Soft Exam-Information System Project Manager-Chapter 1 Basic Knowledge of Informatization and Information System

Chapter 1 Basic Knowledge of Informatization and Information System

1.1 Information system and informatization

1.1.1 Basic concepts of information

  • 1. Characteristics of information
    (1) Objectivity
    (2) Universality
    (3) Infinity (4
    ) Dynamicity
    (5) Relativity (
    6) Dependency (
    7) Transformation
    (8) Transitivity
    (9) Hierarchy
    (10) Systematic
    (11) Transformative

  • Information requirements meet quality requirements:
    (1) Accuracy
    (2) Completeness
    (3) Reliability
    (4) Timeliness
    (5) Economical
    (6) Verifiability
    (7) Security

  • 2. Functions of information
    (1) Provide basis for understanding the world
    (2) Provide guidance for transforming the world
    (3) Provide guarantee for orderly establishment
    (4) Provide conditions for resource development
    (5) Provide materials for knowledge production

  • 3. Information transmission model
    insert image description here

1.1.2 Basic concepts of information systems

  • 1. The characteristics of the system
    (1) purpose
    (2) integrity
    (3) hierarchy
    (4) stability
    (5) mutation
    (6) self-organization
    (7) similarity
    (8) correlation
    (9) environment adaptability

  • The following characteristics will be particularly prominent:
    (1) Openness
    (2) Fragility
    (3) Robustness

  • 2. Information system
    insert image description here

1.1.3. Basic concepts of informatization

  • Information is divided into 5 levels from "small" to "big":
    (1) Product informationization
    (2) Enterprise informationization
    (3) Industry informationization
    (4) National economy informationization
    (5) Social life informationization
    insert image description here

1.1.4 Information system life cycle P34

1. System planning stage
2. System analysis stage
3. System design stage
4. System implementation stage
5. System implementation stage

1.2 Information system development method

1.2.1 Structured method P35

  • Advantages:
    (1) Clear development goals
    (2) Staged development work
    (3) Standardized development documents
    (4) Structured design methods

  • Disadvantages:
    (1) Long development cycle
    (2) Difficult to adapt to changes in requirements
    (3) Little consideration of data structure

1.2.2 Object-oriented approach

At present, the development of some large-scale information systems is usually a combination of structured methods and OO methods.

1.2.3 Prototyping method

  • prototyping process
    insert image description here

Features:
(1) Shorten the development cycle, reduce costs and risks, and speed up
(2) Focus on users, increase user satisfaction, and improve the success rate of development
(3) User participation is conducive to system handover and system operation and maintenance

Insufficient:
(1) High requirement for development environment
(2) High requirement for management level

1.3 Conventional Information System Integration Technology

1.3.1 Network Standards and Protocols

1. OSI protocol: Provide a common foundation and standard framework for the interconnection of heterogeneous computers.

  • Using hierarchical structure technology, divided into 7 layers
    insert image description here

2. Network protocols and standards

The IEEE802 specification defines how the network card accesses the transmission medium (such as optical cable, twisted pair, wireless, etc.), and there are network cards, bridges, routers, and other components used to establish a local area network that follow this standard.

3、TCP/IP

  • component:
    insert image description here

    POP3: port 110, mail receiving
    SMTP: port 25, mail sending
    FTP: 20 data port/21 control port, file transfer protocol
    HTTP: port 80, hypertext transfer protocol, web page transfer
    DHCP: port 67, IP address automatic assignment
    SNMP: Port 161, Simple Network Management Protocol
    DNS: Port 53, Domain Name Resolution Protocol, records the mapping relationship between domain name and IP
    TCP: reliable transport layer protocol
    UDP: unreliable transport layer protocol
    ICMP: Internet Control Protocol, PING command comes from the protocol
    IGMP : Multicast Protocol
    ARP: Address Resolution Protocol, convert IP address to MAC address
    RARP: Reverse Address Resolution Protocol, convert MAC address to IP address

1.3.2 Network equipment

  • Equipment diagram
    insert image description here

1.3.3 Web server

A high-performance computer that provides shared information resources and various services for online users.

