Information Technology - Applied Broad Mapping
All classification mappings for Information Technology - Applied Curricular Guidance.
| Learning Outcome | ACM Computing Classification System 2012 | ACM IT 2008 Baccalaureate Guidelines Knowledge Units | U.S. Dept. of Labor IT 2012 Competency Model | CSTA Computer Science Standards 2011 (Levels 3B & 3C) | Bloom's Revised Taxonomy | European E-Competence Framework 3.0 (Proficiency Levels 1 & 2) | ABET Program Criteria for Information Technology |
|---|---|---|---|---|---|---|---|
| IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 2. Differentiate among various operating systems. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 3. Explain the process of authentication and authorization between end-user devices and computing network resources. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 4. Identify a variety of assistive or adaptive technologies and universal design considerations. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 5. Identify basic components of an end-user IT system. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 6. Implement a hardware and software configuration responsive to an identified scenario. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 7. Summarize life-cycle strategies for replacement, reuse, recycling IT technology and resources. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 8. Summarize strategies to support or train users with their IT resources. | View Details | View Details | View Details | View Details | View Details | View Details | |
| IT. 9. Use a variety of practices for making end-user IT systems secure. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 10. Describe the data management activities associated with the data lifecycle. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 11. Diagram a database design based on an identified scenario. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 12. Differentiate between public and private data. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 13. Discuss applications of data analytics. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 14. Discuss issues relevant to dealing with very large data sets, both structured and unstructured. | View Details | View Details | View Details | View Details | View Details | View Details | |
| IT. 15. Identify database administration tasks. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 16. Produce simple database queries. | View Details | View Details | View Details | View Details | View Details | View Details | |
| IT. 17. Use data analytics to support decision making for a given scenario. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 18. Differentiate among a variety of technology-based sensory interactions. | View Details | View Details | View Details | View Details | View Details | View Details | |
| IT. 19. Differentiate among data types, data transfer protocols and file characteristics specific to the targeted use. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 20. Illustrate the activities of a digital media design process. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 21. Implement communication principles into digital media design. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 22. Carry out basic computer network troubleshooting techniques. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 23. Describe the layers, protocols and components of the OSI model. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 24. Diagram the components of an integrated IT system. | View Details | View Details | View Details | View Details | View Details | View Details | |
| IT. 25. Differentiate among various computer networking models. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 26. Differentiate among various techniques for making a computer network secure. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 27. Summarize the flow of data through a computer network scenario. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 28. Demonstrate best practices for designing end-user computing interfaces. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 29. Demonstrate the techniques of defensive programming and secure coding. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 30. Diagram the phases of the Secure Software Development Lifecycle. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 31. Discuss software development methodologies. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 32. Summarize the differences among various programming languages. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 33. Use a programming or a scripting language to share data across an integrated IT system. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 34. Use a programming or a scripting language to solve a problem. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 35. Differentiate among strategies for business continuity provisioning of IT resources at the enterprise level. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 36. Discuss data governance and its implications for users as well as IT professionals. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 37. Identify a variety of enterprise-level digital storage technologies. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 38. Implement an application of virtualization. | View Details | View Details | View Details | View Details | View Details | ||
| IT. 39. Modify a system to improve data confidentiality or regulatory compliance. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 40. Summarize the implications of various cloud computing models. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 41. Summarize the security implications and risks for distributed IT systems. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 42. Use communication, negotiation, and collaboration skills as a member of a diverse team. | View Details | View Details | View Details | View Details | View Details | View Details | |
| IT. 43. Describe the attitudes, knowledge and abilities associated with quality customer service. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 44. Produce technical documentation responsive to an identified computing scenario | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 45. Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 46. Discuss significant trends and emerging technologies and their impact on global society. | View Details | View Details | View Details | View Details | View Details | View Details | View Details |
| IT. 47. Demonstrate professional behavior in response to an ethically-challenging scenario in computing. | View Details | View Details | View Details | View Details | View Details | View Details | |
| IT. 48. Summarize the tenets of ethics and professional behavior promoted by international computing societies. | View Details | View Details | View Details | View Details | |||
| IT. 49. Describe IT procurement processes for goods and services. | View Details | View Details | View Details | View Details | View Details | View Details | |
| IT. 50. Summarize the role of IT in supporting the mission and goals of an organization. | View Details | View Details | View Details | View Details | View Details |