NESINCNew YorkEducational Technology

Free NYSTCE Safety Net Educational Technology Specialist CST (971) Study Guide

Comprehensive study materials covering all NYSTCE 971 competencies. The NYSTCE Safety Net Educational Technology Specialist Content Specialty Test (CST) (971) assesses knowledge and skills in five subareas: Foundations of Educational Computing and Technology; Professional Applications of Technology; Integrating Technology Into Education; Technology Leadership and Resource Management; and an Integrating Technology Into Education Constructed-Response Assignment. The exam targets candidates who have the knowledge and skills necessary to teach effectively as Educational Technology Specialists in New York State public schools — from basic computer operations and troubleshooting to leading school-wide technology professional development programs and managing facilities and resources. The test contains 90 selected-response items and one constructed-response assignment, administered as a computer-based test with 4 hours of testing time.

5 Study Lessons
5 Content Areas
91 Exam Questions
220 Passing Score

What You'll Learn

Foundations of Educational Computing and Technology22.5%
Professional Applications of Technology22.5%
Integrating Technology Into Education22.5%
Technology Leadership and Resource Management22.5%
Integrating Technology Into Education: Constructed-Response Assignment10%

Free Study Guide - Lesson 1

60 min read
Chapter 1: Foundations of Educational Computing and Technology

Covers basic computer operations, hardware, peripheral devices, operating systems, and terminology (Competency 0001); troubleshooting techniques for computer systems and peripherals (Competency 0002); equity, ethics, and etiquette issues in educational technology use (Competency 0003); and legal, privacy, security, and safety issues including acceptable use policies, copyright, plagiarism, and health considerations (Competency 0004).

Chapter 1: Foundations of Educational Computing and Technology

Subarea I  |  Competencies 0001–0004  |  ~22.5% of total score

This chapter covers every indicator in Subarea I — four competencies that form the bedrock of everything else on the NYSTCE 971. Before you can integrate technology into instruction, advocate for students, or advise administrators, you need to own the fundamentals: how hardware and software work, how to fix what breaks, how to protect students legally and ethically, and how to keep technology use healthy and safe. Every section here teaches you what the exam expects you to know and be able to do.

(1) Competency 0001: Basic Computer Operations, Concepts, and Care

(A) Hardware, Peripheral Devices, and Software in Educational Settings

Every device in your school falls into one of three hardware categories, and knowing these categories cold is the starting point for the entire exam.

Input devices send data from the user into the computer: keyboard, mouse, touchscreen, scanner, digital camera, document camera, microphone, stylus, and graphics tablet. In a 3rd-grade classroom, a document camera lets a teacher project a student's handwritten work for whole-class discussion. In a high school science lab, a microphone paired with data-logging software captures decibel readings in real time.

Processing components do the computational work: the CPU (Central Processing Unit) — the "brain" of the machine that executes instructions — and RAM (Random Access Memory) — temporary, volatile memory that holds data currently being worked on. More RAM means more programs can run simultaneously without slowdown. A Chromebook with 4 GB of RAM is fine for one student running Google Docs; a teacher running Google Meet, Nearpod, and a local gradebook app simultaneously will feel the pinch.

Output devices display or produce results: monitors, projectors, interactive whiteboards (Smartboards, Promethean boards), 3D printers, standard printers, and speakers. An interactive whiteboard is both an input device (touch-sensitive surface) and an output device (display), which is why it merits its own category on purchasing forms.

Storage devices hold data persistently: HDD (Hard Disk Drive) — spinning magnetic platters, slower but inexpensive for large capacity; SSD (Solid State Drive) — flash memory chips, faster and more durable, now standard in Chromebooks and modern laptops; USB flash drives — portable, plug-and-play; optical drives (CD/DVD/Blu-ray) — largely obsolete in K-12 but still appear on older machines and in media production labs; SD cards — common in cameras and tablets.

Software categories you need to know:

  • Operating system (OS) software — manages hardware resources and provides the platform for all other software (Windows, macOS, Chrome OS, iOS, Android)
  • Application software — purpose-built programs: word processors (Microsoft Word, Google Docs), spreadsheets (Excel, Google Sheets), databases (Access, FileMaker), presentation tools (PowerPoint, Google Slides, Keynote), browsers (Chrome, Firefox, Safari), multimedia tools (iMovie, Audacity)
  • Utility software — maintains and optimizes the system: antivirus (Malwarebytes, Windows Defender), disk cleanup tools, file compression utilities (WinZip, 7-Zip), backup software
  • Educational software — designed for student learning: IXL, Khan Academy apps, Desmos, Typing.com, AR/VR learning tools
  • Administrative software — manages school operations: student information systems (Infinite Campus, PowerSchool), LMS platforms (Google Classroom, Schoology, Canvas), gradebook software
Peripheral Device Type Educational Use
Document Camera Input/Output Projects physical documents, 3D objects, or student work for whole-class viewing; science demonstrations
Interactive Whiteboard Input + Output Touch-based whole-class instruction, collaborative annotation, interactive lessons with Smartboard software
Webcam Input Video conferencing, recording student presentations, virtual field trips via Google Meet or Zoom
Graphing Calculator Processing/Output High school math and science; connects via USB to computers for data transfer; TI-84 is ubiquitous
Scientific Probeware Input Vernier sensors (temperature, pH, motion) connect to computers or calculators; real-time data collection in science labs
3D Printer Output Maker education, engineering design projects, prototyping; connects via USB or Wi-Fi; requires slicing software

(B) Major Operating Systems

Windows is the most widely deployed OS in U.S. school districts that use traditional desktops and laptops. Its lineage runs from MS-DOS (command-line only) through Windows 95, XP, 7, 10, and now Windows 11. The Windows file system is NTFS (New Technology File System), which supports large files, user permissions, and encryption. Students navigate files in File Explorer; system settings live in the Settings app (replacing the older Control Panel). Critical keyboard shortcuts every teacher should know: Ctrl+C (copy), Ctrl+V (paste), Ctrl+Z (undo), Ctrl+S (save), Alt+Tab (switch windows), Win+L (lock screen).

macOS is the operating system for Apple Mac computers. Built on a Unix foundation, macOS is known for stability and security. Key features: Finder (file management, analogous to File Explorer), Spotlight (system-wide search, Cmd+Space), Dock (application launcher at the bottom of the screen), and Time Machine (automated local backup to an external drive). macOS uses APFS (Apple File System). File paths use forward slashes (/Users/teacher/Documents), not the backslashes of Windows (Users eacherDocuments).

