IT Common Body of Knowledge

Knowledge Major Intermediate Classification Major Technical Item
Field Classification    
I. Computer science fundamentals
  1. Basic theories of information
    1.1 Numeric conversion
and data representation
Radix conversion,
    numeric representation (including complement representation & fractional number representation),
      non-numeric value representation (character representation, voice representation, & image representation),
      operation and precision (single precision, double precision, fixed point precision, floating point precision, shift operation, overflow and underflow)
     
    1.2 Information and Logic Logical operation (true, false, logical product, logical sum, negation, exclusive OR, negative AND, & De Morgan Theorem),
      proposition logic, logic function,
      information logic & coding theory (channel coding, source coding, encryption, decoding, Humming code, Huffman code, CRC, parity check),
     
      predicate logic (deduction and induction, inference),
      automaton (finite automaton, Turing machine, state transition),
      formal language (definition, operation, type & grammar, Chomsky Rule, BNF, Polish notation, & normal expression, direct syntax conversion, attribute context-free grammar, context-free language),
     
      graph theory (directed/non-directed graph, Eulerian graph), computational complexity (large 0 notation), information content (entropy),
     
      correctness theory (partial correctness, termination, full correctness)
   
    1. Mathematical

Applications

Numeric calculation (matrix & determinant, approximate solution, & interpolation),
probability & statistics (permutation, combination, probability, addition, & multiplication theorem,
      probability distribution, expectation, Markovian process, estimation, testing, regression analysis),
      optimization problem (linear programming method, PERT, shortest path problem, and queuing theory)
  2. Data structures and algorithms
    2.1 Data structures Arrays (dimension, static arrays and dynamic arrays),
      lists (linear list, uni-directional list, bi-directional list, ring list, linked list),
      stacks (LIFO, push and pop), queue (FIFO, enqueue and dequeue),
      trees (binary tree, balanced tree, ordered tree, multiway tree, search tree, heap),
      hash (calculation of storage location, and collision handling)
    2.2 Algorithms Various types of algorithm (search, sort, recursive algorithm, generic algorithm, approximate algorithm, probability
algorithm, natural language processing algorithm, language processor, linkage editor, memory management,
data compression algorithm, collation, file processing, character string processing, graph, numeric calculation & algorithms related to diagrams),
     
     
      relationships between algorithm and data structure, algorithm efficiency,
      algorithm design method, flowchart and decision table
II. Computer system
  1. Hardware
    1.1 Information element Semiconductor (CMOS, bipolar, SRAM, DRAM, SDRAM, and flash memory), integrated circuit
    1.2 Processor architecture Processor structure & operation principle (register, address assignment mode, instruction set,instruction execution control, interruption control, microprogramming control, CISC/RISC),high-speed system (pipeline and parallel system),operation mechanism (logical circuit, adder, and sequence circuit),multiprocessor (tight coupling, array, tandem, loose coupling, synchronization, VLIW, super scalar),processor performance (MIPS, clock and CPI)
     
     
     
     
    1.3 Memory architecture Memory cache, memory capacity and performance, types of memory,
      memory configuration (interleave, memory parity, ECC, layers of memory, memory protection system , and high-speed access to main memory)
    1.4 Auxiliary memory Storage media (semiconductor, magnetic disk, magnetic tape, magneto-optical disk and optical disk),
      types and characteristics of auxiliary storage devices (HD, MO, CD, DVD, MT, etc., and access speed, volatility,
      types and characteristics of RAID (RAID0,RAID1, RAID2, RAID3, RAID4, and RAID5)),
      performance and capacity calculation of auxiliary storage devices (capacity, access time, blocking factor and)
      defragmentation)
    1.5 Input/output Input/output interface (bus, DMA, channel, SCSI, Centronics, GPIB, RS-232C, USB, IEEE1394, Ir-DATA, input/output
    architecture and control system, and channel control system),
    equipment types and characteristics of input/output devices (keyboard, pointing device, display, ,printer, various types of auxiliary
      storage devices, etc.),
      types and characteristics of communication control devices (modem, DCE, TA, DSU, CCU, FDM, TDM, repeater, router, bridge, gateway, hub, and cable),
      connection methods and connection media of input/output devices and communication equipment (serial connection, parallel connection, types and characteristics of connection cable, and communication media)
    1.6 Types of computers, Personal computer, workstation, general-purpose computer, supercomputer,
    and characteristics of control computer, and microcomputer
    architecture  
    1.7 Embedded systems Component parts and construction (processor, DSP, sensor, memory, ASIC, PWM, D/A, A/D),
      logical design (processor, bus, circuit design, and timing design), and
      control theory (feedback and open loop), EMI, and Co-Design
  2.Basic software
    2.1 Operating System OS configuration and functions,
process management (exclusive control, semaphore, state transition, preemption, round robin, execution control, deadlock),
kernel and interruption control,
main memory control (memory protection, dynamic link allocation, fragmentation, memory leak),
virtual storage (paging algorithm, slashing, and DAT),
input/output control, spooling function,
file management function (exclusive control, recovery processing, directory, file organization (sequential organization,
partitioned organization, indexed sequential organization, random organization),
access methods (BSAM, ISAM, VSAM),
program control and system call,
job management (job scheduling, JCL), real-time processing, TSS,
security control, fault management,
data management (access authorization),
multiple programming (execution order, simple execution time),
Japanese language processing, multimedia processing, human interface,
types of OS (MVS, UNIX, Linux, Windows, MacOS, free software OS)
     
