Download presentation
Presentation is loading. Please wait.
Published byBrian Shelton Modified over 8 years ago
1
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Best Practices IT Essentials 5.0
2
Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Today’s Agenda Ideas for each chapter Resources Teaching Tools Lab setup Projects
3
Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Course Chapters and Goals Ch. 1Introduction to the Personal Computer Goal::Describe a personal computer system Ch. 7Laptops Goal: Describe how laptops are constructed, basic configuration, maintenance, and troubleshooting. Ch. 2Lab Procedures and Tool Use Goal: Demonstrate safe lab procedures and proper tool use. Ch. 8Mobile Devices Goal: Describe operating systems, basic configuration, maintenance, security, and repair for mobile devices. Ch. 3Computer Assembly Goal: Demonstrate safe lab procedures and proper tool use. Ch. 9Printers Goal: Demonstrate range of procedures required for printers. Ch. 4Overview of Preventative Maintenance and Troubleshooting Goal: Explain the basic rules of preventive maintenance and the troubleshooting process. Ch. 10Security Goal: Explain importance of security, describe procedures, and perform security measures. Ch. 5Operating Systems Goal: Install, upgrade, navigate and troubleshoot various operating systems. Ch. 11The IT Professional Goal: Describe the communication and related skills needed by an IT professional. Ch. 6Networks Goal: Describe, create and maintain a network. Ch. 12Advanced Troubleshooting Goal: Perform advanced troubleshooting procedures on computers, operating systems, laptops, printers, and networks.
4
Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 1: Introduction to the Personal Computer http://pcpartpicker.com/ http://pcpartpicker.com/
5
Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 2: Lab Procedures and Tool Use Group 1’s “We Do It By The Book, (and if there is no book we write one to follow!)” Develop 6 General / High Level Rules to follow to prevent injury when working on or with computers (or anywhere for that matter) Set up work area 1 so that it demonstrates a proper environment for working on a computer. Use any materials in the classroom including tools. Group 2’s “The Three Stooges” Develop 6 General / High Level Rules that will make it likely someone will get hurt on the job working with or on computers. Set up work area 2 so that it demonstrates a really bad environment for working on a computer. Use any materials in the classroom including tools. ONLY LIMIT – do not plug anything in!!!!! Hang up your rules on the wall with push pins – your going to have to explain them Submitted by Scott Kaufman– Frisco Liberty HS
6
Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 3: Computer Assembly Build their own PC and use it the rest of the year KVM switches
7
Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 4: Overview of Preventative Maintenance and Troubleshooting
8
Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 5: Operating Systems VM Ware Windows 7 licenses?
9
Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 6: Networks Packet Tracer
10
Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 7: Laptops
11
Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 7: Laptops (cont)
12
Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 8: Mobile Devices
13
Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 9: Printers Kinesthetic activity for the steps of Laser Printing process (Kim Biggerstaff – Frisco Heritage HS)
14
Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 10: Security National Treasure
15
Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 11: The IT Professional Middle Ages IT Middle Ages IT Nick Burns Nick Burns Role Play
16
Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Ch. 12: Advanced Troubleshooting
17
Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Skills Test Submitted by Eric Bockler – Frisco Centennial HS
18
Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Resources Community.netacad.net Community.netacad.net Log into Netacad – Choose Community > IT Essentials > Files
19
Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Resources (cont) http://www.gcflearnfree.org/computerbasics http://www.gcflearnfree.org/computerbasics TechRepublic TechRepublic Bill Detweiler - TR DOJO Bill Detweiler - TR DOJO Cnet.com Cnet.com Techopedia – IT Dictionary Techopedia – IT Dictionary
20
Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Teaching Tools Polleverywhere Polleverywhere CPS questions instruction CPS questions instruction Remind101 Remind101 Socrative Socrative Edmodo Edmodo Moodle- polls and blog https://fisdstudentlearninghub.com/
21
Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Lab Setup
22
Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Projects Black History Month CTE Recruitment Posters
23
Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Certifications CompTIA A+ Strata Strata MTA MTA
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.