Chrome OS is Google's lightweight OS optimized for cloud-based work. It runs almost entirely within the Chrome browser and integrates seamlessly with Google Workspace (Docs, Sheets, Slides, Classroom, Drive). Chromebooks are the dominant device in many K-12 schools because they are inexpensive ($200–$400), easy to manage through the Google Admin Console, and nearly virus-proof (malware cannot persist across reboots). Chrome OS updates automatically and silently. Its limitation: offline functionality is limited, and locally installed native apps are not supported (though Android apps run on newer Chromebooks).

iOS and Android power tablets and smartphones used increasingly in K-12. iPads run iOS and are common in elementary schools for apps like Seesaw, Book Creator, and GarageBand. Android tablets are cheaper and more varied. Both support touch input, cameras, and microphones, making them powerful for media creation, digital reading, and formative assessment tools (Kahoot!, Quizizz, Nearpod).

COMMON TRAP Cross-platform compatibility bites teachers constantly. A student who saves a file as .pages (macOS Pages) and brings it to a Windows machine will find it won't open without Pages or a conversion step. The professional solution: save in universal formats — .docx for word processing, .pdf for sharing final documents, .csv for spreadsheet data. The exam will ask you to recognize cross-platform problems and recommend the right format solution.

(C) Technology Terminology

The NYSTCE 971 expects you to know these terms with precision — not just a vague recognition. Learn them as functional definitions you can apply:

Data measurement units: A bit is the smallest unit of digital data (0 or 1). A byte = 8 bits. A kilobyte (KB) = 1,024 bytes. A megabyte (MB) = 1,024 KB (a typical MP3 song is 3–5 MB). A gigabyte (GB) = 1,024 MB (a full-length HD movie is 4–8 GB). A terabyte (TB) = 1,024 GB (a school file server might hold 10+ TB).

Processing and memory terms: CPU speed is measured in GHz (gigahertz) — higher GHz means more instruction cycles per second and generally faster performance. RAM is volatile (erased on shutdown) working memory; more RAM = more simultaneous processes. ROM (Read-Only Memory) is permanent firmware memory (used for BIOS/UEFI startup code). Cache is ultra-fast memory built into the CPU itself that stores frequently used data to reduce access time.

Networking terms: Bandwidth — the maximum data transfer rate of a network connection, measured in Mbps or Gbps; affects how quickly pages load and how well video streams. LAN (Local Area Network) — a network within a building or campus (your school's internal network). WAN (Wide Area Network) — a network spanning cities, states, or continents (the internet is the world's largest WAN). Ethernet — wired network connection via Cat5e or Cat6 cable; faster and more stable than Wi-Fi. Wi-Fi — wireless networking using radio waves; 802.11ac (Wi-Fi 5) and 802.11ax (Wi-Fi 6) are current standards. IP address — a unique numerical label assigned to every device on a network (e.g., 192.168.1.45 for a local device, or a public IP assigned by your ISP). DNS (Domain Name System) — translates human-readable domain names (www.google.com) into IP addresses. DHCP (Dynamic Host Configuration Protocol) — automatically assigns IP addresses to devices when they join a network.

Web and software terms: HTTP transfers data between web server and browser unencrypted; HTTPS encrypts the transfer using TLS — schools must use HTTPS-only sites for student data. A URL (Uniform Resource Locator) is a web address. A browser (Chrome, Firefox, Safari) renders web pages; a search engine (Google, Bing) indexes and retrieves web content — students often confuse these two. Cloud computing means data is stored on remote servers maintained by a third party and accessed via the internet — Google Drive, OneDrive, and Dropbox are cloud storage services. Virtualization runs multiple virtual machines on a single physical server, used by IT departments for efficiency. Open-source software has publicly available source code anyone can inspect, modify, and distribute (LibreOffice, Firefox, Linux). Proprietary software has restricted source code and licensing (Microsoft Office, Adobe Creative Suite). Freeware is free to use but source code is not open. Shareware is try-before-you-buy software with limited features until purchased. A GUI (Graphical User Interface) uses icons and windows (every modern OS); a CLI (Command-Line Interface) accepts typed commands (Terminal, PowerShell) — relevant for IT management, not typical teacher use.

TEST READY TIP Know the difference between a browser and a search engine — it's a classic exam trick. Chrome is a browser; Google is a search engine. You use a browser to access a search engine. Also know: HTTP ≠ HTTPS — HTTPS is required for any site handling student data under FERPA and COPPA compliance.

(D) Basic Computing Procedures

Startup and shutdown aren't just convenience — they matter for data integrity. A proper shutdown closes open files, writes cached data to disk, and signals the OS to release hardware gracefully. An improper shutdown (pulling the power cord, power outage) leaves the file system in an inconsistent state. On the next Windows boot, CHKDSK (Check Disk) runs automatically to scan and repair the file system — this process can take minutes and frightens students who don't understand it. On a Chromebook, power cuts are much less damaging because Chrome OS is stateless and files live in the cloud. On macOS, improper shutdown can trigger fsck (file system check) on restart.

