Information and Communication Technology

This course prepares students for the digital environment. Using a hands-on approach, students will further develop information and communication technology skills through the use of common business software applications. The concept and operation of e-business will be explored, and students will design and create an e-business website. The skills developed in this course will prepare students for success in the workplace and/or postsecondary studies.


Digital Literacy
• describe the computer workstation environment, using proper terminology;
• apply appropriate strategies when organizing and managing electronic files and folders;
• demonstrate effective use of tools and techniques of electronic research.
 use efficient search techniques to research and solve business-related tasks and problems (e.g., checking facts and figures, locating contact information, looking for career opportunities);
• evaluate information collected from electronic sources for usefulness, accuracy, validity, bias, appropriateness, currency;
• use an accepted citation format (e.g., MLA,APA) to acknowledge electronic sources.

Productivity Software
• demonstrate the use of advanced features of word processing software to produce common business documents;
• demonstrate the ability to use advanced features of spreadsheet software to perform a variety of tasks;
• demonstrate the ability to use the features of a variety of design software applications to perform specific tasks.

Business Communications
• communicate using accepted business standards and formats;
• demonstrate effective use of electronic communication tools;
• create a digital portfolio illustrating their information and communication technology competencies and skills.

• demonstrate an understanding of e-business concepts and operations;
• evaluate the impact of e-business;
• design and create an e-business website for a target audience.
• explain the reasons for protecting information and computer systems, and the methods of protection (e.g., passwords, firewalls, login, anti-virus software) used in standalone and networked environments;
• describe privacy and security issues (e.g., cybercrime, loss of privacy, identity theft, viruses) related to the use of information and communication technology tools;
• identify the security measures that e-businesses provide for consumers (e.g., encryption of credit card information, passwords, user identification).

Information and Communication Technology Ethics and Issues
• demonstrate an understanding of the legal, social, and ethical issues related to information and communication technology;
• analyse privacy and security issues related to conducting business electronically;
• summarize health and environmental issues related to the use of information and communication technology.
• describe the legal issues related to intellectual property law (e.g., copyright, trademarks, domain names);
• adhere to copyright and licensing rules and regulations when accessing information electronically;
• assess the purpose and content of an acceptable use agreement;

The final grade is determined by the following breakdown:
70 % - evaluations made at the end of units throughout the semester. 
30% - final demonstrations of learning (culminating activities and/or final examinations)

There is a direct link between good attendance and success at school.  Students are expected to attend classes regularly and on time.  Evidence of student achievement is gathered during classes through observations and learning conversations.  Learning Skills play an important role in a student’s level of achievement.  Students will be assessed on the following learning skills: responsibility, organization, independent work, collaboration, initiative, and self-regulation.  
Unit 1

This is a Graphic Novel about a brother and sister who start at a new school and learn about privacy risks related to social networking, mobile devices, texting and online gaming.

  • Read first 5 pages and answer the following questions:
    • Who can access your personal information if you don't lock your privacy setting tight?
    • Why is it important to use different passwords for different online sites?
    • Is it always possible to delete a picture or post, permanently, after you've put it online?      

  • Read the rest of the Graphic Novel and answer the rest of these questions:
    • How can little details add up to something big?
    • Discuss how someone can figure out where you live from the information you are posting online.
    • Can posting where you are going to be at certain times turn into a safety issue?
    • Does every new kind of technology pose a privacy risk?
    • What are some good ways to figure out if or how a new technology can pose risks to your online privacy?
    • If you lost your mobile device today and it had no password, what information would you be most worried about?                                                           

10 Tips to Protect Your Privacy Online
  • Think before you click!
  • Know who your friends are
  • Tighten your privacy settings
  • Avoid disclosing your location
  • Don't share your password and change it regularly
  • Trust your instincts
  • Understand new features such as geo-tagging before you try them
  • Be aware of your online reputation
  • Protect your privacy, as well as that of your friends
  • Be discreet
 Quit Social Media                    

Unit 2

What is the INTERNET?


Unit 3

Come Up With Your Dream Computer System

Healthy Computers Presentation - Rob





Steve - Little Shop of Heroes

Mr Valdez,
Mar 8, 2018, 10:19 AM
Mr Valdez,
Mar 8, 2018, 10:21 AM
Mr Valdez,
Mar 8, 2018, 10:21 AM