SlideShare ist ein Scribd-Unternehmen logo
1 von 113
Downloaden Sie, um offline zu lesen
ITPE Information
    Briefing
IT Passport Examination (ITPE)

   IT Passport Examination เป การจัดสอบ   ็น           โดยความร่วมมือ
    ขององค์กรใน ูม าค โดยมป ศ ไท ญ ่ น พ ่า มาเลเซ
                   ภ ิภ         ี ระเท ย ่ป ม  ี               ีย
    มองโกเลีย ฟ ิป ิ น และเวียดน ซงก่อตั้งเปน Information
                 ิ ล ป ส์            าม ึ่       ็
    Technology Professionals Examination Council
    (ITPEC) ใน       การผลักดัน ้มการจัดสอบ
                                ให ี          มาตรฐาน ชาชีพ ่ีไม ิง
                                                        วิ    ท ่อ
    ผลิตภ ฑ ห ป ท อมรับ ระดับ ูมภ โดยให น ยงาน แต่ละ
          ัณ ์ใ ้เ ็ น ่ย
                        ี    ใน ภ ิ าค             ้ห ่ ว    ใน
    ป ศน รับ ิดชอบ ดสอบ ายใน ระเท โดยจะสอบ วัน
      ระเท ้ัน ผ          การจั       ภ ป ศ                   ใน
    เดียวกัน ้ังห และเปน อสอบ ดเดียวกัน ้ังห ้ัง 7 ป ศ
            ท มด           ็ ข้      ช่       ท มดท          ระเท
ITPE Configuration of the Examination

   Exam Duration : 165 min
   100 Question
       88 short question
       12 medium question ( 3 question consisting of 4
        sub-questions each)
   Pass Criteria
       Total Point           60 % or higher
       Point in each field   30% or higher
Scope of ITPE information

   Strategy (35%)               Technology (40%)
       Corporate and Legal          Basic Theory
       Management Strategy          Computer System
       System Strategy              Technical Element
   Management (25%)                            Human
                                                  Interfaces
       Development                             Multimedia
        Technique                               Databases
       Project Management                      Networks &
       Service Management                        Security
STRATEGY
Corporate Activities

   Corporate Philosophy
   Corporate Objective
       medium or long-term goal
   Corporate Social Responsibility (CSR)
Management Resource

   Management resources within the context of
    business management refer to
       People - Human Resource
       Materials - assets
       Money - Finances
       Information – Information Management
Business Management

   “PDCA” (Plan, Do, Check, Act) cycle is a
    fundamental approach for business
    management that involves the execution of a
    four-step cycle to continuously improve product
    quality and work.
Organizational structure




  Function Organization
                          Hierarchical Organization




   Project Organization     Division Organization
Operation

   Various kinds of charts and diagrams are used
    to analyse,solve, and improve work issues.



           Matrix Diagram




                              Matrix Data Analysis
       Grantt chart
Operation – Z graph
Operation – chart and diagram




  Arrow Diagram / PERT Chart




                               Radar Chart

       Scatter diagram
Operation – chart and diagram




      Pie chart



                          Line Chart
Legal Affairs

   Rights - Rights to protect the use & ownership
       Copyright – rule for protection author's work from
        publication
       Trademark – protect company logo & product name
       Patent - Methodology to creation something
Software License

   Software License - The right to use software,
    and is granted by the software maker to the
    purchaser
   Software is protected under the Copyright Act.
       License Agreement – Agreement to using software
   Type of Software License
       Propitiatory Software
       Freeware / Shareware
       OpenSource Software
Type of Software

   Propitiatory Software
       Purchase Software
   Freeware / Shareware
       Free to use
       Feature limit or time limit (Shareware)
   OpenSource Software
       Free to use
                   Free of charge / Freedom to use
       Open source code
Standard Organization

   ISO (international Organization for
    Standardization)
       ISO9000
       ISO14000
   IEEE (Institute of Electrical and Electronics
    Engineers)
       Lan standard 802.xx
                  802.3    Ethernet Lan
                  802.11   Wireless Lan
Barcode




          3D Barcode / QR Code
SWOT Analysis

   Analyse Strengths, Weaknesses, Opportunities,
    Threats
PPM (Product Portfolio Management)
Business execution organization

   CEO (Chief Executive Officer)
       The “CEO” is responsible for management as the
        company’s representative.
   COO (Chief Operating Officer)
       Under the CEO, the “COO” is responsible for business
        operation.
   CIO (Chief Information Officer)
       The “CIO” has the highest responsibility concerning
        information.
   CFO (Chief Financial Officer)
       The “CFO” is responsible for financial affairs such as
        procurement of funds and financial administration.
M&A (Mergers and Acquisitions)
Tech use in Business

   POS – 7Eleven
   IC chip – Credit Card
   RFID – MRT
   Electronic money – Smart Purse
   GPS – Tracking System
E-Business

