Upload
jetsada-malaisirirat
View
28.954
Download
1
Embed Size (px)
Citation preview
IT Passport Examination (ITPE)
IT Passport Examination เป็นการจัดสอบโดยความร่วมมือ ขององค์กรในภูมิภาคโดยมีประเทศไทยญ่ีป่่นพม่ามาเลเซีย
มองโกเลีย ฟิลิปปินส์และเวียดนามซ่ึงก่อต้ังเป็น Information Technology Professionals Examination Council (ITPEC) ในการผลักดันให้มีการจัดสอบมาตรฐานวิชาชีพท่ีไม่อิง
ผลิตภัณฑ์ให้เป็นท่ียอมรับในระดับภูมิภาคโดยให้หน่วยงานในแต่ละ ประเทศน้ันรับผิดชอบการจัดสอบภายในประเทศโดยจะสอบในวัน
เดียวกันท้ังหมดและเป็นข้อสอบช่ดเดียวกันท้ังหมดท้ัง 7 ประเทศ
ITPE Configuration of the Examination
Exam Duration : 165 min 100 Question
88 short question 12 medium question ( 3 question consisting of 4
sub-questions each)
Pass Criteria Total Point 60 % or higher Point in each field 30% or higher
Scope of ITPE information
Strategy (35%) Corporate and Legal Management Strategy System Strategy
Management (25%) Development
Technique Project Management Service Management
Technology (40%) Basic Theory Computer System Technical Element
Human Interfaces
Multimedia Databases Networks &
Security
Corporate Activities
Corporate Philosophy Corporate Objective
medium or long-term goal
Corporate Social Responsibility (CSR)
Management Resource
Management resources within the context of business management refer to
People - Human Resource Materials - assets Money - Finances Information – Information Management
Business Management
“PDCA” (Plan, Do, Check, Act) cycle is a fundamental approach for business management that involves the execution of a four-step cycle to continuously improve product quality and work.
Organizational structure
Function Organization Hierarchical Organization
Division OrganizationProject Organization
Operation
Various kinds of charts and diagrams are used to analyse,solve, and improve work issues.
Matrix Diagram
Matrix Data AnalysisGrantt chart
Legal Affairs
Rights - Rights to protect the use & ownership Copyright – rule for protection author's work from
publication Trademark – protect company logo & product name Patent - Methodology to creation something
Software License
Software License - The right to use software, and is granted by the software maker to the purchaser
Software is protected under the Copyright Act. License Agreement – Agreement to using software
Type of Software License Propitiatory Software Freeware / Shareware OpenSource Software
Type of Software
Propitiatory Software Purchase Software
Freeware / Shareware Free to use Feature limit or time limit (Shareware)
OpenSource Software Free to use
Free of charge / Freedom to use Open source code
Standard Organization
ISO (international Organization for Standardization)
ISO9000 ISO14000
IEEE (Institute of Electrical and Electronics Engineers)
Lan standard 802.xx 802.3 Ethernet Lan 802.11 Wireless Lan
Business execution organization
CEO (Chief Executive Officer) The “CEO” is responsible for management as the
company’s representative. COO (Chief Operating Officer)
Under the CEO, the “COO” is responsible for business operation.
CIO (Chief Information Officer) The “CIO” has the highest responsibility concerning
information. CFO (Chief Financial Officer)
The “CFO” is responsible for financial affairs such as procurement of funds and financial administration.
Tech use in Business
POS – 7Eleven IC chip – Credit Card RFID – MRT Electronic money – Smart Purse GPS – Tracking System
E-Business
Electronic commerce (EC) commercial activities using networks with only a
small amount of investment by cutting the costs associated.
Type of EC CtoC – Customer to Customer BtoC - Business to Customer BtoB – Business to Business
Typical Modeling
E-R Diagram relationship between data using “entities” and
“relationships.” Entities and relationships have several characteristics called “attributes.”
