Advanced Search

Order Of 18 August 2005 Fixing The Program And The Nature Of The Tests Of Professional Reviews Of The Treatment Of Information Organized By The Ministry Of Defence

Original Language Title: Arrêté du 18 août 2005 fixant le programme et la nature des épreuves des examens professionnels portant sur le traitement de l'information organisés par le ministère de la défense

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

Information on this text




JORF no. 204 of 2 September 2005
text No. 4



Order of August 18, 2005 establishing the program and the nature of the professional examinations tests on the processing of information organized by the Ministry of Defence

NOR: DEFP0501167A ELI: https://www.legifrance.gouv.fr/eli/arrete/2005/8/18/DEFP0501167A/jo/texte


The Minister of Defence and the Minister of Public Service,
In light of amended Act No. 83-634 of 13 July 1983 on the rights and obligations of civil servants, together with amended Act No. 84-16 of 11 January 1984 on statutory provisions relating to the public service of the State;
In light of the amended Decree No. 71-342 of 29 April 1971 on the situation of officials assigned to the processing of information;
In light of the amended Decree No. 71-343 of 29 April 1971 on the functions and compensation of State officials and public institutions for the processing of information;
Having regard to the June 10, 1982 Order on Programs and the nature of the competitions and examinations related to the processing of information;
In view of the decision of 2 November 2004 setting out the terms and conditions of organization, the program and the nature of the examinations and competitive examinations related to the processing of information, including Article 1,
Stop:

Article 1 Learn more about this article...


The suitability check for the functions of Project Leader, Analyst, Chief Operating Officer and Operating System Programmer includes a single test, consisting of an oral test to allow the jury to assess whether the qualifications acquired by the applicant in the automated processing of information, its initial or continuing training course or its professional experience, correspond to those required to perform the function for which the applicant applies.
At least one month before the date for this trial, the candidate sends a report describing his qualifications to the jury; This report is accompanied by all evidence of the reality of the elements declared by the candidate in his report and a notice from the supervisor describing the duties performed by the candidate.
During the oral examination, the jury may question the candidate on his or her course and any questions to ensure that the candidate has the common knowledge, skills and abilities required to perform the job matching the qualification. These knowledge, skills and abilities are determined by reference to the knowledge program listed in the annex.
The duration of the test is fixed to:
- thirty minutes for the suitability verification examination for the functions of Project Leader and Analyst;
- twenty minutes for the fitness examination for operating system chief and programmer functions.
The test is rated from 0 to 20. Only candidates with a minimum rating of 10 out of 20 can obtain the qualification for which they apply.

Article 2 Learn more about this article...


The aptitude check for the functions of programmer and programmer chief includes a written test and an oral test.
For the function of programmer chief, the written test consists of a critical analysis of a program written in an advanced language chosen by the candidate on a list fixed by order of the Minister of Defence (duration: five hours; coefficient 5). The oral test consists of an interrogation on the program determined in the annex (duration: 30 minutes); coefficient 3).
For the programmer function, the written test consists of setting the algorithm (in the form of a flowchart) corresponding to the solution of a simple problem and writing the corresponding requested program sequences. The programming shall be carried out in an advanced language chosen by the candidate on a list set by order of the Minister of Defence (duration: five hours; coefficient 4). The oral test consists of an interrogation on the program determined in the annex (duration: 30 minutes); coefficient 2).
Each of the tests is rated from 0 to 20. Can only be allowed to undergo the oral examination of admission the candidates who, after the jury's deliberation, obtain a score of at least 10 out of 20 in the written test.
No one can receive the qualification if he does not get a score at least 10 out of 20 at the oral admission test.

Article 3 Learn more about this article...


The composition of the panel of professional examinations held for the above-mentioned functions in articles 1 and 2 shall be at least three members, including at least one category official A or assimilated specialized in the field of information processing.

Article 4 Learn more about this article...


The Director of Military and Civilian Personnel in the Ministry of Defence is responsible for the execution of this Order, which will be published in the Official Journal of the French Republic.