Network login in most schools uses Active Directory (Windows) or Google Workspace (Chromebooks). Students log in with a username and password assigned by the district. Domain login (Active Directory) maps the user to a profile stored on a network server — the student sees their same desktop and files on any computer in the building. This is called a roaming profile. Password policies require minimum length, complexity, and regular changes; students who write passwords on sticky notes or share them violate AUP policies.

Routine configurations you might set up in a classroom: screen resolution (match projector resolution to avoid letterboxing), default browser (set Chrome for Google Classroom integration), printer assignment (select the correct lab printer from the network), and accessibility settings — font size, high-contrast mode, on-screen keyboard, sticky keys, and screen reader settings for students with disabilities.

(E) Cleaning and Maintaining Hardware

Shared devices in a computer lab accumulate grime, bacteria, and debris rapidly. As the Ed Tech Specialist, you establish and enforce maintenance protocols that keep hardware functional and hygienic.

Keyboards: Use compressed air to dislodge debris from between keys — hold the can at an angle, short bursts. For surface cleaning, use isopropyl alcohol wipes (70% concentration). Never spray liquid directly onto the keyboard — moisture can short circuit membrane switches underneath. Never use bleach-based wipes on keycaps as they will fade lettering.

Monitors and screens: Use a dry or lightly dampened microfiber cloth. Never use Windex or glass cleaner — the ammonia in standard glass cleaner degrades the anti-glare coating on LCD panels, causing permanent cloudiness. Wipe in circular or linear motions with gentle pressure; pressing too hard on an LCD can damage pixels.

Removable media care: USB drives should be stored in protective cases when not in use. More important: always use the OS's Eject function before physically removing a USB drive. Modern operating systems use write caching — data is held in RAM and written to the drive in batches for efficiency. Ejecting tells the OS to flush the cache completely before disconnecting. Yanking a drive mid-write corrupts data and can permanently damage the drive's file allocation table.

Printers: Run the nozzle cleaning utility from the printer software when inkjet prints show streaks or missing color. Replace toner/ink before it runs completely dry to avoid damaging print heads. For paper jams, open all access panels fully, pull paper in the direction of paper feed (never against it), and remove all fragments before closing — a torn piece left inside causes the next jam.

(F) Virus Scanning, File Management, and Multitasking

Antivirus software protects computers using two detection methods: signature-based scanning compares files against a database of known malware patterns (definitions must be kept up to date — a week-old definition file misses new threats); heuristic analysis flags behavior that resembles malicious activity even if the specific malware isn't in the database. In a school context, Windows Defender (built into Windows 10/11) provides adequate real-time protection for most classrooms; IT departments often supplement with enterprise tools like Malwarebytes or CrowdStrike. Schedule full scans after school hours to avoid degrading student performance during instructional time.

File formats for sharing and saving: Teach your students these distinctions — they matter on the exam and in the classroom:

.docx vs. .pdf

.docx is editable but renders differently across systems and Word versions. .pdf preserves formatting exactly as intended regardless of the receiving device or OS. Use .pdf for anything you're sending to parents, submitting officially, or sharing with students who just need to read it.

.jpg vs. .png

JPEG uses lossy compression — file size is small but image quality degrades slightly each time you save. PNG uses lossless compression — no quality loss, but files are larger. For student graphics projects with crisp text or sharp edges, PNG is better. For photos and general web images, JPEG is fine.

.csv for spreadsheets

CSV (Comma-Separated Values) stores tabular data as plain text — opens in Excel, Google Sheets, Numbers, or any database. Use .csv when sharing data between different spreadsheet programs or importing into a student information system.

Multitasking in a school lab context: every open application consumes RAM. A student running Google Chrome with 15 tabs, a Google Meet session, and a video editor simultaneously will overwhelm a machine with 4 GB RAM. Teach students to close tabs and applications they're not actively using. If a computer runs slowly, opening Task Manager (Ctrl+Shift+Esc on Windows) shows which processes are consuming the most memory — a useful diagnostic step before calling IT.

Shared file systems: Google Drive shared folders let multiple users access and edit files; changes sync automatically. School network drives (mapped drives like G: or H:) provide shared storage accessible from any machine on the school network. OneDrive integrates with Microsoft 365 for cloud-based file sharing in districts using Windows ecosystems.

(G) Installing Peripheral Devices and Software

Plug-and-play (PnP) means the OS automatically detects and installs a device when connected — no manual driver installation required. Most modern USB devices (flash drives, keyboards, mice, webcams) are PnP. Legacy devices or specialized hardware (older printers, scientific probeware, specialized audio interfaces) require manually downloading and installing a driver — software that tells the OS exactly how to communicate with that specific hardware. If a device appears with a yellow exclamation mark in Windows Device Manager, its driver is missing or corrupt.

USB types: USB-A is the classic rectangular connector. USB-C is the small oval connector on modern laptops and Chromebooks — supports faster speeds and can carry power. USB 3.0 (blue ports) transfers data at up to 5 Gbps vs. USB 2.0's 480 Mbps — relevant when students copy large video files for media projects.

Software installation on managed school networks is not something teachers typically do themselves. School networks are managed by IT using tools like SCCM (System Center Configuration Manager) for Windows machines or Google Admin Console for Chromebooks — IT pushes approved software remotely to all devices in a device group. This is why a student can't install a personal game on a school Chromebook: IT has locked the device to approved apps only. As an Ed Tech Specialist, you work with IT to request software deployment, not perform it yourself on individual machines.

