ic3 - egusd.onlineexpert.com · learnkey provides self-paced training courses and online learning...
TRANSCRIPT
LearnKey provides self-paced training courses and online learning solutions to education, government, business, and individuals world-wide. With dynamic video-based courseware and effective learning management systems, LearnKey provides expert instruction for popular computer software, technical certifications, and application development. LearnKey delivers content on the Web, by enterprise network, and on interactive CD-ROM. For a complete list of courses visit:
http://www.learnkey.com/
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means now known or to be invented, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system without written permission from the author or publisher, except for the brief inclusion of quotations in a review.
© 2014 LearnKey www.learnkey.com
631567
IC3 GS5: Computing FundamentalsFirst Edition
Using this Workbook __________________________________________________________________________ 5Best Practices Using LearnKey’s Online Training ____________________________________________________ 6IC3 GS5: Computing Fundamentals ______________________________________________________________ 8Skills Assessment _____________________________________________________________________________ 9IC3 GS5: Computing Fundamentals Time Table ___________________________________________________ 11
ProjectsFill-in-the-Blanks ___________________________________________________________________________ 13Define Basic Terms __________________________________________________________________________ 15Understanding RAM _________________________________________________________________________ 16Label Ports _________________________________________________________________________________ 17Label Peripherals ____________________________________________________________________________ 19Power Management __________________________________________________________________________ 21Working with Hardware Configuration __________________________________________________________ 22Wired Network _____________________________________________________________________________ 23Define Computing Fundamentals Terms _________________________________________________________ 24Cellular Phones _____________________________________________________________________________ 25Understand Smartphones _____________________________________________________________________ 26Configure Voicemail _________________________________________________________________________ 27Using Skype ________________________________________________________________________________ 28Set Up Notifications _________________________________________________________________________ 29Defining Operating Systems ___________________________________________________________________ 30Label Page Options __________________________________________________________________________ 31Labeling Menu Navigation ____________________________________________________________________ 32Desktop Customization _______________________________________________________________________ 33Permissions and Rights Explained _______________________________________________________________ 34Install and Uninstall Software __________________________________________________________________ 35File Types __________________________________________________________________________________ 36Files Sharing and Permissions __________________________________________________________________ 38Files Scanned and Sent _______________________________________________________________________ 39Folder Rename and Find ______________________________________________________________________ 40Manage Electronic Media _____________________________________________________________________ 41Troubleshooting Issues ________________________________________________________________________ 42Cloud Concepts and Benefits __________________________________________________________________ 43Troubleshooting Issues ________________________________________________________________________ 44Online Storage Apps _________________________________________________________________________ 45Online Office and Database CRM Apps _________________________________________________________ 46Create an Account ___________________________________________________________________________ 47Define Malicious Programs and Attacks __________________________________________________________ 48Windows Defender and Firewall ________________________________________________________________ 49
Table of Contents
Master ProjectIC3 GS5: Computing Fundamentals Master Project ______________________________________________________51
AppendixIC3 GS5: Computing Fundamentals Lesson Plan ________________________________________________________54IC3 GS5: Computing Fundamentals Outline __________________________________________________________62
5 | Introduction IC³ GS5: Computing Fundamentals Project Workbook
Using this WorkbookThe exercises in this manual serve as a companion to LearnKey’s training and are organized by session to match the presented concepts. Within each session, exercises are arranged from easiest to most challenging. In the Introduction section of each session, you will find outlines of the training and sample lesson plans which will give you an overview of the training content and help you to structure your lessons. The following sections are included for each session of training:
Skills Assessment: The skills assessment will help you and your students to gauge their understanding of course topics prior to beginning any coursework. Each skill listed is tied directly to an exam objective. Understanding where your students feel less confident will aid you in planning and getting the most from the training.
Objective Mapping and Shoot File Links: The objective mapping provides a quick reference as to where in the training a specific certification exam objective is covered. The Files column lists the name of the Course Support files (Excel spreadsheets, Photoshop files, etc.) that are used and demonstrated during the training. The files will typically have a starting file containing all data necessary to begin the demonstrated skill, as well as a completed file which shows the final result.
Keyboard Shortcuts and Tips: The keyboard shortcuts and tips provide a reference of product-specific keyboard shortcuts and helpful hints to make working more efficient.
Short Answer and Matching: The short answer questions facilitate a recall of the basic training concepts to further aid in retention of the course topics and information in preparation for the training’s Pre-Assessments, Post Tests, and MasterExam. The matching exercise provides additional learning reinforcement of terms and concepts found throughout the training in the course’s glossary.
Projects: The projects in this manual are organized by session to match the concepts presented in the LearnKey training. Each project is assigned a difficulty level of either beginner, intermediate, or advanced. Some projects will be noted as
“beginner-intermediate” or other range. Within each session, projects are arranged from easiest to most challenging. Each project includes a description of the task as well as steps required for successful completion. Note that the steps may not indicate each required action but will provide the expectation of what is required, leaving the action to the student. References to the concepts demonstrated in the LearnKey training that are required for successful completion of the project are also included. Each project will also indicate the files and software used to complete the tasks. Some projects may only include a file named “ProjectTitle_End.” Projects only including an end file typically begin with a new file which is indicated in the first step. The “ProjectTitle_End” file is included to illustrate a possible correct result. Other projects may include a file named “ProjectTitle_Start” or other files. Projects with a “ProjectTitle_Start” file begin with that file instead of a new file.
“Start” files typically contain data required for the project pre-inserted to focus the project on concepts versus data entry.
6 | Introduction IC³ GS5: Computing Fundamentals Project Workbook
Best Practices Using LearnKey’s Online TrainingLearnKey offers video-based training solutions which are flexible enough to accommodate the private student, as well as educational facilities and organizations.
Our course content is presented by top experts in their respective fields and provides clear and comprehensive information. The full line of LearnKey products have been extensively reviewed to meet superior standards of quality. The content in our courses has also been endorsed by organizations, such as Certiport, CompTIA®, Cisco, and Microsoft. However, it is the testimonials given by countless satisfied customers that truly set us apart as leaders in the information training world.
LearnKey experts are highly qualified professionals who offer years of job and project experience in their subjects. Each expert has been certified in the highest level available for their field of expertise. This provides the student with the knowledge necessary to also obtain top-level certifications in the field of their choice.
Our accomplished instructors have a rich understanding of the content they present. Effective teaching encompasses not only presenting the basic principles of a subject, but understanding and appreciating organization, real-world application, and links to other related disciplines. Each instructor represents the collective wisdom of their field and within our industry.
Our Instructional TechnologyEach course is independently created, based on standard objectives provided by the manufacturer for which the course was developed.
We ensure that the subject matter is up-to-date and relevant. We examine the needs of each student and create trainingthat is both interesting and effective. LearnKey training provides auditory, visual, and kinesthetic learning materials to fit diverse learning styles. The following are three levels of implementation:
Standard Training ModelThe standard training model allows students to proceed through basic training, building upon primary knowledge and concepts to more advanced application and implementation. In this method, students will use the following toolset:
Pre-assessment: The pre-assessment is used to determine the student’s prior knowledge of the subject matter. Itwill also identify a student’s strengths and weaknesses, allowing the student to focus on the specific subject matterhe/she needs to improve most. Students should not necessarily expect a passing score on the pre-assessment as it isa test of prior knowledge.
Video training session: Each course of training is divided into sessions that are approximately two hours inlength. Each session is divided into topics and subtopics.
