European Qualifications Framework (EQF) has 8 levels (1 – the lowest, 8 – the highest).
Levels reflect the complexity level of acquired knowledge, skills and competences (learning outcomes).
Go to the Glossary section
Information about the Latvian qualifications referenced to Latvian qualifications framework (LQF)
4
4
3
Professional knowledge
At the conceptual level:
1. Nature of business processes.
2. Critical thinking.
3. Principles of resource planning.
4. Standards and operational principles of hardware repair.
5. Personal data protection.
6. Hierarchical databases.
At the comprehension level:
1. General principles of hardware maintenance.
2. Principles and methods for selecting information.
3. Principles and methods for selecting information.
4. Open Systems Interconnection Model (OSI).
5. Fundamentals of programming.
6. Software management.
7. Principles of user account authentication and authorisation.
8. User grouping possibilities. Configuration of the work environment and group policies.
9. Computer network services and protocols.
10. File systems.
11. Methods for selecting information.
12. Regulatory framework for personal data protection.
At the application level:
1. Installation and configuration of equipment and components.
2. Main hardware components, their functions, and compatibility.
3. Connector standards.
4. Application of materials, tools, and software for hardware maintenance.
5. Diagnosis of hardware issues.
6. Rectification and configuration of hardware issues.
7. General principles of hardware maintenance and repair.
8. Use of tools intended for hardware repair.
9. Replacement of computer components.
10. Monitoring of system resources and output.
11. Computer network protocols and standards.
12. Technical capabilities of hardware.
13. Commonly used physical security solutions for hardware and their use.
14. Uninterruptible power supply systems and their use.
15. Rectification and configuration of operating system boot issues.
16. Installation and configuration of equipment and components.
17. Installation and configuration of commonly used software.
18. Writing of scripts.
19. Use of monitoring tools.
20. Rectification and configuration of operating system boot issues.
21. Installation and configuration of equipment and components.
22. Installation and configuration of commonly used software.
23. Methods for diagnosing software issues, commonly used tools and software, and their use.
24. Methods for rectifying and configuring software issues, commonly used tools and software, and their use.
25. Use of access control tools.
26. Configuration of commonly used routers.
27. Physical security solutions for computer networks.
28. Access control solutions in computer networks.
29. Virtual private networks.
30. Data encryption.
31. Management and configuration of disc and file systems.
32. Cloud computing.
33. Logical security tools for computer systems.
34. Configuration of user account rights.
35. Installation of antivirus software.
36. Management of antivirus software.
37. Creation of user accounts.
38. Cloud computing.
39. Management of user accounts.
40. Levels of user rights.
41. Web and its browser configuration.
42. Network protocols and standards.
43. Computer network architecture.
44. Installation, automation, and configuration of equipment and components (e.g., TCP/IP (Transmission Control Protocol/Internet Protocol) v4 and v6, DHCP (Dynamic Host Configuration Protocol), DNS (Domain Name System), SNMP (Simple Network Management Protocol), VPN (Virtual Private Network)).
45. Wireless display and audio transmission technologies (e.g., WiDi (Wireless Display), AirPlay, Chromecast, Miracast).
46. Operating systems.
47. Computer network architecture.
48. Network-attached data storage systems and their applications.
49. Disk arrays for enhanced security.
50. Fundamental operational principles of service management systems.
51. Information documentation tools.
52. Installation and configuration of equipment and components.
53. Web and its browser configuration.
54. E-mail, other communication programs, and their configuration.
55. Office equipment and its applications.
56. Remote access and support solutions, their types, and application.
57. Commonly used software.
58. Commonly used operating systems.
59. Web and its browser configuration.
60. E-mail, other communication programs, and their configuration.
61. Means of communication for information transfer.
62. Logical security tools for computer systems.
63. Configuration of user account rights.
64. Installation of antivirus software.
65. Management of antivirus software.
66. Regulatory framework for the ICT sector, including international regulatory framework.
67. Content and formatting requirements for ICT technical documentation.
General knowledge
At the conceptual level:
1. Norms included in the Constitution of the Republic of Latvia in the context of a civil society governed by the rule of law.
2. Fundamentals of set theory.
3. Combinatorics.
4. Trigonometric functions.
5. Regulatory enactments for the ICT sector.
6. Prerequisites for effective communication.
At the comprehension level:
1. Nature, significance, and norms of labour law.
2. Vocabulary.
3. Grammar and language functions.
4. Types of verbal interaction.
5. Language styles and intonation features.
6. Diversity of language and communication in different contexts.
7. Mathematical models.
8. Operational principles of computers and office equipment.
9. Information system security.
10. Principles of promoting collaboration. Team building.
At the application level:
1. Employee’s and employer’s rights and obligations.
2. Types of individual and collective protective equipment and its use.
3. Visual control of the technical condition of safety devices.
4. Ergonomic work techniques.
5. Environmental protection requirements for hardware maintenance.
6. Electrical safety requirements for hardware maintenance.
7. Fire safety requirements for hardware maintenance.
8. Action in an emergency (electric shock, fire, etc.).
9. First aid ABC.
10. Principles of professional communication.
11. Official language.
12. Professional terminology in the official language.
13. Professional terminology in English.
14. Intercultural interaction.
15. Practical applicability of mathematics.
16. Mathematical methods and tools.
17. Units of measurement and shapes.
18. Mathematical terminology.
19. Software for preparation of documents.
20. Work with office equipment.
21. Computer security programs.
22. Positive communication techniques.
23. Time planning techniques.
24. Self-assessment mechanisms.
25. Planning of studies, career, and work progress.
26. Learning strategies.
Professional skills and attitudes
1. To install and configure hardware in a local and public computer network.
2. To relocate and remove hardware in a local and public computer network.
3. To install and remove hardware components.
4. To perform the maintenance of hardware and operating systems.
5. To evaluate the need for hardware improvements.
6. To follow the equipment maintenance schedule.
7. To perform maintenance tasks in accordance with the technical documentation of equipment.
8. To identify the nature of a problem.
9. To structure information.
10. To define the scope of the problem to be resolved.
11. To select the necessary information to resolve problems.
12. To structure information.
13. To draw conclusions on the problem to be resolved.
14. To take actions to resolve operational issues of hardware within the scope of own competence.
15. To provide users with explanations about the cause of the problem.
16. To identify the causes of a problem.
17. To rectify damages.
18. To participate in evaluating the compliance of hardware with user requirements.
19. To evaluate the operational readiness of hardware and its compliance with occupational safety requirements.
20. To obtain and evaluate information for hardware improvements.
21. To identify hardware defects and user errors in operating hardware.
22. To determine key quality parameters of a simple local computer network.
23. To evaluate the need for improvements.
24. To evaluate, identify, plan, and implement data protection measures for physical access control.
25. To evaluate, identify, plan, and implement data protection measures for fire safety.
26. To identify equipment that ensures power supply.
27. To evaluate equipment.
28. To plan and carry out equipment setup.
29. To evaluate the compliance of commonly used software requirements with the response speed of a simple local computer network (LAN, WAN), hardware parameters, and user needs.
30. To install commonly used software.
31. To configure commonly used software.
32. To evaluate the compliance of operating systems with hardware parameters and user needs.
33. To install, replace, and configure computer operating systems according to the technical parameters of hardware and user needs.
34. To use programming tools for writing scripts.
35. To identify the impact of updates on overall hardware performance and usability in small systems.
36. To identify the necessary updates.
37. To implement updates.
38. To diagnose malfunctions of operating systems and software.
39. To locate and analyse log files generated by operating systems and software.
40. To use programming tools for writing scripts.
41. To use diagnostic software.
42. To rectify malfunctions of operating systems and software.
43. To use programming tools for writing scripts.
44. To ensure the protection of operating systems and software against unauthorised/unlicensed software.
45. To ensure the physical security of hardware units and local computer networks.
46. To evaluate, identify, plan, and implement data protection measures for computer network security.
47. To use a firewall.
48. To configure a router to enhance computer network security.
49. To implement data protection measures.
50. To plan data storage space for backups in data repositories or on data storage media.
51. To establish and implement the data storage and exchange procedures.
52. To perform data backups.
53. To restore data from backups.
54. To configure data synchronization between devices and securely destroy data using software tools or specialised equipment.
55. To use various types of information storage media.
56. To evaluate and identify data protection measures.
57. To plan and implement data protection measures.
58. To use a firewall.
59. To use antivirus software.
60. To use diagnostic software.
61. To create user accounts.
62. To use the available user account management tools.
63. To assign users different access rights to the computer system according to organisational policies.
64. To install, configure, and remove local computer network devices.
65. To set up network connection points and links.
66. To identify errors in the configuration of local computer network devices and infrastructure.
67. To rectify errors in the configuration of local computer network devices and infrastructure.
68. To create a file-sharing and network-accessible storage system for a local computer network based on a sample/template.
