Objectives for Instructional Materials Alignment

28
Objectives for Instructional Materials Alignment IC3 Global Standard 5 (GS5) This document, and all information contained herein, is the sole property of Certiport. Certiport prohibits the unauthorized use of information contained herein to or by any person, except as permitted by Certiport. Revised 9/2015

Transcript of Objectives for Instructional Materials Alignment

Objectives for

Instructional Materials

Alignment

IC3 Global Standard 5 (GS5)

This document, and all information contained herein, is the sole property of Certiport. Certiport prohibits the unauthorized use of

information contained herein to or by any person, except as permitted by Certiport.

Revised 9/2015

© Certiport Inc., 2015 CONFIDENTIAL Page 2 of 28

IMPORTANT NOTICES:

The purpose of this document is to provide Certiport’s Instructional Material Partners an overview of the IC3 exam structure and an inside perspective of the exam’s standards. This material is to be regarded as CONFIDENTIAL and to be used only by parties Certiport has so authorized by notice in writing. By receiving and accepting this document, you and your organization are agreeing to the terms of Certiport’s Non-Disclosure Agreement.

Only instructional materials specifically created to align to the IC3 standards and

objectives will be accepted for review and potential authorization.

All instructional materials must be 100 percent aligned to the IC3 standards and

performance-based activities as contained herein.

Internet and Computing Core Certification The Internet and Computing Core (IC3) credential provides an in-depth and dynamic standard

and testing program on which to develop educational programs for broad-based Internet and

computing skills. The purpose of the certification is to provide students and job seekers with the

educational/training foundation to succeed not only in technical careers, but also in any field or

job position requiring the use of computers. IC3 Certification Development Objectives

IC3 is built around three critical objectives. As one understands these objectives, the design of

the exams becomes clearer, and teachers and students are better able to develop classes and

study around the IC3 curriculum.

• IC3 is built on a framework of current thinking and practice in technology education and training.

• IC3 adheres to basic standards for test development and validation used in the

certification industry.

• IC3 stays up to date with new technology and will continue to keep its testing objectives and methodologies relevant to the latest technological trends.

Some of the developmental processes for IC3 include:

• A review of existing standards—including the latest ISTE standards and detailed comparison and evaluation of other existing digital literacy standards from the United States and international organizations.

© Certiport Inc., 2015 CONFIDENTIAL Page 3 of 28

• A review group of subject matter experts (SMEs) to provide input on all of the elements of the IC3 standard, including the updated IC3 Global Standard Five (GS5) exam blueprints. This review group consisted of experienced educators, technical and workforce specialists from industry and academia.

IC3 Exam Structure

The IC3 program is structured around three individual examinations:

• Computing Fundamentals • Key Applications • Living Online

Candidates will earn their certification when they have completed the three examinations

successfully. Whenever appropriate, testing an examinee’s ability to use specific product

functions (such as operating system file and system management functions) is administered with

performance-based test items, providing examinees with an interactive simulation of the

software product and requiring them to perform the functions exactly as they would with the

real product. IC3 uses up-to-date versions of the most commonly used applications. Testing of

other types of skills and knowledge (such as knowledge of hardware and software) is

administered with traditional selected response items (multiple-choice, multiple-response,

matching, etc.). Each of the three exams will contain approximately 45 test items. Exams will

be administered on-line in real time and will be timed to last 50 minutes.

Document Use

This document reflects the work of the Global Digital Literacy Council to update the IC3

Digital Literacy Certification for the 2015–16 school year. Technology is now as important as

language and math in our global society. IC3 defines the digital skills an individual needs to be

career and college ready.

Because technology is constantly changing, the Global Digital Literacy council is reconvened

every few years to ensure that the objective domains of the IC3 Digital Literacy Certification

continue to match the expectations of employers and educators.

The 2014 convening of the Global Digital Literacy Certification included the following experts

from around the world:

Claudia Limon, Concius, Mexico

Duong Duc Lan, General Department of Vocational Training, Viet Nam

Ekechukwu V. Onyemachi, National Universities Commission, Nigeria

Gideon Burton, Brigham Young University, USA

© Certiport Inc., 2015 CONFIDENTIAL Page 4 of 28

Hans Blankendaal, ECABO, Netherlands

Holly Kershaw, Fizzics Education, Australia

Jay Hargis, 24Seven, Inc., USA

John Kimotho, Kenya Institute of Curriculum Development, Kenya

Julie Coiro, University of Rhode Island, USA

Leslie Lott, University of Great Falls/ISTE, USA

Lucia Acurio, Grupo Edutec, Peru

Mark Braund, InterQuest Group, UK

Mike Christopher, Otoy/SkillsUSA, USA

Peter Jack, Consultant to Government on Multi-Stakeholder Partnerships (MSPs),

Entrepreneurship, Information Technology, Job creation and Poverty Alleviation, Nigeria

Qingmeng Cheng, Informatization Teaching Guidance Committee in Vocational Colleges of the

Ministry of Education, China

Renee Hobbs, University of Rhode Island, USA

Shelly Funderberg, Right Management, USA

Stephanie Chan, Calgary Board of Education, Canada

Tetteh Nettey, Marshalls University, Ghana

Wail Omar, BNR Education, Iraq

Xiaozhou Yan, China Railway Publishing House, China

Yonty Friesem, University of Rhode Island, USA

The following outline represents the current (as of September 15, 2014) draft of the IC3 Global

Standard Five Objective Domains. This is expected to be completed by the September 30th and

exams will be constructed based this standard and available in English in the first quarter of

2015. Localization of exams will commence from there and be prioritized based on demand.

Computing Fundamentals Examination

The Computing Fundamentals examination covers subjects needed for a foundational understanding of computing, including knowledge and use of computer hardware, software, and operating systems.

© Certiport Inc., 2015 CONFIDENTIAL Page 5 of 28

The audience profile for the Certiport GS5 Computing Fundamentals Exam is a basic

technology user (student, instructor, office worker, home user, etc.) who needs to operate

computers or computing devices at the feature and functionality level.

