Educators' Guide for Pedagogy and Assessment
Click the icon below to download the Educators' Guide for Pedagogy and Assessment

Unit: 1. The computer workspace and networking
Information Technology
Learning Outcome: 1. I understand good practices on the workplace.


Follow working procedures; clean and tidy workplace; good communication skills among peers; follow health and safety regulations.


e.g. Electrostatic discharge (ESD), inappropriate use of tools, trailing cables, cluttered workspaces, inappropriately stacked or shelved equipment, air humidity/dryness/cleanliness, lack of ventilation.


Proper disposal of hazardous equipment; Reduce waste of resources and equipment; Re-use resources and equipment; Recycle equipment.
Learning Outcome: 2. I am able to create a safe and healthy workplace by taking into consideration ergonomics as well as risks to equipment and the environment.


Electric/electronic devices: e.g. caution, high voltage, laser equipment, corrosive, explosive, lethal.
Workplace: e.g. slippery, fire exit, meeting point, fire extinguisher, no smoking, no eating and drinking.


e.g. misplacement of equipment, trailing cables, cluttering of workspaces, non-ventilated environment, overloading of plugs, incorrect lighting, flooring, blocked fire exits, fire extinguishers are not within reach, sharp edges, inappropriate storage of resources and equipment.
Learning Outcome: 3. I understand basic terminology related to computer networks.

Protocols: e.g. TCP/IP, POP, IMAP, FTP, SMTP, HTTP, HTTPS.

TCP/IP model:
Network Access layer – Ethernet.

Wired communication: e.g. coaxial cable, CAT5 cable, CAT6 cable, twisted-pair cable, SPDIF cable, OC12 cable.
Wireless communication: e.g. Bluetooth, microwave transceivers, laser transceivers, infra-red, Wi-Fi, WiMax, DECT.

Topologies: e.g. star, bus, tree, ring, mesh (fully connected or partially connected), hybrid.
Learning Outcome: 4. I can implement a small-scale local area network.

Components: e.g. wired/wireless Network Interface Card (NIC), wired/wireless transceivers (e.g. modem), data transmission medium, router, switch, server.


Types of networks: e.g. LAN, MAN, WAN, WLAN;
Network topologies: e.g. star, bus, tree, ring, mesh (fully connected or partially connected), hybrid.


Preparation: crimp and test Ethernet cable; test Network Interface Card (ping 127.0.0.1); obtain IPv4 address for computers (ipconfig);
Set up: connect computers (point-to-point or through router, in which case set router to DHCP);
Test: ping computers to confirm data transfer.
Learning Outcome: 5. I understand that networks can be used by different users and so it is important to assign each user a different account with specific sharing permissions according to their needs.


Different standard user groups: e.g. administrator account, limited user account, guest account.
Different sharing permissions: e.g. read, read/write, modify, full control.


Create user groups: e.g. administrator account, limited user account, guest account;
Set up file sharing permissions;
Set up printer sharing;
Test file and printer sharing permissions.
Learning Outcome: 6. I understand the importance of protecting computer networks from threats and can use this understanding to identify and protect a network from such threats.


Malware: e.g. worm, virus, Trojan Horse, spyware, adware, rootkit, ransomware, bug, botnet, tunnelling, time bomb, bacterium, backdoor, logic bomb, rabbit, spoofing, masquerade, sequential scanning, dumpster scanning, digital snooping, key-logger, spam, phishing.


Role of firewalls: e.g. alert and protect networks from unauthorised access, monitoring incoming and outgoing data, allow the user to control which programs can or cannot access the local network and/or internet, provide information of target outgoing server, blacklisting, whitelisting.


Network security threats: e.g. packet sniffers, BYOD, hacking, Denial of Service attack, brute force attacks;
Network protection: e.g. firewall, encryption, restore point, security updates, disk freezing, sand boxing, backup, adware filtering.


Install third-party internet security suite; modify firewall settings to include/exclude a website; run a quick system scan; remove/quarantine a threat from an external storage device; update security keys.