1. Exam instructions (1) Be familiar with the composition of computer systems and the main basic performance indicators, and master installation and configuration methods; (2) Master the basic knowledge of operating systems, database systems, computer networks and their The installation, configuration and use of commonly used systems (3) Familiar with the installation, configuration and use of multimedia equipment and electronic office equipment (4) Familiar with the installation, configuration and use of commonly used office software (5) Understand the basic knowledge of informatization and information system development (6) Be proficient in basic information processing operations (7) Master the basic methods and techniques of information system operation and management (8) Understand common information technology standards, information security and basic knowledge of relevant laws and regulations (9) Correctly read and understand computer usage Common simple English 2. Qualified personnel who pass this exam can skillfully and safely manage the operation and management of information systems, install and configure related equipment, skillfully perform information processing operations, and record information systems under the guidance of information system management engineers. Operation documents can correctly describe abnormal situations that occur during the operation of the information system, have certain problem acceptance and troubleshooting capabilities, and can handle common problems that occur during the operation of the information system; have the actual working ability and professional level of an assistant engineer (or technician) . 3. The subjects set for this examination include: Basic knowledge of information systems (elementary level), the examination time is 150 minutes, written examination, multiple choice questions; Information system operation management (applied technology), the examination time is 150 minutes, written examination, question and answer questions.
2. Exam Scope Examination Subject 1: Basic Knowledge of Information Systems (Elementary) 1. Basics of Computer Science · Binary, decimal and hexadecimal numbers, on-machine representation of integers and real numbers, precision and overflow · On-machine representation of characters and Chinese characters Representation, in-machine representation of sounds and images · Parity check code 2. Basic knowledge of computer systems 2.1 Basic knowledge of computer hardware 2.2.1 Semiconductors, large-scale integration and their hierarchical mechanisms 2.1.3 Types and characteristics of computers · Micro, workstation, Servers, minicomputers, mainframe computers, supercomputers 2.1.4 Central processing unit CPU ·Arithmetic unit, controller, commonly used registers ·CPU performance 2.1.5 Main memory and tutorial ·Memory system ·Types and characteristics of main memory ·Concept of Cache and functions·Types and characteristics of auxiliary equipment·Concept of virtual memory 2.1.6 I/O interface and I/O equipment·I/O interface concept·Types and characteristics of I/O equipment·I/O control mode: interrupt control , DMA 2.1.7 Power supply equipment, UPS 2.2 Basic knowledge of computer software 2.2.1 Basic knowledge of operating systems · Types and functions of operating systems · Architecture of operating systems · Relationship between operating systems and hardware platforms · Processor management, storage management, Basic concepts of equipment management, file management, and job management · Characteristics of commonly used operating systems and their installation, configuration and use · Chinese character processing · Graphical user interface and its operation methods 2.2.2 Hierarchical structure of computer software 2.3 Basic knowledge of computer networks · Computer network Function, classification, composition and topology·Basic network protocols and standards: OSI/RM, TCP/IP·Basic knowledge of LAN·Common network equipment, communication equipment and their connection methods and connection media·Basic knowledge of network operating systems, commonly used networks Installation, configuration and use of operating system·Client/Server structure, multi-layer structure of Browser/Server structure·Internet basic knowledge 2.4 Basic knowledge of database·Basic concepts of database system·Main functions and features of database management system·Database language (SQL) ·Installation, configuration and use of commonly used database management systems 2.5 Systematic indicators ·Concepts of response time, throughput, job turnaround time ·Reliability (utilization, MTBF, MTTR, availability, failure rate), maintainability, scalability Concepts of portability, portability and security 2.6 Basic knowledge of computer applications · Information management, data processing, auxiliary design, automatic control, scientific computing, artificial intelligence, remote communication service concepts · Basic knowledge of multimedia applications 3. Information and information systems Basic knowledge·Concept and characteristics of information·Concept of system·Concepts and types of information systems·Processing forms of information systems: centralized, decentralized, batch processing, real-time processing, web-based computing·Common information systems·Each stage of information system development Goals and tasks · Information system project management knowledge · Software quality knowledge · Intellectual property rights: Copyright law, patent law, key points of computer software protection regulations · Confidentiality law, information system security protection regulations · Internet etiquette · Distance education, e-commerce, e-government knowledge · Common sense of enterprise information resource management 4. Basic knowledge of information system operation and management · Goals and tasks of system operation and management · System operation and management personnel and their responsibilities · System operation and management rules and regulations · System operation and management related files and their main contents · System common How to deal with faults and common security issues·System backup and recovery methods·Basic concepts of system maintenance·Content and types of system maintenance work·Characteristics of system maintenance work·System maintainability·Organization and management of system maintenance·System review Basic concepts 5. Basic knowledge of information security·Basic concepts of information security, types of security hazards·Information security strategies (protection, backup, redundancy)·Commonly used security protocols (SET, SSL)·Access control (passwords, access rights) , Firewall, intrusion detection·Basic knowledge of encryption and decryption·Authentication (digital signature, identity authentication)·Prevention and treatment of computer viruses