The user should be able to solve basic digital literacy problems, use basic productivity

applications, and understand the structure of common technologies. The user should also be

able to apply existing knowledge to deal with unfamiliar situations and scenarios.

The Certiport GS5 Computing Fundamentals Examinee should be able to navigate computers

and software at the feature and functionality level, including:

• Common operating systems such as Microsoft Windows, Mac OS X, Linux, Android,

iOS, etc.

• Office applications (Microsoft Office, OpenOffice, LibreOffice, Office 365, Google

Docs, iWork, etc.) and standard computer productivity applications such as word

processing, spreadsheet, presentation, multi-media, and file and data management

• Standard Web browser applications, including Microsoft Internet Explorer, Mozilla

Firefox, Safari, Chrome, Opera, etc.

• Standard communication applications such as e-mail, instant messaging, and online

tools

• General computer knowledge, including basic hardware, software, networking and

troubleshooting

Examinees would include people from a wide variety of job roles from almost all areas of

beginning professional, student, and personal life. Some of the user roles include, but are not

limited to the following:

• Students

• Data entry workers

• Educators

• Instructors/Trainers

• Prospective IT/Tech support workers

• Professionals who are seeking computer skills (job re-training)

• Business and administrative professionals

• Public service workers

• Other members of the general population seeking certification

To pass this examination, the examinee must demonstrate knowledge in the following areas:

• Computer hardware, peripherals and troubleshooting

• Computer software

• Use of a computer operating system to perform everyday tasks (installing software, managing files, changing system settings, etc.)

© Certiport Inc., 2015 CONFIDENTIAL Page 6 of 28

For purposes of this examination, questions on computer hardware and software will cover a

range of computer types and software systems. Performance-based questions on operating

systems will be based on a specific operating system such as Microsoft Windows or the

Macintosh OS.

The Computing Fundamentals module covers seven domains of knowledge and skill:

Domain 1.0—Mobile Devices

Domain 2.0—Hardware Devices Domain 3.0—Computer Software Architecture

Domain 4.0—Backup and Restore

Domain 5.0—File Sharing

Domain 6.0—Cloud Computing

Domain 7.0—Security These domains are further broken down into objectives and skill sets as outlined in the detailed curriculum which follows.

© Certiport Inc., 2015 CONFIDENTIAL Page 7 of 28

IC3—Module 1: Computing Fundamentals—Global

Standard 5

Basic Digital Literacy Training Materials Correlation Verification:

Not a Professional Content Review

Computing Fundamentals – GS5 GS4

1 Mobile Devices

(a) 1.1 Understand cellular phone concepts CF2.2.5

1.1.1 Define what it means to have a cellular phone and what that implies CF2.2.5

1.1.2 Explain how cellular phone connections require a carrier CF2.2.5

1.1.3 Describe how cell towers provide the connection, as opposed to an ISP infrastructure

CF2.2.5

1.1.4 Describe carriers plans, contracts associated with plans, and how these contracts can vary widely

CF2.2.5

(b) 1.2 Be familiar with cellular-enabled tablets CF2.2.4

1.2.1 Explain what a tablet can and cannot do CF2.2.4

1.2.2 Tablets can be Wi-Fi connected or cellular-enabled

1.2.3 A Wi-Fi connection has no limit on usage, but is limited to a location with the Wi-Fi connection

1.2.4 Use of tablets that are cellular-enabled affect the cellular data plan; for example, one would not want to stream movies on a cellular connection because it could quickly use up allotted number of gigabytes of data purchased

(c) 1.3 Be familiar with smart phone CF2.2.5

1.3.1 Apps can be downloaded to a smartphone CF2.2.5

1.3.2 Abilities and limitations of a smartphone CF2.2.5

1.3.3 How a smartphone connects to the Internet CF2.2.5

1.3.4 What are the benefits that apps and the operating system provide to the user

CF2.2.5

1.3.5 A basic phone can be Internet enabled but has limited functionality CF2.2.5

(d) 1.4 Understand the use of hard-wired phones

1.4.1 Understand limitations of and capability of a hard-wired phone in a business

1.4.2 On a business phone system, make outgoing calls and transfer a line

1.4.3 Use short codes to get to anyone in the office

1.4.4 Conduct conference calls LO3.2.2

(e) 1.4.5 Know how to configure and use voice mail

1.4.6 Use voice mail in business

1.4.7 Use voice mail on a cellular phone—both business and personal

1.4.9 Elements of a clear and understandable voice mail message

© Certiport Inc., 2015 CONFIDENTIAL Page 8 of 28

Computing Fundamentals – GS5 GS4 (f) 1.5 Use of instant messaging

1.5.1 Differentiate SMS and MMS LO3.2.2

1.5.2 Mechanics of instant messaging—technically what can a user do, basically how is the transfer of the message accomplished

1.5.3 Use the basic features of Skype LO3.2.2

1.5.4 Use the basic features of chat in Gmail LO3.2.1

1.5.5 Mechanics—understand what you are technically able to do, what is SMS, what is MMS

(g) 1.6 Know how to configure notifications

1.6.1 Configure notifications for appointments; for example, if you have work email on your phone, create a notification through sound or vibration or screen alert

1.6.2 Understand the rules around configuring notifications

2 Hardware devices

2.1 Types of Devices: Server, Laptop, Desktop CF2.2.1

2.1.1 For each type of hardware above, describe who would be most likely to use each type of device

CF2.2.6, CF3.2.1

2.2 Know the impact of memory and storage on usage CF2.1

2.2.1 Define memory and storage CF2.1.2

2.2.2 Describe usage of memory and storage; for example, if you have a high amount of memory and storage, you can be freer in your usage. If you have low memory there are restraints such as having multiple tabs open in a browser, or the system is slow when bigger programs like Photoshop

