The European Computer Driving Licence Foundation Ltd.
Portview House
Thorncastle Street
Dublin 4

Tel: + 353 1 630 6000
Fax: + 353 1 630 6001


The official version of EUCIP Core Syllabus Version 3.0 is the version published on the
EUCIP website, which can be found at:

Although every care has been taken by The European Computer Driving Licence
Foundation Ltd. (hereinafter referred to as ECDL Foundation) in the preparation of this
publication, no warranty is given by ECDL Foundation as publisher as to the completeness
of the information contained within it and neither shall ECDL Foundation be responsible or
liable for any errors, omissions, inaccuracies, loss or damage whatsoever arising by virtue
of such information or any instructions or advice contained within this publication.
Changes may be made by ECDL Foundation at its own discretion and at any time without

Copyright © 2008 ECDL Foundation
All rights reserved. No part of this publication may be reproduced in any form except as
permitted by ECDL Foundation. Enquiries for permission to reproduce material should be
directed to ECDL Foundation.

Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.0 Page 1 of 38

EUCIP Core Syllabus 3.0 Contents

Module A – Plan Knowledge Area 3

Module B – Build Knowledge Area 17

Module C – Operate Knowledge Area 27

Glossary of Syllabus Item Verbs 37

Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.0 Page 2 of 38

The following is the Syllabus for Module A, Plan, which provides the basis for the tests in
this module domain.
Module Goals
EUCIP CORE: Module A, Plan, requires the candidate to appreciate the use
Plan Knowledge Area and management of Information Systems.

The candidate shall be able to:

 Understand organisations and their use of ICT, as an
enabler for effective Information Systems and a platform
for innovation.
 Understand organisational strategies and business
 Recognise issues related to the management of ICT, such
as selecting the appropriate technology, or choosing
between in-house systems development or outsourcing.
 Measure the value of IT investments through the use of
feasibility studies, and costs and benefits analysis.
 Understand possibilities for e-business, virtual
organisations and the use of enterprise applications
resulting from the global networked economy.
 Appreciate the requirement for a professional approach to
project management and quality assurance. Recognise
the role of innovation and the challenge of promoting it.
 Understand the importance of physical and distributed
teams, the business implications for social networking
technology and the importance of effective communication
when presenting the case for change within an
 Appreciate some of the legal and ethical aspects of ICT.


A.1 Organisations and A.1.1 Organisational Types A.1.1.1 Describe organisations and major
their Use of ICT and Structures organisational types in terms of
their internal structures such as
hierarchical, flat; legal status such
as charity, partnership; size such
as SME, corporation.

A.1.1.2 Describe the importance of
information in an organisation for
operational, tactical and strategic
decision-making processes.

Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.0 Page 3 of 38

1. A.2 Information Processing A. knowledge sharing. Outline the impact service strategy will have on planning and control. competitors. Assemble To Order. A.1 Outline the difference between data and information. automation.2 Outline how diagrams can show information processing systems in terms of inputs.1. market maturity and rivalry. such as Engineer To Order.3 Outline how diagrams can demonstrate workflow within different organisations. A. role in the value chain. transaction processing.1. processing and outputs.2.2.5 Outline how different organisational cultures impact on ICT policies. A.1. CATEGORY TOPIC REF.3 Strategic Positioning A.1 Outline the typical components of a business plan and its relevance for investors. integrated e- business.1.2.3 Describe the use of information processing systems within an organisation. A.2 Describe how an organisation can determine its service strategy.1 Recognise the position of an organisation in terms of industry classification. stakeholders. personal productivity tools. A.1. processes. Make To Stock. range of products/services. A. such as enterprise management. such as data processing.4 Outline the typical uses of ICT within an organisation.3 Outline external and internal factors affecting an organisation. A.1.1. such as international markets. ITEM A. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.1. the environment. process control systems.3. A. Make To Order.0 Page 4 of 38 .4 Business Plans A.

such as knowledge sharing between internal functions. such as SWOT.1.5.1. such as construction. such as Enterprise Resource Planning.1 Describe the roles and Organisational responsibilities of management at Management strategic.1. ITEM A. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. memory and learning.6 IS Support for A.6.1. care for the client. A.1. Key Performance Indicators. Balanced Score Card. A.3 Define organisational knowledge. research and development.4.4 Outline key strategies for improving organisational competitiveness.2 Relate various categories of ICT applications to the different management levels.6. tactical and operational level. Ishikawa diagram.1.4 Outline some common decision- making and business measurement methods.1.1 Understand the concept of business processes and differentiate between primary and support processes. A.6.5. sales. A. financial service. A.0 Page 5 of 38 .5. such as Pareto diagram.3 Recognise the business processes used by organisations in different sectors. in relating business strategies to market and environmental factors. A. Customer Relationship Management and recognise the business processes that they support.1. A.3 Describe a suitable ICT solution for a given business plan.5 Business Processes A.1.5. public administration. and describe how ICT systems can support these initiatives. A. manufacturing.2 Describe major enterprise application types. Critical Success Factors.1. CATEGORY TOPIC REF.2 Describe the role of performance indicators and analysis techniques. A.

3 Define the term digital divide. Learning A.2 List the technical requirements for using multimedia.7 Collaborative A. and virtual classrooms.3 Distinguish between virtual teamworking and physical.8 Computer Based A.8. A.1. A.1. A.1.4 Outline the factors for successful implementation of computer- based collaborative work. CBT.8. ITEM A.7.1.1. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. discussion boards. technical support.1 Define collaborative technologies Technologies and list their main features and applications. A.2.9.2 Describe the importance of aligning ICT strategy with business strategy.1.9 The Information A.1.9. such as blogs.1.1.1 Recognise the need for an ICT strategy and outline the purpose of having an ICT strategy. adaptability.1.2 Define the purpose of workflow management systems and their advantages compared to less formal systems.1 Describe computer-based training Training and e.1. co- located teamworking.2. organisational culture.9.3 List the advantages and disadvantages of e-learning. A. such as management support. CATEGORY TOPIC REF. A.1.2 List the advantages and disadvantages of ICT in society. (CBT) and e-learning.7. A.0 Page 6 of 38 .1 Describe how information and Society communication technologies have transformed society.1. A. A. usability.1.2 Management of ICT A. leadership.8. A.1 ICT Strategy A. A. technology availability.5 Describe the support Management Information Systems (MIS) provides in an organisation and outline some MIS applications.

