Академический Документы
Профессиональный Документы
Культура Документы
First Edition
LearnKey provides self-paced training courses and online learning solutions to education, government, business, and individuals
world-wide. With dynamic video-based courseware and effective learning management systems, LearnKey provides expert
instruction for popular computer software, technical certifications, and application development. LearnKey delivers content on
the Web, by enterprise network, and on interactive CD-ROM. For a complete list of courses visit:
http://www.learnkey.com/
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means now known or to be
invented, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system without
written permission from the author or publisher, except for the brief inclusion of quotations in a review.
631567
Table of Contents
Using this Workbook __________________________________________________________________________ 5
Best Practices Using LearnKey’s Online Training ____________________________________________________ 6
IC3 GS5: Computing Fundamentals �������������������������������������������������������������� 8
Skills Assessment ����������������������������������������������������������������������������� 9
IC3 GS5: Computing Fundamentals Time Table ��������������������������������������������������� 11
Projects
Fill-in-the-Blanks ��������������������������������������������������������������������������� 13
Define Basic Terms �������������������������������������������������������������������������� 15
Understanding RAM ������������������������������������������������������������������������� 16
Label Ports ��������������������������������������������������������������������������������� 17
Label Peripherals ���������������������������������������������������������������������������� 19
Power Management �������������������������������������������������������������������������� 21
Working with Hardware Configuration ���������������������������������������������������������� 22
Wired Network ����������������������������������������������������������������������������� 23
Define Computing Fundamentals Terms ��������������������������������������������������������� 24
Cellular Phones ����������������������������������������������������������������������������� 25
Understand Smartphones ��������������������������������������������������������������������� 26
Configure Voicemail ������������������������������������������������������������������������� 27
Using Skype �������������������������������������������������������������������������������� 28
Set Up Notifications ������������������������������������������������������������������������� 29
Defining Operating Systems ������������������������������������������������������������������� 30
Label Page Options �������������������������������������������������������������������������� 31
Labeling Menu Navigation �������������������������������������������������������������������� 32
Desktop Customization ����������������������������������������������������������������������� 33
Permissions and Rights Explained ��������������������������������������������������������������� 34
Install and Uninstall Software ������������������������������������������������������������������ 35
File Types ���������������������������������������������������������������������������������� 36
Files Sharing and Permissions ������������������������������������������������������������������ 38
Files Scanned and Sent ����������������������������������������������������������������������� 39
Folder Rename and Find ���������������������������������������������������������������������� 40
Manage Electronic Media ��������������������������������������������������������������������� 41
Troubleshooting Issues ����������������������������������������������������������������������� 42
Cloud Concepts and Benefits ������������������������������������������������������������������ 43
Troubleshooting Issues ����������������������������������������������������������������������� 44
Online Storage Apps ������������������������������������������������������������������������� 45
Online Office and Database CRM Apps ��������������������������������������������������������� 46
Create an Account ��������������������������������������������������������������������������� 47
Define Malicious Programs and Attacks ���������������������������������������������������������� 48
Windows Defender and Firewall ��������������������������������������������������������������� 49
Master Project
IC3 GS5: Computing Fundamentals Master Project ______________________________________________________51
Appendix
IC3 GS5: Computing Fundamentals Lesson Plan ________________________________________________________54
IC3 GS5: Computing Fundamentals Outline ����������������������������������������������������������62
Using this Workbook
The exercises in this manual serve as a companion to LearnKey’s training and are organized by session to match the presented
concepts. Within each session, exercises are arranged from easiest to most challenging. In the Introduction section of each
session, you will find outlines of the training and sample lesson plans which will give you an overview of the training content
and help you to structure your lessons. The following sections are included for each session of training:
Skills Assessment: The skills assessment will help you and your students to gauge their understanding of course topics prior
to beginning any coursework. Each skill listed is tied directly to an exam objective. Understanding where your students feel
less confident will aid you in planning and getting the most from the training.
Objective Mapping and Shoot File Links: The objective mapping provides a quick reference as to where in the training
a specific certification exam objective is covered. The Files column lists the name of the Course Support files (Excel
spreadsheets, Photoshop files, etc.) that are used and demonstrated during the training. The files will typically have a starting
file containing all data necessary to begin the demonstrated skill, as well as a completed file which shows the final result.
