Вы находитесь на странице: 1из 24

S/NO

ASSESSMENT CRITERIA

SATISFACTORY

GOOD

EXCELLENT

1.1.1

Mathematical concepts in calculation and preparation of database are properly applied Basic problems relating to ICT are accurately solved using mathematical principles Basic writing skills are properly applied Principles and theories involving business correspondence are appropriately applied Employment communication is properly applied Simple research proposal and effective memos, paper

Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems). Evaluate basic counting techniques and discrete probability

Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems) and explains sets and relations. Evaluate basic counting techniques and discrete probability and explain important algorithms of graph theory. Apply grammar and Construct sentences Write business letters, E-mail and simple reports Write employment application letters, CVs and Participate in employment interviews Prepare simple research proposal and Write effective memos

1.1.2

Convert various base number systems, (e.g. the binary, octal, and hexadecimal number systems), explain sets, relations and basic number theoretical functions. (e.g the MODE function, GCD, and LCM) Evaluate basic counting techniques and discrete probability, explain important algorithms of graph theory and Boolean logic and techniques of mathematical proofs. Apply grammar, Construct sentences and Write small texts Write business letters, E-mail, simple reports and sales letters Write employment application letters, CVs, Participate in employment interviews and Search for jobs Prepare simple research proposal, Write effective memos and Prepare paper and other business presentations

1.2.1

Apply grammar

1.2.2

Write business letters and Email Write employment application letters and CVs

1.2.3

1.2.4

Prepare simple research proposal

2.1.1

presentation and other business presentations are properly prepared The dream weaver application program is started properly

Explore the DW Workspace, View a Web page and Use the Help feature

Explore the DW Workspace, View a Web page , Use the Help feature ,Plan and Define a Web Site

Explore the DW Workspace, View a Web page,Use the Help feature, Plan ,Define a Web Site,Add Folders ,Pages to your Web Site and Create and View a Site Map Create Head Content ,Set page properties, Create, Import, and Format Text, Add Links to Web pages,Use the History Panel and the Code Inspector ,Modify and Test Web pages Create Unordered ,Ordered Lists, Apply, Edit Cascading Style Sheets, Insert ,Align Graphics, Enhance an Image ,Use Alternate Text and insert a Background Image and Perform Site maintenance Create External, Internal Links, Insert Flash Text, Create, Modify a Navigation Bar and Manage Web Site Links Create a Table,Resize, Split, Merge Cells, Insert and Align Graphics in Table Cells and Insert Text , Format Cell Content, and Perform Web Site Maintenance Understand the Adobe Flash CS3 Workspace,Open a Document, Play a Movie, Create ,Save a Movie, Work with the Timeline and Distribute an Adobe Flash Movie

2.1.2

Website is developed properly using the Dreamweaver application programs Text and graphics are properly applied in a well designed website

Create Head Content,Set page properties,Create, Import, and FormatText

Create Head Content, Set page properties,Create, Import, and FormatText and Add Links to Web pages Create Unordered ,Ordered Lists, Apply, Edit Cascading Style Sheets, Insert and Align Graphics

2.1.3

Create Unordered ,Ordered Lists,Apply, and Edit Cascading Style Sheets

2.1.4

Links are properly utilized in designing a website Tables are created, resized and utilized in a designed website

Create External, Internal Links and Insert Flash Text Create a Table,Resize, Split, Merge Cells, Insert and Align Graphics in Table Cells

Create External,Internal Links, Insert Flash Text, Create and Modify a Navigation Bar Create a Table,Resize, Split, Merge Cells, Insert and Align Graphics in Table Cells and Insert Text and Format Cell Content Understand the Adobe Flash CS3 Workspace,Open a Document, Play a Movie, Create ,Save a Movie and Work with the Timeline

2.1.5

2.2.1

Adobe Flash is correctly started to design a website

Understand the Adobe Flash CS3 Workspace,Open a Document, Play a Movie, Create and Save a Movie

2.2.2

Objects are drawn correctly using Adobe Flash in a website

Use the Flash Drawing Tools,Select Objects ,Apply Colors and Work with Drawn Objects

Use the Flash Drawing Tools,Select Objects ,Apply Colors , Work with Drawn Objects and Work with Text and Text Objects