Post test: The post test is used to determine the student’s knowledge gained from interacting with the training. Intaking the post test, students should not consult the training or any other materials. A passing score is 80 percentor higher. If the individual does not pass the post test the first time it is taken, LearnKey would recommend theincorporation of external resources, such as the workbook and additional customized instructional material.
7 | Introduction IC³ GS5: Computing Fundamentals Project Workbook
Intermediate Training ModelThe intermediate training model offers students additional training materials and activities which allows for betterretention, review, and interaction. This model includes not only the standard model material, but also includes thefollowing toolset:
Study guides: Study guides are a list of questions missed which can help students recognize areas of weaknessand necessary focus. They can be accessed from either the pre-assessment or post test.
Labs: Labs are interactive activities that simulate situations presented in the training. Step-by-step instructionsand live demonstrations are provided.
Workbooks: Workbooks have a variety of activities, such as glossary puzzles, short answer questions, practiceexams, research topics, and group and individual projects, which allow the student to study and apply conceptspresented in the training.
Master Training ModelThe master training model offers the student an additional opportunity to prepare for certification by further examining his/her knowledge. This model includes the materials used in the standard and intermediate models, as well as the MasterExam.
MasterExam: The MasterExam draws from a large pool of questions to provide a unique testing experience eachtime it is taken. LearnKey recommends a student take and pass the exam, with a score of 80 percent or higher,four times in order to prepare for certification testing. Study guides can also be accessed for the MasterExam.
8 | Introduction IC³ GS5: Computing Fundamentals Project Workbook
IC3 GS5: Computing FundamentalsIn LearnKey’s IC3 GS5: Computing Fundamentals course, students will learn the basic functions of computing and how to complete common computing tasks. They will also learn how to identify different computer software, how to use an operating system, computer hardware, peripherals, and troubleshooting. At the completion of this course students will be prepared to take the IC3 GS5 exam.
Benefits: • The IC3 GS5 courses have been split into three courses that will match the three exams. This course only focuses on the Computing Fundamentals exam objectives. • Throughout the course there are opportunities to practice and reinforce what you have learned through quizzes and simulations that do not require you to leave the training.
9 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Instructions: Rate your skills on the following tasks from 1-5 (1 being needs improvement, 5 being excellent).
Skills 1 2 3 4 5Understand cellular phone concepts
Be familiar with cellular-enabled tablets
Be familiar with smartphones
Understand the use of hardwired phones
Know how to configure and use voice mail
Use of instant messaging
Know how to configure notifications
Types of devices
Know the impact of memory and storage on usage
Know how to connect to different peripherals
Understand the use of Ethernet ports
Connect a device to a wireless network [Wi-Fi]
Understand power management and power settings
Understand driver concepts as well as their device compatibility
Know platform implications and considerations
Know platform compatibility
Know the difference between cellular, Wi-Fi, and wired networks
Understand concepts regarding connecting to the Internet
Understand common hardware configurations
Implications for document usage
Understand the pros and cons of touchscreens vs. non-touchscreen devices
Understand operating system versioning and update awareness
Know concepts surrounding applications vs. operating system vs. global settings
Have a general understanding of operating systems and software settings
Set software preferences
Know eCommerce interactions and best practices
Understand what Virtual Private Networks (VPNs) are
Skills Assessment
10 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Instructions: Rate your skills on the following tasks from 1-5 (1 being needs improvement, 5 being excellent).
Skills 1 2 3 4 5Users and profiles
Know file structures and file/folder management
Document management
Menu navigation
Searching for files
Rights and permissions (administrative rights)
Define an IP address
Know how to install, uninstall, update, repair software
Troubleshooting
Understand backing up concepts
Know how to back up and restore
Know how to complete a full system restore on a personal device
Understand needs for file compression/zipping in sharing
Understand cloud concepts
Know the benefits of using cloud storage
Access and utilization of the cloud
Web apps vs. local apps
Understand web app types
Know credential management best practices
Know basic account setting management
Know the basic threats to security of computers, data, and identity
Understand the implications of monitoring software (surveillance)
Connecting to secured vs. unsecured network (wired and wireless)
Know the use of and importance of antivirus software
Know the use of firewalls and basic settings
11 | Projects IC³ GS5: Computing Fundamentals Project Workbook
IC3 GS5: Computing Fundamentals Time TableSession 1 Actual Time
Hardware 00:22:19Internet Basics 00:10:39Mobile Devices 00:19:21Software Architecture 00:36:29File and Software Management 00:21:52Troubleshooting Basics 00:13:52Cloud Computing 00:17:17Security 00:13:37
Total Time 02:35:26
***The actual time is calculated based on how long it will take to simply watch the video files.***The total trianing time (inlcuding watching the videos, completing the labs, projects, and assessments) may double or even triple the actual time.
12 | Session 1 IC³ GS5: Computing Fundamentals Project Workbook
13 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Fill-in-the-BlanksInstructions: While watching Session 1, fill in the missing words according to the information presented by the instructor. [References are found in the brackets.]
Hardware
1. A is a computer or program that is responsible for accepting requests from various network sources. [Device Basics]
2. memory can only store information when a computer is on, while memory will retain information even if there is no power. [Memory and Storage]
3. External speakers are often connected using USB or inch audio jacks. [Connecting Speakers]
4. A touchscreen requires less but is less accurate than a non-touchscreen. [Touchscreens vs. Non-Touchscreens]
Internet Basics
5. A modem is a device which translates signals into information. [Modems]
6. Bandwidth defines how fast data can transfer to a device and is purchased through an . [Bandwidth]
7. A router is a device used to transfer data from one computer network to another. [Routers]
8. The most common form of wired network connection is done using an connection. [Wired Connection]
Mobile Devices
9. Although a tablet can connect to a cellular network, it cannot be used as a . [Cellular-Enabled Tablets]
10. The operating system and platform designed for Apple devices is called . [Smartphones]
11. When leaving a voicemail message, it is important to be clear, concise, and use an appropriate . [Voicemail]
12. Two common methods used for setting up notifications are and alarms. [Notifications]
Software Architecture
13. An operating system is the software on a computer device that manages all of its installed and hardware. [Operating Systems]
14. Linux is an operating system which is available to the general public. [Operating Systems]
15. Users can customize their Windows device by going to the Control Panel under . [Desktop Customization]
16. Software can be installed, uninstalled, and updated on a Windows machine in the . [Install, Uninstall, and Update Software]
14| Projects IC³ GS5: Computing Fundamentals Project Workbook
File and Software Management
17. The file extension is produced by Adobe Flash. [Understanding File Extensions]
18. apps typically organize items and place them into folders. [Electronic Media]
19. Scanning is the process of a physical item into a digital medium. [Document Scanning]
Troubleshooting Basics
20. Two signs a virus or other form of malware may be on a computer include receiving an or when an application stops working for no reason. [Basic Problem Solving]
21. A computer device may be limited if it can only connect to the Internet . [Platform Compatibility]
22. A is a piece of software which adds additional functionality to an application. [Media Compatibility]
Cloud Computing
23. Cloud storage can be used to back up data on a and it allows users anywhere in the world to access data as long as they have an Internet connection. [Cloud Basics and Benefits]
24. Cloud services are mostly free to set up, however payment is often required for . [Using the Cloud]
25. A is used to administer, deliver, and track the progress of users in an eLearning environment. [Web Apps vs. Local Apps]
26. Google Docs, Sheets, and Slides are online Office apps used in . [Online Office Apps]
Security
27. A incorporates all of the components of a good password, but it can be easily remembered. [Basic Account Settings]
28. A virus is a program or piece of which runs on a computer device and can erase, corrupt, or gather personal data. [Types of Viruses]
29. After using a public network, it is important to log out of any , clear the browser history, cache, and the cookies. [Secured vs. Unsecured Networks]
30. In order to be a competent online shopper, you must be aware of too good to be true. [eCommerce]
15 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Define Basic TermsDescription: When developing fundamentals in computing we need to have a strong understanding of terms dealing with computing.