Data Flow Diagram (DFD) The flow of operations as a flow of data
Unified Model Language (UML) visual language for modeling that standardizes the
conceptual components used in the development and specification decision stage
groupware
Groupware to operation in business E-Mail Bulletin Board System (BBS) also web board Video Conferencing Chat Weblog - also know as Blog Social Network Service (SNS)
Software Development models
Typical Model Waterfall model Spiral model Prototyping model
New Method Agile method
Xtream Programming (XP) Pair Programming Scrum
Agile method
Agile is a group of software development methodologies
It promotes adaptive planning, evolutionary development and delivery; time boxed iterative approach and encourages rapid and flexible response to change
Pair Programming
agile software development technique in which two programmers work together at one workstation
Programmers being like as the pilot and copilot on an air plane
1+1 > 2
Xtreme Programming
Light-Weighted Methodology Focus on development stage Dev & change by user comment
IT Service management
ITIL - framework of know-how, best approaches, best practices, etc. designed to create a successful business utilizing IT services.
ITIL is “de facto standard” of IT service management.
Basic theory
numeral system base 2 (Binary) 0,1 base 8 (Octal) 0,1,2,3,4,5,6,7 base 10 (Decimal) 0,1,2,3,4,5,6,7,8,9 base 16 (Hexadecimal)
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
Convert numerical base
Base 10 → Base 2 346 = 256+64+16+8
Binary = 101011010
512 256 128 64 32 16 8 4 2 1
1 1 1 1 1
Convert numerical base
Base 2 → Base 8 Binary = 101011010 Split 3 digit = 101 011 010 Octal = 532
Base 2 → Base 16 Binary = 101011010 Split 4 digit = 1 0101 1010 Hexadecimal = 15A
Computer Units
A “bit” is the smallest unit of data which can be handled by a computer (written as 'bit' or 'b')
Units 8bit = 1Byte 1024Byte = 1KiloByte(KB) 1024KB = 1MegaByte(MB) 1024MB = 1GigaByte(GB) 1024GB = 1TeraByte (TB) 1024TB = 1PetaByte(PB)
Character Set Encoding
ASCII – ANSI character standard Use 7bit for each alphanumeric, character and
symbol and 1bit for parity bit
TIS620 – Thai character set Standard Unicode – ISO Code standard
Use for multi-language code 2 – 3 Bytes per 1character
Flow chart & Pseudo code
Flowchart Pseudo code
start;input time;if time <= 16 then
echo “He is in school”;else if time => 19 then
echo “He is at home”;elseecho “He is in Playground”;
stop;
Programming
Programming Machine code Assembly C, C++, Delphi, Basic,
Cobol, Fortan JAVA, .net,
python,PHP SQL HTML , XML
Type of Compiler Compiler
C , C++ Interpreter
PHP, ASP, Python , ruby
just-in-time compilerJAVA , .net
Language processor
Compiler Compile from Source code to binary program Compile all source and warning errors
Interpretor Compile Source to binary line by line Stop compile when it's errors
Language processor
JIT Compiler Compile source to p-code (portable code) like as
java call “byte code” Interprete by p-code by VM on each platform like as
JVM or .net runtime
Markup Language
Markup Language used to write logical structures in text by means of tags. A “logical structure” affects textual and graphical layout, character appearance (written format), and other elements. Through the use of tags, they embed control characters into text to express information related to details such as layout, character embellishment, and hyperlinks. Two typical examples of markup languages are “HTML” and “XML.”