(2) Competency 0002: Basic Troubleshooting Techniques

(A) Isolating Problems and Checking Connections

Effective troubleshooting is systematic, not random. When technology fails in your classroom, follow this sequence — and teach it to building-level staff:

  1. Identify the symptom precisely. "The printer won't print" is not actionable. "The printer shows 'Offline' in the Windows Printers settings and the job is stuck in the queue" is actionable. Write down error messages verbatim before clicking through them — those codes are what IT needs.
  2. Isolate the scope. Is this problem affecting one computer, one classroom, or the whole building? If one computer can't reach Google Classroom but the others can, the problem is local. If the entire floor is affected, suspect the network switch or router for that segment.
  3. Check physical connections first. Loose cables are responsible for a disproportionate share of classroom tech failures. Press every cable connector firmly into its port. Check that power strips are on and circuit breakers aren't tripped. Verify the correct input source is selected on the projector (VGA, HDMI, or wireless).
  4. Restart the device. Rebooting clears RAM, ends frozen processes, re-establishes network connections, and lets the OS re-detect hardware. This solves roughly 40% of common classroom tech problems with zero IT involvement.
  5. Check for error messages. Don't click through error dialogs without reading them. Error messages contain codes and descriptions that either tell you exactly what's wrong or allow IT to diagnose the issue remotely.
TEST READY TIP The exam will present a classroom tech failure scenario and ask what to do first. The correct answer is almost always: check physical connections and restart before anything else. Only escalate to IT after you have exhausted the basic self-fix steps. Calling IT before trying a restart is an incorrect answer.

(B) Common Problems with Peripheral Devices, Internet, and Network

Printer problems and solutions:

  • "Printer offline": Right-click the printer in Settings → Printers and scanners → See what's printing. Check "Use Printer Online" option. Verify cable connection or Wi-Fi. Restart the Print Spooler service (Services app in Windows). If the printer still shows offline after all that, restart the printer itself.
  • Print queue stuck: Open the print queue from Settings → Printers, cancel all pending jobs, then restart the Print Spooler service. Sometimes files get "stuck" as the spooler processes a corrupted job — clearing the queue resolves it.
  • Paper jam: Open all access panels. Pull paper gently in the direction of normal paper feed. Remove every fragment — even a small torn piece left inside will jam the next print job. Never force paper against the feed direction; you risk damaging the feed rollers.
  • Low ink/toner warning: Inkjet printers usually give 10–30 pages of warning. Laser printers with toner low messages can sometimes print another 50–100 pages by removing and gently shaking the toner cartridge to redistribute remaining toner. Replace before it runs completely dry to prevent damage to the imaging drum.

Projector problems and solutions:

  • No image on screen: Check that the input source on the projector matches the connection type (VGA, HDMI, or wireless). Press the source/input button on the projector remote. Check that the cable is seated at both ends. On the laptop, press the display toggle shortcut (Win+P on Windows; Cmd+F1 on Mac) to switch between display modes.
  • Dim or yellowed image: The projector lamp is nearing end of life. Most projectors display a warning when lamp hours reach about 80% of rated lifespan (typically 2,000–5,000 hours). Submit a work order to IT for a lamp replacement before it fails mid-lesson.

Internet connectivity problems:

  • No internet on one computer: Check the Wi-Fi icon — is it connected? Try another website (if Google.com works but Khan Academy doesn't, it's a site-specific issue or content filter, not your connection). Run the Windows Network Troubleshooter (right-click the network icon → Troubleshoot problems).
  • No internet for the whole room: Check the Wi-Fi access point or Ethernet switch for the room — is it powered on? A single failed network switch can take down an entire classroom. Contact IT — this is beyond teacher self-repair.
  • Network login failures: Check Caps Lock. Verify the username format the district requires (firstname.lastname vs. firstinitial+lastname). After several failed attempts, accounts lock automatically for security — only IT can unlock them. Expired passwords must be reset before logging in.

(C) Troubleshooting Hardware and Software Configurations

Device Manager (Windows): Open by right-clicking Start → Device Manager. All hardware categories are listed; expand any category to see individual devices. A yellow exclamation mark indicates a driver problem — right-click the device → Update driver → Search automatically for updated driver software. If that fails, go to the manufacturer's website, download the specific driver for that device model and Windows version, and install manually.

Task Manager (Ctrl+Shift+Esc): Shows all running processes with their CPU, RAM, disk, and network usage. If a computer is slow, Task Manager often reveals the culprit — a browser with 30 tabs consuming 90% of RAM, or a Windows Update running in the background. Students can use Task Manager to close unresponsive programs (right-click → End Task) without rebooting.

System Information (msinfo32): Shows complete hardware specs — installed RAM, processor model, OS version, and attached devices. Useful when you need to tell IT exactly what hardware a machine has without opening the case.

Safe Mode boots Windows with only essential drivers and services — no third-party software, no network extensions. If a computer works fine in Safe Mode but crashes normally, a recently installed application or driver is the likely cause. Access Safe Mode by holding Shift while clicking Restart, then choosing Troubleshoot → Advanced Options → Startup Settings → Restart → F4.

Software troubleshooting: If a specific application misbehaves (freezes, crashes, produces errors), try in order: (1) close and reopen the application; (2) check for available updates (Help → Check for Updates); (3) uninstall and reinstall the application; (4) check compatibility — older software may need Compatibility Mode on newer Windows versions (right-click the .exe → Properties → Compatibility tab).

(D) Troubleshooting Operating Systems

Windows Event Viewer (eventvwr.msc): The OS logs every significant event — errors, warnings, information — with timestamps and error codes. When a computer behaves strangely and you can't identify why, Event Viewer's Application and System logs often show the cause. Include the event ID number when submitting an IT ticket — it speeds diagnosis dramatically.

Blue Screen of Death (BSOD): A Windows BSOD indicates a critical system error — typically a hardware failure, a driver conflict, or RAM corruption. The screen displays a stop code (e.g., MEMORY_MANAGEMENT, IRQL_NOT_LESS_OR_EQUAL). Note the stop code before the machine reboots and include it in your IT ticket. Frequent BSODs on a specific machine warrant hardware diagnosis by IT.

macOS Disk Utility First Aid: Repairs file system errors and permission issues on Mac volumes. Open Disk Utility (Applications → Utilities), select the volume, click First Aid. Run this if a Mac shows unexpected crashes or applications fail to open. For more serious issues, macOS Recovery Mode (hold Cmd+R at startup) allows reinstalling macOS without erasing user data.

