You are on page 1of 38



The European Computer Driving Licence Foundation Ltd. Portview House Thorncastle Street Dublin 4 Ireland Tel: Fax: + 353 1 630 6000 + 353 1 630 6001

E-mail: URL: The official version of EUCIP Core Syllabus Version 3.0 is the version published on the EUCIP website, which can be found at: Disclaimer Although every care has been taken by The European Computer Driving Licence Foundation Ltd. (hereinafter referred to as ECDL Foundation) in the preparation of this publication, no warranty is given by ECDL Foundation as publisher as to the completeness of the information contained within it and neither shall ECDL Foundation be responsible or liable for any errors, omissions, inaccuracies, loss or damage whatsoever arising by virtue of such information or any instructions or advice contained within this publication. Changes may be made by ECDL Foundation at its own discretion and at any time without notice. Copyright © 2008 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted by ECDL Foundation. Enquiries for permission to reproduce material should be directed to ECDL Foundation.

Copyright © 2008 ECDL Foundation

Ref: EUCIP Core – Syllabus – V3.0

Page 1 of 38

EUCIP Core Syllabus 3.0 Contents
Module A – Plan Knowledge Area Module B – Build Knowledge Area Module C – Operate Knowledge Area Glossary of Syllabus Item Verbs 3 17 27 37

Copyright © 2008 ECDL Foundation

Ref: EUCIP Core – Syllabus – V3.0

Page 2 of 38

The following is the Syllabus for Module A, Plan, which provides the basis for the tests in this module domain.

Module Goals
EUCIP CORE: Plan Knowledge Area Module A, Plan, requires the candidate to appreciate the use and management of Information Systems. The candidate shall be able to:        Understand organisations and their use of ICT, as an enabler for effective Information Systems and a platform for innovation. Understand organisational strategies and business processes. Recognise issues related to the management of ICT, such as selecting the appropriate technology, or choosing between in-house systems development or outsourcing. Measure the value of IT investments through the use of feasibility studies, and costs and benefits analysis. Understand possibilities for e-business, virtual organisations and the use of enterprise applications resulting from the global networked economy. Appreciate the requirement for a professional approach to project management and quality assurance. Recognise the role of innovation and the challenge of promoting it. Understand the importance of physical and distributed teams, the business implications for social networking technology and the importance of effective communication when presenting the case for change within an organisation. Appreciate some of the legal and ethical aspects of ICT.
A.1.1 Organisational Types and Structures

A.1 Organisations and their Use of ICT


Describe organisations and major organisational types in terms of their internal structures such as hierarchical, flat; legal status such as charity, partnership; size such as SME, corporation. Describe the importance of information in an organisation for operational, tactical and strategic decision-making processes.


Copyright © 2008 ECDL Foundation

Ref: EUCIP Core – Syllabus – V3.0

Page 3 of 38

1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.5 A.1 A. such as Engineer To Order.4 A. processes. integrated ebusiness. Outline the typical uses of ICT within an organisation.1.3 ITEM Outline how diagrams can demonstrate workflow within different organisations. transaction processing.3.1.2. role in the value chain. range of products/services.1. Outline the impact service strategy will have on planning and control. personal productivity tools. Make To Stock. Page 4 of 38 .CATEGORY TOPIC REF. Outline how diagrams can show information processing systems in terms of inputs.1. Describe how an organisation can determine its service strategy.2 A. the environment. Recognise the position of an organisation in terms of industry classification.2.3 Strategic Positioning A.3.1.1. Describe the use of information processing systems within an organisation.4.1.3 A. competitors.3 A. such as data processing. Outline how different organisational cultures impact on ICT policies. processing and outputs. such as international markets. stakeholders. process control systems. knowledge sharing.4 Business Plans A. Outline the typical components of a business plan and its relevance for investors. market maturity and rivalry.2 A. automation.1. Make To Order. Outline external and internal factors affecting an organisation. Assemble To Order.1.1.1 A.2 Information Processing A. such as enterprise management.1. A. Outline the difference between data and information. A.

1 A. A.5.2 A.5.1.6.CATEGORY TOPIC REF. Outline key strategies for improving organisational competitiveness.4 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.4 A. memory and learning.3 A.5 Business Processes A. A. Describe a suitable ICT solution for a given business plan.6.3 A.2 ITEM Describe the role of performance indicators and analysis techniques. Key Performance Indicators.2 A.4. and describe how ICT systems can support these initiatives. Understand the concept of business processes and differentiate between primary and support processes. Ishikawa diagram.1 A.1. Describe the roles and responsibilities of management at strategic.1.1. public administration. Outline some common decisionmaking and business measurement methods.1.1. tactical and operational level.0 Page 5 of 38 . research and development. such as construction. manufacturing. such as Enterprise Resource Planning.1.1. Balanced Score Card.1. such as Pareto diagram. care for the client. Customer Relationship Management and recognise the business processes that they support.6 IS Support for Organisational Management A.4.6. in relating business strategies to market and environmental factors. such as knowledge sharing between internal functions.1.3 A. Critical Success Factors.1. Relate various categories of ICT applications to the different management levels. financial service. sales. Define organisational knowledge.6.5. such as SWOT. Describe major enterprise application types.1. Recognise the business processes used by organisations in different sectors.5.

colocated teamworking.1.5 ITEM Describe the support Management Information Systems (MIS) provides in an organisation and outline some MIS applications.8 Computer Based Training and eLearning A.1.1. Recognise the need for an ICT strategy and outline the purpose of having an ICT strategy. such as management support. List the advantages and disadvantages of e-learning.1 A.1.CATEGORY TOPIC REF. Define the purpose of workflow management systems and their advantages compared to less formal systems. usability.2.3 A.1. Define collaborative technologies and list their main features and applications.8. such as blogs.8.1.8. CBT.2 A.7.1.4 A. technology availability.1 A.3 A.9 The Information Society A.9. Describe computer-based training (CBT) and e-learning.1.2. discussion boards. Outline the factors for successful implementation of computerbased collaborative work.2 Management of ICT A.1.2 A.1 A. adaptability.1.0 Page 6 of 38 . and virtual classrooms.3 A. Describe how information and communication technologies have transformed society.1.1.7 Collaborative Technologies A.6. Define the term digital divide. leadership. A. A. Describe the importance of aligning ICT strategy with business strategy. A.9.2.1 ICT Strategy A. List the advantages and disadvantages of ICT in society.2 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. technical support.1.1. Distinguish between virtual teamworking and physical.2 List the technical requirements for using multimedia.7.7. organisational culture.1 A.

2.2.2. planning systems. Describe the importance of databases for recording transactions.0 Page 7 of 38 .2. Outline the key attributes of transaction processing systems.3 Mapping ICT Solutions A. industry specific roles of IT.3 A.4.2.4 A. automation systems. data warehousing and gaining business intelligence. storage.4 Systems Development versus Systems Procurement or Outsourcing A.1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. A. CSO (Chief Security Officer).2.1 A. retrieval and use. Software as a Service (SaaS). Outline the human.1 A. technical and financial considerations in systems development.2.1.4 A. offshoring).2 A.2. CKO (Chief Knowledge Officer).2. Identify business-critical ICT services and related components.1. distributed.2.1.5 A. Understand the concept of Personal Information Management (PIM) and its benefit in supporting information acquisition.2 The ICT Needs of Different Organisations A. A. such as IT as an enabler of the industrialisation of services (e. Describe the differing strategic roles of ICT staff in supporting the business. Describe how ICT can be used to increase an organisation’s flexibility. Describe different information sharing models. process control systems.3. such as CIO (Chief Information Officer).2. such as hierarchical. decision support systems. Outline different scenarios showing appropriate matches between organisational need and ICT.3.2. and the corresponding requirements for the organisation.g.2.2 A.CATEGORY TOPIC REF.3 ITEM Describe how ICT can be used to support the business by relating the ICT components of an Information System (IS) to the business processes they support.

and outline the roles and responsibilities of the end user and the ICT staff.2 1 See www.3 A.6. Understand the factors involved in retaining skilled staff.2. such as Systems Analysts. Describe some of the attributes of quality in the context of evaluating Information Systems quality.0 Page 8 of 38 Copyright © 2008 ECDL Foundation .3 A. Outline the advantages and disadvantages of outsourcing systems development in relation to staff issues.4 A.6 IS Quality Management A.6. Business Analysts.4.2.5. A.2.2. Ref: EUCIP Core – Syllabus – V3.4.2 A.5. Common Assessment Framework (CAF). Outline major approaches to quality management. such as HR policies. Describe the different roles involved in developing and maintaining Information Systems. 1 Database Manager. career planning. Capability Maturity Model Integration (CMMI).4 A. Define the concept of end user for a full listing of IT Professional profiles as defined by EUCIP. Network Manager.eucip. Outline the factors for consideration prior to taking a build or buy decision. compensation.4. A. European Foundation for Quality Management (EFQM).2 ITEM Recognise typical examples of ICT procurement or outsourcing.1 A.4. such as Total Quality Management (TQM). job mobility.CATEGORY TOPIC REF. International Organization for Standardization (ISO) certification.5.5 Staff Management A. List the most common reasons for outsourcing from a business perspective. List the advantages and disadvantages of systems development versus outsourcing. Software Developer.1 A. professional development.2.2. workplace environment.5 A.2.

2.3. Describe the process of assessing the feasibility of Information System plans and matching them with business needs/plans.3 ITEM Define the major risks associated with a lack of quality in an IS.3 A.1 A. both tangible. Define the concept of stakeholders in a business. Define the term economic feasibility. Define Total Cost of Ownership (TCO) and list the typical cost items for ICT systems. improved company image. Define and distinguish between capital costs and operational (current) costs.3.0 Page 9 of 38 .3. such as cost reduction.5 A. and after.2.1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.4 Evaluation of ICT Solutions A. schedule improvements and intangible.4 A.2.1 The Concept of the Client A.CATEGORY TOPIC REF.3 Costs and Benefits A.2.3.4. Define the term technical feasibility.6.1.3. Understand the strategic importance of evaluating all costs and benefits before.3. Describe the need for monitoring and evaluation of ICT investments.3.3.2 A.3.6. A.6.2. project sponsor or user/recipient of ICT services.3. Define the term organisational feasibility.3. Net Present Value.3.2 Business Plans and Feasibility Studies A. such as Return on Investment.1 A.4 A.1 A.3.2.3 A.3. Understand that ICT must support organisational business plans.3. A.2.2. during. Describe the main methods used to evaluate an investment.2 A. Internal Rate of Return.3. such as staff satisfaction. Differentiate between different meanings of client as external purchaser. Describe how to evaluate the typical benefits of ICT.1. the delivery of a new solution.3 Measuring the Value of ICT A.5 A.3.2 A.3.

1 Opportunities from Global Networks A.2 A.2 Transforming Processes to eBusiness A.2.3 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.4.3 Customer-Centricity and Virtual Organisations A.3 A. A. List examples of costs and benefits that are easy and difficult to measure.1 A. Define the concept of globalisation and the opportunities it can provide for businesses.2 A. such as feasibility study.3.1. Describe the scope and use of Enterprise Resource Planning systems.4.3.3 A.4.1.CATEGORY TOPIC REF.3.1 A.3 A.1 A. Describe the scope and use of Supply Chain Management systems. Outline how to provide effective customer service and manage customer relationships in ebusiness operations.4.4.4. Outline the major effects of ebusiness on organisations. Define the concept of a virtual organisation and describe how virtual organisations operate. Describe the business value of the Internet for commercial organisations. budget and control.4.2 ITEM Outline the major methods used to evaluate ICT solutions. Describe the scope and use of Customer Relationship Management systems. pilot projects. Enterprise Applications A.2 Outline how ICT can be used to drive organisational change.4.4.1. A.3 A.4. Define the unique customer concept and its main technological implications.4.1 A.2.2.2 A. Describe how ICT can redefine organisational boundaries and how it can be used to increase organisational flexibility. user surveys. Outline the use of intranets and extranets in business.4. A. The Global Networked Economy A.4.0 Page 10 of 38 . cost benefit analysis.4. return on investment.

1.5 Project Management TOPIC A. Outline the advantages and disadvantages of a highly formal definition of project responsibilities.5.1 A.2 A. Describe the impact time.3.CATEGORY A.1.1.1 IS Projects REF. such as a steering committee.2.3. A.2 Time.2 A. cost and quality have on each other and on project management.5. organisational structure.0 Page 11 of 38 . List the most common methods for estimation in different IS project types.5. subcontracting.5.5. List the major factors that ensure successful IS project management. key user. final user. such as work breakdown structure.5. List the major factors that hinder successful IS project management.3 A. intangibility of ICT outputs. Gantt chart. poor understanding of ICT by clients.2. Outline the main objects used in international project management methodologies. difficulty in measuring progress.5.5. A. and mixed projects.1 ITEM Outline how ICT projects differ from other business projects in terms of being agents of change.1. List the major factors of uncertainty that affect time. Cost and Quality A. including pure development. and purpose of a project plan. linear responsibility chart.4 A.5.2 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.3 A. specialist. cost and quality of IS projects.3.3 A. Describe the roles involved in an ICT project. content.3 Project Organisation A.5. Describe the principal elements of project organisation.4 Project Planning.1 A. such as activities. critical path.2 A. client/contractor’s project manager. Relate the concepts of project management to ICT and IS.1 A.5. Understand the structure. pure deployment. dependencies. Monitoring and Control A.

7 Quality Assurance A.5. deliverables.5. A.1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.5 Project Evaluation A.5. List the phases of a typical IS project. staff expertise. such as activities.3 A. Outline the difficulties in measuring some project benefits. reviews.5. checkpoints.2 A.5.5. resources.5 A.5. technical and organisational aspects.5. List the items that should be covered in a contract.5. such as deliverables. dates.4 A. actual progress. cost and quality might be affected by unforeseen factors. penalties. Outline the issues related to project budgeting and cost accounting. Describe the rationale behind earned value analysis and related performance indexes. Describe the need for milestones.2 A. quality assurance.1 A.4. Outline the importance of gaining formal agreement on various project documents. such as risk assessment. Describe the main concepts of risk management that apply to a project proposal.4 A.4. risk control.5 A. Recognise the impact of European public procurement directives on IS procurement.5. methods.7.6.5. and outline how time. cost.0 Page 12 of 38 .5.CATEGORY TOPIC REF. Describe the importance of planning assumptions regarding scope.5. A.5. List the benefits derived from quality assurance in IS.4.6.6 Project and Contract Management A. including statements of work and contracts.6.5.1 A.5.3 ITEM List the main functional elements of computer-based project management tools. A.4 A. plans. Describe the elements of project control. constraints.

8 Innovation of Information Systems A.6.6 Collaboration and Communication A.7.2.5. security.5. integrating innovation into core business values and processes. List the main categories of software quality analyses.2 ITEM Outline variables that can be used to measure IS/ICT quality.5.6.6. Recognise environments which foster and develop IS innovation.1 A.2. quality assurance manager and project assurance group within an organisational structure. such as a flat management structure.2 Globally Distributed Teams A. encouraging a cross functional team approach.2 A.7.3 A.5.0 Page 13 of 38 . and describe their different motivational levels. Describe the concept of innovation in information systems.8. Describe the business value derived from globally distributed teams.3 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.2 A. A. such as static and dynamic testing techniques. Distinguish between the roles of a project manager.4 A. A.6.7. bug free software.6. promoting open communication. such as user satisfaction.1 Teams A. Recognise different team roles and distinguish between those involved in creating content as well as supporting the work of the team. Outline the organisational and managerial challenges in planning and benefiting from innovation.2 A.8.3 A.1.1 A.8. A. Define the concept of groups and teams. Outline the main challenges of collaboration and co-operation in teams and groups. List typical business functions that can be exploited by globally distributed teams.CATEGORY TOPIC REF.3 A.5.5. robustness. Outline the organisational and managerial challenges presented by globally distributed teams.

4 A.5.7.1 A.5 Audio-visual Tools A. List the reasons why there might be resistance to change.7. Define the concept of intellectual property.6.2 A.6.5.6. Define ownership of copyright in an ICT context.5. List technical requirements for the use of AV tools. Recognise business applications of social networking technologies.3 A. List interpersonal communication forms and recognise the need for a common understanding of jargon and ICT terminology. A.3 A.1 ITEM Describe social networking technologies and outline their main features.7.6.4. List the most widely used audiovisual (AV) tools. A.0 Page 14 of 38 .1 Intellectual Capital and Property Rights A.1 A. Presenting the Case for Change A. more productive collaboration in virtual environments.5. Recognise the impact of social networking technologies on the creation of new forms of collaboration and social involvement.3 A.6. creation of new business networks.4 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.2 A.7.3.1 A.6.7. such as new advertising/marketing strategies.4 A. Outline methods to protect intellectual property rights.4.3 A.CATEGORY TOPIC A.6.6. Outline the benefits of using AV tools.1.6.2 A. Outline where AV tools might be used. List motivating factors for the acceptance of new technology.4.4. Describe the role of effective communication in articulating shared objectives.3 Social Networking REF.6. Recognise common breaches of intellectual property rights.7 Legal and Ethical Issues A.2 A.6.

A.4.4.7. Outline personal and professional privacy issues associated with the use of ICT systems.2 Legal Issues A.3.2 A.3.7.3 Ethics and Codes of Conduct A.7.7.4 Security A.1 A. contracts.7.7. Identify specific methods and technologies that will protect a system from unlawful. ethical and moral perspective.6 A. Outline appropriate security considerations for a given scenario.4.1 A.7. malicious attack and accidental damage. Outline the main legal issues related to the use of ICT.2 A.3. software licenses. Describe the scope and function of a security policy.7.0 Page 15 of 38 . copyright.7.3 A.7.6 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.7.CATEGORY TOPIC REF. A. Outline the potential threats to IS and ICT infrastructure.2 A. Outline how all levels of decisions can be considered from an organisational.1 A.3 A.5 A.1. List typical topics covered by codes of professional conduct regarding the use and development of ICT systems.7.5 ITEM Recognise common breaches of copyright. Define the term software piracy. Outline the principles contained in national legislation related to the legal issues in ICT.4.3 A.7.4 A. Distinguish between various levels of security policies and relate them to severity of risk. such as privacy. Outline the principles contained in EU legislation related to the legal issues in ICT.2.1. Outline the role of a security officer.4.

3 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.7. waves.7. A. screen flicker.CATEGORY TOPIC A.2 A.7. A. usage and disposal conditions.0 Page 16 of 38 .1 ITEM Describe the special health and safety (H&S) considerations pertinent to IT use. hot surfaces. Outline the central concepts of the relevant EU and national H&S legislation and directives. electric shocks. List actions to minimise or eliminate potential H&S hazards.7.5. cables. repetitive strain injury.5 Health and Safety REF.5. such as sharp edges.5.

application software. the typical development process and be aware of recent systems development trends. Recognise and list examples of system software.1 ITEM Describe a data processing system as a combination of hardware.MODULE B – “BUILD” KNOWLEDGE AREA DEVELOPMENT AND INTEGRATION OF INFORMATION SYSTEMS The following is the Syllabus for Module B. firmware. describe typical data structures and algorithms and interpret programming constructs. web pages and hypermedia. Recognise and list examples of application software. development.1 Systems Development Process and Methods REF. Understand the basic elements of HTML and XML and appreciate different types of web-based programming.1.1 Software in Data Processing Systems   CATEGORY B. system configuration data and user-defined data.1.0 Page 17 of 38 . TOPIC B. Be aware of important database administration and security issues.1. B.1. B. Understand the relational model and query languages.1. Module Goals EUCIP CORE: Build Knowledge Area Module B.1. Appreciate the principles and uses of relational databases and data warehouses. Build. testing. Describe the typical phases of systems development. which provides the basis for the tests in this module domain. Build. specification. Appreciate the design principles associated with user interfaces. Understand objectoriented programming principles. and know about documenting and testing software systems. integration and deployment of IT systems.1.1.2 Systems Development Life Cycles B. operating system software. Understand the systems development life cycle.1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. requires the candidate to understand the development and implementation of Information Systems.3 B. Appreciate programming maintenance issues.2 B.2. Understand software design methods and techniques. The candidate shall be able to:      Understand the technical aspects of design.1.

such as waterfall. such as upper.3 B. Describe the different types of testing and review that can be applied during the systems development life cycle. technical specification.1.1. spiral. Outline the strengths and weaknesses of different software development environments.3 B.3. user training and initial support. integrated CASE tools.1. incremental releases.1. such as release of software to users. debugging software. Distinguish between development.2.4.1. B. B.1. Describe the main issues in the system implementation phase (deployment).3.4 B. compiling.4. such as organisational specification.5 System Control and Safety B. development and deployment. Outline the strengths and weaknesses of different implementation approaches.4 System Testing and Deployment B. test and production environments and understand the importance of a structured approach to system releases.1.3 B. List the typical components of system user manuals and technical reference documents.4.5. lower.1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.1 B. Describe the life cycle of a system in terms of analysis.1 B.1. data migration. Outline the use of simple development tools for editing.3.1. testing. core model and rollouts.3 Software Development Tools B. Outline the use of tools at different stages of systems development.1. software distribution procedures. such as big bang. use and maintenance.1. such as version control systems.0 Page 18 of 38 .1.CATEGORY TOPIC REF.2 B.1. step by step. Outline specifications for requirements and design.2 B. B.2. prototyping.2 ITEM Compare the various classical models of systems development life cycle. decommissioning.

1.2 B. Describe how atomicity.2. Describe the complexity of modern “system of systems” and approaches to manage this complexity.2. statistical data. such as autonomic systems. flexibility in data.2.0 Page 19 of 38 . such as data files.1 B. such as physical. consistency. Outline design and maintenance issues for multi-user systems.6.2. “n” tier web-based.1 Data and Transactions B. Describe the components of a database system. such as ISO12207. procedural.1.3 B.1. legacy mainframe extension and integration on systems development.2 ITEM Recognise risks related to system failures and outline measures to protect company-sensitive data at various levels.6 Trends in Systems Development B. integrity problems. such as back-up procedures.2. access control. service oriented architectures.5. such as data redundancy and inconsistency.2. agile methodologies.2 Data Management and Databases B.1. Understand the impact of current technical architecture developments. concurrent access and security.1 B.3 B. such as two or three-tier client server variants. Describe standard and innovative approaches and standards for systems development. B. data dictionary.2.1 B. SEI/CMMI.2.6. Outline the importance of durable data recording for transaction processing and reporting systems.CATEGORY TOPIC REF.5.2 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. Describe the day-to-day security routines in a distributed system.1.3 B. isolation and durability help to guarantee secure database transactions.2 Database Structure B.2.1.1. indexes.2 B. Distinguish between a file management system and a database management system (DBMS).1.6.1. B.

foreign key.5 Query Languages B.4 B. Outline the components of a DBMS. Define data abstraction and describe the difference between physical level. database designer/programmer. primary key.0 Page 20 of 38 .2. scalability.2. such as entity-relationship model.3. concurrency controls. Describe the different roles of a database administrator.2. database user.3 ITEM Outline the business areas where a DBMS is used.2. report generator. alternate key. and recognise the benefits they offer.3. such as non-redundancy. objectoriented model.3.3.5 B. key. B. such as relation.1 B.2 B. Outline the benefits of a relational model. record-based logical model. Describe the principles of objectbased logical models.3 B.4 B. network model. such as hierarchical model.2.2. such as the object-based logical model.2.4. B. transaction management.2 B.4. Explain through simple examples the process of normalisation for 1st.3 Data Modeling B. Describe the principles of recordbased logical models. referential integrity. view (user) level.2.2. 3rd normal form.2. Distinguish between procedural and non-procedural query languages. 2nd.4.2. conceptual (logical) level. physical data model. Describe important relational model terms.2.4 The Relational Model B.2. administration tools. Distinguish between different groups of data models.2. backup/recovery tools.5.2. such as query language.3 B.2. flexibility.1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.CATEGORY TOPIC REF.1 B.2.

such as create. Describe the components of the Structured Query Language (SQL).7 Database Administration and Security B. such as Data Definition Language (DDL).1 B. such as logical errors. schema and physical organisation modification. Outline examples of different security policies. B.2 ITEM Describe the fundamental operations of relational algebra.2. such as human security. such as schema definition.4 B. Understand SQL clauses. revoke. set difference. union. such as grant.3 B. accidental loss of data consistency.1 B. cartesian product. Understand SQL DDL commands. select.6 SQL queries B. Data Control Language (DCL). order by. B. accidental loss of data integrity. Describe the most important database administration procedures.3 B. alter table. project.2. such as select.2.2.2. Describe the security and integrity problems covered by the acronym CIA (Confidentiality. joins. such as insert. Understand basic SQL DML commands.2 B.2.CATEGORY TOPIC REF.2. drop.2.7. system crash. Describe recovery schemes based on different types of failure.5. delete. such as where.7. database security. update.7. system errors.2 B. rename. Data Manipulation Language (DML).2. intentional (malicious) access to the database.5 B. Integrity. authorisation for data access.2.0 Page 21 of 38 .5. rollback. physical security.3 B.4 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. operating system security. Availability).6. Understand SQL DCL commands. storage structure and access methods. such as commit. such as integrity constraints.6. disk failure.2.2. group by. Outline the use of views and special SQL commands.

such as object-oriented (OO) design.3.1 ITEM Describe the concept and components of a data warehousing (DW) system.1.2. procedural. B. free software.8.2 B. top down design. Outline the different licensing requirements of proprietary software. open source. Distinguish between and describe the merits of the main types of programming languages. Distinguish between open source and proprietary software development. such as records.3.1 B. Evaluate the fit between typical search and sort algorithms and the different data structures.1 B.3.3 Programming Languages B. B.1.3.2 B. OO-based.3. such as functional. Describe structured and unstructured data types and recognise different data structures.1 Software Design Methods and Techniques B.1 B.8. Describe the use of procedures and functions. Recognise the principle uses of DW systems.4 B.3. B. arrays.2. and distinguish between call by value and call by reference. B.2.3.3. Outline the main features of different program design methods. freeware.2 Data Structures and Algorithms B. such as complex structure.3.3.2 B.3.1. Outline the specific needs of legacy systems in program design. linked lists.3 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.2. business critical system.0 Page 22 of 38 . structured programming.3 B.2.2. poor documentation.8 Data Warehousing and Data Mining REF.3 Programming B.CATEGORY TOPIC B. Describe the use of abstraction as a technique for problem-solving and software design. obsolete software/hardware. Define the concept of data mining.1.5 B. Define the term syntax and outline its importance in programming languages.

Interpret and evaluate control statements.3.1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.5. failure.1 B. Define basic testing concepts.3 B.5 B. such as error. Describe the concept of objectoriented programming. system testing.3.3.4 B. testing. B.2 B.5.5 Elementary Constructs B.3.4.4 ITEM Distinguish between compilation and interpretation of programming languages. B.7.3. object. Unified Modeling Language (UML) code. debugging.4. Describe the concept of inheritance and the impact of inheritance for the programmer.4. such as structured English.1 B.3.3 B. Interpret and evaluate input/output instructions. code comments.2 B. Describe the concepts of abstraction and encapsulation (information hiding).3.4.6 Testing B.6.0 Page 23 of 38 .4.3. Describe how polymorphism contributes to efficient software design through the development of reusable components.6 B.3.4 Object-Oriented Programming B. and list examples of automatic test tools.2 B.3 B.3. Distinguish between static and dynamic test methodologies. Interpret and evaluate arithmetic and logical operations. Describe the main concepts of object-oriented design.6.4.3. decision trees. Describe the common documentation for software development and delivery. instance.3.3. acceptance testing. Describe the concept of a class.3. Describe the different purposes and scope of unit testing. Documentation and Maintenance B.3.3.CATEGORY TOPIC REF.1 B. Recognise the various levels of checking. flowcharts. method and their relationship in object-oriented programming.3.3. fault.

8 Programming Examples B.3.2 B. standard formats.8. receiver.3. harmony. variety. Identify errors or weaknesses in the code and modify it to meet requirements. B.5 B.7. Outline how to document changes in software and program documentation. uses. such as sound types. Describe the benefits of using drawings. Define the concept of a User Interface and list the different kinds of interfaces.4 B.2.4 User Interface and Web Design B. Describe methods to attain quality in program maintenance.4 B. such as balance. such as textual. Understand how communication applies to human beings.1. visual clues.1 B.1.4. such as code inspections.3.8. Outline the concepts of graphics and animation (bitmap and vector). Interpret small program segments constructed from a given hypothesis. auditory. List models for testing the effectiveness of a user interface against its design requirements and goals. and recognise effective ways to communicate information.1. rules for comments in the code.0 Page 24 of 38 . digital audio and video. Outline the various technologies that communicate information to human senses.4. and apply basic principles of graphic design.4.3 B. B.2 ITEM Describe the value of wellstructured and documented code. Define basic concepts of communication theory.1. B.2 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.3.1 B.3.1 B.4.2 Graphic Design B. animation. such as sender.4.1. colours.4. pictures. contrast.CATEGORY TOPIC REF.2 B. messages. haptics/touch. graphical.1 Human-Computer Interaction: Guidelines and Standards B. technical reference documents. digital smells.4. and describe their differences.7.4.3.

condense text content. B.4. Outline the problems associated with a poor mix of colours.3 B.4. B. shape.4. Outline the use and purpose of structure diagrams for website design.1 B. B.1 B.3. transparency. contact.4 Web Design Requirements and Methods B. prioritised content. Recognise the needs of the target group for whom a web page has been designed.4 B. such as browser capability issues.4.4.4 B. Explain the need for easy navigation on a website. easily navigable. navigation icons.4.3.3 ITEM Use common tools for simple picture manipulation in terms of size.4.4.4. Outline the risks of having too many messages on one page. consistently navigable. validating HTML.4. contrast.4.3.4. such as top bar. side bar.5 B.7 B.4.3 B.4. Outline the common components used in web pages.8 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.3. Outline some of the challenges in maintaining a business website. colours.4. site map. Outline the tools for the development of a website. search feature.4. such as readability.3.4. Describe guidelines for developing user-friendly websites. last updated.6 B.3 Web and Hypermedia: Possibilities and Limitations B.5 B. small byte-size graphics.4.4.2 Define hypertext and hypermedia and outline their importance in web page design. Describe the use and value of internal and external websites in a company.CATEGORY TOPIC REF.2. Describe general quality criteria for web text. where am I.4.2 B. help.0 Page 25 of 38 . Describe the history behind the Internet and the World Wide Web. spellcheck.

5.2 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. Outline the basic elements of XML. the evolution of HTML into XHTML.1 B. List some of the main challenges in integrating web-based systems to existing systems.5. special characters. lists. percentage white space.2 B. frames.4.5 B. Distinguish between client-side and server-side technologies and recognise different types of webbased programming languages. colours. headers.4.5. links.10 B. dividers. soft format.4.4.4 B.4. tables. B.6. such as Cascading Style Sheets (CSS) and Extensible Stylesheet Language (XSL). Use basic HTML commands and interpret layout commands.1 B.4.6 Web Based Programming B. such as hard format.5. image tags. such as font size.4. such as story boards.5 Designing Web Pages B.5. forms. its uses.CATEGORY TOPIC REF.9 ITEM Describe the major methods used for navigation.4. B.3 B. Outline basic graphic principles for normal written text. alignment.6.4.4. rough drafts. Understand their use in design.4. Outline the concept of a markup language and describe the main features of HTML.4.0 Page 26 of 38 . Describe some project approaches to web design and common techniques.4. Describe the concept of style sheets. backgrounds.

Appreciate the principles of operating systems and understand features of common operating systems. electronic messaging options and voice over Internet protocol services. Understand network service principles including cryptography and the domain name system. The candidate shall be able to:          Understand hardware components.0 Page 27 of 38 . disks.1. Identify the main types of peripheral units of a basic computer system.1. network components and architectures. Appreciate the importance of a client-oriented approach to IT support. and apply some of the basic principles of IT service delivery.2 C. keyboard and pointing devices.1 ITEM Identify the main central components of a computer system.1. TOPIC C. RAM. such as screen. Operate. computing architectures and processor concepts. C.1 Computing Components and Architectures REF. Module Goals EUCIP CORE: Operate Knowledge Area Module C. Understand communications principles. and communication protocols.MODULE C – “OPERATE” KNOWLEDGE AREA OPERATION AND SUPPORT OF INFORMATION SYSTEMS The following is the Syllabus for Module C. such as CPU. printers. Understand the World Wide Web. Operate.1. requires the candidate to appreciate the operation and support of Information Systems.1 Main Hardware CATEGORY C. and describe their functions. ROM.1. network cards. and describe their functions.1.1. Describe the interrelations between the main central components of a computer system. Describe network management principles and the simple network management protocol. Understand wireless communication principles and wireless networks and protocols.3 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. which provides the basis for the tests in this module domain. Outline tools for system and network management. C.

Describe the concept of an Instruction Set Architecture (ISA).1.4 C.1.2. using diagrams. clock frequency.2. resolution.1 C.4 ITEM Recognise the characteristics of different types of peripheral units and compare features and performance using appropriate parameters. Distinguish between the main types of memory technology.2 C. chip size. and outline the main differences in their architectures.5 C. such as single/multi-core. Describe the dualism between CISC and RISC processor design. EPROM.1.3 C. laptop. Identify. speed. the architecture of a general purpose computer.2 C.2. and its implications in computer systems. C. C. Describe the concepts of instruction pipelining.2.1 C. and compare their uses.5 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. compatible standards. faster memory versus slower storage devices.3 Processors C. pipeline stages.3. dynamic scheduling and speculative execution.1.3 C. desktop. caching system. SRAM.3.3. C. such as hierarchy levels.1.0 Page 28 of 38 . Describe the features of a microprocessor.1. such as DRAM.1. flash.1. multiprocessor servers.1. power consumption/dissipation. instructionlevel parallelism. Describe the concept of chipset and the purpose of the various types of buses in a computer system.3. Identify the range of computer systems available.3. such as handheld. mainframes. such as capacity.CATEGORY TOPIC REF.1. Define the term coprocessor and outline the role of a coprocessor in the ISA. Describe the concept of memory hierarchy.2 Computer Architectures C.1. cache efficiency.1.

2.2.4 C.2.1 C.4 C.2 C. such as batch.1. Describe how the resources of a computer are managed by software.2 Concurrent and Parallel Processes C.5 C.5 C.2.4 Security and Protection C.4. such as Java API.1 Principles REF. Describe how the concept of memory hierarchy affects programming.2.2.2. real-time.2.2.4 C. Outline the functions of a file system.2.2.2. C.2. integrity and availability) in a computer system.2.2 C.2.3 C. Outline threading.2.1.3. Windows API. Outline a context switch operation. Page 29 of 38 . Describe the concept of application programming interface (API) and provide examples of API.3.1 C. Outline the reasons for concurrency inside an OS.3 C.2.2.1. Google Maps API. Outline the purpose of virtual memory.3.2.2 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. Outline processing and multiprocessing. time-sharing.3 C.2. its impact and how it is prevented and managed.2 C.4. Outline the mutual exclusion problem. Understand the need for protection and security (in terms of confidentiality.3 Memory and Storage Management C. Describe the concept of thrashing.1 ITEM Describe the functions of operating systems (OS) available for a general purpose computer. Describe how an OS manages virtual memory through storage and memory hardware.2.CATEGORY C.1.1 C.3. Outline different types of OS. C. such as separating working memory from files. Outline the types of protection mechanisms used in OS.2 Operating Systems TOPIC C.2.2.

security. Outline the main measures against such threats.2.3. performance.2. security. Trojan horses.3.2.3. apparatus.3 ITEM Describe the threats associated with malware.1.5 Widespread Operating Systems C.2. Outline the differences between identification and authentication.4. Distinguish between logical and physical network functionalities.5. Outline the principles of access control. such as installation. C. user interface.1 C.5 C.3. stability. Linux.3 C.2 C. Mac family. Outline the need for back-up and recovery. Outline the issues in converting signals from analog to digital and vice versa.1 Communication Principles C. user interface.1.4 C. such as hosts.7 C. Describe the principles of information transport defining the signal concept.4.1. such as ITU.4 C. Describe the main features of an OS belonging to the Unix.4.3. stability. Distinguish between analog and digital signals.2 C.2.1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.4. Describe authentication techniques and define a “strong” authentication scheme. common uses. performance.3.3.5 C.2. and describe their functions.0 Page 30 of 38 .4. List the components of a network.1.3. IEEE.CATEGORY TOPIC REF. computer viruses. Describe the role of network standardisation bodies.6 C.6 C. such as backdoors.1. common uses.2.3.5. C.1.3 Communications and Networks C.1 C. Describe the main features of an OS belonging to the Microsoft Windows family. transmission media.2 Network Components and Architectures C.2. such as installation.2. Compare circuit switching with packet switching.

