I = Introduce R = Reinforce IU = Independent User
1. Use the network by: |
K | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
a. Demonstrate appropriate use of log in numbers/names | I | R | R | R | R | R | R | R | R | R | R | R | R |
b. Demonstrate appropriate use of network printing | I | R | R | R | R | R | R | R | R | R | R | R | |
c. Saving files to individual home directories | I | R | R | R | R | R | R | R | R | R | R | IU | |
d. Using multiple storage drives (A:\ , G:\, and S:\) | I | R | R | R | R | R | R | R | R | IU | IU | IU | |
e. Accessing on line information for research | I | R | R | R | IU | IU | IU | IU | IU | IU | |||
f. Accessing information from a directory | I | R | R | R | R | R | R | R | R | IU | |||
g. Sending and receiving electronic mail | I | R | R | IU | IU | IU | IU | IU | |||||
h. Setting up user passwords | I | R | IU | IU | IU | IU | |||||||
i. Knowing the importance of password security | I | R | IU | IU | IU | IU |