N2StEG5VycerlTDzmaBYXkXp4FltvdINxP7wuTr21sI=
2.7 Information Technology Fundamentals
Using a computer, communication devices, and related applications to input, retrieve, and communicate information.
- 2.7.1 General Computer, Software, Information and Communication Technology Knowledge and Skills
- Demonstrates familiarity with the fundamental capabilities of computers, software, information systems, and communications systems
- Understands terminology and function of common computer, software, information and communication technology devices, components, and concepts
- Understands common terminology related to the use of technology by people with disabilities and/or sensory and functional limitations, including accessible IT, assistive technology, and universal design
- Understands and uses common computer hardware (e.g., desktops, laptops, tablets, PC components, cabling), software (e.g., operating systems; applications; communication, collaboration, and productivity software) and communication devices (e.g., telephony, wireless devices, network and wireless systems) to perform tasks and communicate effectively
- Understands and uses appropriate computer etiquette
- Understands and uses common communications media, including wired and wireless telephones, audio conferences, videoconferences, and online collaboration tools
- Uses a computer to search for online information and interact with Web sites and Web applications (e.g., enterprise solutions, online stores, blogs, social networks, wikis)
- Understands how to critically evaluate online information and be aware of relevant copyright and data protection issues
- 2.7.2 Hardware
- Demonstrates a working knowledge of the following computer terms:
- Central processing unit (CPU)
- Memory - random-access memory (RAM) and read-only memory (ROM)
- Storage media (e.g., internal hard disk, external hard disk, network drive, CD, DVD, USB, flash drive, memory card)
- Input/output ports, (e.g., USB, serial, parallel, network port, FireWire)
- Input devices (e.g., mouse, keyboard, trackball, scanner, touchpad, stylus, joystick, Web camera, digital camera, microphone, voice recognition, remote control, and head, mouth, and eye operated controllers)
- Output devices (e.g., screens/monitors, printers, speakers, headphones)
- Assistive technology devices (e.g., voice recognition software, screen reader, screen magnifier, on-screen keyboard, closed captioning, text-to-speech)
- 2.7.3 Common IT Applications Use
- Uses word processing applications to compose, organize, and edit simple documents and other business communications, and produce accurate outputs to print or share electronically
- Uses standard formulas and functions, format and modify content, and demonstrates competence in creating and formatting spreadsheets, graphs, or charts
- Uses and manages electronic mail to communicate with appropriate etiquette
- Uses Internet applications to search for information
- Uses presentation software to effectively share information and ideas
- Understands and is able to use simple databases
- Uses spreadsheet, database, and presentation software both independently and in an integrated fashion
- Manages file storage: uses functions to store, retrieve, and sort documents
- Understands social media and their appropriate workplace uses
- Double-checks work carefully to identify and correct typographical, grammatical, and other errors
- 2.7.4 Cyber Safety
- Understands the importance of privacy and potential abuses of private information
- Is able to stay safe in an online, networked environment
- Understands the importance of updating and using the most recent security software, Web browser, and operating system to protect against malware, and other online threats
- Recognizes and responds appropriately to suspicious vulnerabilities and threats: Web sites, Web links, emails, posts, online advertisements, phishing, virus infections, etc.
- Recognizes secure Web addresses, (e.g., “https://” or “shttp://”)
- Protects and manages personally identifiable information
- Understands and uses privacy and security settings on social networking applications to share only appropriate personal information
- Reviews the privacy policy and understands what data (location, access to social networks) an application can access prior to downloading and installing
- Understands the risk of connecting to an unsecured or unprotected network
- Uses strong passwords, passphrases, and basic encryption