Вы находитесь на странице: 1из 62

IC3 GS5: Computing Fundamentals

First Edition

LearnKey provides self-paced training courses and online learning solutions to education, government, business, and individuals
world-wide. With dynamic video-based courseware and effective learning management systems, LearnKey provides expert
instruction for popular computer software, technical certifications, and application development. LearnKey delivers content on
the Web, by enterprise network, and on interactive CD-ROM. For a complete list of courses visit:

http://www.learnkey.com/

All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means now known or to be
invented, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system without
written permission from the author or publisher, except for the brief inclusion of quotations in a review.

© 2014 LearnKey www.learnkey.com

631567
Table of Contents
Using this Workbook __________________________________________________________________________ 5
Best Practices Using LearnKey’s Online Training ____________________________________________________ 6
IC3 GS5: Computing Fundamentals �������������������������������������������������������������� 8
Skills Assessment ����������������������������������������������������������������������������� 9
IC3 GS5: Computing Fundamentals Time Table ��������������������������������������������������� 11

Projects
Fill-in-the-Blanks ��������������������������������������������������������������������������� 13
Define Basic Terms �������������������������������������������������������������������������� 15
Understanding RAM ������������������������������������������������������������������������� 16
Label Ports ��������������������������������������������������������������������������������� 17
Label Peripherals ���������������������������������������������������������������������������� 19
Power Management �������������������������������������������������������������������������� 21
Working with Hardware Configuration ���������������������������������������������������������� 22
Wired Network ����������������������������������������������������������������������������� 23
Define Computing Fundamentals Terms ��������������������������������������������������������� 24
Cellular Phones ����������������������������������������������������������������������������� 25
Understand Smartphones ��������������������������������������������������������������������� 26
Configure Voicemail ������������������������������������������������������������������������� 27
Using Skype �������������������������������������������������������������������������������� 28
Set Up Notifications ������������������������������������������������������������������������� 29
Defining Operating Systems ������������������������������������������������������������������� 30
Label Page Options �������������������������������������������������������������������������� 31
Labeling Menu Navigation �������������������������������������������������������������������� 32
Desktop Customization ����������������������������������������������������������������������� 33
Permissions and Rights Explained ��������������������������������������������������������������� 34
Install and Uninstall Software ������������������������������������������������������������������ 35
File Types ���������������������������������������������������������������������������������� 36
Files Sharing and Permissions ������������������������������������������������������������������ 38
Files Scanned and Sent ����������������������������������������������������������������������� 39
Folder Rename and Find ���������������������������������������������������������������������� 40
Manage Electronic Media ��������������������������������������������������������������������� 41
Troubleshooting Issues ����������������������������������������������������������������������� 42
Cloud Concepts and Benefits ������������������������������������������������������������������ 43
Troubleshooting Issues ����������������������������������������������������������������������� 44
Online Storage Apps ������������������������������������������������������������������������� 45
Online Office and Database CRM Apps ��������������������������������������������������������� 46
Create an Account ��������������������������������������������������������������������������� 47
Define Malicious Programs and Attacks ���������������������������������������������������������� 48
Windows Defender and Firewall ��������������������������������������������������������������� 49
Master Project
IC3 GS5: Computing Fundamentals Master Project ______________________________________________________51

Appendix
IC3 GS5: Computing Fundamentals Lesson Plan ________________________________________________________54
IC3 GS5: Computing Fundamentals Outline ����������������������������������������������������������62
Using this Workbook
The exercises in this manual serve as a companion to LearnKey’s training and are organized by session to match the presented
concepts. Within each session, exercises are arranged from easiest to most challenging. In the Introduction section of each
session, you will find outlines of the training and sample lesson plans which will give you an overview of the training content
and help you to structure your lessons. The following sections are included for each session of training:

Skills Assessment: The skills assessment will help you and your students to gauge their understanding of course topics prior
to beginning any coursework. Each skill listed is tied directly to an exam objective. Understanding where your students feel
less confident will aid you in planning and getting the most from the training.

Objective Mapping and Shoot File Links: The objective mapping provides a quick reference as to where in the training
a specific certification exam objective is covered. The Files column lists the name of the Course Support files (Excel
spreadsheets, Photoshop files, etc.) that are used and demonstrated during the training. The files will typically have a starting
file containing all data necessary to begin the demonstrated skill, as well as a completed file which shows the final result.

Keyboard Shortcuts and Tips: The keyboard shortcuts and tips provide a reference of product-specific keyboard shortcuts
and helpful hints to make working more efficient.

Short Answer and Matching: The short answer questions facilitate a recall of the basic training concepts to further aid in
retention of the course topics and information in preparation for the training’s Pre-Assessments, Post Tests, and MasterExam.
The matching exercise provides additional learning reinforcement of terms and concepts found throughout the training in the
course’s glossary.

Projects: The projects in this manual are organized by session to match the concepts presented in the LearnKey training.
Each project is assigned a difficulty level of either beginner, intermediate, or advanced. Some projects will be noted as
“beginner-intermediate” or other range. Within each session, projects are arranged from easiest to most challenging. Each
project includes a description of the task as well as steps required for successful completion. Note that the steps may
not indicate each required action but will provide the expectation of what is required, leaving the action to the student.
References to the concepts demonstrated in the LearnKey training that are required for successful completion of the project
are also included. Each project will also indicate the files and software used to complete the tasks. Some projects may only
include a file named “ProjectTitle_End.” Projects only including an end file typically begin with a new file which is indicated
in the first step. The “ProjectTitle_End” file is included to illustrate a possible correct result. Other projects may include a file
named “ProjectTitle_Start” or other files. Projects with a “ProjectTitle_Start” file begin with that file instead of a new file.
“Start” files typically contain data required for the project pre-inserted to focus the project on concepts versus data entry.

5 | Introduction IC³ GS5: Computing Fundamentals Project Workbook


Best Practices Using LearnKey’s Online Training
LearnKey offers video-based training solutions which are flexible enough to accommodate the private student, as well as
educational facilities and organizations.

Our course content is presented by top experts in their respective fields and provides clear and comprehensive information.
The full line of LearnKey products have been extensively reviewed to meet superior standards of quality. The content in our
courses has also been endorsed by organizations, such as Certiport, CompTIA®, Cisco, and Microsoft. However, it is the
testimonials given by countless satisfied customers that truly set us apart as leaders in the information training world.

LearnKey experts are highly qualified professionals who offer years of job and project experience in their subjects. Each
expert has been certified in the highest level available for their field of expertise. This provides the student with the knowledge
necessary to also obtain top-level certifications in the field of their choice.

Our accomplished instructors have a rich understanding of the content they present. Effective teaching encompasses not only
presenting the basic principles of a subject, but understanding and appreciating organization, real-world application, and links
to other related disciplines. Each instructor represents the collective wisdom of their field and within our industry.

Our Instructional Technology


Each course is independently created, based on standard objectives provided by the manufacturer for which the course was
developed.

We ensure that the subject matter is up-to-date and relevant. We examine the needs of each student and create training
that is both interesting and effective. LearnKey training provides auditory, visual, and kinesthetic learning materials to fit
diverse learning styles. The following are three levels of implementation:

Standard Training Model


The standard training model allows students to proceed through basic training, building upon primary knowledge and
concepts to more advanced application and implementation. In this method, students will use the following toolset:

Pre-assessment: The pre-assessment is used to determine the student’s prior knowledge of the subject matter. It
will also identify a student’s strengths and weaknesses, allowing the student to focus on the specific subject matter
he/she needs to improve most. Students should not necessarily expect a passing score on the pre-assessment as it is
a test of prior knowledge.

