Objective # |
Objective |
Book Ch. #, Title |
Sections |
Pg. # |
1.1 |
Compare and contrast notational systems |
Ch. 2, How Computers Store Data: Notational Systems |
|
|
|
|
|
Binary |
|
|
|
|
Hexadecimal |
|
|
|
|
Decimal |
|
|
|
Data representation |
||
|
|
|
|
|
|
|
|
|
|
1.2 |
Compare and contrast fundamental data types and their characteristics |
Ch. 3, Compare and Contrast Fundamental Data Types and Their Characteristics |
|
|
|
|
|
Char |
|
|
|
|
Strings |
|
|
|
|
Numbers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Boolean |
|
1.3 |
Illustrate the basics of computing and processing |
Ch. 4, Input, Output, and More: The Basics of Computing and Processing |
|
|
|
|
|
Input |
|
|
|
|
Processing |
|
|
|
|
Output |
|
|
|
|
Storage |
|
1.4 |
Explain the value of data and information |
Ch. 5, Explain the Value of Data and Information |
|
|
|
|
|
Data and information as assets |
|
|
|
|
Importance of investing in security |
|
|
|
|
Relationship of data to creating information |
|
|
|
|
Intellectual property |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Digital products |
|
|
|
|
Data-driven business decisions |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1.5 |
Compare and contrast common units of measure |
Ch. 6, Common Units of Measure: Storage, Throughput, and Speed |
|
|
|
|
|
Storage unit |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Throughput unit |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Processing speed |
|
|
|
|
|
|
|
|
|
|
|
1.6 |
Explain the troubleshooting methodology |
Ch. 7, Explain the Troubleshooting Methodology |
|
|
|
|
|
Identify the problem |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Research knowledge base/Internet, if applicable |
|
|
|
|
Establish a theory of probable cause |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Test the theory to determine the cause |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Establish a plan of action to resolve the problem and identify potential effects |
|
|
|
|
Implement the solution or escalate as necessary |
|
|
|
|
Verify full system functionality and, if applicable, implement preventive measures |
|
|
|
|
Document findings/lessons learned, actions, and outcomes |
Objective # |
Objective |
Book Ch. #, Title |
Sections |
Pg.# |
2.1 |
Classify common types of input/output device interfaces |
Ch. 8, I/O: Input/Output Device Interfaces |
|
|
|
|
|
Networking |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2.2 |
Given a scenario, set up and install common peripheral devices to a laptop/PC |
Ch. 9, Connecting and Configuring Peripherals |
|
|
|
|
|
Devices |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Installation types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2.3 |
Explain the purpose of common internal computing components |
Ch. 10, Explain the Purpose of Common Internal Computer Components |
|
|
|
|
|
Motherboard/system board |
|
|
|
|
Firmware/BIOS |
|
|
|
|
RAM |
|
|
|
|
CPU |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
GPU |
|
|
|
|
Storage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cooling |
|
|
|
|
NIC |
|
|
|
|
|
|
|
|
|
|
|
2.4 |
Compare and contrast common Internet service types |
Ch. 11, Internet Service Types |
|
|
|
|
|
Fiber optic |
|
|
|
|
Cable |
|
|
|
|
DSL |
|
|
|
|
Wireless |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2.5 |
Compare and contrast storage types |
Ch. 12, Compare and Contrast Storage Types |
|
|
|
|
|
Volatile vs. nonvolatile |
|
|
|
|
Local storage types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Local network storage types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cloud storage service |
|
2.6 |
Compare and contrast common computing devices and their purposes |
Ch. 13, Compare and Contrast Common Computing Devices and Their Purposes |
|
|
|
|
|
Mobile phones |
|
|
|
|
Tablets |
|
|
|
|
Laptops |
|
|
|
|
Workstations |
|
|
|
|
Servers |
|
|
|
|
Gaming consoles |
|
|
|
|
IoT |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2.7 |
Explain basic networking concepts |
Ch. 14, Explain Basic Networking Concepts |
|
|
|
|
|
Basics of network communication |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Device addresses |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Basic protocols |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Devices |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2.8 |
Given a scenario, install, configure, and secure a basic wireless network |
Ch. 15, Given a Scenario, Install, Configure, and Secure a Basic Wireless Network |
|
|
|
|
|
802.11a/b/g/n/ac |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Best practices |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Objective # |
Objective |
Book Ch. #, Title |
Sections |
Pg.# |
3.1 |
Explain the purpose of operating systems |
Ch. 16, Explain the Purpose of Operating Systems |
|
|
|
|
|
Interface between applications and hardware |
|
|
|
|
Disk management |
|
|
|
|
Process management/scheduling |
|
|
|
|
|
|
|
|
|
Application management |
|
|
|
|
Memory management |
|
|
|
|
Device management |
|
|
|
|
Access control/protection |
|
|
|
|
Types of OS |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3.2 |
Compare and contrast components of an operating system |
Ch. 17, Operating Systems 101: Features, Processes, UI, and Management |
|
|
|
|
|
File systems and features |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Features |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File management |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Services |
|
|
|
|
Processes |
|
|
|
|
Drivers |
|
|
|
|
Utilities |
|
|
|
|
|
|
|
|
|
Interfaces |
|
|
|
|
|
|
|
|
|
|
|
3.3 |
Explain the purpose and proper use of software |
Ch. 18, Purpose and Proper Use of Software |
|
|
|
|
|
Productivity software |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Collaboration software |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Business software |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3.4 |
Explain methods of application architecture and delivery models |
Ch. 19, Getting Apps from Source to Your Device |
|
|
|
|
|
Application delivery methods |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Application architecture models |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3.5 |
Given a scenario, configure and use web browsers |
Ch. 20, Configuring and Using Web Browsers |
|
|
|
|
|
Caching/clearing cache |
|
|
|
|
Deactivate client-side scripting |
|
|
|
|
Browser add-ons/extensions |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Private browsing |
|
|
|
|
Proxy settings |
|
|
|
|
Certificates |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Pop-up blockers |
|
|
|
|
Script blockers |
|
|
|
|
Compatible browser for application(s) |
|
3.6 |
Compare and contrast general application concepts and uses |
Ch. 21, Compare and Contrast General Application Concepts and Uses |
|
|
|
|
|
Single-platform software |
|
|
|
|
Cross-platform software |
|
|
|
|
|
|
|
|
|
Licensing |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Software installation best practices |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Objective # |
Objective |
Book Ch. #, Title |
Sections |
Pg.# |
4.1 |
Compare and contrast programming language categories |
Ch. 22, Compare and Contrast Programming Language Categories |
|
|
|
|
|
Interpreted |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Compiled programming languages |
|
|
|
|
Query languages |
|
|
|
|
Assembly language |
|
4.2 |
Given a scenario, use programming organizational techniques and interpret logic |
Ch. 23, Using Programming Organizational Techniques and Interpret Logic |
|
|
|
|
|
Organizational techniques |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Logic components |
|
|
|
|
|
|
|
|
|
|
|
4.3 |
Explain the purpose and use of programming concepts |
Ch. 24, Explain the Purpose and Use of Programming Concepts |
|
|
|
|
|
Identifiers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Containers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Functions |
|
|
|
|
Objects |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Objective # |
Objective |
Book Ch. #, Title |
Sections |
Pg.# |
5.1 |
Explain database concepts and the purpose of a database |
Ch. 25, Explain Database Concepts and the Purpose of a Database |
|
|
|
|
|
Usage of database |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Flat file vs. database |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Records |
|
|
|
|
Storage |
|
|
|
|
|
|
5.2 |
Compare and contrast various database structures |
Ch. 26, Compare and Contrast Various Database Structures |
|
|
|
|
|
Structured vs. semi-structured vs. non-structured |
|
|
|
|
Relational databases |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Non-relational databases |
|
|
|
|
|
|
|
|
|
|
|
5.3 |
Summarize methods used to interface with databases |
Ch. 27, Summarize Methods Used to Interface with Databases |
|
|
|
|
|
Relational methods |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Database access methods |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Export/import |
|
|
|
|
|
|
|
|
|
|
Objective # |
Objective |
Book Ch. #, Title |
Sections |
Pg.# |
6.1 |
Summarize confidentiality, integrity, and availability concerns |
Ch. 28, Confidentiality, Integrity, and Availability Concerns |
|
|
|
|
|
Confidentiality concerns |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Integrity concerns |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Availability concerns |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6.2 |
Explain methods to secure devices and best practices |
Ch. 29, Device Security Best Practices |
|
|
|
|
|
Securing devices (mobile/workstation) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Device use best practices |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Removal of malicious software |
|
6.3 |
Summarize behavioral security concepts |
Ch. 30, Summarize Behavioral Security Concepts |
|
|
|
|
|
Expectations of privacy when using: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Written policies and procedures |
|
|
|
|
Handling of confidential information |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6.4 |
Compare and contrast authentication, authorization, accounting, and nonrepudiation concepts |
Ch. 31, Compare and Contrast Authentication, Authorization, Accounting, and Nonrepudiation Concepts |
|
|
|
|
|
Authentication |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Authorization |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Accounting |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Nonrepudiation |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6.5 |
Explain password best practices |
Ch. 32, Explain Password Best Practices |
|
|
|
|
|
Password length |
|
|
|
|
Password complexity |
|
|
|
|
Password history |
|
|
|
|
Password expiration |
|
|
|
|
Password reuse across sites |
|
|
|
|
Password managers |
|
|
|
|
Password reset process |
|
6.6 |
Explain common uses of encryption |
Ch. 33, Explain Common Uses of Encryption |
|
|
|
|
|
Plain text vs. cipher text |
|
|
|
|
Data at rest |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Data in transit |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6.7 |
Explain business continuity concepts |
Ch. 34, Explain Business Continuity Concepts |
|
|
|
|
|
Fault tolerance |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Disaster recovery |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|