   Electronic commerce (EC)
       commercial activities using networks with only a
        small amount of investment by cutting the costs
        associated.
   Type of EC
       CtoC – Customer to Customer
       BtoC - Business to Customer
       BtoB – Business to Business
Typical Modeling

   E-R Diagram
       relationship between data using “entities” and
        “relationships.” Entities and relationships have
        several characteristics called “attributes.”
   Data Flow Diagram (DFD)
       The flow of operations as a flow of data
   Unified Model Language (UML)
       visual language for modeling that standardizes the
        conceptual components used in the development
        and specification decision stage
E-R Diagram
Data Flow Diagram
groupware

   Groupware to operation in business
       E-Mail
       Bulletin Board System (BBS) also web board
       Video Conferencing
       Chat
       Weblog - also know as Blog
       Social Network Service (SNS)
Management
Software Development Life Cycle
System Design
Development

   Programing / Coding
   Unit testing / White box test
Testing

   Testing is a process
    for confirming
    program and system
    quality.

Software Development models

   Typical Model
       Waterfall model
       Spiral model
       Prototyping model
   New Method
       Agile method
                  Xtream Programming (XP)
                  Pair Programming
                  Scrum
Waterfall model
Spiral model
Prototyping model
Agile method

   Agile is a group of
    software development
    methodologies
   It promotes adaptive
    planning, evolutionary
    development and
    delivery; time boxed
    iterative approach
    and encourages rapid
    and flexible response
    to change
Pair Programming

   agile software development technique in which
    two programmers work together at one
    workstation
   Programmers being like as the pilot and copilot
    on an air plane
   1+1 > 2
Xtreme Programming

   Light-Weighted Methodology
   Focus on development stage
   Dev & change by user comment
Scrum
Project management

   Project manager organize and managing
    resources to achieve specific goals
IT Service management

   ITIL - framework of know-how, best
    approaches, best practices, etc. designed to
    create a successful business utilizing IT
    services.
   ITIL is “de facto standard” of IT service
    management.
Technology
Basic theory

   numeral system
       base 2 (Binary)       0,1
       base 8 (Octal)        0,1,2,3,4,5,6,7
       base 10 (Decimal)     0,1,2,3,4,5,6,7,8,9
       base 16 (Hexadecimal)
                            0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
Convert numerical base

    Base 10 → Base 2
             346 = 256+64+16+8

    512        256   128   64   32   16   8   4   2   1

                1          1         1    1       1



             Binary = 101011010
Convert numerical base

   Base 2 → Base 8
       Binary = 101011010
       Split 3 digit = 101 011 010
       Octal = 532
   Base 2 → Base 16
       Binary = 101011010
       Split 4 digit = 1 0101 1010
       Hexadecimal = 15A
Logic Expression
Computer Units

   A “bit” is the smallest unit of data which can be
    handled by a computer (written as 'bit' or 'b')
   Units
       8bit      = 1Byte
       1024Byte = 1KiloByte(KB)
       1024KB    = 1MegaByte(MB)
       1024MB    = 1GigaByte(GB)
       1024GB    = 1TeraByte (TB)
       1024TB    = 1PetaByte(PB)
Computer Units

   Time units
Analog / Digital

   Analog            Digital
A/D Conversion

   1. Sampling         3. Encoding




   2.Quantization      4. Coded to Digital
Character Set Encoding

   ASCII – ANSI character standard
       Use 7bit for each alphanumeric, character and
        symbol and 1bit for parity bit
   TIS620 – Thai character set Standard
   Unicode – ISO Code standard
       Use for multi-language code
       2 – 3 Bytes per 1character
Character Set
Data Structure

   Variable
       Temporaly to store data
       X = 10 + 1;   X is a temp to store 10+1
Data Structure

   Arrays
Linked Lists
Stack / Queues

   Stack
       LIFO
       Push n' Pop

   Queues
       FIFO
       Enqueue n' Dequeue
Flow chart

   Flowchart      Flowchart symbol
Flow chart & Pseudo code

   Flowchart         Pseudo code

                       start;
                           input time;
                           if time <= 16 then
                                 echo “He is in school”;
                           else
                           if time => 19 then
                                 echo “He is at home”;
                                 else
                                 echo “He is in Playground”;
                       stop;
Programming

   Programming                     Type of Compiler
       Machine code                    Compiler
       Assembly                             C , C++
       C, C++, Delphi, Basic,
                                        Interpreter
        Cobol, Fortan                          PHP, ASP,
                                         Python , ruby
       JAVA, .net,
        python,PHP
                                        just-in-time compiler
                                                   JAVA , .net
       SQL
       HTML , XML
Language processor

   Compiler
       Compile from Source code to binary program
       Compile all source and warning errors
   Interpretor
       Compile Source to binary line by line
       Stop compile when it's errors
Language processor

   JIT Compiler
       Compile source to p-code (portable code) like as
        java call “byte code”
       Interprete by p-code by VM on each platform like as
        JVM or .net runtime
Markup Language

