Advanced Search

Royal Decree 1691 / 2007, Of December 14, Which Establishes The Title Of Technician In With And Networks And Fix Their Minimum Educations.

Original Language Title: Real Decreto 1691/2007, de 14 de diciembre, por el que se establece el título de Técnico en Sistemas Microinformáticos y Redes y se fijan sus enseñanzas mínimas.

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

TEXT

Organic Law 2/2006, of 3 May, of Education, provides in Article 39.6 that the Government, after consulting the Autonomous Communities, will establish the qualifications corresponding to the vocational training studies, thus as the basic aspects of the curriculum for each of them. The Organic Law of June 19, of the Qualifications and Vocational Training, establishes in Article 10.1 that the General Administration of the State, in accordance with the provisions of Article 149.1.30. and 7. of the Constitution and After consulting the General Council of Vocational Training, it shall determine certificates of professional qualifications and certificates, which shall constitute the offers of vocational training referred to in the National Catalogue of Professional Qualifications. Royal Decree 1538/2006, of 15 December, has established the general organisation of vocational training of the educational system and defines in Article 6 the structure of vocational training qualifications based on the National Catalogue. Professional qualifications, guidelines laid down by the European Union and other aspects of social interest. Moreover, in the same way, the professional profile of those titles, which will include general competence, professional, personal and social skills, qualifications and, where appropriate, the units of competence, is given in Article 7. of the National Catalogue of Professional Qualifications included in the titles, so that each degree will incorporate, at least, a complete professional qualification, in order to ensure that, in fact, the vocational training qualifications meet the needs demanded by the productive system and the personal and social values to exercise democratic citizenship. This regulatory framework makes it necessary for the Government, after consulting the Autonomous Communities, to establish each of the titles which will form the catalogue of titles of vocational training of the educational system, its minimum teaching and those other aspects of academic management which, without prejudice to the competences conferred on the educational administrations in this field, constitute the basic aspects of the curriculum which ensure a common training and guarantee validity of the securities, in compliance with the provisions of Article 6. 2 of the Organic Law 2/2006, of 3 May, of Education. To this end, it is appropriate to identify, for each title, their identification, their professional profile, the professional environment, the prospective of the title in the sector or sectors, the teaching of the training cycle, the correspondence of the professional modules with the units of competence for their accreditation, validation or exemption, the basic parameters of the training context for each professional module: spaces, necessary equipment, qualifications and specialties of the teachers and their equivalences for the purposes of teaching, after consultation with the Autonomous Communities, provided for in Article 95 of the Organic Law 2/2006 of 3 May of Education. In addition, the access to other studies and, where appropriate, the forms and subjects of baccalaureate which facilitate the connection with the higher education cycle, the convalidations, exemptions and equivalences and the equivalence and the information on the requirements necessary in accordance with the legislation in force for the professional year, where appropriate. Thus, the present royal decree, as provided for in Royal Decree 1538/2006 of 15 December, lays down and regulates, in the basic aspects and elements mentioned above, the professional training of the Technical Education System in Microcomputer systems and networks. In the process of drawing up this royal decree, the Autonomous Communities have been consulted and the General Council of Vocational Training, the School Council of the State and the Ministry of Public Administration have issued a report. In its virtue, on a proposal from the Minister for Education and Science and after deliberation by the Council of Ministers at its meeting on 14 December 2007,

D I S P O N G O:

CHAPTER I

General provisions

Article 1. Object.

1. The purpose of this royal decree is to establish the title of Technician in Microcomputer Systems and Networks, with official character and validity throughout the national territory, as well as their corresponding minimum teachings.

2. The provisions of this royal decree replace the regulation of the title of Technician in the Exploitation of Computer Systems, contained in Royal Decree 497/2003, of May 2.

CHAPTER II

Identification of title, professional profile, professional and prospective title of the title in the sector or sectors

Article 2. Identification.

The title of Technician in Microcomputer Systems and Networks is identified by the following elements: Denomination: Microcomputer Systems and Networks.

Level: Middle Grade Professional Training. Duration: 2,000 hours. Professional Family: Informatics and Communications. European Reference: CINE-3 (International Standard Classification of Education).

Article 3. Professional profile of the title.

The professional profile of the title of Technician in Microcomputer Systems and Networks is determined by his general competence, his professional, personal and social competences, and by the relationship of qualifications and, where appropriate, units of competence of the National Catalogue of Professional Qualifications included in the title.

Article 4. General competence.

The general competence of this title is to install, configure and maintain microcomputer systems, isolated or networked, as well as local networks in small environments, ensuring their functionality and applying the quality, safety and respect for the established environment.

Article 5. Professional, personal and social skills.

The professional, personal and social competencies of this title are as follows: a) Determine the logistics associated with the operations of installation, configuration and maintenance of systems microcomputer, interpreting the associated technical documentation and organizing the necessary resources.

b) Set up and configure computers and peripherals, ensuring their operation under quality and safety conditions. c) Install and configure basic and application software, ensuring its operation in quality and safety conditions. d) Repose the wiring and electronics of local networks in small environments and their connection to extensive area networks by channeling at a higher level the assumptions that require it. e) Install and configure local wired, wireless or mixed networks and their connection to public networks, ensuring their functioning under conditions of quality and safety. f) Install, configure and maintain multi-user services, applications and shared devices in a local network environment, addressing the needs and requirements specified. (g) Perform functional tests on micro-computer systems and local networks, locating and diagnosing dysfunctions, to check and adjust their operation. h) Maintain microcomputer systems and local networks, replacing, updating and adjusting their components, to ensure system performance under quality and safety conditions. i) Run established data and application recovery procedures against data failures and losses in the system, to ensure the integrity and availability of the information. (j) Develop technical and administrative documentation of the system, in compliance with the rules and regulations of the sector, for its maintenance and assistance to the client. k) Develop systems budgets tailored to meet the requirements of the client. (l) Assessor and assist the client, channeling at a higher level the assumptions that require it, in order to find appropriate solutions to the needs of the client. (m) Organising and developing the work assigned to it by maintaining appropriate professional relationships in the working environment. (n) Maintain a constant spirit of innovation and updating in the field of the IT sector.) Use the available means of consultation, by selecting the most appropriate in each case, to resolve in reasonable time not known and professional doubts. (o) Apply the protocols and standards of safety, quality and respect for the environment in the interventions made. (p) Meet the objectives of the production, collaborating with the work team and acting in accordance with the principles of responsibility and tolerance. q) Adapting to different jobs and new employment situations caused by technological and organizational changes in production processes. (r) Solve problems and take individual decisions in accordance with the established rules and procedures defined within the scope of their competence. (s) exercise their rights and comply with obligations arising from employment relations, in accordance with the provisions of the legislation in force. t) Manage your career, analyzing job opportunities, self-employment and learning. (u) Create and manage a small business, carrying out a product feasibility study, production planning and marketing. v) Take an active part in economic, social and cultural life, with a critical and responsible attitude.

Article 6. Relationship of qualifications and competence units of the National Catalogue of Professional Qualifications included in the title.

Full professional qualifications: a) Microcomputer systems IFC078_2 (Royal Decree 295/2004, 20 February), comprising the following units of competence: UC0219_2: Install and configure base software on systems microcomputer.

UC0220_2: Install, configure, and verify local network elements according to established procedures. UC0221_2: Install, configure, and maintain general purpose computer packages and specific applications. UC0222_2: Facilitate the use of general purpose computer packages and specific applications to the user.

b) Assembly and repair of microcomputer systems IFC298_2 (Royal Decree 1201/2007, 14 September), comprising the following units of competence:

UC0953_2: Mount microcomputer equipment.

UC0219_2: Install and configure base software on microcomputer systems. UC0954_2: Repair and expand microcomputer equipment.

c) Operation of departmental networks IFC299_2 (Royal Decree 1201/2007, 14 September), comprising the following units of competence:

UC0220_2: Install, configure, and verify local network elements according to preset procedures.

UC0955_2: Monitor local network communications processes. UC0956_2: Perform connection processes between private networks and public networks.

d) Operation of computer systems IFC300_2 (Royal Decree 1201/2007, 14 September), comprising the following units of competence:

UC0219_2: Install and configure base software on microcomputer systems.

UC0957_2: Maintain and regulate the physical subsystem on computer systems. UC0958_2: Run administration and maintenance procedures on the base and client application software. UC0959_2: Maintain the security of physical and logical subsystems on computer systems.

Article 7. Professional environment.

1. This professional exercises its activity mainly in companies in the service sector that are dedicated to the marketing, assembly and repair of equipment, networks and microcomputer services in general, as part of the IT support of the organization or in entities of any size and productive sector that use microcomputer systems and data networks for their management.

2. The most relevant occupations and jobs are as follows:

Computer equipment repair technician.

IT Support Technician. Data network technician. Repair of peripherals of microcomputer systems. Microcomputer commercial. Tele-assistance operator. System operator.

Article 8. Prospective of the title in the sector or sectors.

The educational administrations will take into account, when developing the corresponding curriculum, the following considerations: 1. The professional profile of this title, within the service sector, evolves towards a very technical specialised in the solution of common problems in micro-computer systems and local networks, in small environments.

2. Technological developments tend to be more and more economic systems; this, together with the coverage of Internet access, leads to computer systems being considered as a resource in the home and technical assistance tends to be the domicile itself. 3. Tele-operation, remote technical assistance, "on-line" assistance and tele-centres are configured as an essential element in the response to the demand for technical assistance. 4. The assembly and maintenance tasks will have to be adapted to the regulations on the treatment and management of residues and pollutants. 5. The large number of small enterprises in the sector increases the need for this professional to intervene in trade tasks, also participating in administrative level tasks. 6. The active presence of companies on the Internet is increasing progressively the number of transactions made by this means, which makes this profile increasingly demanded to collaborate in the installation and maintenance of services. on the network. 7. Due to the rapid advances and technological changes of the sector, professionals are required in which they make essential attitudes towards self-training.

CHAPTER III

Formative cycle teachings and basic context parameters

Article 9. General objectives.

The general objectives of this training cycle are to: (a) Organise the physical and logical components that form a microcomputer system, interpreting their technical documentation, to apply the means and methods suitable for installation, assembly and maintenance.

b) Identify, assemble and connect components and peripherals using the appropriate tools, applying quality and safety procedures, standards and protocols, to assemble and configure computers and peripherals. c) Recognize and implement the procedures for the installation of operating systems and application programs, applying quality protocols, to install and configure microcomputer systems. d) Represent the position of the equipment, transmission lines and other elements of a local network, analyzing the morphology, conditions and characteristics of the deployment, in order to reframe the wiring and the electronics of the network. (e) Locate and fix equipment, lines, pipes and other elements of a local wired, wireless or mixed network, applying quality and safety assembly procedures and protocols, to install and configure local networks. f) Interconnect computer equipment, local network devices and connection with extensive area networks, running the procedures to install and configure local networks. g) Locate and repair breakdowns and dysfunctions in the physical and logical components to maintain microcomputer systems and local networks. h) Replace and adjust physical and logical components to maintain microcomputer systems and local networks. (i) Interpreting and selecting information for technical and administrative documentation. j) Value the cost of physical, logical and labor components to prepare budgets. k) Recognize characteristics and possibilities of physical and logical components, to advise and assist clients. l) Detect and analyze technological changes to choose new alternatives and stay updated within the sector. m) Recognize and assess incidents, determine their causes and describe corrective actions to resolve them. (n) Analyze and describe quality procedures, prevention of occupational and environmental risks, pointing out the actions to be taken in the cases defined to act in accordance with standardised standards. a productive process, identifying its contribution to the overall process to achieve the objectives of production. (o) Identify and assess learning and employment opportunities, analyzing job market offers and demands to manage their career. p) Recognize business opportunities, identifying and analyzing market demands to create and manage a small business. q) Recognize their rights and duties as an active agent in society, analyzing the legal framework that regulates social and working conditions to participate as a democratic citizen.