For this project, you will define the listed terms.
Steps for Completion:1. Define the terms below:
1.0 Computing Fundamentals1.2 Hardware
1.2.a Types of devices1.2.a.i Server1.2.a.ii Laptop1.2.a.iii Desktop
a. Server:
b. Laptop:
c. Desktop:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Device Basics
Project File: N/A Difficulty: Beginner/Intermediate
Required Materials: N/A Objectives:
16| Projects IC³ GS5: Computing Fundamentals Project Workbook
Understanding RAMDescription: A key element when working with computers is how much memory a computer has and how that can affect your usage and how fast programs run on your computer. For this project, you will use the following document to find out how much RAM your computer has. Then explain what RAM is and how a computer might react when the RAM is full.
Steps for Completion:1. Find RAM on a specific computer, then answer the questions below.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training;
Hardware: Device Basics
Project File: N/A
Difficulty: Beginner
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.2 Hardware1.2.b Know the impact of memory and storage on usage
a. Define RAM.
b. Explain how a computer will react when there is not enough RAM.
17 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Label PortsDescription: Computers have several different ports which are used to connect different peripherals to the computer or to access the Internet. This project will help you develop knowledge of a variety of ports which can be used to connect to the Internet, connect monitors, or connect audio.
For this project you will label the different ports and then write a brief sentence explaining the purpose of each port.
Steps for Completion:1. Label each port below and write a brief sentence about each port describing its purpose:
a.
b.
c.
d.
e.
f.
g.
18| Projects IC³ GS5: Computing Fundamentals Project Workbook
1.2 Hardware1.2.c Know how to connect different peripherals
1.2.c.i Camera1.2.c.ii Audio1.2.c.iii Microphone1.2.c.iv Printer1.2.c.v USB devices1.2.c.vi External display
h.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Connecting Digital Cameras; Connecting Speakers; Connecting Webcams; Connecting Printers; Connecting Generic USB Device; Connecting External Displays
Project File: N/A
Difficulty: Beginner/Immediate
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
19 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Label PeripheralsDescription: A computer is designed to attach different peripherals which are used to manipulate the computer or to download information to the computer.
For this project, you will demonstrate your knowledge of peripheral objects. Label each object and explain how each object is used in relation with the computer.
Steps for Completion:1. Label each port below and write a brief sentence about each port describing its purpose:
a.
b.
c.
d.
e.
f.
20| Projects IC³ GS5: Computing Fundamentals Project Workbook
1.2 Hardware1.2.c Know how to connect different peripherals
1.2.c.i Camera1.2.c.ii Audio1.2.c.iii Microphone1.2.c.iv Printer1.2.c.v USB devices1.2.c.vi External display
g.
h.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Connecting Digital Cameras; Connecting Speakers; Connecting Webcams; Connecting Printers; Connecting Generic USB Device; Connecting External Displays
Project File: N/A
Difficulty: Beginner/Immediate
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
21 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Power ManagementDescription: When working with computers it is important to understand how to manage the power usage. By understanding power usage you can save money and it will also help keep your computer working longer.
For this project, you will need to write a paragraph explaining what power management is and which setting you can use to manage the power.
Steps for Completion:1. Write a paragraph about power management in the field below:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Power Management
Project File: N/A
Difficulty: Beginner
Required Materials: N/A
Objectives:1.0 Computer Fundamentals
1.2 Hardware1.2.f Understand power management and power settings
22| Projects IC³ GS5: Computing Fundamentals Project Workbook
Working with Hardware ConfigurationDescription: Technology continues to change and improve when it comes to computers. New features make creating things on a computer easier but sometimes there are some issues.
For this project, you will need to describe the pros and cons of touchscreen, non-touchscreen, and hybrid devices.
Steps for Completion:1. Use the page below to explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Hardware: Touchscreen vs. Non-Touchscreens
Project File: N/A
Difficulty: Beginner /Intermediate
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.2 Hardware1.2.n Understand the pros and cons of touchscreen vs non-touchscreen devices
23 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Wired NetworkDescription: There are several main ways for you to connect to the Internet. It is important to understand the different methods of connectivity, what the differences are, and when each method is used.
Here in this project, you will write a brief description on the difference between cellular, Wi-Fi, and wired networks.
Steps for Completion:1. Describe the difference between cellular, Wi-Fi, and wired networks.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Internet Basics: Cellular, Wi-Fi, and Wired Networks
Project File: N/A
Difficulty: Beginner /Intermediate
Required Materials: N/A
Objectives:1.0 Computer Fundamentals
1.2 Hardware1.2.j Know the difference between cellular, Wi-Fi, and wired networks
24| Projects IC³ GS5: Computing Fundamentals Project Workbook
Define Computing Fundamentals TermsDescription: When developing a foundation in computing we need to have a strong understanding of terms dealing with computing.
For this project, you will define the listed terms.
Steps for Completion:1. Define the terms below:
1.0 Computer Fundamentals1.2 Hardware
1.2.h Know platform implications and considerations1.2.h.i For example Mac, PC, Linux, iOS, Android, Firmware
1.2.k Understand concepts regarding connecting to the internet
1.2.k.i Modem1.2.k.ii Bandwidth, speed1.2.k.iii Have a basic understanding of what a router is
1.2.k.iv Wired1.2.k.v Wireless
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Internet Basics: Modems; Bandwidth; Routers; IP Address
Project File: N/A Difficulty: Beginner/Intermediate
Required Materials: N/A Objectives:
a. Modem:
b. Bandwidth:
c. Router:
d. Ethernet:
e. IP Addresses:
f. Android:
g. Firmware:
25 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Cellular PhonesDescription: Cell phones have become the norm of everyday life. A large majority of people have them and use them on a daily basis if not every few minutes. Most cell phones today also can connect to Wi-Fi or can connect to the Internet using data; these are called smartphones.
For this project, you will need to define what a cell phone is and how they work using towers. Also explain the different carriers and some typical cell phone plans. Then give a brief explanation of what other devices can connect to the Internet using cellular data.
Steps for Completion:1. Define cell phone.2. Explain how cell phones connect.3. Explain the different carriers and cell phone plans.4. Give a brief explanation of other devices that can connect to the Internet using cellular data:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Cellular Phone Basics; Cellular-Enabled Tablets; Smartphones
Project File: N/A
Difficulty: Beginner/Intermediate
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.1 Mobile Devices1.1.a Understand cellular phone concepts1.1.b Be familiar with cellular-enabled tablets
26| Projects IC³ GS5: Computing Fundamentals Project Workbook
Understand SmartphonesDescription: Smartphones are used to do business, play games, surf the Internet, and many other things. Having a basic understanding of what a smartphone is and what they can be used for will make sure you start out on the right track to work with smartphones in the future.
For this project, you will explain what types of apps can be installed on a smartphone. Explain what limitations there are with smartphones, as well as some of the capabilities of a smartphone.