CF2.3.2

2.2.3 One can max out storage, especially if storying photos and videos—can fill up hard drive space

CF2.3.2

2.3 Know how to connect to different peripherals: Camera, Audio, Microphone, USB devices, Printer, External display

CF4.3

2.3.1 Define types of connections; for example, 3.5 mil connections for an audio cable, VGA, HDMI, USB for most other things

LO2.1

2.3.2 Microphone port CF2.1

2.3.3 Printers—wireless as well as USB CF2.1

2.3.4 Cameras or audio can connect through Bluetooth or infrared connections

2.4 Understand the use of Ethernet ports LO2.1.4

2.4.1 Basic definition and use of Ethernet—non-technical

2.4.1 Use of Ethernet for Internet connectivity—when wireless is not available

(h) 2.3 Connect a device wireless network (Wi-Fi)

2.3.1 Connecting a wireless printer

2.3.2 How to get a device onto Wi-Fi

2.3.3 Settings, find secured LO2.1.3

2.3.4 How to enter password or passkey LO3.1.1,

© Certiport Inc., 2015 CONFIDENTIAL Page 9 of 28

Computing Fundamentals – GS5 GS4 LO5.1.1

(i) 2.4 Understand power management and power settings CF1.3.2

2.4.1 How to save battery time when using a laptop CF1.3.3 CF1.3.5

2.4.2 Locate power settings and use them CF1.1.2

2.4.3 Differentiate between sleep and hibernate CF1.1.2, CF1.3.5

(j) 2.5 Understand driver concepts as well as their device compatibility CF1.3

2.5.1 Know what drivers do CF4.3.3

2.5.2 Know if specific drivers are compatible with a personal device CF3.1.1,

CF3.1.2, CF3.1.3

2.5.3 What devices, such as a mouse or keyboard, can work with a personal device like an iPad or smartphone, and how do they connect

2.5.4 Bluetooth pairing of devices

(k) 2.6 Know platform implications and considerations, for example Mac, PC, Linux, iOS, Android, Firmware

CF4.3.1

2.6.1 Define platforms, describe various platforms

2.6.2 Understand lines and distinctions between apps on various platforms

2.6.3 What software works on various platforms—for example, cannot buy Pages for a Windows device, but can buy Word for Mac—but still a different OS

2.6.4 Professional world still using desktop apps, Photoshop

2.6.5 Some apps cannot be on a mobile operating system

2.6.6 Define and describe SaaS applications that are delivered online LO4.2.6

(l) 2.7 Know platform compatibility

2.7.1 Device limitations 2.7.1.1 Media compatibility issues (why won't my video play?) CF4.3.2

2.7.1.2 Device limitations (a device might only have Wi-Fi or only have wired capabilities)

CF4.3.2

(m) 2.8 Know the difference between cellular, Wi-Fi, and wired networks

2.8.1 Define, in general, the difference among these types of networks

2.8.2 Implications of sending large files on cellular or streaming

2.8.3 Wi-Fi limitations by locations, wired networks you cannot move

2.8.4 Difference between an ISP provider and a cellular provider

(n) 2.9 Understand concepts regarding connecting to the internet LO2.1.2

2.9.1 Organizations typically have both wired and wireless connections

2.9.2 For home use, one must purchase bandwidth and speed from an ISP that is non-cellular

2.9.2.1 Modem LO2.1.2

2.9.2.2 Bandwidth, speed LO2.1.2

2.9.2.3 Have a basic understanding of what a router is

2.9.2.4 Wired LO2.1.2

© Certiport Inc., 2015 CONFIDENTIAL Page 10 of 28

Computing Fundamentals – GS5 GS4 2.9.2.5 Wireless LO2.1.2

(o) 2.10 Understand common hardware configurations CF1.3.1

2.10.1 Laptop with multiple monitors, docking stations, CPU with a video card or some laptops have integrated video

2.10.2 Wireless keyboards, devices connected to a desktop and laptop

(p) 2.11 Implications for document usage

(q) 2.12 Understand the pros and cons of touch screens vs non-touch screen devices

2.12.1 Limitations of input using a touch keyboard

2.12.2 Limitations of input using touch vs keyboard and mouse, such as fine selection points, efficiency of input, having multiple tabs open

3 Computer Software Architecture

(r) 3.1 Understand operating system versioning and update awareness CF1.1.4

3.1.1 Implications of updates, understanding benefits and features of new updates

CF1.1.4

(s) 3.2 Know concepts surrounding applications vs. operating system vs. global settings CF1.1.1

3.2.1 Global settings common to all operating systems; for example, password protection, power management configurations, screen resolution

CF1.3.2, CF1.3.3, CF1.3.4, CF1.3.5

(t) 3.3 Have a general understanding of operating systems and software settings CF1.3

3.3.1 Know basic desktop customization CF1.3.1

3.3.1.1 Setting a screensaver, screen resolution, screen background CF1.3.2 3.3.1.2 Know window management (minimize, maximize, resizing

windows) CF1.3.5

(u) 3.4 Set software preferences KA1.1.7

3.4.1 Understand basic software settings that a user can set; for example, changing frequency of AutoSave, changing a print setting, and changing settings in Microsoft Office using File/Options

(v) 3.5 Users and profiles

3.5.1 Basic concepts of users and profiles; for example, on a Windows PC, a family could use a computer and each user has a distinct account with a user profiles and own login and credentials

3.5.2 Understand that profiles are customizable

(w) 3.6 Know file structures and file/folder management CF1.2

3.6.1 Moving/renaming files CF1.2.2

3.6.2 File permissions CF1.3.6

3.6.3 File extensions CF1.2.3

3.6.4 Managing electronic media (eBooks, songs, videos) KA1.4.1, KA1.4.2

3.6.4.1 File management of electronic media, how they are controlled by the app

KA1.4.2, KA1.4.3

© Certiport Inc., 2015 CONFIDENTIAL Page 11 of 28

Computing Fundamentals – GS5 GS4 3.6.4.1 Understand that one must open an app to find media on a

system like Kindle—one must go to the app to manage the media and not the reverse