3. ISDN.3.3. C.3. sniffing.2.4.8 C. such as denial of service attack. DSL.4 C.6 C.3. Describe the standard network topologies and associate them with suitable LAN standards. such as Ethernet.3. Describe how a packet is routed over the Internet.3 Communication Protocols C. switch.3. port stealing. token ring.2.2.CATEGORY TOPIC REF.3.3.3. coaxial cable.3. Outline different media access strategies used in different standards.2.4 C.3. Describe the function of a firewall and its importance in network security.5 C.5 C. Match and relate the TCP/IP model to the ISO reference model.2.4 Network Services C. leased line.3.1 C. Distinguish between the characteristics of LAN and WAN.3. such as dial up.3. Describe how the components of a network are connected to each other. Distinguish between TCP and UDP in terms of reliability versus speed.7 C.2 C.4. microwaves.2.1 Network Security Issues C.3 C.9 C.2. Describe the ISO 7-layer reference model and list the services managed by each layer.3. Describe the various types of threats to regular network operations. fiber optic.2 ITEM Describe the characteristics of transmission media. frame relay. router. Describe the function of interconnecting devices.2. such as hub. Compare streams and connectionoriented protocols with datagrams and connectionless protocols. such as CSMA/CD versus token passing. repeater. FDDI.3. such as twisted pair.3.3. Describe different WAN technologies and options.3 C.0 Page 31 of 38 . C.1.1 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.

SSH and SSL).4 The World Wide Web C.3 C.2 Cryptography C.4.3. Outline the role and the functions of the hypertext transmission protocol (HTTP).4. Describe the World Wide Web (WWW) as a client/server application.4.1. Outline the role of a Web server.1 C.2. and the related security threats.4.4. Describe how cryptography is used for protecting network communication by enhancing confidentiality (IPSec.4.4 C.4. C.2. Describe the domain name system (DNS) and its scope. C.4.3 Domain Name System C.4. Distinguish between secret key algorithms and public key algorithms. Outline the role of a Web client (browser).7 C. Describe the origin of cryptography and its applications in network security.3.2.1 C. Describe the use and purpose of resource descriptors. Outline the purpose and use of the common gateway interface (CGI). and by creating a virtual private network (VPN).4.0 Page 32 of 38 .4.CATEGORY TOPIC REF.2 C.4.3.1 C. C.4 C.4. Outline the concept of an applet.8 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.4.4.6 C.2 C.5 C.3. by enforcing authentication (digital signature). Describe Internet Protocol (IP) addressing and how a domain name is translated into an IP address.3 C.2 ITEM Define the concepts of spoofing and identity theft.4.4. Describe how Internet hosts are named. Understand how website content can be managed dynamically using a database.3 C. Define and outline the purpose of a uniform resource locator (URL).4.4.4.

images.1. Describe the user and network requirements of VoIP.1 C.4.4.2 C. such as smartphones. such as running your own web server.5.3 C.5.2 C.1 Multimedia and Mobile Computing Components C. Outline the main multimedia input/output devices. Describe the concept of IP telephony.5 Messaging C. Distinguish between e-mail and web-mail applications. Outline some mobile electronic devices. Describe the simple mail transfer protocol (SMTP).9 ITEM Outline the options available to host a website. motion pictures.6. speakers.7.1 C.1 C.2 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. digital cameras. using a dedicated server provided by a hosting provider.4.5. displays.2 C.4.5 Wireless and Ubiquitous Computing C. community posts.5.4.4. C.1.7.4.CATEGORY TOPIC REF.7 System Infrastructure Dimensioning C.0 Page 33 of 38 . combined audiovideo transmission. headphones and understand their uses. SMS/MMS. voice.4.5. GPS.6. PDA.1 C. sharing a server provided by a hosting provider.6 Voice over Internet Protocol (VoIP) C. instant messaging. servers and gateways.5. microphones.5.4. such as resource requirements for plain text and numbers. wearable computing components. Describe the characteristics of a server computer system that has to host a multimedia application.4. Compare the various electronic messaging systems. C. Describe the roles and functions of e-mail clients.4. such as email.4.4 C. music. and the internet message access protocol (IMAP). screens. the post office protocol version 3 (POP3). Describe the impact of data size and data type on network resources.4. such as scanners.

3.5.3. C.3. such as Bluetooth.3 C. such as coverage.16 (WiMax).5.3. compatibility.1.3. List technologies used for wireless communications and describe their functionality. and distinguish between their technical characteristics.5.2 Principles of Wireless Communication C. C.4 C. IEEE802. Describe the main functions of a network management system.2.3 C. Outline the range of applicability of each protocol for mobile stations.5. Describe the main components of a satellite-based network. such as CDROM. magneto-optical disk.1.1 Principles of Network Management C. UMTS. IEEE802. Outline the limitations and issues associated with wireless and mobile computing.5.3 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. Describe the main components of a wireless LAN (WLAN) and outline their purpose.2 C.CATEGORY TOPIC REF.1 C. communication speed. Outline the concept of RadioFrequency Identification (RFID) and its uses.3. WAP. Describe the main characteristics of mobile station protocols. Compare different system architectures for network management.0 Page 34 of 38 . such as performance. product tracking. DVD. configuration settings.11. Describe the different parameters which can be managed in a network.1 C.1.6 Network Management C.6.5 C. such as mobile IP. transportation payments.2 C. flash memory.5. Bluetooth.5.2.5. Evaluate the compatibility of different WLAN technologies.2 C. failures.6. inventory systems.3 Wireless Networks and Protocols C. C.5. Outline the main differences between major wireless standards. such as passport identification.6 C.3 ITEM Describe the major multimedia storage standards.

termination. C.6.1 C. Describe the differences between a system management tool and a network management tool.7.6. C. OpenNMS.7.1. Compare the uses and purposes of SLA.6.3 C.CATEGORY TOPIC C.0 Page 35 of 38 .1 C.3 C.7.6. Identify the purpose and main elements of a capacity plan. threat and vulnerability and give examples of each in an IS context such as loss of service.2.2. such as definition of services.6.1 C.7 Service Delivery and Support C. service.1. Tivoli NetView.6.2 Simple Network Management Protocol REF. data loss.3 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.7. Outline the concepts of risk.2.3. Outline some of the widely used software tools for system management and for network management.3. IPR and confidential information. Outline the main limitations of the SNMP.2 List and describe the main elements of a Service Level Agreement (SLA).7.2.2 C.1 ITEM Describe the main components of the simple network management protocol (SNMP) and their interaction.3 System and Network Management Tools C.7.2. HP Software.2. Solstice. traceroute.6.6. and component.7. tcpdump. such as ping. Describe the main services provided by the SNMP.7.2 Capacity and Contingency Planning C.1 Customer Relationships and Service Level Agreements C.2 C. Describe the service level management process and identify its benefits.2 C. problem management.3. warranties.3 C.1. Describe capacity management and explain the importance of the three sub-processes of business. underpinning contracts and operational level agreements. Outline the infrastructure requirements for operating a network management tool. performance measurement. C.

