Syllabus IP Ver4.0 WithDiff Unlocked
Syllabus IP Ver4.0 WithDiff Unlocked
IT Passport Examination
(Level 1)
Syllabus
Version 4.0
Changes from Version 3.0 are shown in red and enclosed in rectangles in this edition.
Corporate names or product names used in this syllabus are trademarks or registered trademarks of each company.
® and TM are not used in the syllabus.
◆Strategy◆
MAJOR CATEGORY 1: CORPORATE AND LEGAL AFFAIRS .................................................................................... 3
MIDDLE CATEGORY 1: CORPORATE ACTIVITIES ................................................................................................ 3
1. Management and organization theory ...................................................................................................... 3
2. OR and IE ................................................................................................................................................ 4
3. Accounting and financial affairs .............................................................................................................. 4
MAJOR CATEGORY 1: CORPORATE AND LEGAL AFFAIRS ....................................................................................... 6
MIDDLE CATEGORY 2: LEGAL AFFAIRS ..................................................................................................................... 6
4. Intellectual property rights ....................................................................................................................... 6
5. Laws on security ...................................................................................................................................... 6
6. Laws on labor and transaction ................................................................................................................. 7
7. Other laws, guidelines, and engineer ethics ............................................................................................. 9
8. Standardization ........................................................................................................................................ 9
- i -
◆Technology ◆
MAJOR CATEGORY 7: BASIC THEORY ....................................................................................................................... 30
MIDDLE CATEGORY 13: BASIC THEORY ............................................................................................................... 30
33. Discrete mathematics ............................................................................................................................. 30
34. Applied mathematics ............................................................................................................................. 30
35. Theory of information ............................................................................................................................ 30
MAJOR CATEGORY 7: BASIC THEORY .......................................................................................................................... 32
MIDDLE CATEGORY 14: ALGORITHM AND PROGRAMMING.............................................................................. 32
36. Data structure ......................................................................................................................................... 32
37. Algorithm............................................................................................................................................... 32
38. Programming and programming languages ........................................................................................... 32
39. Other languages ..................................................................................................................................... 33
- ii -
Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2015
53. Multimedia application .......................................................................................................................... 43
MAJOR CATEGORY 9: TECHNOLOGY ELEMENT.................................................................................................... 45
MIDDLE CATEGORY 21: DATABASE ........................................................................................................................ 45
54. Database architecture ............................................................................................................................. 45
55. Database design ..................................................................................................................................... 45
56. Data manipulation .................................................................................................................................. 46
57. Transaction processing .......................................................................................................................... 46
MAJOR CATEGORY 9: TECHNOLOGY ELEMENT.................................................................................................... 47
MIDDLE CATEGORY 22: NETWORK ........................................................................................................................ 47
58. Network architecture ............................................................................................................................. 47
59. Communications protocol ...................................................................................................................... 47
60. Network application............................................................................................................................... 48
MAJOR CATEGORY 9: TECHNOLOGY ELEMENT.................................................................................................... 49
MIDDLE CATEGORY 23: SECURITY ......................................................................................................................... 49
61. Information security............................................................................................................................... 49
62. Information security management ......................................................................................................... 50
63. Information security measures and information security implementation technology .......................... 51
- iii -
Syllabus
Major category
Middle category
1
“Outline of IT Engineers Examination” 7. Scope on the test
http://www.jitec.ipa.go.jp/1_04hanni_sukiru/_index_hanni_skill.html
-1-
-2-
-3-
[Description]
✓ For corporate activities or business management, understand the meanings and concepts of basic terms
about accounting and financial affairs, such as a break-even point, and utilize them in familiar business
tasks.
-4-
-5-
5. Laws on security
[Goal]
➢ Understand the outline of typical laws on security.
[Description]
✓ Understand the outline that there is a law defining the basics policies regarding the national cyber
security (Basic Act on Cyber Security).
✓ Understand that there is a law governing unauthorized access (Act on the Prohibition of
Unauthorized Computer Access) that can punish even if there is no actual damage.
✓ Understand the outline of various laws on information security.
