Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Itpe brief

29,505 views

Published on

Published in: Technology, Business
  • Be the first to comment

Itpe brief

  1. 1. ITPE Information Briefing
  2. 2. IT Passport Examination (ITPE) IT Passport Examination เป การจัดสอบ ็น โดยความร่วมมือ ขององค์กรใน ูม าค โดยมป ศ ไท ญ ่ น พ ่า มาเลเซ ภ ิภ ี ระเท ย ่ป ม ี ีย มองโกเลีย ฟ ิป ิ น และเวียดน ซงก่อตั้งเปน Information ิ ล ป ส์ าม ึ่ ็ Technology Professionals Examination Council (ITPEC) ใน การผลักดัน ้มการจัดสอบ ให ี มาตรฐาน ชาชีพ ่ีไม ิง วิ ท ่อ ผลิตภ ฑ ห ป ท อมรับ ระดับ ูมภ โดยให น ยงาน แต่ละ ัณ ์ใ ้เ ็ น ่ย ี ใน ภ ิ าค ้ห ่ ว ใน ป ศน รับ ิดชอบ ดสอบ ายใน ระเท โดยจะสอบ วัน ระเท ้ัน ผ การจั ภ ป ศ ใน เดียวกัน ้ังห และเปน อสอบ ดเดียวกัน ้ังห ้ัง 7 ป ศ ท มด ็ ข้ ช่ ท มดท ระเท
  3. 3. ITPE Configuration of the Examination Exam Duration : 165 min 100 Question  88 short question  12 medium question ( 3 question consisting of 4 sub-questions each) Pass Criteria  Total Point 60 % or higher  Point in each field 30% or higher
  4. 4. Scope of ITPE information Strategy (35%)  Technology (40%)  Corporate and Legal  Basic Theory  Management Strategy  Computer System  System Strategy  Technical Element Management (25%)  Human Interfaces  Development  Multimedia Technique  Databases  Project Management  Networks &  Service Management Security
  5. 5. STRATEGY
  6. 6. Corporate Activities Corporate Philosophy Corporate Objective  medium or long-term goal Corporate Social Responsibility (CSR)
  7. 7. Management Resource Management resources within the context of business management refer to  People - Human Resource  Materials - assets  Money - Finances  Information – Information Management
  8. 8. Business Management “PDCA” (Plan, Do, Check, Act) cycle is a fundamental approach for business management that involves the execution of a four-step cycle to continuously improve product quality and work.
  9. 9. Organizational structure Function Organization Hierarchical Organization Project Organization Division Organization
  10. 10. Operation Various kinds of charts and diagrams are used to analyse,solve, and improve work issues. Matrix Diagram Matrix Data Analysis Grantt chart
  11. 11. Operation – Z graph
  12. 12. Operation – chart and diagram Arrow Diagram / PERT Chart Radar Chart Scatter diagram
  13. 13. Operation – chart and diagram Pie chart Line Chart
  14. 14. Legal Affairs Rights - Rights to protect the use & ownership  Copyright – rule for protection authors work from publication  Trademark – protect company logo & product name  Patent - Methodology to creation something
  15. 15. Software License Software License - The right to use software, and is granted by the software maker to the purchaser Software is protected under the Copyright Act.  License Agreement – Agreement to using software Type of Software License  Propitiatory Software  Freeware / Shareware  OpenSource Software
  16. 16. Type of Software Propitiatory Software  Purchase Software Freeware / Shareware  Free to use  Feature limit or time limit (Shareware) OpenSource Software  Free to use  Free of charge / Freedom to use  Open source code
  17. 17. Standard Organization ISO (international Organization for Standardization)  ISO9000  ISO14000 IEEE (Institute of Electrical and Electronics Engineers)  Lan standard 802.xx  802.3 Ethernet Lan  802.11 Wireless Lan
  18. 18. Barcode 3D Barcode / QR Code
  19. 19. SWOT Analysis Analyse Strengths, Weaknesses, Opportunities, Threats
  20. 20. PPM (Product Portfolio Management)
  21. 21. Business execution organization CEO (Chief Executive Officer)  The “CEO” is responsible for management as the company’s representative. COO (Chief Operating Officer)  Under the CEO, the “COO” is responsible for business operation. CIO (Chief Information Officer)  The “CIO” has the highest responsibility concerning information. CFO (Chief Financial Officer)  The “CFO” is responsible for financial affairs such as procurement of funds and financial administration.