Video training session: Each course of training is divided into sessions that are approximately two hours in
length. Each session is divided into topics and subtopics.

Post test: The post test is used to determine the student’s knowledge gained from interacting with the training. In
taking the post test, students should not consult the training or any other materials. A passing score is 80 percent
or higher. If the individual does not pass the post test the first time it is taken, LearnKey would recommend the
incorporation of external resources, such as the workbook and additional customized instructional material.

6 | Introduction IC³ GS5: Computing Fundamentals Project Workbook


Intermediate Training Model
The intermediate training model offers students additional training materials and activities which allows for better
retention, review, and interaction. This model includes not only the standard model material, but also includes the
following toolset:

Study guides: Study guides are a list of questions missed which can help students recognize areas of weakness
and necessary focus. They can be accessed from either the pre-assessment or post test.

Labs: Labs are interactive activities that simulate situations presented in the training. Step-by-step instructions
and live demonstrations are provided.

Workbooks: Workbooks have a variety of activities, such as glossary puzzles, short answer questions, practice
exams, research topics, and group and individual projects, which allow the student to study and apply concepts
presented in the training.

Master Training Model


The master training model offers the student an additional opportunity to prepare for certification by further examining his/
her knowledge. This model includes the materials used in the standard and intermediate models, as well as the MasterExam.

MasterExam: The MasterExam draws from a large pool of questions to provide a unique testing experience each
time it is taken. LearnKey recommends a student take and pass the exam, with a score of 80 percent or higher,
four times in order to prepare for certification testing. Study guides can also be accessed for the MasterExam.

7 | Introduction IC³ GS5: Computing Fundamentals Project Workbook


IC3 GS5: Computing Fundamentals
In LearnKey’s IC3 GS5: Computing Fundamentals course, students will learn the basic functions of computing and how to
complete common computing tasks. They will also learn how to identify different computer software, how to use an operating
system, computer hardware, peripherals, and troubleshooting. At the completion of this course students will be prepared to
take the IC3 GS5 exam.

Benefits:
• The IC3 GS5 courses have been split into three courses that will match the three exams. This course only focuses on
the Computing Fundamentals exam objectives.
• Throughout the course there are opportunities to practice and reinforce what you have learned through quizzes and
simulations that do not require you to leave the training.

8 | Introduction IC³ GS5: Computing Fundamentals Project Workbook


Skills Assessment
Instructions: Rate your skills on the following tasks from 1-5 (1 being needs improvement, 5 being excellent).
Skills 1 2 3 4 5
Understand cellular phone concepts

Be familiar with cellular-enabled tablets

Be familiar with smartphones

Understand the use of hardwired phones

Know how to configure and use voice mail

Use of instant messaging

Know how to configure notifications

Types of devices

Know the impact of memory and storage on usage

Know how to connect to different peripherals

Understand the use of Ethernet ports

Connect a device to a wireless network [Wi-Fi]

Understand power management and power settings

Understand driver concepts as well as their device compatibility

Know platform implications and considerations

Know platform compatibility

Know the difference between cellular, Wi-Fi, and wired networks

Understand concepts regarding connecting to the Internet

Understand common hardware configurations

Implications for document usage

Understand the pros and cons of touchscreens vs. non-touchscreen


devices

Understand operating system versioning and update awareness

Know concepts surrounding applications vs. operating system vs. global


settings

Have a general understanding of operating systems and software settings

Set software preferences

Know eCommerce interactions and best practices

Understand what Virtual Private Networks (VPNs) are

9 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Instructions: Rate your skills on the following tasks from 1-5 (1 being needs improvement, 5 being excellent).
Skills 1 2 3 4 5
Users and profiles

Know file structures and file/folder management

Document management

Menu navigation

Searching for files

Rights and permissions (administrative rights)

Define an IP address

Know how to install, uninstall, update, repair software

Troubleshooting

Understand backing up concepts

Know how to back up and restore

Know how to complete a full system restore on a personal device

Understand needs for file compression/zipping in sharing

Understand cloud concepts

Know the benefits of using cloud storage

Access and utilization of the cloud

Web apps vs. local apps

Understand web app types

Know credential management best practices

Know basic account setting management

Know the basic threats to security of computers, data, and identity

Understand the implications of monitoring software (surveillance)

Connecting to secured vs. unsecured network (wired and wireless)

Know the use of and importance of antivirus software

Know the use of firewalls and basic settings

10 | Projects IC³ GS5: Computing Fundamentals Project Workbook


IC3 GS5: Computing Fundamentals Time Table
Session 1 Actual Time
Hardware 00:22:19
Internet Basics 00:10:39
Mobile Devices 00:19:21
Software Architecture 00:36:29
File and Software Management 00:21:52
Troubleshooting Basics 00:13:52
Cloud Computing 00:17:17
Security 00:13:37
Total Time 02:35:26

***The actual time is calculated based on how long it will take to simply watch the video files.
***The total trianing time (inlcuding watching the videos, completing the labs, projects, and assessments) may double or even
triple the actual time.

11 | Projects IC³ GS5: Computing Fundamentals Project Workbook


12 | Session 1 IC³ GS5: Computing Fundamentals Project Workbook
Fill-in-the-Blanks
Instructions: While watching Session 1, fill in the missing words according to the information presented by the instructor. [References
are found in the brackets.]

Hardware
1. A is a computer or program that is responsible for accepting requests from various network
sources. [Device Basics]

2. memory can only store information when a computer is on, while


memory will retain information even if there is no power. [Memory and Storage]

3. External speakers are often connected using USB or inch audio jacks. [Connecting Speakers]

4. A touchscreen requires less but is less accurate than a non-touchscreen. [Touchscreens vs. Non-
Touchscreens]

Internet Basics
5. A modem is a device which translates signals into information.
[Modems]

6. Bandwidth defines how fast data can transfer to a device and is purchased through an .
[Bandwidth]

7. A router is a device used to transfer data from one computer network to another. [Routers]

8. The most common form of wired network connection is done using an connection. [Wired
Connection]

Mobile Devices
9. Although a tablet can connect to a cellular network, it cannot be used as a . [Cellular-Enabled
Tablets]

10. The operating system and platform designed for Apple devices is called . [Smartphones]

11. When leaving a voicemail message, it is important to be clear, concise, and use an appropriate .
[Voicemail]

12. Two common methods used for setting up notifications are and alarms. [Notifications]

Software Architecture
13. An operating system is the software on a computer device that manages all of its installed and
hardware. [Operating Systems]

14. Linux is an operating system which is available to the general public. [Operating Systems]

15. Users can customize their Windows device by going to the Control Panel under
. [Desktop Customization]

16. Software can be installed, uninstalled, and updated on a Windows machine in the . [Install,
Uninstall, and Update Software]
13 | Projects IC³ GS5: Computing Fundamentals Project Workbook
File and Software Management
17. The file extension is produced by Adobe Flash. [Understanding File Extensions]

18. apps typically organize items and place them into folders. [Electronic Media]

19. Scanning is the process of a physical item into a digital medium. [Document Scanning]

Troubleshooting Basics
20. Two signs a virus or other form of malware may be on a computer include receiving an or when
an application stops working for no reason. [Basic Problem Solving]

21. A computer device may be limited if it can only connect to the Internet . [Platform
Compatibility]

22. A is a piece of software which adds additional functionality to an application. [Media


Compatibility]

Cloud Computing
23. Cloud storage can be used to back up data on a and it allows users anywhere in the world to
access data as long as they have an Internet connection. [Cloud Basics and Benefits]

24. Cloud services are mostly free to set up, however payment is often required for . [Using the
Cloud]

25. A is used to administer, deliver, and track the progress of users in an eLearning environment.
[Web Apps vs. Local Apps]

26. Google Docs, Sheets, and Slides are online Office apps used in . [Online Office Apps]

Security
27. A incorporates all of the components of a good password, but it can be easily remembered.
[Basic Account Settings]

28. A virus is a program or piece of which runs on a computer device and can erase, corrupt, or
gather personal data. [Types of Viruses]

29. After using a public network, it is important to log out of any , clear the browser history, cache,
and the cookies. [Secured vs. Unsecured Networks]

30. In order to be a competent online shopper, you must be aware of too good to be true.
[eCommerce]

14| Projects IC³ GS5: Computing Fundamentals Project Workbook


Define Basic Terms
Description:
When developing fundamentals in computing we need to have a strong understanding of terms dealing with computing.