Steps for Completion:1. Answer the following questions in the space provided:
a. Explain the types of apps used on smartphone and the process to install them.
b. Describe the limitations and abilities of smartphones.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training::
Mobile Devices: Cellular Phone Basics; Cellular-Enabled Tablets; Smartphones
Project File: N/A
Difficulty: Beginner
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.1 Mobile Devices1.1.c Be familiar with smartphone
27 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Configure VoicemailDescription: For this project, you will need to know the steps to understand how to configure voicemail on an Apple device and set up a password. Then configure the voicemail on an Android device.
Steps for Completion:1. Configure voicemail on an Apple device:
a. Tap the Phone icon.
b. Tap the voicemail option.
c. Tap Greeting.
d. Customize greeting or leave default message.
e. Tap Settings.
f. Tap Phone.
g. Tap Change Voicemail Password.
2. Configure voicemail on an Android device:a. Tap Voicemail.
b. Tap menu in upper-right corner.
c. Tap Settings.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Voicemail
Project File: N/A
Difficulty: Intermediate
Required Materials: iPhone, Android phone
Objectives:
1.0 Computing Fundamentals1.1 Mobile Devices
1.1.e Know how to configure and use voicemail
28| Projects IC³ GS5: Computing Fundamentals Project Workbook
Using SkypeDescription: There many different online options which have instant messaging features such as Gmail, Yahoo mail, Facebook, and Skype. Having a working knowledge of these options can be beneficial for jobs and social media.
For this project, you will set up a Skype account and then use it to chat with someone.
Steps for Completion:1. Set up a Skype account.2. Chat with someone.3. Take a screen shot of your conversation to share with your teacher.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Instant Messaging
Project File: N/A
Difficulty: Beginner/Intermediate
Required Materials: Computer, mobile device, or tablet with Internet access Objectives:1.0 Computing Fundamentals
1.1 Mobile Devices1.1.f Use of instant messaging
29 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Set Up NotificationsDescription: When using mobile devices it is important to understand how to change and set up the notifications for your device. It could be very embarrassing if your device continues to make noises because your crops are ready to harvest and you are in the middle of a meeting or a class.
In this project, you will use an iOS on an iPhone to set up notifications on the device. You will need to change notification sounds and change how many times your alerts repeat for your messages.
Steps for Completion:1. For an iPhone device:
a. Navigate to your notification menu.
b. Select Messages.
c. Allow notifications.
d. Change notification sound.
e. Allow for it to show on Lock Screen.
f. Change repeat alerts to twice.
2. For an Android device:
a. Navigate to Sound & notifications.
b. Set to allow only priority interruptions.
c. Specify which options are priority.
d. Navigate to the App notifications.
e. Block or set apps as priority.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Mobile Devices: Notifications
Project File: N/A
Difficulty: Intermediate
Required Materials: iPhone, Android phone
Objectives:1.0 Computing Fundamentals
1.1 Mobile Devices1.1.g Know how to configure notifications
30| Projects IC³ GS5: Computing Fundamentals Project Workbook
Defining Operating SystemsDescription: There are a few different kinds of operating systems which are used by different computers and have different usabilities. It is important to know what each one is used for and what devices typically use the operating systems.
For this project, you will describe the differences and similarities between the most common operating systems used for Mac, PC, and Linux.
Steps for Completion:1. Describe the differences and similarities between the most common operating systems used for Mac, PC, and Linux in
the space provided below:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Operating Systems
Project File: N/A
Difficulty: Beginner/Intermediate
Required Materials: Computer, mobile device, or tablet with Internet access Objectives:1.0 Computing Fundamentals
1.2 Hardware1.2.h Know platform implications and considerations
1.2.h.i For example Mac, PC, Linux, iOS, Android, Firmware
31 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Label Page OptionsDescription: You will need to know how to navigate and manage your windows that you have open. As you work you may often have multiple windows open simultaneously. This project will help you know of a few buttons that can help you manage your windows.
In this project, label the image on the following page.
Steps for Completion:1. Label each of the items shown below:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Window Management
Project File: N/A
Difficulty: Beginner
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture 1.3.c Have a general understanding of operating systems and software settings
1.3.c.i Know basic desktop customization
a. b. c.
32| Projects IC³ GS5: Computing Fundamentals Project Workbook
Labeling Menu NavigationDescription: As you are working with software on your computer you will need to be able to make selections to indicate what you want the software to do. This project will help you know the different selection options.
For this project, you will label the images in the following document.
Steps for Completion:1. Label each of the images shown below:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Navigating Menus
Project File: N/A
Difficulty: Beginner
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.h Menu navigation
1.3.h.i Radio buttons1.3.h.ii Check boxes1.3.h.iii Drop-down menus
a. b. c.
33 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Desktop CustomizationDescription: When setting up a computer you will have the ability customize your desktop. You can add pictures for a background change, the screen resolution to help you better see information or to save on power, and modify screen savers.
For this project, you will change the screensaver and have it come on when the computer has been idle for 10 minutes. Then modify the screen resolution to help someone who is partially blind. Use a personal image and set it as your background.
Steps for Completion:1. Change screensaver to have it come on when the computer has been idle for 10 minutes.2. Modify the screen resolution for someone who is partially blind.3. Download an image to your computer.4. Make the picture your desktop background.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Desktop Customization
Project File: N/A
Difficulty:Advanced
Required Materials: Computer with Internet access
Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.c Have a general understanding of operating systems and software settings
1.3.c.i Know basic desktop customization
34| Projects IC³ GS5: Computing Fundamentals Project Workbook
Permissions and Rights ExplainedDescription: Rights and permissions are a vital part of any organization that uses computers and shares files on an internal network. The rights and permissions allow users to access files that they need to use to complete their job but it also restricts the use of some files that may be confidential or that someone does not want edited.
For this project you will explain in more depth why permissions are so valuable in an organization.
Steps for Completion:1. Explain why rights and permissions are so important to an organization:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: User Profiles and Permissions
Project File: N/A
Difficulty: Intermediate/Advanced
Required Materials: N/A Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.j Rights and permissions (administrative rights)
35 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Install and Uninstall SoftwareDescription: Software can be installed on to your computer or other devices using the Internet. A computer can also have software installed using local media such as a disc or flash drive.
For this project you will use the Ninite website to install a media feature such as iTunes or QuickTime, a utilities feature such as Glary or CDBurnerXP, and a security feature such as Essentials or Avast. If available use a flash drive or disc to install another software program. Since you do not really need all of these software programs you will then go in and uninstall the utility and security features that you installed.
Steps for Completion:1. Go to ninite.com.2. Download a utility, media, and security feature.3. Download another software program flash drive or disc.4. Uninstall the utility and security features.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Software Architecture: Install, Uninstall, and Update Software
Project File: N/A
Difficulty: Intermediate/Advanced
Required Materials: Computer with Internet access, Flash drive or disc with another software program
Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.l Know how to install, uninstall, update, repair software
1.3.l.i From the Internet1.3.l.ii Using local media (DVD-ROM, etc.)
36| Projects IC³ GS5: Computing Fundamentals Project Workbook
File TypesDescription: When working with computers you will be dealing constantly with different file types to open up documents in different software applications. Knowing which file types are compatible with various software applications is very important.
For this project you will use the following document to define the different file types and explain which file types are compatible with which software applications.
Steps for Completion:1. Define the terms below:
a. .doc/.docx:
b. .txt:
c. .xls/.xlsx:
d. .exe:
e. .swf:
f. .pdf:
g. .wav:
h. .zip:
i. .jpg:
j. .tif:
37 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: Understanding File Extensions
Project File: N/A Difficulty: Intermediate/Advanced
Required Materials: N/A Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.f Know file structures and file/folder management
1.3.f.iii File extensions
k. .mp3:
l. .mp4:
m. .avi:
38| Projects IC³ GS5: Computing Fundamentals Project Workbook
Files Sharing and PermissionsDescription: There are some great features that come with different file types. Files can be given permissions which can set documents to Read-only. Files can also be shared so that others can view them or even work in them.