7.7. C. failure. Define the main elements of an incident management system.3 Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3.3 C. such as fault tolerance.1 C.3. frequency of failure.5. such as component failure impact analysis (CFIA).2.2 C. staffing.7.3. C.7.1 C. Identify the different types of service desk and describe the circumstances in which each is appropriate.3.7.CATEGORY TOPIC REF.5 Change Management C. mean time between failures. Outline the purpose and benefits of availability management and define the concepts of availability.7.2. Outline the purpose and main elements of a contingency/service continuity plan. restart procedures. Outline availability management methods and techniques. such as percentage availability. fault tree analysis (FTA). back up.0 Page 36 of 38 .7.2 C. Define the purpose of a change request and the essential elements that it should contain. Describe best practices in IT change and release management.4 Service Desk C. Compare some of the commonlyused measures of availability.7. impact of failure.7. recovery.4.5 C. alternative resources. Outline the purpose of a service desk in a service support organisation.7.7.2 C. Describe best practices in managing the configuration of an IT infrastructure.3 C.3 Availability Management C. C.4 ITEM List examples of risk reduction measures. reliability.

EXAMPLE List the advantages and disadvantages of e-learning. Comprehension: The ability to grasp the meaning of information.0 are: Knowledge: The ability to remember previously learned information. Taxonomy of Educational Objectives. Ref: EUCIP Core – Syllabus – V3.5) Recognise/ Identify Knowledge/ Comprehension 2 Bloom B. a description of action verbs used in the syllabus has been provided.5) Describe the different roles of a database administrator. can assist in developing appropriate training materials and lesson plans. Bloom’s Taxonomy Levels relevant to the content of the EUCIP Core Syllabus Version 3.8. (1956). To meet this objective for the breadth of an item. (A. (A.3) Outline Knowledge Outline how different organisational cultures impact on ICT policies. In the table below.1. (B.1. involving Subject Matter Experts from across Europe. Be able to provide a brief description of concept/object/term.Glossary of Syllabus Item Verbs In order to assist in the interpretation of the depth and breadth of a syllabus item.0 was developed to ensure that there is maximum clarity around these aspects of each syllabus item. database designer/programmer and database user.9. ensured that each item was constructed using examples (such as…) and clear and concise terminology. the verbs used in the syllabus have been mapped to a particular cognitive level from Bloom’s taxonomy of educational objectives2 to give an indication of the level of complexity and depth of knowledge attributed to the item. S. or recognise a definition from a non-definition. to assist courseware developers. trainers.1.2. Be able to identify an attribute of a concept from non-attributes. (A.0 Page 37 of 38 Copyright © 2008 ECDL Foundation . when combined with a strong understanding of the knowledge and skills covered by the domain. Implies a selective use of knowledge. Handbook I: The Cognitive Domain. This table. Evaluation: The ability to judge ideas or methods using internal evidence or external criteria.2. ACTION VERB List COGNITIVE LEVEL Knowledge DESCRIPTION Be able to compile a complete set of elements making up a concept/object/term. New York: David McKay Co Inc. and learning providers in understanding the appropriate depth of each syllabus item.1.3) Define Knowledge Define the term digital divide. Analysis: The ability to separate an idea into constituent parts and to understand how these parts relate. Be able to provide a dictionary or textbook definition of a concept or term by referring to its key attributes. the development team. In addition. Application: The ability to apply knowledge to actual situations. or recognise this complete set. the EUCIP Core Syllabus Version 3.

Interpret Application Be able to translate information from observation. people.1) Explain the need for easy navigation on a website.5. contexts.3.3) Differentiate Analysis Be able to break down objects or ideas Outline the difference into simpler parts and see how the between data and parts relate and are organised. (C.2) Evaluate Evaluation Copyright © 2008 ECDL Foundation Ref: EUCIP Core – Syllabus – V3. Use Application Use basic HTML commands and interpret layout commands… (B.6) Interpret and evaluate input/output instructions. (A.3.2. (A.2) Match and relate the TCP/IP model to the ISO reference model.1. Compare Analysis Be able to identify the similarities/differences between methods or options (the opposite of distinguish).ACTION VERB Describe COGNITIVE LEVEL Knowledge DESCRIPTION Be able to provide a description of a concept/object/term. Be able to identify the differences between methods. or recognise a definition from a non-definition.3) Understand Comprehension Understand the strategic importance of evaluating all costs and benefits before.1. (C.5.3. and after. Distinguish Analysis Distinguish between virtual teamworking and physical.1. (C. situations. objects.4. Indication of quality must be given in the defined criteria of each class category. lists. code.. options. Be able to comprehend the meaning or purpose of concepts. (B.3.0 Page 38 of 38 .3. tables.5.1. so any question will consist of two or more elements.4. the delivery of a new solution. charts.1) Explain Comprehension Be able to articulate the nature and purpose of concept/object/term.4. information.4. Evaluate the compatibility of different WLAN technologies.3. etc. Infers a requirement for both a broad and deep coverage of an area. (A. graphs.5) Relate/Match and relate Application Be able to apply knowledge to actual situations. Describe will usually require a short paragraph instead of a single sentence. Be able to implement specific methods. according to defined criteria of quality. conditions. and written material in a verifiable manner.1) Be able to classify objects. (B. co-located teamworking..2) Compare circuit switching with packet switching. during..7.2. EXAMPLE Describe the use of information processing systems within an organisation. (A. You can only distinguish between things.