Keyboard Shortcuts and Tips: The keyboard shortcuts and tips provide a reference of product-specific keyboard shortcuts
and helpful hints to make working more efficient.
Short Answer and Matching: The short answer questions facilitate a recall of the basic training concepts to further aid in
retention of the course topics and information in preparation for the training’s Pre-Assessments, Post Tests, and MasterExam.
The matching exercise provides additional learning reinforcement of terms and concepts found throughout the training in the
course’s glossary.
Projects: The projects in this manual are organized by session to match the concepts presented in the LearnKey training.
Each project is assigned a difficulty level of either beginner, intermediate, or advanced. Some projects will be noted as
“beginner-intermediate” or other range. Within each session, projects are arranged from easiest to most challenging. Each
project includes a description of the task as well as steps required for successful completion. Note that the steps may
not indicate each required action but will provide the expectation of what is required, leaving the action to the student.
References to the concepts demonstrated in the LearnKey training that are required for successful completion of the project
are also included. Each project will also indicate the files and software used to complete the tasks. Some projects may only
include a file named “ProjectTitle_End.” Projects only including an end file typically begin with a new file which is indicated
in the first step. The “ProjectTitle_End” file is included to illustrate a possible correct result. Other projects may include a file
named “ProjectTitle_Start” or other files. Projects with a “ProjectTitle_Start” file begin with that file instead of a new file.
“Start” files typically contain data required for the project pre-inserted to focus the project on concepts versus data entry.
Our course content is presented by top experts in their respective fields and provides clear and comprehensive information.
The full line of LearnKey products have been extensively reviewed to meet superior standards of quality. The content in our
courses has also been endorsed by organizations, such as Certiport, CompTIA®, Cisco, and Microsoft. However, it is the
testimonials given by countless satisfied customers that truly set us apart as leaders in the information training world.
LearnKey experts are highly qualified professionals who offer years of job and project experience in their subjects. Each
expert has been certified in the highest level available for their field of expertise. This provides the student with the knowledge
necessary to also obtain top-level certifications in the field of their choice.
Our accomplished instructors have a rich understanding of the content they present. Effective teaching encompasses not only
presenting the basic principles of a subject, but understanding and appreciating organization, real-world application, and links
to other related disciplines. Each instructor represents the collective wisdom of their field and within our industry.
We ensure that the subject matter is up-to-date and relevant. We examine the needs of each student and create training
that is both interesting and effective. LearnKey training provides auditory, visual, and kinesthetic learning materials to fit
diverse learning styles. The following are three levels of implementation:
Pre-assessment: The pre-assessment is used to determine the student’s prior knowledge of the subject matter. It
will also identify a student’s strengths and weaknesses, allowing the student to focus on the specific subject matter
he/she needs to improve most. Students should not necessarily expect a passing score on the pre-assessment as it is
a test of prior knowledge.
Video training session: Each course of training is divided into sessions that are approximately two hours in
length. Each session is divided into topics and subtopics.
Post test: The post test is used to determine the student’s knowledge gained from interacting with the training. In
taking the post test, students should not consult the training or any other materials. A passing score is 80 percent
or higher. If the individual does not pass the post test the first time it is taken, LearnKey would recommend the
incorporation of external resources, such as the workbook and additional customized instructional material.
Study guides: Study guides are a list of questions missed which can help students recognize areas of weakness
and necessary focus. They can be accessed from either the pre-assessment or post test.
Labs: Labs are interactive activities that simulate situations presented in the training. Step-by-step instructions
and live demonstrations are provided.
Workbooks: Workbooks have a variety of activities, such as glossary puzzles, short answer questions, practice
exams, research topics, and group and individual projects, which allow the student to study and apply concepts
presented in the training.
MasterExam: The MasterExam draws from a large pool of questions to provide a unique testing experience each
time it is taken. LearnKey recommends a student take and pass the exam, with a score of 80 percent or higher,
four times in order to prepare for certification testing. Study guides can also be accessed for the MasterExam.
Benefits:
• The IC3 GS5 courses have been split into three courses that will match the three exams. This course only focuses on
the Computing Fundamentals exam objectives.
• Throughout the course there are opportunities to practice and reinforce what you have learned through quizzes and
simulations that do not require you to leave the training.