For this project, you will define the listed terms.

Steps for Completion:


1. Define the terms below:
a. Server: c. Desktop:

b. Laptop:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Device Basics

Project File: N/A

Difficulty: Beginner/Intermediate

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.2 Hardware
1.2.a Types of devices
1.2.a.i Server
1.2.a.ii Laptop
1.2.a.iii Desktop

15 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Understanding RAM
Description:
A key element when working with computers is how much memory a computer has and how that can affect your usage and how fast
programs run on your computer. For this project, you will use the following document to find out how much RAM your computer has.
Then explain what RAM is and how a computer might react when the RAM is full.

Steps for Completion:


1. Find RAM on a specific computer, then answer the questions below.
a. Define RAM.

b. Explain how a computer will react when there is not enough RAM.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training;
Hardware: Device Basics

Project File: N/A

Difficulty: Beginner

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.2 Hardware
1.2.b Know the impact of memory and storage on usage

16| Projects IC³ GS5: Computing Fundamentals Project Workbook


Label Ports
Description:
Computers have several different ports which are used to connect different peripherals to the computer or to access the Internet.
This project will help you develop knowledge of a variety of ports which can be used to connect to the Internet, connect monitors, or
connect audio.

For this project you will label the different ports and then write a brief sentence explaining the purpose of each port.

Steps for Completion:


1. Label each port below and write a brief sentence about each port describing its purpose:

a.

b.

c.

d.

e.

f.

g.

17 | Projects IC³ GS5: Computing Fundamentals Project Workbook


h.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Connecting Digital Cameras; Connecting Speakers; Connecting Webcams; Connecting Printers; Connecting Generic USB Device;
Connecting External Displays

Project File: N/A

Difficulty: Beginner/Immediate

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.2 Hardware
1.2.c Know how to connect different peripherals
1.2.c.i Camera
1.2.c.ii Audio
1.2.c.iii Microphone
1.2.c.iv Printer
1.2.c.v USB devices
1.2.c.vi External display

18| Projects IC³ GS5: Computing Fundamentals Project Workbook


Label Peripherals
Description:
A computer is designed to attach different peripherals which are used to manipulate the computer or to download information to the
computer.

For this project, you will demonstrate your knowledge of peripheral objects. Label each object and explain how each object is used in
relation with the computer.

Steps for Completion:


1. Label each port below and write a brief sentence about each port describing its purpose:

a.

b.

c.

d.

e.

f.

19 | Projects IC³ GS5: Computing Fundamentals Project Workbook


g.

h.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Connecting Digital Cameras; Connecting Speakers; Connecting Webcams; Connecting Printers; Connecting Generic USB Device;
Connecting External Displays

Project File: N/A

Difficulty: Beginner/Immediate

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.2 Hardware
1.2.c Know how to connect different peripherals
1.2.c.i Camera
1.2.c.ii Audio
1.2.c.iii Microphone
1.2.c.iv Printer
1.2.c.v USB devices
1.2.c.vi External display

20| Projects IC³ GS5: Computing Fundamentals Project Workbook


Power Management
Description:
When working with computers it is important to understand how to manage the power usage. By understanding power usage you can
save money and it will also help keep your computer working longer.

For this project, you will need to write a paragraph explaining what power management is and which setting you can use to manage
the power.

Steps for Completion:


1. Write a paragraph about power management in the field below:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Power Management

Project File: N/A

Difficulty: Beginner

Required Materials: N/A

Objectives:
1.0 Computer Fundamentals
1.2 Hardware
1.2.f Understand power management and power settings

21 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Working with Hardware Configuration
Description:
Technology continues to change and improve when it comes to computers. New features make creating things on a computer easier
but sometimes there are some issues.

For this project, you will need to describe the pros and cons of touchscreen, non-touchscreen, and hybrid devices.

Steps for Completion:


1. Use the page below to explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Touchscreen vs. Non-Touchscreens

Project File: N/A

Difficulty: Beginner /Intermediate

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.2 Hardware
1.2.n Understand the pros and cons of touchscreen vs non-touchscreen devices

22| Projects IC³ GS5: Computing Fundamentals Project Workbook


Wired Network
Description:
There are several main ways for you to connect to the Internet. It is important to understand the different methods of connectivity,
what the differences are, and when each method is used.

Here in this project, you will write a brief description on the difference between cellular, Wi-Fi, and wired networks.

Steps for Completion:


1. Describe the difference between cellular, Wi-Fi, and wired networks.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Internet Basics: Cellular, Wi-Fi, and Wired Networks

Project File: N/A

Difficulty: Beginner /Intermediate

Required Materials: N/A

Objectives:
1.0 Computer Fundamentals
1.2 Hardware
1.2.j Know the difference between cellular, Wi-Fi, and wired networks

23 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Define Computing Fundamentals Terms
Description:
When developing a foundation in computing we need to have a strong understanding of terms dealing with computing.

For this project, you will define the listed terms.

Steps for Completion:


1. Define the terms below:
a. Modem: e. IP Addresses:

b. Bandwidth: f. Android:

c. Router: g. Firmware:

d. Ethernet:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Internet Basics: Modems; Bandwidth; Routers; IP Address

Project File: N/A

Difficulty: Beginner/Intermediate

Required Materials: N/A


Objectives:
1.0 Computer Fundamentals 1.2.k Understand concepts regarding connecting to the 1.2.k.iv Wired
1.2 Hardware internet 1.2.k.v Wireless
1.2.h Know platform implications and considerations 1.2.k.i Modem
1.2.h.i For example Mac, PC, Linux, iOS, Android, 1.2.k.ii Bandwidth, speed
Firmware 1.2.k.iii Have a basic understanding of what a router is
24| Projects IC³ GS5: Computing Fundamentals Project Workbook
Cellular Phones
Description:
Cell phones have become the norm of everyday life. A large majority of people have them and use them on a daily basis if not
every few minutes. Most cell phones today also can connect to Wi-Fi or can connect to the Internet using data; these are called
smartphones.

For this project, you will need to define what a cell phone is and how they work using towers. Also explain the different carriers and
some typical cell phone plans. Then give a brief explanation of what other devices can connect to the Internet using cellular data.

Steps for Completion:


1. Define cell phone.
2. Explain how cell phones connect.
3. Explain the different carriers and cell phone plans.
4. Give a brief explanation of other devices that can connect to the Internet using cellular data:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Cellular Phone Basics; Cellular-Enabled Tablets; Smartphones

Project File: N/A

Difficulty: Beginner/Intermediate

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.1 Mobile Devices
1.1.a Understand cellular phone concepts
1.1.b Be familiar with cellular-enabled tablets

25 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Understand Smartphones
Description:
Smartphones are used to do business, play games, surf the Internet, and many other things. Having a basic understanding of what a
smartphone is and what they can be used for will make sure you start out on the right track to work with smartphones in the future.

For this project, you will explain what types of apps can be installed on a smartphone. Explain what limitations there are with
smartphones, as well as some of the capabilities of a smartphone.