KA1.4.2, KA1.4.3

3.6.5 Zipping/compression CF 3.4.1

(x) 3.7 Document Management

3.7.1 Scanning documents

3.7.1.1 Define scan, understand how a scanned file is stored 3.7.2 Taking pictures

3.7.2.1 Transfer a picture to a computer; manage picture files CF3.3.7, CF4.1.5

3.7.2.2 Transfer pictures from a phone to various locations

(y) 3.8 Menu navigation CF1.2

3.8.1 Radio buttons CF1.2.1

3.8.1.1 An option (radio) button limited to one selection CF1.2.1

3.8.2 Check boxes CF1.2.1

3.8.3 Drop-down menus CF1.2.1

3.8.4 Multi-select CF1.2.1

3.8.4.1 Enables multiple selections CF1.2.1

3.8.5 Searching for files CF1.3

3.8.5.1 Know where to go for files, use search options to find files CF1.3.5

3.8.5.2 Use file search techniques such as WIN KEY and start typing; on a Mac Command + Spacebar

LO6.3.1

3.8.5.3 Understand that downloaded files go the Downloads folder LO5.1.2

(z) 3.8.6 Rights and permissions (administrative rights) LO3.1.1

3.8.6.1 Understand that Admin-level rights exist and that you may not have permission to access all files in an organization

CF1.3.6

3.8.6.2 Describe why permissions are valuable in an organization LO3.1.1

(aa) 3.8.7 Define an IP address LO2.3.3

(bb) 3.8.8 Know how to install, uninstall, update, repair software CF1.3.6,

CF3.1.2,

3.8.8.1 Software purchased on media might need to be reinstalled from the Internet

CF4.1.1

3.8.10 Using local media (DVD-ROM, etc.). CF2.1.2

(cc) 3.9 Troubleshooting CF4

3.9.1 Know basic problem solving techniques CF4

3.9.2 Know how to determine problems involving hardware vs. software CF4.1.2

3.9.3 Know proper terminology to be able to describe the problem CF4.1.5, CF4.1.6

3.9.4 Know how to find an IP address on a personal computer CF4.1.5

3.9.5 Know how to determine a connection speed CF4.1.5

4 Backup and Restore

© Certiport Inc., 2015 CONFIDENTIAL Page 12 of 28

Computing Fundamentals – GS5 GS4 4.1 Understand local backup and restore CF4.4.2,

CF4.1.4

4.2 A backup is an instance of your machine, restore point is a snapshot in time of settings

CF4.4.4

4.3 Specifically, in Windows 7, differentiate when you would use backup (find a lost file) and when you would use restore (fix settings)

CF4.4.4

(dd) 4.4 Understand backing up concepts CF4.1.1

(ee) 4.5 Know how to back up and restore CF4.1.1

(ff) 4.6 Know how to complete a full system restore on a personal device CF4.4

4.6.1 Complete a full system restore/reset on a tablet and phone. CF4.4

4.6.2 Define factory default setting; if a laptop, reformat a hard drive CF1.3.1

5 File Sharing

(gg) 5.1 Understand file transfer options and characteristics KA6.2

5.1.1 Know how to attach files to e-mail KA6.2.1

5.1.2 Know how to get links to online stored files KA6.2.3

5.1.3 Understand the difference between publicly shared vs. shared links vs. shared folders

5.1.4 Understand needs for file compression/zipping in sharing CF3.4.1

6 Cloud Computing

(hh) 6.1 Understand “cloud” concepts KA6.2.3

6.1.1 Understand cloud storage vs. cloud access concepts

6.1.1.1 Define cloud storage and cloud access CF4.4.3

6.1.1.2 Must have Internet access to get to cloud

6.1.1.3 Describe cloud storage of photos for different systems, such as iCloud

6.1.2 Understand sharing and collaboration via the cloud

6.2 Know the benefits of using cloud storage LO5.1.2

6.2.1 Safe storage, convenience

(ii) 6.3 Access and use of the cloud

6.3.1 Understand account management on the cloud

6.3.2 Know how to upload content to the cloud CF4.4.3

6.3.2.1 OneDrive, Google Drive, Dropbox, and iCloud 6.3.3 Know how to download content from the cloud CF4.4.3,

LO5.1.2

6.3.4 Know how to sync files between devices using the cloud

(jj) 6.4 Web apps vs. local apps

6.4.1 Understand Software as a Service (SaaS) concepts LO4.2.6

6.4.2 Know what Learning Management Systems (LMS) do

6.4.2.1 Define LMS, describe use of discussion boards, understand how and where personal progress is stored and reported

© Certiport Inc., 2015 CONFIDENTIAL Page 13 of 28

Computing Fundamentals – GS5 GS4 (kk) 6.5 Understand web app types

6.5.1 Online storage apps (Google Drive, Dropbox, OneDrive, iCloud storage)

6.5.2 Online office apps (Google apps, office 365)

6.5.3 Database Driven CRM apps (Salesforce, Oracle, Attask)

6.5.3.1 Define CRM and describe use and benefits; types of organizations that would use CRM

6.5.3.2 CRM info can be accessed from the cloud 6.5.4 Browser vs. tablet vs. smart phone vs. desktop apps CF2.2

7 Security

(ll) 7.1 Know credential management best practices LO3.1

7.1.1 Usernames LO3.1.1

7.1.2 Passwords LO3.1.1

1) 7.1.2.1 Understand the components of a good password LO3.1.1

(mm) 7.1.3 Know basic account setting management CF1.3.6,

LO3.1.1

7.1.3.1 Your own user account, keeping it secure, locking your computer

LO2.1.3

(nn) 7.2 Know the basic threats to security of computers, data, and identity CF4.1.3, CF3.4.4

7.2.1 Viruses LO5.1.2

7.2.2 Trojans CF4.1.3, CF3.4.4, LO5.1.2

7.2.3 Malware CF4.1.3, CF3.4.4, LO5.1.2

7.2.4 Social engineering

(oo) 7.3 Understand the implications of monitoring software (surveillance)