Types of devices
Document management
Menu navigation
Define an IP address
Troubleshooting
***The actual time is calculated based on how long it will take to simply watch the video files.
***The total trianing time (inlcuding watching the videos, completing the labs, projects, and assessments) may double or even
triple the actual time.
Hardware
1. A is a computer or program that is responsible for accepting requests from various network
sources. [Device Basics]
3. External speakers are often connected using USB or inch audio jacks. [Connecting Speakers]
4. A touchscreen requires less but is less accurate than a non-touchscreen. [Touchscreens vs. Non-
Touchscreens]
Internet Basics
5. A modem is a device which translates signals into information.
[Modems]
6. Bandwidth defines how fast data can transfer to a device and is purchased through an .
[Bandwidth]
7. A router is a device used to transfer data from one computer network to another. [Routers]
8. The most common form of wired network connection is done using an connection. [Wired
Connection]
Mobile Devices
9. Although a tablet can connect to a cellular network, it cannot be used as a . [Cellular-Enabled
Tablets]
10. The operating system and platform designed for Apple devices is called . [Smartphones]
11. When leaving a voicemail message, it is important to be clear, concise, and use an appropriate .
[Voicemail]
12. Two common methods used for setting up notifications are and alarms. [Notifications]
Software Architecture
13. An operating system is the software on a computer device that manages all of its installed and
hardware. [Operating Systems]
14. Linux is an operating system which is available to the general public. [Operating Systems]
15. Users can customize their Windows device by going to the Control Panel under
. [Desktop Customization]
16. Software can be installed, uninstalled, and updated on a Windows machine in the . [Install,
Uninstall, and Update Software]
13 | Projects IC³ GS5: Computing Fundamentals Project Workbook
File and Software Management
17. The file extension is produced by Adobe Flash. [Understanding File Extensions]
18. apps typically organize items and place them into folders. [Electronic Media]
19. Scanning is the process of a physical item into a digital medium. [Document Scanning]
Troubleshooting Basics
20. Two signs a virus or other form of malware may be on a computer include receiving an or when
an application stops working for no reason. [Basic Problem Solving]
21. A computer device may be limited if it can only connect to the Internet . [Platform
Compatibility]
Cloud Computing
23. Cloud storage can be used to back up data on a and it allows users anywhere in the world to
access data as long as they have an Internet connection. [Cloud Basics and Benefits]
24. Cloud services are mostly free to set up, however payment is often required for . [Using the
Cloud]
25. A is used to administer, deliver, and track the progress of users in an eLearning environment.
[Web Apps vs. Local Apps]
26. Google Docs, Sheets, and Slides are online Office apps used in . [Online Office Apps]
Security
27. A incorporates all of the components of a good password, but it can be easily remembered.
[Basic Account Settings]
28. A virus is a program or piece of which runs on a computer device and can erase, corrupt, or
gather personal data. [Types of Viruses]
29. After using a public network, it is important to log out of any , clear the browser history, cache,
and the cookies. [Secured vs. Unsecured Networks]
30. In order to be a competent online shopper, you must be aware of too good to be true.
[eCommerce]
b. Laptop:
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Device Basics
Difficulty: Beginner/Intermediate
b. Explain how a computer will react when there is not enough RAM.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training;
Hardware: Device Basics
Difficulty: Beginner
For this project you will label the different ports and then write a brief sentence explaining the purpose of each port.
a.
b.
c.
d.
e.
f.
g.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Connecting Digital Cameras; Connecting Speakers; Connecting Webcams; Connecting Printers; Connecting Generic USB Device;
Connecting External Displays
Difficulty: Beginner/Immediate
For this project, you will demonstrate your knowledge of peripheral objects. Label each object and explain how each object is used in
relation with the computer.
a.
b.
c.
d.
e.
f.