Steps for Completion:


1. Answer the following questions in the space provided:
a. Explain the types of apps used on smartphone and the process to install them.

b. Describe the limitations and abilities of smartphones.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training::
Mobile Devices: Cellular Phone Basics; Cellular-Enabled Tablets; Smartphones

Project File: N/A

Difficulty: Beginner

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.1 Mobile Devices
1.1.c Be familiar with smartphone

26| Projects IC³ GS5: Computing Fundamentals Project Workbook


Configure Voicemail
Description:
For this project, you will need to know the steps to understand how to configure voicemail on an Apple device and set up a password.
Then configure the voicemail on an Android device.

Steps for Completion:


1. Configure voicemail on an Apple device:
a. Tap the Phone icon.
b. Tap the voicemail option.
c. Tap Greeting.
d. Customize greeting or leave default message.
e. Tap Settings.
f. Tap Phone.
g. Tap Change Voicemail Password.
2. Configure voicemail on an Android device:
a. Tap Voicemail.
b. Tap menu in upper-right corner.
c. Tap Settings.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Voicemail

Project File: N/A

Difficulty: Intermediate

Required Materials: iPhone, Android phone

Objectives:
1.0 Computing Fundamentals
1.1 Mobile Devices
1.1.e Know how to configure and use voicemail

27 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Using Skype
Description:
There many different online options which have instant messaging features such as Gmail, Yahoo mail, Facebook, and Skype. Having a
working knowledge of these options can be beneficial for jobs and social media.

For this project, you will set up a Skype account and then use it to chat with someone.

Steps for Completion:


1. Set up a Skype account.
2. Chat with someone.
3. Take a screen shot of your conversation to share with your teacher.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Instant Messaging

Project File: N/A

Difficulty: Beginner/Intermediate

Required Materials: Computer, mobile device, or tablet with Internet access

Objectives:
1.0 Computing Fundamentals
1.1 Mobile Devices
1.1.f Use of instant messaging

28| Projects IC³ GS5: Computing Fundamentals Project Workbook


Set Up Notifications
Description:
When using mobile devices it is important to understand how to change and set up the notifications for your device. It could be very
embarrassing if your device continues to make noises because your crops are ready to harvest and you are in the middle of a meeting or
a class.

In this project, you will use an iOS on an iPhone to set up notifications on the device. You will need to change notification sounds and
change how many times your alerts repeat for your messages.

Steps for Completion:


1. For an iPhone device:
a. Navigate to your notification menu.
b. Select Messages.
c. Allow notifications.
d. Change notification sound.
e. Allow for it to show on Lock Screen.
f. Change repeat alerts to twice.
2. For an Android device:
a. Navigate to Sound & notifications.
b. Set to allow only priority interruptions.
c. Specify which options are priority.
d. Navigate to the App notifications.
e. Block or set apps as priority.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Notifications

Project File: N/A

Difficulty: Intermediate

Required Materials: iPhone, Android phone

Objectives:
1.0 Computing Fundamentals
1.1 Mobile Devices
1.1.g Know how to configure notifications

29 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Defining Operating Systems
Description:
There are a few different kinds of operating systems which are used by different computers and have different usabilities. It is
important to know what each one is used for and what devices typically use the operating systems.

For this project, you will describe the differences and similarities between the most common operating systems used for Mac, PC, and
Linux.

Steps for Completion:


1. Describe the differences and similarities between the most common operating systems used for Mac, PC, and Linux in
the space provided below:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Operating Systems

Project File: N/A

Difficulty: Beginner/Intermediate

Required Materials: Computer, mobile device, or tablet with Internet access

Objectives:
1.0 Computing Fundamentals
1.2 Hardware
1.2.h Know platform implications and considerations
1.2.h.i For example Mac, PC, Linux, iOS, Android, Firmware

30| Projects IC³ GS5: Computing Fundamentals Project Workbook


Label Page Options
Description:
You will need to know how to navigate and manage your windows that you have open. As you work you may often have multiple
windows open simultaneously. This project will help you know of a few buttons that can help you manage your windows.

In this project, label the image on the following page.

Steps for Completion:


1. Label each of the items shown below:

a. b. c.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Window Management

Project File: N/A

Difficulty: Beginner

Required Materials: N/A

Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.c Have a general understanding of operating systems and software settings
1.3.c.i Know basic desktop customization

31 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Labeling Menu Navigation
Description:
As you are working with software on your computer you will need to be able to make selections to indicate what you want the software
to do. This project will help you know the different selection options.

For this project, you will label the images in the following document.

Steps for Completion:


1. Label each of the images shown below:

a. b. c.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Navigating Menus

Project File: N/A

Difficulty: Beginner

Required Materials: N/A

Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.h Menu navigation
1.3.h.i Radio buttons
1.3.h.ii Check boxes
1.3.h.iii Drop-down menus

32| Projects IC³ GS5: Computing Fundamentals Project Workbook


Desktop Customization
Description:
When setting up a computer you will have the ability customize your desktop. You can add pictures for a background change, the
screen resolution to help you better see information or to save on power, and modify screen savers.

For this project, you will change the screensaver and have it come on when the computer has been idle for 10 minutes. Then modify
the screen resolution to help someone who is partially blind. Use a personal image and set it as your background.

Steps for Completion:


1. Change screensaver to have it come on when the computer has been idle for 10 minutes.
2. Modify the screen resolution for someone who is partially blind.
3. Download an image to your computer.
4. Make the picture your desktop background.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Desktop Customization

Project File: N/A

Difficulty:Advanced

Required Materials: Computer with Internet access


Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.c Have a general understanding of operating systems and software settings
1.3.c.i Know basic desktop customization

33 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Permissions and Rights Explained
Description:
Rights and permissions are a vital part of any organization that uses computers and shares files on an internal network. The rights and
permissions allow users to access files that they need to use to complete their job but it also restricts the use of some files that may be
confidential or that someone does not want edited.

For this project you will explain in more depth why permissions are so valuable in an organization.

Steps for Completion:


1. Explain why rights and permissions are so important to an organization:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: User Profiles and Permissions

Project File: N/A

Difficulty: Intermediate/Advanced

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.j Rights and permissions (administrative rights)

34| Projects IC³ GS5: Computing Fundamentals Project Workbook


Install and Uninstall Software
Description:
Software can be installed on to your computer or other devices using the Internet. A computer can also have software installed using
local media such as a disc or flash drive.

For this project you will use the Ninite website to install a media feature such as iTunes or QuickTime, a utilities feature such as Glary
or CDBurnerXP, and a security feature such as Essentials or Avast. If available use a flash drive or disc to install another software
program. Since you do not really need all of these software programs you will then go in and uninstall the utility and security features
that you installed.

Steps for Completion:


1. Go to ninite.com.
2. Download a utility, media, and security feature.
3. Download another software program flash drive or disc.
4. Uninstall the utility and security features.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Install, Uninstall, and Update Software

Project File: N/A

Difficulty: Intermediate/Advanced

Required Materials: Computer with Internet access, Flash drive or disc with another software program
Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.l Know how to install, uninstall, update, repair software
1.3.l.i From the Internet
1.3.l.ii Using local media (DVD-ROM, etc.)

35 | Projects IC³ GS5: Computing Fundamentals Project Workbook


File Types
Description:
When working with computers you will be dealing constantly with different file types to open up documents in different software
applications. Knowing which file types are compatible with various software applications is very important.

For this project you will use the following document to define the different file types and explain which file types are compatible with
which software applications.