Chrome OS is nearly self-managing: it updates automatically during restart, and most issues resolve with a simple sign-out and sign-in. For persistent problems, a Powerwash (Settings → Advanced → Reset Settings → Powerwash) factory resets the Chromebook — safe to do because all student data lives in Google Drive, not locally.

When to self-fix vs. escalate: Self-fix (teacher or Ed Tech Specialist handles): restart, check connections, update software, clear print queue, basic driver update. Escalate to IT: physical hardware damage, ransomware or virus infection, persistent BSOD, network infrastructure issues (router, switch, server), account creation or password resets, software licensing problems.

(E) Support Resources

Internal resources: Most districts run an IT help desk with a ticketing system (ServiceNow, Freshdesk, or a custom system). Submitting a ticket — not just calling or emailing a tech directly — creates a documented record of the issue, its resolution, and response time. The building technology coordinator handles day-to-day classroom tech support; the Ed Tech Specialist focuses on instructional integration and professional development.

External resources: Manufacturer support pages (HP, Dell, Lenovo, Apple, Google) provide drivers, firmware updates, and user manuals. Microsoft Support (support.microsoft.com), Apple Support (support.apple.com), and Google Support (support.google.com) offer knowledge bases, community forums, and live chat or phone support. Ed tech communities — ISTE (International Society for Technology in Education), state ed tech associations, and educator Twitter/X — share peer-sourced solutions to common classroom tech problems.

Documentation: Every device ships with a user manual; these are almost always available as PDFs on the manufacturer's website even if the paper manual was lost. Within the OS, F1 typically opens the help system for the active application. Knowing where to find answers — not memorizing every answer — is a core Ed Tech Specialist competency, and the exam tests it directly.

(3) Competency 0003: Equity, Ethics, and Etiquette Issues

(A) Equity, Ethics, and Etiquette: Three Distinct Concepts

These three terms are related but not synonymous — the exam will test whether you can distinguish them:

Equity

Ensuring all students have fair access to technology and benefit equitably from its use. Equity addresses structural and systemic gaps — it's not enough to have computers if some students can't use them effectively due to disability, language, or economic circumstance.

Ethics

Doing what is right with technology — honesty, intellectual integrity, respecting others' work and privacy, using technology for its intended purpose, and not using it to harm others.

Etiquette (Netiquette)

Standards for polite, respectful digital communication: professional tone in email, not typing in all caps (considered shouting), not forwarding private messages without permission, giving credit when sharing others' content, not interrupting others during video calls.

(B) Equity Issues in Computer Use

The digital divide is the gap between those who have robust, meaningful access to technology and those who don't. It has three interconnected dimensions that Ed Tech Specialists must address:

1. Physical access for students with disabilities: Assistive technology (AT) bridges the gap between a student's abilities and the demands of the digital environment. Key AT tools you must know:

  • Screen readers (JAWS, NVDA, VoiceOver) — convert on-screen text and navigation to synthesized speech or braille output for students who are blind or have low vision. VoiceOver is built into macOS and iOS.
  • Switch-access devices — single-switch or multi-switch input systems for students with significant motor impairments who cannot use a standard keyboard or mouse. The switch triggers an on-screen scanning interface.
  • AAC (Augmentative and Alternative Communication) devices — generate speech output for students with communication disabilities; apps like Proloquo2Go on iPad are common in special education settings.
  • Closed captioning and live captions — essential for students who are deaf or hard of hearing; built into YouTube, Google Meet, and Zoom; required by law for video content in schools.
  • Text-to-speech and speech-to-text — tools like Read&Write (browser extension), Google's built-in dictation, and Dragon Naturally Speaking support students with dyslexia, physical disabilities, or language processing challenges.

2. Language access: Students with limited English proficiency need technology interfaces and digital content in their home languages. Google Translate and multilingual keyboard settings allow students to compose and read in their first language while developing English. Dual-language digital resources and multilingual interface settings in Google Chrome make the digital environment accessible. An Ed Tech Specialist should work with ELL coordinators to identify and deploy appropriate language support tools.

3. Socioeconomic access: Students without home internet or personal devices are entirely dependent on school technology — for schoolwork during school hours and for homework assignments that assume home access. The E-rate program (administered by the FCC) subsidizes internet connectivity and network equipment costs for K-12 schools and libraries — schools with higher percentages of low-income students receive larger discounts (up to 90% of eligible costs). When teachers assign homework that requires internet access, they must account for students who lack home connectivity — providing alternative offline options or lab time is an equity imperative, not optional accommodation.

(C) Equity and Ethics in Technology Purchasing and Policy

Technology purchasing decisions have equity consequences that extend beyond the budget meeting. When a school directs its newest, most capable devices to the gifted and talented program while the general education lab runs on decade-old machines, that purchasing pattern systematically disadvantages students who are already less likely to have technology at home. As an Ed Tech Specialist, you are a professional advocate for equitable distribution of technology resources across all student populations.

Historical context matters: research consistently showed that through the 1990s, technology access in schools correlated strongly with district wealth and student demographics. Federal programs — E-rate (1996), Title IV of the Every Student Succeeds Act (2015) — were designed to counteract these structural inequities by directing funding to high-need schools. The COVID-19 pandemic of 2020 made the equity stakes of the digital divide starkly visible: students without devices or internet access fell further behind during emergency remote learning.