   Markup Language used to write logical
    structures in text by means of tags. A “logical
    structure” affects textual and graphical layout,
    character appearance (written format), and
    other elements. Through the use of tags, they
    embed control characters into text to express
    information related to details such as layout,
    character embellishment, and hyperlinks. Two
    typical examples of markup languages are
    “HTML” and “XML.”
HTML
Computer Component
CPU

   Clock frequency
       Cyclical signals to coordinate the timing of
        operation
       clock frequency is indicated in “Hz (Hertz)”
   Bus width
       Internal bus
                   path of transmission used to exchange data
                     inside CPU
       External bus (Front Side Bus)
                   Path to connect and exchange with external
                     device such as VGA, PCI Device
CPU Type

   Type of CPU
       CISC – Complex Instruction Set Computer
                  Also call x86 Architecture
                  Intel , AMD

       RISC – Reduce Instruction Set Computer
                  Sun Spark
                  IBM Power
                  ARM Processor
Memory

   device that is used to store programs and data
    required for processing in the operation of a
    computer
   Also referred to as “main memory”
ROM – Read Only Memory

   Non – volatile memory
   Most used as Read-only memory
    (ROM,EPROM)
       Computer Bios
       Embedded systems
       Mobile ROM
   Use as storage data like as Flash
    memory(EEPROM)
       Compact Flash , SD/MMC, Memory Stick
       Flash Drive, Solid State Device (SSD)
RAM – Random Access Memory

   Volatile memory
   Use for main memory or cache
   Type of RAM
       Static RAM – CPU cache
       Dynamic RAM – DDR2, DDR3 RAM
Cache memory
Storage Media
Harddisk / Floppy disk
Optical Disc

   CD Rom / CD-RW
   DVD Rom / Combo Drive(DVD Rom+CD-RW)
       650-700 MB
   DVD-RAM, DVD±RW
       4.7 GB (single layer) or 8.5 GB (dual layer)
   Blu-ray Drive
       25 GB (single layer) or 50 GB (dual layer)
Flash Memory
Computer Interface

   Connected
       RS-323C – Serial port 25/9 pin
       USB port
       IEEE1394 / Firewire / i.link
       SCSI
       SAS
       ATA
       SATA
Input Device

   Keyboard
   Mouse
   Trackball
   Touchpad
   Pointing stick
   Digitizer
   Touch panel
Image input device

   Scanner
       Image
       OCR (Optical Character Reader)
       OMR (Optical Mark Reader)
   Barcode Reader
   Digital Camera
       Image
       QR Code
Other input device

   Sound input device
       Microphone
   Handwriting character input device
       Pen mouse
   Magnetic card reader
   IC Chip card reader
Output Device

   Display
       CRT
       LCD/LED
       OLED
   Printer
       Inkjet
       Laser
       Dot Matrix
       Themal transfer
Wireless Interface

   IrDA – infrared communication
   Bluetooth
   Wifi / Wireless Lan
   HSPA / 3G
Type of PC

 Desktop
     Tower
     All in one
 Mobility
     Laptop / Notebook
     Netbook
     Tablet
     Phone Device
Processing Model

   Centralized




                      Distributed
Processing method

   Interactive                      Real-time
       Game                             ATM
       Word Processor                   Reserve ticket



   Batch
       Report profit to Center
Operating System

   OS is Software to communicate from user and
    machine
   OS is a system software.
   OS working
       Memory Management
       Resource Management
       File Management
       User Management
       Task Management
Operating System
Operating System

   Desktop
       MS-Dos
       Windows family (7/vista/xp/me/98/95)
       OSX (MacOS)
       Linux (Ubuntu, Fedora)
   Server
       Unix (FreeBSD, Solaris, HP-UX)
       Linux (Redhat, Slackware, SuSe)
       Windows Server family(2008,2003,2000)
Open Source Software

   OSS is an software
       Free of charge
       Freedom to use
   Open Source have a license
       GPL
       Apache
Free of OSS

   Fredom to use OSS
OSS Software

   OS – Ubuntu, Fedora
   Web Browser – Firefox
   Office – OpenOffice, Libre Office
   E-mail client – Thunderbird
   Image Edit – Gimp
   Web Server – Apache
   Ftp – filezilla
   Chat - pidgin
Multimedia

   Image                               Compression data
       Jpg , png , tiff ,raw file          Zip
   Video                                   Rar
       mpg, mpeg2,                         tar
        mp4,divx, wmv,flv,                  tar.gz
        mov,mkv                             tar.bz2
   Audio
       mp3, wma,
        aac,m4a,flac
Color represent
Network

   Network is a form of using multiple computers
    by connecting
   Network used for
       Sharing resource
                  Data
                  Storage Device
                  Printer
       Exchange information
                  Data , Video, chat, email
Network topology
Type of Network

