1. Recognize the importance of computer literacy
  2. Identify the components of a computer
  3. Discuss the uses of the Internet and World Wide Web
  4. Identify the types of software
  5. Describe the categories of computers
  6. Identify the types of computer users
  7. Discuss various computer applications in society




  1. Explain how to access and connect to the Internet
  2. Explain how to view pages and search for information on the Web
  3. Describe the types of Web sites
  4. Describe the types of e-commerce
  5. Explain how e-mail, FTP, newsgroups and message boards, mailing lists, chat rooms, and instant messaging work
  6. Identify the rules of netiquette
  7. Identify the steps required for Web publishing




  1. Identify the categories of application software
  2. Explain how to start and interact with application software
  3. Identify the key features of widely used business programs
  4. Identify the key features of widely used graphics and multimedia programs
  5. Identify the key features of widely used home, personal, and educational programs
  6. Identify the types of application software used in communications
  7. Describe the learning aids available for application software




  1. Differentiate among various styles of system units
  2. Describe the components of a processor and how they complete a machine cycle
  3. Define a bit and describe how a series of bits represents data
  4. Differentiate among the various types of memory
  5. Describe the types of expansion slots and adapter cards
  6. Explain the differences among a serial port, a parallel port, a USB port, and other ports
  7. Describe how buses contribute to a computerís processing speed
  8. Identify components in mobile computers and mobile devices






  1. List the characteristics of a keyboard
  2. Summarize how these pointing devices work: mouse, trackball, touchpad, pointing stick, joystick, wheel, light pen, touch screen, stylus, and digital pen
  3. Describe other types of input, including voice input; input devices for PDAs, Tablet PCs, and smart phones; digital cameras; video input; scanners and reading devices; terminals; and biometric input
  4. Describe the characteristics of CRT monitors, LCD monitors, and LCD screens
  5. Summarize the various types of printers
  6. Explain the characteristics of speakers and headsets, fax machines and fax modems, multifunction peripherals, and data projectors
  7. Identify input and output options for physically challenged users




  1. Describe the characteristics of a floppy disk drive
  2. Identify the uses of Zip disks
  3. Describe the characteristics of a hard disk
  4. Identify the advantages of using an Internet hard drive
  5. Describe the characteristics of CDs and DVDs
  6. Identify the uses of tape
  7. Discuss PC Cards and the various types of miniature storage media
  8. Identify uses of microfilm and microfiche




  1. Identify the types of system software
  2. Describe the functions of an operating system
  3. Explain the purpose of the utilities included with most operating systems
  4. Summarize the features of several stand-alone operating systems
  5. Identify devices that use embedded operating systems
  6. Explain the purpose of several stand-alone utility programs




  1. Discuss the components required for successful communications
  2. Describe uses of computer communications
  3. Differentiate among types of networks
  4. Explain the purpose of communications software
  5. Describe various types of lines for communications over the telephone network
  6. Describe commonly used communications devices
  7. Discuss different ways to set up a home network
  8. Identify various physical and wireless transmission media






  1. Identify the qualities of valuable information
  2. Discuss the terms character, field, record, and file
  3. Identify file maintenance techniques
  4. Differentiate between a file processing system approach and the database approach
  5. Discuss the functions common to most DBMSs
  6. Describe characteristics of relational, object-oriented, and multidimensional databases
  7. Explain how Web databases work
  8. Discuss the responsibilities of database analysts and administrators




  1. Identify ways to safeguard against computer viruses, worms, and Trojan horses
  2. Discuss techniques to prevent unauthorized computer access and use
  3. Identify safeguards against hardware theft and vandalism
  4. Explain the ways to protect against software theft and information theft
  5. Discuss the types of devices available that protect from system failure
  6. Identify safeguards that protect against Internet security risks
  7. Discuss issues surrounding information privacy
  8. Discuss ways to prevent health-related disorders and injuries due to computer use




  1. Discuss the importance of project management, feasibility assessment, data and information gathering techniques, and documentation during system development
  2. Discuss the purpose of each phase in the system development cycle
  3. Differentiate between low-level languages and procedural languages
  4. Identify the benefits of object-oriented programming languages
  5. List various types of nonprocedural languages and tools
  6. Describe various ways to develop Web pages
  7. Identify popular programming languages and their uses
  8. List the six steps in the program development cycle
  9. Explain the basic control structures used in designing solutions to programming problems




  1. Discuss the special information requirements of an enterprise-sized corporation
  2. Identify information systems used in the functional units of an enterprise
  3. List general purpose and integrated information systems used throughout an enterprise
  4. List types of technologies used throughout an enterprise
  5. Explain how e-retailing works and identify e-commerce market sectors
  6. Discuss the computer hardware needs and solutions for an enterprise
  7. Determine why computer backup is important and how it is accomplished
  8. Discuss the steps in a disaster recovery plan
  9. Discuss the importance of computer security in an enterprise