planning systems.3. such as hierarchical.g. and the corresponding requirements for the organisation. A.0 Page 7 of 38 . A. such as CIO (Chief Information Officer). decision support systems.2. storage.2 Outline different scenarios showing appropriate matches between organisational need and ICT. A. Outsourcing Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. such as IT as an enabler of the industrialisation of services (e. retrieval and use.1 Outline the human.2. A.2.4 Systems Development A.2.2. Software as a Service (SaaS).1. A. data warehousing and gaining business intelligence.3 Describe how ICT can be used to support the business by relating the ICT components of an Information System (IS) to the business processes they support.1.1. A. technical and versus Systems financial considerations in systems Procurement or development. process control systems.2 Describe the importance of databases for recording transactions.2.2.2. automation systems.2. CSO (Chief Security Officer).2.4 Describe how ICT can be used to increase an organisation’s flexibility.2. A.2. industry specific roles of IT. offshoring).4 Understand the concept of Personal Information Management (PIM) and its benefit in supporting information acquisition.3 Mapping ICT Solutions A. CKO (Chief Knowledge Officer).1 Outline the key attributes of transaction processing systems.3. ITEM A.2.4.2. A.2.2.3 Identify business-critical ICT services and related components.5 Describe the differing strategic roles of ICT staff in supporting the business. CATEGORY TOPIC REF.2.2 The ICT Needs of A.1 Describe different information Different Organisations sharing models. distributed. A.

0 Page 8 of 38 .2 Recognise typical examples of ICT procurement or outsourcing. such as Total Quality Management (TQM).5. A.2 Define the concept of end user computing.2.2. A. compensation.3 List the most common reasons for outsourcing from a business perspective. Business Analysts.4 List the advantages and disadvantages of systems development versus outsourcing. professional development.5 Staff Management A.4 Understand the factors involved in retaining skilled staff.2.5. and outline the roles and responsibilities of the end user and the ICT staff.2. such as HR policies.5.2.5 Outline the factors for consideration prior to taking a build or buy decision.2. European Foundation for Quality Management (EFQM). A. CATEGORY TOPIC REF. A. A. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.1 Describe the different roles involved in developing and maintaining Information for a full listing of IT Professional profiles as defined by EUCIP.5. A.2.2 Outline major approaches to quality management. workplace environment. Software Developer. A.2. A. Capability Maturity Model Integration (CMMI). A.1 Describe some of the attributes of quality in the context of evaluating Information Systems quality. Network Manager. Common Assessment Framework (CAF).eucip. ITEM A.6.2.4. International Organization for Standardization (ISO) certification.2.6. 1 See www. job mobility.3 Outline the advantages and disadvantages of outsourcing systems development in relation to staff issues.6 IS Quality Management A. such as Systems Analysts. 1 Database Manager. career planning.

6. such as cost reduction.3. A.2 Describe how to evaluate the typical benefits of ICT. A.1 Understand the strategic Solutions importance of evaluating all costs and benefits before. A.3. such as Return on Investment. Measuring the Value A. project sponsor or user/recipient of ICT services.1 Describe the main methods used to evaluate an investment.2.4 Evaluation of ICT A.3.5 Define the term organisational feasibility. A. such as staff satisfaction.2 Describe the process of assessing the feasibility of Information System plans and matching them with business needs/plans.3. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.2 Business Plans and A. A.3.3 Costs and Benefits A.2.3.6. A.1 The Concept of the A. A. Internal Rate of Return. improved company image. A.3.1 Understand that ICT must support Feasibility Studies organisational business plans. A.2.5 Define Total Cost of Ownership (TCO) and list the typical cost items for ICT systems.3 Define the term economic feasibility.3. A. both tangible.2.4 Describe the need for monitoring and evaluation of ICT investments. A. CATEGORY TOPIC REF. and after.3 Define and distinguish between capital costs and operational (current) costs.2. during.2 Differentiate between different meanings of client as external purchaser. schedule improvements and intangible.3.1 Define the concept of of ICT Client stakeholders in a business. ITEM A. Define the term technical feasibility. Define the major risks associated with a lack of quality in an IS.1. A.0 Page 9 of 38 . Net Present Value.3.3.3. the delivery of a new solution. A.

4 The Global A.4. A.3 Outline how to provide effective customer service and manage customer relationships in e- business operations. Business A.2.1.1 Define the concept of globalisation Networked Economy Global Networks and the opportunities it can provide for businesses.4. A. return on investment. A. Describe the scope and use of Enterprise Resource Planning systems.2.3 Customer-Centricity A.2 Transforming A.4.2 Describe the business value of the Internet for commercial organisations.2 Describe how ICT can redefine organisational boundaries and how it can be used to increase organisational flexibility.2 Outline the major methods used to evaluate ICT solutions. Define the concept of a virtual and Virtual organisation and describe how Organisations virtual organisations operate. A. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.4.4. pilot projects. user surveys.4.4. A. Enterprise Applications A.3.4. CATEGORY TOPIC REF.1 Opportunities from A. A.3 Define the unique customer concept and its main technological implications.3. A.4. A. cost benefit analysis.1 Outline the major effects of e- Processes to e. A. ITEM A. such as feasibility study.2 Outline how ICT can be used to drive organisational change. A. A.4.4.3 Outline the use of intranets and extranets in business.3.4.3 List examples of costs and benefits that are easy and difficult to measure. business on organisations. A.4.0 Page 10 of 38 . budget and control.3.2 Describe the scope and use of Supply Chain Management systems.4.1 Describe the scope and use of Customer Relationship Management systems.