(pp) 7.4 Understand connecting to secured vs. unsecured network (wired and wireless) LO2.1,

LO2.1.1 7.4.1 Know the ramifications (of wired and wireless) LO2.1.2

7.4.2 Understand the risks (of wired and wireless) LO2.1.3

7.4.3 Know the difference between public v. private computing (using a public computer)

1) 2) 7.4.3.1 Browser histories LO1.2.7

3) 4) 7.4.3.2 Cache/cookies LO5.1.2

5) 6) 7.4.3.3 Logging out of online and OS accounts

(qq) 7.5 Know the use of and importance of anti-virus software LO5.1.2

7.5.1 Understand how to prevent virus issues LO5.1.2

7.5.2 Understand how to maintain and update anti-virus software LO5.1.2

© Certiport Inc., 2015 CONFIDENTIAL Page 14 of 28

Computing Fundamentals – GS5 GS4 (rr) 7.6 Know the use of firewalls and basic settings LO2.1.4

(ss) 7.7 Know e-commerce interactions and best practices LO5.1.1

7.7.1 Recognize the use of a secure connection, networks, (https)

7.7.2 Know how to be a savvy e-commerce consumer LO5.1.1

7.7.2.1 Best practices, such as only buying from known companies, how a site is secure (https)

LO5.1.1

7.7.2.2 Exercise skepticism; a “verify” symbol may be meaningless

(tt) 7.8 Understand the basic definition and use of Virtual Private Networks (VPNs) are LO2.2.5

© Certiport Inc., 2015 CONFIDENTIAL Page 15 of 28

Key Applications Examination

The Key Applications exam includes questions covering four applications (word processing,

spreadsheet presentation, and database software) and includes questions on common features

of all applications (starting, opening and saving files, etc.).

To pass this examination, the examinee must demonstrate knowledge in the following areas:

• The ability to use the common functions of application software (starting and exiting

the program, creating, saving and managing files, common editing, formatting and

printing functions)

• The ability to use the specific functions needed to operate a word processor at a basic

level

• The ability to use the specific functions needed to operate a spreadsheet program at a

basic level

• The ability to communicate with presentation software

• The ability to navigate and use database applications.

For purposes of this examination, common features are defined as features common to specific

desktop applications (such as Microsoft Word, Excel, and PowerPoint). Features that are

common to all applications (such as starting the program, opening and saving documents,

cutting and pasting text and data, changing fonts, previewing and printing files) will be

covered in the domain specific to common functionality. Features that are specific to an

application (such as formatting word-processing documents with tables, analyzing tabular or

graphical data in a spreadsheet, or modifying slides in a presentation program) will be covered

in domains specific to those applications. The audience profile for the Certiport GS5 Key Applications Exam is a basic technology user

(student, instructor, office worker, home user, etc.) who needs to operate computers or

computing devices at the feature and functionality level.

The user should be able to solve basic digital literacy problems, use basic productivity

applications, and understand the structure of common technologies. The user should also be

able to apply existing knowledge to deal with unfamiliar situations and scenarios.

The Certiport GS5 Examinee should be able to navigate computers and software at the feature

and functionality level, including:

• Common operating systems such as Microsoft Windows, Mac OS X, Linux, Android,

iOS, etc.

• Office applications (Microsoft Office, OpenOffice, LibreOffice, Office 365, Google

Docs, iWork, etc.) and standard computer productivity applications such as word

processing, spreadsheet, presentation, multi-media, and file and data management

© Certiport Inc., 2015 CONFIDENTIAL Page 16 of 28

• Standard Web browser applications, including Microsoft Internet Explorer, Mozilla

Firefox, Safari, Chrome, Opera, etc.

• Standard communication applications such as e-mail, instant messaging, and online

tools

• General computer knowledge, including basic hardware, software, networking and

troubleshooting

Examinees would include people from a wide variety of job roles from almost all areas of

beginning professional, student, and personal life. Some of the user roles include, but are not

limited to the following:

• Students

• Data entry workers

• Educators

• Instructors/Trainers

• Prospective IT/Tech support workers

• Professionals who are seeking computer skills (job re-training)

• Business and administrative professionals

• Public service workers

• Other members of the general population seeking certification

By requiring this exam for certification, the program assumes that an understanding of more

than one application is required to be considered "literate" by the proposed standard. In the

determination of which applications were to be required in this exam, the selection of a word

processing, spreadsheet, presentation, and database software was supported by the popularity

of these applications in software sales and training and testing programs and verified by

additional research.

The Key Applications module covers six domains of knowledge and skill:

Domain 1.0—Common Application Features

Domain 2.0—Word Processing Activities

Domain 3.0—Spreadsheet Activities

Domain 4.0—Basic Database Interactions

Domain 5.0—Presentation Activities

Domain 6.0—App Culture

Domain 7.0—Graphic Modifications These domains are further broken down into objectives and skill sets as outlined in the detailed

curriculum which follows.

© Certiport Inc., 2015 CONFIDENTIAL Page 17 of 28

IC3—Module 2: Key Applications—Global Standard 5 Basic Digital Literacy Training Materials Correlation Verification:

Not a Professional Content Review

Key Applications – GS5 GS4

1 Common Features

1.1 Know copy, cut, and paste keyboard equivalents CF1.2.2

1.2 Understand the difference between plain text and HTML (text with markup)

1.3 Know how to use spelling check KA1.1.5

LO4.1.1

1.4 Know how to use reviewing features KA1.1.5

1.5 Know the find/replace feature KA1.1.5

1.6 Be able to select text or cells KA1.1.9

KA3.2.1

1.7 Be able to redo and undo KA1.1.5

1.8 Be able to drag and drop KA1.1.6

1.9 Know the read-only view KA1.3.6

1.10 Understand what a protected mode means KA1.3.6

1.11 Be able to use the zoom feature KA1.3.6

2 Word Processing

2.1 Perform basic formatting skills KA3.2.3

KA3.2.4

2.2 Adjust margins, page sizes, and page orientation KA2.2.1

2.3 Alter text and font styles KA3.2.4

2.4 Create and save files KA1.3.2

KA1.3.6 KA2.2.1

2.5 Know page layout concepts KA1.1.4

KA2.2 2.5.1 Page numbering KA2.2.1

2.5.2 Columns KA2.2.1

2.5.3 Margins KA2.2.1

2.5.4 Alignment, text in paragraphs and tables KA2.2.1

2.5.5 Tabs and rulers KA2.2.1

2.5.6 Orientation KA2.2.1

2.5.7 Spacing KA2.2.2

2.6 Know how to print a word processing document KA1.1.4

© Certiport Inc., 2015 CONFIDENTIAL Page 18 of 28

Key Applications – GS5 GS4 KA2.2.1

2.7 Use and configure print views KA1.1.4

KA2.2.1

2.8 Use reviewing options within a word processing document KA6.1.1

KA6.1.3 2.8.1 Turn on and off change tracking features KA6.1.2

2.8.2 Accept or reject proposed changes. KA6.1.2

2.9 Be able to use tables KA2.1.1

KA2.2.1

2.10 Understand which file types are compatible or editable with word processors CF1.2.3

2.10.1 Example include Pdf, Pub, Doc, Docx, Txt, etc. CF1.2.3

Use word processing templates to increase productivity KA1.3.3

3 Spreadsheets

3.1 Understand common spreadsheet terms KA3

3.1.1 Cell KA3.1

3.1.2 Column KA3.1

3.1.3 Row KA3.1

3.1.4 Range KA3.1

3.1.5 Worksheet KA3.1

3.1.6 Workbook KA3.1

3.1.7 Navigation KA3.1

3.2 Be able to insert/delete rows and columns KA3.1.1

3.3 Be able to modify cell sizes KA3.1.2

3.4 Be able to filter and sort data KA3.2.1

3.5 Understand functions, formulas, and operators KA3.2.2

3.5.1 Understand their purpose and how they are used KA3.2.2

3.5.2 Recognize syntax KA3.2.2

3.5.3 Be able to create simple formulas KA3.2.2

3.6 Be able to enter data in a spreadsheet KA3.2

3.7 Use and create spreadsheet charts KA3.2.5

3.7.1 Recognize charts KA3.2.5

3.7.2 Read and interpret charts KA3.2.5

3.7.3 Create simple charts. KA3.2.5

3.8 Create spreadsheet tables KA2.1.1

3.8.1 Recognize tables KA2.1.1

3.8.2 Use and manipulate tables KA2.1.1

3.8.3 Create simple tables. KA2.1.1

© Certiport Inc., 2015 CONFIDENTIAL Page 19 of 28

Key Applications – GS5 GS4

3.9 Manipulate data within a spreadsheet KA2.1

3.9.1 Merge and unmerge cells KA2.1.1

3.9.2 Cut, copy, and paste data. CF1.2.2

3.10 Format data within spreadsheets KA3.2

3.10.1 Modify borders, fill color, text color, alignment, data type KA3.2.4,

KA4.1.4

3.11 Understand compatible spreadsheet file types. Examples include Csv, Xlsx, Tab delimited, etc.

3.12 Be able to use spreadsheet templates to increase productivity KA1.3.3

3.13 Understand how a spreadsheet can be used as a simple database

4 Databases

4.1 Understand what data is

4.2 Understand how websites utilize databases

4.3 Know basic concepts of a relational database KA5.1

4.3.1 Field KA5.1.2

4.3.2 Table KA5.1.2

4.3.3 Data KA5.1.2

4.3.4 Query KA5.1.2

4.3.5 Form KA5.1.2

4.4 Know what metadata is

5 Presentations

5.1 Understand file types compatible with presentation software CF1.2.3

5.1.1 Sharing (presentation, handout, outlines, video)

5.1.2 Publishing (pptx, pdf, jpg, show, png)

5.2 Understand how to connect to external/extended monitors to display presentation

CF3.3.7

5.2.1 Cables CF4.2.2

5.2.2 Audio

5.3 Be able to us presentation views and modes LO3.2.1,

LO3.2.2

5.4 Know how to add animations, effects, and slide transitions CF3.3.7,

KA4.2.3, KA4.3.3

5.5 Know how to create and organize slides KA4.2

5.5.1 Slide management KA4.2

5.5.2 Inserting and managing media files KA4.1.3

5.6 Know how to design slides

© Certiport Inc., 2015 CONFIDENTIAL Page 20 of 28

Key Applications – GS5 GS4 5.6.1 Be able to use templates CS3.3.5,

KA1.3.3

5.7 Identify presentation software options

5.7.1 Presentations KA4

5.7.2 Add slides KA4.2.1

5.7.3 Delete slides KA4.2.2

5.7.4 Revise slide order KA4.2.3

5.7.5 Layout KA4.3.1

6 App Culture

6.1 Overall, how apps are obtained (must have an account), app stores, purchasing apps with a credit card, in-app purchases, how to use an app store

6.2 Understand how to obtain apps

6.2.1 Web apps

6.2.2 App stores

6.3 Identify different app genres

6.3.1 Productivity

6.3.2 Reference

6.3.3 Content

6.3.4 Creation

6.3.5 Social media

6.3.6 Music

6.3.7 Health

6.4 Understand strengths and limits of apps and applications

6.4.1 Applications may only run on certain devices

7 Graphic Modification

7.1 Be able to import and insert images into documents KA4.1.5

7.2 Understand how to crop images

© Certiport Inc., 2015 CONFIDENTIAL Page 21 of 28

Living Online Examination

The Living Online examination covers aspects of working in an Internet or networked

environment, including basic knowledge of networks and the Internet, skills in specific

applications such as electronic mail software and Web browsers, skills required to find and

evaluate information, and an understanding of issues related to computing and the Internet

being used at work, home and school (ergonomics, security, ethics, Internet "rules of the road"

or "netiquette," etc.).