Article 10. Professional modules.

1. The professional modules of this training cycle: a) They are developed in Annex I of this royal decree, complying with the provisions of article 14 of Royal Decree 1538/2006, of December 15.

b) These are the following:

0221. Assembly and maintenance of equipment.

0222. Monopposite operating systems. 0223. Office-based applications. 0224. Network operating systems. 0225. Local networks. 0226. Computer security. 0227. Network services. 0228. Web applications. 0229. Training and career guidance. 0230. Company and business initiative. 0231. Training in job centres.

2. The educational authorities shall establish the corresponding curricula in accordance with this royal decree and in accordance with the provisions of Article 17 of Royal Decree 1538/2006 of 15 December establishing the general management of vocational training in the education system.

Article 11. Spaces and equipment.

1. The spaces necessary for the development of the teachings of this formative cycle are those set out in Annex II of this royal decree.

2. The spaces will have the necessary and sufficient surface to develop the teaching activities that are derived from the learning outcomes of each of the professional modules that are taught in each of the spaces. must meet the following conditions:

(a) The surface will be established according to the number of people who occupy the training space and should allow the development of the teaching-learning activities with the "ergonomics" and the required mobility within it.

b) Cover the spatial need for furniture, equipment and auxiliary work instruments, as well as the observation of the spaces or surfaces of safety of the machines and equipment in their operation. (c) comply with the regulations on the prevention of occupational risks, safety and health at the workplace and how many other rules apply to them.

3. The established training spaces can be occupied by different groups of students who are studying the same or other educational courses, or educational stages.

4. The different learning spaces identified must not necessarily be differentiated by means of closure. 5. The equipment included in each space must be the necessary and sufficient to guarantee the acquisition of the learning results and the quality of the teaching to the students according to the system of quality adopted. meet the following conditions:

(a) The equipment (equipment, machines, etc.) will have the necessary installation for its proper operation, comply with the safety and risk prevention standards and with the other applicable.

(b) The quantity and characteristics of the equipment must be based on the number of pupils and enable the acquisition of the learning outcomes, taking into account the evaluation criteria and the content included in each of the professional modules that are delivered in the aforementioned spaces.

6. The competent authorities shall ensure that the spaces and equipment are adequate in quantity and characteristics for the development of the teaching and learning processes resulting from the learning outcomes of the modules. and thus guarantee the quality of these teachings.

Article 12. Teachers.

1. The teaching of the vocational modules which constitute the teaching of this training cycle corresponds to the teachers of the Secondary Teaching Teachers 'Corps and the Technical Teachers' Corps of Vocational Training, according to (a) of the specialties set out in Annex III (A) to this royal decree.

2. The qualifications required for teachers in the teaching bodies are, in general, those laid down in Article 13 of Royal Decree 276/2007 of 23 February 2007. The equivalent qualifications, for the purposes of teaching, to the former are, for the different specialties of the teachers, the ones listed in Annex III B) of the present royal decree. 3. The required qualifications and the necessary requirements for the delivery of the professional modules that make up the title for the faculty of the centers of private ownership or public ownership of other administrations other than education is given in Annex III C) of the present royal decree, provided that the teachings leading to the qualification fall within the objectives of the professional modules or are accredited, by means of "certification", a work experience of, less than three years, in the sector related to the professional family, carrying out activities productive in companies implicitly related to learning outcomes. 4. The competent authorities shall ensure that the teachers provided by the professional modules comply with the specified requirements and thus guarantee the quality of these lessons.

CHAPTER IV

Accesses and links to other studies, and correspondence of professional modules with the competition units

Article 13. Access to other studies.

1. The title of Technician in Microcomputer Systems and Networks allows direct access to cure any other formative cycle of medium degree, in the conditions of access that are established.

2. The title of Technician in Microcomputer Systems and Networks will allow access by proof, with eighteen years completed, and without prejudice to the corresponding exemption, to all the higher education courses of the same professional family and to other training cycles in which the Baccalaureate modality is the same as facilitating the connection with the cycles requested. 3. The title of Technician in Microcomputer Systems and Networks will allow access to any of the Baccalaureate modalities in accordance with the provisions of Article 44.1 of the Organic Law 2/2006, of May 3, of Education, and in Article 16.3 of Royal Decree 1538/2006 of 15 December.

Article 14. Convalidations and exemptions.

1. The convalidations of professional modules of the professional qualifications established under the Organic Law 1/1990, of 3 October, of General Ordination of the Educational System, with the professional modules of the established titles under the Organic Law 2/2006, of May 3, of Education, are set out in Annex IV of this royal decree.

2. Professional modules, common to several training cycles, of the same name, contents, objectives expressed as learning outcomes, evaluation criteria and similar duration, will be the subject of validation. However, in accordance with Article 45.2 of Royal Decree 1538/2006 of 15 December, those who have passed the vocational training and guidance module or the business module of Empresa and Empresa any of the training cycles corresponding to the securities established under the Organic Law 2/2006 of 3 May of Education shall be validated by such modules in any other training cycle established under the same law. 3. The vocational training and guidance module of any vocational training title may be subject to validation provided that the requirements laid down in Article 45.3 of Royal Decree 1538/2006, of 15 December 2006, are fulfilled. December, at least one year of work experience, and the certificate of Technical in Prevention of Occupational Risks, Basic Level, issued in accordance with the provisions of Royal Decree 39/1997 of 17 January, for which I know approves the Regulation of the Prevention Services. 4. In accordance with Article 49 of Royal Decree 1538/2006 of 15 December 2006, the total or partial exemption of the vocational training module may be determined in respect of the work experience, provided that there is evidence of an experience related to this training cycle in the terms set out in that Article.

Article 15. Correspondence of professional modules with the units of competence for their accreditation, validation or exemption.

1. The correspondence of the units of competence with the professional modules which form the teaching of the title of Technician in Microcomputer Systems and Networks for validation or exemption is determined in Annex V A) of this real decree.

2. The correspondence of the professional modules which form the teaching of the title of Technician in Microcomputer Systems and Networks with the units of competence for their accreditation, is determined in Annex V B) of this royal decree.

Additional disposition first. Title reference in the European framework.

Once the national qualifications framework has been established, in accordance with the European recommendations, the corresponding level of this qualification will be determined in the national framework and its equivalent in the European framework.

Additional provision second. Distance offer of this title.

The professional modules that form the teaching of this training cycle can be offered at a distance, provided that it is guaranteed that the student can achieve the learning outcomes of the same, according to the in the present royal decree. To this end, the educational authorities, within the scope of their respective powers, shall take the necessary measures and shall prescribe the precise instructions.

Additional provision third. Equivalent qualifications and links with vocational training.

1. The title of Technician in the Exploitation of Computer Systems, established by Royal Decree 497/2003, of May 2 will have the same professional and academic effects as the title of Technician in Microcomputer Systems and Networks established in the present royal decree.

2. The training provided in this royal decree in the vocational training and guidance module is capable of carrying out professional responsibilities equivalent to those required by basic level activities in the field of risk prevention. In the case of the Commission, the Commission has decided to take the necessary measures to ensure that the aid is granted to the State in which the aid is granted.

Additional provision fourth. Regulation of the exercise of the profession.

1. In accordance with the provisions of Royal Decree 1538/2006 of 15 December establishing the general organisation of the vocational training of the education system, the elements set out in this royal decree do not constitute a Regulation of the exercise of the profession.

2. Similarly, the equivalences of academic qualifications provided for in paragraph 1 of the third provision of this royal decree shall be without prejudice to the provisions which they enable for the exercise of the right to regulated professions.

Additional provision fifth. Equivalences for the purposes of teaching in the selective procedures of admission into the Technical Teachers ' Corps of Vocational Training.

It is declared equivalent for the purposes of teaching the qualifications of Technical Specialist and Senior Technician in a professional training specialty, provided that a teaching experience is accredited in the same one, at least two years in public educational institutions that are dependent on the convening educational administration, completed at 31 August 2007.

Additional provision sixth. Universal accessibility in the teachings of this title.

In the field of their respective competences, the educational authorities will include in the curriculum of this training cycle the elements necessary to ensure that the people who are cured develop the skills included in the curriculum in design for all.

In addition, such administrations shall take the measures they deem necessary to enable this student to access and to pursue such a training cycle under the conditions laid down in the final provision of Law 51/2003, of 2 of December, equal opportunities, non-discrimination and universal accessibility for people with disabilities.

Single repeal provision. Repeal of rules.

All the provisions of equal or lower rank are repealed and all are opposed to the provisions of this royal decree.

Final disposition first. Competence title.

This royal decree is of a basic standard, under the powers conferred on the State by Article 149.1.1. and the 30th of the Constitution. Article 13.2 is exempted from the basic rule.

Final disposition second. Implementation of the Title.

The educational administrations will implement the new curriculum of these teachings in the 2009/2010 school year. However, the implementation of this training cycle may be anticipated for the academic year 2008/2009.

Final disposition third. Entry into force.

This royal decree will enter into force on the day following its publication in the "Official State Gazette".

Given in Madrid, on December 14, 2007.

JOHN CARLOS R.

The Minister of Education and Science, MERCEDES CABRERA CALVO-SOTELO

ANNEX I

PROFESSIONAL MODULES

Professional Module: Assembly and Equipment Maintenance

Code: 0221

Learning results and evaluation criteria.

1. It selects the integration components of a standard microcomputer equipment, describing its functions and comparing the capabilities of different manufacturers.

Assessment Criteria:

a) The blocks that make up a microcomputer equipment and their functions have been described.

b) The bus architecture has been recognized. c) The characteristics of the types of microprocessors (frequency, voltages, power, sockets, among others) have been described. d) The function of the dissipators and fans has been described. e) The most important features and utilities of the motherboard configuration have been described. f) Chassis types have been evaluated for the motherboard and other components. g) Basic components (memory modules, fixed disks and their controllers, auxiliary memory supports, among others) have been identified and manipulated. h) The function of the graphical adapter and monitor has been analyzed. i) Different adapters have been identified and manipulated (graphics, LAN, modems, among others). j) The elements that accompany an integration component (documentation, drivers, cables, and utilities, among others) have been identified.

2. It assembles a microcomputer equipment, interpreting drawings and instructions from the manufacturer applying assembly techniques.