Gantt chart. critical path. key user. difficulty in measuring progress.1 Describe the principal elements of project organisation. cost and quality of IS projects. linear responsibility chart. A. poor understanding of ICT by clients.5.3 Project Organisation A.1. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. A.5.3 List the major factors that ensure successful IS project management.5.5 Project Management A.1. Cost and Quality A.4 Project Planning.2. intangibility of ICT outputs. subcontracting. client/contractor’s project manager.3.3.5. organisational structure. cost and quality have on each other and on project management.3.3 List the most common methods for estimation in different IS project types. CATEGORY TOPIC REF. final user. A.1 Outline how ICT projects differ from other business projects in terms of being agents of change. A.4.1 IS Projects A.2 Time. Outline the main objects used in international project management methodologies. A. such as activities.0 Page 11 of 38 .2.5.2 Outline the advantages and disadvantages of a highly formal definition of project responsibilities. A. such as work breakdown structure. such as a steering committee. pure deployment.5.1.3 Describe the roles involved in an ICT project.5. A.1 Understand the structure.4.2 List the major factors of uncertainty that affect time.2 Relate the concepts of project management to ICT and IS.4 List the major factors that hinder successful IS project management. including pure development. and mixed projects.5. A. ITEM A.5.5. A.5.2. content. Describe the impact time. A. A. specialist. Monitoring and Control and purpose of a project plan. dependencies. A.

A. A. A. and outline how time.4 Describe the rationale behind earned value analysis and related performance indexes. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.2 Describe the importance of planning assumptions regarding scope.5.5 Project Evaluation A.5.5. risk control.5. A.2 Outline the importance of gaining formal agreement on various project documents. A.5. A. such as risk assessment. cost.5. cost and quality might be affected by unforeseen factors. ITEM A.5. resources.5.1 Describe the main concepts of risk management that apply to a project proposal. actual progress. Page 12 of 38 .6 Project and Contract A. staff expertise.7 Quality Assurance A. such as activities.1 List the phases of a typical IS Management project. A. constraints.7. A. CATEGORY TOPIC REF.3 List the main functional elements of computer-based project management tools.3 List the items that should be covered in a contract.3 Outline the issues related to project budgeting and cost accounting.5.6. such as deliverables.4.4 Outline the difficulties in measuring some project benefits.5. penalties.6. A.1 List the benefits derived from quality assurance in IS. checkpoints.5. technical and organisational aspects.5. dates.6. A. plans.5. A. including statements of work and contracts.5. reviews.5. quality assurance.5 Recognise the impact of European public procurement directives on IS procurement.5.4 Describe the need for milestones.6.6. A.5.5. methods. deliverables.5 Describe the elements of project control.

robustness. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.6. encouraging a cross functional team approach.2.7. integrating innovation into core business values and processes. such as user satisfaction. A. Outline the main challenges of collaboration and co-operation in teams and groups.2 Outline the organisational and managerial challenges in planning and benefiting from innovation.6.6.1 Describe the concept of innovation Information Systems in information systems. such as static and dynamic testing techniques. A.6.7.5. A.5.5. A.6.5.2 List typical business functions that can be exploited by globally distributed teams.6. A. A. such as a flat management structure. security.3 Outline the organisational and managerial challenges presented by globally distributed teams. CATEGORY TOPIC REF. A.5.1 Define the concept of groups and Communication teams.8 Innovation of A.1 Describe the business value Teams derived from globally distributed teams. A.2. and describe their different motivational levels.6. promoting open communication.2 Globally Distributed A.6 Collaboration and A.1 Teams A.5. quality assurance manager and project assurance group within an organisational structure.8.6.3 Recognise environments which foster and develop IS innovation.7.4 List the main categories of software quality analyses.3 Distinguish between the roles of a project manager.0 Page 13 of 38 .1. A.2 Outline variables that can be used to measure IS/ICT quality.8.8. A.1. bug free software. A. ITEM A.2 Recognise different team roles and distinguish between those involved in creating content as well as supporting the work of the team.

A. A. A.4 Define ownership of copyright in an ICT context.4 List technical requirements for the use of AV tools.6.3.2 Outline where AV tools might be used. such as new advertising/marketing strategies.6.3 Outline methods to protect intellectual property rights.4 Presenting the Case A.0 Page 14 of 38 .1.6. A.6.4.7. A.1 Intellectual Capital and A.6.4 List the reasons why there might be resistance to change. creation of new business networks.7. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.3 Social Networking A. CATEGORY TOPIC REF.6.1 Describe social networking technologies and outline their main features.1.5. A.6.1 Define the concept of intellectual Issues Property Rights property.6.1 List the most widely used audio- visual (AV) tools.4.6. A.1. A.5. A.4.3 Outline the benefits of using AV tools. A.5.7.2 List interpersonal communication forms and recognise the need for a common understanding of jargon and ICT terminology.2 Recognise common breaches of intellectual property rights.1.3.2 Recognise business applications of social networking technologies.3 Recognise the impact of social networking technologies on the creation of new forms of collaboration and social involvement.3 List motivating factors for the acceptance of new technology. ITEM A.7 Legal and Ethical A.1 Describe the role of effective for Change communication in articulating shared objectives.5 Audio-visual Tools A.3. A. more productive collaboration in virtual environments.7.6.6. A.6. A.5. A.

A.4 Outline the role of a security officer.3 Ethics and Codes of A.7. contracts.2 Outline the principles contained in national legislation related to the legal issues in ICT.7. A. A.4. A. Page 15 of 38 .5 Distinguish between various levels of security policies and relate them to severity of risk. Outline the potential threats to IS and ICT infrastructure. such as privacy. copyright.7.7.4. A.2 Identify specific methods and technologies that will protect a system from unlawful.7. CATEGORY TOPIC REF. A.7.6 Outline appropriate security considerations for a given scenario.7. A.1 Outline the main legal issues related to the use of ICT. A.3 Describe the scope and function of a security policy. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.4. A. malicious attack and accidental damage.2 Legal Issues A.7. A.5 Recognise common breaches of copyright.3 List typical topics covered by codes of professional conduct regarding the use and development of ICT systems.6 Define the term software piracy. A.7.7.2 Outline personal and professional privacy issues associated with the use of ICT systems.1.7. A. software licenses.7.7. ethical and moral perspective.2.4. ITEM A. Outline the principles contained in EU legislation related to the legal issues in ICT.7. A.2.4.4 Security A.1 Outline how all levels of decisions Conduct can be considered from an organisational.

cables. List actions to minimise or eliminate potential H&S hazards. usage and disposal conditions.5. hot surfaces.7. waves. electric shocks.1 Describe the special health and safety (H&S) considerations pertinent to IT use.5 Health and Safety A. screen flicker. ITEM A.3 Outline the central concepts of the relevant EU and national H&S legislation and directives. such as sharp edges. A.5.0 Page 16 of 38 . A. CATEGORY TOPIC REF. repetitive strain injury. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.5.