The audience profile for the Certiport GS5 Key Applications Exam is a basic technology user

(student, instructor, office worker, home user, etc.) who needs to operate computers or

computing devices at the feature and functionality level.

The user should be able to solve basic digital literacy problems, use basic productivity

applications, and understand the structure of common technologies. The user should also be able

to apply existing knowledge to deal with unfamiliar situations and scenarios.

The Certiport GS5 Key Applications Examinee should be able to navigate computers and

software at the feature and functionality level, including:

Common operating systems such as Microsoft Windows, Mac OS X, Linux, Android, iOS, etc.

Office applications (Microsoft Office, OpenOffice, LibreOffice, Office 365, Google Docs,

iWork, etc.) and standard computer productivity applications such as word processing,

spreadsheet, presentation, multi-media, and file and data management

Standard Web browser applications, including Microsoft Internet Explorer, Mozilla Firefox,

Safari, Chrome, Opera, etc.

Standard communication applications such as e-mail, instant messaging, and online tools

General computer knowledge, including basic hardware, software, networking and

troubleshooting

Examinees would include people from a wide variety of job roles from almost all areas of

beginning professional, student, and personal life. Some of the user roles include, but are not

limited to the following:

• Students

• Data entry workers

• Educators

• Instructors/Trainers

• Prospective IT/Tech support workers

• Professionals who are seeking computer skills (job re-training)

• Business and administrative professionals

• Public service workers

• Other members of the general population seeking certification

© Certiport Inc., 2015 CONFIDENTIAL Page 22 of 28

To pass this examination, the examinee must demonstrate knowledge in the following areas:

• How computers connect to communication networks and the Internet

• How electronic communication works and how to communicate using electronic mail, social networks and other communication methods

• Knowledge of the World Wide Web, how to use a Web browsing program and how to create, locate and evaluate online content

• Knowledge of the impact of computing and the Internet on society

The Living Online module covers six domains of knowledge and skill:

Domain 1.0—Browsers

Domain 2.0—Networking concepts

Domain 3.0—Digital Communication

Domain 4.0—Digital Citizenship

Domain 5.0—Safe Computing

Domain 6.0—Research Fluency

These domains are further broken down into objectives and skill sets as outlined in the detailed

curriculum which follows.

© Certiport Inc., 2015 CONFIDENTIAL Page 23 of 28

IC3—Module 3: Living Online—Global Standard 5 Basic Digital Literacy Training Materials Correlation Verification:

Not a Professional Content Review

Living Online – GS5 GS4

1 Internet (Navigation) LO1.2

1.1 Understand what the Internet is LO1.1

1.1.1 Understand how the Internet works

1.1.1.1 Network topologies; Basic level, networks to networks, servers to servers—this is the Internet; Internet vs intranet—closed network—open vs closed

1.1.1.2 DNS, IP addresses; how to communicate device to device

1.1.1.3 Domain types [.gov, .edu, .com, .us, .uk, etc.] LO1.2.1

1.1.1.4 Bandwidth

1.1.1.5 Understand data sizes: bits, bytes, megabytes, etc.

1.1.2 Be familiar with media literacy

1.1.2.1 Know how to search the Internet LO6.1

1.1.2.1.1

Advance searches (keyword, hashtag); Use search techniques such as inserting a colon and using options in search box; Demonstrate judgment and savviness when evaluating websites, such as asking who wrote the information, for what audience is the information intended, are persuasive words used? How to determine if a site is valid

LO6.3

1.1.2.2 Research fluency

1.1.2.2.1

Validity of resources LO6.2.5

1.1.3 Understand browser functionality LO1.2

1.1.3.1 HTML/CSS

1.1.3.2 Cookies

1.1.3.3 Cache

1.1.3.4 Breadcrumbs

1.1.3.5 Plugins LO1.2.6

1.1.3.6 Widget

1.1.3.7 Add-ons

1.1.3.8 In-browser apps

1.1.3.9 Popups

1.1.3.10 Different browsers

1.1.3.11 Browser navigation (URLs, scroll bars, etc.)

1.1.3.12 New window, tabs

© Certiport Inc., 2015 CONFIDENTIAL Page 24 of 28

Living Online – GS5 GS4

1.1.3.13 Bookmarks, favorites, synchronize bookmark LO1.2.5

1.1.4 Know about IP rights/usage; IP rights regarding images and articles, which have owners; Fair use

1.1.5 Know about licensing rules/laws; If your company gives you software, you can’t install at home

LO4.2.6

1.1.5.1 Of intellectual property LO4.2.3, LO4.2.7

1.1.5.2 Software programs. LO4.2.6

1.1.6 Know about copyrights LO4.2.5, LO4.2.3

1.1.7 Know about censorship and filtering; Define censorship and describe why it’s needed; Explain why there are rules around explicit content and the reason we should know about it from an organization standpoint; Understand appropriate use of the Internet in a business setting; cannot offend others or search for offensive material; Companies may block Facebook or other sites; this is legal and appropriate for companies to do

LO4.1.3, LO4.2.1, LO4.2.2

1.2.8 Know plagiarism rules/laws; Describe plagiarism laws, how these laws are punishable; How detecting plagiarism is now easier

1.2.9 Fair use

2 Common Functionality

2.1 Understand how to use common website navigation conventions LO1.2

2.1.1 Click / delayed / double-click

2.1.2 Mouse-over

2.1.3 Drag and drop

2.1.4 Basic web navigation principles

3 Email clients LO3.1

3.1 Identify email applications

3.1.1 Desktop application platform (ie. Outlook)

3.1.1.1 Web-based platform (Gmail, Yahoo)

3.1.2 Understand email etiquette LO4.1.4, LO4.1.5

3.1.2.1 Reply vs. reply all, forward LO3.1.2

3.1.2.2 cc vs bcc LO3.1.2

3.1.2.3 Signature LO3.1.2

3.1.2.4 Header LO3.1.3

3.1.2.5 SPAM LO3.1.3

3.1.2.6 Junk mail LO3.1.3

3.1.3 Understand email history and management LO3.1.3

2.2.3.1 Spam / junk email LO3.1.3

2.2.3.2 Archiving LO3.1.3

© Certiport Inc., 2015 CONFIDENTIAL Page 25 of 28

Living Online – GS5 GS4

2.2.3.3 Trash LO3.1.3

2.2.3.4 Folders LO3.1.3

3.1.4 Understand e-mail attachments; Size limits; Web apps vs desktop apps KA6.2.1

3.5 Understand contact management

3.5.1 Address books

4 Calendaring

4.1

Know how to create events and appointments

4.1.1 Recurring

4.1.2 Details (location, time zone, notes)

4.2 Know how to share calendars

4.2.1 Invitations

4.3 Know how to view multiple calendars; Multiple calendars can be connected in one view; show up in different colors in same user interface