Steps for Completion:


1. Define the terms below:

a. .doc/.docx: f. .pdf:

b. .txt: g. .wav:

c. .xls/.xlsx: h. .zip:

d. .exe: i. .jpg:

e. .swf: j. .tif:

36| Projects IC³ GS5: Computing Fundamentals Project Workbook


k. .mp3: m. .avi:

l. .mp4:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: Understanding File Extensions

Project File: N/A

Difficulty: Intermediate/Advanced

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.f Know file structures and file/folder management
1.3.f.iii File extensions

37 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Files Sharing and Permissions
Description:
There are some great features that come with different file types. Files can be given permissions which can set documents to Read-only.
Files can also be shared so that others can view them or even work in them.

For this project you will set a file’s properties to Read-only and then share the same file with specific people. Set one person with Read/
Write privileges and leave the others as Read-only.

Steps for Completion:


1. Open the properties of a file and set to Read-only.
2. Share the file with specific people.
3. Set one person with Read/Write privileges.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: File Permissions and Sharing

Project File: N/A

Difficulty: Intermediate/Advanced

Required Materials: Computer


Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.f Know file structures and file/folder management
1.3.f.ii File permissions

38| Projects IC³ GS5: Computing Fundamentals Project Workbook


Files Scanned and Sent
Description:
When working with documents there will be occasions when you will have a hard copy and you need to make an electronic copy
and send it to someone via email. Oftentimes this document is too big to send regularly and so you will need to zip the file so that it
compresses the information so that it is then a manageable size to send via email.

For this project you will scan a 10-page document and save it on your desktop. You will zip that file in a folder. Then email that folder
to someone.

Steps for Completion:


1. Scan and save document.
2. Zip document in a folder.
3. Email zipped file to someone.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: File Permissions and Sharing

Project File: N/A

Difficulty: Intermediate

Required Materials: Computer, scanner, hard copy of a document


Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.f Know file structures and file/folder management
1.3.f.ii File permissions

39 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Folder Rename and Find
Description:
As you continue to use your computer you will save more and more documents, you will have a lot of files and folders. Sometimes
you will need to rearrange the files or folders and to manage your information you may need to rename folders. Also, you may need to
quickly find a file and you do not want scroll through all the files.

For this project you will need to create a folder on your desktop and add documents to the folder. Then you will need to rename the
folder to Computing Fundamentals. Write a brief explanation of how to find a file without scrolling to find it.

Steps for Completion:


1. Create a new folder on the desktop.
2. Add files to the folder.
3. Rename the folder.
4. Write a brief explanation for finding files.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: Moving and Renaming Files; Finding Files

Project File: N/A

Difficulty: Intermediate

Required Materials: Computer


Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.f Know file structures and file/folder management
1.3.f.i Moving/renaming files
1.3.i Search for files

40| Projects IC³ GS5: Computing Fundamentals Project Workbook


Manage Electronic Media
Description:
There are several different ways to manage electronic media. Understanding how to manage eBooks, music, and video is very important
so that you can access the information.

For this project you will need to explain which software programs you use to manage your electronic data.

Steps for Completion:


1. Describe the software programs you use to manage your electronic data:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: Electronic Media

Project File: N/A

Difficulty: Intermediate

Required Materials: Computer


Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.f Know file structures and file/folder management
1.3.f.iv Manage electronic media [eBooks, songs, video]

41 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Troubleshooting Issues
Description:
The joy of technology is that there will always be problems. To know how to troubleshoot these problems will save you a lot of time
and heartache.

For this project you will use the following document to look over different computer issues and explain methods used to troubleshoot
these issues.

Steps for Completion:


1. Answer the questions below in the spaces provided:
a. What steps should be taken when media will not play?

b. What steps should be taken when an error message appears?

c. What steps should be taken when a computer freezes?

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Troubleshooting Basics: Basic Problem Solving

Project File: N/A

Difficulty: Beginner/Intermediate

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.m Troubleshooting
1.3.m.i Know basic problem solving techniques

42| Projects IC³ GS5: Computing Fundamentals Project Workbook


Cloud Concepts and Benefits
Description:
The first step in using cloud storage is to know what it is and its related concepts.

For this project, you will define a list of cloud storage and access features and list a few benefits of sharing, collaborating, and using
cloud storage.

Steps for Completion:


1. Answer the questions below in the spaces provided:

a. Define cloud storage and cloud access.

b. List at least one benefit each for sharing, collaborating, and using cloud storage.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Cloud Basics and Benefits

Project File: N/A

Difficulty: Beginner

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.6 Cloud Computing
1.6a Understand “cloud” concepts
1.6a.i Understand cloud storage vs. cloud access concepts
1.6a.ii Understand sharing and collaboration via the cloud
1.6b Know the benefits of using cloud storage

43 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Troubleshooting Issues
Description:
When dealing with web and local apps, it helps to understand Software as a Service. In addition, when you use a cloud as a student,
you will no doubt use a Learning Management System.

For this project, you will define SaaS and LMS.

Steps for Completion:


1. Answer the questions below in the spaces provided:
a. Define Saas.

b. Define LMS.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Web Apps vs. Local Apps

Project File: N/A

Difficulty: Beginner

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.6 Cloud Computing
1.6d Web apps vs. local apps
1.6d.i Understand Software as a Service (SaaS) concepts
1.6d.ii Know what Learning Management Systems (LMS) do

44| Projects IC³ GS5: Computing Fundamentals Project Workbook


Online Storage Apps
Description:
In most work environments, you are going to deal with an online storage app. Whether it is Google Drive or Dropbox, OneDrive or
iCloud, chances are you will need to know how to upload, download, and sync content using online storage apps.

For this project, you will use Google Drive to upload content and download content from the cloud.

Steps for Completion:


1. Open Google Drive and upload a local document to it. You can do this by directly dragging a document from your desktop or
local documents folder to Google Drive.
2. Right-click a document on Google Drive and download it to your local desktop.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Using the Cloud; Online Storage Apps

Project File: N/A

Difficulty: Beginner/Intermediate

Required Materials: Computer


Objectives:
1.0 Computing Fundamentals
1.6 Cloud Computing
1.6c Access and utilization of the cloud
1.6c.i Understand account management on the cloud
1.6c.ii Know how to upload content to the cloud
1.6c.iii Know how to download content from the cloud
1.6c.iv Know how to sync files between devices using the cloud
1.6e Understand Web app types
1.6e.i Online storage apps [Google Drive, Dropbox, OneDrive, iCloud storage]

45 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Online Office and Database CRM Apps
Description:
The more you know about apps, the better off you will be in a work environment. Common apps you will often deal with are online
office and database-driven Customer Relationship Management (CRM) apps.

For this project, you will use Google Docs to create a new document and navigate to three prominent CRM apps.

Steps for Completion:


1. Open Google Drive and create a new document using Google Docs.
2. Navigate to the Salesforce, Oracle, and Workfront CRM apps.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Using the Cloud; Online Storage Apps

Project File: N/A

Difficulty: Intermediate

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.6 Cloud Computing
1.6e Understand Web app types
1.6e.ii Online office apps [Google apps, Office 365]
1.6e.iii Database Driven CRM apps [Salesforce, Oracle, Workfront]

46 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Create an Account
Description:
You are going to have to create many accounts when dealing with computers and the Internet using usernames and passwords.

For this project you will create an email account using a unique username and password.

Steps for Completion:


1. Go to Google, Yahoo, or any other email website and create an account using a unique username and password.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Security: Usernames and Passwords; Basic Account Settings

Project File: N/A

Difficulty: Intermediate

Required Materials: Microsoft Access


Objectives:
1.0 Computing Fundamentals
1.7 Security
1.7a Know credential management best practices
1.7a.i Usernames
1.7a.ii Passwords
1.7a.ii.1 Understand the components of a good password
1.7b Know basic account setting management

47 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Define Malicious Programs and Attacks
Description:
Knowing when you have a malicious program on your computer and how attackers can utilize them will help you protect yourself and
your computer.