     
     
     
     
     
     
     
     
     
     
     
     
    2.2 Network OS Functions and features of network OS, network management (SNMP),
      network control (types and features of protocol)
    2.3 Embedded OS Real-time OS, device driver, theory and algorithm of parallel and distributed calculation (Petri net)
    2.4 Middleware DBMS, communication management system (including LAN control), software development support tool (including CASE tools), operation management tool, TP monitor, ORB
  3. System configuration and method
    3.1 System configuration Client/server system (2-layer, 3-layer, multi-layer, RPC, and stored procedure),
    technology DB/DC system, distributed DB system,
      system configuration method (dual, duplex, hot standby, fault tolerant, hot site, cold site, cluster, TCMP/LCMP),
      processing modes (centralized and distributed, batch, real-time system, Web type computing, use of portable computer),
      transaction management (simultaneous execution control, exclusive control, failure recovery, rollback, and roll forward)
    3.2 System performance Application of queuing theory, performance calculation (response time, throughput, TAT),
      performance design (system tuning, Amdahl solution, and response characteristics),
      performance index (SPEC-Int, SPEC-Fp, TPC, Gibson mix, response time), performance evaluation (benchmark, and system monitor)
    3.3 System reliability and Reliability calculation (calculation of operation rate, MTBF, MTTR, availability, failure rate, and FIT),
    economical efficiency reliability design (fail safe, fail soft, and full proof),
      reliability indicator and reliability evaluation (RAS, RASIS, bus tub curve, non-stop), economical efficiency (system
      profitability, and operation rate)
  4. System application    
    4.1 Network application Web, Internet, intranet, extranet, mobile communication, satellite communication, CATV,
      communication services (ISDN, packet switching, frame relay, ATM, leased lines, circuit switching),
      application system (Internet shopping, groupware, and debit card)
    4.2 Database applications Data warehouse (OLAP), data mart, OLTP, data mining,
      application system (accounting system, inventory management system, document management system, and sales support
      system)
    4.3 Data resource IRDS (information, resource dictionary system), meta data, and repository
    management
    4.4 Multimedia system Al, pattern recognition, AR/VR/CG, agent,
      media application (pattern recognition and synthesis of multimedia (sound, image and video),
      application system (Internet broadcast, nonlinear image edit system, video on-demand, and TV game)
III. System Development and Operation
  1. System Development
    1.1 Language Program structure (reentrant, reusable, overlay, and recursion),
data type (integer type, real number type, logical type, character type, abstract data type, and structure type),
control structure (branch, selection, repetition, procedure and function),
language processors (compiler, linkage editor, loader, interpreter, assembler, cross compiler, DLL, and parallel processing),
syntactic analysis (morphological analysis, direct syntax translation, attribute context-free grammar, and context-free language),
types and features of language (FORTRAN, COBOL, PL/I, C, Pascal, C++, Lisp, Visual Basic, XML, SGML, PostScript, Java, Perl),
types of language (procedural, functional, logic, and object-oriented)
     
     
     
     
     
     
    1.2 Software package Development tools, operation management tool,
business processing tools (finance and accounting, personnel affairs, management planning, sales management, inventory
control and business application classified by industry),
ERP, CRM, SFA, SCM, CTI,
Groupware (communication, data sharing, schedule management), PDM, CAD/CAM/CEA, OA tools, (word processing
software, spread sheet, presentation software),
Others (utility, multimedia, and entry in Japanese)
     
