# CTE Resource Center - Verso - Computer Network Software Operations Related NBEA Achievement Standards for Information Technology

CTE Resource Center - Verso

Virginia’s CTE Resource Center

Related NBEA Achievement Standards for Information Technology

NBEA Achievement Standards for Information Technology

NBEA (National Business Education Association) standards have been correlated to ensure that students and adults are afforded equal access to fundamental business knowledge and skills and, therefore, an equal opportunity for success in life" (National Standards for Business Education, NBEA, 2007).

Analyze legal and ethical dilemmas within the framework of current laws and legislation (e.g., virus development, hacking, threats, phishing).


Analyze various codes of ethics for computer usage.


Apply basic networking terminology to a network environment.


Apply path determination, routing, and addressing schemes to administer networks.


Compare and contrast the OSI model with protocols (e.g., TCP/IP, IPX/SPX).


Compare and contrast the functions, features, and limitations of different operating systems and utilities (e.g., open source, mobile, and proprietary operating systems).


Compare and contrast various types of license agreements (e.g., open source, multiple license agreements, single-user installation, site license).


Create learning objects to facilitate user training.


Demonstrate legal and ethical behaviors when using information technologies.


Describe current and emerging hardware; configure, install, and upgrade hardware; diagnose problems; and repair hardware.


Describe emerging operating systems.


Describe features of operating systems that can be personalized.


Describe interrelationships between hardware components and supportive software.


Describe server functions, including specialized servers (e.g., Web, DHCP, DNS, mail, proxy servers), and identify hardware and software requirements, such as RAID.


Describe various types of operating systems and utilities.


Design and implement a security plan for an information system, including communications systems.


Design and implement security, privacy, and risk management policies and procedures for information technology.


Design hardware and software network security solutions (e.g., VPN, SSL, firewall).


Develop and implement data retention and destruction schedules.


Develop and implement disaster prevention and recovery policies and procedures.


Develop help-desk procedures.


Develop training materials for users.


Discuss copyright rules and regulations (e.g., images, music, video, software).


Discuss distributed storage technologies (e.g., SAN, NAS).


Distinguish among network environments (e.g., peer-to-peer, client-server, thin client, n-tier, Internetworks, intranets, extranets).


Distinguish between local area network (LAN) and wide area network (WAN) topologies and protocols.


Evaluate and select network circuits and transmission schemes appropriate for a task.


Evaluate, select, and deploy a variety of network architectures and protocols.


Explain the consequences of illegal and unethical use of information technologies (e.g., piracy; illegal downloading; licensing infringement; inappropriate use of software, hardware, and mobile devices).


Explain the need for lifelong learning and professional growth.


Explore industry standards for cross-platform interface development (e.g., XML, ASP, PHP).


Identify and use help-desk software.


Identify components and characteristics of public networks (e.g., public telephone, cable, satellite, wireless) and their functions.


Identify network devices, including network connectivity hardware, and describe their functions.


Identify standards-making bodies and describe relevant standards.


Identify, analyze, and evaluate emerging communications technologies for use in organizations.


Identify, evaluate, and select communications media (guided and radiated) appropriate for a communications task (e.g., wireless, cat6, fiber).


Identify, evaluate, and select training resources to meet user needs.


Identify, evaluate, and use resources (e.g., hardware, software, and online) for problem identification and resolution.


Identify, evaluate, select, install, use, upgrade, customize, and diagnose and solve problems with various types of operating systems and utilities.


Implement configuration management routines (e.g., service releases, back ups, system imaging).


Implement controls to prevent loss of integrity of data and other information resources.


Implement hardware and software network security solutions (e.g., VPN, SSL, firewall).


Implement organizational policies and procedures for security, privacy, and risk management.


Implement procedures used to recover information from failures and security breaches (e.g., malware, viral infection).


Implement server virtualization.


Install and configure network components to implement a functional network.


Install and configure network operating systems.


Install and customize operating systems and utilities.


Install specialized servers (e.g., Web, DHCP, DNS, mail, proxy servers).


Manage files and folders.


Navigate the basic operating system.


Obtain industry certification in one or more information technology areas.


Plan, design, deliver, and evaluate user training.


Read, interpret, and adhere to software license agreements and legal mandates (e.g., ADA, Sarbanne-Oxly).


Recognize the impact of the convergence of telephony, data, and video communications on networks.


Remove, upgrade, store, and install computer hardware and supportive software.


Repair computer hardware and solve supportive software problems.


Select operating systems and utilities appropriate for specific hardware, software, and tasks.


Select training venues appropriate to learners (e.g., online, over-the-shoulder, distance learning, text based, and multimedia).


Troubleshoot advanced hardware and supportive software problems.


Tutor others in information technology skills.


Use appropriate tools to monitor network performance.


Work in a team to solve problems and share knowledge.


Write organization policy for the legal and ethical use of information (e.g., code of ethics).