doss high school magnet career academy

advertisement
Fleming County HIGH SCHOOL
COURSE SYLLABUS – 2012-13
Instructor:
Mrs. Charlene Hall
Course Title:
Computer Support Essentials (IC3)
Course
Description:
This course provides further exploration to computer technology and
concepts. It will map to the IC3 standards and is organized into three key
components: Computing Fundamentals, Key Applications, and Living
Online. It will look at the various uses of the computer, important
accessories, networking principles, and Microsoft Office applications. This
class also covers e-mail and Internet principles such as managing e-mail,
searching for a topic online, and how computers affect everyday life.
References:
Computer Literacy BASICS: A Comprehensive Guide to IC3, 4rd Edition.
Connie Morrison and Dolores J. Wells, © 2013, Course Technology,
Cengage Learning
Materials
Needed:
Instructional
Philosophy:
Course
Standards:
USB Flash Drive (recommended)
The instructional philosophy of this class is that students will experience…
 Project based learning
 Hands-on activities
 Reading, writing, speaking and listening
 Work based learning opportunities
 Critical thinking and problem solving
 Real world applications
Upon the completion of the course, students will be expected to:
 Use Internet search engines and understand their advantages and
disadvantages.
 Learn computer hardware and software components
 Demonstrate a basic understanding of the impact of computers on
society.
 Use and understand basic computer terminology.
 Use Microsoft Word to create a variety of school and business related
documents.
 Use Microsoft Excel to a variety of school and business related
documents and perform basic mathematical operations.
 Use Microsoft PowerPoint to create business presentations using
tables, graphs, music.
 Use Microsoft Access to create basic databases, queries, forms, and
reports.
 Demonstrate online ethics.
 Learn to live online using networks, the Internet, research, and
creating web pages.
 Set up a computer out of box.








Learning
Targets:
Install software from network or CD.
Install and configure new hardware and upgrades.
Upgrade device drivers.
Check cable connections.
Perform basic computer & printer maintenance (clean ball &
keyboard, blow out dust, clean print heads & platen bar, oil chassis).
Set up an email profile and send an email with an attachment.
Set up scan converter and/or other projection devices.
Diagnose and repair technological problems.
1. I can describe different types of computer devices.
2. I can describe the importance of the Central Processing Unit (CPU)
including how the speed of a microprocessor is measured.
3. I can explain the importance of RAM, ROM and how memory is
measured.
4. I can describe the features and benefits of different storage media.
5. Identify the types and purposes of input and output devices on desktop or
laptop computers.
6. Identify the types and purposes of specialized input devices (e.g.
cameras, scanners, game controllers, etc.)
7. Identify the types and purposes of specialized output (e.g. printers,
projectors, etc.)
8. Identify how hardware devices are connected to an installed on a
computer.
9. Identify factors that affect computer performance.
10. Identify the importance of protecting computer hardware from
theft or damage.
11. Identify factors that can cause damage to computer hardware or
media (e.g. environmental factors, magnetic fields, etc.).
12. Identify how to protect computer hardware from fluctuations
in the power supply, power outages, and other electrical issues
(such as use of computers on different electrical systems).
13. Identify common problems associated with computer hardware.
14. Identify problems that can occur if hardware is not maintained
properly.
15. Identify maintenance that can be performed routinely by users.
16. Identify maintenance that should ONLY be performed by experienced
professionals, including replacing or upgrading internal hardware
(especially electrical) components (such as processors or drives) that
are not designed to be user accessible.
17. Identify the steps required to solve computer-related problems.
18. Identify consumer issues related to buying, maintaining, and
repairing a computer including:
 Factors that go into an individual or organizational decision
on how to purchase computer equipment.
 Factors relating to maintenance and repair responsibilities.
Academic
Expectations:
Classroom
Standards:
Section
A
B
 Students are expected to attend class regularly and participate.
 All work should be completed and turned into the assigned basket
by due date.
 Students having difficulty should make arrangements to get help
from the teacher.
 For extended excused absences, the teacher, student, and parent will
collaborate to assist the student in making up missing work.
 Students are expected to behave in a mature and respectful manner in
the classroom. Students must show respect for themselves, each other,
the equipment, and anyone who enters the classroom.
 Tardiness will not be tolerated and such students must go to ISD.
 Students are expected to comply with all rules and regulations set forth
in student handbook.
 Consequences for failure to follow classroom procedure include: verbal
reprimand, parent/guardian contact, or disciplinary referral.
Unit/Topics
Lessons
Module 1: Computing Fundamentals
 Introducing Computers
 Computer Hardware
 Maintaining and Protecting Hardware
 Computer Software
 Essential Computer Skills
 Using Technology to Solve Problems
 The Windows Operating System
 Changing setting and Customizing the Desktop
 Using Windows Explorer
 File Management w/ Windows Explorer
Lesson 1 –
Lesson 10
Module 2: Key Applications
 Using Microsoft Office 2010
 Word Essentials
 Editing and Formatting Documents
 Working with Tables
 Enhancing Documents
 Excel Essentials
 Organizing Worksheets
 Creating Formulas and Charting Data
 PowerPoint Essentials
 Enhancing Presentations w/ Multimedia Effects
 Access Essentials
 Managing and Reporting Database Information
Lesson 11 –
Lesson 23
B
Module 3: Living Online
 Networks and Telecommunication
 E-Mail and Effective Electronic Communication
 Internet Essentials
 Researching on the Internet
 Evaluating Online Information
 Technology and Society
 Security, Privacy, and Ethics Online
Lesson 24 –
Lesson30
FCHS Grading Scale
A
90-100%
B
80-89%
C
70-79%
D
60-69%
F
59% and Below
Total Points
5-100 pts. each
100-300 pts. each
100 pts. each
80% or higher
Course Grade Composition
Component
Category
Daily Assignments
Formative
Projects
Formative
Tests
Formative
Mastery Exam (IC3)
Proficiency Exam
Content Area
Writing
Follow LDC format for writing piece.
Re-Do
Philosophy:
The faculty expects all students to succeed. Students who need additional
help or need to re-do assignments will be afforded those opportunities to
show their mastery of concepts in class.
Make up Work:
See FCHS 2010-2011 Student Handbook pages 6-7 for policy.
Extra Help:
Extra help will be given in the form of in-class peer collaboration. After
school help can also be worked out w/teacher on an as needed basis.
Students need to conference w/teacher about staying one day in advance.
Technology
Procedures
Because of the nature of this class, technology will be used frequently. The
use of technology is a PRIVILEGE. If at any time technology is misused,
the student may be denied technology privileges.
Student Handbook #15 (page 15) - Abuse/Misuse of Computers and
Related Equipment
Malicious actions toward equipment or entry into or destruction of
someone’s programs, files, or storage areas, or the deletion/alteration of
school program will be considered a major offense.
Discipline Range: Principal discretion and could include suspension from
computer use, financial remuneration, in-school detention, and/or out-of-
school suspension.
Student Handbook #16 (page 16) - Internet Use
Students must have assignment sheets before logging onto Internet and
view only material required for assignments. The following are not
permitted:
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.
L.
M.
“Surfing” the Internet
Plagiarism
Harassment
Damaging system or networks
Sending offensive pictures or messages
Obscene language
Violating copyright laws
Trespassing into another’s files
Intentionally wasting resources
Using the Internet for commercial purposes
Use of “Chat” lines or pages
Use of social networking sites
Gaming
Download