1.3.4 Network Storage Technology

1. Direct attached storage DAS: directly connect the device to the server

2. Network attached storage NAS: directly connected to the network through the network interface, accessed by the user through the network

3. Storage area network SAN: a high-speed network dedicated subnet connecting disk arrays and servers through dedicated switches


(1) FC SAN : Fiber Channel storage area network, dedicated, high-speed, highly reliable; high cost, complex , and provide the powerful functions and scalability of SAN
(3) IB SAN: Switching structure I/O technology, IB (Infinite Broadband) to direct traffic, improve system performance, reliability and effectiveness, and relieve data traffic congestion

1.3.5 Network Access Technology

1. PSTN access: public switched telephone network
2. ISDN access: integrated digital service network, commonly known as "One Netcom"
3. ADSL access: asymmetric digital subscriber line, mature standards mainly include G.DMT and G.lite
4. FTTx+LAN access: optical fiber + local area network
5. HFC access: coaxial optical fiber technology
6. Wireless access: use radio waves as the information transmission medium

1.3.6 Network planning and design

1. Network planning: demand analysis, feasibility analysis, and analysis and description of the existing network
2. Network design: adopt a layered design model, which is the core layer, aggregation layer and access layer

  • Design work includes:
    (1) Network topology design, (2) Backbone network (core layer) design, (3) Convergence layer and access layer design, (4) WAN connection and remote access design, (5) Wireless network design , (6) Network connection design, (7) Equipment selection
    Among them (6): The basic elements of information security: confidentiality, integrity, availability, controllability, and reviewability

1.3.7 Database Management System

1、Oracle 2、MySQL 3、SQL Server 4、MongoDB

1.3.8 Data warehouse technology

(1), ETL (2) metadata (3) granularity (4) segmentation (5) data mart (6) ODS operation data storage (7) data model (8) artificial relationship

1.3.9 Middleware Technology

(1) The mainstream technologies of the underlying middleware include Java Virtual Machine-JVM, Common Language Runtime-CLR, Adaptive Communication Environment-ACE, Java Database Connection-JDBC, Open Database Interconnection-ODBC (2) Universal
middleware The mainstream technologies of public object request broker architecture-CORBA, J2EE, MOM, COM
(3) The mainstream technologies of integrated middleware include WorkFlow, enterprise integration application-EAI,
insert image description here

1.3.10 Planning and Design for High Availability and High Reliability

Availability MTTF, maintainability MTTR

1.4 Software Engineering

1.4.1 Demand Analysis

1. Level of requirements: (1) Business requirements, (2) User requirements, (3) System requirements 2.
Quality function deployment: (1) Regular requirements (2) Expected requirements (3) Unexpected requirements
3. Requirements acquisition:
4 , Requirements Analysis
5, Software Requirements Specification
6, Requirements Verification
7, UML
8, Object-Oriented Analysis

1.4.2 Software Architecture Software

1. Software Architecture Style
2. Software Architecture Evaluation

1.4.3 Software Design

1. Structured design [SD]: high cohesion and low coupling

2. Object-Oriented Design [OOD]: (1) Single Responsibility Principle (2) Open-Closed Principle (3) Li’s Substitution Principle (4) Dependency Inversion Principle (5) Interface Segregation Principle (6) Composition Reuse Principle (7) Demeter principle

3. Design Patterns: Creational Patterns, Structural Patterns, and Behavioral Patterns

1.4.4 Process Management of Software Engineering

  • process area
    insert image description here

1.4.5 Software testing and its management

1. Test method:

Static testing: static testing of documents and codes, generally using front-desk inspection, code walk-through and code review
Dynamic testing: actually running programs for software testing, generally white-box testing [logic coverage] and black-box testing [functional testing] 】

2. Type of test:

(1) Unit test, (2) Integration test, (3) Confirmation test, (4) System test, (5) Configuration item test, (6) Regression test