For this project you will define different terms regarding malicious programs and attack methods.

Steps for Completion:


1. Define each term below:
a. Virus: d. Trojan Horses:

b. Malware: e. Social Engineering:

c. Monitoring Software:

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Security: Viruses; Types of Virus

Project File: N/A

Difficulty: Beginner /Intermediate

Required Materials: N/A


Objectives:
1.0 Computing Fundamentals
1.7 Security
1.7c Know the basic threats to security of computers, data, and identity
1.7c.i Viruses
1.7c.ii Trojans
1.7c.iii Malware
1.7c.iv Social engineering
1.7d Understand the implications of monitoring software (surveillance)

48 | Projects IC³ GS5: Computing Fundamentals Project Workbook


Windows Defender and Firewall
Description:
It is vital to know how to protect your computer. Luckily, Windows 8 comes pre-installed with antivirus software and a built-in
firewall.

For this project you will navigate to the Windows Defender app and perform a scan of your local computer. After that, you will go to
the Windows Firewall and deny access to an application.

Steps for Completion:


1. Navigate to the Windows Defender App.
a. Perform a quick scan of your computer.
2. Navigate to the Windows Firewall.
a. Allow or deny a program through the Windows Firewall.

Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Security: Antivirus and Firewalls

Project File: N/A

Difficulty: Beginner/Intermediate

Required Materials: A computer with a Windows operating system

Objectives:
1.0 Computing Fundamentals
1.7 Security
1.7f Know the use of and importance of antivirus software
1.7f.i Understand how to prevent virus issues
1.7f.ii Understand how to maintain and update antivirus software
1.7g Know the use of firewalls and basic settings

49 | Projects IC³ GS5: Computing Fundamentals Project Workbook


50 | Projects IC³ GS5: Computing Fundamentals Project Workbook
IC3 GS5: Computing Fundamentals Master Project
Description:
When working with a computer, understanding the basics of how it all works together will be important as you continue to do more
and more advanced things. For this Master Project of Computing Fundamentals you will set up a computer with several different
peripherals. You will customize your workspace so that it fits you. Then you will need to work within the computer to set up folders and
file permissions, browse the Internet and install applications, ensure that your computer is safe from malicious attacks, and do some
online shopping using eCommerce best practices.

Being able to set up your own computer can help you resolve issues in the future and make it so you don’t have to rely on others when
it comes to basic computer problems. As you set up your computer you will learn how to connect to the Internet both with a wired
option and through wireless routers. Again this will help you understand basic wired and wireless options and allow you to fix and set
up Internet connections on your own.

Once your computer is all set up you can work on your computer. But, you will first need to know the memory of your computer,
because if you don’t know what your computer is capable of, you may try to do something your computer is not able to do. This will
include attaching your keyboard, mouse, and monitors together and connecting the computer to the router and printer.

Now that you understand your computer it is time to get you set up as a user on the computer. You will need to get a username and
password put together and then make sure your desktop is configured in a way that you like how it works. As you work with various
devices with your computer you will need to make sure that all the devices are compatible with your computer so that you don’t end
up crashing the computer or losing information. You will need to download the information onto your computer from the different
devices and as you do this you will need to set up a folder structure and name your files in such a way that the information is easy to
find.

There are a number of ways for you to manage online information such as music, eBooks, and videos. Knowing the different online
options or software downloads that can manage this information will help you keep all of your media and books organized and easily
accessible.

Keeping your computer safe from online attacks should be one of your first priorities. You will need to download an antivirus software
and then run it to make sure the computer is safe. Another method of keeping your information safe is by backing it up using a flash
drive or external hard drive. You can also back up your files to an online cloud storage option.

Working with technology makes communicating easy. As you work you will frequently need to communicate using email. Email not
only allows you to send a letter easily but you can also add attachments to the email.

Finally, as you use the Internet you will often need to make purchases online. Being familiar with eCommerce best practices will keep
you from purchasing things that are not what they claim to be and from identify theft.

Steps for Completion:


Computer Set Up
1. Set up a computer with a monitor, keyboard, mouse, printer, and router.
a. Ensure that the computer can connect to the Internet, both wired and wireless.
2. Determine the RAM of your computer and which OS is being used.
3. Set up desktop with username and password.
4. Set up other drivers for peripherals, such as cameras, smartphones, tablets, and audio and video.
5. Customize the desktop by setting up a screensaver, set screen resolution, and screen background.
Folders, Files, and Media Management
6. Set up a folder structure.
a. Give file permissions.
b. Save documents using different file extensions.
7. Download iTunes or Google Play to manage eBooks, music, and video.
Install and Safety
51 | Projects IC³ GS5: Computing Fundamentals Project Workbook
8. Open a web browser and search for a program you would like to install on the computer.
9. Download an antivirus software and run it.
10. Back up your files on a flash drive or external hard drive.
Working Online
11. Create an email account.
12. Send an email with a file attached.
13. Back up your files to a cloud storage.
14. Navigate on your browser to check history and cookies.
15. Search an online store and make a purchase using eCommerce best practices.

Difficulty: Advanced

Required Materials: Computer with components, peripherals,

52 | Projects IC³ GS5: Computing Fundamentals Project Workbook


53 | Projects IC³ GS5: Computing Fundamentals Project Workbook
IC3 GS5: Computing Fundamentals Lesson Plan
Each lesson plan is approximately 30 minutes and includes video training, fill-in-the-blanks, labs, projects, tests, as well as the course support files to follow along with the expert. There is also a note
section for customizable lesson plans and extra notes. By adhering to the lesson plan, it will take approximately four weeks to complete the course. Approximately 13.5 hours of time training with an
additional 7-14 hours if the Master Level lesson plans are also completed.
Session 1 [Approximately 13.5 hours]

Lesson Topic Subtopic Objectives Activity Notes


Lesson 1 Session 1 Pre-Assessment

Lesson 2 Hardware Device Basics 1.2 Hardware Watch Session 1: Hardware [22
Memory and Storage 1.2.a Types of devices minutes]
Connecting Digital 1.2.a.i Server
Cameras Fill-in-the-Blanks Session 1:
Connecting Speakers 1.2.a.ii Laptop Questions 1-4
Connecting Webcams 1.2.a.iii Desktop
Connecting Printers 1.2.b Know the impact of memory and storage on Session 1 Lab 1: Adding a
Connecting Generic USB usage Printer
Devices 1.2.c Know how to connect different peripherals
Connecting External Session 1 Lab 2: Navigate to
1.2.c.i Camera
Displays Power Options
Power Management 1.2.c.ii Audio
Drivers 1.2.c.iii Microphone
Hardware Configuration 1.2.c.iv Printer
Touchscreens vs. Non- 1.2.c.v USB devices
Touchscreens
1.2.c.vi External display
1.2.f Understand power management and power
settings
1.2.g Understand driver concepts as well as their device
compatibility
1.2.g.i Know what drivers do
1.2.g.ii Know if specific drivers are compatible with
a personal device
1.2.l Understand common hardware configurations
1.2.m Implications for document usage
1.2.n Understand pros and cons of touchscreen vs non-
touchscreen devices
Lesson 3 Hardware See Lesson 2 See Lesson 2 Session 1 Project 1: Define
Basic Terms

Session 1 Project 2: Under-


standing RAM

Session 1 Project 3: Label Ports


Lesson 4 Hardware See Lesson 2 See Lesson 2 Session 1 Project 4: Label
Peripherals