     
     
     
     
    1.3 Development Development tools (design tool, programming tool, test support tool, CASE tool),
EUC, EUD (use of spread sheet software, database normalization, data manipulation and use of SQL)
    environment
    1.4 Development method Software development model (waterfall, spiral, prototype),
cost model,
process maturity levels (CMM, SPICE, SPA),
software life cycle,
software reuse (reverse engineering, componentware)
     
     
     
    1.5 Request analysis and DFD, ERD, UML,
analysis/design diagramming (flowchart, NS chart, PAD),
object-oriented design (inheritance, generalization, delegation, encapsulation, polymorphism),
process-based design, date-based design, structure analysis and design,
module design (module cohesion, and module coupling),
input/output (report design, screen design, code design),
human interface design
    design method
     
     
     
     
    1.6 Programming method Programming method (procedural programming, logic programming, functional programming, object-oriented programming)
    1.7 Test review method Test method (white box test, black box test),
review method (inspection, walkthrough, design review),
test design and management method (bug curve, error removal, coverage, test design, fault injection, system test and bug
management diagram)
     
     
    1.8 Development Project planning (initiation of project plan, profitability),
quality plan, management and evaluation (QFD, software quality, and quality characteristics),
process management (PERT diagram, Gantt chart, WBS, progress control and critical path),
configuration management (specification management, and change control),
estimation method (function point method, COCOMO, workload estimation, and cost estimation), personnel planning, and management,
document management (document protocol, and change procedurea), productivity (size and workload),
development organization and roles (development team staffing, and project manager),
cost management and risk management
    management
     
     
     
     
     
    1.9 Application system Design and development of application systems (use of analysis and design methods, external design, internal design,
programming, and test),
use of software packages
database design and operation (normalization, SQL, and use of network), and implementation of network
    construction
     
    1.10 System auditability Audit method, audit trail, significance of system audit, and incorporation into system
    1.11 Use of external Outscoring, system integration, and co-sourcing
    resources
  2. System operation and maintenance
    2.1 System operation System operation management (computer system, database, network),
system cost management (charges to users, TCO),
system operation (job scheduling, data input/output management, and operation manuals),
user management (ID issuance and management),
distributed system management,
hardware resource management,
software resource management (library management, and version control),
data resource management,
network resource management,
equipment and facility management (power supply, air conditioning equipment, equipment management, and facility
management),
system failure management (handling procedures, monitoring, recovery process, and preventive measures),
security management,
performance management
system operation tool (automatic operation tool, monitoring tool, and diagnostic tool),
system transition (transition to operation phase, operation test, and version control),
system operation service criteria
     
     
     
     
     
     
     
     
     
     
     
     
    2.2 System maintenance Types of maintenance (daily inspection, periodical maintenance, preventive maintenance, post maintenance, and remote
      maintenance),
      Software maintenance, hardware maintenance, and maintenance contract
IV. Network technology
  1. Protocol and transmission control
    1.1 Network architecture Network topology,
standardization of communication protocol, (OSI layer, X, V, I, and HDLC),
application layer protocol (FTP, TELNET, SNMP, DHCP, POP, and SMTP),
transport layer protocol (TCP, and UDP),
network layer protocol: IP (IP address (subnet address, subnet mask), physical address (uni-cast, broadcast, and multi-cast)),
data link layer protocol (ARP and PPP)
     
     
     
     
     
    1.2 Transmission control Connectionless system, contention system, polling/selecting system, basic procedure, multi-link procedure,
transmission control character, line control, and HDLC
     
  2. Encoding and transmission
    2.1 Modulation and AM, FM, PM, PCM, and sampling,
analog transmission, digital transmission, coding, and compression
    encoding
    2.2 Transmission Error control (CRC, Humming code, parity check, bit error ratio),
synchronous control (start-stop synchronization, SYN synchronization, flag synchronization, and frame synchronization),
multiplexing, methods (FDM, TDM),
compression, and decompression methods (JPEG, MPEG, MH, MR, MMR, run-length)
    technology
     