   Local Area Network      Internet




   Wide Area Network
Network

OSI       TCP/IP
Model     Model
Service port

   HTTP       Port 80
   FTP        Port 21
   SSH        Port 22
   SMTP       Port 25
   MySQL      Port 3306
Network Device

   Ethernet Card / Lan      Wireless lan card
    Card                      /Wifi card
Network Device

   Hub / Switch
Network Device

   Router
Internet Communication Line
Internet Protocol (IP)

   “IP” is a protocol that corresponds to the
    network layer (Layer 3) in the OSI model.
    Common functions of IP are “addressing” and
    “routing.”
   IP Address
IP Address

   Public IP is IP assign by internic (THNIC in
    thailand) use to connect to internet
   Private IP is IP reserve for use for local. Such
    as LAN in company.
   Subnet is a prefix to separate Network and
    Host number for IP
       Class A   255.0.0.0
       Class B   255.255.0.0
       Class C   255.255.255.0
IP Range

   Public IP
       Class A   1.0.0.0 - 127.255.255.255
       Class B   128.0.0.0 - 191.255.255.255
       Class C   192.0.0.0 – 223.255.255.255
   Private IP
       Class A   10.0.0.0 - 10.255.255.255
       Class B   172.16.0.0 - 172.31.255.255
       Class C   192.168.0.0 - 192.168.255.255
Domain Name System

   A “domain name”
    uses a combination of
    characters to
    represent an IP
    address
   DNS is a method to
    mapping between
    domain name and ip
    address to connected
    on internet
DDOsAttacking

   Port scan
   Password crack
   Stepping stone /
    Zombie machine
   Dos Attack / Email
    bomb
Computer Virus

   Type of virus infection      Virus infection from
       Boot sector virus         net
       Program virus                Trojan horse
       Macro virus                  Worm
                                     Spyware
                                     Malware
                                     Adware
Encryption
Encryption

   Caesar Codes
       Caesar Codes is letter substitution

                               plaintext:  CAESAR
                               ciphertext: PNRFNE

                               rotation of 13 character
Asymetric encryption
Digital Signature
Authentication

   Traditional authentication
       UserID / Password
   Biometric authentication
       Fingerprint
       Vein
       Face
       Retina/Iris

Weitere ähnliche Inhalte

Ähnlich wie Itpe brief

ICIC 2013 New Product Introductions CEPT
ICIC 2013 New Product Introductions CEPTICIC 2013 New Product Introductions CEPT
ICIC 2013 New Product Introductions CEPTDr. Haxel Consult
 
Introdution to Dataops and AIOps (or MLOps)
Introdution to Dataops and AIOps (or MLOps)Introdution to Dataops and AIOps (or MLOps)
Introdution to Dataops and AIOps (or MLOps)Adrien Blind
 
How to analyze text data for AI and ML with Named Entity Recognition
How to analyze text data for AI and ML with Named Entity RecognitionHow to analyze text data for AI and ML with Named Entity Recognition
How to analyze text data for AI and ML with Named Entity RecognitionSkyl.ai
 
Generative AI in CSharp with Semantic Kernel.pptx
Generative AI in CSharp with Semantic Kernel.pptxGenerative AI in CSharp with Semantic Kernel.pptx
Generative AI in CSharp with Semantic Kernel.pptxAlon Fliess
 
Information Engineering PPT
Information Engineering PPTInformation Engineering PPT
Information Engineering PPTMaria Elloso
 
Top 10 Most Demand IT Certifications Course in 2020 - MildainTrainings
Top 10 Most Demand IT Certifications Course in 2020 - MildainTrainingsTop 10 Most Demand IT Certifications Course in 2020 - MildainTrainings
Top 10 Most Demand IT Certifications Course in 2020 - MildainTrainingsMildain Solutions
 
MLOps - Build pipelines with Tensor Flow Extended & Kubeflow
MLOps - Build pipelines with Tensor Flow Extended & KubeflowMLOps - Build pipelines with Tensor Flow Extended & Kubeflow
MLOps - Build pipelines with Tensor Flow Extended & KubeflowJan Kirenz
 
Aspect Oriented Software Development
Aspect Oriented Software DevelopmentAspect Oriented Software Development
Aspect Oriented Software DevelopmentJignesh Patel
 
Hrms industrial training report
Hrms industrial training reportHrms industrial training report
Hrms industrial training reportNitesh Dubey
 
Anup_Kumar_Saha's_resume
Anup_Kumar_Saha's_resumeAnup_Kumar_Saha's_resume
Anup_Kumar_Saha's_resumeAnup Kumar Saha
 
3 Software Estmation.ppt
3 Software Estmation.ppt3 Software Estmation.ppt
3 Software Estmation.pptSoham De
 
Data Workflows for Machine Learning - SF Bay Area ML
Data Workflows for Machine Learning - SF Bay Area MLData Workflows for Machine Learning - SF Bay Area ML
Data Workflows for Machine Learning - SF Bay Area MLPaco Nathan
 