Session 1 Project 5: Power


Management
Lesson 5 Hardware See Lesson 2 See Lesson 2 Session 1 Project 5: Working
with Hardware Configuration

Review and discuss hardware

54 | Appendix IC³ GS5: Computing Fundamentals Project Workbook


Lesson Topic Subtopic Objectives Activity Notes
Lesson 6 Internet Basics Cellular, Wi-Fi, and Wired 1.2 Hardware Watch Session 1: Internet
Networks 1.2.d Understand the use of Ethernet ports Basics [11 minutes]
Modems 1.2.e Connect a device wireless network [Wi-Fi]
Bandwidth Fill-in-the-Blanks Session 1:
Routers 1.2.j Know the difference between cellular, Wi-Fi, and Questions 5-8
IP Address wired networks
Wired Connection 1.2.k Understand concepts regarding connecting to the Session 1 Lab 3: Connect to a
Wireless Connection Internet Network
Connection Speed 1.2.k.i Modem
1.2.k.ii Bandwidth, speed Session 1 Lab 4: See Connec-
tion Speed
1.2.k.iii Have a basic understanding of what a
router is Session 1 Project 6: Wired
1.2.k.iv Wired internet Network
1.2.k.v Wireless internet
1.3.k Define IP address
1.3.m Troubleshooting
1.3.m.v Know how to determine a connection
speed
1.3.m.iv Know how to find an IP address on a
personal computer
Lesson 7 Internet Basics See Lesson 6 See Lesson 6 Session 1 Project 7: Define
Computing Fundamental
Terms

Discuss Internet basics

Lesson 8 Mobile Devices Cellular Phone Basics 1.1 Mobile Devices Watch Session 1: Mobile
Cellular-Enabled Tablets 1.1.a Understand cellular phone concepts Devices [20 minutes]
Smartphones 1.1.b Be familiar with cellular-enabled tablets
Hardwired Phones Fill-in-the-Blanks Session 1:
Voicemail 1.1.c Be familiar with smartphone Questions 9-12
Instant Messaging 1.1.d Understand the use of hardwired phones
Notifications 1.1.e Know how to configure and use voicemail Session 1 Lab 5: Voicemail
1.1.f Use of instant messaging Greeting for Apple
1.1.g Know how to configure notifications Session 1 Project 6: Wired
1.2 Hardware Network
1.2.h Know platform implications and considerations
1.2.h.iv iOS
1.2.h.v Android
Lesson 9 Mobile Devices See Lesson 8 See Lesson 8 Session 1 Project 7: Define
Computing Fundamentals
Terms

Session 1 Project 8: Cellular


Phones

Lesson 10 Mobile Devices See Lesson 8 See Lesson 8 Session 1 Project 9: Understand
Smartphones

Session 1 Project 10: Configure


Voicemail

55 | Appendix IC³ GS5: Computing Fundamentals Project Workbook


Lesson Topic Subtopic Objectives Activity Notes
Lesson 11 Mobile Devices See Lesson 8 See Lesson 8 Session 1 Project 11: Using
Skype

Session 1 Project 12: Set Up


Notifications
Lesson 12 Software Archi- Operating Systems 1.3 Computer Software Architecture Watch Session 1: Software
tecture Window Management 1.3.a Understand operating system versioning and update Architecture: Operating Sys-
Navigating Menus awareness tems- Desktop Customization
Software Preferences 1.3.b Know concepts surrounding applications vs. operating [24 minutes]
Desktop Customization system vs. global settings
1.3.c Have a general understanding of operating systems and Fill-in-the-Blanks Session 1:
software settings Questions 13-15
1.3.c.i Know basic desktop customization
1.3.c.ii Know window management Session 1 Lab 6: Chrome
1.3.c.ii.1 Minimize windows Settings
1.3.c.ii.2 Maximize windows
Session 1 Lab 7: Navigate to
1.3.c.ii.3 Resizing windows
Personalization
1.3.d Set software preferences
1.3.h Menu navigation Session 1 Lab 8: Custom
1.3.h.i Radio buttons Screen Saver
1.3.h.ii Checkboxes
1.3.h.iii Drop-down menus
1.3.h.iv Multi-select
1.3.l Know how to install, uninstall, update, and repair software
1.3.l.i From the internet
1.3.l.ii Using local media
1.3.l.iii. DVD-ROM, etc
1.2 Hardware
1.2.h Know platform implications and considerations
1.2.h.i Mac
1.2.h.ii PC
1.2.h.iii Linux
1.2.h.vi Firmware

Lesson 13 Software User Profiles and Permis- 1.3 Computer Software Architecture Watch Session 1: User Profiles
Architecture sions 1.3.e Users and profiles and Permissions- Install, Unin-
(Continued) Install, Uninstall, and 1.3.j Rights and permissions stall, and Update Software [13
Update Software minutes]

Fill-in-the-Blanks Session 1:
Question 16

Session 1 Lab 9: Uninstall


Dropbox

Disucss software
Lesson 14 Software Archi- See Lessons 12 and 13 See Lessons 12 and 13 Session 1 Project 13: Defining
tecture Operating Systems

Session 1 Project 14: Label


Page Options

Session 1 Project 15: Labeling


Menu Navigation

56 | Appendix IC³ GS5: Computing Fundamentals Project Workbook


Lesson Topic Subtopic Objectives Activity Notes
Lesson 15 Software Archi- See Lessons 12 and 13 See Lessons 12 and 13 Session 1 Project 16: Desktop
tecture Customization

Session 1 Project 17: Permis-


sions and Rights Explained

Lesson 16 Software Archi- See Lessons 12 and 13 See Lessons 12 and 13 Session 1 Project 18: Install and
tecture Uninstall Software

Lesson 17 File and Soft- Understanding File Exten- 1.3 Computer Software Architecture Watch Session 1: File and
ware Manage- tions 1.3.f Know file structures and file/folder management Software Management [22
ment File Permissions and 1.3.f.i Moving/renaming files minutes]
Sharing 1.3.f.ii File permissions
Attach, Zip, and Send Via Fill-in-the-Blanks Session 1:
1.3.f.iii File extensions
Email Questions 17-19
1.3.f.iii.1 .doc/.docx
Moving and Renaming
Files 1.3.f.iii.2 .txt Session 1 Lab 10: Enable File
Finding Files 1.3.f.iii.3 .xls/.xlsx Permissions
Electronic Media 1.3.f.iii.4 .exe
Document Scanning 1.3.f.iii.5 .swf
1.3.f.iii.6 .pdf
1.3.f.iii.7 .wav
1.3.f.iii.8 .zip
1.3.f.iii.9 .jpg
1.3.f.iii.10 .tif
1.3.f.iii.11 .mp3
1.3.f.iii.12 .mp4
1.3.f.iii.13 .avi
1.3.f.iv Managing electronic media
1.3.f.iv.1 eBooks
1.3.f.iv.2 Songs
1.3.f.iv.3 Videos
1.3.g Document Management
1.3.g.i Scanning documents
1.3.g.ii Taking pictures
1.3.i Searching for files
1.5 File Sharing
1.5.a Understand file transfer options and
characteristics
1.5.a.i Know how to attach files to email
1.5.a.iii Understand the difference between publicly
shared vs. shared links vs. shared folders
1.5.b Understand needs for file compression/zipping
in sharing
Lesson 18 File and Soft- See Lessons 17 See Lessons 17 Session 1 Project 19: File Types
ware Manage-
ment Session 1 Project 20: Files Sharing
and Permissions

Lesson 19 File and Soft- See Lessons 17 See Lessons 17 Session 1 Project 21: Files Scanned
ware Manage- and Sent
ment
Session 1 Project 22: Folder Rename
and Find