  22. 22. M&A (Mergers and Acquisitions)
  23. 23. Tech use in Business POS – 7Eleven IC chip – Credit Card RFID – MRT Electronic money – Smart Purse GPS – Tracking System
  24. 24. E-Business Electronic commerce (EC)  commercial activities using networks with only a small amount of investment by cutting the costs associated. Type of EC  CtoC – Customer to Customer  BtoC - Business to Customer  BtoB – Business to Business
  25. 25. Typical Modeling E-R Diagram  relationship between data using “entities” and “relationships.” Entities and relationships have several characteristics called “attributes.” Data Flow Diagram (DFD)  The flow of operations as a flow of data Unified Model Language (UML)  visual language for modeling that standardizes the conceptual components used in the development and specification decision stage
  26. 26. E-R Diagram
  27. 27. Data Flow Diagram
  28. 28. groupware Groupware to operation in business  E-Mail  Bulletin Board System (BBS) also web board  Video Conferencing  Chat  Weblog - also know as Blog  Social Network Service (SNS)
  29. 29. Management
  30. 30. Software Development Life Cycle
  31. 31. System Design
  32. 32. Development Programing / Coding Unit testing / White box test
  33. 33. Testing Testing is a process for confirming program and system quality.
  34. 34. Software Development models Typical Model  Waterfall model  Spiral model  Prototyping model New Method  Agile method  Xtream Programming (XP)  Pair Programming  Scrum
  35. 35. Waterfall model
  36. 36. Spiral model
  37. 37. Prototyping model
  38. 38. Agile method Agile is a group of software development methodologies It promotes adaptive planning, evolutionary development and delivery; time boxed iterative approach and encourages rapid and flexible response to change
  39. 39. Pair Programming agile software development technique in which two programmers work together at one workstation Programmers being like as the pilot and copilot on an air plane 1+1 > 2
  40. 40. Xtreme Programming Light-Weighted Methodology Focus on development stage Dev & change by user comment
  41. 41. Scrum
  42. 42. Project management Project manager organize and managing resources to achieve specific goals
  43. 43. IT Service management ITIL - framework of know-how, best approaches, best practices, etc. designed to create a successful business utilizing IT services. ITIL is “de facto standard” of IT service management.
  44. 44. Technology
  45. 45. Basic theory numeral system  base 2 (Binary) 0,1  base 8 (Octal) 0,1,2,3,4,5,6,7  base 10 (Decimal) 0,1,2,3,4,5,6,7,8,9  base 16 (Hexadecimal) 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
  46. 46. Convert numerical base Base 10 → Base 2  346 = 256+64+16+8 512 256 128 64 32 16 8 4 2 1 1 1 1 1 1  Binary = 101011010
  47. 47. Convert numerical base Base 2 → Base 8  Binary = 101011010  Split 3 digit = 101 011 010  Octal = 532 Base 2 → Base 16  Binary = 101011010  Split 4 digit = 1 0101 1010  Hexadecimal = 15A
  48. 48. Logic Expression
  49. 49. Computer Units A “bit” is the smallest unit of data which can be handled by a computer (written as bit or b) Units  8bit = 1Byte  1024Byte = 1KiloByte(KB)  1024KB = 1MegaByte(MB)  1024MB = 1GigaByte(GB)  1024GB = 1TeraByte (TB)  1024TB = 1PetaByte(PB)
  50. 50. Computer Units Time units
  51. 51. Analog / Digital Analog  Digital
  52. 52. A/D Conversion 1. Sampling  3. Encoding 2.Quantization  4. Coded to Digital
  53. 53. Character Set Encoding ASCII – ANSI character standard  Use 7bit for each alphanumeric, character and symbol and 1bit for parity bit TIS620 – Thai character set Standard Unicode – ISO Code standard  Use for multi-language code  2 – 3 Bytes per 1character