Data Workflows for Machine Learning - Seattle DAML
Data Workflows for Machine Learning - Seattle DAMLData Workflows for Machine Learning - Seattle DAML
Data Workflows for Machine Learning - Seattle DAMLPaco Nathan
 
Agile Testing Days 2017 Intoducing AgileBI Sustainably - Excercises
Agile Testing Days 2017 Intoducing AgileBI Sustainably - ExcercisesAgile Testing Days 2017 Intoducing AgileBI Sustainably - Excercises
Agile Testing Days 2017 Intoducing AgileBI Sustainably - ExcercisesRaphael Branger
 

Ähnlich wie Itpe brief (20)

My CV
My CVMy CV
My CV
 
ICIC 2013 New Product Introductions CEPT
ICIC 2013 New Product Introductions CEPTICIC 2013 New Product Introductions CEPT
ICIC 2013 New Product Introductions CEPT
 
Tarun_Medimi
Tarun_MedimiTarun_Medimi
Tarun_Medimi
 
Introdution to Dataops and AIOps (or MLOps)
Introdution to Dataops and AIOps (or MLOps)Introdution to Dataops and AIOps (or MLOps)
Introdution to Dataops and AIOps (or MLOps)
 
How to analyze text data for AI and ML with Named Entity Recognition
How to analyze text data for AI and ML with Named Entity RecognitionHow to analyze text data for AI and ML with Named Entity Recognition
How to analyze text data for AI and ML with Named Entity Recognition
 
Generative AI in CSharp with Semantic Kernel.pptx
Generative AI in CSharp with Semantic Kernel.pptxGenerative AI in CSharp with Semantic Kernel.pptx
Generative AI in CSharp with Semantic Kernel.pptx
 
Information Engineering PPT
Information Engineering PPTInformation Engineering PPT
Information Engineering PPT
 
CV_DebarpanMukherjee
CV_DebarpanMukherjeeCV_DebarpanMukherjee
CV_DebarpanMukherjee
 
Top 10 Most Demand IT Certifications Course in 2020 - MildainTrainings
Top 10 Most Demand IT Certifications Course in 2020 - MildainTrainingsTop 10 Most Demand IT Certifications Course in 2020 - MildainTrainings
Top 10 Most Demand IT Certifications Course in 2020 - MildainTrainings
 
MLOps - Build pipelines with Tensor Flow Extended & Kubeflow
MLOps - Build pipelines with Tensor Flow Extended & KubeflowMLOps - Build pipelines with Tensor Flow Extended & Kubeflow
MLOps - Build pipelines with Tensor Flow Extended & Kubeflow
 
Aspect Oriented Software Development
Aspect Oriented Software DevelopmentAspect Oriented Software Development
Aspect Oriented Software Development
 
Hrms industrial training report
Hrms industrial training reportHrms industrial training report
Hrms industrial training report
 
Waseem Arfi Personal Profile
Waseem Arfi Personal ProfileWaseem Arfi Personal Profile
Waseem Arfi Personal Profile
 
Consulting
ConsultingConsulting
Consulting
 
Anup_Kumar_Saha's_resume
Anup_Kumar_Saha's_resumeAnup_Kumar_Saha's_resume
Anup_Kumar_Saha's_resume
 
AI at Scale in Enterprises
AI at Scale in Enterprises AI at Scale in Enterprises
AI at Scale in Enterprises
 
3 Software Estmation.ppt
3 Software Estmation.ppt3 Software Estmation.ppt
3 Software Estmation.ppt
 
Data Workflows for Machine Learning - SF Bay Area ML
Data Workflows for Machine Learning - SF Bay Area MLData Workflows for Machine Learning - SF Bay Area ML
Data Workflows for Machine Learning - SF Bay Area ML
 
Data Workflows for Machine Learning - Seattle DAML
Data Workflows for Machine Learning - Seattle DAMLData Workflows for Machine Learning - Seattle DAML
Data Workflows for Machine Learning - Seattle DAML
 
Agile Testing Days 2017 Intoducing AgileBI Sustainably - Excercises
Agile Testing Days 2017 Intoducing AgileBI Sustainably - ExcercisesAgile Testing Days 2017 Intoducing AgileBI Sustainably - Excercises
Agile Testing Days 2017 Intoducing AgileBI Sustainably - Excercises
 