h.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Connecting Digital Cameras; Connecting Speakers; Connecting Webcams; Connecting Printers; Connecting Generic USB Device;
Connecting External Displays
Difficulty: Beginner/Immediate
For this project, you will need to write a paragraph explaining what power management is and which setting you can use to manage
the power.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Power Management
Difficulty: Beginner
Objectives:
1.0 Computer Fundamentals
1.2 Hardware
1.2.f Understand power management and power settings
For this project, you will need to describe the pros and cons of touchscreen, non-touchscreen, and hybrid devices.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Touchscreen vs. Non-Touchscreens
Here in this project, you will write a brief description on the difference between cellular, Wi-Fi, and wired networks.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Internet Basics: Cellular, Wi-Fi, and Wired Networks
Objectives:
1.0 Computer Fundamentals
1.2 Hardware
1.2.j Know the difference between cellular, Wi-Fi, and wired networks
b. Bandwidth: f. Android:
c. Router: g. Firmware:
d. Ethernet:
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Internet Basics: Modems; Bandwidth; Routers; IP Address
Difficulty: Beginner/Intermediate
For this project, you will need to define what a cell phone is and how they work using towers. Also explain the different carriers and
some typical cell phone plans. Then give a brief explanation of what other devices can connect to the Internet using cellular data.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Cellular Phone Basics; Cellular-Enabled Tablets; Smartphones
Difficulty: Beginner/Intermediate
For this project, you will explain what types of apps can be installed on a smartphone. Explain what limitations there are with
smartphones, as well as some of the capabilities of a smartphone.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training::
Mobile Devices: Cellular Phone Basics; Cellular-Enabled Tablets; Smartphones
Difficulty: Beginner
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Voicemail
Difficulty: Intermediate
Objectives:
1.0 Computing Fundamentals
1.1 Mobile Devices
1.1.e Know how to configure and use voicemail
For this project, you will set up a Skype account and then use it to chat with someone.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Instant Messaging
Difficulty: Beginner/Intermediate
Objectives:
1.0 Computing Fundamentals
1.1 Mobile Devices
1.1.f Use of instant messaging
In this project, you will use an iOS on an iPhone to set up notifications on the device. You will need to change notification sounds and
change how many times your alerts repeat for your messages.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Notifications
Difficulty: Intermediate
Objectives:
1.0 Computing Fundamentals
1.1 Mobile Devices
1.1.g Know how to configure notifications
For this project, you will describe the differences and similarities between the most common operating systems used for Mac, PC, and
Linux.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Operating Systems
Difficulty: Beginner/Intermediate
Objectives:
1.0 Computing Fundamentals
1.2 Hardware
1.2.h Know platform implications and considerations
1.2.h.i For example Mac, PC, Linux, iOS, Android, Firmware
a. b. c.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Window Management
Difficulty: Beginner
Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.c Have a general understanding of operating systems and software settings
1.3.c.i Know basic desktop customization
For this project, you will label the images in the following document.
a. b. c.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Navigating Menus
Difficulty: Beginner
Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.h Menu navigation
1.3.h.i Radio buttons
1.3.h.ii Check boxes
1.3.h.iii Drop-down menus
For this project, you will change the screensaver and have it come on when the computer has been idle for 10 minutes. Then modify
the screen resolution to help someone who is partially blind. Use a personal image and set it as your background.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Desktop Customization
Difficulty:Advanced
For this project you will explain in more depth why permissions are so valuable in an organization.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: User Profiles and Permissions
Difficulty: Intermediate/Advanced
For this project you will use the Ninite website to install a media feature such as iTunes or QuickTime, a utilities feature such as Glary
or CDBurnerXP, and a security feature such as Essentials or Avast. If available use a flash drive or disc to install another software
program. Since you do not really need all of these software programs you will then go in and uninstall the utility and security features
that you installed.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Install, Uninstall, and Update Software
Difficulty: Intermediate/Advanced
Required Materials: Computer with Internet access, Flash drive or disc with another software program
Objectives:
1.0 Computing Fundamentals
1.3 Computer Software Architecture
1.3.l Know how to install, uninstall, update, repair software
1.3.l.i From the Internet
1.3.l.ii Using local media (DVD-ROM, etc.)
For this project you will use the following document to define the different file types and explain which file types are compatible with
which software applications.
