONFIG (e.g., general, boot, services, startup, and tools)

13.c

Depth 2

Task Manager (e.g., applications, processes, performance, networking, users)

13.d

Depth 2

Disk management (e.g., drive status, mounting, extending partitions, splitting, adding drives, adding arrays, etc.)

13.e

Depth 2

Command line utilities (e.g., MSCONFIG, REGEDIT, CMD, SERVICES.MSC, MMC, MSTSC, NOTEPAD, EXPLORER, MSINFO32, DXDIAG)

14.a

Depth 2

Internet options (e.g., connections, security, general, privacy, programs, advanced)

14.b

Depth 2

Display/Display settings

14.c

Depth 2

User accounts

14.d

Depth 2

Folder options (e.g., view hidden files, hide extensions, general options, view options)

14.e

Depth 2

System (e.g., performance, remote settings, system protection)

14.f

Depth 2

Windows firewall

14.g

Depth 2

Power options (e.g., hibernate, power plans, sleep/suspend, standby)

15.a

Depth 2

User and groups (e.g., administrator, power user, guest, standard user) 

15.b

Depth 2

NTFS vs. share permissions (e.g., allow vs. deny, moving vs. copying file folders and files, file attributes) 

15.c

Depth 2

Shared files and folders (e.g., administrative vs. local folders, permission propagation, inheritance)

15.d

Depth 2

System files and folders

15.e

Depth 2

User authentication (e.g., single sign-on)

17.a

Depth 2

Backup

17.b

Depth 2

Check disk 

17.c

Depth 2

Defragmentation

17.d

Depth 2

Windows updates

17.e

Depth 2

Patch management

17.f

Depth 2

Driver/firmware updates

17.g

Depth 2

Antivirus updates

18.a

Depth 2

Physical security (e.g., lock doors, tailgating, biometrics, badges, key fobs, retinal, etc.)

18.b

Depth 2

Digital security (e.g., antivirus, firewalls, antispyware, user authentication, etc.)

18.c

Depth 2

User education

18.d

Depth 2

Principles of least privilege

19.a

Depth 2

MAC filtering

19.b

Depth 2

Channels (1 -11)

19.c

Depth 2

Port forwarding, port triggering

19.d

Depth 2

SSID broadcase (on/off)

19.e

Depth 2

Wireless encryption

19.f

Depth 2

Firewall

19.g

Depth 2

DHCP (on/off) 

19.h

Depth 2

DMZ

20.a

Depth 2

Wireless network

20.b

Depth 2

Wired network 

22.a

Depth 2

Laser

22.b

Depth 2

Inkjet

22.c

Depth 2

Thermal 

22.d

Depth 2

Impact

23.a

Depth 2

Installing and configuring onto a specific operating system

23.b

Depth 2

Print device sharing (e.g., wired, wireless, printer hardware print server) 

23.c

Depth 2

Printer sharing (e.g., via operating system settings)

24.a

Depth 2

Input devices (e.g., mouse, keyboard, touch screen, scanner, barcode reader, etc.)

24.b

Depth 2

Multimedia devices (e.g., digital cameras, microphone, webcam, camcorder, MIDI enabled devices) 

24.c

Depth 2

Output devices (e.g., printers, speakers, display devices)

25.a

Depth 2

Expansion options (e.g., express card, PCMIA, SODIMM, flash)

25.b

Depth 2

Keyboard

25.c

Depth 2

Hard drive

25.d

Depth 2

Memory

25.e

Depth 2

Optical drive

25.f

Depth 2

Wireless card

25.g

Depth 2

Mini-PCIe

25.h

Depth 2

Screen

25.i

Depth 2

DC jack

25.j

Depth 2

Battery

25.k

Depth 2

Touchpad 

25.l

Depth 2

Plastics

25.m

Depth 2

Speaker

25.n

Depth 2

System board

25.o

Depth 2

CPU

26.a

Depth 2

Components:

26.b

Depth 2

Features

27.a

Depth 2

Open source vs. closed source/vendor specific

27.b

Depth 2

App source (app store and market)

27.c

Depth 2

Screen orientation (accelerometer/gyroscope)

27.d

Depth 2

Screen calibration

27.e

Depth 2

GPS and geotracking

28.a

Depth 2

Passcode locks

28.b

Depth 2

Remote wipes

28.c

Depth 2

Locator applications

28.d

Depth 2

Remote backup applications

28.e

Depth 2

Failed login attempts restrictions

28.f

Depth 2

Antivirus

28.g

Depth 2

Patching/OS updates

29.a

Depth 2

Gather information from the user or operator and back up data

29.b

Depth 2

Verify the problem exists

29.c

Depth 2

Isolate the cause of the problem and generate alternative solutions

29.d

Depth 2

Plan a solution and resolve the problem 

29.e

Depth 2

Verify that the problem was resolved and prevent a future occurrence

29.f

Depth 2

Document findings, resolution, and preventative maintenance plan 

30.a

Depth 2

Motherboards, RAM, CPU, and power

30.b

Depth 2

Hard drives and RAID arrays

30.c

Depth 2

Video and display

30.d

Depth 2

Wired and wireless networks

30.e

Depth 2

Client-side network connectivity

30.f

Depth 2

Operating systems

30.g

Depth 2

Security issues

30.h

Depth 2

Laptops

30.i

Depth 2

Printers

31.a

Depth 2

Identify questions that a customer should be asked to identify his/her problem

31.b

Depth 2

Approaches to dealing with difficult customers

31.c

Depth 2

When it is appropriate to escalate a problem to a senior support team member

31.d

Depth 2

How to document the services provided

20.a.1

Depth 3

Change default user-names and passwords

20.a.2

Depth 3

Changing SSID

20.a.3

Depth 3

Setting encryption

20.a.4

Depth 3

Disabling SSID broadcast

20.a.5

Depth 3

Enable MAC filtering

20.a.6

Depth 3

Antenna access point placement

20.a.7

Depth 3

Radio power levels

20.a.8

Depth 3

Assign static IP addresses

20.b.1

Depth 3

Change default usernames and passwords

20.b.2

Depth 3

Enable MAC filtering

20.b.3

Depth 3

Assign static IP addresses

20.b.4

Depth 3

Disabling ports

20.b.5

Depth 3

Physical security

26.a.1

Depth 3

Types (e.g., LCD, LED, OLED, plasma)

26.a.2

Depth 3

Wi-Fi antenna connector/placement

26.a.3

Depth 3

Inverter

26.a.4

Depth 3

Backlight

26.b.1

Depth 3

Special key functions

26.b.2

Depth 3

Docking station vs. port replicator

26.b.3

Depth 3

Physical laptop lock and cable lock

Framework metadata

Source document
Computer Systems
License
CC BY 4.0 US