69. To service the file system of a local computer network.
70. To regularly compile information on problem situations in hardware units and the local computer network.
71. To collect information on problem situations in hardware units and the local computer network.
72. To inform internal and external clients about problem situations in hardware units and the local computer network.
73. To use operating systems.
74. To use text and graphic editors, spreadsheet editors, and other commonly used software.
75. To use peripheral devices.
76. To use various types of information storage media.
77. To use text and graphic editors, spreadsheet editors, and other commonly used software.
78. To use peripheral devices.
79. To use various types of information storage media.
80. To prepare information on significant changes in the performance of hardware, computer systems, or computer network.
81. To inform users in a timely manner.
82. To inform users about the use of a firewall.
83. To inform users about the use of antivirus software.
84. To apply the regulatory framework for the ICT sector.
85. To apply the company-specific regulatory framework for the ICT sector.
86. To keep track of changes in the regulatory framework for the ICT sector.
87. To inform the management about the need for changes in the regulatory framework for the ICT sector.
88. To read and understand drawings and technical documentation required for the work process.
89. To use suitable technical documentation, tools, measuring instruments, and materials for the work process.
90. To independently keep records of hardware and software, using appropriate software tools.
91. To prepare and draw up documents in conformity with work tasks, using office equipment.
92. To evaluate the technical data obtained during the inspection/repair of infrastructure.
93. To complete the report on equipment inspection/repair.
94. To keep track of compliance of users’ actual access rights with the requirements outlined in documents.
95. To independently keep records of users’ access rights, using appropriate software tools.
96. To use office equipment.
97. To prepare and draw up documents in conformity with work tasks.
General skills and attitudes
1. To fulfil the employee’s duties specified in the employment contract and other legal acts.
2. To exercise the employee’s rights specified in the employment contract and other legal acts.
3. To use individual and collective protective equipment and safety devices.
4. To use ergonomic work techniques and tools.
5. To comply with environmental protection requirements when performing hardware maintenance.
6. To perform work in conformity with electrical safety requirements.
7. To perform work in conformity with fire safety requirements.
8. To assess an emergency situation.
9. To handle an emergency (electric shock, fire, etc.).
10. To provide first aid.
11. To communicate in the official language.
12. To use professional terminology in the official language.
13. To communicate verbally and in writing in English.
14. To use professional terminology in English.
15. To make correlations.
16. To apply fundamental mathematical principles and techniques for professional work tasks.
17. To model the course of the planned task solution.
18. To use a computer and office equipment.
19. To prepare documents based on templates, using software.
20. To find specific information in internet resources and data storage media.
21. To communicate, using information technologies.
22. To perform collaborative teamwork.
23. To be aware of own responsibility in completing a common task.
24. To plan time efficiently.
25. To be aware of personal and social development/self-improvement opportunities.
26. To assess own professional experience and level of professional competence adequately.
27. To purposefully plan the improvement of professional competences.
28. To systematically acquire new knowledge and experience.
Professional competences
1. Ability to install and configure office equipment.
2. Ability to improve hardware performance through updates.
3. Ability to select and use appropriate measuring devices, tools, and software for the inspection and maintenance of hardware.
4. Ability to diagnose hardware issues at the user level.
5. Ability to rectify hardware issues at the user level.
6. Ability to perform hardware repairs.
7. Ability to participate in the inventory of existing hardware, software, and computer network.
8. Ability to ensure the physical security of hardware.
9. Ability to ensure that hardware is connected to uninterruptible power supply.
10. Ability to install and configure commonly used software.
11. Ability to improve software in hardware units and small systems through updates.
12. Ability to diagnose software issues at the user level.
13. Ability to rectify software issues at the user level.
14. Ability to prevent unauthorised software usage at the user level.
15. Ability to ensure the physical and logical security of computer networks.
16. Ability to create data backups for a single computer or a small system.
17. Ability to ensure antivirus protection for hardware.
18. Ability to create and maintain user accounts at the level of a single computer or small system.
19. Ability to configure computer network settings and services.
20. Ability to service the file system of a simple local computer network.
21. Ability to regularly collect and compile information on problem situations in hardware units and the local computer network.
22. Ability to provide technical assistance to users.
23. Ability to advise users with different levels of knowledge.
24. Ability to inform users about significant changes in the performance of hardware, computer systems, or computer network in a timely manner.
25. Ability to inform users about antivirus protection measures.
26. Ability to apply the regulatory framework for the ICT sector.
27. Ability to document the IT infrastructure and its changes within a small system.
28. Ability to prepare the necessary technical documentation for a small system.
29. Ability to document user account access rights and their changes within a small system.
30. Ability to document own activities in conformity with the requirements, using office equipment.
General competences
1. Ability to comply with legal requirements in the field of labour law.
2. Ability to comply with legal requirements in the field of occupational safety and environmental protection.
3. Ability to comply with legal requirements in the field of electrical and fire safety.
4. Ability to act in case of an accident and provide first aid.
5. Ability to communicate verbally and in writing in the official language, using professional terminology.
6. Ability to communicate in English, using professional terminology.
7. Ability to apply mathematical thinking when modelling work situations and planning the execution of work tasks.
8. Ability to use information and communication technologies to complete a work task.
9. Ability to effectively engage in teamwork.
10. Ability to plan own time when completing a task individually or in a team.
11. Ability to plan and take decisions in shaping own professional career.
4
4
3
4
Information and Communication Technologies (ICTs) (061)
Detailed field: (ISCED 2013)Database and network design and administration (0612)
EducationSecondary education
Qualification typeVocational
Full or partialFull qualification
Link to the descriptions of the Sector Qualifications Structure levels
Other information
Active qualification
Last changes: 24.04.2025
Posted: 07.05.2016