a. .doc/.docx: f. .pdf:
b. .txt: g. .wav:
c. .xls/.xlsx: h. .zip:
d. .exe: i. .jpg:
e. .swf: j. .tif:
l. .mp4:
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: Understanding File Extensions
Difficulty: Intermediate/Advanced
For this project you will set a file’s properties to Read-only and then share the same file with specific people. Set one person with Read/
Write privileges and leave the others as Read-only.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: File Permissions and Sharing
Difficulty: Intermediate/Advanced
For this project you will scan a 10-page document and save it on your desktop. You will zip that file in a folder. Then email that folder
to someone.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: File Permissions and Sharing
Difficulty: Intermediate
For this project you will need to create a folder on your desktop and add documents to the folder. Then you will need to rename the
folder to Computing Fundamentals. Write a brief explanation of how to find a file without scrolling to find it.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: Moving and Renaming Files; Finding Files
Difficulty: Intermediate
For this project you will need to explain which software programs you use to manage your electronic data.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: Electronic Media
Difficulty: Intermediate
For this project you will use the following document to look over different computer issues and explain methods used to troubleshoot
these issues.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Troubleshooting Basics: Basic Problem Solving
Difficulty: Beginner/Intermediate
For this project, you will define a list of cloud storage and access features and list a few benefits of sharing, collaborating, and using
cloud storage.
b. List at least one benefit each for sharing, collaborating, and using cloud storage.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Cloud Basics and Benefits
Difficulty: Beginner
b. Define LMS.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Web Apps vs. Local Apps
Difficulty: Beginner
For this project, you will use Google Drive to upload content and download content from the cloud.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Using the Cloud; Online Storage Apps
Difficulty: Beginner/Intermediate
For this project, you will use Google Docs to create a new document and navigate to three prominent CRM apps.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Using the Cloud; Online Storage Apps
Difficulty: Intermediate
For this project you will create an email account using a unique username and password.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Security: Usernames and Passwords; Basic Account Settings
Difficulty: Intermediate
For this project you will define different terms regarding malicious programs and attack methods.
c. Monitoring Software:
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Security: Viruses; Types of Virus
For this project you will navigate to the Windows Defender app and perform a scan of your local computer. After that, you will go to
the Windows Firewall and deny access to an application.
Reference:
LearnKey’s IC3 GS5: Computing Fundamentals Training:
Security: Antivirus and Firewalls
Difficulty: Beginner/Intermediate
Objectives:
1.0 Computing Fundamentals
1.7 Security
1.7f Know the use of and importance of antivirus software
1.7f.i Understand how to prevent virus issues
1.7f.ii Understand how to maintain and update antivirus software
1.7g Know the use of firewalls and basic settings
Being able to set up your own computer can help you resolve issues in the future and make it so you don’t have to rely on others when
it comes to basic computer problems. As you set up your computer you will learn how to connect to the Internet both with a wired
option and through wireless routers. Again this will help you understand basic wired and wireless options and allow you to fix and set
up Internet connections on your own.
Once your computer is all set up you can work on your computer. But, you will first need to know the memory of your computer,
because if you don’t know what your computer is capable of, you may try to do something your computer is not able to do. This will
include attaching your keyboard, mouse, and monitors together and connecting the computer to the router and printer.
Now that you understand your computer it is time to get you set up as a user on the computer. You will need to get a username and
password put together and then make sure your desktop is configured in a way that you like how it works. As you work with various
devices with your computer you will need to make sure that all the devices are compatible with your computer so that you don’t end
up crashing the computer or losing information. You will need to download the information onto your computer from the different
devices and as you do this you will need to set up a folder structure and name your files in such a way that the information is easy to
find.
There are a number of ways for you to manage online information such as music, eBooks, and videos. Knowing the different online
options or software downloads that can manage this information will help you keep all of your media and books organized and easily
accessible.
Keeping your computer safe from online attacks should be one of your first priorities. You will need to download an antivirus software
and then run it to make sure the computer is safe. Another method of keeping your information safe is by backing it up using a flash
drive or external hard drive. You can also back up your files to an online cloud storage option.
Working with technology makes communicating easy. As you work you will frequently need to communicate using email. Email not
only allows you to send a letter easily but you can also add attachments to the email.
Finally, as you use the Internet you will often need to make purchases online. Being familiar with eCommerce best practices will keep
you from purchasing things that are not what they claim to be and from identify theft.