    2.3 Transmission and Communication methods (unidirectional/half duplex/full-duplex, series/parallel, 2-wire/4-wire), WDM,
switching system (circuit switching, store and forward, packet switching, ATM switching, frame relay, and cell relay),
public network, and leased line
    methods circuits
  3. Network (LAN and WAN)
    3.1 LAN and WAN Transmission media (types and features of cables),
LAN topology (bus type, star type, and ring type),
Access control system (CSMA/CD, token ring),
inter-LAN connection, LAN-WAN connection,
pier-to-pier, point-to-point,
high speed technology of LAN (FDDI, gigabit ether),
wireless LAN
     
     
     
     
     
    3.2 Internet Internet technology (inter-network connection equipment, TCP/IP, IP routing, DNS, PROXY server),
      e-mail (protocol, mailing list), Web (HTTP, browser, URL, HTML, and XML),
      file transfer (FTP), search engine (full text search type, directory type, robot type), QoS, CGI, and VOIP
    3.3 Network performance Calculation related to line, transmission speed, line utilization rate, line capacity, traffic intensity, traffic design and
      performance evaluation,
      application of queuing theory
    3.4 Laws related to network Telecommunications carrier regulations and laws, technical standards
    3.5 Network security Encryption, authentication, firewall, and security protocol
    3.6 Telecommunications Leased line service, line switching service, packet switching service, ISDN, VPN,
    services frame relay, cell relay, ATM, IP connection service, satellite communication service,
      mobile communications service, international communication service, VAN (value added communication network),
      Qos, DSL, best effort/guaranteed service
  4. Communications equipment
    4.1 Transmission media Wire, wireless, radio wave, light, infrared rays, local line, toll line,
    and communication cable pair cable, coaxial cable, optical fiber cable, IDF, and MDF
    4.2 Various types of Line terminal devices, mutiplexing equipment, switching equipment, branch equipment,
    communications inter-network connection equipment (gateway, bridge, spanning tree, router, repeater, hub, and switch),
    equipment line connection equipment (modem, DUS, NCU, TA, CCU, and PBX)
  5. Network software    
    5.1 Network management Network management items (network operation management, configuration management, failure management and,
      performance management),
      network management system, and network management tool (SNMP)
    5.2 Network OS Network driver, and functions of network OS
V. Database technology
  1. Models of database
    1.1 Database model 3-layer schema (conceptual schema, external schema, internal schema), conceptual data model,
      logical data model (relation model, hierarchical model, and network model)
    1.2 Data analysis Dta modeling,
      ERD (entity, attribute, relationship),
      Normalization (1st normal form, 2nd normal form, and 3rd normal form)
    1.3 Data manipulation Relational algebra (set operation (sum, difference, product, direct product), relational operation (selection, projection,
      combination, quotient))
  2. Database language
    2.1 Database language Data definition language, data manipulation language, and end user language
    2.2 SQL Data manipulation by SQL (table definition, data retrieval, data addition/deletion/update)
    2.3 API Creation of program using embedded type SQL
      Creation of program using module language
  3. Database control
    3.1 Functions and features Major functions (database definition function, database manipulation function, database control function, transaction
    Of DBMS management, and user view function),
      features (assurance of data independence, database access, simultaneous execution process, exclusive control, failure
      recovery, and security),
      RDB, OODB, ORDB, and NDB
    3.2 Control function of DB Exclusive control of DB,
      DB recovery (rollback, roll forward),
      DB transaction management function (ACID attribute)
    3.3 Distribution database Configuration of distributed database,
      client cache,
      2-phase commit, 3-phase commit, and
      replication
VI. Security
  1. Approaches to secure computing
    1.1 Security protection and Cryptograph (public keys, private keys, DES, RSA, crytograph algorithms),
authentication (digital signature, message authentication, callback, user confirmation),
access control (access right, password), electronic watermark,
security management (entry and exit control, leakage prevention)
    falsification prevention
     
    1.2 Protection against Firewall
security protocol (SSL, PGP),
hardware security,
computer viruses, and computer vaccine
    illegal intrusion and
    computer viruses
    1.3 Integrity Data entry integrity,
database integrity,
software integrity, and
log and audit trail management
     
     
    1.4 Availability File backup,
recovery, alternate or spare communication lines and communication control equipment, and
reliability theory
     