4.4 Understand how to subscribe to calendars; A public calendar (like a municipal calendar) vs sharing your own calendar

5 Social Media

5.1 Understand what a digital identity is (identity on social media); Concept of once you do something, it cannot be undone

5.1.1 Know what social networks are and how they are used (FB, LinkedIn etc.); Define social network; describe how Facebook is a social network; Describe LinkedIn and how it functions as a social network; explain how LinkedIn is a valuable social network for business

5.1.2 Know other types of networks (YouTube, Instagram, etc.); Define digital identity; Describe how following certain people on social networks such as YouTube and Instagram says something about the individual; Describe how you are choosing your digital identity based on the choices you make on all of these networks; use caution and understand that these choices follow you

LO5.1.1

5.2 Recognize the difference of internal (school/business) vs. open media sites; There are business and school social media sites, such as Neo and Yammer and Slack; Difference between an open social media site and a closed site; for example, Facebook started as a closed site (for students at a specific college), but is now an open site available to anyone who signs up for an account

5.2.1 Neo v. Facebook

5.3 Know what blogs, wikis, and forums are and how they are used

5.4 Know what cyber bullying is LO4.1.4, LO4.1.5

2.4.4.1 Define cyber bulling, cite examples LO4.1.4

2.4.4.2 Describe how to be conscious of other people; explain that a person is always on both sides—not just interacting with a computer

LO4.1.3

6 Communications

© Certiport Inc., 2015 CONFIDENTIAL Page 26 of 28

Living Online – GS5 GS4

6.1 Know the best tool for the various situations and scenarios; Describe how different communication technologies (email, phone, text message) are suited for differing circumstances; for example, if you needed to get an urgent message to your boss, what technology is best? Describe which technology is likely to get the fastest and slowest response from the recipient

LO4.1.3

6.1.1 Email KA6.2.1, LO3.1.3

6.1.2 SMS LO3.2.1

6.1.3 Instant message

6.1.4 VOIP

6.1.5 Phone calls

6.1.6 Web Ex

6.1.7 Conference calls

6.2 Know how to use SMS texting; Describe appropriate use of SMS; for example, when communicating with your boss, maybe use text only if he or she is out of the office

6.2.1 Etiquette LO4.1

6.2.2 Know what it is and how it can be used as a tool

6.2.3 Know when to use and not use

6.2.4 Determine when it is appropriate to use it

6.3 Know how to use chat platforms; Describe and demonstrate the use of Skype as a chat platform in business

CF3.2.2

6.4 Understand options for and how to use distant/remote/individual learning technologies

6.4.1 Know basic remote workforce tools; Identify tools and options to increase productivity for distant employees or co-workers; Describe workplace storage options such as SharePoint; Describe and identify various platforms for web and video conferencing; Describe common features of such platforms such as being able to share your screen, edit documents at the same time

7 Online Conferencing

7.1 Understand and identify online conference offerings LO3.2.2

7.1.1 VOIP conferencing [Skype] LO3.2.2

7.1.2 Video conferencing [Google hangouts, Skype, FaceTime] LO3.2.2

7.1.3 Phone conferencing LO3.2.2

7.1.4 Screen sharing LO3.2.2

8 Streaming

8.1 Understand what streaming is and how it works with devices; Differentiate between streaming and downloading; Define live audio; Describe how you could stream the video of a live recording

8.1.1 Video streaming

8.1.2 Live streaming

© Certiport Inc., 2015 CONFIDENTIAL Page 27 of 28

Living Online – GS5 GS4

8.1.3 Audio streaming

9 Digital Principles/Ethics/Skills/Citizenship LO4.1

9.1 Understand the necessity of coping with change in technology

9.1.1 Audience awareness; Demonstrate sensitivity when determining the most appropriate technology to use when communicating with others; for example, some people can Skype but some may not know or have that technology

LO4.1.2, LO4.1.3, LO4.1.4, LO4.1.5

9.2 Understand Digital Wellness basics LO5.2

9.2.1 Screen time LO5.2.1

9.2.2 Ergonomic best practices LO5.2

9.3 Understand an online identity management LO5.1.1

9.3.1 Branding; Define and describe a personal digital footprint; Explain the consequences (both positive and negative) of how you define yourself online; Describe how your online activities define how others perceive you; Describe how potential employers might perceive you by searching your name online; Describe how you can create your own positive online identity

LO4.1.2, LO4.1.3, LO4.1.4, LO4.1.5

9.3.2 Managing profiles LO3.2.3

9.3.2.1 Gaming

9.3.2.2 Facebook

9.3.2.3 Twitter

9.3.2.4 LinkedIn

9.4 Know the difference between personal vs. professional identity LO4.1.3

© Certiport Inc., 2015 CONFIDENTIAL Page 28 of 28

IC3—Module 5: Prerequisites—Global Standard 5 Basic Digital Literacy Training Materials Correlation Verification:

Not a Professional Content Review

Prerequisites GS5

1 Typing proficiency

2 Keyboard localization (Discussion: Non-Arabic keyboards)

3 Understand the use of Extended keys (ESC, CTRL, OPT, F1 etc.) in each operating system

4 Multiplatform (Command vs. CTRL)

5 Fill out online forms