Advanced Search

Royal Decree 628/2013, August 2, Is Establishing Four Certificates Of Professionalism Of The Professional Family Computing And Communications That Are Included In The National Repertory Of Professional Certificates And Are Updated...

Original Language Title: Real Decreto 628/2013, de 2 de agosto, por el que se establecen cuatro certificados de profesionalidad de la familia profesional Informática y comunicaciones que se incluyen en el Repertorio Nacional de certificados de profesionalidad y se actualizan...

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

TEXT

Law 56/2003, of 16 December, of Employment, establishes, in Article 3, that it corresponds to the Government, on a proposal of the current Ministry of Employment and Social Security, and prior report of this Ministry to the Sectoral Conference of Employment and Industrial Affairs, the elaboration and approval of the regulatory provisions in relation to, among others, occupational and continuing vocational training in the State field, as well as the development of such management.

Article 26.1 of Law 56/2003 of 16 December 2003, following the amendment by Royal Decree-Law 3/2011 of 18 February 2011 of urgent measures for the improvement of employability and reform of policies In the field of employment, it is concerned with the vocational training subsystem for employment, in which, since the entry into force of Royal Decree 395/2007 of 23 March, which regulates it, the arrangements for vocational training in the field of employment have been integrated labour-training and continuing training. This sub-scheme, according to the legal framework and in accordance with the provisions of the Organic Law of 19 June, on Qualifications and Vocational Training, will be carried out in the framework of the National Qualifications and Training System. Professional and the National Employment System.

For its part, the Organic Law of June 19, aims at the creation of a National System of Qualifications and Vocational Training understood as the set of instruments and actions necessary to promote and to develop the integration of vocational training offers and the assessment and accreditation of professional skills. The main instruments of this System are the National Catalogue of Professional Qualifications and the procedure for recognition, evaluation, accreditation and registration of the same. Article 8 of the Organic Law of 19 June provides that certificates of professional competence prove the professional qualifications of those who have obtained them and that they will be issued by the competent administration, with a view to official and valid throughout the national territory. In addition, Article 10.1 indicates that the General Administration of the State, in accordance with the provisions of Article 149.1.1., 7. and 30. of the Constitution and after consulting the General Council of Vocational Training, shall determine the qualifications and certificates of professionalism, which shall constitute the offers of vocational training referred to in the National Catalogue of Professional Qualifications.

The National Catalogue of Professional Qualifications, according to Article 3.3 of Royal Decree 1128/2003 of 5 September, which regulates the National Catalogue of Professional Qualifications, in the wording given to the By the same token, Royal Decree 1416/2005 of 25 November provides the basis for drawing up the training offer leading to the acquisition of vocational training qualifications and certificates of professionalism and the modular training offer. the cumulative associated with a competition unit, as well as other training offers adapted to collectives with specific needs. In accordance with Article 8.5 of the same royal decree, the training offer of certificates of professionalism shall be in accordance with the minimum quality indicators and requirements which guarantee the fundamental aspects of a system. training, to be established by mutual agreement between the educational and labour administrations, after consultation of the General Council for Vocational Training.

Royal Decree 34/2008 of 18 January, which regulates certificates of professionalism, defines the structure and content of certificates of professionalism, from the National Catalogue of Qualifications Professionals and guidelines established by the European Union, and it is established that the Public Service of State Employment, with the collaboration of the National Focal Points, will prepare and update the certificates of professionalism, which will be approved by royal decree.

Law 3/2012, of 6 July, of urgent measures for the reform of the labour market, whose antecedent is the Royal Decree-Law 3/2012, of February 10, introduces measures for the improvement of the training offer, and of the quality and efficiency of the vocational training system. In particular, it amends the regulation of the contract for training and learning contained in Article 11 (2) of the recast of the Law of the Workers ' Statute, establishing that the qualification or professional competence acquired through this contractual modality may be subject to accreditation as provided for in the Organic Law of 19 June, and its implementing regulations, by issuing, among other means, the corresponding certificate of professionalism or, where appropriate, a cumulative partial accreditation. This contract has been developed by Royal Decree 1529/2012 of 8 November, for which the contract for training and learning is developed and the foundations of dual vocational training are established. In addition, in order to make changes to the regulation of certificates of professionalism in relation to the new contract for training and learning, dual vocational training, as well as in relation to its supply and implementation and those aspects that give quality assurance to the system has been approved the Royal Decree 189/2013, of 15 March, for which the Royal Decree 34/2008 is amended, of January 18, that it regulates the certificates of professionalism and the real Decrees establishing certificates of professionalism dictated in their application.

Finally, it must be borne in mind that, according to the new Article 26 (10) of the Employment Law, introduced by Law 3/2012 of 6 July 2012, the training received by the worker during his professional career, according to the Catalogue of Professional Qualifications, you will be enrolled in a training account, associated with the Social Security membership number.

In this regulatory framework it is appropriate for the Government to establish four certificates of professionalism of the professional family Informatics and communications of the professional areas of Development and Communications, and which will be incorporated National Repertoire of certificates of professionalism by levels of professional qualification, taking into account the professional competence required by the productive activities, as set out in Article 4.4 and in Annex II to the Royal Decree 1128/2003 of 5 September, cited above.

Furthermore, this royal decree provides for the updating of the certificates of professionalism established as Annexes I, II, III, IV, V, VI, VII, VIII, IX, X, XI and XII of Royal Decree 1531/2011 of 31 October, and as Annexes I, II, III, IV, V, VI of Royal Decree 686/2011 of 13 May, and the repeal of Royal Decree 1597/1997 of 17 October 1997 establishing the certificate of professionalism of the occupation of an Application Programmer Computer.

In the process of drawing up this royal decree has issued report the General Council of Vocational Training, the General Council of the National Employment System and has been informed the Sectoral Conference of Employment and Labor.

In its virtue, on the proposal of the Minister of Employment and Social Security and after deliberation of the Council of Ministers at its meeting of August 2, 2013,

DISPONGO:

Article 1. Object and scope of application

This royal decree aims to establish four certificates of professionalism of the professional family Informatics and communications which are included in the National Directory of certificates of professionalism, regulated by the Royal Decree 34/2008 of 18 January, governing the certificates of professionalism. In addition, this royal decree updates the certificates of professionalism established as Annexes I, II, III, IV, V, VI, VII, VIII, IX, X, XI and XII of Royal Decree 1531/2011 of 31 October, and as Annexes I, II, III, IV, V, VI of the Royal Decree Decree 686/2011 of 13 May.

Such certificates of professionalism are official and valid throughout the national territory and do not constitute a regulation of professional practice.

Article 2. Certificates of professionalism that are established.

The certificates of professionalism that are established correspond to the professional family Informatics and Communications and are the ones listed below, the specifications of which are described in the following annexes:

Professional family: Informatics and Communications.

Annex I. Programming in managed application-Level 3 languages.

Annex II. Information management systems-Level 3.

Annex III. Second-level maintenance on radio communications systems-Level 3.

Annex IV. Programming with object-oriented languages and related databases-Level 3.

Article 3. Structure and content.

The content of each professionalism certificate responds to the structure set out in the following sections:

(a) In paragraph I: Identification of the certificate of professionalism.

(b) In paragraph II: Professional profile of the certificate of professionalism.

(c) In paragraph III: Training of the certificate of professionalism.

(d) In paragraph IV: Prescriptions of trainers.

e) In paragraph V: Minimum requirements for spaces, facilities and equipment.

Article 4. Requirements for access to the training of certificates of professionalism.

The requirements for access to the training of certificates of professionalism shall be those set out in Articles 5.5.c) and 20 of Royal Decree 34/2008 of 18 January.

Article 5. Trainers.

1. The requirements on training and professional experience for the delivery of certificates of professionalism are those set out in paragraph IV of each certificate of professionalism and must be complied with both in person and in person. the tele-training.

2. In accordance with Article 13.3 of Royal Decree 34/2008 of 18 January, they may be recruited as experts for the provision of certain training modules specified in paragraph IV of each of the Annexes to the certificates of professionalism, qualified professionals with professional experience in the field of the unit of competence to which the module is associated.

3. In order to prove the required teaching competence, the trainer or expert must be in possession of the certificate of professionalism of the occupational trainer or the certificate of professionalism of teaching of vocational training for employment. Training in the teaching methodology of adult vocational training shall be equivalent to the certificate of vocational training or the certificate of professionalism of vocational training for employment, provided that: that such training has been obtained until 31 December 2013.

The requirement set out in the preceding paragraph will be exempt:

(a) Those who are in possession of the official university degrees of graduate in Pedagogy, Psychopedagogy or Master in any of their specialties, of a graduate degree in the field of the Psychology or Pedagogy, or an official postgraduate degree in the fields mentioned above.

b) Those who hold an official university degree other than those referred to in the preceding paragraph and who are also in possession of the Certificate of Pedagogical Aptitude or Professional Specialization Didactics and the Certificate of Pedagogical Qualification. In addition, the holders of the Master's Master's degree for the exercise of the regulated Professions of the compulsory secondary education and the secondary school, vocational training and the official schools of the Languages and those who demonstrate the improvement of a training course equivalent to the pedagogical and didactic training required for those persons who, being in possession of a qualification declared equivalent for the purposes of teaching, cannot carry out the master's studies, established in the first provision of the Royal Decree 1834/2008, of 8 November, defining the conditions of training for the exercise of teaching in compulsory secondary education, the baccalaureate, vocational training and special training courses and establishing the conditions for the training of young people. specialties of secondary education teaching bodies.

(c) Those who credit a proven teaching experience of at least 600 hours in the last seven years in vocational training for employment or the education system. "

4. The tutors-trainers who provide training by means of tele-training, in addition to the specific requirements laid down for each certificate of professionalism, must comply with those laid down in Article 13.4 of the Royal Decree 34/2008, dated January 18.

Article 6. Contracts for training and learning.

The training inherent in contracts for training and learning shall be carried out on the basis of alternance with paid employment, in accordance with the terms laid down in the implementing rules.

Article 7. Training by tele-training.

The training modules which constitute the training of certificates of professionalism may be offered by tele-training in whole or in part, combined with in-person training, in the terms set out in the Royal Decree 34/2008 of 18 January.

Article 8. Centers authorized for your partition.

Training institutions and institutions that provide training to obtain a certificate of professionalism must comply with the provisions of Royal Decree 34/2008 of 18 January.

Article 9. Correspondence with vocational training qualifications.

The accreditation of the units of competence obtained through the improvement of the professional modules of the vocational training qualifications will provide the effects of exemption from the module or training modules of the certificates of professionalism associated with those competition units set out in this royal decree.

Single additional disposition. Equivalences with previous professionalism certificates.

The equivalence to all effects of the following certificate of professionalism is declared:

Certificates of professionalism to be repealed

Equivalent certificate of professionalism

Royal Decree 1597/1997, of 17 October, establishing the certificate of professionalism of the occupation of Computer Applications Programmer.

Programming in Management Application Structured Languages

Programming with language-oriented languages and relational databases

First transient disposition. Modification of training plans and training actions.

In the training plans and in the training actions that are already approved, pursuant to Order TAS 718/2008, of 7 March, for which the Royal Decree 395/2007, of 23 March, which regulates the subsystem of the vocational training for employment, in the field of supply training and laying down the regulatory basis for the granting of public subsidies for their financing, on the date of entry into force of this royal decree, which include: training associated with the certificate of professionalism which is now being repealed, such training may be replaced which is associated with the new certificate of professionalism declared equivalent in the single additional provision, subject to the authorization of the Administration which approved it and provided that the requirements of the trainers and the minimum requirements for spaces, facilities and equipment set out in the certificate.

Second transient disposition. Low in the Specialty File.

The specialty corresponding to the certificate of professionalism repealed will cause low in the file of specialties from the nine months after the entry into force of this royal decree. During this period, this certificate shall remain valid for the purposes specified in this royal decree. In any event, the training actions linked to this certificate must be initiated before the end of the nine-month period.

Transitional provision third. Request for the issue of the repealed certificates of professionalism.

1. Persons who, as provided for in the first transitional provision of Royal Decree 34/2008 of 18 January, have completed with a positive assessment the training associated with the certificate of professionalism which is hereby repealed, during the period of the same, they shall have a period of five years to request their expedition, to count from the entry into force of the present royal decree.

2. They may also apply for the issue within five years of completion with a positive assessment of the training of such a certificate of professionalism:

a) People who, having taken part of that formation during the actual decree that is now repealed, complete the same after their repeal.

b) Persons who undertake the training of this certificate of professionalism under the training plans and the training actions that are already approved at the date of entry into force of this royal decree, under the Order CAS 718/2008, dated March 7.

Transitional disposition fourth. Provisional accreditation of centres.

The training centres which at the entry into force of this royal decree were included in the registers of the competent and approved administrations to provide training in the field of training corresponding to the Certificate of professionalism, which is now repealed, will be considered as provisional accredited for the purposes of the imparting of the training action linked to the certificate of professionalism established in this royal decree and declared equivalent in the single additional provision, subject to the authorisation of the competent authority. This accreditation will have effect for one year from the entry into force of this royal decree and until the finalisation, if any, of the approved training action. After this period, in order to be able to provide training aimed at obtaining the certificate of professionalism established in this royal decree, the training centres must ask the competent authorities for their accreditation, which must comply with the requirements laid down in the certificate.

Single repeal provision. Regulatory repeal.

Royal Decree 1597/1997 of 17 October 1997 is hereby repealed, establishing the certificate of professionalism of the occupation of the Computer Applications Programmer.

Final disposition first. Competence title.

This Royal Decree is dictated by the powers conferred on the State in Article 149.1.1., 7. and 30. of the Spanish Constitution, which attributes to the State exclusive competence for the regulation of the basic conditions guaranteeing the equality of all Spaniards in the exercise of rights and in the fulfilment of constitutional duties; labour law; and the regulation of conditions for obtaining, issuing and approving of academic and professional qualifications and basic standards for the development of Article 27 of the Constitution, in order to ensure compliance with the obligations of the public authorities in this field.

Final disposition second. Update of the certificates of professionalism established in Royal Decree 1531/2011 of 31 October, establishing twelve certificates of professionalism of the professional family Informatics and communications which are included in the National Repertoire of Certificates of Professionalism.

According to the provisions of Article 7 of Royal Decree 34/2008 of 18 January, we proceed to the updating of the certificates of professionalism established in Royal Decree 1531/2011 of 31 October 2011, for which the establish 12 certificates of professionalism of the professional family computer and communications, which are included in the National Repertoire of Professional Certificates, in the following terms:

One. The certificates of professionalism established as "Annex I Clothing and publication of web pages", "Annex II Operation of computer systems", "Annex III Operation of departmental networks", "Annex IV Operation in systems of systems" are amended. voice and data communications "," Annex VII Management of voice and data networks "," Annex VIII Development of applications with web technology "," Annex IX Management and monitoring of alarms in communications networks "and" Annex XII Administration and programming in enterprise resource planning and customer relationship management systems " replacing the table set out in section V Minimum requirements for spaces, facilities and equipment, for which the following is specified:

Formative space

Surface m215 pupils

Surface m225 students

45

75

Two. The certificate of professionalism established as 'Annex V first level maintenance in radio communications systems' is amended by replacing the table in section V. Minimum requirements for spaces, installations and equipment, which is then specified:

Formative space

Surface m215 pupils

Surface m225 pupils

Aula workshop on radio communications

65

110

Three. Certificates of professionalism established as "Annex VI Database administration," Annex X Management and design of departmental networks "and" Annex XI Management of computer systems " are amended by replacing the table in the Section V Minimum requirements for spaces, facilities and equipment, for which the following is specified:

Formative space

Surface m215 pupils

Surface m225 students

workshop

65

110

Final disposition third. Update of the certificates of professionalism established in Royal Decree 686/2011 of 13 May, establishing six certificates of professionalism of the professional family Informatics and communications which are included in the National Repertoire of Certificates of Professionalism.

According to the provisions of Article 7 of Royal Decree 34/2008 of 18 January, we proceed to the updating of the certificates of professionalism established in Royal Decree 686/2011 of 13 May, for which they are established six certificates of professionalism of the professional family computer and communications, which are included in the National Directory of Professional Certificates, in the following terms:

One. Certificates of professionalism established as "Annex I Microcomputer systems", "Annex III Computer security", "Annex IV Implementation and management of computer elements in domotic/inmotic systems, access control systems" are amended. and presence and video surveillance "," Annex V Administration of Internet Services "and" Annex VI Programming of computer systems ", replacing the table set out in section V Minimum requirements for spaces, installations and equipment, by the which is then specified:

Formative space

Surface m215 pupils

Surface m225 students

45

75

Two. The certificate of professionalism established as 'Annex II Assembly and repair of microcomputer systems' is amended by replacing the table set out in section V Minimum requirements for spaces, installations and equipment, for which The following is specified:

Formative space

Surface m215 pupils

Surface m225 pupils

45

75

Microcomputer Equipment Workshop Classroom

65

110

Three. The certificate of professionalism set out in Annex III Computer security is amended by replacing the table set out in section IV of the trainers ' descriptions, which is specified below:

modules

Accreditation required

* Professional experience required in the scope of the competency

MF0486_3 Computer Security.

