Texas Administrative Code
Title 19 - EDUCATION
Part 2 - TEXAS EDUCATION AGENCY
Chapter 130 - TEXAS ESSENTIAL KNOWLEDGE AND SKILLS FOR CAREER AND TECHNICAL EDUCATION
Subchapter K - INFORMATION TECHNOLOGY
Section 130.306 - Networking Lab (One Credit)
Universal Citation: 19 TX Admin Code ยง 130.306
Current through Reg. 49, No. 38; September 20, 2024
(a) General requirements. This course is recommended for students in Grades 10-12. Recommended prerequisites: Principles of Information Technology, Computer Maintenance, and Computer Maintenance Lab. Corequisite: Networking. This course must be taken concurrently with Networking and may not be taken as a stand-alone course. Districts are encouraged to offer this course in a consecutive block with Networking to allow students sufficient time to master the content of both courses. Students shall be awarded one credit for successful completion of this course.
(b) Introduction.
(1) Career and technical education
instruction provides content aligned with challenging academic standards and
relevant technical knowledge and skills for students to further their education
and succeed in current or emerging professions.
(2) The Information Technology (IT) Career
Cluster focuses on building linkages in IT occupations for entry level,
technical, and professional careers related to the design, development,
support, and management of hardware, software, multimedia, and systems
integration services.
(3) In
Networking Lab, students will develop knowledge of the concepts and skills
related to telecommunications and data networking technologies and practices in
order to apply them to personal or career development. To prepare for success,
students must have opportunities to reinforce, apply, and transfer knowledge
and skills to a variety of settings and problems.
(4) Students are encouraged to participate in
extended learning experiences such as career and technical student
organizations and other leadership or extracurricular organizations.
(5) Statements that contain the word
"including" reference content that must be mastered, while those containing the
phrase "such as" are intended as possible illustrative examples.
(c) Knowledge and skills.
(1) The student demonstrates professional
standards/employability skills as required by business and industry. The
student is expected to:
(A) identify and
demonstrate work behaviors that enhance employability and job advancement such
as regular attendance, promptness, attention to proper attire, maintenance of a
clean and safe work environment, appropriate voice, and pride in
work;
(B) identify and demonstrate
positive personal qualities such as flexibility, open-mindedness, initiative,
listening attentively to speakers, and willingness to learn new knowledge and
skills;
(C) employ effective
reading and writing skills;
(D)
employ effective verbal and nonverbal communication skills;
(E) solve problems and think
critically;
(F) demonstrate
leadership skills and function effectively as a team member;
(G) identify and implement proper safety
procedures;
(H) demonstrate an
understanding of legal and ethical responsibilities in relation to the field of
IT; and
(I) demonstrate planning
and time-management skills such as project management, including initiating,
planning, executing, monitoring and controlling, and closing a
project.
(2) The student
identifies various employment opportunities in the IT field. The student is
expected to:
(A) select and research a
specific job area with its accompanying duties and tasks;
(B) formulate a personal career plan along
with the education, job skills, and experience necessary to achieve career
goals; and
(C) develop a
resume.
(3) The student
applies related core academic skills to the requirements of telecommunications
and data network services. The student is expected to:
(A) demonstrate effective verbal and written
communication skills with individuals from varied cultures such as fellow
workers, management, and customers;
(B) complete work orders for repair and
installation;
(C) estimate
supplies, materials, and labor costs on installation, maintenance, and repair
work orders; and
(D) interpret
technical documentation such as schematics, drawings, charts, diagrams,
technical manuals, and bulletins.
(4) The student recognizes and recommends the
various types of network components to address industry needs. The student is
expected to:
(A) analyze various types and
components of networks;
(B) use
knowledge of the characteristics of networks to select the optimum
configuration for an industry solution; and
(C) recommend data network solutions based on
scenario-driven problems.
(5) The student develops a network design
plan. The student is expected to:
(A) produce
necessary documentation required prior to network implementation such as
administrative and test accounts, passwords, Internet Protocol addressing, and
configurations;
(B) analyze the
impact of environmental factors on computer networks;
(C) indicate common peripheral ports and
common network components;
(D)
develop an addressing scheme, including a subnetting chart;
(E) specify the tools that are commonly used
to resolve network equipment problems;
(F) identify vendor testing documentation
such as patches, fixes, and upgrades;
(G) demonstrate awareness of standard backup
procedures and backup media storage practices;
(H) distinguish between common types of
telecommunications and data network cabling;
(I) identify the factors that might affect
performance in a network environment such as logic or frequency spectrum
interference; and
(J) research new
and emerging technologies that may affect the field of telecommunications and
data networking services.
(6) The student implements a data network
plan. The student is expected to:
(A)
demonstrate awareness of compatibility and cabling issues;
(B) implement an addressing scheme, including
a subnet;
(C) install various types
of data connectors and cabling used in computer networking and data
communications;
(D) connect various
types of data connectors and cabling used in computer networking and data
communications;
(E) troubleshoot
physical and logical indicators of trouble;
(F) employ a systematic approach to identify
a network problem, distinguish between operator or system error, and select the
appropriate steps to correct the error;
(G) determine the cause of a problem and
select the appropriate corrective action for the network problem; and
(H) maintain a hierarchical structure for the
storing and organizing of data on networks.
(7) The student implements network security
systems. The student is expected to:
(A)
assess potential security threats to information systems;
(B) identify the range of security needs and
the problems that can occur on a data network due to security lapses;
(C) define and identify unethical practices
such as hacking, phone fraud, online piracy, and data vandalism;
(D) evaluate issues related to privacy,
depersonalization, and government control of data communications;
(E) develop and implement a network security
plan; and
(F) identify the role
that network components such as routers, firewalls, intrusion detection
systems, and virtual private networks play in security.
(8) The student knows the function and
application of the tools, equipment, technologies, and materials used in
telecommunications services. The student is expected to:
(A) demonstrate safe use of equipment
commonly employed in telecommunications services such as hand and power tools;
and
(B) demonstrate proper handling
and disposal of environmentally hazardous materials used in telecommunications
services.
(9) The
student provides support to computer users to maintain service. The student is
expected to:
(A) develop a written disaster
recovery plan; and
(B) develop a
written preventive maintenance plan.
Disclaimer: These regulations may not be the most recent version. Texas may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google
Privacy Policy and
Terms of Service apply.