Assessment Criteria:

a) The tools and tools necessary for the assembly of microcomputer equipment have been selected.

b) The technical documentation of all components to be assembled has been interpreted. c) The system of opening/closing of the chassis and the various systems of attachment to assemble-disassemble the elements of the equipment has been determined. d) Different base plate assemblies, microprocessor and cooling elements have been assembled in different chassis models, according to the given specifications. e) The RAM memory modules, fixed disks, read/write units on auxiliary memory media, and other components have been assembled. f) Basic parameters of the set are configured by accessing the base board configuration. g) Check and diagnostic utilities have been executed to verify the capabilities of the assembly assembly. h) A mount report has been made.

3. It measures electrical parameters, identifying the type of signal and relating it to its characteristic units.

Assessment Criteria:

a) The type of signal to be measured with the corresponding apparatus has been identified.

b) The magnitude, measurement range, and apparatus has been selected according to the magnitude to be measured. c) The measurement obtained with the typical values has been related. d) The blocks of a power supply (F.A.) have been identified for a personal computer. e) The tensions provided by a typical F.A. have been listed. f) The tensions in F.A. typical of personal computers have been measured. g) The blocks of an uninterrupted power supply system have been identified. h) The signals have been measured at the significant points of a SAI.

4. It maintains computer equipment by interpreting the recommendations of the manufacturers and relating the dysfunctions to its causes.

Assessment Criteria:

a) The acoustic and/or visual signals that warn of problems on the hardware of a computer have been recognized.

b) Failures caused by overheating of the microprocessor have been identified and solved. c) Typical breakdowns of a microcomputer equipment (bad component connection, incompatibilities, fixed disk problems, dirt, among others) have been identified and solved. (d) Impaired components have been replaced. e) The compatibility of the substituted components has been verified. f) Component updates and extensions have been made. g) Reports of breakdown (repair or extension) have been developed.

5. Installs software on a computer using an image stored on a memory medium and justifying the procedure to follow.

Assessment Criteria:

a) The difference between a standard installation and a software preinstallation has been recognized.

b) Different configurable boot sequences have been identified and tested on the motherboard. c) Teams have been initialized from different auxiliary memory media. d) Images of a software preinstallation have been made. e) Images on the fixed disk have been restored from different media. f) The utilities for partition/disk image creation have been described.

6. It recognizes new trends in the assembly of microcomputer equipment describing its advantages and adapting them to the characteristics of the use of the equipment.

Assessment Criteria:

a) New possibilities have been recognized to shape the base plate-base assembly.

b) The performance and characteristics of some of the semi-assembled platforms ("barebones") have been described more representative of the moment. c) The characteristics of multimedia entertainment computers (HTPC), chassis and specific components used in their assembly have been described. (d) The differential characteristics required by computer equipment used in other specific fields of application have been described. e) The presence of mobile computing has been evaluated as an emerging market, with high demand in equipment and devices with specific characteristics: mobile, PDA, browsers, among others. f) The presence of modding has been evaluated as an alternative to the assembly of microcomputer equipment.

7. It maintains peripherals, interpreting the recommendations of equipment manufacturers and relating dysfunctions to their causes.

Assessment Criteria:

a) Mechanical problems have been identified and fixed in standard printing peripherals.

b) Consumables have been replaced in standard print peripherals. c) Mechanical problems have been identified and solved in entry peripherals. d) The characteristics and capabilities of the digital image capture peripherals, fixed and moving with their possible applications have been associated. e) The characteristics and performance of other multimedia peripherals have been associated with their possible applications. (f) The uses and areas of application of photocopying equipment, professional digital printing and filmed have been recognised. g) Preventive maintenance techniques have been applied to peripherals.

8. It complies with the standards of occupational risk prevention and environmental protection, identifying the associated risks, measures and equipment to prevent them.

Assessment Criteria:

(a) The risks and level of danger posed by the handling of materials, tools, tools, machines and means of transport have been identified.

b) Machines have been operated in compliance with safety standards. c) The most frequent causes of accidents have been identified in the handling of materials, tools, cutting machines and conformed, among others. (d) Safety elements (protection, alarms, emergency steps, etc.) have been described for machines and personal protective equipment (footwear, eye protection, clothing, among others) to be used in the various assembly and maintenance operations. e) The handling of materials, tools and machines has been related to the required security and personal protection measures. f) Possible sources of contamination of the environmental environment have been identified. (g) The waste generated for its selective removal has been classified. (h) Order and cleaning of facilities and equipment has been assessed as the first risk prevention factor.

Duration: 130 hours.

Basic contents:

Selection of components of standard microcomputer equipment: Identification of the functional blocks of a microcomputer system: Main functions of each block.

Memory types. Characteristics and functions of each type. Application and base software. Functionality of the base plate components:

Characteristics of the microprocessors.

Control of temperatures in a microcomputer system. Device-integrated devices. The memory on a motherboard. The base board configuration program. Base Board I/O Connectors.

Microcomputer Equipment Component Market Analysis:

The chassis.

The RAM. Disk controllers and fixed disks. Auxiliary memory supports and read/write units. The graphics adapter and the monitor of a microcomputer equipment. LAN and WAN connectivity of a microcomputer system. OEM components and retail components. Device drivers.

Microcomputer equipment assembly:

Sequence of mounting a computer.

Tools and tools. Safety precautions and warnings. Processor assembly. Processor refrigerated. Fixing the RAM memory modules. Fixing and connecting the Fixed disk drives. Fixing and connecting read/write units to auxiliary memory media. Attachment and attachment of all other adapters and components. Check and diagnostic utilities.

Measurement of electrical parameters:

Token types.

Type values. Blocks of a power supply. Power systems interrupted.

Maintenance of microcomputer equipment:

Preventive maintenance techniques.

Detection of faults in a microcomputer equipment. Warning, luminous and acoustic signals. Common faults. Hardware extensions. Incompatibilities.

Software Installation:

Boot options for a team.

Utilities for creating partition/disk images. Image restoration.

Applications for new trends in computer equipment:

Bare jobs for equipment assembly.

Mobile computing.

Peripheral maintenance:

Preventive maintenance techniques.

Printers. Entry peripherals. Compliance with the rules on the prevention of occupational risks and environmental protection:

Risk identification.

Determination of occupational risk prevention measures. Prevention of occupational risks in the assembly and maintenance processes. Personal protective equipment. Compliance with the regulations on the prevention of occupational risks.

Compliance with environmental protection regulations. Pedagogical guidelines.

This professional module contains the necessary training to perform the function of mounting and maintaining common microcomputer and peripheral equipment and to acquire a comprehensive and up-to-date view of the market.

The assembly, review, and maintenance of microcomputer and peripheral equipment includes aspects such as:

The manipulation of all the elements that form the physical component of the microcomputer equipment.

The assembly/disassembly of the components of a microcomputer equipment. The checking and monitoring of equipment. The diagnosis and resolution of breakdowns. The expansion and/or replacement of components in equipment. The commissioning and maintenance of peripherals. The constant adaptation to changes and innovations in this field.

The professional activities associated with this function apply to:

Assembly and Assembly of Equipment.

Maintenance of equipment. Commissioning and maintenance of peripherals. Marketing and customer support for computer and peripheral equipment.

The formation of the module contributes to the achievement of the general objectives (a), (b), (c), (g), (h), (i), (j), (k) and (l) of the training cycle, and powers (a), (b), (g), (h), (i), (j), (k) and (l) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

The identification of the elements that form the physical component of the computer equipment.

The assembly/disassembly of microcomputer equipment. The check-up of the assembled equipment. The diagnosis of equipment with problems or problems. The assembly/disassembly of mechanical components in common peripherals. The measure of electrical quantities. The elaboration and/or interpretation of inventories, budgets, parts of assembly and repair.

Professional Module: MonOpposite Operating Systems

Code: 0222

Learning results and evaluation criteria.

1. It recognizes the features of file systems, describing their types and applications.

Assessment Criteria:

a) The functional elements of a computer system have been identified and described.

b) Information has been coded and related in different representation systems. c) Processes and their states have been identified. d) The structure and organization of the file system has been described. e) The attributes of a file and a directory have been distinguished. f) File and directory permissions have been recognized. g) The usefulness of the transactional systems and their impact has been found in selecting a file system.

2. Installs operating systems, relating their features to the hardware of the equipment and application software.

Assessment Criteria:

a) The operating system functions have been analyzed.

b) The architecture of the operating system has been described. c) The suitability of the hardware has been verified. d) The operating system has been selected. e) An installation plan has been developed. f) Basic installation parameters have been configured. g) A bootloader has been configured. h) The incidents of the installation have been described. (i) The rules for the use of software (licences) have been respected. j) The operating system has been updated.

3. Performs basic operating system configuration tasks, interpreting requirements, and describing the procedures followed.

Assessment Criteria:

a) The user interfaces have been differentiated according to their properties.

b) Preferences have been applied in the personal environment configuration. c) Specific file systems have been managed. d) Methods for operating system recovery have been applied. e) The configuration for the OS upgrade was performed. f) Utility install/uninstall operations have been performed. g) System configuration wizards (access to networks, devices, among others) have been used. h) Operations have been run for system task automation.

4. Performs basic operating system administration operations, interpreting requirements and optimizing the system for use.

Assessment Criteria:

a) User and group profiles have been configured.

b) Graphic tools have been used to describe the organization of the system files. c) The processes of the user have been performed according to the specific needs. d) The services of the system have been performed according to the specific needs. e) Criteria for the optimization of available memory have been applied. f) The system activity has been analysed from the traces generated by the system itself. g) The operation of the storage devices has been optimized. h) The system's shareable resources have been recognized and configured. i) Operating system configuration information has been interpreted.

5. Creates virtual machines by identifying their application field and installing specific software.

Assessment Criteria:

a) It has been differentiated between real machine and virtual machine.

b) The advantages and disadvantages of using virtual machines have been established. c) Free and proprietary software has been installed for the creation of virtual machines. d) Virtual machines have been created from free operating systems and owners. e) Virtual machines have been configured. f) The virtual machine has been related to the host operating system. g) System performance tests have been performed.

Duration: 80 hours.

Basic contents:

Characterization of operating systems:

The computer system.

Base software for a computer system. Concept of operating system. Elements and structure of the Operating System. Operating system functions. Resources. Operating system usage: order mode, graphical mode. Operating system processes. The status of the processes. Priority. Current operating systems.

File system operation:

File systems, file, directory, attributes, permissions.

Operation with files: name and extension, wildcards, attributes, types. More common operations. Operation with directories: name, attributes, permissions. More common operations. Selecting a file system. Type of file systems and their features. Transactions. Transactional systems.

Installing free operating systems and owners:

Characterization of operating systems: The computer system.

Base software for a computer system. Operating system. Elements and structure of the Operating System. Operating system functions. Resources. Operating system usage: order mode, graphical mode. Operating system processes. The status of the processes. Current operating systems. Technical requirements of the operating system. Installation planning: partitions, file system. Selecting basic applications to install. Basic parameters of the installation.

Performing basic tasks on free operating systems and owners:

System start and stop. Sessions.

User interfaces: types, properties, and uses. Setting the desktop preferences. Structure of the directory tree. Compression/Decompression. Updating the operating system. Add/Remove/Update Operating System Software.

Administering operating systems:

Managing user profiles and local groups. Passwords.

File system management. Management of system and user processes. System performance. Tracking system activity. Activation and deactivation of services. Resource sharing. Operating system configuration and behavior database, installed hardware, and applications.