Use the Flash Drawing Tools,Select Objects ,Apply Colors , Work with Drawn Objects and Work with Text ,Text Objects and Layers and Objects

2.2.3

Symbols and buttons are correctly applied using Adobe flash. Animations are correctly created using Adobe Flash

Create Symbols,Instances and Work with Libraries

Create Symbols, Instances ,Work with Libraries and Create Buttons

Create Symbols, Instances ,Work with Libraries , Create Buttons and Assign Actions to Frames and Buttons Create Frame-by-Frame Animations, Motion-Tweened Animations ,Work with Motion Guides ,Create animation effects And Animate Text

2.2.4

Create Frame-by-Frame Animations, Motion-Tweened Animations and Work with Motion Guides

Create Frame-by-Frame Animations, Motion-Tweened Animations ,Work with Motion Guides and Create animation effects

2.2.5

Special effects are applied correctly in website using Adobe Flash Database and transaction are correctly describe

Create Shape Tween Animations, Mask Effect and Add Sound

Create Shape Tween Animations, Mask Effect Add Sound and Scenes

Create Shape Tween Animations, Mask Effect Add Sound ,Scenes and Create an Animated Navigation Bar

2.3.1

explain database system

explain database system, relational databases and database architecture

explain database system, relational databases, database architecture and Describe transaction management

2.3.2

Database models are correctly described

Explain data models

Explain data models and Describe Basic building blocks of data models

Explain data models,Describe Basic building blocks of data models and Explain the Degrees of data abstraction.

2.3.3

Database design is correctly described

Explain the ER-Model

Explain the ER-Model and Describe the Logical view of data

Explain the ER-Model, Describe the Logical view of data and the features of good relational database design

2.3.4

Relational Algebra and Calculus are properly described a)

Explain Selection and projection

Explain Selection, projection and Describe Operators

Explain Selection, projection,Describe Operators and Explain Tuple relational calculus

2.3.5

b) Explain constraints c) Introduce views, d) Apply SQL statements

Constraints, views and SQL commands are correctly described and applied during the design of a database

2.3.6

a)

b) Create Tables c) Apply sql commands d) Apply Aggregate functions b) IdentifyDifferent types of PC configurations and their comparison c) Outline the Overview and features of ISA, PCI-X, PCI-Xpress, AGP, Processor Bus d) Describe memory organization b) Explain Recording

SQL tables are created and updated correctly

2.4.1

a)

Motherboard and its Components are clearly described

2.4.2

a)

Storage Devices & its Interfacing

Technique c) Describe Hard disk constructionand working d) Identify features of parallel AT attachment (PATA), Serial AT Attachment (SATA), External SATA 2.4.3 a. b. Explain the CRT colour monitor including the Block diagram and function of each block and the Characteristics of CRT monitor c. Identify theLCD monitor , functional blockdiagram of LCD monitor, working principal, advantages and disadvantages Types d. Explain the Important characteristics of display screen b) Explain Block diagram and working of SMPS c) Power supply characteristics d) Describe Power

are properly described

Display Devices & Interfacing are properly described

2.4.4

a)

Power Supplies of computers are clearly Described

problems and Protection devices Interfaces 2.4.5 a) b) Explain Preventive Maintenance c) Describe Fault finding and troubleshooting of computer peripherals d) Describe the Working of logic probe, logic purser, current (CRO). b. Explain SCSI, SCSI cables and connectors, SCSI drive configuration; c. Describe USB features; RS232 : (Voltages & 9 pin Signal description d. Describe Centronics (interface diagram, signals and timing waveform) e. Describe Firewire features. b) Identify roles of systems analyst c) Explain Structured Analysis &Structured Design PC Diagnostic, Testing and Maintenance & Tools are clearly described.

2.4.6

a.

PC interfaces are clearly described.

2.5.1

a)

phases of the software life cycle (SDLC) and the major deliverables and activities associated with each phase are properly described

d) Explain ObjectOriented Analysis and Design 2.5.2

a)

b) Initiate and Plan Information Systems Projects Structures as output parameters. c) Apply CASE tools d) Gather Information using traditional and modern techniques.

