(A) identify real-world cybersecurity problems such
as phishing, malware, password attacks, identity theft, and hacking;
and
(B) identify various methods of cyberbullying such
as harassment, impersonation, and cyberstalking.
(11) Practical technology concepts--processes. The
student evaluates and selects appropriate methods or techniques for
an independent project and identifies and solves common hardware and
software problems using troubleshooting strategies. The student is
expected to create and design files in various formats such as text,
graphics, video, and audio files.
(12) Practical technology concepts--skills and tools.
The student leverages technology systems, concepts, and operations
to produce digital artifacts. The student is expected to:
(A) apply appropriate technology terminology such as
cloud applications, input, output, and basic programming;
(B) identify effective file management strategies such
as file naming conventions, local and remote locations, backup, hierarchy,
folder structure, file conversion, tags, and emerging digital organizational
strategies;
(C) select and use the appropriate platform and tools
to complete a specific task or project;
(D) demonstrate improvement in speed and accuracy as
measured by words per minute when applying correct keyboarding techniques;
(E) select and use appropriate shortcuts within applications;
(F) use help sources to research application features
and solve software issues;
(G) identify types of local and remote data storage
such as cloud architecture or local server; and
(H) use productivity tools found in spread sheet, word
processing, and publication applications to create digital artifacts
such as reports, graphs, and charts.
|