Difficulty: Advanced
Lesson 2 Hardware Device Basics 1.2 Hardware Watch Session 1: Hardware [22
Memory and Storage 1.2.a Types of devices minutes]
Connecting Digital 1.2.a.i Server
Cameras Fill-in-the-Blanks Session 1:
Connecting Speakers 1.2.a.ii Laptop Questions 1-4
Connecting Webcams 1.2.a.iii Desktop
Connecting Printers 1.2.b Know the impact of memory and storage on Session 1 Lab 1: Adding a
Connecting Generic USB usage Printer
Devices 1.2.c Know how to connect different peripherals
Connecting External Session 1 Lab 2: Navigate to
1.2.c.i Camera
Displays Power Options
Power Management 1.2.c.ii Audio
Drivers 1.2.c.iii Microphone
Hardware Configuration 1.2.c.iv Printer
Touchscreens vs. Non- 1.2.c.v USB devices
Touchscreens
1.2.c.vi External display
1.2.f Understand power management and power
settings
1.2.g Understand driver concepts as well as their device
compatibility
1.2.g.i Know what drivers do
1.2.g.ii Know if specific drivers are compatible with
a personal device
1.2.l Understand common hardware configurations
1.2.m Implications for document usage
1.2.n Understand pros and cons of touchscreen vs non-
touchscreen devices
Lesson 3 Hardware See Lesson 2 See Lesson 2 Session 1 Project 1: Define
Basic Terms
Lesson 8 Mobile Devices Cellular Phone Basics 1.1 Mobile Devices Watch Session 1: Mobile
Cellular-Enabled Tablets 1.1.a Understand cellular phone concepts Devices [20 minutes]
Smartphones 1.1.b Be familiar with cellular-enabled tablets
Hardwired Phones Fill-in-the-Blanks Session 1:
Voicemail 1.1.c Be familiar with smartphone Questions 9-12
Instant Messaging 1.1.d Understand the use of hardwired phones
Notifications 1.1.e Know how to configure and use voicemail Session 1 Lab 5: Voicemail
1.1.f Use of instant messaging Greeting for Apple
1.1.g Know how to configure notifications Session 1 Project 6: Wired
1.2 Hardware Network
1.2.h Know platform implications and considerations
1.2.h.iv iOS
1.2.h.v Android
Lesson 9 Mobile Devices See Lesson 8 See Lesson 8 Session 1 Project 7: Define
Computing Fundamentals
Terms
Lesson 10 Mobile Devices See Lesson 8 See Lesson 8 Session 1 Project 9: Understand
Smartphones
Lesson 13 Software User Profiles and Permis- 1.3 Computer Software Architecture Watch Session 1: User Profiles
Architecture sions 1.3.e Users and profiles and Permissions- Install, Unin-
(Continued) Install, Uninstall, and 1.3.j Rights and permissions stall, and Update Software [13
Update Software minutes]
Fill-in-the-Blanks Session 1:
Question 16
Disucss software
Lesson 14 Software Archi- See Lessons 12 and 13 See Lessons 12 and 13 Session 1 Project 13: Defining
tecture Operating Systems
Lesson 16 Software Archi- See Lessons 12 and 13 See Lessons 12 and 13 Session 1 Project 18: Install and
tecture Uninstall Software
Lesson 17 File and Soft- Understanding File Exten- 1.3 Computer Software Architecture Watch Session 1: File and
ware Manage- tions 1.3.f Know file structures and file/folder management Software Management [22
ment File Permissions and 1.3.f.i Moving/renaming files minutes]
Sharing 1.3.f.ii File permissions
Attach, Zip, and Send Via Fill-in-the-Blanks Session 1:
1.3.f.iii File extensions
Email Questions 17-19
1.3.f.iii.1 .doc/.docx
Moving and Renaming
Files 1.3.f.iii.2 .txt Session 1 Lab 10: Enable File
Finding Files 1.3.f.iii.3 .xls/.xlsx Permissions
Electronic Media 1.3.f.iii.4 .exe
Document Scanning 1.3.f.iii.5 .swf
1.3.f.iii.6 .pdf
1.3.f.iii.7 .wav
1.3.f.iii.8 .zip
1.3.f.iii.9 .jpg
1.3.f.iii.10 .tif
1.3.f.iii.11 .mp3
1.3.f.iii.12 .mp4
1.3.f.iii.13 .avi
1.3.f.iv Managing electronic media
1.3.f.iv.1 eBooks
1.3.f.iv.2 Songs
1.3.f.iv.3 Videos
1.3.g Document Management
1.3.g.i Scanning documents
1.3.g.ii Taking pictures
1.3.i Searching for files
1.5 File Sharing
1.5.a Understand file transfer options and
characteristics
1.5.a.i Know how to attach files to email
1.5.a.iii Understand the difference between publicly
shared vs. shared links vs. shared folders