• Licensed, Engineer, Architect, or Title of a corresponding degree or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree title or other equivalent titles.

1 year

MF0487_3 Computer security auditing.

• Licensed, Engineer, Architect or corresponding degree of degree or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree title or other equivalent titles.

1 year

MF0488_3 IT security incident management.

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree title or other equivalent titles.

1 year

MF0489_3 Secure data access and transmission systems.

• Licensed, Engineer, Architect or corresponding degree of degree or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree title or other equivalent titles.

1 year

MF0490_3 Management of services in the computer system.

• Licensed, Engineer, Architect or corresponding degree of degree or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree degree or other equivalent titles.

1 year

* For the last three years.

Four. The certificate of professionalism established as "Annex IV Implementation and management of computer elements in domotic/immotic systems, access control and presence, and video surveillance" is modified by replacing the table in the Section IV Prescriptions of trainers, for which the following is specified:

modules

Accreditation required

* Professional experience required in the scope of the competency

MF0490_3 Service management in the computer system.

• Licensed, Engineer, Architect or degree of corresponding degree or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree title or other equivalent titles.

1 year

MF1219_3: Implementation and maintenance of domotic/inmotic systems.

• Licensed, Engineer, Architect or corresponding degree of degree or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree title or other equivalent titles.

1 year

MF1220_3: Implementation and maintenance of access and presence control systems, and video surveillance.

• Licensed, Engineer, Architect or corresponding degree of degree or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree degree or other equivalent titles.

1 year

* For the last three years.

Five. The certificate of professionalism established as 'Annex VI Programming of computer systems' is amended by replacing the table set out in section IV of the trainers ' descriptions, which is then specified:

modules

Accreditation required

* Professional experience required in the scope of the competency

MF0490_3 Service management in the computer system.

• Licensed, Engineer, Architect or degree of corresponding degree or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree title or other equivalent titles.

1 year

MF0964_3 Development of software items for systems management.

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree title or other equivalent titles.

1 year

MF0965_3 Software development based on component-oriented technologies.

• Licensed, Engineer, Architect or corresponding degree of degree or other equivalent titles. • Diplomat, Technical Engineer, Technical Architect or corresponding degree degree or other equivalent titles.

1 year

* For the last three years.

Final disposition fourth. Regulatory development.

The Minister of Employment and Social Security is hereby authorized to dictate how many provisions are necessary for the development of this royal decree.

Final disposition fifth. Entry into force.

This royal decree will enter into force on the day following its publication in the "Official State Gazette".

Given in Madrid, on August 2, 2013.

JOHN CARLOS R.

The Minister of Employment and Social Security,

FATIMA BANEZ GARCIA

ANNEX I

I. IDENTIFICATION OF THE CERTIFICATE OF PROFESSIONALISM

Naming: PROGRAMMING IN STRUCTURED LANGUAGE MANAGEMENT APPLICATIONS

Code: IFCD0111

Professional Family: Informatics and Communications

Professional Area: Development

Professional qualification level: 3

Professional reference qualification

IFC155_3 Programming in structured language management applications (Royal Decree 1087/2005 of September 16)

Relationship of competency units that configure the certificate of professionalism

UC0223_3: Configuring and exploiting computer systems

UC0226_3: Schedule relational databases

UC0494_3: Develop software components in structured programming languages

General Competition

Develop management applications from a specified design using structured programming techniques using computer tools and tools by accessing and manipulating information located on managing systems of databases.

Professional environment

Professional scope:

Develops your professional activity in companies or public or private entities of any size in the development area of the IT department.

Productive Sectors:

It is present in all kinds of productive sectors, predominating the services sector but being located with a fundamentally transectorial character, it is also found in the following types of companies:

Software development companies.

Technical consulting companies in information systems.

Companies or entities that use computer systems for their management.

Relevant Occupations and Jobs:

Management Application Programmer:

2712.1030 Analist-programmers, mid-level.

2712.1012 Application analysts, average level.

3820.1017 Computer Application Programmers.

Duration of the associated training: 700 hours

Relationship of training modules and training units

MF0223_3: (Cross) Operating systems and computer applications (170 hours):

▪ UF1465: Computers for databases (60 hours)

▪ UF1466: Storage Systems (70 hours)

▪ UF1467: Microcomputer and Internet applications for consultation and documentation generation (40 hours)

MF0226_3: (Transversal) Relational Database Programming (210 hours):

▪ UF2175: Relational database design (50 hours)

▪ UF2176: Data definition and manipulation (80 hours)

▪ UF2177: Developing programs in the database environment (80 hours)

MF0494_3: Programming in structured languages (240 hours):

▪ UF2178: Structured programming (90 hours)

▪ UF2179: Making user interfaces (60 hours)

▪ UF2180: Database access (50 hours)

▪ UF2181: Testing and installing and deploying applications. (40 hours)

MP0452: Non-working professional practice module for programming in structured language management applications (80 hours)

II PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: CONFIGURING AND EXPLOITING COMPUTER SYSTEMS

Level: 3

Code: UC0223_3

Professional realizations and realization criteria

RP1: Adapt the logical configuration of the system for operation, according to the needs of use and within the directives of the organization.

CR1 .1. System parameters that affect memory, processor, and peripherals are in compliance with usage needs.

CR1 .2. The required devices and their control files are added or removed using operating system utilities.

CR1 .3. The team's logical connections are configured to access remote services within or outside the organization.

CR1 .4. System parameters that affect ergonomics or ease of use are adjusted to improve the user's working conditions, within the organization's directives.

RP2: Organize information in operating system file systems and maintain their properties to make it easier to exploit resources and ensure compliance with the organization's directives.

CR2 .1. Computer applications are organized with a structure and configuration that allow their use in optimal conditions.

CR2 .2. The user information of the operating system is maintained in organized structures according to the possibilities of the system itself (files, directories, volumes, etc.) to facilitate the access to this information and to maintain the homogeneity in the various teams in the organization.

CR2 .3. The structure and configuration of the file system are kept in use to prevent accidental failures and to share information.

CR2 .4. The information storage space is kept free of useless or outdated information to improve system performance and increase its lifespan.

RP3: Develop and transfer documents by using general purpose computing applications.

CR3 .1. The ofimatic tools are used with the skill required to assist in the planning and documentation tasks of the jobs.

CR3 .2. The exchange of information with other persons is carried out using e-mail or electronic messaging systems to facilitate the flow of information and reduce costs and times when the nature of such exchange of information is allow.

CR3 .3. The services available on the Internet, or other networks, are obtained, by means of the correct use of the necessary tools (navigation, forums, ftp clients, etc.), to facilitate the access to information necessary for the work.

RP4: Ensure the integrity, availability, and confidentiality of the information that you are responsible for and are stored in the file system.

CR4 .1. the stored information (data and software) can be returned to a state that allows its use at any time by, among other means, the backups.

CR4 .2. Access to information is protected by the use of keys and other security measures set in the organization.

CR4 .3. The means of protection against disasters or improper access (antivirus, firewalls, proxies, change management systems, etc.) are implemented and used in the systems that you are responsible for.

CR4 .4. The system remains free of non-licensed software.

CR4 .5. The internal rules of the organisation and the existing data protection legislation are met in the systems for which you are responsible.

CR4 .6. Incidents are reported to the System Administrator to perform the appropriate tasks.

Professional Context

Production media

Computer and peripheral equipment. Operating systems and configuration parameters. Office tools. File transfer and messaging services. Backup tools. Firewall, antivirus, and proxy servers. Change, incident, and configuration management tools.

Products and results

Operating system with optimal performance and proper utilization of your resources. Proper network connection within an organization. Operating system and configured and parameterized applications according to needs. Files with information according to the nature of the professional activity developed (programs, queries, text documents, spreadsheets, etc.) stored in appropriate physical support. Backups of information based on integrity, confidentiality, and availability criteria.

Information used or generated

Manuals for the use and operation of computer systems. Operating manuals for the associated software. Training course material. Systems for the support of computer applications. Technical support supports (telephone, Internet, messaging, forums, etc.).

Competition Unit 2

Naming: SCHEDULING RELATIONAL DATABASES

Level: 3

Code: UC0226_3

Professional realizations and realization criteria

RP1: Interpret the data structures and the design of the database so that you can perform the assigned programming tasks correctly, while respecting the integrity and constraints rules of the system information.

CR1.1 The logical layout and structure of the database are known at the level required to establish relationships between the data elements.

CR1.2 The restrictions, integrity rules, and semantics of the data are identified and interpreted in order to properly perform the scheduled programming tasks.

CR1.3 The physical design and the particularities of the database implementation are known at the level required to allow data manipulation, identifying data types, indexes, views, and other features implemented.

RP2: Manipulate relational database content interactively.

CR2.1 The received specifications are interpreted with correction by identifying the objects in the database to be manipulated.

CR2.2 Database access client tools are used as appropriate to query the structure of the database and its elements (tables, attributes, data types, relationships, views, stored procedures, etc.).

CR2.3 Data manipulation operations are constructed with correction, according to the specifications received and using a data manipulation language or graphical data access tools.

CR2.4 Built data manipulation operations are tested in controlled environments and with known information to verify that they meet the specifications received.

RP3: Schedule database manipulation modules

CR3.1 The received specifications are interpreted with correction by identifying the objects in the database to be manipulated.

CR3.2 The encoding is done in the database system's own programming language and following the design specifications.

CR3.3 The developed code must end transactions by ensuring the integrity and consistency of the database in any case.

CR3.4 Queries are tested in controlled environments and with known information.

CR3.5 Queries are optimized using the available techniques and tools.

CR3.6 The required temporary storage structures are handled according to the database design rules.

Professional Context

Production media

Computer and peripheral equipment. Office tools. Database manager systems. Data dictionaries (catalog, system tables, etc.). Data manipulation languages. Structured languages. Object-oriented languages. 4GL languages. Change control tools. Debugging tools. Programming element documentation systems.

Products and results

Computer system with appropriate configuration for database access. Programming environment adapted for use of data access objects. Files stored in physical support with information according to the nature of the professional activity developed (programs, script of queries, text documents, spreadsheets, etc.). Queries for database manipulation interactively. Applications that manipulate the database through embedded code. Logical connections available to allow access to clients. Appropriate mechanisms for transaction recovery. Test programs. Procedures and test cases. Documentation associated with the developed code.

Information used or generated

Software operating manuals. Training course material. Operation manuals for the SGBDs. Logical and physical design of the BBDD. Current legislation on data protection and confidentiality of information. Online help for applications. Technical support supports (telephone, Internet, messaging, forums, etc.).

Competition Unit 3

Naming: DEVELOP SOFTWARE COMPONENTS IN STRUCTURED PROGRAMMING LANGUAGES

Level: 3

Code: UC0494_3

Professional realizations and realization criteria

RP1: Elaborate software components using structured programming techniques to develop functionality in management applications according to given specifications.

CR1.1 The elements of the programming language used are identified for correct encoding of the

software components to develop.

CR1.2 The software coding of the components is done by applying the structured programming techniques.

CR1.3 The component is encoded by documenting the code in a clear and efficient manner to determine the purpose of the code, as well as the successive modifications that occur.

CR1.4 Program development and debugging tools are used for a clear and efficient source of code that provides the user with an interface in terms of usability, accessibility and ergonomics according to the specifications of the design and regulations of the organization.

CR1.5 The libraries, functions, and other elements provided by the programming environment are used correctly to enable optimization of the created code.

CR1.6 The technical documentation of the software tools is interpreted as much if it is edited in Spanish or the official languages of the Autonomous Communities as if it is in the foreign language of most frequent use in the sector.

CR1.7 The executable code obtained is tested to verify that it responds to the given specifications.

RP2: Use data access objects and software components made to access and manipulate supported information on database manager systems according to design specifications.

CR2.1 The database objects to be accessed are identified according to the specifications received from the design.

CR2.2 Database data manipulation operations are performed by ensuring the integrity and consistency of the databases.

CR2.3 Data access operations are performed by ensuring the security aspects set by the organization's security regulations.

CR2.4 The data access method is selected based on the application needs and the set design specifications.

CR2.5 Data access objects, elements, and functions are used to handle database information.

CR2.6 The software components made are used to manipulate the information in the databases.

RP3: Test the developments made to verify the performance of the developments according to established quality standards.

CR3.1 The test data set and the test data sets are prepared by following the design specifications and quality regulations of the organization.

CR3.2 Component tests are performed according to the design specifications of the component and the quality standards set.

CR3.3 The answers in time and form of the tests are checked and conform to the design specifications and quality standards set.

CR3.4 Test results are documented and delivered to the application managers according to the procedures set by the organization.

RP4: Use software component distribution tools to implement the developments made according to the intended installation plans.

CR4.1 Software distribution tools are used to obtain the application installation package based on the application needs and specified installation features.

CR4.2 Installation packages are properly created and configured to be distributed according to the organization's implementation rules.

CR4.3 The installation tests of the created package are performed in the scenarios arranged according to design specifications to verify and verify their operation according to the quality standards of the organization.

CR4.4 The application installation package documentation is performed according to the parameters of the organization.

CR4.5 System parameters that affect ergonomics or ease of use are adjusted to improve the user's working conditions, within the organization's directives.

RP5: Develop and maintain software documentation at the development and user level using documentation tools for later use of components developed by technicians and users, according to the rules of established quality.

CR5.1 The documentation is written in accordance with the quality standards and specifications set out in the organization.

CR5.2 The technical documentation related to the developed software clearly explains all aspects of the software to allow easy understanding and modification of the software and to meet the quality standards set.

CR5.3 The documentation for the user contains the handling instructions, application element descriptions, and other help elements for a complete and correct understanding of the use of the same.

CR5.4 The documentation is performed taking into account version control and its subsequent update and maintenance according to the company's design specifications and development standards.

CR5.5 Documentation tools are used to obtain the appropriate products according to the organization's quality and documentation standards.

Professional Context

Production media

Computer and peripheral equipment. Operating systems. Office tools. Structured languages. Object-oriented languages. Visual programming languages. Debugging tools. Application distribution tools. Application development environments. Databases. Database management software. Documentation tools.

Products and results

The source code for the application. The executable code of the application. Procedures and test cases. Software installation package developed. Technical and user documentation associated with the developed software.

Information used or generated

Manuals for the use and operation of computer systems. Programming language manuals. Development environment manuals. Manuals for the database manager systems. Database manipulation and access software manuals. Documentation of the design of the application. Documentation of the design of the data. Corporate documentation of quality design and control. Test data set. Legislation on data protection. Help of applications. Technical equipment and software supports. Technical and user documentation associated with the developed software.

III. TRAINING OF THE CERTIFICATE OF PROFESSIONALISM

FORMATIVE MODULE 1

Naming: OPERATING SYSTEMS AND COMPUTING APPLICATIONS

Code: MF0223_3

Professional qualification level: 3

Associated with the Competition Unit: UC0223_3: Configure and exploit computer systems

Duration: 170 hours

Training Unit 1

Naming: COMPUTERS FOR DATABASES

Code: UF1465

Duration: 60 hours

Competition reference: This training unit corresponds to RP1

Assessment capabilities and criteria

C1: Defer the main components of a computer by indicating its functions and technical characteristics.

CE1.1 Explain the main components of a general purpose computer or server on the basis of its function and utility.

CE1.2 List and describe the elements of a computer's motherboard by recognizing its core functions.

CE1.3 Classify the main processor types based on your technology family, historical evolution, and most relevant features.

CE1.4 Classify and explain the peripherals and main input/output components of a computer by pointing to the function they perform in the system assembly.

CE1.5 List and sort the main commands in the low-level instruction set of a processor based on the function they are running.

CE1.6 In a series of practical scenarios for configuring microcomputer systems properly characterized by connection diagram and technical documentation:

-Identify the motherboard and recognize: the processor, the memory banks, locate the disks and diskette and CD/DVD drives, locate the /output connectors, and classify them by type.

C2: Analyze the core functions of a multi-user and multi-task operating system, recognizing and classifying the different types of existing operating systems.

CE2.1 Explain kernel, virtual core, and command interpreter concepts for an operating system.

CE2.2 Explain the different ways to route and store file systems and file systems for an operating system and to structure read and edit permissions.

CE2.3 Analyze the function of memory in the process of computer tasks and identify concepts related to it: central and expanded memory, virtual memory and paging and exchange.

