Texas Administrative Code
Title 19 - EDUCATION
Part 2 - TEXAS EDUCATION AGENCY
Chapter 130 - TEXAS ESSENTIAL KNOWLEDGE AND SKILLS FOR CAREER AND TECHNICAL EDUCATION
Subchapter K - INFORMATION TECHNOLOGY
Section 130.306 - Networking Lab (One Credit)

Current through Reg. 49, No. 38; September 20, 2024

(a) General requirements. This course is recommended for students in Grades 10-12. Recommended prerequisites: Principles of Information Technology, Computer Maintenance, and Computer Maintenance Lab. Corequisite: Networking. This course must be taken concurrently with Networking and may not be taken as a stand-alone course. Districts are encouraged to offer this course in a consecutive block with Networking to allow students sufficient time to master the content of both courses. Students shall be awarded one credit for successful completion of this course.

(b) Introduction.

(1) Career and technical education instruction provides content aligned with challenging academic standards and relevant technical knowledge and skills for students to further their education and succeed in current or emerging professions.

(2) The Information Technology (IT) Career Cluster focuses on building linkages in IT occupations for entry level, technical, and professional careers related to the design, development, support, and management of hardware, software, multimedia, and systems integration services.

(3) In Networking Lab, students will develop knowledge of the concepts and skills related to telecommunications and data networking technologies and practices in order to apply them to personal or career development. To prepare for success, students must have opportunities to reinforce, apply, and transfer knowledge and skills to a variety of settings and problems.

(4) Students are encouraged to participate in extended learning experiences such as career and technical student organizations and other leadership or extracurricular organizations.

(5) Statements that contain the word "including" reference content that must be mastered, while those containing the phrase "such as" are intended as possible illustrative examples.

(c) Knowledge and skills.

(1) The student demonstrates professional standards/employability skills as required by business and industry. The student is expected to:
(A) identify and demonstrate work behaviors that enhance employability and job advancement such as regular attendance, promptness, attention to proper attire, maintenance of a clean and safe work environment, appropriate voice, and pride in work;

(B) identify and demonstrate positive personal qualities such as flexibility, open-mindedness, initiative, listening attentively to speakers, and willingness to learn new knowledge and skills;

(C) employ effective reading and writing skills;

(D) employ effective verbal and nonverbal communication skills;

(E) solve problems and think critically;

(F) demonstrate leadership skills and function effectively as a team member;

(G) identify and implement proper safety procedures;

(H) demonstrate an understanding of legal and ethical responsibilities in relation to the field of IT; and

(I) demonstrate planning and time-management skills such as project management, including initiating, planning, executing, monitoring and controlling, and closing a project.

(2) The student identifies various employment opportunities in the IT field. The student is expected to:
(A) select and research a specific job area with its accompanying duties and tasks;

(B) formulate a personal career plan along with the education, job skills, and experience necessary to achieve career goals; and

(C) develop a resume.

(3) The student applies related core academic skills to the requirements of telecommunications and data network services. The student is expected to:
(A) demonstrate effective verbal and written communication skills with individuals from varied cultures such as fellow workers, management, and customers;

(B) complete work orders for repair and installation;

(C) estimate supplies, materials, and labor costs on installation, maintenance, and repair work orders; and

(D) interpret technical documentation such as schematics, drawings, charts, diagrams, technical manuals, and bulletins.

(4) The student recognizes and recommends the various types of network components to address industry needs. The student is expected to:
(A) analyze various types and components of networks;

(B) use knowledge of the characteristics of networks to select the optimum configuration for an industry solution; and

(C) recommend data network solutions based on scenario-driven problems.

(5) The student develops a network design plan. The student is expected to:
(A) produce necessary documentation required prior to network implementation such as administrative and test accounts, passwords, Internet Protocol addressing, and configurations;

(B) analyze the impact of environmental factors on computer networks;

(C) indicate common peripheral ports and common network components;

(D) develop an addressing scheme, including a subnetting chart;

(E) specify the tools that are commonly used to resolve network equipment problems;

(F) identify vendor testing documentation such as patches, fixes, and upgrades;

(G) demonstrate awareness of standard backup procedures and backup media storage practices;

(H) distinguish between common types of telecommunications and data network cabling;

(I) identify the factors that might affect performance in a network environment such as logic or frequency spectrum interference; and

(J) research new and emerging technologies that may affect the field of telecommunications and data networking services.

(6) The student implements a data network plan. The student is expected to:
(A) demonstrate awareness of compatibility and cabling issues;

(B) implement an addressing scheme, including a subnet;

(C) install various types of data connectors and cabling used in computer networking and data communications;

(D) connect various types of data connectors and cabling used in computer networking and data communications;

(E) troubleshoot physical and logical indicators of trouble;

(F) employ a systematic approach to identify a network problem, distinguish between operator or system error, and select the appropriate steps to correct the error;

(G) determine the cause of a problem and select the appropriate corrective action for the network problem; and

(H) maintain a hierarchical structure for the storing and organizing of data on networks.

(7) The student implements network security systems. The student is expected to:
(A) assess potential security threats to information systems;

(B) identify the range of security needs and the problems that can occur on a data network due to security lapses;

(C) define and identify unethical practices such as hacking, phone fraud, online piracy, and data vandalism;

(D) evaluate issues related to privacy, depersonalization, and government control of data communications;

(E) develop and implement a network security plan; and

(F) identify the role that network components such as routers, firewalls, intrusion detection systems, and virtual private networks play in security.

(8) The student knows the function and application of the tools, equipment, technologies, and materials used in telecommunications services. The student is expected to:
(A) demonstrate safe use of equipment commonly employed in telecommunications services such as hand and power tools; and

(B) demonstrate proper handling and disposal of environmentally hazardous materials used in telecommunications services.

(9) The student provides support to computer users to maintain service. The student is expected to:
(A) develop a written disaster recovery plan; and

(B) develop a written preventive maintenance plan.

Disclaimer: These regulations may not be the most recent version. Texas may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.