Skip to Content

2.7 Information Technology Fundamentals

Using a computer, communication devices, and related applications to input, retrieve, and communicate information.

  • 2.7.1 General Computer, Software, Information and Communication Technology Knowledge and Skills
    • Demonstrates familiarity with the fundamental capabilities of computers, software, information systems, and communications systems
    • Understands terminology and function of common computer, software, information and communication technology devices, components, and concepts
    • Understands common terminology related to the use of technology by people with disabilities and/or sensory and functional limitations, including accessible IT, assistive technology, and universal design
    • Understands and uses common computer hardware (e.g., desktops, laptops, tablets, PC components, cabling), software (e.g., operating systems; applications; communication, collaboration, and productivity software) and communication devices (e.g., telephony, wireless devices, network and wireless systems) to perform tasks and communicate effectively
    • Understands and uses appropriate computer etiquette
    • Understands and uses common communications media, including wired and wireless telephones, audio conferences, videoconferences, and online collaboration tools
    • Uses a computer to search for online information and interact with Web sites and Web applications (e.g., enterprise solutions, online stores, blogs, social networks, wikis)
    • Understands how to critically evaluate online information and be aware of relevant copyright and data protection issues
  • 2.7.2 Hardware
    • Demonstrates a working knowledge of the following computer terms:
    • Central processing unit (CPU)
    • Memory - random-access memory (RAM) and read-only memory (ROM)
    • Storage media (e.g., internal hard disk, external hard disk, network drive, CD, DVD, USB, flash drive, memory card)
    • Input/output ports, (e.g., USB, serial, parallel, network port, FireWire)
    • Input devices (e.g., mouse, keyboard, trackball, scanner, touchpad, stylus, joystick, Web camera, digital camera, microphone, voice recognition, remote control, and head, mouth, and eye operated controllers)
    • Output devices (e.g., screens/monitors, printers, speakers, headphones)
    • Assistive technology devices (e.g., voice recognition software, screen reader, screen magnifier, on-screen keyboard, closed captioning, text-to-speech)
  • 2.7.3 Common IT Applications Use
    • Uses word processing applications to compose, organize, and edit simple documents and other business communications, and produce accurate outputs to print or share electronically
    • Uses standard formulas and functions, format and modify content, and demonstrates competence in creating and formatting spreadsheets, graphs, or charts
    • Uses and manages electronic mail to communicate with appropriate etiquette
    • Uses Internet applications to search for information
    • Uses presentation software to effectively share information and ideas
    • Understands and is able to use simple databases
    • Uses spreadsheet, database, and presentation software both independently and in an integrated fashion
    • Manages file storage: uses functions to store, retrieve, and sort documents
    • Understands social media and their appropriate workplace uses
    • Double-checks work carefully to identify and correct typographical, grammatical, and other errors
  • 2.7.4 Cyber Safety
    • Understands the importance of privacy and potential abuses of private information
    • Is able to stay safe in an online, networked environment
    • Understands the importance of updating and using the most recent security software, Web browser, and operating system to protect against malware, and other online threats
    • Recognizes and responds appropriately to suspicious vulnerabilities and threats: Web sites, Web links, emails, posts, online advertisements, phishing, virus infections, etc.
    • Recognizes secure Web addresses, (e.g., "https://" or "shttp://")
    • Protects and manages personally identifiable information
    • Understands and uses privacy and security settings on social networking applications to share only appropriate personal information
    • Reviews the privacy policy and understands what data (location, access to social networks) an application can access prior to downloading and installing
    • Understands the risk of connecting to an unsecured or unprotected network
    • Uses strong passwords, passphrases, and basic encryption