Configuring virtual machines:

Virtualization and virtual machine: advantages and disadvantages.

Software (owner and free) for creating virtual machines: installation. Creating virtual machines for proprietary and free operating systems. Configuring and using virtual machines.

Pedagogical guidelines.

This professional module contains the necessary training to perform the function of installing and operating the monopposite operating systems.

The definition of these functions includes aspects such as:

The installation and upgrade of operating systems for use in microcomputer systems.

Using the functionality of the microcomputer system using the tools of the operating system. Control and monitoring of operating system activity and performance. The determination and utilization of the shared resources of the operating system. The management of system users and groups, as well as their profiles and permissions. The use of virtualization mechanisms for testing.

The professional activities associated with this function apply to:

Installing and upgrading operating systems on separate computers.

The advanced use of the operating system. End user assistance on operating system usage.

The formation of the module contributes to the achievement of the general objectives (a), (c), (g), (h), (i), (j), (k), (l) and (m) of the training cycle, and powers (a), (c), (g), (h), (k), (l), (m), (n), (n) and (r) of the title. The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

The evolution of the changes and developments that occur in the market on the operating systems.

The installation and upgrade of the monopposite operating systems. The elaboration of documents (manuals, reports, parts of impact, among others). Assistance and troubleshooting in the installation of operating systems.

Professional Module: Office applications

Code: 0223

Learning results and evaluation criteria.

1. Installs and updates office applications, interpreting specifications, and describing the steps to be taken in the process.

Assessment Criteria:

a) The phases of the installation process have been identified and set.

b) The technical specifications of the installation process have been respected. c) Applications have been configured according to the established criteria. d) The incidents have been documented. e) Problems have been solved in the installation or integration with the computer system. f) Components of the installation have been removed and/or added to the equipment. g) Applications have been updated. h) Software licenses have been respected. i) Software solutions have been proposed for application environments.

2. It elaborates documents and templates, describing and applying advanced word processing options.

Assessment Criteria:

a) The software and toolbar options have been customized.

b) Templates have been designed. c) Applications and peripherals have been used to introduce texts and images. d) Documents created with other applications and in other formats have been imported and exported. e) Macros have been created and used in the execution of documents. f) Specific manuals have been developed.

3. It elaborates documents and calculation templates, describing and applying advanced spreadsheet options.

Assessment Criteria:

a) The software and toolbar options have been customized.

b) The various data types and reference for cells, ranges, sheets, and books have been used. c) Formulas and functions have been applied. d) Graphics of different types have been generated and modified. e) Macros have been used for the execution of documents and templates. f) Spreadsheets created with other applications and in other formats have been imported and exported. g) The spreadsheet has been used as a database: forms, list creation, filtering, protection and data management. h) Applications and peripherals have been used to introduce texts, numbers, codes and images.

4. It elaborates documents with office databases describing and applying data manipulation operations.

Assessment Criteria:

a) The elements of the relational databases have been identified.

b) Ophimatic databases have been created. c) The database tables have been used (insert, modify, and delete records). d) Assistants have been used in the creation of queries. e) Assistants have been used in the creation of forms. f) Assistants have been used in reporting. g) Search and filtering has been performed on the stored information. h) Macros have been created and used.

5. Manipulates digital images by analyzing the possibilities of different programs and applying basic capture and editing techniques.

Assessment Criteria:

a) The different image formats have been analyzed.

b) The acquisition of images with peripherals has been performed. c) We have worked with images to different resolutions, according to their purpose. d) Tools for digital image editing have been employed. e) Images have been imported and exported in various formats.

6. Manipulates video sequences by analyzing the possibilities of different programs and applying basic capture and editing techniques.

Assessment Criteria:

a) The elements that make up a video stream have been recognized.

b) More employee formats and codecs have been studied. c) Video sequences have been imported and exported. d) Video sequences have been captured with adequate resources. e) Video tutorials have been developed.

7. It elaborates multimedia presentations by describing and applying basic rules of composition and design.

Assessment Criteria:

a) The basic options for presentation applications have been identified.

b) The different view types associated with a presentation have been recognized. (c) The different typographies and standards of composition, design and use of colour have been applied and recognised. d) Presentation templates have been designed. e) Presentations have been created. f) Peripherals have been used to run presentations.

8. Performs mail management and e-agenda operations, relating to usage needs with their configuration.

Assessment Criteria:

a) The elements that make up an email have been described.

b) The basic needs of e-mail management and electronic agenda have been analyzed. c) Different types of email accounts have been configured. d) Calendars of computer equipment with mobile devices have been connected and synchronized. e) It has been operated with the address book. f) All email management options (labels, filters, folders, among others) have been worked. g) Electronic agenda options have been used.

9. Applies support techniques in the use of applications, identifying and resolving incidents.

Assessment Criteria:

a) Visual guides have been developed with the basic concepts of using an application.

b) Problems related to the use of office applications have been identified. c) User manuals have been used to instruct in the use of applications. (d) Technical advice on the use of applications has been applied. e) Incident reports have been performed. (f) The procedures necessary to safeguard information and recovery have been implemented. g) The resources available (technical documentation, online support, technical support, among others) have been used to address incidents. h) The incidents have been resolved in the appropriate time and with the level of quality expected.

Duration: 135 hours.

Basic contents:

Installing applications: Types of office applications.

Software license types. Needs of the operating environments. Installation and configuration procedures.

Elaboration of documents and templates using word processors: Styles.

Creating and using templates. Import and export of documents. Design and creation of macros. Elaboration of different types of documents (manuals, parts of incidents, among others).

Elaboration of documents and templates using spreadsheets: Styles.

Using formulas and functions. Creating dynamic tables and charts. Use of templates and wizards. Elaboration of different types of documents (budgets, invoices, inventories, among others). Design and creation of macros.

Using office databases: Elements of relational databases.

Creating databases. Handling of assistants.

Manipulation of images:

Formats and resolution of images.

Use of photo retouching, image and color settings. Import and export of images.

Manipulation of videos: Video formats.

Import and export of videos.

Elaboration of presentations: Design and slide editing.

Formatting of slides, texts, and objects. Import and export of presentations. Using templates and wizards. Slide patterns.

Email and eCalendar management: Workbench: Configuration and Customization.

Templates and corporate signatures. News forums (news). The address book. Post office management. Management of the agenda.

Application of support techniques: Elaboration of guides and application usage manuals.

Training to the user.

Pedagogical guidelines.

This professional module contains the necessary training to perform the function of installation and exploitation of computer applications.

Installing and exploiting applications includes aspects such as:

The search for application software that is appropriate to the operating environment.

The installation and configuration of office applications. The elaboration of documents and templates. The resolution of problems in the exploitation of applications. Assistance to the user.

The professional activities associated with this function apply to:

Installing, configuring, and maintaining computer applications.

Assistance in the use of computer applications.

The formation of the module contributes to the achievement of the general objectives (a), (c), (g), (h), (i), (k), (l), (m), (n) and (o) of the training cycle and powers (a), (c), (f), (g), (h), (j), (k), (l), (m), (n), (n), (p) and (r) of the title. The lines of action in the teaching-learning process that allow us to achieve the objectives of the module will be about: The analysis of the changes and innovations that occur in the market of computer applications.

Installing and updating applications. The elaboration of documents (manuals, reports, parts of impact, among others). Assistance and resolution of problems in application exploitation.

Professional Module: Network Operating Systems

Code: 0224

Learning results and evaluation criteria.

1. Installs networked operating systems by describing their features and interpreting technical documentation.

Assessment Criteria:

a) The compatibility study of the computer system has been performed.

b) The installation modes have been differentiated. c) Server disk partitioning is planned and performed. d) File systems have been selected and applied. e) The components to be installed have been selected. f) Procedures for the automation of installations have been implemented. g) Preferences have been applied in the configuration of the personal environment. h) The network operating system has been updated. i) Server connectivity has been checked with client teams.

2. Manages users and groups of networked operating systems, interpreting specifications, and applying system tools.

Assessment Criteria:

a) User accounts have been configured and managed.

b) User profiles have been configured and managed. c) Team accounts have been configured and managed. (d) The purpose of the groups, their types and areas has been distinguished. e) Groups have been configured and managed. f) User membership has been managed for groups. g) The characteristics of default and special users and groups have been identified. h) Mobile user profiles are planned. i) Tools have been used for the administration of users and groups, including in the networked operating system.

3. Performs management tasks on domains by identifying needs and applying domain management tools.

Assessment Criteria:

a) The function of the directory service, its elements, and nomenclature has been identified.

b) The concept of domain and its functions has been recognized. c) Trust relationships have been established between domains. d) The installation of the directory service has been performed. e) The basic directory service configuration has been performed. f) Element pools have been used for the creation of administrative models. g) The structure of the directory service has been analyzed. h) Domain administration tools have been used.

4. Manages shared system resources, interpreting specifications, and determining security levels.

Assessment Criteria:

a) The difference between permission and right has been recognized.

b) The system resources that are to be shared and under which conditions have been identified. c) Permissions have been assigned to the system resources to be shared. d) Network printers have been shared. e) The graphical environment for sharing resources has been used. f) Security levels have been set to control client access to network shared resources. g) Working in group to check access to the shared resources of the system.

5. Performs tasks of monitoring and using the network operating system, describing the tools used and identifying the main incidents.

Assessment Criteria:

a) The characteristics of the monitoring programs have been described.

b) Performance problems have been identified on the storage devices. c) The activity of the networked operating system has been observed from the traces generated by the system itself. d) Software maintenance tasks have been performed on the system. e) Operations have been run for system task automation. f) The network operating system configuration information has been interpreted.

6. Performs free operating system integration tasks and owners, describing the benefits of sharing resources and installing specific software.

Assessment Criteria:

a) The need for network sharing between different operating systems has been identified.

b) Network connectivity has been checked in a heterogeneous scenario. c) The functionality of services that enable network sharing has been described. d) Services have been installed and configured to share network resources. e) Network file systems have been accessed from computers with different operating systems. f) Printers have been accessed from computers with different operating systems. g) We have worked as a group. h) Security levels have been set to control user access to network shared resources. (i) The operation of the installed services has been verified.

Duration: 95 hours.

Basic contents:

Installing network operating systems:

Checking the technical requirements.

Preparing the installation. Components and File System Components. Methods. Automation. Elaboration of the documentation on the installation and incidents. Installing networked operating systems on virtual machines.

Managing users and groups:

User and Group account.

Types of user profiles. Mobile profiles. Group management. Types and areas. Properties. System default and special users and groups. User accounts. Templates.

Domain management:

Directory and Domain Service.

Elements of the directory service. Functions of the domain. Installing a directory service. Basic configuration. Creating domains. Objects that administer a domain: global users, groups, teams among others. Creating trust relationships between domains. Creation of element pools: nomenclature.

Managing network shared resources:

Permissions and rights.

Sharing files and directories across the network. Configuration of shared resource permissions. Configuring network-shared printers.

Network operating system monitoring and usage:

Network operating system startup.

Description of the failures produced at startup: possible solutions. Use of tools for network operating system performance monitoring and monitoring. Management of processes relating to the services of the networked operating system.

Integrating free network operating systems and owners:

Description of heterogeneous scenarios.