Session 1 Project 23: Manage


Electronic Media

57 | Appendix IC³ GS5: Computing Fundamentals Project Workbook


Lesson Topic Subtopic Objectives Activity Notes
Lesson 20 Troubleshooting Basic Problem Solving 1.2 Hardware Watch Session 1: Troubleshoot-
Basics Troubleshooting Terminol- 1.2.i Know platform compatibility ing Basics [14 minutes]
ogy 1.2.i.i Media compatibility issues
Platform Compatibility 1.2.i.i.1 Why won’t my video play? Fill-in-the-Blanks Session 1:
Media Compatibility 1.3 Computer Software Architecture Questions 20-22
Backup and Restore 1.3.m Troubleshooting
Restore Personal Device 1.3.m.i Know basic problem solving techniques Session 1 Lab 11: Perform a
Backup and Restore
1.3.m.ii Know how to determine problems involving
hardware vs. software 1.3.m.iii Know proper terminology
to be able to describe the problem Session 1 Project 24: Trouble-
1.4 Backup and Restore shooting Issues
1.4.a Understand backing up concepts
1.4.b Know how to back up and restore
1.4.c Know how to complete a full system restore on a personal
device

Lesson 21 Cloud Comput- Cloud Basics and Benefits 1.6 Cloud Computing Watch Session 1: Cloud Com-
ing Using the Cloud 1.6.a Understand cloud concepts puting [18 minutes]
Web Apps vs. Local Apps 1.6.a.i Understand cloud storage vs. cloud access concepts
Online Storage Apps 1.6.a.ii Understand sharing and collaboration via the cloud Fill-in-the-Blanks Session 1:
Online Office Apps 1.6.b Know the benefits of using cloud storage Questions 23-26
Database-Driven CRM
1.6.c Access and utilization of the cloud
Apps Session 1 Project 25: Cloud
1.6.c.i Understand account management on the cloud
Concepts and Benefits
1.6.d Web apps vs. local apps
1.6.d.i Understand software as a Service (SAAS) concepts
1.6.d.ii Know what Learning Management Systems
(LMS) do
1.6.e Understand web app types
1.6.e.i Online storage apps
1.6.e.i.1 Google Drive
1.6.e.i.2 Dropbox
1.6.e.i.3 OneDrive
1.6.e.i.4 iCloud storage
1.6.e.ii Online office apps
1.6.e.ii.1 Google apps
1.6.e.ii.2 Office 365
1.6.e.iii Database Driven CRM apps
1.6.e.iii.1 Salesforce
1.6.e.iii.2 Oracle
1.6.e.iii.3 Workfront (formerly Attask)
1.6.c Access and utilization of the cloud
1.6.c.i Understand account management on the cloud
1.6.c.ii Know how to upload content to the cloud
1.6.c.iii Know how to download content from the cloud
1.6.c.iv Know how to sync files between devices using the
cloud

Lesson 22 Cloud Comput- See Lesson 21 See Lesson 21 Session 1 Project 26: Trouble-
ing shooting Issues

Session 1 Project 27: Online


Storage Apps

Session 1 Project 28: Online


Office and Database CRM
Apps

58 | Appendix IC³ GS5: Computing Fundamentals Project Workbook


Lesson Topic Subtopic Objectives Activity Notes
Lesson 23 Cloud Comput- See Lesson 21 See Lesson 21 Session 1 Project 29: Create an
ing Account

Lesson 24 Security Usernames and Passwords 1.7 Security Watch Session 1: Security [14
Basic Account Settings 1.7.a Known credential management best practices minutes]
Viruses 1.7.a.i Usernames
Types of Virus 1.7.a.ii Passwords
Fill-in-the-Blanks Session 1:
Antivirus and Firewalls Questions 27-30
1.7.a.ii.1 Understand the components of a good
Secured vs. Unsecured password
Networks Session 1 Project 30: Define
Virtual Private Networks 1.7.b Know basic account setting management Malicious Programs and At-
eCommerce 1.7.c Know the basic threats to security of computers, tacks
data, and identity
1.7.c.i Viruses
1.7.c.ii Trojans
1.7.c.iii Malware
1.7.c.iv Social engineering
1.7.d Understand the implications of monitoring
software (surveillance)
1.7.e Connecting to secured vs. unsecured network
(wired and wireless)
1.7.e.i Know the ramifications
1.7.e.ii Understand the risks
1.7.e.iii Know the difference between public vs. private
computing (using a public computer)
1.7.e.iii.1 Browser histories
1.7.e.iii.2 Cache/cookies
1.7.e.iii.3 Logging out of online and OS accounts
1.7.f Know the use of and importance of antivirus
software
1.7.f.i Understand how to prevent virus issues
1.7.f.ii Understand how to maintain and update antivirus
software
1.7.g Know the use of firewalls and basic settings
1.7.e.iii.2 Cache/cookies
1.7.h Know eCommerce interactions and best practices
1.7.h.i Recognize the use of a secure connection, networks,
[https:]
1.7.h.ii Know how to be a savvy ecommerce consumer

Lesson 25 Security See Lesson 24 Session 1 Project 31: Windows


Defender and Firewall

Review and discuss security

59 | Appendix IC³ GS5: Computing Fundamentals Project Workbook


Lesson Topic Subtopic Objectives Activity Notes
Lesson 26 Review and discuss IC3 GS5:
Computing Fundamentals

Lesson 27 Review and discuss IC3 GS5:


Computing Fundamentals Post
Assessment

Session 1 Notes

60 | Appendix IC³ GS5: Computing Fundamentals Project Workbook


Master Level Lesson Plan [Approximately 7-14 hours]

Lesson Topic Subtopic Objectives Activity Notes


Lesson 1 Entire Course Entire Course All Objectives IC GS5: Computing Funda-
3

mentals Master Project

Lesson 2 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Project

Lesson 3 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Project

Lesson 4 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Project

Lesson 5 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Exam

Lesson 6 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Exam

Lesson 7 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Exam

61 | Appendix IC³ GS5: Computing Fundamentals Project Workbook


IC3 GS5: Computing Fundamentals Outline
Hardware Moving and Renaming Files
Device Basics Finding Files
Memory and Storage Electronic Media
Connecting Digital Cameras Document Scanning
Connecting Speakers
Connecting Webcams Troubleshooting Basics
Connecting Printers Basic Problem Solving
Connecting Generic USB Devices Troubleshooting Terminology
Connecting External Displays Platform Compatibility
Power Management Media Compatibility
Drivers Backup and Restore
Hardware Configuration Restore Personal Device
Touchscreens vs. Non-Touchscreens
Cloud Computing
Internet Basics Cloud Basics and Benefits
Cellular, Wi-Fi, and Wired Networks Using the Cloud
Modems Web Apps vs. Local Apps
Bandwidth Online Storage Apps
Routers Online Office Apps
IP Address Database-Driven CRM Apps
Wired Connection
Wireless Connection Security
Connection Speed Usernames and Passwords
Basic Account Settings
Mobile Devices Viruses
Celluar Phone Basics Types of Virus
Antivirus and Firewalls
Cellular-Enabled Tablets
Secured vs. Unsecured Networks
Smartphones
Virtual Private Networks
Hardwired Phones
eCommerce
Voicemail
Instant Messaging
Notifications

Software Architecture
Operating Systems
Window Management
Navigating Menus
Software Preferences
Desktop Customization
User Profiles and Permissions
Install, Uninstall, and Update Software

FIle and Software Management


Understanding File Extentions
File Permissions and Sharing
Attach, Zip, and Send Via Email

62 | Appendix IC³ GS5: Computing Fundamentals Project Workbook

Вам также может понравиться