System Requirements and Design Strategies are clearly determined

2.5.3

a)

b) Apply Process Modeling c) Apply Conceptual Data Modelling d) Apply Object-Oriented Analysis e) Apply Logical & Physical Design in Designing Forms and Reports, Designing UserInterface Details b. Outline the basic Components of a Computer: Software & Hardware c. Introduce an Overview of Computer Programming Languages

systems requirements are clearly structured

3.1.1

a.

Computer Programming concepts used in writing code are clearly introduced

d. Describe Program development life cycle (algorithms) e. Apply Number Systems and Conversions 3.1.2 a. b. Explain the Java Background c. Outline Phases of a Java Program d. Write your First Java Program: Hello World! e. Write programs by using a text editor and console f. Deal with errors b. Describe Java Comments, statements, blocks, identifiers, keywords, literals c. Explain the Primitive data types d. Define Java Variables e. Explain Java Operators(arithmetic, relational) and Operator Precedence f. Explain Java Operators(logical, conditional) and Operator Precedence overview and Introduction to Java are properly described

3.1.3

a.

Programming Fundamentals used in Java programs are clearly described

3.2.1

a.

b. Explain and apply the Decision control structures (if, else, switch) c. Apply Java Repetition control structures (while, do-while, for) d. Apply Java Branching statements (break, continue, return) e. Describe Java Arrays and Command Line arguments b. Introduce the Objectoriented programming c. Apply Encapsulation d. Apply Classes and Objects e. Apply Class variables and methods f. Apply Casting, Converting and Comparing Objects

Java Control Structures used when writing a program are clearly described

3.2.2

a.

Java Class Library used when conding programs are properly worked.

3.2.3

a.

b. Define your own classes c. Declare attributes (instance variables, static variables) d. Declare methods (accessor, mutator) e. Apply The this reference f. Apply the Overloading methods g. Declare constructors

Object-Oriented Programming is clearly described

h. Apply The this() constructor call 3.3.1 3.3.2 3.3.3 4.1.1 windows basics applications are clearly identified Define windows,Introduce windows and advance window versions Define windows,Introduce windows ,advance window versions,Operationize windows basic control and Work with programs Define windows,Introduce windows ,advance window versions,Operationize windows basic control and Work with programs,Manage files and folders and Customize windows and explain accessories of windows Type, Edit, Proof , Review typed document,Format Text & Paragraphs,Apply Automatic Formatting and Styles, Work with Tables,Apply Graphics ,Frames ,Mail Merge and Automate Your Work & print Documents

4.1.2

Ms Word to Explore office applications are properly used

Type, Edit, Proof , Review typed document,Format Text & Paragraphs,Apply Automatic Formatting and Styles

Type, Edit, Proof , Review typed document,Format Text & Paragraphs,Apply Automatic Formatting and Styles, Work with Tables,Apply Graphics ,Frames and Mail Merge

4.1.3

Exel to Explore office applications are properly used

Work & Edit In Workbooks ,Create Formats & Links, Format a Worksheet & create graphic objects, Create Charts (Graphs), format and analyze data

Work & Edit In Workbooks ,Create Formats & Links, Format a Worksheet & create graphic objects, Create Charts (Graphs), format, analyze data and Organize Data in a List (Data Management)

Work & Edit In Workbooks ,Create Formats & Links, Format a Worksheet & create graphic objects, Create Charts (Graphs), format, analyze data ,Organize Data in a List (Data Management),Share & Import Data and Apply Printing

4.1.4

Power point to Explore office applications are properly used

Get started with PowerPoint ,Create a presentation, edit, Preview a slide show

Get started with PowerPoint,Create a presentation, edit, Preview a slide show , Add picture & graph And Add sound & video

Get started with PowerPoint,Create a presentation, edit, Preview a slide show , Add picture & graph And Add sound & video,Add auto shape and Animate objects

4.1.5 4.2.1

Networking Fundamentalals Are clearly described

Recognize the logical or physical network topologies given a diagram, schematic, or description of Star, Bus, Mesh, and Ring and Specify the main features of 802.2 (Logical Link Control) Recognize the logical or physical network topologies given a diagram, schematic, or description of Star, Bus, Mesh, and Ring and Specify the main features of 802.2 (Logical Link Control) and Specify the characteristics of the cable

Recognize the logical or physical network topologies given a diagram, schematic, or description of Star, Bus, Mesh, and Ring and Specify the main features of 802.2 (Logical Link Control) ,Specify the characteristics of the cable ,Recognize the media types and describe their uses and Identify the purposes, features, and functions of network components: Identify a MAC address,its parts ,the seven layers of the OSI and Differentiate between network protocols Interface Describe the TCP/IP family of protocols, IP Addressing, address classification, and name resolutions services and Identify the purpose of subnetting, the differences between private and public network addressing schemes, Define the purpose, function and use protocol and Identify the well-known ports.