    1.5 Privacy protection Individual’s information control, anonymity, pen names, and non-traceability
    1.6 Safety Countermeasures against natural calamity (earthquake-proof), housing security, and UPS
  2. Risk Management
    2.1 Risk Analysis Risk identification, risk management, risk evaluation,
risk analysis methods (quantitative risk analysis, qualitative risk analysis, and JRAM)
    2.2 Types of risks Classification by peril concepts (fire, natural disaster, crime, illegal access, failures, etc.),
classification by hazard concepts (physical hazard, moral hazard, etc.),
    2.3 Countermeasures Risk hedge (risk transfer, risk finance, computerization insurance), and
plans for a state of emergency (classification of emergency statuses, action plan at emergency, backup measure, and recovery plan)
    against risks
    2.4 Internal control Security regulation,
security policy, and
organization for security
     
  3. Guidelines and related laws and regulations
    3.1 Guideline for security Standards for information system safety measures,
software management guideline,
standard for preventing computer viruses, and
standard for preventing illegal access to computers
     
     
    3.2 Guideline for privacy OECD guideline,
guideline for individual’s information protection, and
individual’s information protection registration mark system
    protection
VII. Standardization
  1. Standardization for development and acquisition
    1.1 Standardization for  
    Development and ISO9000, ISO/IEC 12207 (SLCP-ICF98), ISO10006
    Acquisition processes  
    1.2 Standardization for  
    evaluation of ISO14000, ISO15408
    environment and  
    security  
  2. Standardization for information system infrastructure  
    2.1 Standards International standards (ISO,IEC), American standards (ANS), Japanese standard (JIS), industrial standard (EIAJ-EDI
      standard, CI-NET, distribution EDI standard), and enterprise standards
    2.2 Open Systems X/Open, OSF, POSIX, COSE
    2.3 Standardization for data EDIFACT, STEP, Zen-gin (all Japan banking) procedures, CII, XML
    exchange  
    2.4 Component-based  
    software CORBA, EJB
    standardization  
  3. Standardization of Data
    3.1 Standardization of Character codes (ASCII, ISCII, EBCDIC, JIS, shift-JIS, Unicode),
    codes bar codes (JAN code, ITF code, and ISBN code)
    3.2 Standardization of file JPEG, GIF, BMP, TIF, MPEG,
    formats SGML, XML, HTML, TEX, data formats (CSV format, SYLK format), PDF
    3.3 International System of Basic measurement units (meter, gram/kilogram/ton, second/minute/hour, ampere, kelvin, degree Celsius, mole, candela),
new SI measurement units (newton, pascal, joule, watt)
    Unit (SI)
  4. Standardization organizations
    4.1 Standardization International organizations (ISO, IETF, IEC, IEEE, ITU), US public organizations (ANSI, FCC, NIST, MIL, and DOD),
    organizations European public and industrial organizations (BSI, CENELEC, ECMA), Japanese public organization (JISC, JSA),
      industrial bodies (PCMCIA, ECMS, EIA, JEDEC, The Open Group), and Japanese industrial organizations (EIAJ, and
      JEIDA)
VII. Computerization and Management
  1. Information strategy
    1.1 Business management Business strategy (portfolio, CSF, competitive analysis),
organizations (CEO, CIO, CFO, COO, matrix organization, operating division organization, project team organization),
marketing (marketing mix, price strategy, marketing research),
behavioral science (motivation, group dynamics, leadership, KJ method, brain storming),
system theories (general system theories, social systems)
     
     
     
    1.2 Computerization Information system (DSS, SIS, system evaluation, ERP, SCM, CRM, SFA, KMS, ASP, EAI),
computerization conception (overall plan, medium-and long-term, plan), systemization plan,
business improvement, analysis, design (BPR, operation model, and business model),
Businesses using internet (E-business/dot com business, virtual companies, and SOHO)
    strategy
     
  2. Accounting
    2.1 Financial accounting Accounting standard, financial statements (balance sheet, income statement),
consolidated accounting (consolidated balance sheet, consolidated income statement, and consolidated cash flow account statement), and depreciation
     
    2.2 Management
accounting
Break-even point, finance financial index (financial analysis, financial ratio analysis), cost (cost calculation, cost accounting system, cost analysis, and construction of cost),
lease and rental,
fund plan, fund management (statement of cash receipts and disbursement, statement of source and application of funds),
asset management (inventory control, valuation, and portfolio),
tax accounting (corporate income tax, consumption tax, fixed assets tax), and economic efficiency calculation (DCF, IRR, remunerative comparison)
   
     
     
     
     