, Prevention of computer crime·Protection of private information·Disaster prevention, environmental security·Information security rules and regulations 6. Basic knowledge of standardization·Basic concepts of standardization and standardization agencies·International standards, national standards, industry standards, basic concepts of enterprise standards·Coding standards , basic knowledge of file format standards, security standards, software development specifications and document standards 7. Basic knowledge of computer rooms and information system support systems · Power supply system (UPS, multi-channel power supply, distribution system, etc.) · Air conditioning system (computer room air quality, Temperature, humidity) · Ground system · Lightning protection system · Fire protection, access control, monitoring and alarm system 8. Professional English · Correctly read and understand simple English common in computer use Exam subject 2: Information system operation management (applied technology) 1 , System operation administrator's support for information system development 1.1 Support for system analysis and design · Provide opinions on the data format in the user requirements specification · Provide opinions on the operation interface in the software external specifications 1.2 Support for system testing · Participate in test data Preparation and test case design·Participation in test implementation: error curve, convergence, error embedding method, error control Figure 1.3 System conversion·System upgrade·System conversion tasks·System conversion method·Document management during system conversion process ( Document consistency, document update procedures) ·System operations during the system conversion process (job scheduling, data input and output control, operation manual) ·Implementation of system conversion (preparation for operation, trial operation, version management) 2. System installation and Configuration 2.1 Computer environment settings 2.2 Installation, connection and configuration of local area network 2.3 Enterprise intranet and Internet connection 2.4 Installation of commonly used operating systems · Operating system installation process · Configuration of operating system parameters · Installation and parameter configuration of external devices (installation of drivers) ·Configuration of network operating system parameters 2.5 Installation and configuration of office software, email system, database management system, and common tool software 2.6 Adding users, modifying user parameters, deleting users, and performing permission management for operating systems, database systems, and email systems 3. Information system operation management and maintenance 3.1 Daily operations · Understand and execute the information system operation procedures · Perform daily data processing and data verification according to business requirements · Perform daily operations on each input and output device in the system according to operating specifications · Follow operations The manual handles common problems · Writing system operation logs · Reporting system abnormalities · Website operation and maintenance 3.2 Management of information equipment · Hardware resource management · Software resource management (software library management, version management) · Network resource management · Document management (manuals, Management of electronic documents and operation logs), document management system and modification procedures, document security protection 3.3 Data management and protection·File management: file organization, directory management·Data protection management: concurrency control, exclusive control, fault recovery , post-disaster recovery, roll-forward transactions, roll-back transactions, backup and recovery · Access management (access permissions, passwords) · Data resource management 3.4 Resource usage status management · Dynamically monitor information system resource usage · Management of storage media, documents, Management of software·Management of users 3.5 Monitoring and handling of faults·Types of faults·Fault prevention strategies: system operation sequence, system monitoring and maintenance methods, disaster prevention countermeasures, UPS, dual processing·Handling of common faults: system Fault management (fault handling measures, recovery processing process), emergency handling (differentiation of emergencies, emergency handling, backup measures, recovery operations, fault recording and reporting 3.6 System maintenance, software maintenance, hardware maintenance, maintenance according to contract 3.7 Security Management·Manage domains, workgroups, user groups and users·Security policy and user role management·Security management of file volumes·Strategies and techniques for system backup and information backup·Prevention of security hazards: encryption and decryption (public key, Key), authentication (digital signature, identity authentication, user verification), access management (access rights, password), confidential information management (entry and exit control, leakage prevention measures), firewall, security
Protocol (SSL, SET), computer virus prevention, security measures, security measures, anti-break-in, information backup, security hazard countermeasures: computer virus detection, audit trail, illegal computer access countermeasures, IP address and location check, fault Isolation, fault recovery, data recovery 4. Use of common software 4.1 Use of common operating systems 4.2 Use of common office software · Use of word processing software · Use of spreadsheet software · Use of drawing tool software · Use of email system · Documentation Use of Demonstration Software 4.3 Use of Commonly Used Database Management Systems 3. Examples of Question Types (1) Multiple Choice Questions·The recording of system operation logs is not protected. A. Quantity and quality of information services B. System maintenance C. Technology used in the system D. System failure (2) Questions and Answers Errors often occur when entering a large amount of data, and data errors have a negative impact on the efficiency and image of the enterprise. There is a serious impact, so necessary data verification measures have to be taken. Based on your experience, please list three commonly used verification measures and explain the situations in which these measures are applicable.