4.2.2

OSI Model is clearly described

Identify a MAC address and its parts.

Identify a MAC address,its parts and the seven layers of the OSI

4.2.3

TCP/IP Fundamentals are clearly described

Describe the TCP/IP family of protocols, IP Addressing, address classification, and name resolutions services and Identify the purpose of subnetting, the differences between private and public network addressing schemes

Describe the TCP/IP family of protocols, IP Addressing, address classification, and name resolutions services and Identify the purpose of subnetting, the differences between private and public network addressing schemes, Define the purpose, function and use protocol.

4.2.4

a.

b. Learning how to use the Address Resolution Protocol (ARP), the netstat Utility, the nbstat Utility, the File Transfer Protocol (FTP), the ping Utility,

TCP/IP Utilities are properly described.

winipcfg, ipconfig, ifconfig, the tracert Utility, the Telnet

c.

Utility, and the nslookup Utility. Given a troubleshooting scenario, select the appropriate network utility from the following:

4.3.1

a.

d. Given output from a network diagnostic utility, identify the utility and interpret the output. b. Identify the basic capabilities (for example, features, client support, interoperability authentication, Directory Structure, file and print services,

tracert/traceroute, ping, arp, netstat, ipconfig/ifconfig, winipcfg, nslookup/dig

Network Operating Systems are properly described

4.3.2

a.

application support and security) of the following server operating systems to access network resources: c. Unix/Linux/Mac OS X Server d. Novell Netware e. Microsoft Windows f. AppleShare IP (Internet Protocol b. Identify the following security protocols and describe their purpose and function: IPSec (Internet Protocol Security), L2TP (Layer 2 Tunneling Protocol), SSL (Secure Sockets Layer), WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), 802.1x c. Identify authentication protocols (for example, CHAP [Challenge Handshake Authentication Protocol], MS-CHAP [Microsoft Challenge Handshake Authentication Protocol], PAP [Password Authentication Protocol], RADIUS

Network Access and Security are clearly described

4.3.3

a.

[Remote Authentication Dial-In User Service], Kerberos, and EAP [Extensible Authentication Protocol]) d. Identify the basic capabilities needed for client workstations to connect to and use network resources (for example, media, network protocols, and peer and server services). e. Identify the purpose, benefits, and characteristics of using a firewall. f. Identify the purpose, benefits, and characteristics of using a proxy service. g. Giving a connectivity scenario, determine the impact on network functionality of a particular security implementation (for example, port blocking/filtering, authentication, and encryption b. Identify the purpose, benefits, and characteristics of using

Fault Tolerance and Disaster Recovery are properly described.

4.3.4

a.

antivirus software for virus protection. c. Identify the purpose and characteristics of how to asses fault tolerance disaster recovery needs: for example, disk system fault tolerance methods, Power, Link redundancy, Storage, and Services. d. Identify the purpose and characteristics of disaster recovery for backup consideration: Backup/restore,Offsite storage,Hot and cold spares;Hot, warm, and cold sites b. Giving a network scenario, interpret visual indicators (for example, link LEDs [lightemitting diodes] and collision LEDs) to determine the nature of a stated problem. c. Given a troubleshooting scenario involving a client accessing remote network services, identify the cause of the problem (for example, file services, print