CE2.4 List the different processor time-sharing policies implemented on the operating systems, identifying the impact of each of them on the process types.

CE2.5 Recognize and explain the functions of context changes, semaphores, job scheduler, and interrupt handlers in the operation of multiuser and multitask operating systems.

CE2.6 Explain the different input/output mechanisms that an operating system handles based on resource management.

CE2.7 Classify operating systems and architectures by the different forms that have been historically employed.

CE2.8 From a practical scenario of configuring a multi-user and multi-process computer system:

-Install different operating systems on the machine by identifying important milestones in the process.

-Configure the paging and memory swap areas and recognize their impact on the system.

-Cause and interpret resource locks and their impact on system behavior.

-Create and organize files and file systems.

C3: Distinguished and analyze the configuration variables of an operating system, specifying its effect on system behavior:

CE3.1 List and explain the different types of logical devices used for installing services and applications.

CE3.2 Recognize and explain the core configuration parameters of the core of an operating system and its impact on system behavior.

CE3.3 Analyze the core services that run on an operating system and its influence and competence on resource management.

CE3.4 Describe the different ways to monitor and adjust the components of an operating system and analyze trends from the load state.

CE3.5 Map alarms sent by the previously implemented monitoring system and define events for resolution.

CE3.6 From a practical scenario by technical documentation of the installation and configuration of the operating system:

-Confect the file structure and file systems with user permissions.

-Drill down the started processes on the machine.

-Drill down the load status of: Disk Occupation, Memory Usage, Identify System Defined Networks, Install and Compile Different Hardware Component Device Handlers, Start System Monitors, and analyze the data in real time and in aggregate mode.

Contents

1. Definition and identification of the main structure and components of a general purpose computer based on its function and utility

-Processor:

-Identify the different types of processors (CISC and RISC), as well as their different parts (Set of Instructions, Records, Counter, Arithmetic Unit, Interrupts):

-Enumeration and classification of the main instruction sets of an 8086 family processor.

-The advantages and disadvantages of the CISC and RISC models.

-RAM and xPROM Memories:

-Description of current RAM memory models and DDR, SDRAM differences.

-Description of xPROM memory models.

-Defining caches.

-Cache levels.

-Determining its importance in system performance.

-Valuation of memory by speed and storage unit cost.

-Input/Output interfaces:

-External devices.

-General enumeration of more common interface types.

-Disks:

-Definition and description.

-Identification and location of mechanical disk parts.

-Classification of disks by their Input/Output interface.

-The advantages and disadvantages of different types of disks.

-Analysis of the SCSI disk and its interface.

-Solid state disk analysis and its advantages and disadvantages as a replacement storage medium for mechanical disks.

-SATA disk analysis and comparison with PATA disks.

-Families and processor types:

-Classification of processors ' families based on their compatibility with Intel's 8086 microprocessor (CISC and RISC).

-Classification and 64-bit processor models.

-Advantages and drawbacks of different solutions from leading manufacturers.

-The history of Intel processors from the 8086 model to the Pentium family.

-Comparison to AMD.

-Power Processor. Advantages and types of peripherals.

-Classification by input or output peripherals.

-Introduction to the assembler language.

-Development of a scenario of identification and assembly of a computer, according to the guidelines indicated.

-Operating systems.

2. Functions and objectives of operating systems and memory management

-The operating system as the user/computed interface.

-The operating system as the resource administrator.

-An operating system's evolution facility.

-Memory management requirements (relocation, protection, sharing, logical and physical organization).

-Virtual memory concept.

-Paging concept.

-Paging incident on system performance.

-Description of memory management on Linux, Windows, and Solares systems.

3. File systems

-Files.

-Directories.

-Implementing file systems.

-Examples and comparison of file systems.

-File systems with journaling.

-File system security.

4. Identifying and describing multiprocess and multi-user concepts

-Multiprocessor hardware.

-Types of operating systems for multiprocessor.

-Multicomputers.

-Explanation of the user organization. Description of the different organizational models.

5. Logical partitioning and virtual cores

-Concept of virtualization.

-History of virtualization.

-Description and comparison of different virtualization implementations. (full virtualization, paravirtualization ...).

6. Applying system configuration and tuning techniques

-System performance. Enumeration, description, and interpretation of the main tools for observing resource consumption on in-memory, CPU, and disk systems on Windows, Linux, and Solaris.

-Examples of resolving high resource and competitive situations on Windows, Linux, and Solaris systems.

-Enumeration and description the main services processes running on Windows, Linux, and Solaris operating systems and their effect on the system assembly.

-Description of different accounting systems that allow you to set predictive models and trend analysis on Windows, Linux, and Solaris operating systems.

-Pre-production test plans. Description of different tools for performing load tests that affect CPU, Memory, and Input/Output on Windows, Linux, and Solaris operating systems.

-Making a test plan for the operating system.

Training Unit 2

Naming: STORAGE SYSTEMS

Code: UF1466

Duration: 70hours

Competition reference: This training unit corresponds to RP2 and RP4

Assessment capabilities and criteria

C1: Recognize and describe encodings and nomenclatures of computer elements according to the most widespread standardization criteria:

CE1.1 Describe and apply the regulations concerning the classification and classification of files and their required containers to facilitate the safeguarding and administration of system data.

CE1.2 Describe and employ standardized naming regulations for machines, services, and applications required to facilitate administration tasks.

CE1.3 Recognize and apply the migration and archive policies of files to be used in system storage management based on their need for further processing and efficiency of use resources.

CE1.4 In several scenarios and case studies properly characterized from servers connected to different TCP/IP communications networks:

-Generate a network and server IP address map

-Define and deploy a name server (DNS)

CE1.5 From a convenient convenient scenario of file system architecture:

-Analyze and explain the implemented structure.

-Identify the creation, validity, and last modification dates of a characteristic set of files.

-Identify authorized users to open and modify a characteristic set of files.

-Apply different data migration policies by analyzing their influence on space availability and process runtime.

C2: Distinguished the different types of storage used in multi-user operating systems, indicating their structure, characteristics, and modes of operation.

CE2.1 List and classify different storage systems based on their capacity, performance characteristics, and compatibility with the most extended operating systems.

CE2.2 Describe and classify the physical protection and recovery mechanisms of the information according to its mode of operation and performance.

CE2.3 List and analyze the volume pools, logical volumes, and format types that are defined and implemented on each operating system and volume manager.

CE2.4 Choose and use the logical volume management tools that are used for storage management on the basis of their operating mode and compatibility with the different systems

CE2.5 Explain how it works and what value it brings to the operating system in parallel to multiple physical volumes.

CE2.6 List tape and cartridge storage systems and classify them by type of support, by manual or automatic management, and by their use on operating systems and applications.

CE2.7 In various scenarios and cases properly characterized by systems with external and internal storage and tape libraries:

-Document a physical/logical map of capabilities that you define: Physical volumes with their capacity, address and access mode, tape drives and their labels, implemented parity protections, and number of accesses to each volume.

-Define logical volumes and file systems with different sizes and structure.

-Install and configure a fault-tolerant access balancing system.

-Define parallel access to file systems and analyze the impact on system performance using the operating system monitoring tools.

-Implement software volume mirroring with the logical volume manager and analyze its utility for operating system recovery.

C3: Apply techniques and procedures related to security of systems, communications networks, and data.

CE3.1 Explain the fundamental concepts of data protection and security policies and their relationship in the recovery and continuity of services and applications.

CE3.2 Explain the differences between physical and logical backups and their influence on operating systems, file systems, and databases.

CE3.3 Identify the major systems and component high availability architectures and analyze their strengths and weaknesses based on each case.

CE3.4 Explain how firewalls, antivirus, and proxies work on communications network architectures.

CE3.5 Recognize the technical and operational procedures used to ensure user access security to services and applications with special interest in architectures related to Internet.

CE3.6 In a number of scenarios and case studies properly characterized by computer systems connected to communications networks:

-Implement backups of files and databases.

-Retrieve applications that use databases from physical and incremental backups and continuity specifications.

-Install and configure firewalls on servers that only allow access from the specified clients and protocols.

Contents

1. Organization and management of information

-File systems:

-Nomenclature and encoding.

-Storage hierarchies.

-Migrations and archiving of data.

-Logical and physical volumes:

-Concept of partitioning.

-Partition table concept and MBR.

-Description of NAS and SAN storage systems. Comparison and applications. Comparison of iSCSI, FC, and FCoE SAN systems.

-Managing logical volumes. The LVM volume management system. Basic LVM usage guide.

-Parallel access.

-RAID protection. Comparison of different levels of RAID protection. Software or hardware RAID controller option mention: RAID 0, RAID 1, RAID 5 (Recovery of large disks with RAID 5), and RAID 6.

-Analysis of Safeguard policies:

-The unique points of failure, concept, and identification.

-Backup and backup types of copies.

-Physical and logical safeguard.

-Safeguard at block and file level.

-High Availability Concepts. Differences between cluster, grid, and load balancing.

-Data integrity and service recovery. Minimum guide to develop a business continuity plan. Recovery Point Objective (RTO) and Recovery Time Objective (RTO) concepts.

-Custody of security files. The problem of safeguarding and storing confidential data. Some implications Data Protection Organic Law (LOPD).

-Security Policy Analysis:

-Restricted access by user accounts. Ownership of the information.

-Single access identifier. Single Sign On (SSO) systems.

-Anti-virus protection.

-Security audits.

2. Development of different practical scenarios, duly characterised, in which they are analysed

-The effect of possible partitioning and disk access decisions as well as the implementation of a data safeguarding policy.

-The nomenclature policy of the different systems and the development of a network map to document it.

-Different file systems to study the selected nomenclature and the data access and modification of the files, as well as the permissions of the users of access to them.

-The migration of data between different systems.

Training Unit 3

Naming: MICROCOMPUTING AND INTERNET APPLICATIONS FOR REFERENCE AND DOCUMENTATION GENERATION

Code: UF1467

Duration: 40hours

Competition reference: This training unit corresponds to the RP3

Assessment capabilities and criteria

C1: Use the main types of office tools and services and applications associated with the Internet.

CE1.1 List and explain the main functions of text processors, spreadsheets, and presentation editing.

CE1.2 Relate the main services associated with the Internet and classify them on the basis of their function and specificity.

CE1.3 Apply the functions of the office tools and Internet services to the elaboration of properly structured and standardized technical documentation to facilitate the understanding and control of versions.

CE1.4 Use file transfer services for information exchange with support services that information technology manufacturers publish on the Internet.

CE1.5 From a convenient scenario of microcomputer system with the possibility of Internet connection:

-Elaborate text documents, spreadsheets, and presentations from a series of delivered models that require the use of different functionality of the tools in increasing difficulty.

-Configure the computer for your Internet access from the Service Provider specifications.

-Find and extract technical documentation and applications from different service providers on the Internet from a situation relationship.

Contents

1. Microcomputing and Internet applications

-Text Processors, Calculation Sheets, and Presentations Edition:

-User-level management and knowledge.

-Technical documentation processing techniques.

-Standard document formats. Structure of information and metadata in documents.

-The Wiki as a collaborative writing tool.

-Internet Usage:

-Knowledge of www. Browsers.

-Email, chat and forum systems. Rules of conduct apply in forums, chat and email.

-File transfer. Explanation of user-level file transfer techniques and discriminating against security elements for both identification and encryption.

-Free software projects on the web. Identifying sites to find them, where to download the software and how to contact the community.

-Version control systems.

Methodological guidelines

To access the UF2 formative unit the UF1 training unit must have been exceeded.

The UF3 training unit can be programmed independently.

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 2

Naming: RELATIONAL DATABASE PROGRAMMING

Code: MF0226_3

Professional qualification level: 3

Associated with the Competition Unit: UC0226_3: Schedule Relational Databases

Duration: 210 hours

Training Unit 1

Naming: RELATIONAL DATABASE DESIGN

Code: UF2175

Duration: 50hours

Competition reference: This training unit corresponds to RP1

Assessment capabilities and criteria

C1: Understand and apply the conceptual fundamentals and techniques of relational databases.

CE1.1 Describe the fundamentals and objectives of the relational model.

CE1.2 List and describe the main elements of the relational data model: relationships/tables, attributes, key keys, foreign keys, indexes, views.

CE1.3 List the types of constraints associated with the keys.

CE1.4 Explain the concept of functional dependency and list existing types.

CE1.5 Explain the objectives of the normalization theory and describe the different normal ways: 1FN, 2FN, 3FN, 4FN and 5FN.

CE1.6 Explain the reasons why data models are being de-normalised.

CE1.7 In a scenario study of the logical design of a relational database:

-Identify tables, primary and foreign keys, indexes, and views.

-Recognize the degree of normalization of database tables.

-Justify possible model denormalizations.

-Recognize the domain of the attributes of the tables by indicating the range or set of values that they can take.

-Indicate the integrity constraints associated with each primary key.

-Indicate the constraints of integrity associated with the foreign keys, describing in each case how the deleted or modifications performed on them behave (restriction of the action, propagation of the action, override of keys in related records).

C2: Determine the elements of the database to be manipulated, by interpreting the database design and analyzing user requirements.

CE2.1 Explain the concept of data dictionary and its structure (tables and auxiliary variables for manipulation of the data dictionary).

CE2.2 List the database system tools for data dictionary query and manipulation.

CE2.3 List the main models for obtaining conceptual schemas from the database.

CE2.4 Describe the symbology associated with the concept-relationship model.

CE2.5 Explain the need for quality control within the lifecycle of a project.

CE2.6 List the main strategies for tracking user requirements, specifying the specific ones for the software development phase.

CE2.7 In a scenario of study of the design of the BBDD and user requirements:

-Identify the functionality to be developed from user requirements.

-Identify the elements of the BBDD to manipulate for each functionality and locate them in the conceptual schema.

-Use the data dictionary to observe the particularities of the elements of the BBDD to manipulate.

-Document the elements of the BBDD that are to be used for each functionality to facilitate tracking of user requirements.

-Identify the definition needs of new elements in the BBDD: auxiliary tables, views, indexes.

-Document the new elements of the BBDD for further creation.

Contents

1. Introduction to databases

-Historical evolution of databases.

-Benefits and drawbacks of databases.

-General concepts:

-Concept of databases.

-Objectives of the database systems:

-Redundancy and data inconsistency.

-Difficulty to access data.

-Isolation of the data.

-Concurrent access failures.

-Security problems.

-Integrity problems.

-Administration of data and database administration.

-Architecture levels: internal, conceptual, and external.

-Data Models. Classification.

-Data Independence

-Data Definition Language

-Database handling language. Types.

-The Database Management System (DBMS). Functions.

-The Database Administrator (DBA). Functions.

-Database users

-The overall structure of the database. Functional components.

-Database system architecture.

2. Conceptual models of databases

-The relationship-relationship model:

-Entities.

-Interrelationships: Cardinality, Role, and Degree.

-Domains and values.

-Attributes.

-Identifying properties.

-Link-to-relationship diagrams. Symbology.

-The extended-relationship model extended.

-Integrity constraints:

-Inherent Restrictions.

-Explicit constraints.

3. The relational model

-Evolution of the relational model.

-Relational model structure:

-The concept of relationship. Properties of the relationships.

-Attributes and domain of attributes.

-Tupla, degree, and cardinality.

-Relationships and tables.

-Keys in the relational model:

-Candidate keys.

-Primary keys.

-Alternative keys

-Non-foreign keys.

-Integrity constraints:

-Value "Null" in the model.

-Integrity of entities.

-Referential Integrity.

-Standardisation theory:

-The normalization process. Types of functional dependencies.

-First normal shape (1FN).

-Second normal shape (2FN).

-Third normal shape (3FN).

-Other Normal Forms (4FN, 5FN).

-Desnormalization. Reasons for de-normalization.

4. The lifecycle of a project

-The lifecycle of a database:

-Previous study and work plan. Activities.

-Conception of DB and selection of physical and logical equipment:

-General concepts about application analysis.

-Concepcion of the database.

-Selecting the required physical and logical equipment.

-Design and Load:

-General concepts about application design.

-Logical layout.

-Physical design.

-Loading and optimizing the database.

-Quality control general concepts:

-Quality control of functional specifications.

-Tracking user requirements.

5. Creating and designing databases

-Design approaches:

-Incorrect designs. Causes.

-Analysis approach. Advantages and disadvantages.

-Synthesis approach. Advantages and disadvantages.

-Design methodologies:

-Concept.

-Conceptual, logical, and physical designs.

-Entries and outputs of the process.

-Study of the logical layout of a relational database.

-The Data Dictionary: concept and structure.

-Study of the design of the BBDD and user requirements.

Training Unit 2

Naming: DEFINITION AND MANIPULATION OF DATA

Code: UF2176

Duration: 80hours

Competition reference: This formative unit corresponds to the RP2

Assessment capabilities and criteria

C1: Formulate data manipulation and definition queries, based on the design of the BBDD and user requirements

CE1.1 Explain the fundamentals of algebra and relational calculation and list and differentiate the languages associated with the database.

CE1.2 Explain the type of queries (for selection, update, insert, erasure) that can be performed using the DML language.

CE1.3 Explain the type of elements that can be created and manipulated using the DDL language.

CE1.4 Describe the syntax of a relational query language.

CE1.5 Explain the concept of view and describe its usefulness.

CE1.6 Indicate relational query language extensions to specify integrity constraints, to define access control to BBDD elements, and to control the execution of the transactions.

CE1.7 List and describe the BBDD tools for interactive data manipulation and definition formulations.

CE1.8 Describe the database tools for query optimization.

CE1.9 Perform data manipulation formulations, based on database design and user requirements:

-Select the appropriate language to perform the encoding.

-Select the appropriate BBDD tool for interactive execution of the encoded formulation.

-Use the DML language to construct the data manipulation formulation.

-Test the manipulation formulation in a controlled environment that interferes with the minimum possible with the system.

-Use the relational query language facilities for transaction execution control, ensuring the integrity of the BBDD data.

-Analyze the results obtained in the execution and make the necessary modifications to the code to correct any malfunction.

-Optimize encrypted queries using the database tools

-Document the code done and the tests to help you track requirements.

CE1.10 Perform data definition formulations, based on database design and user requirements:

-Select the appropriate language to perform the encoding.

-Select the appropriate BBDD tool for interactive execution of the encoded formulation.

-Use the DDL language to construct the data definition formulation.

-Check that the created elements meet the design specifications.

Contents

1. Relational languages

-Types of relational languages.

-Operations in the relational model.

-Relational Algebra:

-Classification of operators.

-Attribute naming.

-Derived Relationships.

-primitive operations: selection, projection, cartesian product, union, and difference.

-Other operations: intersection, join, division, etc.

-Relational Calculation:

-Domain-oriented relational calculation

-Tuple-oriented relational calculation.

-Transformation of queries between algebra and relational calculation.

-Commercial languages: Structured Query Language (SQL), QBE (Query By Example).

-SQL origin and evolution.

-SQL characteristics.

-Database management systems with SQL support.

2. The database manipulation language

-The data definition language (DDL):

-Language data types.

-Creating, modifying, and deleting tables.

-Creating, modifying, and deleting views.

-Creating, modifying, and clearing indexes.

-Specifying integrity constraints.

-The data manipulation language (DML):

-Build selection queries: Aggregation, Subqueries, Union, Intersection, Difference.

-Build insert queries.

-Build modification queries.

-Construction of cleanup queries.

-Language clauses for grouping and ordering queries.

-Arithmetic, logical, and language comparison capabilities.

-Aggregate language functions.

-Treatment of null values.

-Building nested queries.

-Union, intersection, and query difference.

-Cross-table queries.

-Other language clauses.

-Language Extensions:

-Creating, manipulating, and clearing views.

-Specifying integrity constraints.

-Authorization instructions.

-Control of transactions.

-The data control language (DCL):

-Transactions.

-Transaction properties: atomicity, consistency, isolation, and persistence:

-A transaction states: active, partially committed, failed, aborted, and committed.

-Queries and storage of structures in XML.

-Structure of the data dictionary.

-Control of transactions.

-Privileges: authorizations and disauthorizations.

-Processing and optimizing queries:

-Processing a query.

-Optimization types: rule-based, cost-based, other.

-BBDD tools for query optimization.

Training Unit 3

Naming: PROGRAM DEVELOPMENT IN THE DATABASE ENVIRONMENT

Code: UF2177

Duration: 80hours

Competition reference: This training unit corresponds to the RP3

Assessment capabilities and criteria

C1: Formulate queries using the database programming language, based on database design and user requirements.

CE1.1 List and describe the integrated development environments available in the database management system.

CE1.2 List the programming languages available in development environments.

CE1.3 Describe the syntax of a programming language available in an integrated environment in the database. Detail the general characteristics of the same: variable types, data types, control structures, function libraries.

CE1.4 List and describe the possible tools for developing integrated user graphical environments in the database scope.

CE1.5 List and describe the utilities for debugging and code control available in the database environment.

CE1.6 List and describe the techniques for controlling transaction execution.

CE1.7 Describe the database tools for query optimization.

CE1.8 Develop programs in the database environment, based on the design of the database and user requirements:

-Select the appropriate development environment based on the design needs.

-Select the appropriate programming language according to the design needs.

-Encode modules using programming techniques according to the design specifications and user requirements.

-Use the tools for developing user graphical environments based on user requirements and database design.

-Select the most appropriate transaction control technique and use it to ensure the integrity of the BBDD data.

-Test modules developed in controlled environments that do not interfere with the normal operation of the system.

-Analyze test results and make appropriate code modifications to fix possible operating errors.

-Optimize the queries used in the modules using the database tools.

-Documenting developed modules and test batteries to facilitate tracking of user requirements.

Contents

1. Database programming languages

-Development environments:

-That is a development environment.

-Components.

-Language that they support.

-Development environments in the database environment.

-The syntax of the programming language:

-Variables.

-Data types.

-Control structures.

-Function stores.

-Programming of database manipulation modules: packages, procedures, and functions.

-Debug and code control tools.

-Integrated development graphical tools in the database:

-Creating forms.

-Reporting.

-Techniques for controlling transaction execution.

-Optimizing queries.

Methodological guidelines

The training units must be exceeded in a correlative manner.

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: PROGRAMMING IN STRUCTURED LANGUAGES

Code: MF0494_3

Professional qualification level: 3

Associated with the Competition Unit: UC0494_3: Develop software components in structured programming languages.

Duration: 240 hours

Training Unit 1

Naming: STRUCTURED PROGRAMMING

Code: UF2178

Duration: 90hours

Competition reference: This training unit corresponds to RP1 as regards the creation of software components.

Assessment capabilities and criteria

C1: Create software components by applying structured programming techniques using the elements provided by the development environment used.

CE1.1 Formulate the syntactic rules of a structured programming language to resolve a problem or to reflect a specification.

CE1.2 Define the basic and composite data types of a structured programming language.

CE1.3 Choose and define the data structures required for problem resolution in a structured language.

CE1.4 List axioms and operations to describe the behavior of abstract types of data.

CE1.5 Develop basic programming algorithms by applying a structured development methodology.

CE1.6 Identify and define all elements provided by the development environment for program development.

CE1.7 Code programs in a structured language from the designed algorithms.

CE1.8 From a practical assumption:

-Deduct the data types and structures required to develop the component.

-Design a schematic solution so that it can be translated directly into a structured programming language.

-Encode program modules in a structured programming language.

-Document the code of a programming module with meaningful, concise, and readable comments.

-Integrate and link programming modules according to design specifications.

CE1.9 Build and integrate components using version control tools.

Contents

1. Algorithm design

-Basic concepts. Algorithm definition.

-Problem solution methodology:

-Defining the problem.

-Analysis of the data.

-Design the solution.

-Encoding.

-Test and debug.

-Documentation.

-Maintenance.

-primitive entities for the instruction design:

-Data: types and characteristics. Scope rules.

-Operators and operands. Types and features.

-Expressions: types and characteristics.

-Structured programming. Methods for the elaboration of algorithms:

-Top Down.

-Bottom up.

-Other.

-Techniques for the formulation of algorithms:

-Flowcharts. Symbology.

-Pseudocode.

-Structured diagrams.

-Basic algorithmic structures:

-Sequential.

-Conditional.

-Iterative.

-Arrays. Operations:

-Vectors.

-Tables or arrays.

-Character chains. Definition, function, manipulation.

-Modules:

-Concept and features.

-Classification: functions and procedures. Parameter step.

-Modularization criteria.

-Garment of basic algorithms.

2. Data structures

-Algorithm analysis.

-Memory handling:

-Static memory.

-Dynamic memory.

-Static and dynamic linear structures:

-Stack.

-Queues.

-Linked Lists.

-Recursivity.

-Static and dynamic non-linear structures:

-Tree Concept. Classification.

-Basic operations on binary trees.

-Sort algorithms.

-Search methods.

-Abstract types of data.

3. Programming in structured languages

-The programming development environment.

-Structured language:

-Features.

-Data types. Scope.

-Control structures.

-Functions.

-Pounds.

-Program development.

-Debug tools.

-Reusing the software.

-Version control tools.

Training Unit 2

Naming: CRAFTING USER INTERFACES

Code: UF2179

Duration: 60hours

Competition reference: This training unit corresponds to RP1 as regards the processing of user interfaces.

Assessment capabilities and criteria

C1: Develop user interfaces using development tools based on the given specifications.

CE1.1 Explain the functions of the graphical user interface to facilitate man-machine communication.

CE1.2 Explain the features of the selected development tools to develop friendly, efficient and accessible person-computer interaction interfaces.

CE1.3 Identify the objects and events provided by the development tool.

CE1.4 Develop interfaces that do not penalize application performance.

CE1.5 Elaborate user interfaces according to given specifications:

-Design a presentation service from the GUI features.

-Specify which events for each object will need to be scheduled.

-Identify the libraries and functions to be used to develop the component.

-Define dialog schemas.

-Develop the scripts associated with each event using structured programming techniques.

-Document the script code with meaningful, concise, and readable comments.

-Implement the presentation service using screen and menu-generating tools.

-Implement a help, error, and value list message system.

Contents

1. User Interface Design

-Evolution of the interfaces in the management software.

-Features of Interfaces, man-machine interaction.

-User graphical interface:

-Factors involved in the design.

-User interface (UI) interactive styles.

-Standards and standards:

-IURE standards.

-De facto standards: X-Windows, Common User Access (CUA), CDE (Common Desktop Environment), etc.

-Style Guides.

-Common User Access (CUA) rules:

-Design principles.

-Graphic model. Levels.

-Components.

-Help.

-Architecture and tools for GUI development:

-Alternatives for the development of interactive interfaces.

-Direct manipulation systems:

-Window System. Window Manager. Examples.

-Toolbox (Toolkit).

-High-level tools.

-Design tools:

-Programming tools.

-Component-based tools.

-Author tools.

-Virtual environments.

-Programming markup languages.

-Design and development of management interfaces:

-Forms.

-Sources.

-Spacing.

-Disposition of controls.

-Keyboard navigation and focus.

-Menus.

-Management interface design issues.

-Design Assessment:

-System response time.

-User help facility.

-Handling the error information.

2. Interfaces and graphical environments

-User graphical interfaces:

-Programming by events.

-Graphic components: windows, checkboxes, dialog boxes, and so on.

-Pounds.

-Tools for the development of graphical user interfaces:

-Features.

-Graphic objects.

-Properties of the objects.

-Forms.

-Windows.

-Menus.

-Etc.

-usability techniques.

-Interface performance.

-Hungarian notation.

-Structure of a GUI program:

-Headers.

-Prototypes.

-Input function.

-Declaration.

-Initialization.

-Message loop.

-Defining functions.

-The window procedure:

-Syntax.

-Prototype window procedure.

-Implementation.

-Menus.

-Resource file.

-The dialog boxes:

-Types of controls.

-Dialog procedure.

-Syntax.

-Prototype dialog procedure. Implementation.

-Step of parameters.

-Basic controls.

-The Graphics Device Interface (GDI):

-GDI Basic Objects.

-Basic user objects.

Training Unit 3

Naming: ACCESS TO DATA BASES

Code: UF2180

Duration: 50hours

Competition reference: This formative unit corresponds to the RP2

Assessment capabilities and criteria

C1: Recognize and select data access objects and methods for use in application development.

CE1.1 Identify and explain the data access objects and methods that are used in component development.

CE1.2 Create data access connections for use in programs.

CE1.3 In a scenario where a data access connection is raised:

-Propose the most appropriate method for data access.

C2: Manipulate database information by creating components that use data access objects and methods.

CE2.1 Identify and describe the database elements related to access security.

CE2.2 Identify and describe the elements that ensure data integrity.

CE2.3 Identify the database access tools provided by the programming environment used.

CE2.4 Describe the syntax of the structured language to perform the manipulations of the database data.

CE2.5 In an assumption that you need to develop a component that takes data from an existing database:

-Identify the objects in the database to be manipulated in the component development.

-Build data structures to collect and process data from the databases.

-Encode access to this data using the appropriate database connectors.

Contents

1. Access to databases and other structures

-The SGBD client. Users and privileges.

-The SQL language.

-Database objects.

-Data integrity and security:

-Redundancy.

-inconsistency.

-Integrity.

-Structured language statements to operate on databases.

-Database access APIs.

-Integrating database objects into the structured programming language.

-Connections for data access:

-Start and connect to the database server.

-Setting a connection.

-Close connections.

-Reconexions.

-Performing SQL queries from a structured program:

-Selecting the database.

-Data selection.

-Data recovery.

-Functions for processing the results.

-Creating and removing databases.

-Creating and removing tables.

-Manipulation of data contained in a database:

-Inserting and removing data from a table.

-Updating rows in a table.

-Data Access Objects (DAO):

-Definition.

-The DAO object model.

-Using Data Access Objects.

-Data access tools provided by the programming environment.

Training Unit 4

Naming: TESTING AND INSTALLING AND DEPLOYING APPLICATIONS

Code: UF2181

Duration: 40hours

Competition reference: This training unit corresponds to RP3, RP4, and RP5.

Assessment capabilities and criteria

C1: Plan test scenarios and verify that the tests of the developed developments and the results of the tests conform to the specifications set by the design documenting the results.

CE1.1 Explain the types of tests that can be given in the application development process.

CE1.2 Apply quality control standards from the specifications set in the design and the capabilities expected by the application user.

CE1.3 From a developed application:

-Develop a plan that allows you to test the correct operation of the plan.

-Identify the application's critical points to test their functionality.

-Generate a set of test data that is appropriate for the plan that is drawn up.

-Perform tests for each developed component, and integration tests.

-Verify that the designs respond to the specifications set.

-Verify that data access and treatment meet the specifications set in the design.

-Verify that the behavior versus errors is set to the specified design and quality rules.

-Prepare a report with the result of tests according to the specifications set.

C2: Build installation packages using software distribution tools, verifying their functionality.

CE2.1 Explain the features of the package generation tools for software distribution.

CE2.2 In a scenario, you are asked to create the software component installation package:

-Develop an installation and deployment plan for the appropriate application to the established specifications.

-Integrate the components required to generate the distribution package.

-Verify that the installation, distribution, and deployment process of the application is performed according to the plan set.

CE2.3 Develop a report that explains in detail the steps to be taken in the packaging and subsequent deployment of the application.

C3: Develop user and technical documentation using documentation tools so that they can be easily understood and easily maintained, according to quality specifications and standards set.

CE3.1 Enunciate the features of the most commonly used documentation tools on the market.

CE3.2 In a scenario, in which the technical documentation of an application is requested:

-Develop the technical documentation according to the design specifications.

CE3.13 In a scenario, in which the documentation for an application is requested:

-Decide, plan, and develop the user help system that will be used in the application.

-Develop the application user's documentation according to the design specifications.

Contents

1. Software testing

-Essentials and objectives of the tests.

-Error types and correction cost.

-Planning the tests:

-Purpose of the test plan.

-Defining the test plan.

-Test Process. The tests at the various stages.

-Test Types:

-Unit test.

-Integration tests.

-Validation tests.

-System tests:

-Performance tests.

-Other: usability, installation, etc.

-Acceptance tests.

-Test Techniques:

-White box techniques.

-Black box techniques.

-Tools.

-Software Quality Standards:

-The quality of the software.

-ISO/IEC 9126 standard.

-ISO/IEC 25000 standard.

-Test documentation.

2. Package generation tools

-Functions and features.

-Packaging, installation, and deployment:

-Installation types.

-Packaging and application deployment tools.

-Packaging and application deployment strategies.

3. Application documentation

-Documentation tools: features.

-Tools for generating aids.

-Documentation for an application, features, types:

-Technical documentation.

-Application Usage Guide.

Methodological guidelines

The training units must be exceeded in a correlative manner.

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

NONWORKING PROFESSIONAL PRACTICE MODULES IN PROGRAMMING IN STRUCTURED LANGUAGES OF MANAGEMENT APPLICATIONS

Code: MP0452

Duration: 80 hours

Assessment capabilities and criteria

C1: Participate in the configuration and exploitation of computer systems, in the programming of relational databases and in the development of software components using structured programming languages, in accordance with the procedures established in the company.

CE1.1 Interpret the technical documentation of the use and operation of the computer systems, as well as the logical and physical design of the Databases and their Management Systems, and the related language Development Environments and Programming.

CE1.2 Collaborate on configuring and operating computer systems, according to business procedures.

CE1.3 Participate in the manipulation of the relational databases, as well as in the programming of modules of manipulation of the same, according to the specifications received and the procedures of the organization.

CE1.4 Participate in the development of software components, using structured programming languages, and user interfaces, using the tools and environments provided by the company and according to the methodologies and procedures established by the same.

CE1.5 Document the work done according to business requirements and procedures.

C2: Participate in the company's work process, following the rules and instructions set out in the job center.

CE2.1 Behave responsibly in both human relationships and the jobs to be performed.

CE2.2 Respect the procedures and rules of the work center.

CE2.3 Diligently undertake the tasks according to the instructions received by trying to bring them into line with the company's work rate.

CE2.4 Integrate into the production processes of the job center.

CE2.5 Use the established communication channels.

CE2.6 To respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Exploitation of computer systems, relational databases, and software component development

-The organization's inventory.

-Company's data bases and SGBD.

-Programming languages used.

-Development environments and programming tools used by the organization.

-Organization operational specifications.

-Work parts and other business documentation.

-Quality design and control corporate documentation.

-Tools used in different business procedures.

2. Integration and communication in the job center

-Responsible behavior in the job center.

-Respect to the procedures and rules of the work center.

-Interpreting and diligently performing the instructions received.

-Recognition of the communication channels established in the job center.

-Adequation to the company's work rate.

-Tracking the regulations for risk prevention, occupational health and environmental protection.

IV. PRESCRIPTIONS OF TRAINERS

Modulylearning

Required Accreditation

*Professional Experience required in the scope of the competency

MF0223_3 Operating systems and computer applications.

▪ Licensed, Engineer, Architect or corresponding degree degree or other equivalent titles.▪ Diplomat, Technical Engineer, Technical architect or corresponding degree title or other equivalent titles.

1 year

MF0226_3 Database programming relational.

▪ Licensed, Engineer, Architect or corresponding degree title or other equivalent titles.▪ Diplomate, Technical Engineer, Technical Architect or corresponding degree or degree title other equivalent titles.

1 year

MF0494_2 Programming in structured languages.

▪ Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.▪ Diplomat, Technical Engineer, Technical Architect or corresponding degree degree or other equivalent titles.

1 year

* For the last three years.

V. MINIMUM REQUIREMENTS FOR SPACES, FACILITIES AND EQUIPMENT

Forative space

45

Mt15 students surface

Surface m2/25 students

45

75

Forative Space

M1

M2

M3

X

X

X

X

Forative Space

Equipment

Classroom.

-Computer and peripheral equipment. PCs installed in network and Internet connection.-Office software, Internet tools.-Security and anti-virus software.-Operating systems and configuration parameters. -Office tools.-File transfer and courier services. -Backup tools.-Firewall, antivirus and proxy servers.-Change, incident and configuration management tools.-Database manager systems.-Data dictionaries (catalog, system tables, etc.).- data manipulation.-Structured languages.-4GL languages-Change control tools.-Debug tools.-Programming element documentation systems.-Structured languages.-Debug tools.- Application Distribution Tools.-Application Development Environments.- Databases.-Database management software.-Documentation tools.-Canon of projection.-Rotafolios.-Pizarra.-Classroom material.-Table and chair for the trainer.-Mesas and chairs for students.-Auxiliary furniture for the equipment aula.* The appropriate equipment and software must be up to date.

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

The facilities and equipment must comply with the relevant industrial and sanitary sanitary regulations and respond to the universal accessibility and safety measures of the participants.

The number of units to be provided with the tools, machines and tools specified in the training spaces will be sufficient for a minimum of 15 students and must be increased, in their case, to attend to the top number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.

ANNEX II

I. IDENTIFICATION OF THE CERTIFICATE OF PROFESSIONALISM

Naming: INFORMATION MANAGEMENT SYSTEMS

Code: IFCD0211

Professional Family: Informatics and Communications

Professional Area: Development

Professional qualification level: 3

Professional reference qualification: IFC304_3 Information Management Systems (RD 1201/2007, September 14)

Relationship of competency units that configure the certificate of professionalism

UC0966_3: Query and extract information from different data storage platforms.

UC0967_3: Create and manage content repositories.

UC0968_3: Manage the information management system.

General Competition

Implement and manage information management systems in an organization, according to a specified design, located on heterogeneous platforms and media that ensure their registration, classification, distribution, and traceability.

Professional environment

Professional scope:

Develops its professional activity on its own, as well as for others in companies or public or private entities of any size, which have an infrastructure of intranet, Internet or extranet networks, in the area development of the IT department.

Productive Sectors:

It is located mainly in the services sector, and mainly in the following types of companies: software development companies with Web technologies; companies that have as business objective the marketing of content management services for intranet, Internet and extranet network infrastructures; companies or entities that use computer systems for their management.

Occupations or related jobs:

Content Manager.

Web Portal Manager.

Content Systems Administrator.

Information Systems Integrator.

Associated training duration: 590 hours

Relationship of training modules and training units:

MF0966_3: Query and manipulation of information contained in data managers. (210 hours):

▪ UF2213: Data models and conceptual view of a database (60 hours)

▪ UF2214: Implementation and use of a DB (80 hours)

▪ UF2215: Tools for database manager systems. Gateways and connection means (70 hours)

MF0967_3: Creating and managing content repositories (200 hours):

▪ UF2216: Content repositories (70 hours)

▪ UF2217: XML language (80 hours)

▪ UF2218: Developing a CMS (50 hours)

MF0968_3: Administration of information management systems. (100 hours):

▪ UF1643: Managing and controlling Information Systems (70 hours)

▪ UF1644: Distribution and publishing channels used in information manager systems (30 hours)

MP0459: Information Management Systems non-work professional practice module (80 hours)

II. PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: QUERYING AND EXTRACTING INFORMATION FROM DIFFERENT DATA STORAGE PLATFORMS

Level: 3

Code: UC0966_3

Professional realizations and realization criteria

RP1: Interpret the design specifications defined on the data manager systems, used by the organization for the storage of the information.

CR1.1 The architecture, components, and technology involved in the design are recognized for the purpose of identifying the data manager systems that contain the organization's information.

CR1.2 The data models contained in the data manager systems are recognized, identifying the relationships and dependencies of the elements that configure them.

CR1.3 The overall structure of the data manager information and its storage are studied using the design specifications, in order to locate the information contained therein.

CR1.4 The data query languages that are used for information extraction are identified based on the data model defined on the organization's data manager systems.

RP2: Extract information contained in data managers of different typology using tools and languages of consultation and manipulation of information, according to technical and functional specifications.

CR2.1 The tools and languages of query and manipulation to extract the information contained in the data managers are selected according to model specifications and data manager technology.

CR2.2 Information manipulation tools are used to extract and present information according to technical specifications, organization needs, and current legal regulations.

CR2.3 The coding of the instructions for the query and manipulation languages is used to perform the consultation procedures, according to the specifications required in the procurement and handling of current information and legal regulations.

CR2.4 The documentation inherent in the tools and languages of query and manipulation of information is interpreted to obtain the desired functionality in the process of extraction of information, taking into account the technical specifications of the same.

CR2.5 The extraction and query procedures performed are documented for registration according to organization rules.

CR2.6 The specific technical documentation associated with the tools and languages of consultation and manipulation is interpreted, where appropriate, in the most frequent foreign language in the sector.

RP3: Configure the gateways and connection media between client tools and data manager systems, to establish communication between the two according to the needs of the organization.

CR3.1 The connection parameters between client tools and data manager systems are implemented to establish the connection between the two and enable data extraction from the management systems as needed operational.

CR3.2 The configurations of connections between gateways and connection media and data manager systems are tested to determine the data extraction functionality according to the needs of the organization.

CR3.3 The documentation inherent in the client tool and the data manager system is interpreted to set the connection parameters between the software components involved in the connection according to specifications techniques and functional.

CR3.4 The associated specific technical documentation is interpreted, where appropriate, in the most frequent foreign language in the sector.

Professional Context

Production media

Computer and peripheral equipment. Operating systems and configuration parameters. Office tools. Specific client tools for accessing database manager systems. Specific languages of access to database manager systems. Standard accesses or gateways to database manager systems. Communication protocols. Connectivity tools. Web Servers. Security systems. Data manager engines to use, in test environment. Distributed information services.

Products and results

Data extracted in different formats of the information management system. Type templates to retrieve information from the information management system. Queries for the manipulation of information contained in data managers. Logical connections between data managers and clients.

Information used or generated

Design and specifications for the processing and storage of information. Overview of the information system to be performed, delivered and exploited. Data models contained in the data manager systems. Manuals for the use and operation of computer systems. Software operating manuals. Manuals for the development and query tools used. Documentation of training courses. Documentation of the exploitation of the information system. Technical support supports. Current legislation on intellectual property and copyright. "usability" manuals.

Competition Unit 2

Naming: CREATING AND MANAGING CONTENT REPOSITORIES

Level: 3

Code: UC0967_3

Professional Realizations and Realization Criteria

RP1: Create software components to structured the information of an organization in a structured way, according to the specified design and standards defined by standardization organizations.

CR1.1 Software components are created using specific language-oriented and document-oriented languages to structured information in a structured way, following data modeling and design regulations set by the organization.

CR1.2 The software components created identify the stored information and the different descriptors of such information, both in content and in meaning, for distinction and access according to the design and design regulations processing of the organization's information.

CR1.3 The languages and their encodings, proposed by the organization, are identified in the elaborated software elements for the structured storage of the information according to the specified layout.

CR1.4 The components created are integrated into the repository, using tools to obtain the hierarchical structure of the organization's contents according to given specifications.

CR1.5 The elaborated software components are checked, to demonstrate the structured storage functionality of the information defined by the organization.

CR1.6 The software components created are documented for registration and later use, according to organization rules.

RP2: Develop software components with specific languages, to exploit the information contained in repositories according to the needs of the organization.

CR2.1 The specifications of the information to be consulted are interpreted, identifying the contents to be used as a classification criterion for the further development of the software component, according to specifications received.

CR2.2 Components are developed using specific, document-oriented query languages to obtain views of the repository according to the needs of the organization.

CR2.3 Components are created using specific tools to facilitate the development process, according to organization specifications.

CR2.4 The elaborated software components are tested to verify the functionality of the information exploitation and manipulation, contained in repositories, defined by the organization.

CR2.5 The software components created are documented for registration and later use, according to organization rules.

CR2.6 The associated specific technical documentation is interpreted, where appropriate, in the most frequent foreign language in the sector.

RP3: Integrate in the organization's information system content to homogenize and systematize their exploitation and manipulation through specific tools.

CR3.1 The information is located on each support to be located within the repository hierarchy, depending on the organization's needs and specifications.

CR3.2 Software components are encoded with specific programming languages, to integrate information into the repository according to received specifications.

CR3.3 The information contained in other platforms is integrated into the repository using transformation and conversion tools, to facilitate the process according to the organization's specifications.

CR3.4 The configuration of data transformation and conversion tools for content integration is performed according to the parameters and characteristics of the technology used.

CR3.5 The integration processes performed are documented for registration and later use according to organization rules.

Professional Context

Production media

Computer and peripheral equipment. Operating systems and configuration parameters. Office tools. Virtual machines. Current browsers, and new technological design. Document-oriented specific languages and repository creation. Language for the access and processing of extended trademark documents. Application libraries and API's (Aplication Program Interface). Communication protocols. Software development tools. Debugging and testing tools. Software components already developed and/or distributed by computer companies. Web Servers. Security systems. Data manager engines to use, in test environment. Distributed information services.

Products and results

Information Repositories created and managed. Source code and executable code of software components that allow the exploitation and manipulation of information stored in information repositories.

Information used or generated

Design and specifications for the processing and storage of information. Overview of the information system to be performed, delivered and exploited. Manuals for the use and operation of computer systems. Software operating manuals. Manuals of the development tools used. Documentation of training courses. Documentation of the exploitation of the information system. Technical support supports. Current legislation on intellectual property and copyright. Documentation associated with the developed components. "usability" manuals. Job Templates

Competition Unit 3

Naming: ADMINISTERING THE INFORMATION MANAGEMENT SYSTEM

Level: 3

Code: UC0968_3

Professional Realizations and Realization Criteria

RP1: Define and implement the hierarchy and typology of the users in the information management system, to ensure security of access to it according to the needs of the organization.

CR1.1 Roles are defined according to the needs of the organization, to simplify the access and security tasks in the information management system.

CR1.2 User access policies to information management system resources are defined, to ensure the use of the information management system according to the organization's security specifications.

CR1.3 Managing users, groups, profiles, privileges, properties, and other features is performed using the information management system-specific tools to optimize the administrative process according to system needs.

CR1.4 User-defined accesses and their corresponding restrictions are checked periodically, to verify the security mechanisms of the information management system, according to quality parameters and organization security.

CR1.5 The processes performed are documented for registration and subsequent use, according to organization rules.

RP2: Perform audit processes on the information management system, to maintain and control system performance according to organization specifications.

CR2.1 Activity log files are identified, configured, and maintained in the information management system to collect data for events to be recorded according to specifications of security and performance of the organization.

CR2.2 Alerts and alarms are defined and configured in the information management system, to control system access and performance levels according to the organization's security and performance specifications.

CR2.3 The detected incidents in the information management system are fixed to ensure the functionality of the system, according to technical specifications and performance needs of the organization.

CR2.4 Audit processes are monitored in their execution to ensure system security and performance parameters, according to the organization's security and performance specifications.

CR2.5 Audit process management is documented for registration and subsequent use, according to organization rules.

RP3: Maintain information flow processes with specific tools, to ensure traceability of content according to organization specifications.

CR3.1 The content involved in the flow of information is identified and referenced within the information management system, as well as the relationships and activities to be performed with them, for the realization of the Traceability processes and monitoring processes according to the specifications of the organization.

CR3.2 Information flows are identified to track and verify, according to the administrative and functional specifications of the organization.

CR3.3 Information flow tools are used to perform traceability and information tracking processes, according to administrative and functional specifications of the organization.

CR3.4 Information flows are maintained to keep the information management system and traceability processes up to date, according to specifications received.

CR3.5 The diagrams and documents that describe system information flows are recorded and stored, to ensure their availability for subsequent organization-based queries.

CR3.6 The control of the versions of the repository information is done by using specific tools, to ensure the security of the information record according to the specifications of the organization.

CR3.7 Content traceability management is documented for registration and subsequent use, according to organization rules.

CR3.8 The associated specific technical documentation is interpreted, if any, in the most frequent foreign language in the sector.

RP4: Distribute the contents of the information management system for disclosure and use, according to the needs of the organization.

CR4.1 The end user's query tools to the information management system are identified and enabled, for use by the information management according to the policies of the organization.

CR4.2 The content to be published is selected and organized for distribution and subsequent access by the users, according to criteria of dependency and homogeneity according to the specifications of the organization.

CR4.3 The contents of the information management system are integrated into the distribution channel, for disclosure according to the organization's specifications.

CR4.4 Information access policies are included in distribution channel management, to prevent unauthorized uses of information according to organization specifications.

CR4.5 Distribution channel maintenance and control processes are performed periodically, to ensure their functionality and performance according to organization specifications.

CR4.6 The documentation of the processes performed is done to fulfill the management and registration needs of the distribution channel, according to the organization's specifications.

Professional Context

Production media

Computer and peripheral equipment. Operating systems and configuration parameters. Office tools. Protocol managers. Communications lines. Web Servers. Application servers. Database manager systems. Workflow tools. Information portal manager tools. Content management tools. Virtual machines. Current browsers, and new technological design. Development and debugging tools. Third-party components. Security systems. Test benches.

Products and results

User Services created. Security services of access to the contents created and maintained. Content traceability services maintained. Content publishing and distribution services. Managed information management systems. Source code and executable code of software components that enable communication services in information management systems. Source code and executable code of software components that enable workflows in information management systems. Information portal that integrates content from information systems

Information used or generated

Global view of the information management system. Manuals for the use and operation of computer systems. Software operating manuals. Manuals for the programming languages used. Training course materials. Technical support supports. Defined technical design. Technical support supports. Job templates. Legal regulations on data protection. Documentation associated with the developed components, for both the management of workflows and administrative tasks. Documentation associated with each of the information portal information pages.

III. PROFESSIONALISM CERTIFICATE TRAINING

FORMATIVE MODULE 1

Naming: QUERYING AND MANIPULATING INFORMATION CONTAINED IN DATA MANAGERS

Code: MF0966_3

Professional qualification level: 3

Associated with the Competition Unit: UC0966_3: Query and extract information from different data storage platforms

Duration: 210 hours

Training Unit 1

Naming: DATA MODELS AND CONCEPTUAL VIEW OF A DATABASE

Code: UF2213

Duration: 60 hours

Competition reference: This training unit corresponds to RP1

Assessment capabilities and criteria

C1: Identify the typologies of data managers and their corresponding data models according to given design specifications.

CE1.1 Describe the attributes and properties of the elements that make up the data models used by the data managers, to identify their function within the system according to the technologies used.

CE1.2 Identify changes in data models corresponding to data managers that support information management systems, to identify the new features of the elements that compose according to the temporal evolution of the related technologies.

CE1.3 Identify the general characteristics of the operational data management systems, to optimize the query and extraction of information according to technical specifications and market standards.

CE1.4 Explain the characteristics of decision-oriented data management systems to improve the procedures for consulting and managing information according to technical specifications and standards market.

CE1.5 To distinguish the characteristics of data management systems oriented to specific data (images, sounds, documents, geographical plans and videos, among others), to improve the consultation procedures used according to technical specifications and market standards.

CE1.6 Formulate, recognize and specify information retrieval techniques, to be used in the information system according to the data model and typology of the data manager implemented in the system information.

Contents

1. Conceptual data model

-Basic concepts:

-The reality: the objects.

-Concepts: information.

-The representations: the data.

-General features of a model.

-Model ER (entity-relationship):

-Basic builds.

-Extensions.

-UML Model.

2. Introduction to databases

-The concept and origin of the BD and the SGBDs.

-Evolution.

-Objectives and services.

-DB Logical Model:

-A hierarchical model.

-Network model.

-Relational model.

-Extended relational model.

-Object-oriented model.

3. Detailed analysis of the relational model

-Structure of the data.

-Model operations.

-Integrity rules.

-Relational algebra.

-Transform the ER model.

-Limitations.

4. Advanced DB models

-deductive BD.

-Temporary DB.

-GIs.

-DB distributed.

-Analytics DB (OLAP).

-Column DB.

-Documentary BD.

-XML DB.

-DB embedded (embedded).

-New trends.

5. Detailed analysis of DB distribution

-Distribution forms.

-ANSI/X3/SPARC architecture.

-Distributed transactions.

-Data distribution mechanisms.

Training Unit 2

Naming: IMPLEMENTING AND USING A DATABASE

Code: UF2214

Duration: 80 hours

Competition reference: This formative unit corresponds to the RP2

Assessment capabilities and criteria

C1: Distinguished the features and functions of the languages and tools for querying and extracting information from the data management systems, taking into account their technical and functional specifications.

CE1.1 Determine the functionalities and characteristics of the query languages used in the data managers, for use in the procedures for extracting and consulting information according to the specifications language skills.

CE1.2 Classify the functionalities and characteristics of the tools used in the data managers, for use in the procedures of extraction and consultation of information according to technical specifications of tools.

CE1.3 Compare the functionality of languages and tools to be used, for selection in the application of procedures in the query and extraction of information according to functional needs.

C2: Apply information extraction and query procedures on the data manager system, using specific query languages as required.

CE2.1 Use the grammar, syntax, and semantics of the query language used, for the creation of information extraction procedures according to the given coding and development rules.

CE2.2 In a convenient scenario, properly characterized, extracted, and queried using data manager system-specific query languages, according to a specified design:

-Identify sources of information for creating query and extraction procedures.

-Create procedures that allow you to formulate queries for information retrieval.

-Retrieve and archive previously established query and extraction procedures to exploit system information.

-Set presentation and publishing formats for information extracted from the data manager system used for the subsequent distribution of the system.

-Purge and verify the procedures created using the specifications implemented in the language to ensure the quality of the results.

-Document the created procedures.

CE2.3 Interpret the documentation inherent in the specific query language even if it is edited in the most frequently used foreign language in the sector, to enable the formulation and creation of extraction procedures and information query based on your technical and functional specifications.

Contents

1. BD Design

-Stages of database design.

-Standardisation theory:

-First normal shape.

-Second normal shape.

-Third normal shape.

-Boyce-Codd normal shape.

-Fourth normal shape.

-Fifth normal shape.

-Applying normalization theory to relational database design.

-DB Desnormalization.

2. Access methods to a DB

-Implementing the accesses by position.

-Implementing access by value.

-Indexes.

-B + trees.

-Scatter.

-Grouped indexes.

-Implementing access by various settings:

-Implementing the shortcuts.

-Implementing sequential and mixed accesses.

3. Data extraction and query languages

-General features.

-SQL.

-OQL.

-JPQL.

-XMLQL.

-Other:

-HTSQL.

-LINQ.

4. Query language analysis for relational BD

-Data definition statements.

-Data manipulation statements.

-Granting and revoking privileges.

-Stored procedures.

-Disparators.

Training Unit 3

Naming: TOOLS FOR THE DATABASE MANAGER SYSTEMS. GATEWAYS AND CONNECTION MEANS

Code: UF2215

Duration: 70 hours

Competition reference: This training unit corresponds to the RP3

Assessment capabilities and criteria

C1: Apply information extraction and query procedures on the data manager system, using specific tools.

CE1.1 Classify the different work options implemented in the application tool, for selection in the creation of extraction and information consultation procedures, according to functional needs and technical specifications.

CE1.2 In a practical scenario, properly characterized, extracted and queried using specific tools in the data manager system and according to a given needs:

-Identify sources of information for creating query and extraction procedures.

-Formulate queries that allow information to be retrieved according to a given design.

-Retrieve and archive previously established queries to optimize information exploitation processes.

-Set presentation and publishing formats for information extracted from the data manager system used to perform the distribution of the data manager according to a given design.

CE1.3 Interpreting the documentation inherent in the specific tools, even if it is edited in the most frequent foreign language in the sector, to allow the formulation and creation of extraction and consultation procedures information according to functional needs.

C2: Apply the gateway and media configuration procedures to extract and query information from data manager systems, according to functional needs.

CE2.1 To provide general features of gateways and connecting means to enable their selection and use in information extraction and consultation procedures, according to the technical specifications of the systems data managers.

CE2.2 Use connection media and gateways to extract and query information from the implemented data manager system, according to functional specifications.

CE2.3 Identify the parameters to be configured on a gateway or connection means to be able to extract and query information from data manager systems, according to technical specifications of the communications infrastructure and of the data manager system.

CE2.4 Interpret the documentation inherent in gateways and connection media, even if it is edited in the most common foreign language in the sector, using it as a help in the configuration procedures.

Contents

1. BD Management Systems

-Functionality and objectives.

-Functional architecture.

-The request processing component:

-Security.

-Concurrency.

-Transactionality.

-Query processing:

semantic optimization.

Syntactic optimization.

Physical optimization.

-The data management component:

-Restore.

-Rebuild.

-Managing performance:

-Plan of the queries.

-Monitors.

-Benchmarks.

-Tools:

-Administration.

-Import/Bulk Export of Data.

-Data access and query.

2. Information analysis systems

-Data mining.

-OLAP.

-Dashboard/scorecard.

-Tools:

-Administration.

-Migration.

-ETL.

-Statistical information.

3. CASE Tools

-Concept.

-History and evolution.

-Classification.

-Components and functionalities of a CASE tool.

4. 4GL environments

-Typology.

-Components and functionalities.

-Report generators.

-Form generators.

-Graphics generators.

-Application generators.

-New trends.

5. Developing applications

-Emdrinks orders.

-Using function libraries.

-Design new languages.

6. Connectivity technologies to BD

-OLEDB.

-ODBC.

-JDBC.

-SQLJ.

-SQL/CLI.

Methodological guidelines

To access the Formative Unit 2 must have passed the Formative Unit 1

To access the Formative Unit 3 must have been exceeded FormUs 1 and 2

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 2

Naming: CREATING AND MANAGING CONTENT REPOSITORIES

Code: MF0967_3

Professional qualification level: 3

Associated with the Competition Unit: UC0967_3 Create and manage content repositories

Duration: 200 hours

Training Unit 1

Naming: CONTENT REPOSITORIES

Code: UF2216

Duration: 70 hours

Competition reference: This training unit corresponds to RP1

Assessment capabilities and criteria

C1: Create content repositories using specific languages and software development standards.

CE1.1 Identify software development standards, using specific languages to create software components that store information, addressing content and meaning in structured and hierarchical mode.

CE1.2 In a convenient scenario, properly characterized, perform the repository creation functions to cover the information management needs, according to a specified design in the repository Reference:

-Create and archive information in the repository using the descriptors set in the market standard repository design and regulations.

-Modify and remove information in the repository.

-Store the repository in data stores according to received specifications, such as relational databases, database flat files, extended brand documents, among others.

CE1.3 In a convenient scenario, properly characterized, create repositories using specific languages, according to development standards, for information management:

-Identify the different document types declarations that exist in the repository.

-Recognize the different types of elements, attributes, entity declarations, and other markup elements in the repository.

-Use style sheets to allow homogenization of content in the repositories according to specified style rules.

-Use repository schemas that allow common vocabularies to be developed among other features to improve interoperability between applications and data exchange.

-Implement information in the repository according to the language specifications of that information.

-Use name schemas according to the specifications received to allow cooperation in building the repository.

CE1.4 Recognize and create the semantic specifications of the repositories, according to an established design for their implementation in the creation of repositories using specific languages and tools.

Contents

1. Content repositories

-Basic concepts.

-Incorporation of contents:

-Acquisition.

-Aggregation.

-Creation.

-Content associations:

-Hierarchy, taxonomies.

-Indexes.

-Cross-references.

-Document life cycles.

-Workflows.

-Versioned content.

-Check In/Check Out:

-Conflict resolution.

-Diff/merge tools.

-Searching and locating information.

-Publish:

-Syndication.

-Web Services.

-Security.

2. Internal structure of a repository

-Storage of information:

-Database.

-Ficheros.

-Database and files.

-Development standards:

-CMIS.

-JSR-168.

-JSR-170.

-JSR-283.

3. Metadata

-Concept.

-Benefits.

-RDF Ontology.

-Dublin Core Metadata.

-The Adobe's Extensible Metadata Platform (XMP) metadata.

-Exchangeable image file format (EXIF) metadata.

-IPTC Metadata.

4. Content management systems

-Blog Management Systems (Blogs).

-Wiki Systems.

-Portal Systems.

5. Learning Management Systems (LMS)

-Overview.

-IMS Standards.

-IEEE LOM Standard.

-ADL SCORM Initiative.

Training Unit 2

Naming: XML LANGUAGE

Code: UF2217

Duration: 80 hours

Competition reference: This formative unit corresponds to the RP2

Assessment capabilities and criteria

C1: Develop software components that allow the exploitation of content from repositories, using specific languages and software development standards.

CE1.1 Identify software development standards using specific languages that allow the exploitation of content from repositories, to enable their transformation, publication and exchange of content between information systems according to given functional specifications.

CE1.2 In a practical scenario, given the need to exploit the information repository, build software components that allow the exploitation of content from repositories, using specific languages and software development standards that develop the following functionalities:

-Transform contents of the repository that allow to be presented and published according to specified standards.

-Access parts of the repository that ensure the extraction of the contents necessary for the software component development.

-Create links between repository contents that ensure connectivity between the different resources in the repository.

-Allow access to the internal structure of the repository for use in content exploitation.

CE1.3 Interpret the documentation inherent in the specific languages used in the creation of content repositories, even if it is edited in the most frequent foreign language in the sector, using it help, in component development.

Contents

1. Defining XML documents

-Elements.

-Attributes.

-Well-formed documents.

-Coding and character sets.

-Entities.

-Comments.

-Non-XML data inclusion.

-Namespaces.

2. Validation by DTD

-Element declarations:

-PCDATA.

-Children items.

-Sequences.

-Number of children.

-Options.

-Parenthesis.

-Mixed content.

-Empty items.

-ANY.

-Attribute declarations:

-CDATA.

-NMTOKEN.

-NMTOKENS.

-Enumeration.

-ID.

-IDREF.

-IDREFS.

-ENTITY.

-ENTITIES.

-NOTHING.

-General identity declarations.

-External general entities analyzed.

-Unparsed Notations and External Entities.

-Parameter entities.

-Conditional inclusion.

3. XML schemas

-Organization of the document.

-Log.

-Element declarations.

-Attribute declarations.

-Complex types.

-Empty items.

-Defining simple types.

-Using groups.

-Inclusion of external declarations.

-Modifying external declarations.

-Importing schemas from other namespaces.

-Complex types derived.

4. Accessing XML document information

-XPath.

-XLink.

-XPointer.

-XQL.

5. Transforming XML documents

-CSS.

-XSL/XSL-FOXSLT.

6. Other languages to use with XML documents

-Base XML.

-XInclude.

-XML Information Set.

7. XML language applications

-XHTML.

-REST.

-XML-RPC.

-SOAP.

Training Unit 3

Naming: DEVELOPMENT OF A CONTENT MANAGER (CMS)

Code: UF2218

Duration: 50 hours

Competition reference: This training unit corresponds to the RP3

Assessment capabilities and criteria

C1: Distinguished logical programming structures and techniques for software component development, taking into account development technologies.

CE1.1 Classify the standard logical programming structures and techniques for the development of software components, according to existing development methodologies.

CE1.2 Identify the phases that constitute the development of a software component, for later creation according to specified tools and languages.

CE1.3 Classify the elements that constitute a software component, for application in the development of it according to given designs.

CE1.4 Explain methods for using or using application libraries from programming languages, to enable the exploitation of information systems repositories according to design specifications and functional.

CE1.5 Identify the standard application library models of the market that allow access, query, and information extraction from information systems repositories to be used in the development of components using programming languages according to given design and functional specifications.

C2: Develop software elements that integrate or explore content from other repositories, using the standard application interface of the market to access data repositories.

CE2.1 Develop software elements that fulfill the functionality of interpreting the contents of the repositories, to provide such information according to specified requirements.

CE2.2 Using standard application book (API) models of the market (models of "DOM" document objects, "SAX" event-based models, among others) that allow access, query and extraction of information of the repositories of the information systems, to be used in the development of components using programming languages according to the functional and design specifications given.

CE2.3 Verify and debug the elaborated software elements by ensuring that the specified contents are obtained.

Contents

1. Implementation projects

-Development Methodology.

-Requirements analysis.

-Functional description.

-Architecture design.

-Technical design.

-Programming:

-Unit tests.

-Functional audit.

-Technical audit:

-Code review.

-Metrics.

-Performance tests.

-Deployment.

-Release.

2. Technology Environment

-CMS services platforms.

-Adequation. Customisation.

-Developing new components:

-Specification. Interface.

-Implementation:

Programming Language.

Libraries. APIs.

-Documentation.

3. XML processing models

-Text-based XML processing.

-Event-driven XML processing.

-Tree-based XML processing.

-Extraction-based processing.

-Transformations.

-XML abstraction.

-Standards and extensions.

4. Document Object Model (DOM)

-The DOM Core structure.

-Node and other generic interfaces.

-Structural nodes.

-Content nodes.

-DOMImplementation interface.

-DOM Level 3 interfaces.

5. Event-based model (SAX)

-ContentHandler interface.

-Options and properties.

-Filters.

Methodological guidelines

Sequence:

To access the Formative Unit 2 must have passed the Formative Unit 1

To access the Formative Unit 3 must have been passed the formative Units 1 and 2.

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: INFORMATION MANAGEMENT SYSTEMS ADMINISTRATION

Code: MF0968_3

Professional qualification level: 3

Associated with the Competition Unit: UC0968_3 Administer the information management system

Duration: 100 hours

Training Unit 1

Naming: MANAGEMENT AND CONTROL OF INFORMATION SYSTEMS

Code: UF1643

Duration: 70 hours

Competition reference: This training unit corresponds to RP1, RP2, and RP3

Assessment capabilities and criteria

C1: Determine access to the information management system using specific tools, depending on the needs and functional specifications given.

CE1.1 Describe the functionalities and characteristics of an information management system, to enable the understanding of the management procedures used according to functional specifications of administration the information.

CE1.2 Identify the types of information management systems that allow you to recognize the management operational used, according to its administrative and hierarchical structure.

CE1.3 Relating the components or elements of an information management system to identify the same in the information management operational that is used in your work environment, as required functional.

CE1.4 Define user access policies to information management system resources to ensure security of access to the system, according to defined needs.

CE1.5 Determine the privileges assigned to users and other elements of the information management system for access to it according to defined needs.

CE1.6 In a practical scenario, of an implemented information management system, determine the existing security parameters in that system according to a specified rule:

-Recognize user access policies to the information management system.

-Identify the management of users, groups, profiles, and privileges used on that system.

-Distinguished the system or systems of data managers that support the information management system.

-Determine the information repositories used in the same and the implemented implementation.

-Describe aspects of the platform and logical components used, related to market standards.

-Relate specific aspects of that information system.

C2: Apply audit and incident resolution procedures in the information management system, depending on the needs given.

CE2.1 In a practical scenario, in which an information management system is implemented, audit procedures are applied to obtain information inherent in the access and operation of the system information according to the specified audit plan criteria:

-Identify sources of information.

-Determine the audit procedures to be applied based on the events to be controlled.

CE2.2 Apply the performance parameters established in the information manager system to optimize the access and exploitation of content by users, according to quality and performance specifications services.

CE2.3 Identify the types of incidents that may occur in the information management system and proceed to your solution by applying the technical techniques and procedures specified, ensuring the operation of the system.

CE2.4 Identify traceability control processes in terms of user access and control of information management within the system to verify compliance with the given security regulations.

CE2.5 Document the incidents that occurred and their resolution in the information management system, to be applied if the circumstances occurred again, according to the instructions given.

C3: Maintain information flow processes in the information management system, according to given specifications.

CE3.1 Identify the characteristics of the information flows in an information management system, to be used in the elaboration and maintenance of the same according to management and administration standards given.

CE3.2 Use specific tools inherent in the information management system to allow the management of users, groups, profiles, privileges, properties, and other features in the data manager used, to the given administrative and security specifications.

CE3.3 In a practical scenario, properly characterized, perform the maintenance of the information flow processes in the information management system, with an administrative plan and process designs Given organizational structure:

-Define processes in a flow of information according to the given specifications.

-Create components of an information flow process.

-Draw information flow diagrams.

-Assign roles in the information flow.

-Set activities in the information flow by customizing the same or using templates.

-Develop error procedures, functions, and events.

-Verify the created information flows.

-Use other information flow features.

CE3.4 Use information flow building tools to be implemented in the information management system according to specifications given in the design.

CE3.5 Identify and protect corporate records and content, using specific tools in order to organize and secure the life cycle of documents, from creation to their last disposition, as well as the personal access restrictions.

CE3.6 Interpret the technical documentation inherent in the tools used in the implementation and integration of information flows and registry management in information management systems, even if it is edited in the most frequently used foreign language in the sector using aid, following established rules and formats.

Contents

1. Features and elements of an information management system

-Objective: Alignment with the business.

-Dynamic Process: Continuous Improvement (Schedule, Do, Verify, Act).

-Influential factors:

-Internal.

-External.

-Actors:

-People.

-Data-Information-knowledge.

-Material resources (infrastructure, venues, technology).

-Activity-Procedures or working techniques.

-Organization:

-Corporate governance.

-Best practices for information technology management.

-IT Strategy Committee:

-Scorecard balanced IT standard.

-Information security governance.

-Enterprise organizational structure.

-Information Systems Strategy:

-Strategic Planning.

-Address Committee.

2. Information management system types and data managers

-Addressing Goals:

-Competitive Systems.

-Cooperative Systems.

-From a business point of view.

-Transaction Processing System (TPS).

-Management information systems (MIS).

-Decision Support Systems (DSS).

-Executive information systems (EIS).

-Office Automation Systems (OAS).

-Resource Planning System (ERP).

-Expert System (SE).

-According to the application environment:

-Transactional environment.

-Decisional environment.

-DBMS types:

-According to data model:

-Relational data manager systems.

-Object-oriented data manager systems.

-Object-relational data manager systems.

-According to the number of users:

-User.

-Multiuser.

-According to number of sites:

-Centralized.

-Distributed.

-Three Schema Architecture:

-Internal or physical level.

-Conceptual Level.

-External Level or Views.

-Data Independence:

-Logical.

-Physics.

-Database queries. Languages:

-According to level.

-According to area:

-Language to define views.

-Language to define data.

-Language to define storage.

-Language to manipulate data.

-Transactions:

-Atomicity.

-Consistency.

-Isolation (isolation).

-Durability.

-User interfaces:

-Command interpreter:

-Forms.

-Graphics interfaces.

-Interfaces in Natural Language.

-SGBD free.

-Commercial SGBD.

-Free and free SGBD.

3. Management of traceability control processes

-Application controls:

-Input/source controls.

-Data processing procedures and controls.

-Output controls.

-Control compliance objectives business process.

4. Auditing the information systems

-Audit application controls:

-Flow of transactions through the system.

-Risk study model for analyzing application controls.

-Observe and test procedures performed by users.

-Test integrity of data integrity data in online transaction processing systems.

-Test application systems.

-Audit continues online.

-Online audit techniques.

-Audit of systems development, acquisition, and maintenance:

-Administration/project management.

-feasibility/feasibility study.

-Defining requirements.

-Software acquisition process.

-Detailed design and development tests.

-Implementation stage.

-Post-implementation review.

-System change procedures and program migration processing.

-Audit of infrastructure and operations:

-Hardware reviews.

-Operating system reviews.

-Database reviews.

-Network implementation and infrastructure reviews.

-Network operational control reviews.

-Revisions of the if operations.

-Lights-out operations.

-Problem reporting reviews by management.

-Hardware availability and utilization report reviews.

-Review of Cronograms.

5. Performance parameters in the system and incident resolution procedures

-Hardware parameters:

-Utilization of Memory, CPU, Disk Utilization.

-Software parameters:

-Buffer Administrator statistics.

-Connection Statistics.

-Cache Details.

-Lock Details.

-Access Method Details.

-Database Details.

-Test environments.

-Drive Test.

-Interface or Integration Test.

-Test the System.

-Recovery Tests.

-Security Tests.

-Stress/Volume tests.

-Performance Tests.

-Final Acceptance Test.

-Incidents resolution techniques and procedures on a system.

-Overview of Incident Management and Response.

-Incident management concepts.

-Objectives in incident management.

-Metrics and indicators of incident management.

-Defining incident management procedures.

-Developing an incident response plan.

-Developing response and recovery plans.

-Tests for response and recovery plans.

-Running response and recovery plans.

-Event documentation.

-Post-event decisions.

-ITI-ISO/IEC 20000.

6. Characteristics of the flow and lifecycle processes of the information. Components and tools

-Risk management:

-Overview

-Concepts of the GR in Information Security.

-Implementation of the GR.

-Methodology for risk assessment and analysis.

-Risk assessment.

-Controls and countermeasures.

-Recovery Goal Time.

-Integration into Life Cycle processes.

-Minimum Control Levels.

-Monitoring.

-Training and awareness.

-ISO/IEC 27001.

-Developing applications:

-Traditional approach to the system development lifecycle.

-Integrated resource management/management systems.

-Description of traditional sdlc stages.

-feasibility/feasibility study.

-Definition of requirements.

-Entity-relationship diagrams.

-Acquisition of software.

-Design.

-Development.

-Implementation.

-Post-implementation review.

-Alternative strategies for application development.

-ISO/IEC 15504

-CMMI

-METRIC 3:

-Information Systems Planning:

-PSI Requirements Catalog

-Information architecture.

-Information Systems Development:

-System Viability Study (EVS),

-Information System Analysis (ASI),

-Information System Design (DSI),

-Building the Information System (CSI).

-System Implementation and Acceptance (IAS).

-Maintenance of Information Systems.

Training Unit 2

Naming: DISTRIBUTION AND PUBLISHING CHANNELS USED IN INFORMATION MANAGER SYSTEMS

Code: UF1644

Duration: 30 hours

Competition reference: This training unit corresponds to the RP4

Assessment capabilities and criteria

C1: Publish the contents of the information system using the distribution channels according to the given functional needs.

CE1.1 Select information system contents by following specified instructions.

CE1.2 Choose the distribution channels used by the information manager system, for the distribution of the contents of the repositories or external sources, according to a given needs.

CE1.3 Use the content publishing tools specific to the distribution channels for communication of the same according to functional specifications.

CE1.4 Apply the procedures for publishing and administering content, according to the format and type of information, to allow their distribution according to the specified design.

Contents

1. Distribution channels for information. Classification and types. Information portals

-Classification of information:

-Who.

-When.

-How.

-Owner of the information.

-Communication manager.

-Community Manager figure.

-Content managers:

-Internal.

-External.

-Features, programming language, licenses (Joomla, Drupal).

-Classification by use and functionalities:

-Blogs.

-Forums.

-Wikis.

-Teaching.

-Electronic commerce; user management platform, catalog, purchases, and payments.

-Digital publications.

-Intranet.

-Extranet.

-Web 2.0.

-Social Media.

2. Content communication tools in the information management systems. Other publishing and distribution procedures using computer applications

-Email (subscription).

-News Aggregator:

-Atom.

-RSS.

-Examples.

-Centralized aggregators in web services.

-Google Reader.

-My Yahoo!.

-Bloglines.

-Netvibes.

-IGoogle.

-Desktop aggregators.

-FeedReader (Windows).

-NetNewsWire (Mac).

-Liferea (Linux).

-Broadcast-Web Syndication.

-SMS/MMS.

-Social Networks (fan, followers).

-Generating alerts/warnings.

Methodological guidelines

To access the Formative Unit 2 must have passed the Formative Unit 1

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

INFORMATION MANAGEMENT SYSTEMS NON-WORK PROFESSIONAL PRACTICE MODULE

Code: MP0459

Duration: 80 hours

Assessment capabilities and criteria

C1: Collaborate on the development, analysis, and management of information systems.

CE1.1 Analyze the development requirements of corporate content managers.

CE1.2 Evaluate the analysis and design of the systems according to the established requirements.

CE1.3 Verify the use and reuse of software components in the realization of corporate content managers.

CE1.4 Supporting the development and maintenance of systems that support content managers

CE1.5 Collaborate on the documentation of the systems that support the content managers

CE1.6 Investigate new tools or updates from existing ones to improve productivity in development

CE1.7 Facilitate coordination between the design, development, installation, and deployment groups of content managers

C2: Auditing the use and security of information systems

CE2.1 Classify content managers according to their criticality and value for the company

CE2.2 Provide support in performing software audits for the verification and improvement of the quality and security of content managers

CE2.3 Perform tests according to rules and quality criteria set in the company

CE2.4 Provide assistance in the application of quality and security improvement measures for content managers.

CE2.5 Report information to the address for a governance and information systems management

C3: Participate in the company's work processes, following the rules and instructions set out in the job center.

CE3.1 Behave responsibly in both human relationships and the jobs to be performed.

CE3.2 Respect the procedures and rules of the work center.

CE3.3 Diligently undertake the tasks according to the instructions received, trying to bring them into line with the work rate of the company.

CE3.4 Integrate into the production processes of the job center.

CE3.5 Use the established communication channels.

CE3.6 To respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Plan, define, and create an intranet-extranet content manager

-Defining functional requirements.

-Valuation of design methodologies.

-Choosing information architecture.

2. Content Manager Development

-Feasibility study.

-Analysis.

-Design.

-Construction.

-Deployment.

3. Maintenance and operation of the content manager

-Performing audit plans.

-Review of security.

-Analysis of performance.

-Evaluating the level of integration and optimization.

-Identifying improvement aspects.

-Realization of reports.

4. Integration and communication with users

-Managing access and publishing.

-Regulations and procedures for use.

-Feedback channels, complaints, improvements.

5. Integration and communication in the job center

-Responsible behavior in the job center.

-Respect to the procedures and rules of the work center.

-Interpreting and diligently performing the instructions received.

-Recognition of the organization's production process.

-Using the communication channels set in the job center.

-Adequation to the company's work rate.

-Tracking the regulations for risk prevention, occupational health and environmental protection.

IV. PRESCRIPTIONS OF TRAINERS

Modules

Required Accreditation

*Professional Experience required in the scope of the competency

MF0966_3: Query and manipulation of information contained in data managers.

▪ Bachelor, Engineer, Architect or corresponding degree degree or other equivalent titles.▪ Diplomat, Technical Engineer, Technical Architect or corresponding degree title or other equivalent titles.

1 year

MF0967_3 Creating and managing content repositories.

▪ Licensed, Engineer, Architect or corresponding degree title or other equivalent titles.▪ Diplomate, Technical Engineer, Technical Architect or the corresponding degree title or other equivalent titles.

1

MF0968_3 Information Management Systems Administration

▪ Licensed, Engineer, Architect, or the corresponding degree or other equivalent titles.▪ Diplomate, Technical Engineer, Technical Architect or corresponding degree degree or other equivalent titles.

1 year

* For the last three years.

V. MINIMUM REQUIREMENTS FOR SPACES, FACILITIES AND EQUIPMENT

Formative space

Surface m215 pupils

Surface m225 students

45

75

Forative Space

X

M1

M2

M3

X

X

X

Forative Space

Classroom.

-Audiovisual equipment.-PCs installed in network, with Internet connection.-PC with server functions.-Canon of projection.-Specific software of the specialty.-Pizarras for writing with a marker.- Flip-chart.-Classroom material.-Table and chair for trainer.-Messes and chairs for students.

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

The facilities and equipment must comply with the relevant industrial and sanitary sanitary regulations and respond to the universal accessibility and safety measures of the participants.

The number of units to be provided with the tools, machines and tools specified in the training spaces will be sufficient for a minimum of 15 students and must be increased, in their case, to attend to the top number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.

ANNEX III

I. IDENTIFICATION OF THE CERTIFICATE OF PROFESSIONALISM

Naming: SECOND-LEVEL MAINTENANCE ON RADIO COMMUNICATIONS SYSTEMS

Code: IFCM0111

Professional Family: Informatics and Communications

Professional Area: Communications

Professional qualification level: 3

Professional reference qualification

IFC366_3 Second level maintenance on radio communications systems. (RD 1701/2007 of 14 December 2007).

Relationship of competency units that configure the certificate of professionalism

UC1221_3: Organize and manage the commissioning and maintenance of local and metropolitan area wireless networks.

UC1222_3: Coordinate the service of fixed and mobile network radio communications systems.

UC1223_3: Manage the maintenance of fixed and mobile network radio communications systems.

General Competition

Organize and coordinate implementation and preventive maintenance processes, as well as resolve incidents and complaints received directly or scaled down the lower level, in local area wireless networks and metropolitan, and in fixed and mobile radio communications systems, ensuring their availability, security, optimal performance and functionality of the services.

Professional environment

Professional scope:

Develops its professional activity in companies or public or private entities, of any size, both self-employed and self-employed, that have communications network infrastructure and offer services of communications.

Productive Sectors:

It is located fundamentally in the communications sector, and mainly in the following types of companies: Public bodies and companies in any productive sector that for their size and organization need to manage networks radio communications. Companies providing installation, maintenance and technical assistance services to radio communications networks. Communications operator and companies providing communications services.

Relevant Occupations and Jobs:

Second-level maintenance and support expert on radio communications systems.

Expert on networks and WLAN systems.

Wireless network operations monitor.

Radio frequency measurement expert on the exterior and interior floor.

3124.1018 Communications electronics technician.

3833.1033 Telecom Technician.

Duration of the associated training: 680 hours

Relationship of training modules and training units

MF1221_3: Planning and maintaining local and metropolitan area wireless networks (210 hours):

▪ UF2182: Planning for local and metropolitan area data wireless networking. (90 hours)

▪ UF2183: Configuring the security of local and metropolitan area wireless networks. (70 hours)

▪ UF2184: Monitoring local and metropolitan area wireless networks. (50 hours)

MF1222_3: Managing the service of fixed and mobile network radio communications systems. (180 hours):

▪ UF2185: Planning for the putting into service of fixed and mobile network radio communications systems. (90 hours)

▪ UF2186 Elaboration of fixed and mobile network radio communications equipment test protocols. (40 hours)

▪ UF2187 Monitoring the measurements of radio frequency signals. (50 hours)

MF1223_3: Managing the maintenance of fixed and mobile network radio communications systems. (210 hours):

▪ UF2188: Programming of preventive maintenance in mobile and fixed network radio communications systems. (70 hours)

▪ UF2189: Diagnosis and resolution of incidents in mobile and fixed network radio communications equipment. (90 hours)

▪ UF2190: Managing the inventory of radio communications systems. (50 hours).

MP0453: A second-level non-working professional practice module in radio communications systems. (80 hours)

II. PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: ORGANIZING AND MANAGING THE COMMISSIONING AND MAINTENANCE OF LOCAL AND METROPOLITAN AREA WIRELESS NETWORKS

Level: 3

Code: UC1221_3

Professional Realizations and Realization Criteria

RP1: Schedule the execution of the project and coordinate the work teams for the service and configuration of wireless networks in the local and metropolitan area, adapting the project and optimizing the available resources and resources.

CR1.1 The technical information collected in the study phase prior to the installation of a wireless network is organized and supervised, in order to participate in the elaboration and documentation of the installation project, according to usage needs and following procedures established by the organization.

CR1.2 The project's technical specifications are interpreted to identify the architecture, topology, and elements to be implemented and put into service, following rules defined by the organization.

CR1.3 The definitive location and number of access points and/or base stations in metropolitan networks are decided and their installation is coordinated, according to the technical specifications received, to ensure the functionality of the network.