Installing, configuring, and using network services to share resources. Network shared resource configuration. Security of network-shared resources.

Pedagogical guidelines.

This professional module contains the necessary training to perform the installation and maintenance functions of networked operating systems.

The definition of these functions includes aspects such as:

The processes of installing and updating networked operating systems for use in microcomputer systems.

The use of microcomputer system functionality through the tools of the networked operating system. Control and monitoring of network operating system activity and performance. The management of the shared resources of the operating system in homogeneous and heterogeneous networks. The management of users and groups, as well as their profiles and permissions. The use of virtualization mechanisms for testing.

The professional activities associated with this function apply to:

The installation of operating systems.

Network system management. The monitoring of operating systems.

The formation of the module contributes to the achievement of the general objectives (a), (c), (d), (f), (g), (h), (i), (j), (k), (l), (m) and (n) of the training cycle, and powers (a), (c), (e), (f), (h), (l), (m), (n), (p), (q) and (r) of the title. The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

Installing and upgrading network operating systems.

Managing users and groups. Domain management. The management of shared resources in homogeneous networks. Monitoring and use of the networked operating system. The integration of operating systems into heterogeneous networks.

Professional Module: Local Networks

Code: 0225

Learning results and evaluation criteria.

1. It recognizes the structure of wired local networks by analyzing the features of application environments and describing the functionality of their components.

Assessment Criteria:

a) The operating principles of the local networks have been described.

b) The different types of networks have been identified. c) The elements of the local network and its function have been described. d) The means of transmission have been identified and classified. e) The physical map of the local network has been recognized. f) Applications have been used to represent the physical map of the local network. g) Different network topologies have been recognized. h) Alternative structures have been identified.

2. Deploys the cabling of a local network by interpreting specifications and applying assembly techniques.

Assessment Criteria:

a) The functional principles of local networks have been recognized.

b) The different types of networks have been identified. c) The means of transmission have been differentiated. d) The details of the wiring of the installation and its deployment have been recognized (wiring category, spaces for which it runs, support for the pipes, among others). e) The pipes and tubes have been selected and mounted. f) Communications cabinets and their accessories have been mounted. g) The user takes and parched panels have been mounted and connected. h) The lines of communication between the user takes and parched panels have been tested. (i) Cables and user sockets have been labelled. (j) The quality and safety required have been worked out.

3. Interconnects teams in wired local networks by describing cabling standards and applying connector assembly techniques.

Assessment Criteria:

a) The network logical mount plan has been interpreted.

b) Network adapters have been mounted on the computers. c) Network connectors (copper and fibre) have been mounted. d) The switching equipment has been mounted in the communications cabinets. e) Switch equipment has been connected to the patch panels. f) The installation connectivity has been verified. g) We have worked with the required quality.

4. It installs networked equipment, describing its capabilities and applying assembly techniques.

Assessment Criteria:

a) The functional characteristics of the wireless networks have been identified.

b) The operating modes of wireless networks have been identified. c) Adapters and wireless access points have been installed. d) Operating modes and basic parameters have been configured. e) The connectivity between various devices and wireless adapters has been proven. f) The corresponding software has been installed. g) The protocols have been identified. h) Basic parameters have been configured. (i) Basic safety mechanisms have been applied. j) VLANS have been created and configured.

5. Maintains a local network by interpreting recommendations from hardware or software manufacturers and establishing the relationship between dysfunctions and their causes.

Assessment Criteria:

a) Failed incidents and behaviors have been identified.

b) It has been identified if the dysfunction is due to hardware or software. c) The visual signals of the interconnection devices have been monitored. d) Communications protocols have been verified. e) The cause of the dysfunction has been located. f) The operation has been restored by replacing equipment or elements. g) The software.0 disfunctions have been fixed (configuring or reinstalling). h) An incident report has been produced.

6. It complies with the standards of occupational risk prevention and environmental protection, identifying the associated risks, measures and equipment to prevent them.

Assessment Criteria:

(a) The risks and level of danger posed by the handling of materials, tools, tools, machines and means of transport have been identified.

b) Machines have been operated in compliance with safety standards. c) The most frequent causes of accidents have been identified in the handling of materials, tools, cutting machines and conformed, among others. (d) Safety elements (protection, alarms, emergency steps, etc.) have been described for machines and personal protective equipment (footwear, eye protection, clothing, among others) to be used in operations assembly and maintenance. e) The handling of materials, tools and machines has been related to the required security and personal protection measures. f) Possible sources of contamination of the environmental environment have been identified. (g) The waste generated for its selective removal has been classified. (h) Order and cleaning of facilities and equipment has been assessed as the first risk prevention factor.

Duration: 130 hours.

Basic contents:

Cabling deployment:

Characterization of Local Networks:

Features. Advantages and disadvantages.

Types. Network elements. Topologies.

Identifying elements and physical spaces for a local network: Spaces.

Communications rooms. Communications cabinets. Parched panels. Channelings

Transmission media (twisted pair, optical fiber, among others).

Connectors and network sockets. Tools. Connection of sockets and parched panels. Cable creation. Recommendations in the wiring installation.

Interconnection of computers in local networks:

Cable network adapters.

Networking devices. Adapters for wireless networks. Wireless network interconnect devices. Mixed networks.

Installing/configuring network equipment:

Installation procedures.

Protocols. TCP/IP. Structure. IP classes. IP addresses. Ipv4. IPv6. Configuring network adapters on free operating systems and owners. Basic configuration of wired and wireless network interconnect devices. Basic security in wired and wireless networks.

Troubleshooting a local area network:

Strategies. Performance parameters.

Physical incidents and logical incidents in local networks. Monitoring of wired and wireless networks. Diagnostic tools. Commands and programs.

Compliance with the rules on prevention of occupational risks and environmental protection: Identification of risks.

Determination of occupational risk prevention measures. Prevention of occupational risks in assembly processes. Personal protective equipment. Compliance with the regulations on the prevention of occupational risks. Compliance with environmental protection regulations.

Pedagogical guidelines.

This professional module contains the necessary training to perform the installation and maintenance function of local networks in small environments.

The definition of these functions includes aspects such as:

The mounting of the pipes and the laying of lines for local wired networks.

The mounting of the local network elements. The integration of the elements of the network. The monitoring of the local network. The resolution of physical and logical incidents on the local network.

The professional activities associated with this feature are applied in: The assembly of wired, wireless and mixed local networks.

The maintenance of the local network.

The formation of the module contributes to the achievement of general objectives (a), (b), (d), (e), (f), (g), (h), (i), (j), (k), (l) and (m) of the training cycle, and (c), (e), (f), (g), (h), (j) and (l) of the title. The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

The identification of the local network elements.

The interpretation of the technical documentation of the elements of the local network. The assembly of the pipes and the laying of the wiring. The installation and configuration of the network elements. The elaboration and interpretation of the technical documentation on the distribution of the local network. The resolution of problems encountered in the operation of the local network.

Professional Module: Computer Security

Code: 0226

Learning results and evaluation criteria.

1. It applies passive security measures in computer systems describing features of environments and relating them to their needs.

Assessment Criteria:

a) The importance of keeping information safe has been appreciated.

b) The differences between physical and logical security have been described. c) The characteristics of the physical location and environmental conditions of the equipment and servers have been defined. d) The need to physically protect computer systems has been identified. e) The operation of the uninterrupted power supply systems has been verified. f) The points of application of the uninterrupted feeding systems have been selected. g) The characteristics of a security policy based on access control lists have been schemed. h) The importance of establishing a password policy has been appreciated. (i) The advantages of the use of biometric systems have been assessed.

2. Manages storage devices by describing the procedures performed and applying techniques to ensure the integrity of the information.

Assessment Criteria:

a) The technical documentation relating to the storage policy has been interpreted.

b) Factors inherent in the storage of information (performance, availability, accessibility, among others) have been taken into account. c) The main storage methods included in the network storage systems have been classified and listed. d) The redundant and distributed storage technologies have been described. e) Strategies have been selected for the performance of backups. f) The frequency and the rotation scheme have been taken into account. g) Safety copies have been made with different strategies. h) The characteristics of the remote and removable storage media have been identified. i) Remote and removable storage media have been used. j) System backup images have been created and restored.

3. It applies active safety mechanisms describing their characteristics and relating them to the needs of the use of the computer system.

Assessment Criteria:

a) Contingency plans have been followed to act in the face of security failures.

b) The main types of malicious software have been classified. c) Regular updates of the systems have been made to correct possible vulnerabilities. d) The origin and authenticity of the applications that are installed on the systems have been verified. e) Specific applications for the detection and removal of malicious software have been installed, tested and updated. f) Data recovery techniques have been applied.

4. It ensures the privacy of information transmitted in computer networks by describing vulnerabilities and installing specific software.

Assessment Criteria:

a) The need to inventory and control network services has been identified.

b) The incidence of social engineering techniques in computer fraud and information theft has been contrasted. c) The importance of minimizing the volume of traffic generated by advertising and spam has been deducted. d) Measures have been implemented to prevent the monitoring of wired networks. e) The safety properties of the protocols used in wireless networks have been classified and evaluated. f) Identification systems such as electronic signature, digital certificate, among others have been described. g) Identification systems such as electronic signature, digital certificate, among others have been used. h) A firewall has been installed and configured on a computer or server.

5. It recognises legislation and regulation on data security and data protection by analysing the impact of its non-compliance.

Assessment Criteria:

(a) The legislation on the protection of personal data has been described.

b) The need to control access to stored personal information has been determined. c) The legal figures involved in the processing and maintenance of data files have been identified. (d) The obligation to make available to persons personal data concerning them has been contrasted. e) The current legislation on the services of the information society and electronic commerce has been described. f) The rules on information security management have been contrasted.

Duration: 75 hours.

Basic contents:

Application of passive security measures:

Location and physical protection of computers and servers.

Uninterruptible power systems.

Managing storage devices:

Information storage: performance, availability, accessibility.

Redundant and distributed storage. Remote and removable storage. Cryptography. Backups and backup images. Storage media.

Active security mechanism application:

Digital identification. Electronic signature and digital certificate.

Security in the protocols for wireless communications. Using firewalls on a system or server. Access control lists. Password policy. Data recovery. Malicious software. Classification. Protection and disinfection tools.

Privacy Assurance:

Methods to ensure the privacy of the transmitted information.

Computer fraud and theft of information. Control of the monitoring of wired networks. Security in wireless networks. Identification systems: electronic signature, digital certificates and others. Firewall on computers and servers.

Compliance with legislation and safety standards:

Legislation on data protection.

Legislation on the services of the information society and e-mail.

Pedagogical guidelines.

This professional module contains the necessary training to perform the function of implementing security measures in computer systems.

The definition of this function includes aspects such as:

Installing computers and servers in secure environments.

The incorporation of security procedures in the processing of information. The update of the operating systems and the installed application software. Protection against malicious software. The implementation of the legislation and regulations on security and information protection.

The professional activities associated with this function apply to:

The installation of computer equipment.

The treatment, transmission and storage of information. The maintenance of computer systems.

The formation of the module contributes to the achievement of the general objectives (a), (c), (d), (e), (g), (k) and (l) of the training cycle, and powers (a), (c), (i), (j), (l), (n), (o), (p) and (t) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

The protection of computers and computer networks.