3. Object-oriented testing
4. Software debugging
5. Software testing management: (1) process management, (2) configuration management, (3) review

1.4.6 Software Integration Technology

1. Representation integration
2. Data integration
3. Control integration
4. Business process integration
5. Application integration between enterprises

1.5 New Generation Information Technology

1.5.1 Internet of Things

Divided into perception layer, network layer and application layer
1. Functional layer : (1) IoT perception layer (2) Communication network layer (3) Computing and storage layer (4) Data and service support layer (5) Smart application layer
2 , Supporting system : (1) Safety assurance system (2) Construction and operation management system (3) Standard specification system

1.5.2 Cloud Computing

1. The concept of cloud computing
2. Types of cloud computing services
3. The main tasks of developing cloud computing

1.5.3 Big data

1. Big data features: Volume-a large number, Variety-variety, Value-value, Velocity-high speed, Veracity-authenticity

2. The value and application of big data:

(1) Big data credit investigation (2) Big data risk control (3) Big data consumption amount (4) Big data wealth management (5) Big data disease detection

3. Goals of big data development and application:

1.5.4 Mobile Internet

1.6 Information system security technology

1.6.1 Concepts related to information security

1. The concept of information security: confidentiality, security, availability

Information security points: (1) equipment security (2) data security (3) content security (4) behavioral security

2. Information security technology: hardware system security technology, operating system security technology, database security technology, software security technology, network security technology, cryptography technology, malware prevention technology, information hiding technology, information equipment and network security and other key technologies 3
. Information security laws and regulations:
4. Level protection of information security:
5. Personnel management:

1.6.2 Information encryption, decryption and common algorithms

1. The concept of information encryption
2. Symmetric encryption technology: DES, 3DES, IDEA, AES replaced DES
3. Asymmetric encryption technology: RSA
4. The concept of Hash function:
5. The concept of digital signature
6. The concept of authentication:

1.6.3 Information system security

1. Computer equipment security: integrity, confidentiality, non-repudiation, usability, auditability, reliability, etc. 2.
Network security:
3. Operating system security:
4. Database system security
5. Application system security

1.7 Development and Application of Informatization

1.7.1 Features of informatization development and application

1. High speed and large capacity
2. Integration and platformization 3.
Intelligence 4.
Virtual computing
5. Communication technology
6. Remote sensing and sensing technology
7. Mobile smart terminals
8. People-oriented
9. Information security

1.7.2 National Informatization Development Strategy

1. China's informatization development goals
2. Main tasks and development priorities of China's informatization development

1.7.3 E-government

1. Construction principles:
2. E-government development goals
3. Application mode

1.7.4 E-commerce

1. Types of e-commerce
2. Structure and main points of e-commerce system
3. Standards of e-commerce

1.7.5 Integration of industry and information technology

1. The road to enterprise informatization and development
2. Strategic points for the development of enterprise informatization in China
3. Promote the deep integration of informatization and industrialization

1.7.6 Smart

1. The concept of intelligence

1.8 Information system service management

1.8.1 Information system service industry and its development P125

1.8.2 The concept and development of information engineering supervision

1. Why information systems need supervision
2. Contents of information system engineering supervision
3. Reasonable scope of information system engineering supervision

1.8.3 Concept and development of information system operation and maintenance

1.8.4 Standards and Frameworks for IT Service Management

1.9 Information system planning

1.9.1 Large Information System

1. Large scale
2. Cross-regional
3. Complex network structure
4. Multiple business types
5. Large data volume
6. Many users

1.9.2 Information system planning method

1. Information system planning principles
2. Information system planning process
3. Information system planning methods

1.9.3 Planning tools for information systems

1.10 The chief executive of the enterprise and its responsibilities

1. Provide assistance and help enterprises make decisions
2. Help enterprises formulate medium and long-term development strategies
3. Effectively manage IT departments
4. Formulate information system development plans
5. Establish positive IT culture

Guess you like

Origin blog.csdn.net/weixin_44934104/article/details/126744469