1.5.b Understand needs for file compression/zipping
in sharing
Lesson 18 File and Soft- See Lessons 17 See Lessons 17 Session 1 Project 19: File Types
ware Manage-
ment Session 1 Project 20: Files Sharing
and Permissions
Lesson 19 File and Soft- See Lessons 17 See Lessons 17 Session 1 Project 21: Files Scanned
ware Manage- and Sent
ment
Session 1 Project 22: Folder Rename
and Find
Lesson 21 Cloud Comput- Cloud Basics and Benefits 1.6 Cloud Computing Watch Session 1: Cloud Com-
ing Using the Cloud 1.6.a Understand cloud concepts puting [18 minutes]
Web Apps vs. Local Apps 1.6.a.i Understand cloud storage vs. cloud access concepts
Online Storage Apps 1.6.a.ii Understand sharing and collaboration via the cloud Fill-in-the-Blanks Session 1:
Online Office Apps 1.6.b Know the benefits of using cloud storage Questions 23-26
Database-Driven CRM
1.6.c Access and utilization of the cloud
Apps Session 1 Project 25: Cloud
1.6.c.i Understand account management on the cloud
Concepts and Benefits
1.6.d Web apps vs. local apps
1.6.d.i Understand software as a Service (SAAS) concepts
1.6.d.ii Know what Learning Management Systems
(LMS) do
1.6.e Understand web app types
1.6.e.i Online storage apps
1.6.e.i.1 Google Drive
1.6.e.i.2 Dropbox
1.6.e.i.3 OneDrive
1.6.e.i.4 iCloud storage
1.6.e.ii Online office apps
1.6.e.ii.1 Google apps
1.6.e.ii.2 Office 365
1.6.e.iii Database Driven CRM apps
1.6.e.iii.1 Salesforce
1.6.e.iii.2 Oracle
1.6.e.iii.3 Workfront (formerly Attask)
1.6.c Access and utilization of the cloud
1.6.c.i Understand account management on the cloud
1.6.c.ii Know how to upload content to the cloud
1.6.c.iii Know how to download content from the cloud
1.6.c.iv Know how to sync files between devices using the
cloud
Lesson 22 Cloud Comput- See Lesson 21 See Lesson 21 Session 1 Project 26: Trouble-
ing shooting Issues
Lesson 24 Security Usernames and Passwords 1.7 Security Watch Session 1: Security [14
Basic Account Settings 1.7.a Known credential management best practices minutes]
Viruses 1.7.a.i Usernames
Types of Virus 1.7.a.ii Passwords
Fill-in-the-Blanks Session 1:
Antivirus and Firewalls Questions 27-30
1.7.a.ii.1 Understand the components of a good
Secured vs. Unsecured password
Networks Session 1 Project 30: Define
Virtual Private Networks 1.7.b Know basic account setting management Malicious Programs and At-
eCommerce 1.7.c Know the basic threats to security of computers, tacks
data, and identity
1.7.c.i Viruses
1.7.c.ii Trojans
1.7.c.iii Malware
1.7.c.iv Social engineering
1.7.d Understand the implications of monitoring
software (surveillance)
1.7.e Connecting to secured vs. unsecured network
(wired and wireless)
1.7.e.i Know the ramifications
1.7.e.ii Understand the risks
1.7.e.iii Know the difference between public vs. private
computing (using a public computer)
1.7.e.iii.1 Browser histories
1.7.e.iii.2 Cache/cookies
1.7.e.iii.3 Logging out of online and OS accounts
1.7.f Know the use of and importance of antivirus
software
1.7.f.i Understand how to prevent virus issues
1.7.f.ii Understand how to maintain and update antivirus
software
1.7.g Know the use of firewalls and basic settings
1.7.e.iii.2 Cache/cookies
1.7.h Know eCommerce interactions and best practices
1.7.h.i Recognize the use of a secure connection, networks,
[https:]
1.7.h.ii Know how to be a savvy ecommerce consumer
Session 1 Notes
Lesson 2 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Project
Lesson 3 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Project
Lesson 4 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Project
Lesson 5 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Exam
Lesson 6 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Exam
Lesson 7 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Exam
Software Architecture
Operating Systems
Window Management
Navigating Menus
Software Preferences
Desktop Customization
User Profiles and Permissions
Install, Uninstall, and Update Software