  54. 54. Character Set
  55. 55. Data Structure Variable  Temporaly to store data  X = 10 + 1; X is a temp to store 10+1
  56. 56. Data Structure Arrays
  57. 57. Linked Lists
  58. 58. Stack / Queues Stack  LIFO  Push n Pop Queues  FIFO  Enqueue n Dequeue
  59. 59. Flow chart Flowchart  Flowchart symbol
  60. 60. Flow chart & Pseudo code Flowchart  Pseudo code start; input time; if time <= 16 then echo “He is in school”; else if time => 19 then echo “He is at home”; else echo “He is in Playground”; stop;
  61. 61. Programming Programming  Type of Compiler  Machine code  Compiler  Assembly C , C++  C, C++, Delphi, Basic,  Interpreter Cobol, Fortan PHP, ASP, Python , ruby  JAVA, .net, python,PHP  just-in-time compiler JAVA , .net  SQL  HTML , XML
  62. 62. Language processor Compiler  Compile from Source code to binary program  Compile all source and warning errors Interpretor  Compile Source to binary line by line  Stop compile when its errors
  63. 63. Language processor JIT Compiler  Compile source to p-code (portable code) like as java call “byte code”  Interprete by p-code by VM on each platform like as JVM or .net runtime
  64. 64. Markup Language Markup Language used to write logical structures in text by means of tags. A “logical structure” affects textual and graphical layout, character appearance (written format), and other elements. Through the use of tags, they embed control characters into text to express information related to details such as layout, character embellishment, and hyperlinks. Two typical examples of markup languages are “HTML” and “XML.”
  65. 65. HTML
  66. 66. Computer Component
  67. 67. CPU Clock frequency  Cyclical signals to coordinate the timing of operation  clock frequency is indicated in “Hz (Hertz)” Bus width  Internal bus  path of transmission used to exchange data inside CPU  External bus (Front Side Bus)  Path to connect and exchange with external device such as VGA, PCI Device
  68. 68. CPU Type Type of CPU  CISC – Complex Instruction Set Computer  Also call x86 Architecture  Intel , AMD  RISC – Reduce Instruction Set Computer  Sun Spark  IBM Power  ARM Processor
  69. 69. Memory device that is used to store programs and data required for processing in the operation of a computer Also referred to as “main memory”
  70. 70. ROM – Read Only Memory Non – volatile memory Most used as Read-only memory (ROM,EPROM)  Computer Bios  Embedded systems  Mobile ROM Use as storage data like as Flash memory(EEPROM)  Compact Flash , SD/MMC, Memory Stick  Flash Drive, Solid State Device (SSD)
  71. 71. RAM – Random Access Memory Volatile memory Use for main memory or cache Type of RAM  Static RAM – CPU cache  Dynamic RAM – DDR2, DDR3 RAM
  72. 72. Cache memory
  73. 73. Storage Media
  74. 74. Harddisk / Floppy disk
  75. 75. Optical Disc CD Rom / CD-RW DVD Rom / Combo Drive(DVD Rom+CD-RW)  650-700 MB DVD-RAM, DVD±RW  4.7 GB (single layer) or 8.5 GB (dual layer) Blu-ray Drive  25 GB (single layer) or 50 GB (dual layer)
  76. 76. Flash Memory
  77. 77. Computer Interface Connected  RS-323C – Serial port 25/9 pin  USB port  IEEE1394 / Firewire / i.link  SCSI  SAS  ATA  SATA
  78. 78. Input Device Keyboard Mouse Trackball Touchpad Pointing stick Digitizer Touch panel
  79. 79. Image input device Scanner  Image  OCR (Optical Character Reader)  OMR (Optical Mark Reader) Barcode Reader Digital Camera  Image  QR Code
  80. 80. Other input device Sound input device  Microphone Handwriting character input device  Pen mouse Magnetic card reader IC Chip card reader