Kürzlich hochgeladen

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Itpe brief

  • 1. ITPE Information Briefing
  • 2. IT Passport Examination (ITPE)  IT Passport Examination เป การจัดสอบ ็น โดยความร่วมมือ ขององค์กรใน ูม าค โดยมป ศ ไท ญ ่ น พ ่า มาเลเซ ภ ิภ ี ระเท ย ่ป ม ี ีย มองโกเลีย ฟ ิป ิ น และเวียดน ซงก่อตั้งเปน Information ิ ล ป ส์ าม ึ่ ็ Technology Professionals Examination Council (ITPEC) ใน การผลักดัน ้มการจัดสอบ ให ี มาตรฐาน ชาชีพ ่ีไม ิง วิ ท ่อ ผลิตภ ฑ ห ป ท อมรับ ระดับ ูมภ โดยให น ยงาน แต่ละ ัณ ์ใ ้เ ็ น ่ย ี ใน ภ ิ าค ้ห ่ ว ใน ป ศน รับ ิดชอบ ดสอบ ายใน ระเท โดยจะสอบ วัน ระเท ้ัน ผ การจั ภ ป ศ ใน เดียวกัน ้ังห และเปน อสอบ ดเดียวกัน ้ังห ้ัง 7 ป ศ ท มด ็ ข้ ช่ ท มดท ระเท
  • 3. ITPE Configuration of the Examination  Exam Duration : 165 min  100 Question  88 short question  12 medium question ( 3 question consisting of 4 sub-questions each)  Pass Criteria  Total Point 60 % or higher  Point in each field 30% or higher
  • 4. Scope of ITPE information  Strategy (35%)  Technology (40%)  Corporate and Legal  Basic Theory  Management Strategy  Computer System  System Strategy  Technical Element  Management (25%)  Human Interfaces  Development  Multimedia Technique  Databases  Project Management  Networks &  Service Management Security
  • 6. Corporate Activities  Corporate Philosophy  Corporate Objective  medium or long-term goal  Corporate Social Responsibility (CSR)
  • 7. Management Resource  Management resources within the context of business management refer to  People - Human Resource  Materials - assets  Money - Finances  Information – Information Management
  • 8. Business Management  “PDCA” (Plan, Do, Check, Act) cycle is a fundamental approach for business management that involves the execution of a four-step cycle to continuously improve product quality and work.
  • 9. Organizational structure Function Organization Hierarchical Organization Project Organization Division Organization
  • 10. Operation  Various kinds of charts and diagrams are used to analyse,solve, and improve work issues. Matrix Diagram Matrix Data Analysis Grantt chart
  • 12. Operation – chart and diagram Arrow Diagram / PERT Chart Radar Chart Scatter diagram
  • 13. Operation – chart and diagram Pie chart Line Chart
  • 14. Legal Affairs  Rights - Rights to protect the use & ownership  Copyright – rule for protection author's work from publication  Trademark – protect company logo & product name  Patent - Methodology to creation something
  • 15. Software License  Software License - The right to use software, and is granted by the software maker to the purchaser  Software is protected under the Copyright Act.  License Agreement – Agreement to using software  Type of Software License  Propitiatory Software  Freeware / Shareware  OpenSource Software
  • 16. Type of Software  Propitiatory Software  Purchase Software  Freeware / Shareware  Free to use  Feature limit or time limit (Shareware)  OpenSource Software  Free to use  Free of charge / Freedom to use  Open source code
  • 17. Standard Organization  ISO (international Organization for Standardization)  ISO9000  ISO14000  IEEE (Institute of Electrical and Electronics Engineers)  Lan standard 802.xx  802.3 Ethernet Lan  802.11 Wireless Lan
  • 18. Barcode 3D Barcode / QR Code
  • 19. SWOT Analysis  Analyse Strengths, Weaknesses, Opportunities, Threats
  • 20. PPM (Product Portfolio Management)
  • 21. Business execution organization  CEO (Chief Executive Officer)  The “CEO” is responsible for management as the company’s representative.  COO (Chief Operating Officer)  Under the CEO, the “COO” is responsible for business operation.  CIO (Chief Information Officer)  The “CIO” has the highest responsibility concerning information.  CFO (Chief Financial Officer)  The “CFO” is responsible for financial affairs such as procurement of funds and financial administration.
  • 22. M&A (Mergers and Acquisitions)
  • 23. Tech use in Business  POS – 7Eleven  IC chip – Credit Card  RFID – MRT  Electronic money – Smart Purse  GPS – Tracking System
  • 24. E-Business  Electronic commerce (EC)  commercial activities using networks with only a small amount of investment by cutting the costs associated.  Type of EC  CtoC – Customer to Customer  BtoC - Business to Customer  BtoB – Business to Business
  • 25. Typical Modeling  E-R Diagram  relationship between data using “entities” and “relationships.” Entities and relationships have several characteristics called “attributes.”  Data Flow Diagram (DFD)  The flow of operations as a flow of data  Unified Model Language (UML)  visual language for modeling that standardizes the conceptual components used in the development and specification decision stage
  • 28. groupware  Groupware to operation in business  E-Mail  Bulletin Board System (BBS) also web board  Video Conferencing  Chat  Weblog - also know as Blog  Social Network Service (SNS)
  • 32. Development  Programing / Coding  Unit testing / White box test
  • 33. Testing  Testing is a process for confirming program and system quality. 
  • 34. Software Development models  Typical Model  Waterfall model  Spiral model  Prototyping model  New Method  Agile method  Xtream Programming (XP)  Pair Programming  Scrum
  • 38. Agile method  Agile is a group of software development methodologies  It promotes adaptive planning, evolutionary development and delivery; time boxed iterative approach and encourages rapid and flexible response to change
  • 39. Pair Programming  agile software development technique in which two programmers work together at one workstation  Programmers being like as the pilot and copilot on an air plane  1+1 > 2
  • 40. Xtreme Programming  Light-Weighted Methodology  Focus on development stage  Dev & change by user comment
  • 41. Scrum
  • 42. Project management  Project manager organize and managing resources to achieve specific goals
  • 43. IT Service management  ITIL - framework of know-how, best approaches, best practices, etc. designed to create a successful business utilizing IT services.  ITIL is “de facto standard” of IT service management.
  • 45. Basic theory  numeral system  base 2 (Binary) 0,1  base 8 (Octal) 0,1,2,3,4,5,6,7  base 10 (Decimal) 0,1,2,3,4,5,6,7,8,9  base 16 (Hexadecimal) 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
  • 46. Convert numerical base  Base 10 → Base 2  346 = 256+64+16+8 512 256 128 64 32 16 8 4 2 1 1 1 1 1 1  Binary = 101011010
  • 47. Convert numerical base  Base 2 → Base 8  Binary = 101011010  Split 3 digit = 101 011 010  Octal = 532  Base 2 → Base 16  Binary = 101011010  Split 4 digit = 1 0101 1010  Hexadecimal = 15A
  • 49. Computer Units  A “bit” is the smallest unit of data which can be handled by a computer (written as 'bit' or 'b')  Units  8bit = 1Byte  1024Byte = 1KiloByte(KB)  1024KB = 1MegaByte(MB)  1024MB = 1GigaByte(GB)  1024GB = 1TeraByte (TB)  1024TB = 1PetaByte(PB)
  • 50. Computer Units  Time units
  • 51. Analog / Digital  Analog  Digital
  • 52. A/D Conversion  1. Sampling  3. Encoding  2.Quantization  4. Coded to Digital
  • 53. Character Set Encoding  ASCII – ANSI character standard  Use 7bit for each alphanumeric, character and symbol and 1bit for parity bit  TIS620 – Thai character set Standard  Unicode – ISO Code standard  Use for multi-language code  2 – 3 Bytes per 1character
  • 55. Data Structure  Variable  Temporaly to store data  X = 10 + 1; X is a temp to store 10+1
  • 58. Stack / Queues  Stack  LIFO  Push n' Pop  Queues  FIFO  Enqueue n' Dequeue
  • 59. Flow chart  Flowchart  Flowchart symbol
  • 60. Flow chart & Pseudo code  Flowchart  Pseudo code start; input time; if time <= 16 then echo “He is in school”; else if time => 19 then echo “He is at home”; else echo “He is in Playground”; stop;
  • 61. Programming  Programming  Type of Compiler  Machine code  Compiler  Assembly C , C++  C, C++, Delphi, Basic,  Interpreter Cobol, Fortan PHP, ASP, Python , ruby  JAVA, .net, python,PHP  just-in-time compiler JAVA , .net  SQL  HTML , XML
  • 62. Language processor  Compiler  Compile from Source code to binary program  Compile all source and warning errors  Interpretor  Compile Source to binary line by line  Stop compile when it's errors
  • 63. Language processor  JIT Compiler  Compile source to p-code (portable code) like as java call “byte code”  Interprete by p-code by VM on each platform like as JVM or .net runtime
  • 64. Markup Language  Markup Language used to write logical structures in text by means of tags. A “logical structure” affects textual and graphical layout, character appearance (written format), and other elements. Through the use of tags, they embed control characters into text to express information related to details such as layout, character embellishment, and hyperlinks. Two typical examples of markup languages are “HTML” and “XML.”
  • 65. HTML
  • 67. CPU  Clock frequency  Cyclical signals to coordinate the timing of operation  clock frequency is indicated in “Hz (Hertz)”  Bus width  Internal bus  path of transmission used to exchange data inside CPU  External bus (Front Side Bus)  Path to connect and exchange with external device such as VGA, PCI Device
  • 68. CPU Type  Type of CPU  CISC – Complex Instruction Set Computer  Also call x86 Architecture  Intel , AMD  RISC – Reduce Instruction Set Computer  Sun Spark  IBM Power  ARM Processor
  • 69. Memory  device that is used to store programs and data required for processing in the operation of a computer  Also referred to as “main memory”
  • 70. ROM – Read Only Memory  Non – volatile memory  Most used as Read-only memory (ROM,EPROM)  Computer Bios  Embedded systems  Mobile ROM  Use as storage data like as Flash memory(EEPROM)  Compact Flash , SD/MMC, Memory Stick  Flash Drive, Solid State Device (SSD)
  • 71. RAM – Random Access Memory  Volatile memory  Use for main memory or cache  Type of RAM  Static RAM – CPU cache  Dynamic RAM – DDR2, DDR3 RAM
  • 75. Optical Disc  CD Rom / CD-RW  DVD Rom / Combo Drive(DVD Rom+CD-RW)  650-700 MB  DVD-RAM, DVD±RW  4.7 GB (single layer) or 8.5 GB (dual layer)  Blu-ray Drive  25 GB (single layer) or 50 GB (dual layer)
  • 77. Computer Interface  Connected  RS-323C – Serial port 25/9 pin  USB port  IEEE1394 / Firewire / i.link  SCSI  SAS  ATA  SATA
  • 78. Input Device  Keyboard  Mouse  Trackball  Touchpad  Pointing stick  Digitizer  Touch panel
  • 79. Image input device  Scanner  Image  OCR (Optical Character Reader)  OMR (Optical Mark Reader)  Barcode Reader  Digital Camera  Image  QR Code
  • 80. Other input device  Sound input device  Microphone  Handwriting character input device  Pen mouse  Magnetic card reader  IC Chip card reader
  • 81. Output Device  Display  CRT  LCD/LED  OLED  Printer  Inkjet  Laser  Dot Matrix  Themal transfer
  • 82. Wireless Interface  IrDA – infrared communication  Bluetooth  Wifi / Wireless Lan  HSPA / 3G
  • 83. Type of PC Desktop  Tower  All in one Mobility  Laptop / Notebook  Netbook  Tablet  Phone Device
  • 84. Processing Model  Centralized  Distributed
  • 85. Processing method  Interactive  Real-time  Game  ATM  Word Processor  Reserve ticket  Batch  Report profit to Center
  • 86. Operating System  OS is Software to communicate from user and machine  OS is a system software.  OS working  Memory Management  Resource Management  File Management  User Management  Task Management
  • 88. Operating System  Desktop  MS-Dos  Windows family (7/vista/xp/me/98/95)  OSX (MacOS)  Linux (Ubuntu, Fedora)  Server  Unix (FreeBSD, Solaris, HP-UX)  Linux (Redhat, Slackware, SuSe)  Windows Server family(2008,2003,2000)
  • 89. Open Source Software  OSS is an software  Free of charge  Freedom to use  Open Source have a license  GPL  Apache
  • 90. Free of OSS  Fredom to use OSS
  • 91. OSS Software  OS – Ubuntu, Fedora  Web Browser – Firefox  Office – OpenOffice, Libre Office  E-mail client – Thunderbird  Image Edit – Gimp  Web Server – Apache  Ftp – filezilla  Chat - pidgin
  • 92. Multimedia  Image  Compression data  Jpg , png , tiff ,raw file  Zip  Video  Rar  mpg, mpeg2,  tar mp4,divx, wmv,flv,  tar.gz mov,mkv  tar.bz2  Audio  mp3, wma, aac,m4a,flac
  • 94. Network  Network is a form of using multiple computers by connecting  Network used for  Sharing resource  Data  Storage Device  Printer  Exchange information  Data , Video, chat, email
  • 96. Type of Network  Local Area Network  Internet  Wide Area Network
  • 97. Network OSI TCP/IP Model Model
  • 98. Service port  HTTP Port 80  FTP Port 21  SSH Port 22  SMTP Port 25  MySQL Port 3306
  • 99. Network Device  Ethernet Card / Lan  Wireless lan card Card /Wifi card
  • 100. Network Device  Hub / Switch
  • 103. Internet Protocol (IP)  “IP” is a protocol that corresponds to the network layer (Layer 3) in the OSI model. Common functions of IP are “addressing” and “routing.”  IP Address
  • 104. IP Address  Public IP is IP assign by internic (THNIC in thailand) use to connect to internet  Private IP is IP reserve for use for local. Such as LAN in company.  Subnet is a prefix to separate Network and Host number for IP  Class A 255.0.0.0  Class B 255.255.0.0  Class C 255.255.255.0
  • 105. IP Range  Public IP  Class A 1.0.0.0 - 127.255.255.255  Class B 128.0.0.0 - 191.255.255.255  Class C 192.0.0.0 – 223.255.255.255  Private IP  Class A 10.0.0.0 - 10.255.255.255  Class B 172.16.0.0 - 172.31.255.255  Class C 192.168.0.0 - 192.168.255.255
  • 106. Domain Name System  A “domain name” uses a combination of characters to represent an IP address  DNS is a method to mapping between domain name and ip address to connected on internet
  • 107. DDOsAttacking  Port scan  Password crack  Stepping stone / Zombie machine  Dos Attack / Email bomb
  • 108. Computer Virus  Type of virus infection  Virus infection from  Boot sector virus net  Program virus  Trojan horse  Macro virus  Worm  Spyware  Malware  Adware
  • 110. Encryption  Caesar Codes  Caesar Codes is letter substitution plaintext: CAESAR ciphertext: PNRFNE rotation of 13 character
  • 113. Authentication  Traditional authentication  UserID / Password  Biometric authentication  Fingerprint  Vein  Face  Retina/Iris