-6-
[Description]
✓ Learn that there are laws on labor and transaction to improve various conditions associated with
labor and transaction, and understand their outlines.
-7-
-8-
(1) Compliance
・in order to support improvements in compliance by companies or the like, the codes of ethics
that should be observed in addition to laws in performing business tasks
(2) Information ethics
・the legal imperatives and social norms that you should comply with in an information society,
such as protection of intellectual property, personal information, and privacy, as well as morals
and netiquette
(3) Corporate governance
・the practical approaches to corporate governance to improve the health of management
activities for winning the trust of customers and markets
Sample terms Whistleblower Protection Act, internal control reporting system
8. Standardization
[Goal]
➢ Understand the significance of standardization.
[Description]
✓ Understand that standardization organizations and industrial organizations, such as ISO and IEC,
standardize for compatibility, and recognize the significance of the activity, along with familiar
examples of standardization.
(1) Standardization
・the need and significance of standardization
Sample terms De facto standard
(2) Examples of the standardization in IT
・the examples and the characteristics of familiar standardizations in IT
Sample terms bar code, JAN (Japanese Article Number) code, QR Code
-9-
- 10 -
10. Marketing
[Goal]
➢ Understand the fundamental concepts relevant to marketing.
[Description]
✓ Learn the existence and purpose of marketing, and understand the concepts of using information in
marketing by collection and analysis of related data.
- 11 -
[Description]
✓ Understand the techniques aiming at target setting and evaluation as the typical information
analysis techniques for planning business strategies.
(1) Information analysis techniques for business strategy planning and evaluation
・the fundamental information analysis techniques and terms for target setting and evaluation
about planning of business strategies
・the missions as the corporate philosophy and the visions as what the company wants to be
Sample terms BSC (balanced score card), CSF (critical success factors), KGI (Key Goal
Indicator), KPI (Key Performance Indicator), value engineering
Sample usage job analysis using the fundamental information analysis techniques
[Description]
✓ Learn that there is a business management system to perform business management effectively and
understand its fundamental concepts.
- 12 -
[Description]
✓ Understand that technology development is promoted by the road map created based on the
prediction of technology trends.
- 13 -
[Description]
✓ Understand the characteristics and concepts of typical engineering systems to understand the
system usage situation in the engineering field.
- 14 -
16. e-business
[Goal]
➢ Understand electronic commerce and the characteristics of typical systems.
[Description]
✓ The characteristics, including risks, to understand familiar electronic commerce using a network.
[Description]
✓ In order to understand systems using IoT or embedded systems utilized in familiar appliances and
devices, understand its fundamental characteristics and examples.
- 15 -
- 16 -
[Description]
✓ Understand the significance and purpose of information system strategies planned to realize
business strategies and the concepts of strategic goals.
[Description]
✓ Understand the concepts of modeling the business process and considering its improvement plan
so that you can participate in a study of computerization of your assigned business tasks.
✓ Utilize computers and networks effectively to improve business and facilitate communication.
- 17 -
[Description]
✓ In order to understand the concepts of solutions, learn the offering methods and sample usage of
typical solutions.
- 18 -
- 19 -
[Description]
✓ Understand the purpose and process of computerization planning so that you can participate in a
study of computerization of your assigned business tasks.
[Description]
✓ Understand the purpose of operational requirements definition, so that you can participate in a
study of computerization of your assigned business tasks.
✓ Understand how to proceed the analysis of assigned business tasks, identification and organization
of data, and utilize it
[Description]
✓ Understand the fundamental flow of procurement so that you can participate in a study of
computerization of your assigned business tasks.
- 20 -
(5) Estimate
・an estimate is a document that shows the cost concerning development, operation, and
maintenance of the system and it is important to select suppliers and check the details of the
order
- 21 -
(c) Programming
・a program is created according to the system design
・a unit test is performed to verify whether there are any errors (bugs) in each program created
Sample terms coding, white box test, debug, code review
Sample usage creation and analysis of test data
(d) Testing
・programs are consolidated after the unit tests are completed and verified whether the software
or system works as specified
・it is necessary to learn that there is a cycle of planning, implementation, and evaluation in a
test, and to evaluate the gap between target and achievement in testing
Sample terms integration test, system test, operational test, black box test, regression test
- 22 -
- 23 -
- 24 -
[Description]
✓ In order to promote a system development project smoothly, understand the overall fundamental
knowledge of project management.