  81. 81. Output Device Display  CRT  LCD/LED  OLED Printer  Inkjet  Laser  Dot Matrix  Themal transfer
  82. 82. Wireless Interface IrDA – infrared communication Bluetooth Wifi / Wireless Lan HSPA / 3G
  83. 83. Type of PC Desktop  Tower  All in one Mobility  Laptop / Notebook  Netbook  Tablet  Phone Device
  84. 84. Processing Model Centralized  Distributed
  85. 85. Processing method Interactive  Real-time  Game  ATM  Word Processor  Reserve ticket Batch  Report profit to Center
  86. 86. Operating System OS is Software to communicate from user and machine OS is a system software. OS working  Memory Management  Resource Management  File Management  User Management  Task Management
  87. 87. Operating System
  88. 88. Operating System Desktop  MS-Dos  Windows family (7/vista/xp/me/98/95)  OSX (MacOS)  Linux (Ubuntu, Fedora) Server  Unix (FreeBSD, Solaris, HP-UX)  Linux (Redhat, Slackware, SuSe)  Windows Server family(2008,2003,2000)
  89. 89. Open Source Software OSS is an software  Free of charge  Freedom to use Open Source have a license  GPL  Apache
  90. 90. Free of OSS Fredom to use OSS
  91. 91. OSS Software OS – Ubuntu, Fedora Web Browser – Firefox Office – OpenOffice, Libre Office E-mail client – Thunderbird Image Edit – Gimp Web Server – Apache Ftp – filezilla Chat - pidgin
  92. 92. Multimedia Image  Compression data  Jpg , png , tiff ,raw file  Zip Video  Rar  mpg, mpeg2,  tar mp4,divx, wmv,flv,  tar.gz mov,mkv  tar.bz2 Audio  mp3, wma, aac,m4a,flac
  93. 93. Color represent
  94. 94. Network Network is a form of using multiple computers by connecting Network used for  Sharing resource  Data  Storage Device  Printer  Exchange information  Data , Video, chat, email
  95. 95. Network topology
  96. 96. Type of Network Local Area Network  Internet Wide Area Network
  97. 97. NetworkOSI TCP/IPModel Model
  98. 98. Service port HTTP Port 80 FTP Port 21 SSH Port 22 SMTP Port 25 MySQL Port 3306
  99. 99. Network Device Ethernet Card / Lan  Wireless lan card Card /Wifi card
  100. 100. Network Device Hub / Switch
  101. 101. Network Device Router
  102. 102. Internet Communication Line
  103. 103. Internet Protocol (IP) “IP” is a protocol that corresponds to the network layer (Layer 3) in the OSI model. Common functions of IP are “addressing” and “routing.” IP Address
  104. 104. IP Address Public IP is IP assign by internic (THNIC in thailand) use to connect to internet Private IP is IP reserve for use for local. Such as LAN in company. Subnet is a prefix to separate Network and Host number for IP  Class A 255.0.0.0  Class B 255.255.0.0  Class C 255.255.255.0
  105. 105. IP Range Public IP  Class A 1.0.0.0 - 127.255.255.255  Class B 128.0.0.0 - 191.255.255.255  Class C 192.0.0.0 – 223.255.255.255 Private IP  Class A 10.0.0.0 - 10.255.255.255  Class B 172.16.0.0 - 172.31.255.255  Class C 192.168.0.0 - 192.168.255.255
  106. 106. Domain Name System A “domain name” uses a combination of characters to represent an IP address DNS is a method to mapping between domain name and ip address to connected on internet
  107. 107. DDOsAttacking Port scan Password crack Stepping stone / Zombie machine Dos Attack / Email bomb
  108. 108. Computer Virus Type of virus infection  Virus infection from  Boot sector virus net  Program virus  Trojan horse  Macro virus  Worm  Spyware  Malware  Adware
  109. 109. Encryption
  110. 110. Encryption Caesar Codes  Caesar Codes is letter substitution plaintext: CAESAR ciphertext: PNRFNE rotation of 13 character
  111. 111. Asymetric encryption
  112. 112. Digital Signature
  113. 113. Authentication Traditional authentication  UserID / Password Biometric authentication  Fingerprint  Vein  Face  Retina/Iris

×