The protection of the transmitted and stored information. Legislation and regulations in force in the field of safety.

Professional Module: Network Services

Code: 0227

Learning results and evaluation criteria.

1. Installs dynamic configuration services, describing their features and applications.

Assessment Criteria:

a) The operation of automated network parameter configuration mechanisms has been recognized.

b) The benefits that they provide have been identified. c) The procedures and guidelines involved in a request for the configuration of the network parameters have been illustrated. d) A dynamic configuration service for network parameters has been installed. e) The service has been prepared to assign the basic configuration to the systems of a local network. f) Dynamic and static allocations have been made. g) Additional configuration options have been integrated into the service. h) The correct allocation of the parameters has been verified.

2. Installs name resolution services, describing their features and applications.

Assessment Criteria:

a) Scenarios have been identified and described in which the need for a name resolution service arises.

b) Top name resolution mechanisms have been classified. c) The structure, nomenclature and functionality of the hierarchical name systems have been described. d) A hierarchical name resolution service has been installed. e) The service has been prepared to store responses from public network servers and serve them to local network teams. f) Name records have been added for a new zone, with options relative to mail servers and aliases. g) Group worked to perform zone transfers between two or more servers. h) The correct operation of the server has been proven.

3. Installs file transfer services, describing their features and applications.

Assessment Criteria:

a) The utility and operation mode of the file transfer service has been set.

b) A file transfer service has been installed. c) Users and groups have been created for remote access to the server. d) Anonymous access has been configured. e) Limits have been set in the different access modes. f) Access to the server has been checked, both in active and passive mode. g) Tests have been carried out with online client commands and in graphical mode.

4. Manages email servers by identifying usage requirements and applying configuration criteria.

Assessment Criteria:

a) The different protocols involved in sending and collecting the email have been described.

b) An email server has been installed. c) User accounts have been created and verified their access. d) Alias is defined for mail accounts. e) Methods have been applied to prevent improper use of the e-mail server. f) Services have been installed to allow remote collection of existing mail in user mailboxes. g) Email clients have been used to send and receive mail.

5. Manages web servers by identifying usage requirements and applying configuration criteria.

Assessment Criteria:

a) The fundamentals and protocols on which the operation of a web server is based have been described.

b) A web server has been installed. c) Virtual sites have been created. d) Existing possibilities have been verified to discriminate the target site of incoming traffic to the server. e) Server security has been configured. f) The user has been checked for access to the server. g) Code execution has been differentiated and tested on the server and on the client. h) Modules have been installed on the server. i) Mechanisms have been established to ensure communications between the client and the server.

6. Manages remote access methods by describing their features and installing the corresponding services.

Assessment Criteria:

a) Remote systems access and administration methods have been described.

b) An online remote access service has been installed. c) A remote access service has been installed in graphical mode. d) The operation of both methods has been proven. e) The main advantages and deficiencies of each have been identified. f) Remote access tests have been carried out between systems of different nature. (g) Remote administration testing has been carried out between systems of different nature.

7. It deploys secure wireless networks justifying the chosen configuration and describing the implementation procedures.

Assessment Criteria:

a) A wireless access point has been installed within a local network.

b) The protocols, operating modes, and main access point configuration parameters have been recognized. c) The most suitable configuration has been selected for different test scenarios. d) An appropriate security mechanism for wireless communications has been established. e) Several types of wireless devices and adapters have been used to check coverage. f) A wireless router has been installed with public network connection and wireless local network services. g) The router has been configured and tested from the local network computers.

8. Establishes access from local networks to public networks by identifying possible scenarios and applying specific software.

Assessment Criteria:

a) The hardware of a system with access to a local private network and a public network has been installed and configured.

b) An application that acts as a gateway between the local private network and the public network has been installed. c) The main features and possibilities of the selected application have been recognized and differentiated. d) Local private network systems have been configured to access the public network through the gateway. e) Access control procedures have been established to ensure traffic transmitted through the gateway. f) Mechanisms have been implemented to accelerate communications between the local private network and the public. g) Possible scenarios for the application of these mechanisms have been identified. h) A mechanism has been established to allow network traffic to be forwarded between two or more interfaces of the same system. (i) Access to a particular network has been established from the systems connected to another network. j) The configuration is implemented and verified to access from a public network a service located on a local private network machine

Duration: 95 hours.

Basic contents:

Installing system dynamic configuration services:

IP address, netmask, gateway.

DHCP. Ranges, exclusions, concessions and reserves.

Installing name resolution services:

Flat and hierarchical name systems.

Primary and secondary zones. Zone transfers. Types of records.

Installing file transfer services:

Users and Groups. Anonymous access.

Permissions. Quotas. Bandwidth limit. Control, authentication, management and file transfer commands. Transfer in text and binary mode.

Managing email services:

Mail accounts, aliases, and user mailboxes.

Mail download protocols and services.

Web server management:

Virtual servers. Host header name. Identifying a virtual server.

Anonymous and authenticated access. Authentication methods.

Remote access management:

Terminals in text mode.

Terminals in graphical mode.

Deploying wireless networks:

Access points.

Wireless routers. Security in wireless networks.

Interconnection of private networks with public networks:

Gateways at the application level. Caching.

Routing traffic between network interfaces.

Pedagogical guidelines.

This professional module contains the necessary training to perform the function of installing and maintaining services in wired and wireless computer networks.

The definition of these functions includes aspects such as:

The identification of the main applications used in computer networks to run network services.

The definition of the technical aspects of the most extended network services. The selection of a network service and a specific application on the basis of its characteristics. The installation and configuration of services in local and public networks. Configuring wireless access points by establishing communications security. The implementation of mechanisms for connecting to public networks.

The professional activities associated with this function apply to:

The implementation and maintenance of network services.

The deployment of wireless networks. The connection of local networks with public networks.

The formation of the module contributes to the achievement of the general objectives (d), (f), (h), (i), (k), (l) and (m) of the training cycle and the powers (a), (d), (e), (f), (g), (j), (m), (n) and (r) of the title. The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

The automatic configuration of network parameters.

The implementation of name resolution services. The implementation of file transfer services. The implementation of e-mail services. The implementation of web services. The deployment of remote access services. The deployment of wireless networks. The connection of local networks to public networks.

Professional Module: Web Applications

Code: 0228

Learning results and evaluation criteria.

1. Installs content managers, identifying their applications and configuring them according to requirements.

Assessment Criteria:

a) The required requirements for installing content managers have been identified.

b) Users have been managed with different roles. c) The content manager interface has been customized. (d) Operating tests have been carried out. e) Content Manager update tasks have been performed, especially security tasks. f) The required modules and menus have been installed and configured. g) Security mechanisms provided by the content manager itself have been activated and configured. h) Forums have been enabled and access rules are set. (i) Operating tests have been carried out. j) Backup of the contents of the manager has been performed.

2. Installs remote learning management systems, describing the structure of the site and the hierarchy of directories generated.

Assessment Criteria:

a) The site structure and the generated directory hierarchy have been recognized.

b) Changes have been made to the aesthetics or appearance of the site. c) Custom profiles have been manipulated and generated. d) The functionality of the communications has been verified through forums, consultations, among others. e) Content has been imported and exported in different formats. f) backups and restores have been performed. g) There have been reports of access and use of the site. h) Site security has been checked.

3. Installs web file management services, identifying their applications and verifying their integrity.

Assessment Criteria:

a) The utility of a web file management service has been set.

b) Different web file management applications have been described. c) A web file management tool has been installed and adapted. d) User accounts have been created and classified according to their permissions. e) Files and directories have been managed. f) Additional information files have been used. g) Indexing criteria have been applied to files and directories. h) The file manager security has been checked.

4. Installs web office applications, describing their features and usage environments.

Evaluation Criteria: a) The utility of the web office applications has been set.

b) Different web office applications have been described (word processing, spreadsheet, among others). c) Web office applications have been installed. d) User accounts have been managed. e) Security criteria have been applied to users ' access. f) The specific capabilities of each of the installed applications have been recognized. g) Applications have been used in a collaborative manner.

5. Installs desktop web applications, describing their features and usage environments. Assessment criteria:

a) Different desktop web applications have been described.

b) Applications have been installed to provide web access to the email service. c) Applications have been configured to integrate with a mail server. d) User accounts have been managed. e) The access to the email has been verified. f) Web Calendar applications have been installed. g) The specific capabilities of the installed applications (appointments, tasks, among others) have been recognized.

Duration: 55 hours.

Basic contents:

Installation of content managers: Installation on free operating systems and owners.

Creating users and user groups. Using the graphical interface. Customizing the environment. Functionality provided by the content manager. Syndication. The operation of the content managers. Updates to the content manager. Configuring modules and menus.

Installing remote learning management systems:

Logical items: communication, materials, and activities.

Installing on free operating systems and owners. Modes of registration. Associated graphical interface. Customizing the environment. Navigation and editing. Creation of courses following specifications. User and group management. Activation of functionalities.

Installing web file management services:

Installation.

Navigation and basic operations. Manager administration. Users and permissions. User types. Creating shared resources.

Installing web office applications:

Installation.

Using installed applications. Management of users and associated permissions. Security check.

Installing desktop web applications:

Web mail applications.

Installation. User management.

Pedagogical guidelines.

This professional module contains the necessary training to perform the installation, configuration, and use of web applications.

The definition of these functions includes aspects such as:

The identification of the main web applications.

The installation of the applications. The maintenance of users. The assignment of permissions. The use of installed applications.

The professional activities associated with these functions apply to:

Installing, configuring, and maintaining computer applications.

Assistance in the use of computer applications.

The formation of the module contributes to the achievement of the general objectives (a), (c), (i), (k), (l) and (m) of the training cycle, and powers (a), (c), (f), (i), (j), (m), (n), (n), (q) and (r) of the title. The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

Installing web applications.

Configuring web applications. Exploitation of web applications.

Professional Module: Training and Employment Guidance

Code: 0229

Learning results and evaluation criteria. 1. Select employment opportunities, identifying the different possibilities of insertion and the alternatives of learning throughout life.

Assessment Criteria:

a) The importance of lifelong learning has been assessed as a key factor for employability and adaptation to the demands of the production process.

b) The vocational pathways related to the technical profile of the technician in microcomputer systems and networks have been identified. c) The skills and attitudes required for the professional activity related to the profile of the title have been determined. (d) The main fields of employment and labour insertion for the technician in microcomputer systems and networks have been identified. e) The techniques used in the job search process have been determined. f) The alternatives for self-employment in the professional sectors related to the title have been foreseen. g) The assessment of personality, aspirations, attitudes, and self-training for decision-making has been carried out.

2. It applies the strategies of teamwork, valuing its effectiveness and efficiency in order to achieve the objectives of the organization.

Assessment Criteria:

a) The advantages of teamwork in work situations related to the profile of the technician in microcomputer systems and local networks have been valued.

b) Work teams have been identified that can be a real working situation. (c) The characteristics of the effective working equipment against the ineffective equipment have been determined. (d) The necessary diversity of roles and opinions assumed by members of a team has been positively assessed. e) The possible existence of conflict among the members of a group has been recognized as a characteristic aspect of the organizations. f) The types of conflicts and their sources have been identified. g) Procedures for the resolution of the conflict have been determined.

