Back

Information Technology - Applied Broad Mapping

All classification mappings for Information Technology - Applied Curricular Guidance.

Learning Outcome ACM Computing Classification System 2012 ACM IT 2008 Baccalaureate Guidelines Knowledge Units U.S. Dept. of Labor IT 2012 Competency Model CSTA Computer Science Standards 2011 (Levels 3B & 3C) Bloom's Revised Taxonomy European E-Competence Framework 3.0 (Proficiency Levels 1 & 2) ABET Program Criteria for Information Technology
IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. View Details View Details View Details View Details View Details View Details View Details
IT. 2. Differentiate among various operating systems. View Details View Details View Details View Details View Details View Details View Details
IT. 3. Explain the process of authentication and authorization between end-user devices and computing network resources. View Details View Details View Details View Details View Details View Details View Details
IT. 4. Identify a variety of assistive or adaptive technologies and universal design considerations. View Details View Details View Details View Details View Details View Details View Details
IT. 5. Identify basic components of an end-user IT system. View Details View Details View Details View Details View Details View Details View Details
IT. 6. Implement a hardware and software configuration responsive to an identified scenario. View Details View Details View Details View Details View Details View Details View Details
IT. 7. Summarize life-cycle strategies for replacement, reuse, recycling IT technology and resources. View Details View Details View Details View Details View Details View Details View Details
IT. 8. Summarize strategies to support or train users with their IT resources. View Details View Details View Details View Details View Details View Details
IT. 9. Use a variety of practices for making end-user IT systems secure. View Details View Details View Details View Details View Details View Details View Details
IT. 10. Describe the data management activities associated with the data lifecycle. View Details View Details View Details View Details View Details View Details View Details
IT. 11. Diagram a database design based on an identified scenario. View Details View Details View Details View Details View Details View Details View Details
IT. 12. Differentiate between public and private data. View Details View Details View Details View Details View Details View Details View Details
IT. 13. Discuss applications of data analytics. View Details View Details View Details View Details View Details View Details View Details
IT. 14. Discuss issues relevant to dealing with very large data sets, both structured and unstructured. View Details View Details View Details View Details View Details View Details
IT. 15. Identify database administration tasks. View Details View Details View Details View Details View Details View Details View Details
IT. 16. Produce simple database queries. View Details View Details View Details View Details View Details View Details
IT. 17. Use data analytics to support decision making for a given scenario. View Details View Details View Details View Details View Details View Details View Details
IT. 18. Differentiate among a variety of technology-based sensory interactions. View Details View Details View Details View Details View Details View Details
IT. 19. Differentiate among data types, data transfer protocols and file characteristics specific to the targeted use. View Details View Details View Details View Details View Details View Details View Details
IT. 20. Illustrate the activities of a digital media design process. View Details View Details View Details View Details View Details View Details View Details
IT. 21. Implement communication principles into digital media design. View Details View Details View Details View Details View Details View Details View Details
IT. 22. Carry out basic computer network troubleshooting techniques. View Details View Details View Details View Details View Details View Details View Details
IT. 23. Describe the layers, protocols and components of the OSI model. View Details View Details View Details View Details View Details View Details View Details
IT. 24. Diagram the components of an integrated IT system. View Details View Details View Details View Details View Details View Details
IT. 25. Differentiate among various computer networking models. View Details View Details View Details View Details View Details View Details View Details
IT. 26. Differentiate among various techniques for making a computer network secure. View Details View Details View Details View Details View Details View Details View Details
IT. 27. Summarize the flow of data through a computer network scenario. View Details View Details View Details View Details View Details View Details View Details
IT. 28. Demonstrate best practices for designing end-user computing interfaces. View Details View Details View Details View Details View Details View Details View Details
IT. 29. Demonstrate the techniques of defensive programming and secure coding. View Details View Details View Details View Details View Details View Details View Details
IT. 30. Diagram the phases of the Secure Software Development Lifecycle. View Details View Details View Details View Details View Details View Details View Details
IT. 31. Discuss software development methodologies. View Details View Details View Details View Details View Details View Details View Details
IT. 32. Summarize the differences among various programming languages. View Details View Details View Details View Details View Details View Details View Details
IT. 33. Use a programming or a scripting language to share data across an integrated IT system. View Details View Details View Details View Details View Details View Details View Details
IT. 34. Use a programming or a scripting language to solve a problem. View Details View Details View Details View Details View Details View Details View Details
IT. 35. Differentiate among strategies for business continuity provisioning of IT resources at the enterprise level. View Details View Details View Details View Details View Details View Details View Details
IT. 36. Discuss data governance and its implications for users as well as IT professionals. View Details View Details View Details View Details View Details View Details View Details
IT. 37. Identify a variety of enterprise-level digital storage technologies. View Details View Details View Details View Details View Details View Details View Details
IT. 38. Implement an application of virtualization. View Details View Details View Details View Details View Details
IT. 39. Modify a system to improve data confidentiality or regulatory compliance. View Details View Details View Details View Details View Details View Details View Details
IT. 40. Summarize the implications of various cloud computing models. View Details View Details View Details View Details View Details View Details View Details
IT. 41. Summarize the security implications and risks for distributed IT systems. View Details View Details View Details View Details View Details View Details View Details
IT. 42. Use communication, negotiation, and collaboration skills as a member of a diverse team. View Details View Details View Details View Details View Details View Details
IT. 43. Describe the attitudes, knowledge and abilities associated with quality customer service. View Details View Details View Details View Details View Details View Details View Details
IT. 44. Produce technical documentation responsive to an identified computing scenario View Details View Details View Details View Details View Details View Details View Details
IT. 45. Use documentation or a knowledge base to resolve a technical challenge in an identified computing scenario. View Details View Details View Details View Details View Details View Details View Details
IT. 46. Discuss significant trends and emerging technologies and their impact on global society. View Details View Details View Details View Details View Details View Details View Details
IT. 47. Demonstrate professional behavior in response to an ethically-challenging scenario in computing. View Details View Details View Details View Details View Details View Details
IT. 48. Summarize the tenets of ethics and professional behavior promoted by international computing societies. View Details View Details View Details View Details
IT. 49. Describe IT procurement processes for goods and services. View Details View Details View Details View Details View Details View Details
IT. 50. Summarize the role of IT in supporting the mission and goals of an organization. View Details View Details View Details View Details View Details