- 25 -
[Description]
✓ Understand that the activities for operating an information system stably and efficiently and
maintaining or improving the quality of service to users are required.
✓ Learn that IT service management exists as the method of operations management for that purpose,
and understand its significance, purpose, and concepts.
- 26 -
[Description]
✓ Understand that there is facility management as a concept for a company or the like to maintain
system environment at the best state.
- 27 -
(1) Audit
・the purpose and types of audits
Sample terms accounting audit, operations audit, information security audit, system audit
(2) System audit
・the purpose of system audit, and the fundamental flow of the process in system audit
(a) Purpose of system audit
・the purpose of system audit is to investigate the information system from a broad viewpoint
and to judge whether the system contributes to management, independently of audited
departments
(b) Process flow in system audit
・the process of system audit includes various activities such as overall check of an information
system, evaluation, explanation of the result to the management, advice and check for
improvement, and follow-up
Sample terms system auditor, system audit standards, system audit planning, preliminary
audit, main audit, audit evidence, system audit report
- 28 -
- 29 -
[Description]
✓ In order to know fundamental theories about numeric values and data handled by computers,
understand the fundamental concepts of the representation and operation of binary numbers, sets,
and logical operations.
[Description]
✓ Understand the fundamental concepts of probability, statistics, and queueing theory required for
collection, analysis, and processing of data.
- 30 -
[Description]
✓ In order to know fundamental theories about numeric values and data handled by computers,
understand how to express information content, the concept of digitization, and representation of
characters.
- 31 -
37. Algorithm
[Goal]
➢ Understand the fundamental concepts and expressions of algorithms and flowcharts.
[Description]
✓ Understand the fundamental concepts and expressions of algorithms and flowcharts so that you
can analyze operations and perform computerization.
✓ Understand creation of simple algorithms and flowcharts
(1) Flowchart
・the symbols and the expressions of procedures in flowcharts
・how to create flowcharts
- 32 -
[Description]
✓ Understand the types and characteristics of the typical markup languages widely used as means of
expression in computers.
✓ Understand the simple usage (including writing) in using markup languages.
- 33 -
40. Processor
[Goal]
➢ Understand the fundamental configuration and roles of computers.
[Description]
✓ Understand the fundamental components composing computers, and the concepts of the
mechanism, functions, and performance of the processor, which is the core of the computer
system.
41. Memory
[Goal]
➢ Understand the types and characteristics of memory.
➢ Understand the types and characteristics of storage media.
[Description]
✓ Learn that there are various types of computer memory, which have various roles, and understand
the types and characteristics of storage media and the concepts of storage hierarchy.
(1) Memory
・the characteristics such as differences of memory capacity and access speed by types of
memory
Sample terms RAM, ROM, volatile memory, nonvolatile memory (flash memory)
- 34 -
[Description]
✓ In order to utilize familiar information devices including IoT systems, understand the types and
characteristics of input/output interfaces. In addition, understand that device drivers are required
to utilize them.
- 35 -
[Description]
✓ Learn that there are various configuration methods in terms of the processing modes and the
utilization in system configurations. Understand the examples of typical systems and the
fundamental characteristics of the client/server system, one of the distributed processing systems.
- 36 -
- 37 -
[Description]
✓ Understands OSs in terms of management and utilization of computer systems, and understand the
characteristics of each of the typical types.
[Description]
✓ From a viewpoint of utilizing a system in an office, understand the concepts of file management
and how to use fundamental functions.
✓ Understand the concepts, such as the necessity for backup and generation management, in
preparation for damage of the files by operational errors and system failures.
- 38 -
[Description]
✓ Understand the characteristics of software packages, such as word processing software and
spreadsheet software, and understand the fundamental operations for utilizing them in business
tasks.
- 39 -
- 40 -
[Description]
✓ Understand the types and characteristics about typical hardware, such as computers including PCs
and I/O devices including a keyboard, a mouse, a display, and a printer, which make up an
information system.