3. It exercises rights and fulfils the obligations arising from industrial relations, recognising them in the various employment contracts.

Assessment Criteria:

a) The basic concepts of labour law have been identified.

b) The main bodies involved in the relations between employers and workers have been distinguished. (c) The rights and obligations arising from the employment relationship have been determined. (d) The main modalities of recruitment have been classified, identifying the measures to promote recruitment for certain groups. e) The measures established by the legislation in force for the reconciliation of work and family life have been assessed. f) The causes and effects of the modification, suspension and extinction of the employment relationship have been identified. g) The receipt of salaries has been analyzed, identifying the main elements that integrate it. h) The different collective conflict measures and the dispute settlement procedures have been analyzed. (i) Working conditions agreed in a collective agreement applicable to a professional sector related to the title of technician in micro-computer systems and local networks have been determined. j) The defining characteristics of new work organization environments have been identified.

4. It determines the protective action of the Social Security system in the face of the various contingencies covered, identifying the different classes of benefits. Assessment criteria:

a) The role of Social Security has been valued as an essential pillar for improving the quality of life of citizens.

b) The various contingencies covered by the Social Security system have been listed. c) The existing schemes have been identified in the Social Security system. (d) The obligations of employers and employees within the social security system have been identified. (e) The basis for the contribution of a worker and the employer's contributions have been identified in a simple case. f) The benefits of the Social Security system have been classified, identifying the requirements. (g) Possible legal situations of unemployment have been identified in simple practical scenarios. (h) The calculation of the duration and the amount of a basic contributory level unemployment benefit has been calculated.

5. It evaluates the risks arising from its activity, analyzing the working conditions and the risk factors present in its work environment.

Assessment Criteria:

a) The importance of preventive culture has been assessed in all areas and activities of the company.

b) Working conditions have been linked to the health of the worker. (c) Risk factors have been classified in the activity and the damage resulting therefrom. d) The most common risk situations have been identified in the technical working environments of microcomputer systems and local networks. e) The risk assessment has been determined in the company. f) Working conditions with significance for prevention in work environments related to the technical profile of the technician in microcomputer systems and local networks have been determined. (g) The types of occupational injury, with particular reference to occupational accidents and occupational diseases, related to the technical profile of the technician in micro-computer systems and local networks, have been classified and described.

6. It participates in the elaboration of a risk prevention plan in a small company, identifying the responsibilities of all the agents involved.

Assessment Criteria:

(a) The principal rights and duties in the field of occupational risk prevention have been determined.

b) The different forms of prevention management in the company have been classified, according to the different criteria laid down in the regulations on the prevention of occupational risks. (c) The forms of representation of workers in the company in the field of risk prevention have been determined. (d) Public bodies related to the prevention of occupational risks have been identified. e) The importance of the existence of a preventive plan in the company, which includes the sequencing of actions to be carried out in case of emergency, has been valued. f) The content of the prevention plan has been defined in a work centre related to the technical sector of the technician in micro-computer systems and local networks. g) An emergency and evacuation plan has been planned in a small and medium-sized enterprise (SME).

7. It applies the prevention and protection measures, analysing the risk situations in the work environment of the microcomputer system technician and local networks.

Assessment Criteria:

(a) The prevention and protection techniques to be applied to prevent damage to their origin and to minimise their consequences should be defined in case they are unavoidable.

b) The meaning and scope of the different types of safety signs has been analyzed. c) The protocols for action have been analyzed in case of emergency. (d) The techniques for the classification of injured persons have been identified in case of emergency where there are victims of varying severity. (e) The basic first aid techniques to be applied at the site of the accident have been identified in respect of different types of damage and the composition and use of the kit. (f) The requirements and conditions for the monitoring of the health of the worker and their importance as a preventive measure have been determined.

Duration: 50 hours.

Basic contents:

Active job search: Valuation of the importance of permanent training for the work and professional trajectory of the technician in microcomputer systems and networks.

Analysis of personal interests, skills and motivations for the professional career. Identification of training itineraries related to the technician in microcomputer systems and networks. Definition and analysis of the professional title of the technical title in microcomputer systems and networks. Job search process in small, medium and large companies in the sector. Learning and employment opportunities in Europe. Employment search techniques and instruments. The decision-making process.

Conflict management and work teams:

Valuation of the advantages and disadvantages of team work for the effectiveness of the organization.

Equipment in the microcomputer systems industry and networks according to the functions they perform. Participation in the work team. Conflict: features, sources and stages. Methods for resolution or suppression of conflict.

Job Contract: The right to work.

Analysis of the individual employment relationship. Modalities of contract of employment and measures to promote recruitment. Rights and duties arising from the employment relationship. Modification, suspension and termination of the contract of employment. Representation of workers. Analysis of a collective agreement applicable to the technical field of the technician in microcomputer systems and networks. Benefits for workers in new organizations: flexibility, social benefits among others.

Social Security, Employment and Unemployment:

Structure of the Social Security System.

Determination of the principal obligations of employers and workers in the field of social security: affiliation, ups, downs and contributions. Situations which are protected in terms of unemployment protection.

Professional risk assessment:

Assessment of the relationship between work and health.

Risk Factor Analysis. Risk assessment in the company as a basic element of preventive activity. Risk analysis linked to safety conditions. Risk analysis linked to environmental conditions. Risk analysis linked to ergonomic and psycho-social conditions. Specific risks in the microcomputer and network systems industry. Determination of the possible damage to the health of the worker that can be derived from the identified risk situations.

Planning for risk prevention in the enterprise:

Rights and duties in the field of occupational risk prevention.

Management of prevention in the enterprise. Public bodies related to the prevention of occupational risks. Planning prevention in the company. Emergency and evacuation plans in working environments. Development of an emergency plan in an SME.

Application of prevention and protection measures in the enterprise:

Determination of individual and collective prevention and protection measures.

Protocol of action to an emergency situation. First aid.

Pedagogical guidelines.

This professional module contains the necessary training for the student to be able to insert himself and develop his professional career in the field of microcomputer systems and networks.

The formation of the module contributes to achieving the general objectives n), o) and q) of the training cycle and the competencies q), s) and v) of the title.

The lines of action in the teaching-learning process that allow us to achieve the objectives of the module will be about: The management of information sources on the education and labor system, especially as regards the Computer industry.

The conduct of guidance and dynamic tests on one's own personality and the development of social skills. The preparation and implementation of curricula (CVs) and job interviews. The identification of labor regulations affecting workers in the sector, management of the most commonly used contracts, comprehensive reading of collective agreements of implementation. The fulfillment of salary receipts of different characteristics and other related documents. The analysis of the Law on the Prevention of Labor Risks that allows the evaluation of the risks derived from the activities developed in the productive sector, and to collaborate in the definition of a plan of prevention for the company, as well as the necessary measures to be taken for implementation.

Professional Module: Enterprise and Entrepreneurship Initiative

Code: 0230

Learning results and evaluation criteria.

1. It recognizes the capabilities associated with the entrepreneurial initiative, analyzing the requirements derived from the jobs and the business activities.

Assessment Criteria:

a) The concept of innovation and its relationship with the progress of society and the increase in the well-being of individuals have been identified.

b) The concept of entrepreneurial culture and its importance as a source of job creation and social welfare have been analyzed. (c) The importance of individual initiative, creativity, training and collaboration as essential requirements for successful entrepreneurial activity has been assessed. (d) The capacity for initiative has been analysed in the work of a person employed in an "SME" dedicated to the assembly and maintenance of micro-computer systems and local networks. e) The development of the entrepreneurial activity of an entrepreneur that starts in the IT sector has been analyzed. f) The concept of risk has been analyzed as an inevitable element of all entrepreneurial activity. (g) The concept of an entrepreneur has been analysed and the requirements and attitudes necessary for the development of business activity have been analysed. h) The business strategy has been described and related to the company's objectives. (i) A particular business idea has been defined in the field of micro-computer systems and local networks, which will serve as a starting point for the development of a business plan.

2. It defines the opportunity to create a small business, assessing the impact on the environment of action and incorporating ethical values.

Assessment Criteria:

a) The basic functions that are performed in a company have been described and the system concept applied to the company has been analyzed.

b) The main components of the general environment surrounding the company have been identified, in particular the economic, social, demographic and cultural environment. c) The influence on the business activity of the relations with the clients, with the suppliers and with the competition as main members of the specific environment has been analyzed. d) The concepts of corporate culture and corporate image and their relationship with business objectives have been analyzed. e) The phenomenon of corporate social responsibility and its importance as an element of the business strategy has been analysed. (f) The social balance of an IT company has been developed, and the main social costs incurred by these companies, as well as the social benefits they produce, have been described. g) Practices that incorporate ethical and social values have been identified in computer companies. (h) A study of the economic and financial viability of a small and medium-sized enterprise (SME) has been carried out.

3. It carries out the activities for the constitution and implementation of a company, selecting the legal form and identifying the associated legal obligations.

Assessment Criteria:

a) The different legal forms of the company have been analyzed.

b) The degree of legal liability of the owners of the company has been specified according to the chosen legal form. c) The tax treatment established for the different legal forms of the company has been differentiated. (d) The formalities required by the legislation in force for the establishment of an "SME" have been analysed. e) A thorough search has been carried out on the various aids for the creation of information technology companies in the reference locality. (f) All matters relating to the choice of legal form, study of economic and financial viability, administrative procedures, aid and grants have been included in the business plan. (g) The existing external administrative advice and management pathways have been identified in order to launch an "SME".

4. Carries out basic administrative and financial management activities of an "SME", identifying the main accounting and tax obligations and completing the documentation.

Assessment Criteria:

a) The basic concepts of accounting, as well as the techniques for recording accounting information, have been analyzed.

(b) The basic techniques for the analysis of accounting information, in particular as regards the solvency, liquidity and profitability of the company, have been described. (c) The tax obligations of an IT company have been defined. d) Tax rates have been differentiated in the tax calendar. e) Basic commercial and accounting documentation (invoices, delivery notes, order notes, exchange letters, cheques and others) have been completed for an IT 'SME', and the circuits provided by this documentation have been described in the company. f) The above documentation has been included in the business plan.

Duration: 35 hours.

Basic contents:

Entrepreneurial Initiative:

Innovation and economic development. Main features of innovation in the activity of microcomputer systems and networks (materials, technology, production organisation, etc.).

Key factors for entrepreneurs: initiative, creativity and training. The performance of entrepreneurs as employees of an IT company. The performance of entrepreneurs as entrepreneurs, of a small business in the IT sector. The entrepreneur. Requirements for the exercise of business activity. Business plan: the idea of business in the field of computer science.

The company and its environment:

Basic functions of the company.

The company as a system. Analysis of the general environment of an IT SME. Analysis of the specific environment of an IT SME. Relationships of an IT SME with its environment. Relations of an IT SME with the whole of society.

Creating and starting a business:

Enterprise Types.

Taxation in companies. Choice of legal form. Administrative formalities for the establishment of a company. Economic viability and financial viability of an IT SME. Business plan: choice of legal form, study of economic and financial viability, administrative procedures and management of grants and grants.

Administrative function:

Concept of basic accounting and notions.

Analysis of accounting information. Tax obligations of companies. Administrative management of an IT company.

Pedagogical guidelines. This professional module contains the necessary training to develop the own initiative in the business field, both towards self-employment and towards the assumption of responsibilities and functions in employment for an employed person. The training of the module allows the achievement of the general objectives (p) and (q) of the training cycle, and the competences (q), (u) and (v) of the title. The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

Management of information sources on the IT sector, including analysis of the ongoing sector innovation processes.

The realization of cases and group dynamics that allow understanding and valuing the attitudes of entrepreneurs and adjusting the need for them to the industrial sector related to the processes of microcomputer systems and networks. The use of administrative management programmes for SMEs in the sector. The implementation of a project of a business plan related to the activity of microcomputer systems and networks and that includes all the facets of the implementation of a business: feasibility, organization of the production and the human resources, commercial action, administrative and financial control, as well as justification for its social responsibility.

Professional Module: Job Centers Training

Code: 0231

Learning results and evaluation criteria.

1. It identifies the structure and organization of the company relating to the production and marketing of the products and services they offer.

Assessment Criteria:

a) The organizational structure of the company and the functions of each area of the company have been identified.

b) The elements that constitute the logistics network of the company have been identified: suppliers, customers, production systems, storage, among others. c) The procedures and techniques of work have been identified in the development of the production process. (d) The competences of human resources have been linked to the development of productive activity. e) The importance of each element of the network in the development of the company's activity has been interpreted. f) Related characteristics of the market, type of customers and suppliers as well as their influence on the development of the business activity. g) The most frequent marketing channels in this activity have been identified. (h) The advantages and disadvantages of the structure of the company vis-à-vis other types of business organisations have been recognised.

2. He applies ethical and work habits, developing his professional activity according to the job characteristics and procedures established in the company.

Assessment Criteria:

a) They have been recognized and justified: The personal and temporary disposition that the job needs.

Personal attitudes (punctuality, empathy, among others) and professionals (order, cleanliness, security needed for the job, responsibility, among others). The actions required to prevent risks in professional activity and personal protective measures. The quality requirements related to the quality of the professional activity. Attitudes related to the work team itself and to the hierarchies established in the company. The attitudes related to the documentation of the activities, carried out in the field of work. The training needs for the insertion and reinsertion of work in the scientific and technical field of the good to do of the professional.

(b) The rules on the prevention of occupational risks applicable to the occupational activity and the fundamental aspects of the Law on the Prevention of Occupational Risks have been identified.

(c) The individual protection equipment has been applied and used according to the risks of the professional activity and the rules of the company. (d) A clear attitude of respect for the environment has been maintained in the activities developed and the internal and external rules linked to it have been applied. e) The job or the area corresponding to the development of the activity has been organized, clean and free of obstacles. f) The instructions received have been interpreted and complied with, taking responsibility for the assigned work. g) An effective communication and relationship has been established with the responsible person in each situation and members of his team, maintaining a smooth and correct treatment. h) It has been coordinated with the rest of the team to report any changes, relevant, or unforeseen needs. i) The importance of its activity and the adaptation to the changes of tasks assigned in the development of the productive processes of the company, being integrated in the new functions. j) It has committed itself responsibly in the application of the rules and procedures in the development of any activity or task.

3. It assembles computer equipment, following the established quality system processes.

Assessment Criteria:

a) The technical documentation has been interpreted.

b) The equipment and accessories of the equipment have been located, fixed and connected. c) The load of the base software has been verified. d) Peripherals have been installed. e) Its operation has been verified. f) It has been operated with equipment and tools according to quality criteria. g) We have worked as a group, showing initiative and interest.

4. Participates in the diagnosis and repair of breakdowns by applying corrective maintenance techniques.

Assessment Criteria:

a) An intervention plan has been developed for the location of the breakdown.

b) The symptoms of breakdowns or dysfunctions have been identified. (c) The possible causes of the breakdown have been hypothesized. d) Elements have been mounted and disassembled. e) Tools and/or software have been used in the repair of the breakdown. f) The breakdown has been located and documented. (g) The components responsible for the breakdown have been replaced.

5. Installs operating systems and applications while respecting the client's work plan and needs.

Assessment Criteria:

a) Work orders have been understood.

b) Operating system and application installation operations have been performed. c) The operating system has been configured according to the requirements. d) The operation of the equipment after the installation has been verified. e) The documentation has been completed according to the company's procedures. f) Data has been restored in accordance with established safety standards.

6. It participates in the installation, commissioning and maintenance of small installations with local network services and the Internet, documenting the intervention.

Assessment Criteria:

a) Technical documentation relating to hardware and software has been interpreted.

b) The elements of the installation have been identified. c) Canalizations have been mounted. (d) Conexionados have been performed and verified. e) Network monitoring has been carried out. f) Drivers have been installed. g) Communications adapters have been installed. h) Basic security parameters have been specified. i) A service and maintenance manual has been developed.

7. Assists the user, solving problems of application exploitation, according to company rules.

Assessment Criteria:

a) User needs have been identified.

b) Communication techniques have been applied with the user. c) Backup of the information has been carried out. d) The problem has been solved in the times indicated by the company. e) The user has been advised on the operation of the application or equipment.

8. Participates in installation, configuration, or maintenance tasks for systems that manage content, distance learning, files among others, following the established job plan.

Assessment Criteria:

a) The job plan has been understood.

b) Required requirements have been identified. c) Backup of the information has been carried out. d) The work plan has been developed according to established quality standards. e) The development and outcome of the work plan have been documented. f) Security criteria have been applied to access to information. g) The functionality tests have been performed to verify the changes made. (h) The modifications implemented have been documented. i) The user has been informed about the tasks performed.

Duration: 220 hours. This professional module contributes to the completion of the competencies of this title and the general objectives of the cycle, both those that have been achieved in the educational center, and those that are difficult to achieve in the same.

Annex II

Spaces

Formative space

Multi-purpose classroom.

Technical Classroom. Workshop for the installation and repair of computer equipment.

III A)

Teachers ' specialisms with teacher attribution in the professional modules of the training cycle

Module

Professional Module

class= " ">

0221. Mounting and maintaining equipment.

Computer Systems and Applications.

Technical Teacher of Vocational Training

0223. Office applications.

Computer Systems and Applications.

Technical Teacher of Professional Training

0222. Opposing operating systems.

Computer Systems and Applications.

Technical Teacher of Professional Training

0225. Local networks.

Informatics.

Secondary Teaching Teacher.

0227. Network Services.

Informatics.

Secondary Teaching Teacher.

0224. Network operating systems.

Computer Systems and Applications.

Professional Training Technical Teacher

0226. Computer Security.

Informatics.

Secondary Teaching Teacher.

0228. Web Applications.

Informatics.

Secondary Teaching Teacher.

0229. Job training and guidance.

Training and Employment Guidance.

Secondary Teaching Teacher

0230. Enterprise and business initiative.

Training and Employment Orientation.

Secondary Teaching Teacher.

ANNEX III B)

Equivalent to teaching

Bodies

Specialties

Teaching Teachers.

Training and Employment Orientation.

Diplomat in Business Sciences. Graduate in Industrial Relations. Graduate in Social Work. Graduate in Social Education. Graduate in Management and Public Administration

Informatics.

Diplomat in Statistics. Technical Engineer in Management Informatics. Technical Engineer in Systems Informatics. Technical Engineer for Telecommunication, Specialty in Telematics.

Annex III C)

Required qualifications for the delivery of the professional modules that make up the title for private ownership centers, other administrations other than education and guidance for the Education

modules

class= " ">

0221 Assembly and Equipment Maintenance. 0222 Monkey operating systems put up. 0223 Office applications. 0224 Network Operating Systems.

Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles. Diploma, Technical Engineer or Technical Architect or corresponding degree of degree or other equivalent titles. Senior Technician in Computer Systems Administration.

0225 Local Networks. 0226. Computer Security 0227 Network Services.

Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

0228 Web Applications. 0229 Training and Employment Orientation. 0230 Enterprise and Business Initiative.

Diplomat, Technical Engineer or Technical Architect or corresponding degree title or other equivalent titles.

IV

Convalidation between professional modules established in the title of Technician on Systems Exploitation Computer software, under the Organic Law 10/2002 and those established in the title of Technician in Microcomputer Systems and Networks under the Law of Organic Law 2/2006

of the Forming Cycle (LOCE 10/2002): Exploitation of Computer Systems

Professional Cycle Modules (LOE 2/2006): Microcomputer Systems and Networks

Installation and Maintenance of Local Network Services.

0225. Local networks

and Maintenance of Computer and Computer Systems.

0221. Assembly and repair of equipment

and Maintenance of Office and Corporate Applications.

0223. Ofimatic Applications.

and Maintenance of Internet Services.

0227. Network Services

Maintenance of Information Portals.

0228. Web Applications

Administration, Management, and Marketing in Small Business.

0230. Enterprise and entrepreneurship.

Systems in Single User and Multiuser Environments.

0222. Monopposite operating systems. 0224. Network operating systems.

v a)

correspondence of the accredited units of competence as set out in Article 8 of the Organic Law of June 19, with the professional modules for their convalidation

Accredited competition units

Modules convalidable

UC0219_2: Install and configure the base software on microcomputer systems.

0222. Monopposite operating systems

UC0958_2: Run administration and maintenance procedures on base and client application software.

0222. Monopposite operating systems. 0226. Computer Security

UC0220_2: Install, configure, and verify local network elements according to established procedures.

0225. Local networks

UC0221_2: Install, configure, and maintain general purpose computer packages and specific applications.

0223. Office applications.

UC0222_2: Facilitate the user to use general purpose computer packages and specific applications.

0223. Office applications.

UC0953_2: Mounting microcomputer equipment.

0221. Assembly and maintenance of equipment

UC0954_2: Repair and expand microcomputer equipment.

0221. Mounting and maintaining equipment

UC0957_2: Maintain and regulate the physical subsystem on computer systems.

0226. Computer security

UC0955_2: Monitor local network communications processes. UC0956_2: Perform the connection processes between private networks and public networks.

0227. Network Services

UC0959_2: Maintain the security of physical and logical subsystems on computer systems.

0226. Computer security

v b)

correspondence of professional modules to the competency units for accreditation

Accredited Competition Units

Convalidable Professional

0222. Opposing operating systems.

UC0219_2: Install and configure the base software on microcomputer systems

0223. Offiatic Applications.

UC0222_2: Facilitate the user to use general purpose computer packages and specific applications. UC0221_2: Install, configure, and maintain general purpose computer packages and specific applications

0222. Monopposite operating systems. 0226. Computer security.

UC0958_2: Run administration and maintenance procedures on the base and client application software

0225. Local networks.

UC0220_2: Install, configure, and verify local network elements according to established procedures

0225. Local networks. 0227. Network Services.

UC0955_2: Monitor local network communications processes

0227. Network Services.

UC0956_2: Perform the connection processes between private networks and public networks

0226. Computer security.

UC0959_2: Maintain the security of physical and logical subsystems on computer systems

0221. Assembly and maintenance of equipment. 0226. Computer security.

UC0957_2: Maintain and regulate the physical subsystem on computer systems

0221. Assembly and maintenance of equipment.

UC0954_2: Repair and expand microcomputer equipment. UC0953_2: Mount microcomputer equipment.