Network Troubleshooting is properly described

services, authentication failure, protocol configuration, physical connectivity, and SOHO [small office, home office] router). d. Given a troubleshooting scenario between a client and the following server environments, identify the cause of a stated problem: UNIX/xMac OS X Server NetWare, Windows, AppleShare IP. e. Given a scenario, determine the impact of modifying, adding, or moving network services (for example, DHCP [Dynamic Host Configuration Protocol], DNS {Domain Name Service] and WINS (Windows Internet Naming Service]) for network resources and users. f. Given a troubleshooting scenario involving a network with a particular physical topology (for example,

bus, star, mesh, or ring) and including a network diagram, identify the network area affected and the cause of the stated failure g. Given a network troubleshooting scenario involving an infrastructure (for example, wired or wireless) problem, identify the cause of a stated problem (for example, bad media, interference, network hardware, or environment). h. Given a network problem scenario, select an appropriate course of action based on a logical troubleshooting strategy. This strategy can include the following steps: 1.Identify the symptoms and potential causes, 2. Identify the affected area, 3. Establish what has changed, 4. Select the most probable cause, 5.Implement an action plan and solution, including

5.1.1 a.

potential effects, 6.Test the Result, 7.Identify the results and effects of the solution, 8.Document the solution and process b. Explain Security and its history c. Explain NSTISSC Security Model d. Explain Information system components e. Explain Balancing security with access Elements of Information and Web Security is clearly described

5.1.2

5.1.3

a.

a) Explain Security implementation b) Explain System and Security Development Life Cycles c) Explain Law and Ethics d) Explain Ethics ,privacy and Codes of Ethics b. Explain the need of security in Business c. Explain Threats

Legal, Ethical, and Professional Issues in Information Security are clearly described

The Need for Security in information computing is clearly described

d. Explain Attacks e. Outline Top ten security vulnerabilities 5.2.1 a. b. Explain Risk management overview c. Explain Risk identification d. Explain Quantitative and qualitative risk control e. Explain Risk management f. Explain Risk control practice g. Explain Risk assessment h. Explain Risk control strategies and selection b. Explain Security policy, standards and practices c. Explain Information security blueprint d. Explain Risk Management is clearly described

5.2.2

a.

Security Planning strategies are clearly described.

5.2.3

a.

5.3.1

a.

b. Describe Physical design c. Describe Firewalls d. Describe Protecting remote connections e. Describe Intrusion detection and prevention systems f. Describe Honey pots, honey nets and padded cell systems g. Describe Scanning and analysis tools, access control devices b. Describe Cryptography Foundations c. Describe Cipher methods d. Describe Cryptographic algorithms e. Describe Cryptographic tools f. Describe Protocols for secure communications g. Describe Attacks on cryptosystems

Security education, training and awareness e. Explain Continuity strategies

Security Technology: Firewalls and VPN, and Intrusion Detection and Access Control are clearly described

Cryptography is clearly described

5.3.2

a.

b. Explain Physical access controls c. Explain Fire security and safety d. Explain Supporting utility failure and structural collapse e. Explain Data interception f. Explain Mobile and portable systems g. Explain Special considerations for physical security threats h. Explain Project management i. Explain Technical implementatio n topics j. Explain Nontechnical implementatio n topics k. Explain Certification and accreditation

Physical Security and Implementing Information Security Is properly described

5.3.3

a.

b. Explain Positioning and staffing c. Explain Information security professional credentials d. Explain Employment policies and practices e. Explain Security for nonemployees f. Explain Internal control strategies g. Explain Privacy and security of personnel data h. Explain Security management models i. Explain Maintenance model j. Explain Digital forensics Collect components Organize equipment and tools Configure and run

Security and Personnel, and Information Security Maintenance is properly described

6.1.1

Networked computers are correctly connected and configured

6.1.2

6.2.1

6.2.2

6.2.3

6.2.4

6.3.1

computer network Manage computer networks Monitor computer users Provide IP address to users Keep computer hardware Store computer hardware Organize computer hardware Connect all hardwares to obtain computer systems Test the system and install operating systems Install/Reinstall the operating system. Install application software. Run other application software Control the server Manage other networked computers Provide access rights to nodes/workstations Describe the usage of networked computers Organize the servers Provide closed loop with all nodes Organize different computers in other organizarions

Network systems are correctly analysed

Computer hardwares are properly maintained

Computer hardwares are correctly connected

Computer software is properly updated

Computer networking is properly managed

Organisational stakeholders are effectivelly communicated with

6.3.2

Collect different equipments and tools Apply mathematical rules in solving different computer problems

Computing mathematics is accurately applied in solving computer problems

Вам также может понравиться