Skip Navigation

Utah Core  •  Curriculum Search  •  All CTE/Computer Science & Information Technology Lesson Plans  •  USBE CTE/Computer Science & Information Technology website

 

CTE/Computer Science & Information Technology Curriculum Computer Systems 2
Printable Version Printable Version (pdf)

 

arrow icon Course Introduction

 

Core Standards of the Course

Strand 1
Operating Systems

Standard 1
Understand common operating systems and their purposes.

  1. Software compatibility
  2. Workstation operating systems
    • Microsoft Windows
    • Apple Macintosh OS
    • Linux Distributions

  3. Cell Phone/tablet operating systems
    • Microsoft Windows
    • Android
    • iOS
    • Chrome OS

  4. Vendor specific limitations

Standard 2
Understand general OS installation considerations and upgrade methods.

  1. Boot Methods
    • Optical disc (CD-ROM, DVD, Blu-ray)
    • External drive/flash drive (USB/eSATA)
    • Network boot (PXE)
    • Internal fixed disk (HDD/SSD)
    • Internal hard drive (partition)

  2. Type of installations
    • Unattended installation
    • In-place upgrade
    • Clean install
    • Repair installation
    • Multiboot
    • Remote network installation
    • Image deployment
    • Recovery partition
    • Refresh/restore

  3. Partitioning
    • Dynamic
    • Basic
    • Primary
    • Extended
    • Logical
    • GPT

  4. File system types/formatting
    • ExFAT
    • FAT32
    • NTFS
    • CDFS
    • NFS
    • XFS
    • ext3, ext4, ext4 journaling
    • HFS Swap partition
    • Quick format vs. full format

  5. Load alternate third-party drivers when necessary
  6. Workgroup vs. Domain setup
  7. Time/date/region/language settings
  8. Driver installation, software, and Windows updates
  9. Factory recovery partition
  10. Properly formatted boot drive with the correct partitions/format
  11. Prerequisites/hardware compatibility
  12. Application compatibility
  13. OS compatibility/upgrade path

Standard 3
Demonstrate the use of Microsoft command line tools.

  1. Navigation
    • dir
    • cd
    • ..

  2. ipconfig
  3. ping
  4. tracert
  5. netstat
  6. nslookup
  7. shutdown
  8. dism
  9. sfc
  10. chkdsk
  11. diskpart
  12. taskkill
  13. gpupdate
  14. gpresult
  15. format
  16. copy
  17. xcopy
  18. robocopy
  19. net use
  20. net user
  21. [command name] /?
  22. Commands available with standard privileges vs. administrative privileges

Standard 4
Demonstrate the use of Microsoft operating system features and tools.

  1. Administrative
    • Computer Management
    • Device Manager
    • Local Users and Groups
    • Local Security Policy
    • Performance Monitor
    • Services
    • System Configuration
    • Task Scheduler
    • Component Services
    • Data Sources
    • Print Management
    • Windows Memory Diagnostics
    • Windows Firewall
    • Advanced Security
    • Event Viewer
    • User Account Management

  2. MSConfig
    • General
    • Boot
    • Services
    • Startup
    • Tools

  3. Task Manager
    • Applications
    • Processes
    • Performance
    • Networking
    • Users

  4. Disk Management
    • Drive status
    • Mounting
    • Initializing
    • Extending partitions
    • Splitting partitions
    • Shrink partitions
    • Assigning/changing drive letters
    • Adding drives
    • Adding arrays
    • Storage spaces

  5. System Utilities
    • Regedit
    • Command
    • Services.msc
    • MMC
    • MSTSC
    • Notepad
    • Explorer
    • Msinfo32
    • DxDiag
    • Disk Defragmenter
    • System Restore
    • Windows Update

Standard 5
Demonstrate the use of Microsoft Windows Control Panel utilities.

  1. Internet Options
    • Connections
    • Security
    • General
    • Privacy
    • Programs
    • Advanced

  2. Display/Display Settings
    • Resolution
    • Color depth
    • Refresh rate

  3. User Accounts
  4. Folder Options
    • View hidden files
    • Hide extensions
    • General options
    • View options

  5. System
    • Performance (virtual memory)
    • Remote settings
    • System protection

  6. Windows Firewall
  7. Power Options
    • Hibernate
    • Power plans
    • Sleep/suspend
    • Standby

  8. Credential Manager
  9. Programs and features
  10. HomeGroup
  11. Devices and Printers
  12. Sound
  13. Troubleshooting
  14. Network and Sharing Center
  15. Device Manager
  16. BitLocker
  17. Sync Center

Standard 6
Demonstrate Microsoft Windows networking installation on a client/desktop.

  1. HomeGroup vs. Workgroup
  2. Domain setup
  3. Network shares/administrative shares/mapping drives
  4. Printer sharing vs. network printer mapping
  5. Establish networking connections
    • VPN
    • Dial-ups
    • Wireless
    • Wired
    • WWAN (Cellular)

  6. Proxy settings
  7. Remote Desktop Connection
  8. Remote Assistance
  9. Home vs. Work vs. Public network settings
  10. Firewall settings
    • Exceptions
    • Configuration
    • Enabling/disabling Windows Firewall

  11. Configuring an alternative
  12. IP address in Windows
    • IP addressing
    • Subnet mask
    • DNS
    • DHCP
    • Gateway

  13. Network card properties
    • Half duplex/full duplex/auto
    • Speed
    • Wake-on-LAN
    • QoS
    • BIOS (on-board NIC)

Standard 7
Demonstrate the use of features and tools of Mac OS and Linux based systems.

  1. Best practices
    • Scheduled backups
    • Scheduled disk maintenance
    • System updates/App Store
    • Patch management
    • Driver/firmware updates
    • Antivirus/Anti-malware updates

  2. Tools
    • Backup/Time Machine
    • Restore/Snapshot
    • Image recovery
    • Disk maintenance utilities
    • Shell/Terminal
    • Screen sharing
    • Force Quit

  3. Features
    • Multiple desktops/Mission Control
    • Key Chain
    • Spot Light
    • iCloud
    • Gestures
    • Finder
    • Remote Disc
    • Dock
    • Boot Camp

  4. Basic Linux commands
    • ls
    • grep
    • cd
    • shutdown
    • pwd vs. passwd
    • mv
    • cp
    • rm
    • chmod
    • chown
    • iwconfig/ifconfig
    • ps
    • su/sudo
    • apt-get
    • vi
    • dd
    • kill


Strand 2
Security

Standard 1
Understand the importance of physical security measures.

  1. Mantrap
  2. Badge reader
  3. Smart card
  4. Security guard
  5. Door lock
  6. Biometric locks
  7. Hardware tokens
  8. Cable locks
  9. Server locks
  10. USB locks
  11. Privacy screen
  12. Key fobs
  13. Entry control roster

Standard 2
Understand logical security concepts.

  1. Active Directory
    • Login script
    • Domain
    • Group Policy/Updates
    • Organizational Units
    • Home Folder
    • Folder redirection

  2. Software tokens
  3. MDM policies
  4. Port security
  5. MAC address filtering
  6. Certificates
  7. Antivirus/Anti-malware
  8. Firewalls
  9. User authentication/strong passwords
  10. Multifactor authentication
  11. Directory permissions
  12. VPN
  13. DLP
  14. Access control lists
  15. Smart card
  16. Email filtering
  17. Trusted/untrusted software sources
  18. Principle of least privilege

Standard 3
Understand wireless security protocols and authentication methods.

  1. Protocols and encryption
    • WEP
    • WPA
    • WPA2
    • TKIP
    • AES

  2. Authentication
    • Single-factor
    • Multifactor
    • RADIUS
    • TACACS

Standard 4
Demonstrate detection, removal, and prevention of malware using appropriate tools and methods.

  1. Malware
    • Ransomware
    • Trojan
    • Keylogger
    • Rootkit
    • Virus
    • Botnet
    • Worm
    • Spyware
    • Adware
    • Rootkits
    • Rogue Security Software

  2. Tools and methods
    • Antivirus
    • Anti-malware
    • Recovery console
    • Backup/restore
    • End user education
    • Software firewalls
    • DNS configuration

Standard 5
Understand social engineering, threats, and vulnerabilities.

  1. Social engineering
    • Phishing
    • Pharming
    • Spear phishing
    • Impersonation
    • Shoulder surfing
    • Tailgating
    • Dumpster diving

  2. DDoS
  3. DoS
  4. Zero-day
  5. Man-in-the-middle
  6. Brute force
  7. Dictionary
  8. Rainbow table
  9. Spoofing
  10. Non-compliant systems
  11. Zombie

Standard 6
Understand the basic Microsoft Windows OS security settings.

  1. User and groups
    • Administrator
    • Power user
    • Guest
    • Standard user

  2. NTFS vs. share permissions
    • Allow vs. deny
    • Moving vs. copying folders and files
    • File attributes

  3. Shared files and folders
    • Administrative shares vs. local shares
    • Permission propagation
    • Inheritance

  4. System files and folders
  5. User authentication
    • Single sign-on (SSO)

  6. Run as administrator vs. standard user
  7. BitLocker
  8. BitLocker To Go
  9. EFS

Standard 7
Demonstrate best practices in securing devices.

  1. Password best practices
    • Password Entropy and Complexity
    • Password expiration
    • Screensaver required password
    • BIOS/UEFI passwords
    • Requiring passwords

  2. Account management
    • Restricting user permissions
    • Logon time restrictions
    • Disabling guest account
    • Failed attempts lockout
    • Timeout/screen lock
    • Change default admin user account/password
    • Basic Active Directory functions
      • Account creation
      • Account deletion
      • Password reset / unlock account
      • Disable account

  3. Disable autorun
  4. Data encryption
  5. Patch/update management
  6. Screen locks
    • Fingerprint lock
    • Face lock
    • Swipe lock
    • Passcode lock

  7. Remote wipes
  8. Locator applications
  9. Remote backup applications
  10. Failed login attempts restrictions
  11. Antivirus/Anti-malware
  12. Patching/OS updates
  13. Biometric authentication
  14. Full device encryption
  15. Multifactor authentication
  16. Authenticator applications
  17. Trusted sources vs. untrusted sources
  18. Firewalls
  19. Policies and procedures
    • BYOD vs. corporate-owned
    • Profile security requirements

Standard 8
Understand appropriate data destruction and disposal methods.

  1. Physical destruction
    • Shredder
    • Drill/hammer
    • Electromagnetic (Degaussing)
    • Incineration
    • Certificate of destruction

  2. Recycling or repurposing best practices
    • Low-level format vs. standard format
    • Overwrite
    • Drive wipe

  3. Update firmware

Standard 9
Understand security configuration protocols on networks.

  1. Wireless-specific
    • Changing default SSID
    • Setting encryption
    • Disabling SSID broadcast
    • Antenna and access point placement
    • Radio power levels (waves)
    • WPS

  2. Change default usernames and passwords
  3. Enable MAC filtering
  4. Assign static IP addresses
  5. Firewall settings
  6. Port forwarding/mapping
  7. Disabling ports
  8. Content filtering/parental controls
  9. Physical security

Strand 3
Software Troubleshooting

Standard 1
Demonstrate the ability to troubleshoot Microsoft Windows OS problems.

  1. Common symptoms
    • Slow performance
    • Limited connectivity
    • Failure to boot
    • No OS found
    • Application crashes
    • Blue screens
    • Black screens
    • Printing issues
    • Services fail to start
    • Slow bootup
    • Slow profile load

  2. Common solutions
    • Defragment the hard drive
    • Reboot
    • Kill tasks
    • Restart services
    • Update network settings
    • Reimage/reload OS
    • Roll back updates
    • Roll back device drivers
    • Apply updates
    • Repair application
    • Update boot order
    • Disable Windows services/applications
    • Disable application startup
    • Safe boot
    • Rebuild Windows profiles

Standard 2
Understand problems that stem from PC security issues.

  1. Common symptoms
    • Pop-ups
    • Browser redirection
    • Security alerts
    • Slow performance
    • Internet connectivity issues
    • PC/OS lockup
    • Application crash
    • OS updates failures
    • Rogue antivirus
    • Spam
    • Renamed system files
    • Disappearing files
    • File permission changes
    • Hijacked email
      • Responses from users regarding email
      • Automated replies from unknown sent email
    • Access denied
    • Invalid certificate (trusted root CA)
    • System/application log errors

Standard 3
Understand tools and best practices for malware removal.

  1. Identify and research malware symptoms.
  2. Quarantine the infected systems.
  3. Disable System Restore (in Windows).
  4. Remediate the infected systems.
    • Update the anti-malware software.
    • Scan and use removal techniques (safe mode, pre-installation environment).

  5. Schedule scans and run updates.
  6. Enable System Restore and create a restore point (in Windows).
  7. Educate the end user.

Strand 4
Operational Procedures

Standard 1
Understand best practices of documenting asset management and enterprise policies.

  1. Network topology diagrams
  2. Knowledge base/articles
  3. Incident documentation
  4. Regulatory and compliance policy
  5. Acceptable use policy
  6. Password policy
  7. Inventory management
    • Asset tags
    • Barcodes

  8. Documented business processes
  9. Purpose of the change
  10. Scope the change
  11. Risk analysis
  12. Plan for change
  13. End-user acceptance
  14. Change board
    • Approvals

  15. Backout plan
  16. Document changes
  17. Incident response
    • First response
      • Identify
      • Report through proper channels
      • Data/device preservation
    • Use of documentation/ documentation changes
    • Chain of custody
      • Tracking of evidence/documenting process

  18. Licensing/DRM/EULA
    • Open-source vs. commercial license
    • Personal license vs. enterprise licenses
    • Public domain
    • Permissive
    • LGPL
    • Copyleft
    • Proprietary

  19. Regulated data
    • PII
    • PCI
    • GDPR
    • PHI

  20. Follow all policies and security best practices

Standard 2
Understand safety procedures and environmental concerns.

  1. Backup and recovery
    • Image level
    • File level
    • Critical applications

  2. Backup testing
  3. UPS
  4. Surge protector
  5. Cloud storage vs. local storage backups
  6. Account recovery options
  7. Equipment grounding
  8. Proper component handling and storage
    • Antistatic bags
    • ESD straps
    • ESD mats
    • Self-grounding

  9. Toxic waste handling
    • Batteries
    • Toner
    • CRT
    • Cell phones
    • Tablets

  10. Personal safety
    • Disconnect power before repairing PC
    • Remove jewelry
    • Lifting techniques
    • Weight limitations
    • Electrical fire safety
    • Cable management
    • Safety goggles
    • Air filter mask

  11. MSDS documentation for handling and disposal
  12. Temperature, humidity level awareness, and proper ventilation
  13. Power surges, brownouts, and blackouts
    • Battery backup
    • Surge suppressor

  14. Protection from airborne particles
    • Enclosures
    • Air filters/mask

  15. Dust and debris
    • Compressed air
    • Vacuums

  16. Compliance with all government regulations

Standard 3
Understand proper communication techniques and professionalism.

  1. Use proper language and avoid jargon, acronyms, and slang, when applicable
  2. Maintain a positive attitude/ project confidence
  3. Actively listen (taking notes) and avoid interrupting the customer
  4. Be culturally sensitive
    • Use appropriate professional titles, when applicable*Be on time (if late, contact the customer)

  5. Avoid distractions
    • Personal calls
    • Texting/social media sites
    • Talking to coworkers while interacting with customers
    • Personal interruptions

  6. Dealing with difficult customers or situations
    • Do not argue with customers and/or be defensive
    • Avoid dismissing customer problems
    • Avoid being judgmental
    • Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
    • Do not disclose experiences via social media outlets

  7. Set and meet expectations/timeline and communicate status with the customer
    • Offer different repair/ replacement options, if applicable
    • Provide proper documentation on the services provided
    • Follow up with customer/user at a later date to verify satisfaction

  8. Deal appropriately with customers' confidential and private materials
    • Located on a computer, desktop, printer, etc.


Performance Skills

  • Remote support from an external location.
  • Assisting with software, hardware, and operating systems installations, including troubleshooting.
  • Ask client/customer various questions about the installed computer systems, run diagnostic, handle software security.
  • Highlight customer service and listening skills to understand a customer's problem so that student can help them, even when they are frustrated.
  • Problem-solving skills are paramount so that you can figure out exactly what is causing the tricky hardware and software issues.


Workplace Skills

  • Workplace Skills
  • Communication
  • Problem Solving
  • Teamwork
  • Critical Thinking
  • Dependability
  • Accountability
  • Legal requirements/expectations



UEN logo http://www.uen.org - in partnership with Utah State Board of Education (USBE) and Utah System of Higher Education (USHE).  Send questions or comments to USBE Specialist - Kristina  Yamada and see the CTE/Computer Science & Information Technology website. For general questions about Utah's Core Standards contact the Director - THALEA  LONGHURST.

These materials have been produced by and for the teachers of the State of Utah. Copies of these materials may be freely reproduced for teacher and classroom use. When distributing these materials, credit should be given to Utah State Board of Education. These materials may not be published, in whole or part, or in any other format, without the written permission of the Utah State Board of Education, 250 East 500 South, PO Box 144200, Salt Lake City, Utah 84114-4200.