Annex


A N N E X E
FUNCTION PROGRAMME
I. - Project manager function
Organization within the Ministry of Defence


Department of Defence SIC Policy and Interdepartmentality.
Role of computer commissions.
Computer manager.
Urbanization of information systems.


Approach to information systems in the conduct of a project


Project driving methods (SDMS/S, RUP...).
Tools for manual control (modelization, documentation, piloting, tests...).
Phases of a project (preliminary study, detailed design, implementation, evaluation).
Involvement of the actors in the phases of the project (master's degree, master's degree).
Information system design methodology (MERISE, UML language...).
Recipe, drive of change.
Maintenance of computer projects, means of performance evaluation.


Planning of the IT project


Estimate, planning, charging and time frames.
Assess project risks.


Project funding


The main posts in the computer expenditure.
Estimate of project costs, calculation of return on investment.
Advantages and disadvantages of various acquisition opportunities (rental, purchase, leasing...).
Conditions of choice ERP/progiciel.


Security of information systems


Law and IT (law on the law of digital networks, law applied to the processing of personal data, the National Commission of Computer Science and Freedoms).
Problems and security management (material, software, information privacy).


Quality approach in IT projects
Public order


Procurement, dematerialization of public procurement.
General administrative clauses, specific technical clauses.
State Markets Commission.


Information and communication technologies


Internet, intranet, messaging.
Overview of new information processing techniques (web and multimedia, workflow, GED, dataware house and decision-making system, telematics, computer-assisted education...).
The main components of an EAI solution (integration of enterprise applications).


SI architectures


Systems and networks.
Distributed architectures (three third parties, client-server, role of servers...).
Characteristics of a portal.
Databases, languages, data integration (access to data).


Management techniques


Personnel assigned to the processing of information.
Organization and group work.
Manager in the world of IT and NTIC.
In addition, candidates may be questioned about the supposedly known program of professional examination of suitability for analyst functions.


II. - Analyst function
Method and organization


Methodology of information systems (MERISE, UML language).
Organization of the computer project (need analysis steps).
The terms of reference: role and responsibility of the actors (master's degree, master's degree, users, experts...).
The rational expression sheet for security objectives (FEROS) for projects dealing with sensitive or classified defense information.
Introduction to problems and security management (material, software, information confidentiality).
Introduction to public order (book of special technical clauses...).
Introduction to the law of computing (law of digital networks, treatment of personal data, the National Commission of Computer Science and Freedoms).
Software quality.


Analysis
Organization of the information system


Definition of the general organization of the service.
The information system in the organization.
Architecture and design of an information system.


Knowledge of MERISE and/or UML method
Analysis using the MERISE method


The study of the existing.
The conceptual model of communication.

Data modelling (conceptual, logical, data physics model).
Modelling of treatments.
Validation of data and treatments.
Expected functions of the new computer system (screens, states, controls, tables).


UML language analysis


Project Perimeter: Collaborative diagram.
Expression of functional need.
Expression of need IHM.
Description of business processes: case of use, diagrams (activity, transition state, sequence).
Information description: class-entity diagram, transition status diagram.
Diagnostic and reconfiguration.
Other models: component model, deployment model...


Software and hardware


Elements of operating systems and networks.
Technical architecture elements of information systems (three third parties, client-server, role of servers...).
Internet/intranet/messagerie.
Distribution, technical services and middleware, components, business programming.
Decision information system.
The basic concepts of the object approach.
Database architecture: data structure and use.
SQL languages, query editors, programming languages, graphical interfaces.
Development languages.


III. - Chief Operating Officer function
1. Management of an operating centre


General organization of an information processing centre:
- objectives and structure of a centre;
- relations between the center, users and manufacturers;
- roles and responsibilities of the various organs of a centre.


Averages


The staff:
- tasks and qualification;
- working standards and division of labour.
The equipment:
- the computer;
- the attached material;
- the technical environment;
- the easement, emergency energy, air conditioning...
- assessing the reliability of the equipment.
Safety of equipment and data, hygiene and safety of work.
Organization of premises.


Supply management


Work planning:
- development of the calendar;
- operating file;
- preparation, launch and sequence of work;
- operation monitoring, performance evaluations.