COMMON TRAP On the exam, equity questions sometimes describe a school buying a new technology solution. The incorrect answers often focus only on cost or features. The correct answer recognizes that equitable distribution — who gets the technology and whether all students can use it effectively — is a primary criterion, not an afterthought.

(D) Historical Development and Major Trends in Educational Technology

You need to know this timeline cold — the exam tests landmark events and the educational philosophies behind them:

  • 1970s: Mainframe computers in universities. Seymour Papert at MIT introduces LOGO, a programming language for children, embodying his constructionist philosophy — children learn best by building things, including computer programs. LOGO's "turtle graphics" became the first widely used programming tool in elementary schools.
  • 1980s: The Apple IIe becomes the dominant classroom computer. Drill-and-practice software (Oregon Trail, Math Blaster) dominates — students practice skills through repetition. Computer literacy emerges as a standalone subject (typing, BASIC programming). IBM-compatible PCs run DOS.
  • 1990s: The World Wide Web launches publicly in 1991 (Tim Berners-Lee). CD-ROM encyclopedias (Encarta) replace print encyclopedias in many libraries. The E-rate program (Telecommunications Act of 1996) brings internet connectivity to schools at subsidized rates. Constructivist ed tech philosophy takes hold — technology as a tool for student construction of knowledge, not just content delivery.
  • 2000s: Interactive whiteboards (Smartboards) replace chalkboards and overhead projectors. 1:1 laptop programs (Maine Learning Technology Initiative, 2002 — first statewide 1:1 program in the U.S.) put a laptop in every student's hands. No Child Left Behind (2001) emphasizes accountability and uses technology for testing. LMS (Learning Management Systems) like Blackboard and Moodle emerge for organizing online course content.
  • 2010s: Tablets and Chromebooks flood classrooms. Google Classroom launches (2014) and rapidly becomes the dominant K-12 LMS. The SAMR model (Ruben Puentedura) gives teachers a framework for evaluating technology integration depth. The maker movement brings 3D printers, laser cutters, and Arduino kits into school makerspaces. CS for All and Hour of Code (2013) push coding into K-12 curriculum nationwide.
  • 2020s: The COVID-19 pandemic forces emergency remote learning, exposing catastrophic equity gaps in device and internet access. AI tools (ChatGPT, 2022) enter student and teacher use, prompting urgent conversations about academic integrity and AI literacy.

The SAMR model (Substitution → Augmentation → Modification → Redefinition) is the most tested framework in this competency:

Level What It Means Classroom Example
Substitution Technology replaces a traditional tool with no functional change Students type an essay in Google Docs instead of handwriting it
Augmentation Technology replaces a traditional tool with some functional improvement Students use spell-check and the built-in thesaurus while typing the essay
Modification Technology allows significant task redesign Students collaborate simultaneously on the same Google Doc, leaving peer comments and suggestions in real time
Redefinition Technology allows creation of new tasks previously inconceivable Students publish their essays as a class blog, receive comments from students in another country, and revise based on authentic global feedback

(4) Competency 0004: Legal, Privacy, Security, and Safety Issues

(A) Legal Issues in Purchasing and Policy

School technology purchasing is governed by a thicket of legal requirements that the Ed Tech Specialist must understand in order to advise administrators correctly.

Software licensing: A single-user license permits installation on one machine only — installing it on 30 lab computers is copyright infringement, even if the school paid for the software. A site license covers all machines in a building or district. A subscription license (e.g., Microsoft 365 Education, Adobe Creative Cloud for Schools) covers all users enrolled in the subscription for the subscription period. The school district is legally liable if IT knowingly installs unlicensed software — penalties under the Computer Fraud and Abuse Act and copyright law can be substantial.

CIPA (Children's Internet Protection Act, 2000): Schools and libraries that receive E-rate funding are legally required to implement internet content filters that block visual depictions of obscenity, child pornography, and material harmful to minors. CIPA also requires schools to adopt and enforce an internet safety policy covering hacking, unauthorized disclosure of personal information, and cyberbullying. A school that receives E-rate subsidies without implementing CIPA-compliant filtering must repay those funds.

COPPA (Children's Online Privacy Protection Act, 1998, updated 2013): Commercial websites and online services cannot collect personal information from children under 13 without verifiable parental consent. This has major implications for classroom technology: a teacher cannot sign students up for a social media platform, a game, or an online tool that collects personal data unless the tool has a COPPA-compliant school agreement (where the school, not parents, provides consent on behalf of students). Google Workspace for Education and Microsoft 365 Education have COPPA-compliant agreements with school districts. Apps without school agreements should not be used with students under 13.

(B) Acceptable Use Policies (AUPs)

An Acceptable Use Policy (AUP) is a written agreement between the school district and its technology users (students and staff) that defines what is and isn't permitted when using school technology resources. Every student and parent typically signs an AUP at the start of the school year. Key AUP components:

  • Permitted uses: Educational research, completing teacher-assigned tasks, accessing school-approved applications, communicating with teachers via school email systems
  • Prohibited uses: Accessing personal social media accounts on school devices, downloading software without IT authorization, visiting sites blocked by the content filter, cyberbullying, sharing passwords, accessing others' files without permission
  • Privacy expectations: School-owned devices and network traffic may be monitored by IT. Students have no expectation of privacy when using school networks or devices — content filters log all traffic, and IT can review browsing history on school machines.
  • Consequences: Violations may result in loss of technology access privileges, disciplinary action, and in cases of illegal activity (unauthorized access, threats), referral to law enforcement.

Publishing minors online: Schools must obtain written parental consent before publishing any identifying information about students on publicly accessible platforms — including student names paired with photos, work samples, or any information that could identify a specific child. This is both a FERPA requirement and a basic ethical obligation. AUPs often include a media release form for this purpose. Anonymous publication (first name only, or "a student in Ms. Rivera's 5th grade class") without photos is generally permissible.