1. Understand the basic elements of HTML and XML and appreciate different types of web-based programming. ITEM B.1. requires the candidate to understand the Build Knowledge Area development and implementation of Information Systems. The candidate shall be able to:  Understand the technical aspects of design.  Understand the systems development life cycle. B. B.  Appreciate the principles and uses of relational databases and data warehouses. web pages and hypermedia. operating Methods system software. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. application software. which provides the basis for the tests in this module domain.1. development. Build. testing. Module Goals EUCIP CORE: Module B.2 Recognise and list examples of system software.2 Systems Development B. integration and deployment of IT systems.1. system configuration data and user-defined data.2. B.1 Software in Data B. Understand object- oriented programming principles. Be aware of important database administration and security issues.0 Page 17 of 38 . firmware. Build.3 Recognise and list examples of application software.1.  Appreciate the design principles associated with user interfaces.1.1 Describe a data processing Development Processing Systems system as a combination of Process and hardware.1 Systems B.1.1.  Appreciate programming maintenance issues.  Understand software design methods and techniques. specification. and know about documenting and testing software systems. MODULE B – “BUILD” KNOWLEDGE AREA DEVELOPMENT AND INTEGRATION OF INFORMATION SYSTEMS The following is the Syllabus for Module B. describe typical data structures and algorithms and interpret programming constructs.1 Describe the typical phases of Life Cycles systems development. the typical development process and be aware of recent systems development trends.  Understand the relational model and query languages. CATEGORY TOPIC REF.1.

4.1. ITEM B. prototyping. such as release of software to users. B. B. B. technical specification. such as organisational specification. such as big bang.2 Compare the various classical models of systems development life cycle.1. such as upper.4 Outline specifications for requirements and design. lower. integrated CASE tools.0 Page 18 of 38 .1 Describe the different types of Deployment testing and review that can be applied during the systems development life cycle. B. B. spiral. B.4.1. user training and initial support.5. development and deployment. step by step. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. B.1 Distinguish between development.1.1. such as waterfall.4. B.1. compiling. core model and rollouts.2.2. use and maintenance.2.3. debugging software. such as version control systems.1. Safety test and production environments and understand the importance of a structured approach to system releases. CATEGORY TOPIC REF.3 Outline the strengths and weaknesses of different implementation approaches.4 System Testing and B.1.3.1. decommissioning.3 Describe the life cycle of a system in terms of analysis.4 List the typical components of system user manuals and technical reference documents.1 Outline the use of tools at different Tools stages of systems development. Software Development B. B.5 System Control and B. data migration. software distribution procedures.1.4. B. incremental releases.1.3 Outline the use of simple development tools for editing. testing.2 Describe the main issues in the system implementation phase (deployment).1.2 Outline the strengths and weaknesses of different software development environments.

legacy mainframe extension and integration on systems development. such as data redundancy and inconsistency.2 Understand the impact of current technical architecture developments. SEI/CMMI. statistical data. service oriented architectures.1. “n” tier web-based. indexes. such as two or three-tier client server variants.2 Database Structure B.3 Describe the day-to-day security routines in a distributed system. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.1 Outline the importance of durable and Databases data recording for transaction processing and reporting systems.1 Describe standard and innovative Development approaches and standards for systems development.1 Distinguish between a file management system and a database management system (DBMS).2 Recognise risks related to system failures and outline measures to protect company-sensitive data at various levels.5.6. concurrent access and security.2. B.2 Describe the components of a database system.1.2 Data Management B.6 Trends in Systems B. such as back-up procedures. B. flexibility in data.1.2.1 Data and Transactions B. B. such as data files. B.2.2. integrity problems.1. data dictionary.2.2. CATEGORY TOPIC REF. such as ISO12207. procedural. B. such as physical. B.5. agile methodologies. B.1.0 Page 19 of 38 . access control. isolation and durability help to guarantee secure database transactions.2.1.1. B.6. such as autonomic systems. B. consistency.1.2 Describe how atomicity.1.2. ITEM B.2.3 Outline design and maintenance issues for multi-user systems.6.3 Describe the complexity of modern “system of systems” and approaches to manage this complexity.

5 Query Languages B. referential integrity. B. object- oriented model. alternate key. backup/recovery tools. primary key. 2nd. 3rd normal form.5 Describe the different roles of a database administrator.1 Define data abstraction and describe the difference between physical level. such as hierarchical model. such as non-redundancy.4. physical data model.2 Describe important relational model terms.2.3 Data Modeling B.2.2.3 Outline the business areas where a DBMS is used. key. such as query language.2.2. view (user) level. B. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. B. record-based logical model. B.4 Outline the components of a DBMS. B.5. B. and recognise the benefits they offer.3.3 Explain through simple examples the process of normalisation for 1st. flexibility. administration tools.1 Outline the benefits of a relational model. foreign key.3 Describe the principles of record- based logical models.0 Page 20 of 38 . CATEGORY TOPIC REF.3.2. B. network model. database user. database designer/programmer.1 Distinguish between procedural and non-procedural query languages.2. concurrency controls.4. such as the object-based logical model.2 Distinguish between different groups of data models.2.2. conceptual (logical) level.2.3. transaction management. such as relation. ITEM B.2. B.4.2.4 The Relational Model B. B.2.2. B. report generator. scalability. such as entity-relationship model.4 Describe the principles of object- based logical models.

Availability). rollback.2. such as grant.4 Describe recovery schemes based on different types of failure. such as where.6 SQL queries B. B. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. revoke. such as human security. database security. system errors.3 Outline examples of different security policies. intentional (malicious) access to the database. Data Control Language (DCL).5.7.6. update. CATEGORY TOPIC REF.5 Understand SQL DCL commands.2.5.2 Describe the fundamental operations of relational algebra. B. B.2. cartesian product. set difference.2 Describe the security and integrity problems covered by the acronym CIA (Confidentiality.2 Understand SQL clauses.5. Integrity.0 Page 21 of 38 . storage structure and access methods.2.2. such as select. such as insert. such as commit. project. accidental loss of data integrity.1 Describe the most important Administration and database administration Security procedures. delete.2. select. B. group by. Data Manipulation Language (DML).2.2.7. schema and physical organisation modification.7.1 Understand basic SQL DML commands. drop. such as create.7. physical security.4 Understand SQL DDL commands. such as logical errors.3 Describe the components of the Structured Query Language (SQL). authorisation for data access. B. rename. operating system security.2. B.6.2.2. B. system crash. B.2.3 Outline the use of views and special SQL commands. disk failure. accidental loss of data consistency. joins.5. order by. such as integrity constraints.6.2. B. alter table. ITEM B. such as schema definition. B. such as Data Definition Language (DDL). union.7 Database B.

open source.2 Describe the use of procedures and functions.2. ITEM B. free software.3 Recognise the principle uses of DW systems.3. freeware. procedural. obsolete software/hardware.2.2.8. and distinguish between call by value and call by reference.1 Distinguish between and describe Languages the merits of the main types of programming languages.8. B.3.2 Describe the use of abstraction as a technique for problem-solving and software design. B. such as records.2 Evaluate the fit between typical search and sort algorithms and the different data structures.0 Page 22 of 38 . OO-based.3.8 Data Warehousing and B.3. such as complex structure.3.3 Define the term syntax and outline its importance in programming languages.8. structured programming.1.1 Describe the concept and Data Mining components of a data warehousing (DW) system.2. linked lists. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.1 Software Design B.3.1. arrays.3.3.4 Distinguish between open source and proprietary software development.3. B.3. B.2.3 Outline the specific needs of legacy systems in program design.1 Outline the main features of Methods and different program design methods. B.1. B. B. poor documentation.2.2 Define the concept of data mining.2 Data Structures and B.3. CATEGORY TOPIC REF.3. B.1.3. top down design. B.1.1 Describe structured and Algorithms unstructured data types and recognise different data structures.3. B.3. business critical system. such as functional.3.5 Outline the different licensing requirements of proprietary software. Techniques such as object-oriented (OO) design.3 Programming B. B. B.3 Programming B.

3. B.3 Describe the concept of a class.7 Documentation and B.5 Describe the concepts of abstraction and encapsulation (information hiding). CATEGORY TOPIC REF. Unified Modeling Language (UML) code.3.2 Describe the concept of object- oriented programming.3. decision trees.3. B. system testing.4.5. such as error.4 Describe the concept of inheritance and the impact of inheritance for the programmer.1 Interpret and evaluate input/output instructions.3.3.3 Interpret and evaluate arithmetic and logical operations. B. instance.3 Distinguish between static and dynamic test methodologies.4.2 Interpret and evaluate control statements.3. debugging. B.2 Describe the different purposes and scope of unit testing.6 Describe how polymorphism contributes to efficient software design through the development of reusable components.3. acceptance testing. B. such as structured English. B.4. B.3.4 Object-Oriented B. B.3. testing.5 Elementary Constructs B.4 Distinguish between compilation and interpretation of programming languages.4.1 Describe the common Maintenance documentation for software development and delivery. Define basic testing concepts.6 Testing B. code comments. ITEM B.4. object. B. flowcharts.3. B. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.0 Page 23 of 38 . B.3.3.3. failure. B. fault. Recognise the various levels of checking. method and their relationship in object-oriented programming.6.1 Describe the main concepts of Programming object-oriented design. B.5.5. and list examples of automatic test tools.

4. pictures. and recognise effective ways to communicate information. rules for comments in the code.8.4. such as sound types. variety.4 Describe methods to attain quality in program maintenance. digital smells. and apply basic principles of graphic design.0 Page 24 of 38 .2 Identify errors or weaknesses in the code and modify it to meet requirements.2 Describe the value of well- structured and documented code. technical reference documents. uses.7. such as textual. B.4 User Interface and B.1.4 Outline the various technologies that communicate information to human senses. digital audio and video.1. B. standard formats. haptics/touch.4.2 Understand how communication applies to human beings.3 Define the concept of a User Interface and list the different kinds of interfaces.4. and describe their differences.4.1.5 List models for testing the effectiveness of a user interface against its design requirements and goals.3.1. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. B. graphical. contrast.2 Describe the benefits of using drawings. colours. Define basic concepts of Web Design Interaction: Guidelines communication theory.1 Outline the concepts of graphics and animation (bitmap and vector).3. B. ITEM B.8. CATEGORY TOPIC REF. B.1. animation.1 Interpret small program segments Examples constructed from a given hypothesis.3.2. auditory. receiver. harmony.3 Outline how to document changes in software and program documentation.4.1 Human-Computer B.4.3.8 Programming B. B. B. B.2 Graphic Design B. B.3. such as and Standards sender. messages. B. B. such as balance. visual clues.7. such as code inspections.4.4.

small byte-size graphics.8 Outline the use and purpose of structure diagrams for website design.4. CATEGORY TOPIC REF. spell- check. ITEM B.4.4.2 Outline the risks of having too many messages on one page. consistently navigable. such as readability.4 Describe guidelines for developing user-friendly websites. contact.3 Web and Hypermedia: B.4. navigation icons.4. condense text content.4.2. contrast.2 Define hypertext and hypermedia and outline their importance in web page design. B. B.3 Outline the common components used in web pages. Describe the history behind the Possibilities and Internet and the World Wide Web. colours.4.4. B.5 Describe general quality criteria for web text.4. where am I.4.3 Use common tools for simple picture manipulation in terms of size. B. Limitations B.4. B. B.4.7 Outline the tools for the development of a website. B.4 Describe the use and value of internal and external websites in a company.1 Recognise the needs of the target Requirements and group for whom a web page has Methods been designed.0 Page 25 of 38 .4. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.3. prioritised content.4.4. such as browser capability issues.3. B.6 Explain the need for easy navigation on a website. help.4. B.4. site map.4. B.5 Outline some of the challenges in maintaining a business website. shape.4. side bar. search feature.3 Outline the problems associated with a poor mix of colours.4 Web Design B. B. B. validating HTML. such as top bar.3. transparency.4. easily navigable.4. last updated.4.

4.4. lists. dividers.4. B. B.6. links. Designing Web Pages B. such as font size.3 Outline basic graphic principles for normal written text.0 Page 26 of 38 . B. tables. image tags. frames. B. the evolution of HTML into XHTML.6.6 Web Based B.4. alignment. headers.4. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.1 Outline the concept of a markup language and describe the main features of HTML.4. rough drafts. soft format.2 List some of the main challenges in integrating web-based systems to existing systems.4. B.5.9 Describe the major methods used for navigation.5. such as story boards. B.10 Describe some project approaches to web design and common techniques. its uses. such as hard format. forms.4.4 Outline the basic elements of XML. such as Cascading Style Sheets (CSS) and Extensible Stylesheet Language (XSL).4. backgrounds. colours.2 Use basic HTML commands and interpret layout commands. Understand their use in design.4.5.1 Distinguish between client-side Programming and server-side technologies and recognise different types of web- based programming languages.4. B. percentage white space. ITEM B.4. B. CATEGORY TOPIC REF.5 Describe the concept of style sheets. special characters.

ITEM C.1 Main Hardware C.  Understand network service principles including cryptography and the domain name system. RAM.1. and describe their functions.1.  Understand the World Wide Web. C. keyboard and pointing devices. printers.3 Identify the main types of peripheral units of a basic computer system.  Understand communications principles. and communication protocols. The candidate shall be able to:  Understand hardware components. ROM. and describe their functions.1 Computing C. C.1. disks.1.0 Page 27 of 38 .2 Describe the interrelations between the main central components of a computer system. such as CPU. network cards.  Understand wireless communication principles and wireless networks and protocols. MODULE C – “OPERATE” KNOWLEDGE AREA OPERATION AND SUPPORT OF INFORMATION SYSTEMS The following is the Syllabus for Module C. electronic messaging options and voice over Internet protocol services. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. which provides the basis for the tests in this module domain. Operate. and apply some of the basic principles of IT service delivery. computing architectures and processor concepts. requires the candidate to appreciate Operate Knowledge Area the operation and support of Information Systems. network components and architectures.1. Module Goals EUCIP CORE: Module C.  Appreciate the principles of operating systems and understand features of common operating systems.1. such as screen.  Describe network management principles and the simple network management protocol.  Appreciate the importance of a client-oriented approach to IT support. CATEGORY TOPIC REF.1. Operate.  Outline tools for system and network management.1 Identify the main central Components and components of a computer Architectures system.

2 Describe the concept of chipset and the purpose of the various types of buses in a computer system. faster memory versus slower storage devices. the Architectures architecture of a general purpose computer. clock frequency. such as capacity.2.1.4 Define the term coprocessor and outline the role of a coprocessor in the ISA.1.1. speed.2 Describe the dualism between CISC and RISC processor design.1. dynamic scheduling and speculative execution. instruction- level parallelism.1. C.4 Recognise the characteristics of different types of peripheral units and compare features and performance using appropriate parameters.3 Describe the concept of memory hierarchy. compatible standards. ITEM C. C.3. chip size.4 Identify the range of computer systems available.1. such as handheld.3 Describe the concepts of instruction pipelining. such as hierarchy levels.3 Processors C. pipeline stages.1.1. SRAM.5 Distinguish between the main types of memory technology.2.3. C. C.1. EPROM. C.1. laptop. flash.1.2 Computer C. caching system.0 Page 28 of 38 .3. such as single/multi-core. resolution. C. and outline the main differences in their architectures.2. CATEGORY TOPIC REF.1.3. C. C.1 Describe the concept of an Instruction Set Architecture (ISA). and its implications in computer systems.1.1. using diagrams.3. and compare their uses. such as DRAM.5 Describe the features of a microprocessor. cache efficiency. C.1. multiprocessor servers.2. mainframes. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. C. power consumption/dissipation. desktop.1 Identify.

3.3 Describe the concept of thrashing.2 Outline the types of protection mechanisms used in OS. C.2.2.3 Outline processing and multiprocessing.2. C. C.4.1 Understand the need for protection and security (in terms of confidentiality. Windows API. such as Java API.4.5 Outline a context switch operation.2. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.3. C. integrity and availability) in a computer system.1.2. real-time.3. such as batch. C.5 Outline the functions of a file system. C.4 Describe how the concept of memory hierarchy affects programming. C. Google Maps API.3.2. C.1 Describe the functions of operating systems (OS) available for a general purpose computer.2. C.2. C.3.2 Outline the mutual exclusion problem.2.1. C. Principles C.2. ITEM C. Operating Systems C. time-sharing.2.2 Concurrent and C. CATEGORY TOPIC REF. such as separating working memory from files.3 Describe the concept of application programming interface (API) and provide examples of API.3 Memory and Storage C.2 Describe how an OS manages virtual memory through storage and memory hardware. C. C. C.2.4 Security and Protection C.4 Outline threading.4 Describe how the resources of a computer are managed by software. its impact and how it is prevented and managed.2.1.2. C.0 Page 29 of 38 .1.2 Outline different types of OS.1 Outline the reasons for Parallel Processes concurrency inside an OS.2.1 Outline the purpose of virtual Management memory.

6 Describe the role of network standardisation bodies.3.3. stability. List the components of a network.3.3. C. apparatus. such as backdoors.1.3. C. C.2. common uses.2. C. Describe the main features of an Systems OS belonging to the Unix.4 Outline the issues in converting signals from analog to digital and vice versa. common uses.4. and describe their functions.3 Communications and C. C. computer viruses. C.3.7 Outline the need for back-up and recovery.3 Describe the threats associated with malware.3. ITEM C.2 Network Components C.1 Distinguish between logical and Networks Principles physical network functionalities. such as installation.3 Distinguish between analog and digital signals. Trojan horses. security. C. Linux.2.5 Describe authentication techniques and define a “strong” authentication scheme. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.5 Widespread Operating C. C. Outline the main measures against such threats.0 Page 30 of 38 . C. C.5. CATEGORY TOPIC REF. C.6 Outline the principles of access control.3. C. performance.2 Describe the main features of an OS belonging to the Microsoft Windows family. Mac family.5. user interface.3. and Architectures such as hosts.1. performance. transmission media. such as installation. stability.2. IEEE. C. user interface.5 Compare circuit switching with packet switching. Describe the principles of information transport defining the signal concept.1 Communication C. security. such as ITU.4 Outline the differences between identification and authentication.

3.3.3 Describe how the components of a network are connected to each other. C. token ring.8 Outline different media access strategies used in different standards.4 Network Services C.4 Describe the function of interconnecting devices. CATEGORY TOPIC REF.7 Describe the standard network topologies and associate them with suitable LAN standards.3.2 Describe the characteristics of transmission media.3.2.2. such as denial of service attack.3. C. such as CSMA/CD versus token passing. fiber optic.2.2. repeater. sniffing.2.2 Match and relate the TCP/IP model to the ISO reference model.3.9 Describe the function of a firewall and its importance in network security.3.3. C.2.2.3. microwaves. ITEM C. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. leased line.1 Network Security C. ISDN.3. C.3.1 Describe the ISO 7-layer Protocols reference model and list the services managed by each layer.1.3 Communication C. DSL. port stealing. C. FDDI.4. C.4 Compare streams and connection- oriented protocols with datagrams and connectionless protocols. such as Ethernet.3 Describe how a packet is routed over the Internet. such as twisted pair.3.3. frame relay.3.3. such as hub.5 Distinguish between TCP and UDP in terms of reliability versus speed.2. C. coaxial cable. C. such as dial up.1 Describe the various types of Issues threats to regular network operations. C.5 Distinguish between the characteristics of LAN and WAN. switch. C.3.3. router.3. C.0 Page 31 of 38 . C. C.6 Describe different WAN technologies and options.3.4.

4.2. C.2.4. C.3 Describe the use and purpose of resource descriptors.4. C. C.4.2 Distinguish between secret key algorithms and public key algorithms.4.3. C.4.3 Describe how cryptography is used for protecting network communication by enhancing confidentiality (IPSec.4.4.1 Describe the origin of cryptography and its applications in network security.4.3.2 Cryptography C. C.4.4. C. C.4.4.4. and by creating a virtual private network (VPN).4.4. C. CATEGORY TOPIC REF.3.4. C.4.4. C.3 Outline the role of a Web client (browser).4.2 Define the concepts of spoofing and identity theft. by enforcing authentication (digital signature). ITEM C.4 Describe Internet Protocol (IP) addressing and how a domain name is translated into an IP address.4.1 Describe the domain name system (DNS) and its scope. C.2 Describe how Internet hosts are named.3.4.1 Describe the World Wide Web (WWW) as a client/server application.4 Outline the role and the functions of the hypertext transmission protocol (HTTP). C. C.6 Outline the purpose and use of the common gateway interface (CGI).2 Outline the role of a Web server.0 Page 32 of 38 . and the related security threats.4. C.3 Domain Name System C.5 Define and outline the purpose of a uniform resource locator (URL). Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. Outline the concept of an applet.8 Understand how website content can be managed dynamically using a database.4.4 The World Wide Web C.4. SSH and SSL).

sharing a server provided by a hosting provider.4. CATEGORY TOPIC REF. and the internet message access protocol (IMAP). C.4.3 Describe the roles and functions of e-mail clients.4.4. music. servers and gateways.1 Outline some mobile electronic Ubiquitous Computing devices. such as scanners.5.7.7 System Infrastructure C. headphones and understand their uses.4.5 Wireless and C. speakers.1. the post office protocol version 3 (POP3).1 Describe the concept of IP Protocol (VoIP) telephony.6.4.4 Describe the simple mail transfer protocol (SMTP).6 Voice over Internet C. combined audio- video transmission.1 Compare the various electronic messaging systems.1 Describe the impact of data size Dimensioning and data type on network resources.1.4.4. C.0 Page 33 of 38 .2 Outline the main multimedia input/output devices. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.5.6.2 Describe the user and network requirements of VoIP. C. such as running your own web server.9 Outline the options available to host a website. motion pictures.4.4. voice. instant messaging.2 Distinguish between e-mail and web-mail applications.5 Messaging C.4. displays. digital cameras.5. C. wearable computing components.2 Describe the characteristics of a server computer system that has to host a multimedia application. ITEM C. C.1 Multimedia and Mobile C. SMS/MMS.4. C.5. C. microphones. C.7.5. community posts. C. C. screens. such as e- mail. such as resource requirements for plain text and numbers. Computing Components PDA.5. using a dedicated server provided by a hosting provider.5. images. GPS.4. such as smartphones.

5 Outline the range of applicability of each protocol for mobile stations.2 Evaluate the compatibility of different WLAN technologies.3. transportation payments.3 Outline the limitations and issues associated with wireless and mobile computing. such as performance. ITEM C.1.3 Describe the main components of a satellite-based network.5. C.1 Describe the main functions of a Management Management network management system.2. C.1 List technologies used for wireless Communication communications and describe their functionality. UMTS. Bluetooth. such as mobile IP. Outline the main differences between major wireless standards. compatibility. inventory systems. C.2.3 Wireless Networks and C. CATEGORY TOPIC REF.4 Describe the main characteristics of mobile station protocols.5. C.1 Principles of Network C. C. such as Bluetooth.6. configuration settings.1. C.5. C.1.3. product tracking. and distinguish between their technical characteristics.5. such as passport identification. flash memory.2 Principles of Wireless C.3.5. C.6 Network C.5. WAP. magneto-optical disk. C.6. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. IEEE802.3 Describe the major multimedia storage standards. such as coverage.5. C. Page 34 of 38 . IEEE802. such as CD- ROM.2.1.1 Describe the main components of Protocols a wireless LAN (WLAN) and outline their purpose. communication speed. failures. DVD.3 Compare different system architectures for network management.3.3.6 Outline the concept of Radio- Frequency Identification (RFID) and its uses.3.16 (WiMax).2 Describe the different parameters which can be managed in a network. C. C.5.

2. IPR and confidential information.7.3 Compare the uses and purposes of SLA.7.3.2. C.6. underpinning contracts and operational level agreements. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.1 Describe the differences between Management Tools a system management tool and a network management tool. such as definition of services.2 Simple Network C. System and Network C. such as ping.3 Outline the concepts of risk. ITEM C. traceroute. warranties.7. Solstice. Agreements C. data loss. and component.2 Identify the purpose and main elements of a capacity plan. service.7.1. threat and vulnerability and give examples of each in an IS context such as loss of service.2.3 Outline the infrastructure requirements for operating a network management tool. C.2. HP Software.6. C.6.3.1 Describe capacity management Contingency Planning and explain the importance of the three sub-processes of business.2 List and describe the main elements of a Service Level Agreement (SLA).7.6. termination.1.1 Describe the main components of Management Protocol the simple network management protocol (SNMP) and their interaction. C. C.2 Outline some of the widely used software tools for system management and for network management.1 Describe the service level Support Relationships and management process and identify Service Level its benefits.2 Describe the main services provided by the SNMP.0 Page 35 of 38 . C. Capacity and C. performance measurement. problem management.6.7. C.6. tcpdump. OpenNMS.1 Customer C. Tivoli NetView.7.1. C.7 Service Delivery and C. C. C. CATEGORY TOPIC REF.3 Outline the main limitations of the SNMP.

3 Availability C.2.2 Identify the different types of service desk and describe the circumstances in which each is appropriate. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. staffing. C.4 Service Desk C.7.3. C.4 List examples of risk reduction measures.7. such as percentage availability.2 Compare some of the commonly- used measures of availability.3.1 Outline the purpose and benefits Management of availability management and define the concepts of availability. Define the purpose of a change request and the essential elements that it should contain.3 Outline availability management methods and techniques.7.1 Describe best practices in managing the configuration of an IT infrastructure. alternative resources.0 Page 36 of 38 . fault tree analysis (FTA).2 Describe best practices in IT change and release management. C. C. reliability.7. restart procedures. C.5. failure.5.5 Change Management C.3 Define the main elements of an incident management system. mean time between failures. C. C.7. recovery. C. impact of failure. C.4.2. such as fault tolerance. ITEM C.5 Outline the purpose and main elements of a contingency/service continuity plan. CATEGORY TOPIC REF. such as component failure impact analysis (CFIA). frequency of failure. C.7.4. back up.1 Outline the purpose of a service desk in a service support organisation.

selective use of knowledge.3) term by referring to its key attributes. ensured that each item was constructed using examples (such as…) and clear and concise terminology. trainers. and learning providers in understanding the appropriate depth of each syllabus item. textbook definition of a concept or (A.5) Recognise/ Knowledge/ Be able to identify an attribute of a Describe the different roles of Identify Comprehension concept from non-attributes. Comprehension: The ability to grasp the meaning of information. concept/object/term.0 was developed to ensure that there is maximum clarity around these aspects of each syllabus item. In addition.9. the EUCIP Core Syllabus Version 3. or recognise a organisational cultures impact definition from a non-definition. Taxonomy of Educational Objectives. Handbook I: The Cognitive Domain.0 Page 37 of 38 . Bloom’s Taxonomy Levels relevant to the content of the EUCIP Core Syllabus Version 3.2. New York: David McKay Co Inc. (1956). to assist courseware developers. on ICT policies. (A.5) 2 Bloom B. ACTION COGNITIVE DESCRIPTION EXAMPLE VERB LEVEL List Knowledge Be able to compile a complete set of List the advantages and elements making up a disadvantages of e-learning. Outline Knowledge Be able to provide a brief description Outline how different of concept/object/term. S. In the table below. involving Subject Matter Experts from across Europe. a description of action verbs used in the syllabus has been provided. database designer/programmer and database user.0 are: Knowledge: The ability to remember previously learned information.8.1.1.Glossary of Syllabus Item Verbs In order to assist in the interpretation of the depth and breadth of a syllabus item. This table.2. Evaluation: The ability to judge ideas or methods using internal evidence or external criteria.1. can assist in developing appropriate training materials and lesson plans.1. Define Knowledge Be able to provide a dictionary or Define the term digital divide. or recognise this (A. Analysis: The ability to separate an idea into constituent parts and to understand how these parts relate. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. To meet this objective for the breadth of an item.3) complete set. (B. Application: The ability to apply knowledge to actual situations. the development team. Implies a a database administrator. when combined with a strong understanding of the knowledge and skills covered by the domain. the verbs used in the syllabus have been mapped to a particular cognitive level from Bloom’s taxonomy of educational objectives2 to give an indication of the level of complexity and depth of knowledge attributed to the item.

3. graphs.1) Explain Comprehension Be able to articulate the nature and Explain the need for easy purpose of concept/object/term. Differentiate Analysis Be able to break down objects or ideas Outline the difference into simpler parts and see how the between data and parts relate and are organised.5. options.4. ACTION COGNITIVE DESCRIPTION EXAMPLE VERB LEVEL Describe Knowledge Be able to provide a description of a Describe the use of concept/object/term. Use Application Be able to implement specific Use basic HTML commands methods.2) quality must be given in the defined criteria of each class category. and interpret layout commands… (B. can only distinguish between things. Distinguish Analysis Be able to identify the differences Distinguish between virtual between methods.1) verifiable manner. importance of evaluating all objects.2) Compare Analysis Be able to identify the Compare circuit switching similarities/differences between with packet switching. (A. You teamworking and physical. tables. the delivery of a new solution.3.3. code.7. or recognise a information processing definition from a non-definition..1. input/output instructions. according to different WLAN technologies. broad and deep coverage of an area. (A. defined criteria of quality. systems within an Describe will usually require a short organisation. conditions.3. Indication of (C. co-located teamworking.2) Relate/Match Application Be able to apply knowledge to actual Match and relate the TCP/IP and relate situations. and after.4.3) more elements.1. methods or options (the opposite of (C.3.5.1) Evaluate Evaluation Be able to classify objects. Infers a requirement for both a costs and benefits before.4. information..4.5) distinguish). charts. so any question will consist of two or (A. contexts.3) paragraph instead of a single sentence.5. Understand Comprehension Be able to comprehend the meaning Understand the strategic or purpose of concepts. during. navigation on a website. model to the ISO reference model. situations.0 Page 38 of 38 .1. lists.2.6) Interpret Application Be able to translate information from Interpret and evaluate observation.1. and written material in a (B. (A.. Evaluate the compatibility of people. (B.3. etc. (C. Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.2.