(1) Computer
・the types and characteristics of typical computers
Sample terms PC, server, general purpose computer, personal digital assistant, tablet
terminal, wearable device, smart device
(2) I/O device
・the types and characteristics of typical I/O devices
Sample terms keyboard, mouse, tablet, image scanner, touch panel, bar code reader, display,
printer, projector, Web camera, 3D printer
- 41 -
[Description]
✓ Understand the characteristics of human interfaces and the characteristics of each component of
GUI, which is the typical human interface.
[Description]
✓ Understand that the interface used as the contact point between users and systems has a great effect
on ease of use and understanding a lot, and understand the concepts of desirable interfaces.
- 42 -
[Description]
✓ Understand that information, including characters, sounds, and images, can be handled in
computers in an integrated manner by means of multimedia technology.
✓ Understand the characteristics of typical file formats for multimedia, and information compression
and decompression.
(1) Multimedia
・multimedia digitizes (encodes) the various forms of analog information, such as sound and
image (static image and video), as well as text, and handles them in an integrated manner on
computers
Sample terms Web contents, hypermedia, streaming, DRM (Digital Rights Management),
CPRM (Content Protection for Recordable Media), HTML5
(2) File formats for multimedia
・the characteristics of the main file formats used in sound processing, static image processing,
and video processing
Sample terms MP3 (MPEG Audio Layer-3), MIDI (Musical Instrument Digital Interface),
JPEG (Joint Photographic Experts Group), GIF (Graphics Interchange
Format), PNG (Portable Network Graphics), MPEG (Moving Picture Experts
Group), PDF (Portable Document Format)
(3) Compression and decompression of information
・The compression/decompression methods are used for large sound, image, and video data
according to the types of media
・the purpose of compression includes the reduction of data storage and network load
Sample terms ZIP, LZH, compression ratio, lossless compression, lossy compression
[Description]
✓ Understand the characteristics of graphics processing as a technique for representation and
understand that there are various application areas of multimedia technology.
- 43 -
- 44 -
[Description]
✓ Note that a database is an important means for representing business tasks in terms of information
(data), and that a database management system stores data structurally, maintains consistency, and
is equipped with the functions for extracting it efficiently. In addition, understand the
significance, purpose, and concepts of database.
(1) Database
・the purpose and characteristics of database and the concepts of the database model
・the analysis method of big data
(2) Database management system
・the significance, purpose, and concepts of a DBMS (Database Management System) from a
viewpoint of usage in familiar business tasks
Sample terms RDBMS, NoSQL
[Description]
✓ Understand the necessity of analysis and design for data and its fundamental process.
- 45 -
[Description]
✓ Understand data manipulation required to utilize relational databases.
[Description]
✓ Understand that it is necessary to maintain the consistency of a database under the exclusive
control and recovery functions, in preparation of inquiring and updating data by multiple users.
- 46 -
[Description]
✓ Understand that a communication protocol is required to communicate between different system
environments.
✓ Understand the roles of the typical protocols used on the Internet.
(1) Communication protocol
・it is necessary to perform transmission in accordance with common rules to deliver information
between the sender and the receiver
・the characteristics of communication protocols used for IoT systems
- 47 -
- 48 -
[Description]
✓ Understand that information security is required to collect and utilize information safely.
✓ Understand the types of threats, the fundamental ways of coping with them, and vulnerabilities.
✓ Understand typical of attack methods, and ways of coping with them.
(d) Vulnerabilities
・the outline of vulnerabilities, such as defects in information security in information systems,
inadequate arrangement of conduct codes in an organization, and incomplete compliance with
the codes among employees
Sample terms bug, security hole, human vulnerability, shadow IT
- 49 -
- 50 -
[Description]
✓ To take necessary measures appropriately against various threats to information security,
understand and take fundamental measures in terms of human, technical, and physical securities.
✓ Understand the roles of technologies, such as encryption, authentication, and public key
infrastructure required to maintain information security.
✓ Understand the items recommended in various guidelines to ensure information security for IoT
systems.
- 51 -
- 52 -