  3. Management engineering
    3.1 IE IE analysis method (working hour analysis, work sampling, ABC analysis), OC curve, control charts (7 QC tools, Pareto’s chart, and distribution chart)
    3.2 OR Optimization problem (linear programming, inventory control),
      decision-making theory, game theory,
      probability and statistics, distribution function,
      Markov process, and simulation
  4. Use of information system
    4.1 Engineering system Production control system, production plan (productivity index), process plan and management (JIT, production line
    field organization), MRP, CAD/CAM/CAE, FA, CIM, PDM
    4.2 Business system field Accounting, finance and personnel affairs systems, sales support system, OA system, POS, distribution system, financial
      system, inter-enterprise system (VAN, EDI, CALS, EC), groupware, and work flow control tool
Field Classification    
  5. Related laws and regulations
    5.1 Telecom Law RA7925
    concerning information Telecommunications Industry Law, Broadcast Law, Cable Television Broadcast Law/Wire Telecommunications Law
    communication  
    5.2 E-commerce Law RA8792
    concerning intellectual Copyright Law, Patent Law, industrial property right laws (Utility Mode Act, Designs Act, and Trademark Law)
    property right  
A. Internal design
 
  1. Internal design process
    1.1 Internal design activities
     
      1. Understanding external design
      2. Functional partitioning and structuring
      3. Physical data design
      4. Detailed input-output design
      5. Internal design documents
      6. Design review
     
     
     
 
  1. Functional partitioning and structuring
    2.1 Functional partitioning and structuring
     
      1. Identifying functions to be performed
      2. Clarifying data flow
      3. Grouping functions
      4. Hierarchical structuring
      5. Determining program functions
      6. Evaluating partitioning
      7. Functional specifications
     
     
     
     
    2.2 Structured design techniques
      2.2.1 Flowcharts
2.2.2 Data flowcharts
2.2.3 Structured charts
2.2.4 HIPO charts
2.2.5 State transition diagrams
     
     
    2.3 Functional partitioning by structured design
      2.3.1 Considerations (step-by-step refinement, independence of individual components, limiting the depth of the hierarchy)
  Designing physical data
    3.1 Physical data designing
      3.1.1 Analyzing data characteristics
3.1.2 Determining logical data organization methods
3.1.3 Determining data storage media
3.1.4 Designing record layouts
     
     
    3.2 Physical data organization and layout
      3.2.1 Aims and types of organization methods
3.2.2 Processing modes
3.2.3 Processing speed
3.2.4 Characteristics of storage media
3.2.5 File management service functions
  Detailed input-output design
    4.1 Screens design
      4.1.1 Design tasks
4.1.2 Considerations
     
    4.2 Detailed input data design
      4.2.1 Design tasks
4.2.2 Considerations
     
    4.3 Detailed output data design
      4.2.1 Design tasks
4.2.2 Considerations
 
  1. Creation and reuse of parts
    5.1 Creation and reuse of parts
      5.1.1 Ideas for making parts and reuse of them
    5.2 Use of software packages
      5.2.1 Subprogram library
5.2.2 Class library (combination with object-oriented language)
 
  1. Preparing internal design document
    6.1 Organization of internal design documents
      6.1.1 Internal design policy
6.1.2 Interface between programs
6.1.3 Program functions
6.1.4 Screen layout
6.1.5 Input-output layout
6.1.6 Test plans
    6.2 Design review
      6.2.1 Review method
6.2.2 Organization
B. Programs design
 
  1. Program design process
    1.1 Program design activities
     
      1. Understanding external design
      2. Module partitioning
      3. Preparing module specifications
      4. Program design documents
      5. Preparing test specifications
      6. Design review
     
     
 
  1. Structured design of programs
    2.1 Structured design activities
     
      1. Finding the highest level module
      2. Analyzing module functions
      3. Selecting partitioning techniques
      4. Module partitioning
      5. Defining interfaces between modules
      6. Studying module repartitioning
     
     
     
     
    2.2 Partitioning techniques
      2.2.1 Data flow-oriented partitioning techniques
2.2.2 Data structure-oriented partitioning techniques
2.2.3 Mixed use of partitioning techniques
     
     
    2.3 Standards for module partitioning
     
      1. Elimination of dependencies
      2. Standard for partition sizes
      3. Creation and reuse of parts
    2.4 Program partitioning
      2.4.1 Considerations on the number of partitions and hierarchy depth
 
  1. Module specifications and test specifications
    3.1 Preparing module specifications
      3.1.1 Tasks
3.1.2 Methods
3.1.3 Key points
    3.2 Preparing test specifications
      3.2.1 Types and objectives of tests
3.2.2 Considerations on designing testcases
3.2.3 Test methods
 