For this project you will set a file’s properties to Read-only and then share the same file with specific people. Set one person with Read/Write privileges and leave the others as Read-only.
Steps for Completion:1. Open the properties of a file and set to Read-only.2. Share the file with specific people.3. Set one person with Read/Write privileges.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: File Permissions and Sharing
Project File: N/A
Difficulty: Intermediate/Advanced
Required Materials: Computer
Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.f Know file structures and file/folder management
1.3.f.ii File permissions
39 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Files Scanned and SentDescription: When working with documents there will be occasions when you will have a hard copy and you need to make an electronic copy and send it to someone via email. Oftentimes this document is too big to send regularly and so you will need to zip the file so that it compresses the information so that it is then a manageable size to send via email.
For this project you will scan a 10-page document and save it on your desktop. You will zip that file in a folder. Then email that folder to someone.
Steps for Completion:1. Scan and save document.2. Zip document in a folder.3. Email zipped file to someone.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: File Permissions and Sharing
Project File: N/A
Difficulty: Intermediate
Required Materials: Computer, scanner, hard copy of a document
Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.f Know file structures and file/folder management
1.3.f.ii File permissions
40| Projects IC³ GS5: Computing Fundamentals Project Workbook
Folder Rename and FindDescription: As you continue to use your computer you will save more and more documents, you will have a lot of files and folders. Sometimes you will need to rearrange the files or folders and to manage your information you may need to rename folders. Also, you may need to quickly find a file and you do not want scroll through all the files.
For this project you will need to create a folder on your desktop and add documents to the folder. Then you will need to rename the folder to Computing Fundamentals. Write a brief explanation of how to find a file without scrolling to find it.
Steps for Completion:1. Create a new folder on the desktop.2. Add files to the folder.3. Rename the folder.4. Write a brief explanation for finding files.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: Moving and Renaming Files; Finding Files
Project File: N/A
Difficulty: Intermediate
Required Materials: Computer
Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.f Know file structures and file/folder management
1.3.f.i Moving/renaming files1.3.i Search for files
41 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Manage Electronic MediaDescription: There are several different ways to manage electronic media. Understanding how to manage eBooks, music, and video is very important so that you can access the information.
For this project you will need to explain which software programs you use to manage your electronic data.
Steps for Completion:1. Describe the software programs you use to manage your electronic data:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
File and Software Management: Electronic Media
Project File: N/A
Difficulty: Intermediate
Required Materials: Computer
Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.f Know file structures and file/folder management
1.3.f.iv Manage electronic media [eBooks, songs, video]
42| Projects IC³ GS5: Computing Fundamentals Project Workbook
Troubleshooting IssuesDescription: The joy of technology is that there will always be problems. To know how to troubleshoot these problems will save you a lot of time and heartache.
For this project you will use the following document to look over different computer issues and explain methods used to troubleshoot these issues.
Steps for Completion:1. Answer the questions below in the spaces provided:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Troubleshooting Basics: Basic Problem Solving
Project File: N/A
Difficulty: Beginner/Intermediate
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.3 Computer Software Architecture1.3.m Troubleshooting
1.3.m.i Know basic problem solving techniques
a. What steps should be taken when media will not play?
b. What steps should be taken when an error message appears?
c. What steps should be taken when a computer freezes?
43 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Cloud Concepts and BenefitsDescription: The first step in using cloud storage is to know what it is and its related concepts.
For this project, you will define a list of cloud storage and access features and list a few benefits of sharing, collaborating, and using cloud storage.
Steps for Completion:1. Answer the questions below in the spaces provided:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Cloud Basics and Benefits
Project File: N/A
Difficulty: Beginner
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.6 Cloud Computing1.6a Understand “cloud” concepts
1.6a.i Understand cloud storage vs. cloud access concepts1.6a.ii Understand sharing and collaboration via the cloud
1.6b Know the benefits of using cloud storage
a. Define cloud storage and cloud access.
b. List at least one benefit each for sharing, collaborating, and using cloud storage.
44| Projects IC³ GS5: Computing Fundamentals Project Workbook
Troubleshooting IssuesDescription: When dealing with web and local apps, it helps to understand Software as a Service. In addition, when you use a cloud as a student, you will no doubt use a Learning Management System.
For this project, you will define SaaS and LMS.
Steps for Completion:1. Answer the questions below in the spaces provided:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Web Apps vs. Local Apps
Project File: N/A
Difficulty: Beginner
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.6 Cloud Computing1.6d Web apps vs. local apps
1.6d.i Understand Software as a Service (SaaS) concepts1.6d.ii Know what Learning Management Systems (LMS) do
a. Define Saas.
b. Define LMS.
45 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Online Storage AppsDescription: In most work environments, you are going to deal with an online storage app. Whether it is Google Drive or Dropbox, OneDrive or iCloud, chances are you will need to know how to upload, download, and sync content using online storage apps.
For this project, you will use Google Drive to upload content and download content from the cloud.
Steps for Completion:1. Open Google Drive and upload a local document to it. You can do this by directly dragging a document from your desktop or local documents folder to Google Drive.
2. Right-click a document on Google Drive and download it to your local desktop.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Using the Cloud; Online Storage Apps
Project File: N/A
Difficulty: Beginner/Intermediate
Required Materials: Computer
Objectives:1.0 Computing Fundamentals
1.6 Cloud Computing1.6c Access and utilization of the cloud
1.6c.i Understand account management on the cloud1.6c.ii Know how to upload content to the cloud1.6c.iii Know how to download content from the cloud1.6c.iv Know how to sync files between devices using the cloud
1.6e Understand Web app types1.6e.i Online storage apps [Google Drive, Dropbox, OneDrive, iCloud storage]
46 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Online Office and Database CRM AppsDescription: The more you know about apps, the better off you will be in a work environment. Common apps you will often deal with are online office and database-driven Customer Relationship Management (CRM) apps.
For this project, you will use Google Docs to create a new document and navigate to three prominent CRM apps.
Steps for Completion:1. Open Google Drive and create a new document using Google Docs.2. Navigate to the Salesforce, Oracle, and Workfront CRM apps.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Cloud Computing: Using the Cloud; Online Storage Apps
Project File: N/A
Difficulty: Intermediate
Required Materials: N/A
Objectives:1.0 Computing Fundamentals
1.6 Cloud Computing1.6e Understand Web app types
1.6e.ii Online office apps [Google apps, Office 365]1.6e.iii Database Driven CRM apps [Salesforce, Oracle, Workfront]
47 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Create an AccountDescription: You are going to have to create many accounts when dealing with computers and the Internet using usernames and passwords.
For this project you will create an email account using a unique username and password.
Steps for Completion:1. Go to Google, Yahoo, or any other email website and create an account using a unique username and password.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Security: Usernames and Passwords; Basic Account Settings
Project File: N/A
Difficulty: Intermediate
Required Materials: Microsoft Access
Objectives:1.0 Computing Fundamentals
1.7 Security1.7a Know credential management best practices
1.7a.i Usernames 1.7a.ii Passwords
1.7a.ii.1 Understand the components of a good password1.7b Know basic account setting management
48 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Define Malicious Programs and AttacksDescription: Knowing when you have a malicious program on your computer and how attackers can utilize them will help you protect yourself and your computer.
For this project you will define different terms regarding malicious programs and attack methods.
Steps for Completion:1. Define each term below:
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Security: Viruses; Types of Virus
Project File: N/A
Difficulty: Beginner /Intermediate
Required Materials: N/A Objectives:1.0 Computing Fundamentals
1.7 Security1.7c Know the basic threats to security of computers, data, and identity
1.7c.i Viruses 1.7c.ii Trojans1.7c.iii Malware1.7c.iv Social engineering
1.7d Understand the implications of monitoring software (surveillance)
a. Virus:
b. Malware:
c. Monitoring Software:
d. Trojan Horses:
e. Social Engineering:
49 | Projects IC³ GS5: Computing Fundamentals Project Workbook
Windows Defender and FirewallDescription: It is vital to know how to protect your computer. Luckily, Windows 8 comes pre-installed with antivirus software and a built-in firewall.
For this project you will navigate to the Windows Defender app and perform a scan of your local computer. After that, you will go to the Windows Firewall and deny access to an application.
Steps for Completion:1. Navigate to the Windows Defender App.
a. Perform a quick scan of your computer.
2. Navigate to the Windows Firewall.a. Allow or deny a program through the Windows Firewall.
Reference:LearnKey’s IC3 GS5: Computing Fundamentals Training:
Security: Antivirus and Firewalls
Project File: N/A
Difficulty: Beginner/Intermediate
Required Materials: A computer with a Windows operating system
Objectives:1.0 Computing Fundamentals
1.7 Security1.7f Know the use of and importance of antivirus software
1.7f.i Understand how to prevent virus issues 1.7f.ii Understand how to maintain and update antivirus software
1.7g Know the use of firewalls and basic settings
50 | Projects IC³ GS5: Computing Fundamentals Project Workbook
51 | Projects IC³ GS5: Computing Fundamentals Project Workbook
IC3 GS5: Computing Fundamentals Master ProjectDescription: When working with a computer, understanding the basics of how it all works together will be important as you continue to do more and more advanced things. For this Master Project of Computing Fundamentals you will set up a computer with several different peripherals. You will customize your workspace so that it fits you. Then you will need to work within the computer to set up folders and file permissions, browse the Internet and install applications, ensure that your computer is safe from malicious attacks, and do some online shopping using eCommerce best practices.
Being able to set up your own computer can help you resolve issues in the future and make it so you don’t have to rely on others when it comes to basic computer problems. As you set up your computer you will learn how to connect to the Internet both with a wired option and through wireless routers. Again this will help you understand basic wired and wireless options and allow you to fix and set up Internet connections on your own.
Once your computer is all set up you can work on your computer. But, you will first need to know the memory of your computer, because if you don’t know what your computer is capable of, you may try to do something your computer is not able to do. This will include attaching your keyboard, mouse, and monitors together and connecting the computer to the router and printer.
Now that you understand your computer it is time to get you set up as a user on the computer. You will need to get a username and password put together and then make sure your desktop is configured in a way that you like how it works. As you work with various devices with your computer you will need to make sure that all the devices are compatible with your computer so that you don’t end up crashing the computer or losing information. You will need to download the information onto your computer from the different devices and as you do this you will need to set up a folder structure and name your files in such a way that the information is easy to find.
There are a number of ways for you to manage online information such as music, eBooks, and videos. Knowing the different online options or software downloads that can manage this information will help you keep all of your media and books organized and easily accessible.
Keeping your computer safe from online attacks should be one of your first priorities. You will need to download an antivirus software and then run it to make sure the computer is safe. Another method of keeping your information safe is by backing it up using a flash drive or external hard drive. You can also back up your files to an online cloud storage option.
Working with technology makes communicating easy. As you work you will frequently need to communicate using email. Email not only allows you to send a letter easily but you can also add attachments to the email.
Finally, as you use the Internet you will often need to make purchases online. Being familiar with eCommerce best practices will keep you from purchasing things that are not what they claim to be and from identify theft.
Steps for Completion:Computer Set Up
1. Set up a computer with a monitor, keyboard, mouse, printer, and router.
a. Ensure that the computer can connect to the Internet, both wired and wireless.
2. Determine the RAM of your computer and which OS is being used.
3. Set up desktop with username and password.
4. Set up other drivers for peripherals, such as cameras, smartphones, tablets, and audio and video.
5. Customize the desktop by setting up a screensaver, set screen resolution, and screen background.
Folders, Files, and Media Management6. Set up a folder structure.
a. Give file permissions.
b. Save documents using different file extensions.
7. Download iTunes or Google Play to manage eBooks, music, and video.
Install and Safety
52 | Projects IC³ GS5: Computing Fundamentals Project Workbook
8. Open a web browser and search for a program you would like to install on the computer.
9. Download an antivirus software and run it.
10. Back up your files on a flash drive or external hard drive.
Working Online11. Create an email account.
12. Send an email with a file attached.
13. Back up your files to a cloud storage.
14. Navigate on your browser to check history and cookies.
15. Search an online store and make a purchase using eCommerce best practices.
Difficulty: Advanced
Required Materials: Computer with components, peripherals,
53 | Projects IC³ GS5: Computing Fundamentals Project Workbook
54 | Appendix IC³ GS5: Computing Fundamentals Project Workbook
Lesson Topic Subtopic Objectives Activity NotesLesson 1 Session 1 Pre-Assessment
Lesson 2 Hardware Device BasicsMemory and StorageConnecting Digital
CamerasConnecting SpeakersConnecting WebcamsConnecting PrintersConnecting Generic USB
DevicesConnecting External
DisplaysPower ManagementDriversHardware ConfigurationTouchscreens vs. Non-
Touchscreens
1.2 Hardware 1.2.a Types of devices
1.2.a.i Server1.2.a.ii Laptop1.2.a.iii Desktop
1.2.b Know the impact of memory and storage on usage1.2.c Know how to connect different peripherals
1.2.c.i Camera1.2.c.ii Audio1.2.c.iii Microphone1.2.c.iv Printer1.2.c.v USB devices1.2.c.vi External display
1.2.f Understand power management and power settings1.2.g Understand driver concepts as well as their device compatibility
1.2.g.i Know what drivers do1.2.g.ii Know if specific drivers are compatible with a personal device
1.2.l Understand common hardware configurations1.2.m Implications for document usage1.2.n Understand pros and cons of touchscreen vs non-touchscreen devices
Watch Session 1: Hardware [22 minutes]
Fill-in-the-Blanks Session 1: Questions 1-4
Session 1 Lab 1: Adding a Printer
Session 1 Lab 2: Navigate to Power Options
Lesson 3 Hardware See Lesson 2 See Lesson 2 Session 1 Project 1: Define Basic Terms
Session 1 Project 2: Under-standing RAM
Session 1 Project 3: Label Ports
Lesson 4 Hardware See Lesson 2 See Lesson 2 Session 1 Project 4: Label Peripherals
Session 1 Project 5: Power Management
Lesson 5 Hardware See Lesson 2 See Lesson 2 Session 1 Project 5: Working with Hardware Configuration
Review and discuss hardware
Session 1 [Approximately 13.5 hours]
IC3 GS5: Computing Fundamentals Lesson PlanEach lesson plan is approximately 30 minutes and includes video training, fill-in-the-blanks, labs, projects, tests, as well as the course support files to follow along with the expert. There is also a note section for customizable lesson plans and extra notes. By adhering to the lesson plan, it will take approximately four weeks to complete the course. Approximately 13.5 hours of time training with an additional 7-14 hours if the Master Level lesson plans are also completed.
55 | Appendix IC³ GS5: Computing Fundamentals Project Workbook
Lesson Topic Subtopic Objectives Activity NotesLesson 6 Internet Basics Cellular, Wi-Fi, and Wired
NetworksModemsBandwidthRoutersIP AddressWired ConnectionWireless ConnectionConnection Speed
1.2 Hardware 1.2.d Understand the use of Ethernet ports1.2.e Connect a device wireless network [Wi-Fi]1.2.j Know the difference between cellular, Wi-Fi, and wired networks1.2.k Understand concepts regarding connecting to the Internet
1.2.k.i Modem1.2.k.ii Bandwidth, speed1.2.k.iii Have a basic understanding of what a router is1.2.k.iv Wired internet1.2.k.v Wireless internet
1.3.k Define IP address1.3.m Troubleshooting
1.3.m.v Know how to determine a connection speed1.3.m.iv Know how to find an IP address on a personal computer
Watch Session 1: Internet Basics [11 minutes]
Fill-in-the-Blanks Session 1: Questions 5-8
Session 1 Lab 3: Connect to a Network
Session 1 Lab 4: See Connec-tion Speed
Session 1 Project 6: Wired Network
Lesson 7 Internet Basics See Lesson 6 See Lesson 6 Session 1 Project 7: Define Computing Fundamental Terms
Discuss Internet basics
Lesson 8 Mobile Devices Cellular Phone BasicsCellular-Enabled TabletsSmartphonesHardwired PhonesVoicemailInstant MessagingNotifications
1.1 Mobile Devices1.1.a Understand cellular phone concepts1.1.b Be familiar with cellular-enabled tablets1.1.c Be familiar with smartphone1.1.d Understand the use of hardwired phones1.1.e Know how to configure and use voicemail1.1.f Use of instant messaging1.1.g Know how to configure notifications
1.2 Hardware1.2.h Know platform implications and considerations
1.2.h.iv iOS1.2.h.v Android
Watch Session 1: Mobile Devices [20 minutes]
Fill-in-the-Blanks Session 1: Questions 9-12
Session 1 Lab 5: Voicemail Greeting for Apple
Session 1 Project 6: Wired Network
Lesson 9 Mobile Devices See Lesson 8 See Lesson 8 Session 1 Project 7: Define Computing Fundamentals Terms
Session 1 Project 8: Cellular Phones
Lesson 10 Mobile Devices See Lesson 8 See Lesson 8 Session 1 Project 9: Understand Smartphones
Session 1 Project 10: Configure Voicemail
56 | Appendix IC³ GS5: Computing Fundamentals Project Workbook
Lesson Topic Subtopic Objectives Activity NotesLesson 11 Mobile Devices See Lesson 8 See Lesson 8 Session 1 Project 11: Using
Skype
Session 1 Project 12: Set Up Notifications
Lesson 12 Software Archi-tecture
Operating SystemsWindow ManagementNavigating MenusSoftware PreferencesDesktop Customization
1.3 Computer Software Architecture1.3.a Understand operating system versioning and update awareness1.3.b Know concepts surrounding applications vs. operating system vs. global settings1.3.c Have a general understanding of operating systems and software settings
1.3.c.i Know basic desktop customization1.3.c.ii Know window management
1.3.c.ii.1 Minimize windows1.3.c.ii.2 Maximize windows1.3.c.ii.3 Resizing windows
1.3.d Set software preferences1.3.h Menu navigation
1.3.h.i Radio buttons1.3.h.ii Checkboxes1.3.h.iii Drop-down menus1.3.h.iv Multi-select
1.3.l Know how to install, uninstall, update, and repair software1.3.l.i From the internet1.3.l.ii Using local media1.3.l.iii. DVD-ROM, etc
1.2 Hardware1.2.h Know platform implications and considerations
1.2.h.i Mac1.2.h.ii PC1.2.h.iii Linux1.2.h.vi Firmware
Watch Session 1: Software Architecture: Operating Sys-tems- Desktop Customization [24 minutes]
Fill-in-the-Blanks Session 1: Questions 13-15
Session 1 Lab 6: Chrome Settings
Session 1 Lab 7: Navigate to Personalization
Session 1 Lab 8: Custom Screen Saver
Lesson 13 Software Architecture (Continued)
User Profiles and Permis-sions
Install, Uninstall, and Update Software
1.3 Computer Software Architecture1.3.e Users and profiles1.3.j Rights and permissions
Watch Session 1: User Profiles and Permissions- Install, Unin-stall, and Update Software [13 minutes]
Fill-in-the-Blanks Session 1: Question 16
Session 1 Lab 9: Uninstall Dropbox
Disucss software
Lesson 14 Software Archi-tecture
See Lessons 12 and 13 See Lessons 12 and 13 Session 1 Project 13: Defining Operating Systems
Session 1 Project 14: Label Page Options
Session 1 Project 15: Labeling Menu Navigation
57 | Appendix IC³ GS5: Computing Fundamentals Project Workbook
Lesson Topic Subtopic Objectives Activity NotesLesson 15 Software Archi-
tectureSee Lessons 12 and 13 See Lessons 12 and 13 Session 1 Project 16: Desktop
Customization
Session 1 Project 17: Permis-sions and Rights Explained
Lesson 16 Software Archi-tecture
See Lessons 12 and 13 See Lessons 12 and 13 Session 1 Project 18: Install and Uninstall Software
Lesson 17 File and Soft-ware Manage-ment
Understanding File Exten-tions
File Permissions and Sharing
Attach, Zip, and Send Via Email
Moving and Renaming Files
Finding FilesElectronic MediaDocument Scanning
1.3 Computer Software Architecture1.3.f Know file structures and file/folder management
1.3.f.i Moving/renaming files1.3.f.ii File permissions1.3.f.iii File extensions
1.3.f.iii.1 .doc/.docx1.3.f.iii.2 .txt1.3.f.iii.3 .xls/.xlsx1.3.f.iii.4 .exe 1.3.f.iii.5 .swf1.3.f.iii.6 .pdf1.3.f.iii.7 .wav1.3.f.iii.8 .zip1.3.f.iii.9 .jpg1.3.f.iii.10 .tif1.3.f.iii.11 .mp31.3.f.iii.12 .mp41.3.f.iii.13 .avi
1.3.f.iv Managing electronic media1.3.f.iv.1 eBooks1.3.f.iv.2 Songs1.3.f.iv.3 Videos
1.3.g Document Management1.3.g.i Scanning documents1.3.g.ii Taking pictures
1.3.i Searching for files1.5 File Sharing
1.5.a Understand file transfer options and characteristics
1.5.a.i Know how to attach files to email1.5.a.iii Understand the difference between publicly shared vs. shared links vs. shared folders
1.5.b Understand needs for file compression/zipping in sharing
Watch Session 1: File and Software Management [22 minutes]
Fill-in-the-Blanks Session 1: Questions 17-19
Session 1 Lab 10: Enable File Permissions
Lesson 18 File and Soft-ware Manage-ment
See Lessons 17 See Lessons 17 Session 1 Project 19: File Types
Session 1 Project 20: Files Sharing and Permissions
Lesson 19 File and Soft-ware Manage-ment
See Lessons 17 See Lessons 17 Session 1 Project 21: Files Scanned and Sent
Session 1 Project 22: Folder Rename and Find
Session 1 Project 23: Manage Electronic Media
58 | Appendix IC³ GS5: Computing Fundamentals Project Workbook
Lesson Topic Subtopic Objectives Activity NotesLesson 20 Troubleshooting
BasicsBasic Problem SolvingTroubleshooting Terminol-
ogyPlatform CompatibilityMedia CompatibilityBackup and RestoreRestore Personal Device
1.2 Hardware1.2.i Know platform compatibility
1.2.i.i Media compatibility issues1.2.i.i.1 Why won’t my video play?
1.3 Computer Software Architecture1.3.m Troubleshooting
1.3.m.i Know basic problem solving techniques1.3.m.ii Know how to determine problems involving hardware vs. software 1.3.m.iii Know proper terminology to be able to describe the problem
1.4 Backup and Restore1.4.a Understand backing up concepts1.4.b Know how to back up and restore1.4.c Know how to complete a full system restore on a personal device
Watch Session 1: Troubleshoot-ing Basics [14 minutes]
Fill-in-the-Blanks Session 1: Questions 20-22
Session 1 Lab 11: Perform a Backup and Restore
Session 1 Project 24: Trouble-shooting Issues
Lesson 21 Cloud Comput-ing
Cloud Basics and BenefitsUsing the CloudWeb Apps vs. Local AppsOnline Storage AppsOnline Office AppsDatabase-Driven CRM
Apps
1.6 Cloud Computing 1.6.a Understand cloud concepts
1.6.a.i Understand cloud storage vs. cloud access concepts1.6.a.ii Understand sharing and collaboration via the cloud
1.6.b Know the benefits of using cloud storage1.6.c Access and utilization of the cloud
1.6.c.i Understand account management on the cloud1.6.d Web apps vs. local apps
1.6.d.i Understand software as a Service (SAAS) concepts1.6.d.ii Know what Learning Management Systems (LMS) do
1.6.e Understand web app types1.6.e.i Online storage apps
1.6.e.i.1 Google Drive1.6.e.i.2 Dropbox1.6.e.i.3 OneDrive1.6.e.i.4 iCloud storage
1.6.e.ii Online office apps1.6.e.ii.1 Google apps1.6.e.ii.2 Office 365
1.6.e.iii Database Driven CRM apps1.6.e.iii.1 Salesforce1.6.e.iii.2 Oracle1.6.e.iii.3 Workfront (formerly Attask)
1.6.c Access and utilization of the cloud1.6.c.i Understand account management on the cloud1.6.c.ii Know how to upload content to the cloud1.6.c.iii Know how to download content from the cloud1.6.c.iv Know how to sync files between devices using the cloud
Watch Session 1: Cloud Com-puting [18 minutes]
Fill-in-the-Blanks Session 1: Questions 23-26
Session 1 Project 25: Cloud Concepts and Benefits
Lesson 22 Cloud Comput-ing
See Lesson 21 See Lesson 21 Session 1 Project 26: Trouble-shooting Issues
Session 1 Project 27: Online Storage Apps
Session 1 Project 28: Online Office and Database CRM Apps
59 | Appendix IC³ GS5: Computing Fundamentals Project Workbook
Lesson Topic Subtopic Objectives Activity NotesLesson 23 Cloud Comput-
ingSee Lesson 21 See Lesson 21 Session 1 Project 29: Create an
Account
Lesson 24 Security Usernames and PasswordsBasic Account SettingsVirusesTypes of VirusAntivirus and FirewallsSecured vs. Unsecured NetworksVirtual Private NetworkseCommerce
1.7 Security1.7.a Known credential management best practices
1.7.a.i Usernames1.7.a.ii Passwords
1.7.a.ii.1 Understand the components of a good password
1.7.b Know basic account setting management1.7.c Know the basic threats to security of computers, data, and identity
1.7.c.i Viruses1.7.c.ii Trojans1.7.c.iii Malware1.7.c.iv Social engineering
1.7.d Understand the implications of monitoring software (surveillance)1.7.e Connecting to secured vs. unsecured network (wired and wireless)
1.7.e.i Know the ramifications1.7.e.ii Understand the risks1.7.e.iii Know the difference between public vs. private computing (using a public computer)
1.7.e.iii.1 Browser histories1.7.e.iii.2 Cache/cookies1.7.e.iii.3 Logging out of online and OS accounts
1.7.f Know the use of and importance of antivirus software
1.7.f.i Understand how to prevent virus issues1.7.f.ii Understand how to maintain and update antivirus software
1.7.g Know the use of firewalls and basic settings1.7.e.iii.2 Cache/cookies
1.7.h Know eCommerce interactions and best practices1.7.h.i Recognize the use of a secure connection, networks, [https:]1.7.h.ii Know how to be a savvy ecommerce consumer
Watch Session 1: Security [14 minutes]
Fill-in-the-Blanks Session 1: Questions 27-30
Session 1 Project 30: Define Malicious Programs and At-tacks
Lesson 25 Security See Lesson 24 Session 1 Project 31: Windows Defender and Firewall
Review and discuss security
60 | Appendix IC³ GS5: Computing Fundamentals Project Workbook
Lesson Topic Subtopic Objectives Activity NotesLesson 26 Review and discuss IC3 GS5:
Computing Fundamentals
Lesson 27 Review and discuss IC3 GS5: Computing Fundamentals Post Assessment
Session 1 Notes
61 | Appendix IC³ GS5: Computing Fundamentals Project Workbook
Lesson Topic Subtopic Objectives Activity NotesLesson 1 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-
mentals Master Project
Lesson 2 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-mentals Master Project
Lesson 3 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-mentals Master Project
Lesson 4 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-mentals Master Project
Lesson 5 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-mentals Master Exam
Lesson 6 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-mentals Master Exam
Lesson 7 Entire Course Entire Course All Objectives IC3 GS5: Computing Funda-mentals Master Exam
Master Level Lesson Plan [Approximately 7-14 hours]
62 | Appendix IC³ GS5: Computing Fundamentals Project Workbook
HardwareDevice BasicsMemory and StorageConnecting Digital CamerasConnecting SpeakersConnecting WebcamsConnecting PrintersConnecting Generic USB DevicesConnecting External DisplaysPower ManagementDriversHardware ConfigurationTouchscreens vs. Non-Touchscreens
Internet BasicsCellular, Wi-Fi, and Wired NetworksModemsBandwidthRoutersIP AddressWired ConnectionWireless ConnectionConnection Speed
Mobile DevicesCelluar Phone BasicsCellular-Enabled TabletsSmartphonesHardwired PhonesVoicemailInstant MessagingNotifications
Software ArchitectureOperating SystemsWindow ManagementNavigating MenusSoftware PreferencesDesktop CustomizationUser Profiles and PermissionsInstall, Uninstall, and Update Software
FIle and Software ManagementUnderstanding File ExtentionsFile Permissions and SharingAttach, Zip, and Send Via Email
Moving and Renaming FilesFinding FilesElectronic MediaDocument Scanning
Troubleshooting BasicsBasic Problem SolvingTroubleshooting TerminologyPlatform CompatibilityMedia CompatibilityBackup and RestoreRestore Personal Device
Cloud ComputingCloud Basics and BenefitsUsing the CloudWeb Apps vs. Local AppsOnline Storage AppsOnline Office AppsDatabase-Driven CRM Apps
SecurityUsernames and PasswordsBasic Account Settings VirusesTypes of Virus Antivirus and FirewallsSecured vs. Unsecured NetworksVirtual Private NetworkseCommerce
IC3 GS5: Computing Fundamentals Outline