Analyze maintenance types (corrective, adaptive, preventive)
Apply JavaScript loops (for, while, do-while)
Apply mail merge rules (sorting, filtering, conditional fields)
Apply modelling to areas (financial forecasting, climate change)
Apply validation techniques (presence, range, type, length, format, check digit)
Apply video editing techniques (trimming, splicing, titles)
Apply wireless transmission security (WEP, WPA)
Assign database data types (text, numeric, date-time, Boolean)
Compare custom-written and off-the-shelf software
Create and interpret flowcharts
Create animations using variables (position control)
Create data visualization (pivot tables, charts)
Create entity relationship diagrams (conceptual, logical)
Create graphs and charts (bar, pie, line)
Create spreadsheet structures (page setup, headers)
Create vector graphics (Bezier curves, shapes)
Define the digital divide and its causes
Describe batch processing applications (utility bills, payroll)
Describe characteristics of mainframe computers and supercomputers
Describe components and structure of expert systems
Describe control technologies (smart homes, traffic lights, autonomous vehicles)
Describe data mining applications (security, healthcare, security)
Describe data transmission methods (fibre optic, wireless)
Describe disaster recovery strategies
Describe encryption methods (symmetric, asymmetric)
Describe Internet of Things (IoT) applications
Describe malware prevention strategies
Describe mobile communication systems (3G, 4G, 5G)
Describe network components (routers, switches, hubs)
Describe prototyping types (evolutionary, throwaway)
Describe sensor applications in monitoring (weather, healthcare)
Edit bitmap images (selection, correction, resizing)
Evaluate impact of digital divide on individuals and organizations
Evaluate IT impacts on society (healthcare, education, surveillance)
Evaluate quality of information (accuracy, relevance, age, detail, completeness)
Explain calibration techniques (one-point, two-point, multi-point)
Explain cloud computing characteristics and uses
Explain network security methods (encryption, firewalls)
Explain personal data security and confidentiality
Explain real-time processing uses (online booking, traffic control)
Explain technology-enhanced learning (MOOCs, online tutorials)
Explain the need for encryption
Explain utility software functions (anti-virus, backup, disk defragmentation)
Explore medical technology advancements
Explore project management software types
Identify applications of expert systems
Identify direct and indirect data sources
Identify malware types (trojan, worms, spyware, ransomware)
Identify network types (LAN, WAN, VPN, mobile)
Identify sensor types (light, temperature, pressure, humidity, gas)
Identify social networking platforms (blogs, forums, instant messaging)
Identify types of system software (compilers, interpreters, OS, utilities)
Manage system life cycle phases (analysis, design, testing)
Manipulate text in graphics (font style, curves)
Normalize data to third normal form (3NF)
Perform audio editing processes (normalizing, trimming, compression)
Perform data transformation and cleaning
Perform database query operations (create, update, delete)
Perform what-if analysis and goal seek
Test spreadsheet elements (functions, validation, formatting)
Understand animation components (primary, secondary, sound)
Understand autonomous systems (vehicles, drones)
Understand database relationships (one-to-one, one-to-many)
Understand differences between data and information
Understand encryption protocols (TLS/SSL, IPsec)
Understand image compression (lossless, lossy)
Understand JavaScript statements (variables, operators, functions)
Understand mail merge data sources and master documents
Understand network protocols (TCP/IP, HTTP, FTP)
Understand network servers (file, web, mail, proxy)
Understand project life cycle stages (initiation, planning, execution)
Understand software development methods (agile, waterfall, RAD)
Understand types and uses of digital currencies (cryptocurrency, virtual currency)
Use graphics tools (layers, transform, alignment)
Use JavaScript for web interactivity
Use JavaScript timing events (setTimeout, setInterval)
Use project management tools (Gantt charts, PERT charts)
Use pseudocode (INPUT, WRITE, FOR, WHILE)
Use simulations (disaster planning, pilot training)
Use spreadsheet functions (SUM, IF, VLOOKUP, COUNTIF)
Use verification methods (visual checking, double entry, parity check)