  1. Program design documents
    4.1 Organization of design documents
      4.1.1 Program design policy
4.1.2 Program outline
4.1.3 Program structure diagrams
4.1.4 Processing details
4.1.5 Test specifications
4.1.6 Data item descriptions
    4.2 Considerations on preparing program design documents
    4.3 Design review
      4.3.1 Review method
4.3.2 Organization
4.3.3 User participation
C. Program implementation
 
  1. Coding
    1.1 Coding
     
      1. Coding methods and standards
      2. Use of language processors
    1.2 Peer-review
 
  1. Tests
    2.1 Test process
     
      1. Unit tests
      2. Component tests (linkage tests)
      3. System tests
     
     
    2.2 Test activities and techniques
      2.2.1 Test plans
2.2.2 Designing tests and preparing test data
2.2.3 Use of testing environments
     
     
D. Programming languages
 
  1. Programming language [C]
    1.1 Overview of language
     
      1. Purpose and scope
      2. Program structure
      3. Basic element
      4. Grammar
      5. Declare statements
      6. Executable statements
      7. Execution sequence
      8. Program call
      9. Programming environment and program development
     
     
    1.2 Distinctive facilities
     
      1. Standard (library) functions
      2. Pointer variables
 
  1. Programming language [COBOL]
    2.1 Overview of language
     
      1. Purpose and scope
      2. Program structure
      3. Basic element
      4. Grammar
      5. Declare statements
      6. Executable statements
      7. Execution sequence
      8. Program call
      9. Programming environment and program development
     
     
     
     
    2.2 Distinctive facilities
     
      1. File Processing
      2. PICTURE
      3. Levels of data items
     
 
  1. Programming language [CASL II assembler language]
    3.1 Functions of COMET II system
     
      1. Hardware specifications
      2. Instruction code
      3. Character code
    3.2 Facilities of CASL II assembler language
     
      1. Language specifications
      2. Macro instructions
      3. Machine language instructions
      4. OS for COMET II and CASL II
    3.3 Operation facilities
     
      1. Arithmetic operations
      2. Logical operations
      3. Shift operations
    3.4 Special facilities
     
      1. Input-output processing
      2. Stack processing
      3. Subroutine calls
 
  1. Programming language [C++]
    4.1 Overview of language
     
      1. Purpose and scope
      2. Program structure
      3. Basic element
      4. Grammar
      5. Declare statements
      6. Executable statements
      7. Execution sequence
      8. Program call
      9. Programming environment and program development
    4.2 Distinctive facilities
     
      1. Classes
      2. Objects
      3. Methods
      4. Encapsulation
      5. Inheritance
 
  1. Programming language [Java]
    5.1 Overview of language
     
      1. Purpose and scope
      2. Program structure
      3. Basic element
      4. Grammar
      5. Declare statements
      6. Executable statements
      7. Execution sequence
      8. Program call
      9. Programming environment and program development
    5.2 Distinctive facilities
     
      1. Classes
      2. Objects
      3. Methods
      4. Encapsulation
      5. Inheritance
      6. Java applets
      7. Java applications
      8. AWT
 
  1. Programming language [Visual Basic]
    6.1 Overview of language
     
      1. Purpose and scope
      2. Program structure
      3. Basic element
      4. Grammar
      5. Declare statements
      6. Executable statements
      7. Execution sequence
      8. Program call
      9. Programming environment and program development
    6.2 Distinctive facilities
     
      1. Folder and file operations
      2. Applications distribution
      3. Objects
      4. MDI applications
      5. User Interface function
 
  1. Programming language [Perl]
    7.1 Overview of language
     
      1. Purpose and scope
      2. Program structure
      3. Basic element
      4. Grammar
      5. Declare statements
      6. Executable statements
      7. Execution sequence
      8. Program call
      9. Programming environment and program development
    7.2 Distinctive facilities
     
      1. Pattern matching and regular expression
      2. Association arrays
      3. Directory and file processing
      4. Control structure
      5. External function incorporation
    7.3 CGI and Perl
     
      1. Application to web pages
Advertisements

1 Comment »

  1. Brandy said

    You share interesting things here. I think that
    your page can go viral easily, but you must give it initial boost and i know how to do
    it, just search in google for – mundillo traffic increase go viral

RSS feed for comments on this post · TrackBack URI

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: