3. ITPE Configuration of the Examination
Exam Duration : 165 min
100 Question
88 short question
12 medium question ( 3 question consisting of 4
sub-questions each)
Pass Criteria
Total Point 60 % or higher
Point in each field 30% or higher
4. Scope of ITPE information
Strategy (35%) Technology (40%)
Corporate and Legal Basic Theory
Management Strategy Computer System
System Strategy Technical Element
Management (25%) Human
Interfaces
Development Multimedia
Technique Databases
Project Management Networks &
Service Management Security
6. Corporate Activities
Corporate Philosophy
Corporate Objective
medium or long-term goal
Corporate Social Responsibility (CSR)
7. Management Resource
Management resources within the context of
business management refer to
People - Human Resource
Materials - assets
Money - Finances
Information – Information Management
8. Business Management
“PDCA” (Plan, Do, Check, Act) cycle is a
fundamental approach for business
management that involves the execution of a
four-step cycle to continuously improve product
quality and work.
10. Operation
Various kinds of charts and diagrams are used
to analyse,solve, and improve work issues.
Matrix Diagram
Matrix Data Analysis
Grantt chart
14. Legal Affairs
Rights - Rights to protect the use & ownership
Copyright – rule for protection author's work from
publication
Trademark – protect company logo & product name
Patent - Methodology to creation something
15. Software License
Software License - The right to use software,
and is granted by the software maker to the
purchaser
Software is protected under the Copyright Act.
License Agreement – Agreement to using software
Type of Software License
Propitiatory Software
Freeware / Shareware
OpenSource Software
16. Type of Software
Propitiatory Software
Purchase Software
Freeware / Shareware
Free to use
Feature limit or time limit (Shareware)
OpenSource Software
Free to use
Free of charge / Freedom to use
Open source code
17. Standard Organization
ISO (international Organization for
Standardization)
ISO9000
ISO14000
IEEE (Institute of Electrical and Electronics
Engineers)
Lan standard 802.xx
802.3 Ethernet Lan
802.11 Wireless Lan
21. Business execution organization
CEO (Chief Executive Officer)
The “CEO” is responsible for management as the
company’s representative.
COO (Chief Operating Officer)
Under the CEO, the “COO” is responsible for business
operation.
CIO (Chief Information Officer)
The “CIO” has the highest responsibility concerning
information.
CFO (Chief Financial Officer)
The “CFO” is responsible for financial affairs such as
procurement of funds and financial administration.
23. Tech use in Business
POS – 7Eleven
IC chip – Credit Card
RFID – MRT
Electronic money – Smart Purse
GPS – Tracking System
24. E-Business
Electronic commerce (EC)
commercial activities using networks with only a
small amount of investment by cutting the costs
associated.
Type of EC
CtoC – Customer to Customer
BtoC - Business to Customer
BtoB – Business to Business
25. Typical Modeling
E-R Diagram
relationship between data using “entities” and
“relationships.” Entities and relationships have
several characteristics called “attributes.”
Data Flow Diagram (DFD)
The flow of operations as a flow of data
Unified Model Language (UML)
visual language for modeling that standardizes the
conceptual components used in the development
and specification decision stage
28. groupware
Groupware to operation in business
E-Mail
Bulletin Board System (BBS) also web board
Video Conferencing
Chat
Weblog - also know as Blog
Social Network Service (SNS)
38. Agile method
Agile is a group of
software development
methodologies
It promotes adaptive
planning, evolutionary
development and
delivery; time boxed
iterative approach
and encourages rapid
and flexible response
to change
39. Pair Programming
agile software development technique in which
two programmers work together at one
workstation
Programmers being like as the pilot and copilot
on an air plane
1+1 > 2
40. Xtreme Programming
Light-Weighted Methodology
Focus on development stage
Dev & change by user comment
42. Project management
Project manager organize and managing
resources to achieve specific goals
43. IT Service management
ITIL - framework of know-how, best
approaches, best practices, etc. designed to
create a successful business utilizing IT
services.
ITIL is “de facto standard” of IT service
management.
45. Basic theory
numeral system
base 2 (Binary) 0,1
base 8 (Octal) 0,1,2,3,4,5,6,7
base 10 (Decimal) 0,1,2,3,4,5,6,7,8,9
base 16 (Hexadecimal)
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
49. Computer Units
A “bit” is the smallest unit of data which can be
handled by a computer (written as 'bit' or 'b')
Units
8bit = 1Byte
1024Byte = 1KiloByte(KB)
1024KB = 1MegaByte(MB)
1024MB = 1GigaByte(GB)
1024GB = 1TeraByte (TB)
1024TB = 1PetaByte(PB)
52. A/D Conversion
1. Sampling 3. Encoding
2.Quantization 4. Coded to Digital
53. Character Set Encoding
ASCII – ANSI character standard
Use 7bit for each alphanumeric, character and
symbol and 1bit for parity bit
TIS620 – Thai character set Standard
Unicode – ISO Code standard
Use for multi-language code
2 – 3 Bytes per 1character
60. Flow chart & Pseudo code
Flowchart Pseudo code
start;
input time;
if time <= 16 then
echo “He is in school”;
else
if time => 19 then
echo “He is at home”;
else
echo “He is in Playground”;
stop;
61. Programming
Programming Type of Compiler
Machine code Compiler
Assembly C , C++
C, C++, Delphi, Basic,
Interpreter
Cobol, Fortan PHP, ASP,
Python , ruby
JAVA, .net,
python,PHP
just-in-time compiler
JAVA , .net
SQL
HTML , XML
62. Language processor
Compiler
Compile from Source code to binary program
Compile all source and warning errors
Interpretor
Compile Source to binary line by line
Stop compile when it's errors
63. Language processor
JIT Compiler
Compile source to p-code (portable code) like as
java call “byte code”
Interprete by p-code by VM on each platform like as
JVM or .net runtime
64. Markup Language
Markup Language used to write logical
structures in text by means of tags. A “logical
structure” affects textual and graphical layout,
character appearance (written format), and
other elements. Through the use of tags, they
embed control characters into text to express
information related to details such as layout,
character embellishment, and hyperlinks. Two
typical examples of markup languages are
“HTML” and “XML.”
67. CPU
Clock frequency
Cyclical signals to coordinate the timing of
operation
clock frequency is indicated in “Hz (Hertz)”
Bus width
Internal bus
path of transmission used to exchange data
inside CPU
External bus (Front Side Bus)
Path to connect and exchange with external
device such as VGA, PCI Device
68. CPU Type
Type of CPU
CISC – Complex Instruction Set Computer
Also call x86 Architecture
Intel , AMD
RISC – Reduce Instruction Set Computer
Sun Spark
IBM Power
ARM Processor
69. Memory
device that is used to store programs and data
required for processing in the operation of a
computer
Also referred to as “main memory”
70. ROM – Read Only Memory
Non – volatile memory
Most used as Read-only memory
(ROM,EPROM)
Computer Bios
Embedded systems
Mobile ROM
Use as storage data like as Flash
memory(EEPROM)
Compact Flash , SD/MMC, Memory Stick
Flash Drive, Solid State Device (SSD)
71. RAM – Random Access Memory
Volatile memory
Use for main memory or cache
Type of RAM
Static RAM – CPU cache
Dynamic RAM – DDR2, DDR3 RAM
85. Processing method
Interactive Real-time
Game ATM
Word Processor Reserve ticket
Batch
Report profit to Center
86. Operating System
OS is Software to communicate from user and
machine
OS is a system software.
OS working
Memory Management
Resource Management
File Management
User Management
Task Management
88. Operating System
Desktop
MS-Dos
Windows family (7/vista/xp/me/98/95)
OSX (MacOS)
Linux (Ubuntu, Fedora)
Server
Unix (FreeBSD, Solaris, HP-UX)
Linux (Redhat, Slackware, SuSe)
Windows Server family(2008,2003,2000)
89. Open Source Software
OSS is an software
Free of charge
Freedom to use
Open Source have a license
GPL
Apache
94. Network
Network is a form of using multiple computers
by connecting
Network used for
Sharing resource
Data
Storage Device
Printer
Exchange information
Data , Video, chat, email
103. Internet Protocol (IP)
“IP” is a protocol that corresponds to the
network layer (Layer 3) in the OSI model.
Common functions of IP are “addressing” and
“routing.”
IP Address
104. IP Address
Public IP is IP assign by internic (THNIC in
thailand) use to connect to internet
Private IP is IP reserve for use for local. Such
as LAN in company.
Subnet is a prefix to separate Network and
Host number for IP
Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0
105. IP Range
Public IP
Class A 1.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 – 223.255.255.255
Private IP
Class A 10.0.0.0 - 10.255.255.255
Class B 172.16.0.0 - 172.31.255.255
Class C 192.168.0.0 - 192.168.255.255
106. Domain Name System
A “domain name”
uses a combination of
characters to
represent an IP
address
DNS is a method to
mapping between
domain name and ip
address to connected
on internet
107. DDOsAttacking
Port scan
Password crack
Stepping stone /
Zombie machine
Dos Attack / Email
bomb
108. Computer Virus
Type of virus infection Virus infection from
Boot sector virus net
Program virus Trojan horse
Macro virus Worm
Spyware
Malware
Adware