Chat rooms and real-time communication: AUPs must address whether students can use real-time communication tools (Discord, Instagram DMs, personal email) during the school day, what monitoring is in place for school-provided communication tools (Google Chat within Google Workspace), and the prohibition on sharing personal contact information with strangers online.

(C) Protecting Students from Inappropriate Content and Interactions

Content filtering systems block inappropriate websites at the network level — every request from a school device passes through a filter that checks the requested URL or IP address against a blocklist. Common enterprise-grade school filtering systems include GoGuardian, Bark, Securly, and Lightspeed. These tools also alert teachers or administrators when students search for concerning content (self-harm, violence, explicit material). Schools receiving E-rate funding are legally required under CIPA to maintain active content filtering.

Digital citizenship instruction is the Ed Tech Specialist's primary tool for building students' own protective capacity. Key digital citizenship skills you must be able to teach and support:

  • Identifying phishing attempts: Phishing emails impersonate trusted sources (banks, school administrators, popular services) to trick users into revealing passwords or clicking malicious links. Red flags: urgent language ("Your account will be suspended!"), generic greetings ("Dear User"), mismatched sender addresses, hover-before-you-click link inspection.
  • Evaluating website credibility: The SIFT method (Stop, Investigate the source, Find better coverage, Trace claims) gives students a systematic approach to source evaluation. Lateral reading — opening new tabs to check what others say about a source, rather than reading the source itself more closely — is research-validated as more effective than traditional checklist approaches.
  • Safe online interactions: Students should never share home address, phone number, school name, or daily schedule in public forums. Block and report cyberbullying immediately rather than retaliating. Use only school-approved communication platforms — not personal social media — for school-related communication with teachers.
  • Recognizing and responding to cyberbullying: Cyberbullying includes repeated harassment via digital means. Unlike in-person bullying, digital harassment follows the target home 24/7. Students should screenshot and save evidence, block the bully, report to a trusted adult, and never retaliate.

(D) Liability: Piracy, Plagiarism, Unauthorized Access, and Vandalism

Software piracy — illegally copying, distributing, or using copyrighted software without a valid license — is a federal crime under the Copyright Act. The district bears legal liability if IT installs unlicensed software, even unintentionally. Business Software Alliance (BSA) has pursued multi-million dollar judgments against institutions. As Ed Tech Specialist, you must verify licensing compliance for every software deployment and maintain records of valid licenses.

Plagiarism in the digital age means copying text, images, code, or other content from websites or digital sources and presenting it as original work. Digital plagiarism detection tools like Turnitin, PaperRater, and Google Classroom's originality reports compare student submissions against databases of published text and other student submissions. Beyond detection, the Ed Tech Specialist supports teachers in building a culture of academic integrity that addresses why students plagiarize (time pressure, lack of confidence, unclear citation expectations) rather than just punishing it after the fact.

Unauthorized access — accessing computer systems, files, or accounts without permission — is a federal crime under the Computer Fraud and Abuse Act (CFAA). A student who guesses a teacher's password to change their grade, who accesses a classmate's email account, or who exploits a software vulnerability to gain admin access is committing a federal crime, regardless of whether any actual harm results. Schools must document and report incidents; students face serious legal consequences in addition to school discipline.

Vandalism — deliberate destruction or defacement of hardware or software — includes physically damaging equipment, deleting system files, installing unauthorized programs, or defacing a school website. Students are personally liable for the cost of willful destruction; schools must document damage, involve parents, and refer serious cases to school resource officers.

TEST READY TIP Know the law names precisely: CFAA (unauthorized computer access), CIPA (internet content filtering for E-rate recipients), COPPA (children's online privacy under 13), FERPA (student educational records). The exam will describe a scenario and ask which law applies — matching the scenario to the correct law is a high-frequency question type.

(E) Copyright Laws for Computers, Software, and Technology

Copyright protects original creative works automatically from the moment of creation — no registration is required. Copyright covers literary works, music, images, software code, video, and any other original expression. Duration: works created after 1977 are protected for the life of the author plus 70 years.

Fair use doctrine (Section 107 of the Copyright Act) allows limited use of copyrighted material without permission for purposes like education, commentary, criticism, and news reporting. Courts weigh four factors:

  1. Purpose and character of the use — educational and nonprofit use weighs in favor of fair use; commercial use weighs against it. "Transformative" use (commenting on, critiquing, or remixing the original) favors fair use.
  2. Nature of the copyrighted work — using factual works (news articles, encyclopedia entries) favors fair use more than using highly creative works (novels, films, songs).
  3. Amount and substantiality used — using a small excerpt favors fair use; reproducing the "heart" of the work (the most essential or memorable portion) weighs against it even if the amount is small.
  4. Effect on the market for the original — if your use substitutes for purchasing the original and harms its market, that weighs heavily against fair use. A teacher photocopying an entire textbook for all students fails this factor decisively.

Creative Commons licensing gives creators a way to share their work with pre-granted permissions. Key CC license types:

  • CC BY — use freely with attribution to the original creator
  • CC BY-SA — use with attribution; derivative works must use the same license (share-alike)
  • CC BY-NC — use with attribution for non-commercial purposes only
  • CC BY-ND — use with attribution; no derivative works permitted
  • CC0 — public domain dedication; no restrictions whatsoever

Public domain works have no copyright protection — either because copyright has expired (works published before 1928 in the U.S. are generally public domain) or because the creator waived all rights. Public domain images and texts are safe to reproduce without restriction.

Software licenses: GPL (GNU General Public License) — open source; derivative software must also be GPL. MIT License — permissive open source; can be used in commercial products without requiring open-source release. Apache License — similar to MIT, explicitly grants patent rights. Proprietary — all rights reserved; use governed by EULA (End User License Agreement).