CPU
Clock frequency Cyclical signals to coordinate the timing of
operation clock frequency is indicated in “Hz (Hertz)”
Bus width Internal bus
path of transmission used to exchange data inside CPU
External bus (Front Side Bus) Path to connect and exchange with external
device such as VGA, PCI Device
CPU Type
Type of CPU CISC – Complex Instruction Set Computer
Also call x86 Architecture Intel , AMD
RISC – Reduce Instruction Set Computer
Sun Spark IBM Power ARM Processor
Memory
device that is used to store programs and data required for processing in the operation of a computer
Also referred to as “main memory”
ROM – Read Only Memory
Non – volatile memory Most used as Read-only memory
(ROM,EPROM) Computer Bios Embedded systems Mobile ROM
Use as storage data like as Flash memory(EEPROM)
Compact Flash , SD/MMC, Memory Stick Flash Drive, Solid State Device (SSD)
RAM – Random Access Memory
Volatile memory Use for main memory or cache Type of RAM
Static RAM – CPU cache Dynamic RAM – DDR2, DDR3 RAM
Optical Disc
CD Rom / CD-RW DVD Rom / Combo Drive(DVD Rom+CD-RW)
650-700 MB
DVD-RAM, DVD±RW 4.7 GB (single layer) or 8.5 GB (dual layer)
Blu-ray Drive 25 GB (single layer) or 50 GB (dual layer)
Computer Interface
Connected RS-323C – Serial port 25/9 pin USB port IEEE1394 / Firewire / i.link SCSI SAS ATA SATA
Image input device
Scanner Image OCR (Optical Character Reader) OMR (Optical Mark Reader)
Barcode Reader Digital Camera
Image QR Code
Other input device
Sound input device Microphone
Handwriting character input device Pen mouse
Magnetic card reader IC Chip card reader
Processing method
Interactive Game Word Processor
Batch Report profit to Center
Real-time ATM Reserve ticket
Operating System
OS is Software to communicate from user and machine
OS is a system software. OS working
Memory Management Resource Management File Management User Management Task Management
Operating System
Desktop MS-Dos Windows family (7/vista/xp/me/98/95) OSX (MacOS) Linux (Ubuntu, Fedora)
Server Unix (FreeBSD, Solaris, HP-UX) Linux (Redhat, Slackware, SuSe) Windows Server family(2008,2003,2000)
Open Source Software
OSS is an software Free of charge Freedom to use
Open Source have a license GPL Apache
OSS Software
OS – Ubuntu, Fedora Web Browser – Firefox Office – OpenOffice, Libre Office E-mail client – Thunderbird Image Edit – Gimp Web Server – Apache Ftp – filezilla Chat - pidgin
Multimedia
Image Jpg , png , tiff ,raw file
Video mpg, mpeg2,
mp4,divx, wmv,flv, mov,mkv
Audio mp3, wma,
aac,m4a,flac
Compression data Zip Rar tar tar.gz tar.bz2
Network
Network is a form of using multiple computers by connecting
Network used for Sharing resource
Data Storage Device Printer
Exchange information Data , Video, chat, email
Internet Protocol (IP)
“IP” is a protocol that corresponds to the network layer (Layer 3) in the OSI model. Common functions of IP are “addressing” and “routing.”
IP Address
IP Address
Public IP is IP assign by internic (THNIC in thailand) use to connect to internet
Private IP is IP reserve for use for local. Such as LAN in company.
Subnet is a prefix to separate Network and Host number for IP
Class A 255.0.0.0 Class B 255.255.0.0 Class C 255.255.255.0
IP Range
Public IP Class A 1.0.0.0 - 127.255.255.255 Class B 128.0.0.0 - 191.255.255.255 Class C 192.0.0.0 – 223.255.255.255
Private IP Class A 10.0.0.0 - 10.255.255.255 Class B 172.16.0.0 - 172.31.255.255 Class C 192.168.0.0 - 192.168.255.255
Domain Name System
A “domain name” uses a combination of characters to represent an IP address
DNS is a method to mapping between domain name and ip address to connected on internet
Computer Virus
Type of virus infection Boot sector virus Program virus Macro virus
Virus infection from net
Trojan horse Worm Spyware Malware Adware
Encryption
Caesar Codes Caesar Codes is letter substitution
plaintext: CAESARciphertext: PNRFNE
rotation of 13 character