Management of information systems security


Organization and security management.
Configuration management: monitoring versions (documentation, sources, software).
Incident management.
Emergency and backup procedures.


2. Technology (material and software)


Computer architecture:
- central units;
- internal memory;
- external memory;
- input or output units (detailed features);
- the buses;
- channels.
Different types of machines:
- multiprocessors;
- monoprocessors;
- cluster networks.
General Systems Note:
- monoprogramming;
- multiprogramming;
- real time system;
- shared time;
- data transmission.
Data transmission networks:
- protocols;
- different types of network architecture.


Security of information systems


Vulnerability and hardware and software security.


3. Computer technology
Treatment organization: the main functions


Data organization:
- files;

- databases.
Information system design:
- objectives;
- computer plan.


4. Computer law


The law for confidence in the digital economy.


IV. - Operating system programmer function
1. Basic knowledge in computers


The representation of information (binary coding, hexa, arithmetic functions...).
Information supports (disquette, CD, USB flash drive...).
Computer architecture.
SGBD.
Programming languages.
Computer projects.


2. Network


The ISO layers.
TCP/IP protocol (IP address, TCP/UDP) TCP/IP.
The protocols.
VLAN, VPN.
Network services (DNS, DHCP...).
Client-server architecture.
The directories.


3. Operating systems
In-depth knowledge of an operating system


Process management.
Memory management.
The file management system.
Systems interconnection.


4. Security


The different types of attack.
Information systems security: key management infrastructure (IGC or PKI).
Software and hardware protection of a system.
Backups and restorations.


5. Computer law


Basic information on computer law.
The law for confidence in the digital economy.


V. Programmer leadership
1. Basic knowledge in computers


The representation of information (binary coding, hexa, arithmetic functions...).
Information supports (disquette, CD, USB flash drive...).
Computer architecture.
SGBD.
Operating systems.
Networks.
Client-server architecture.
Security.
Computer projects.


2. Programming
In-depth knowledge of advanced language


Organization of work:
- methods, structured/interactive programming;
- algorithms, modes of representation;
- compilation, links editions;
- unitary/non-regression tests;
- deployment;
- maintenance.
Data structure and their uses:
- files (sequential/sequential indexed);
- search (sequential, indexed).


Interface with BDD


The main treatments:
- update;
- controls;
- Sort.
The files:
- programming (technical file);
- test;
- the user;
- maintenance.


3. Computer law


General information on computer law (the National Commission for Information and Freedoms) and digital networks.
The law for confidence in the digital economy.


4. Management and animation of a team


Personnel assigned to the processing of information.
Organization and group work.


VI. - Programmer function
1. Basic knowledge in computers


The representation of information (binary coding, hexa, arithmetic functions...).
Information supports (disquette, CD, USB flash drive...).
Computer architecture.
SGBD.
Operating systems.
Networks.
Client-server architecture.
Security.
Computer projects.


2. Programming
In-depth knowledge of advanced language


Organization of work:
- methods, structured/interactive programming;
- algorithms, modes of representation;
- compilation, links editions;
- unitary/non-regression tests;
- deployment;
- maintenance.
Data structure and their uses:
- files (sequential/sequential indexed);
- search (sequential, indexed).


Interface with BDD


The main treatments:
- update;
- controls;
- Sort.
The files:
- programming (technical file);
- test;
- the user;
- maintenance.


3. Computer law


General information on computer law (the National Commission for Information and Freedoms) and digital networks.
The law for confidence in the digital economy.


Done in Paris, 18 August 2005.


The Minister of Defence,

For the Minister and by delegation:

By preventing the director

Military and civilian personnel:

Deputy Director

staff management,

B. Puybertier

The Minister of Public Service,

For the Minister and by delegation:

By preventing the Director General

Administration and Public Service:

The civil administrator,

P. Coural




Download the document in RTF (weight < 1MB) Extrait du Journal officiel électronique authentifié (format: pdf, weight : 0.28 Mo) Download the document in RDF (format: rdf, weight < 1 MB)