(F) Citing Electronic Sources

Teaching students to cite digital sources is a core Ed Tech Specialist responsibility — it combines information literacy, academic integrity, and respect for intellectual property.

MLA 9th Edition format for a web page:
Last, First. "Title of Page." Name of Website, Publisher (if different from website name), Day Month Year of publication, URL. Accessed Day Month Year.
Example: Rivera, Jess. "Digital Citizenship in Middle School." Edutopia, George Lucas Educational Foundation, 14 Mar. 2023, www.edutopia.org/article/digital-citizenship. Accessed 5 Jan. 2024.

APA 7th Edition format for a web page:
Last, F. M. (Year, Month Day). Title of page. Site Name. URL
Example: Rivera, J. (2023, March 14). Digital citizenship in middle school. Edutopia. https://www.edutopia.org/article/digital-citizenship

A DOI (Digital Object Identifier) is a permanent, stable link to an academic article or dataset — more reliable than URLs, which frequently change. DOIs look like: doi:10.1080/15391523.2021.1893474. When a DOI exists, use it instead of the URL in both MLA and APA citations.

Teach students to evaluate source credibility before citing: check the author's credentials (who wrote this and why should we trust them?), publication date (is this current?), sponsoring organization (is this institution reputable and relevant?), and evidence quality (does the article cite its sources?). The CRAAP test (Currency, Relevance, Authority, Accuracy, Purpose) is a teachable framework for source evaluation.

(G) Health Issues Related to Computer Use

The Ed Tech Specialist advises on ergonomics and health — knowing these specific conditions and their prevention strategies is directly testable.

Computer Vision Syndrome (CVS) / eyestrain: Prolonged screen viewing causes symptoms including headache, blurred vision, dry eyes, and neck pain. The mechanism: screens require more precise focusing effort than printed text, and people blink less frequently while staring at screens (reducing tear film). Prevention: the 20-20-20 rule — every 20 minutes, look at something at least 20 feet away for at least 20 seconds. Adjust screen brightness to match ambient room lighting (too bright or too dim both cause strain). Anti-glare screen protectors and matte monitor surfaces reduce reflection. Position monitors so no bright window is directly behind or in front of the screen.

Repetitive Stress Injuries (RSI): Carpal tunnel syndrome is compression of the median nerve as it passes through the carpal tunnel in the wrist, caused by repetitive wrist flexion and extension during typing. Symptoms: tingling, numbness, and pain in the hand and fingers (especially thumb, index, and middle fingers). Prevention: neutral wrist position during typing (wrists should not bend up or down — flat is correct), ergonomic split keyboards reduce wrist deviation, wrist rests support during breaks but should not be used while actively typing, regular breaks to stretch and flex hands. Tendinitis (inflammation of tendons in the forearm or shoulder) from repetitive mouse use is similarly preventable with proper desk height, mouse placement, and regular stretch breaks.

Poor posture and musculoskeletal problems: Correct ergonomic workstation setup: monitor top at or slightly below eye level (looking slightly downward is natural and reduces neck strain), chair adjusted so feet rest flat on floor with knees at approximately 90°, back supported by chair back, elbows at approximately 90° with upper arms hanging straight from shoulders, keyboard and mouse at elbow height. Slouching forward strains the cervical and lumbar spine; tech coordinators should train teachers to configure student workstations and model correct posture during computer use.

Hearing damage: Prolonged exposure to sound above 85 decibels damages the cochlear hair cells — the sensory cells that convert sound vibrations to nerve signals — and this damage is permanent and cumulative. Headphones deliver sound directly to the ear canal, making loud listening more dangerous than speaker use. School policy should set maximum headphone volume at 60% of maximum device volume (approximately 60–70 dB). Students who listen at maximum volume through earbuds during every class period are at genuine long-term risk.

COMMON TRAP The exam may describe a student who frequently complains of headaches after computer lab time and ask what the teacher should do. The correct answer addresses the ergonomic or CVS root cause — not dismissing the complaint, not sending the student to the nurse without follow-up, and not assuming the student is avoiding work. Apply the 20-20-20 rule, check monitor height and brightness, and document the issue for the school's tech coordinator to assess the lab setup.

Quick Reference Card — Chapter 1

  • CIPA requires E-rate recipients to filter internet content; COPPA prohibits collecting personal data from children under 13 without verifiable parental consent; CFAA makes unauthorized computer access a federal crime; FERPA protects student educational records.
  • SAMR model: Substitution → Augmentation → Modification → Redefinition — measures depth of technology integration, from simple replacement to tasks previously impossible without technology.
  • Fair use four factors: (1) purpose (educational favored), (2) nature of the work (factual favored), (3) amount used (small portion favored), (4) market effect (no harm favored) — all four weighed together, no single factor is decisive.
  • Digital divide has three dimensions: physical access (assistive tech for disabilities), language access (multilingual interfaces), and socioeconomic access (home internet and devices) — E-rate subsidizes connectivity for high-need schools.
  • 20-20-20 rule prevents computer vision syndrome: every 20 minutes, look 20 feet away for 20 seconds. Carpal tunnel syndrome is prevented by neutral wrist position (not bent up or down) during typing.
  • Eject before removing USB drives to prevent data corruption from write caching; never spray liquid directly on keyboards; no ammonia cleaners on LCD monitors (damages anti-glare coating).
  • Plug-and-play = OS auto-installs the device; legacy devices require manual driver download. SCCM and Google Admin Console are IT tools for bulk software deployment across school devices.
  • AUP (Acceptable Use Policy) defines permitted/prohibited uses of school technology and must address monitoring, consequences, and publishing of student information — parental consent required before publishing minors publicly online.

Unlock the Complete Study Guide

This is just Lesson 1. Get full access to all 5 study lessons, plus practice tests, vocabulary guides, and AI-scored constructed response practice.

More NYSTCE 971 Resources