Академический Документы
Профессиональный Документы
Культура Документы
1.3.3 Identify hardware and software considerations when See Web Reading 1
purchasing a computer
1.3.4 Identify other factors that go into decisions to purchase a See Web Reading 1
computer including warranties and support agreements.
3.1.5 Identify and solve common problems related to operating Lesson 2 (pp. 10–14)
systems.
Objective 3.2 Manipulate and control the Windows desktop, files, and
disks.
3.2.1 Identify elements of the Windows desktop. Lessons 3 and 66 (pp. 14–21,
262–268)
3.2.7 Identify precautions one should take when manipulating Lesson 9 (pp. 55–58)
files, including using standardized naming conventions.
3.2.8 Solve common problems associated with working with Lessons 5 and 64 (pp. 35–39,
files. 248–255)
Objective 3.3 Identify how to change system settings, install, and
remove software.
3.3.1 Display control panel. Lesson 56 (pp. 188–194)
Chapter1 Supplemental
Activity (on Web)
3.3.2 Identify different control panel settings. Lesson 56 (pp. 188–194); also
Chapter1 Supplemental
Activity (on Web)
3.3.3 Change simple control panel settings such as date and time Chapter 1 Supplemental
settings. Activity (on Web)
3.3.4 Display and update a list of installed printers. Lesson 4 (pp. 21–28
3.3.5 Identify precautions regarding changing system settings. See Web Reading 5
3.3.6 Install software including installing updates from online Lessons 57 and 60 (pp. 195–
sources. 203, 214–220)
3.3.7 Identify common problems associated with installing and See Web Reading 5
running applications.
Module 2: Key Applications
4.3.2 Identify concepts related to intellectual property laws, Lesson 14 (pp. 84–88)
including copyrights, trademarks, and plagiarism.
4.3.3 Identify the principles regarding when information can or Lesson 14 (pp. 84–88)
cannot be considered personal, including the difference
between computer systems owned by schools or business
that may have rules and guidelines as to who owns data
stored on the system, and computers owned by individuals.
4.3.4 Identify how to avoid hazards regarding electronic Lessons 13 and 14 (pp. 80–84,
commerce, including giving credit card information only 84–88)
on secure sites.
4.3.5 Identify how to protect privacy and personal security Lessons 13, 14, Chapter 3
online, including understanding how Web sites track an Apply (pp. 80–84, 84–88);
activity online using “cookies” and other “behind-the- also Chapter 3 Supplemental
scenes” systems. Activity (on Web)
4.3.6 Identify how to find information about rules regarding the Lessons 4 and 14 (pp. 21–28,
use of computers and the Internet, including laws, used 84–88)
policies at school, and company guidelines at places of
employment.
4.3.7 Identify how to stay informed about changes and See Web Readings 1 and 2
advancements in technology.
4.3.8 Identify how to be a responsible user of computers and the Lessons 13 and 14 (pp. 80–84,
Internet. 84–88)