CR1.4 The configuration of the parameters of devices and equipment, access points, and base stations of metropolitan networks, as well as the subscriber interior unit of a metropolitan area fixed link plans and monitors, to ensure the functionality of the entire network, following specifications indicated in the project.

CR1.5 The network's operational test procedures are developed and coordinated to ensure the quality of the service, according to the specifications indicated in the project.

CR1.6 The extension of coverage of local wireless networks to entire buildings or large areas is planned, using appropriate network topologies, ensuring in any case the quality of the service, following technical specifications received and according to usage needs.

CR1.7 Local public access areas (Hotspot) are configured to authenticate the user association, redirect them to the system web portal, and monitor the start and end of each session, according to the Received technical specifications and usage needs.

CR1.8 The convergence between mobile devices and the wireless network is configured taking into account the multiple technologies on the market, based on user location, required application and user location criteria. quality of service among others.

CR1.9 The activities performed, as well as the detected incidents, are documented in normalized format for later use, following the rules set by the organization.

RP2: Define and configure the local and metropolitan area wireless network security parameters, according to the environment and features of the network, to maintain network integrity and privacy.

CR2.1 Physical security measures and access restrictions to comply, plan and coordinate their execution, to prevent misuse of resources provided by communications devices, according to the organization security plan.

CR2.2 Data traffic security between wireless and wired is configured by selecting the most appropriate services for each case, IP sub-routing, VLAN segmentation, encryption codes, and key encryption, and ensuring interoperability of existing standards, according to the technical specifications received and usage needs.

CR2.3 The security parameters of mobile and fixed equipment that are associated with the wireless network are configured to ensure security with respect to other users and the network's own services, as usage needs and following rules established by the organization.

CR2.4 The security mechanisms available at the access points are activated and configured according to the specific characteristics of each, following the instructions provided by the manufacturer, adapting to the network services required in the implementation project and following the specifications of the implementation project.

CR2.5 Remote access tools are used for configuring the security parameters of installed devices and devices, taking into account technical specifications.

CR2.6 The user authentication server that is associated with the wireless network is configured using techniques that require authentication of the user name and password as a prerequisite to the start of the data, according to the organization's security plan.

CR2.7 The activities performed, as well as the detected incidents, are documented in normalized format for later use, following the rules set by the organization.

CR2.8 The associated specific technical documentation is interpreted, where appropriate, in the most frequent foreign language in the sector.

RP3: Monitor the operation of local and metropolitan area wireless networks, and coordinate maintenance, according to usage needs and within the organization's directives, ensuring its functionality.

CR3.1 Performance management systems and applications are configured to analyze the quality of service and the operational capacity of the coverage cells, according to the number of base stations associated with each of the they.

CR3.2 The monitoring tools are configured to collect values indicative of the level and quality of the radio signal and noise level, interpreting the information obtained and establishing a possible hypothesis cause of the detected problems, according to the quality criteria defined by the organization.

CR3.3 The periodic verification procedures are defined and coordinated in order to detect phenomena of electromagnetic interference, excessive noise levels or low performance of the network by signal loss or poorly configured equipment, taking into account technical specifications of the network and equipment.

CR3.4 The execution of the data capture procedures of the radio frequency signal measurements during the scanning of the coverage areas is coordinated, evaluating the data obtained, in order to generate results reports to be used for improvement in the quality of the service, in accordance with the rules established by the organization.

CR3.5 Systems to ensure data privacy or user authentication are reviewed and updated, taking into account the evolution of existing standards, the capabilities available in the teams and the organization specifications.

CR3.6 The incidents that come from the lower level of responsibility are resolved, or are scaled to the supplier of the equipment or services, according to technical specifications and following the protocols of action established by the organization.

CR3.7 The activities performed, as well as the detected incidents, are documented in normalized format for later use, following the rules set by the organization.

Professional Context

Production media

Computer Equipment. Wireless communications equipment (modems and bridges, among others). Computerised tools for connectivity testing. Office tools. WiFi equipment: access points, cards, adapters, different types of antennas. WiMax equipment: inner unit, base station, different types of antennas. Field meter for the 2.4 GHz band and the WiMax band (up to 10 GHz). Project planning tools. Planimetry of the wireless network implementation areas. Computer simulation applications of indoor and outdoor coverage areas. Graphic design programs for network schemas. Laptop with WiFi and WiMax network scanning software. Mobile devices. GPS positioner, digital camera. Network traffic monitoring programs. Portable wireless and wired network analyzers. Protection and security elements.

Products and results

Local and metropolitan area wireless networks configured and secured. Functional parameters on configured external network connection devices. Wireless data networks with coverage extended to the interior of buildings. Wi-Fi networks for indoor and outdoor public access. Malladas wireless networks in local and metropolitan areas. Point-to-point (backhaul) wireless links in local and metropolitan area networks. Wireless Internet Service Access Services (WISP). Monitoring of the quality of service. Second-level support for network services and user devices. Convergence of services between fixed and mobile networks.

Information used or generated

Work Orders. Communications infrastructure security policy. Installation manuals, reference and use of communications equipment. Information about communications equipment and software. Regulations, regulations and standards. Technical documentation of projects and communications facilities. Time and pricing manuals for communications facilities. Technical information on mobile devices and associated technologies. Local and metropolitan area wireless network implementation projects. IEEE 802.11, 802.15, 802.16, and 802.20 standards. Access point configuration manuals. Information on local and extensive area networks and public and private communication systems. Information about communications equipment and software. Regulations, regulations and standards (ISO, EIA, UIT-T, ETSI). Documentation on safety and hygiene standards and prevention of occupational risks. Technical configuration documentation. Technical team test reports.

Competition Unit 2

Denomination: COORDINATE THE COMMISSIONING OF FIXED AND MOBILE NETWORK RADIO COMMUNICATIONS SYSTEMS

Level: 3

Code: UC1222_3

Professional Realizations and Realization Criteria

RP1: Schedule and coordinate the entry into service of radio communications equipment of fixed and mobile networks to ensure their integration into the network, according to technical specifications of the project.

CR1.1 The specifications of the project of the radio communications system of fixed and mobile networks to be implemented are interpreted and identified the different elements that make up the system, taking into account their integration in the communications network.

CR1.2 Operations, in the field and in the Operation and Maintenance Center, required for the entry into service of fixed and mobile radio communications equipment, are identified to develop optimal planning of putting into service, according to the project specifications and taking into account the security measures established by the organisation.

CR1.3 Project execution programming is done using specific planning tools to implement and coordinate, according to technical specifications and follow the rules of the organization.

CR1.4 Installation verification procedures are defined and coordinated with the aim of putting into service the radio communications system of fixed and mobile networks after the installation of the software and configuration of radio communications devices and equipment, according to technical specifications of the project.

CR1.5 The installation of the radio communications devices and equipment software, fixed and mobile, is planned and monitored for execution, to ensure the commissioning, taking into account the technical specifications of the same.

CR1.6 The configuration of mobile and fixed network radio communications devices and equipment is defined by preparing the configuration procedures, according to technical specifications of the project.

CR1.7 The entry into service of fixed and mobile radio communications equipment is evaluated to identify any potential negative effects and to make reverse decisions in real time, according to specifications. project techniques.

CR1.8 The result of commissioning network elements is documented to track service contracts with suppliers, following the rules set by the organization.

CR1.9 The associated specific technical documentation is interpreted, if any, in the most frequent foreign language in the sector.

RP2: Develop the test protocol and coordinate the execution of the verification procedures to be performed on the radio communications equipment of fixed and mobile networks, according to the requirements of the project.

CR2.1 The optimal operating parameters of radio communications devices and equipment are identified to develop the test protocol, following the technical specifications of the project, and the documentation technical devices and equipment for radio communications.

CR 2.2 The performance of individual functional tests of radio communications devices and equipment is planned and monitored to ensure its functionality, according to technical specifications of the project and taking into account the security measures established by the organization.

CR2.3 The integration tests between radio communications devices and equipment and the network are defined and coordinated to ensure the quality of the service, according to technical specifications of the project. and following rules of the organization.

CR2.4 The procedures for verifying the functionality of fixed and mobile radio communications devices and equipment, and for their integration into the network, are developed and coordinated to implement them, according to technical specifications of the project and following rules of the organisation.

CR2.5 The activities performed, as well as the detected incidents, are documented in a standardized format for later use, following the rules established by the organization.

RP3: Monitor the results of the measurements of the radio frequency signals in order to maintain the quality levels defined by the organization, and safety established by the legislation in force.

CR3.1 The standards on signal quality are interpreted to service radio communications equipment for fixed and mobile networks, and to ensure compliance with the objectives set out in the project, with technical specifications account.

CR3.2 The regulations on safety levels relating to exposure to electromagnetic fields are interpreted in order to ensure compliance with current legislation.

CR3.3 The realization of signal level measurements is coordinated, to analyze the quality of communication of the new radio communications system and to ensure that its incorporation into the communications network does not affect the quality level of the rest of the network, according to technical specifications of the project and following rules of the organization.

CR3.4 Signal level measurements are interpreted to ensure the quality of communication and to propose improvements in the service, following technical specifications.

CR3.5 The execution of measurements of the exposure level to electromagnetic fields is coordinated and the results obtained are interpreted, to ensure compliance with the current legislation regarding the maximum levels eligible, according to the rules established by the organisation.

CR3.6 The activities performed, as well as the detected incidents, are documented in normalized format for later use, following the rules set by the organization.

Professional Context

Production media

Radio communications equipment for fixed and mobile networks. Equipment for the measurement of specific parameters of radio communications of fixed and mobile networks. Specific software tools for the measurement and configuration of parameters in the equipment and in the system. Internal use tools for the documentation of the processes performed. Project planning tools. Software installation tools. Software tools for network management and services. Incident management software tools. Office tools. Protection and security elements.

Products and results

Procedures for the implementation of elaborate and coordinated radio communications equipment. Test protocols developed and supervised the verification of the commissioning. Results of measured and monitored signal measurements.

Information used or generated

The radio communications system project. Specifications and requirements for the installation of the radio communications system. Quality criteria of the organization. Configuration procedures. Installation procedures. Test protocol. Planilla of measurement results. Project planning diagrams. Technical specifications of radio communications equipment. Current legislation on the level of exposure to electromagnetic fields. Quality regulations. Documentation on safety standards and prevention of occupational risks. Security regulations in electronic equipment installations.

Competition Unit 3

Naming: MANAGING THE MAINTENANCE OF FIXED AND MOBILE NETWORK RADIO COMMUNICATIONS SYSTEMS

Level: 3

Code: UC1223_3

Professional Realizations and Realization Criteria

RP1: Define the procedures for preventive maintenance of radio communications systems and monitor and coordinate their execution, according to technical specifications of the project and meeting quality standards defined by the organization.

CR1.1 The procedures for the preventive maintenance of radio communications systems are developed taking into account the documentation of the manufacturer of radio communications equipment, the engineering project of the implementation and safety standards required in order to ensure the overall functioning of the radio communications system.

CR1.2 Preventive maintenance operations are planned at the required frequency to ensure the operation of the radio communications system, following the conditions of the maintenance contract and having The established security rules are in mind.

CR1.3 Workflow tools are used to coordinate preventive maintenance operations over the radio communications network, following technical specifications and protocols established by the organization.

CR1.4 The taking of accurate data on the state of the preventive maintenance phase is done to monitor the progress of the work and the possible deviations from the set schedule, following procedures established by the organization.

CR1.5 The activities performed, as well as the detected incidents, are documented in normalized format for later use, following the rules set by the organization.

RP2: Solve incidents arising from alarms and complaints from the radio communications system of fixed and mobile networks, to ensure the quality of the service, following the procedures established by the organization.

CR2.1 The procedures for the installation of the local management applications of the radio communications equipment of fixed and mobile networks, are elaborated for their application in the detection of incidents, according to the specifications established by the manufacturer of radio communications equipment, taking into account the specific technical characteristics of the hardware platforms, and the software of the computer equipment that will perform the function of the local management.

CR2.2 The computer equipment that incorporates the local management applications, is connected to the management network and is configured to allow remote access to the radio communications equipment, providing technical support to the First-level local operators and complying with the security rules regarding access to management systems marked by the organization.

CR2.3 The incidents arising from alarms and complaints in the radio communications system are classified according to their importance to the communications system, taking appropriate measures for their use. resolution under the conditions established by the maintenance contracts.

CR2.4 The radio communications system alarm incidents are resolved using the local or central management applications, obtaining the relevant information from them and performing the tests, on the equipment, which allow to isolate the units that are damaged or in their case by detecting the anomalous propagation phenomena causing the system alarm.

CR2.5 The service quality claims incidents are solved by stalking the drives that may be causing the problem on the system, by using the local or central management applications of radio communications equipment, programming quality measures in the different modules of radio communication equipment, following procedures established by the organisation.

CR2.6 The incidents of complaints due to lack of quality in the service are solved using signal generating equipment that simulates the actual traffic and in turn allow to make quality measures on the processed signal by radio communications equipment, to narrow the equipment, and within the equipment, the unit that is not functioning properly, following procedures established by the organization.

CR2.7 The resolved incidents are analyzed to propose modifications to the system parameters that affect the quality of the service, in order to optimize the operation of the service or the resolution of contingencies, according to the needs of the organization.

CR2.8 The activities performed are documented in normalized format for later use, following the rules set by the organization.

CR2.9 The associated specific technical documentation is interpreted, where appropriate, in the most frequent foreign language in the sector.

RP3: Manage software updates on mobile and fixed network radio communications systems, checking service recovery with the new software version, following organization rules.

CR3.1 The procedures for software updates are elaborated by taking into account the service outages and according to the system requirements, including subsequent commissioning tests of the radio communication equipment with the new software version.

CR3.2 Computer equipment is configured and used for the realization of software updates on radio communications equipment, according to the specific technical characteristics of the platforms. hardware and software.

CR3.3 The first software updates are made on the radio communications equipment already installed on the radio network, in order to verify that the procedures produced do not present problems in the network, ensuring the recovery of the service and following rules of the organization.

CR3.4 The execution of mass updates on network radio communications equipment is coordinated to minimize the impact of system service outages, following organization rules.

CR3.5 The annexes to the documents relating to the updating and testing of radio communications equipment are prepared to include the incidents produced in the process and the functionalities of the new version of software deployed in the network, documenting the correction to the operation it provides, following rules of the organization.

RP4: Manage material supplies for the maintenance of radio communications systems, optimizing their cost, achieving compliance with delivery times and ensuring the quality of supplies, following rules of the organization.

CR4.1 Inventory management tools are used for the control of the spare units of radio communications equipment and to ensure the supply of materials and equipment, following the standards of the organization.

CR4.2 The procurement procedure for materials and equipment is established to maintain the minimum of stocks necessary to meet any eventuality in the maintenance of the radio communications system, following the rules of the organization.

CR4.3 The use of signal generators and quality meters for radio communications equipment is coordinated to facilitate the operation of the different working groups, ensuring the correct calibration of the same and according to the established safety standards.

CR4.4 Material purchase management is controlled to ensure the quality of supplies, according to functional requirements and following organization standards.

CR4.5 The periodic reviews of the spare parts area are performed to detect the deterioration of the stored materials and equipment, noting the low stock and updating the inventory, following the rules of the organization.

CR4.6 The activities performed, as well as the detected incidents, are documented in normalized format for later use, following the rules set by the organization.

Professional Context

Production media

Computer equipment, personal computers. Radio signal measurement equipment. Network display consoles. IT applications for project management, reporting, databases. Specific programs and software for local management of radio communication equipment. Voltmeter. Frequent. Signal generators-quality meters. Installation-specific tools. Inventory management software tools. Workflow software tools. Protection and security elements.

Products and results

Fixed and mobile radio communication systems maintained and with guaranteed quality. Inventory of units, software and hardware versions of the existing radio communications equipment on the updated radio communications network. Incidents of alarms and second level claims resolved. Inventory of the various material and spare parts required for the maintenance of the updated radio communications network.

Information used or generated

Technical documentation of radio communication equipment and radiating systems. Quality plans and preventive maintenance. Work orders. Parts of the incident. Historical incident reports. Safety regulations in facilities for communications equipment and prevention of occupational risks. Installation manuals for radio communication equipment. Manuals of the local management programmes for radio communication equipment. Regulations, regulations and standards (UIT-R, ITU-T, national frequency allocation table, occupational risks, radiation ICNIRP, ETSI, ISO, EC). Maintenance contracts. Technical documentation of the feeding systems associated with the radio communication equipment. Quality project for the radio communications system. Project of Implementation Engineering. Planning documents for the preventive maintenance of radio communications systems. Monitoring reports and system modifications. Maintenance programs. Maintenance protocols. Reports and statistics of broken units. Preventive maintenance procedure document. Planning and control documents for preventive maintenance processes. Software updates procedure document. Planning and control document for software updates.

III. TRAINING OF THE CERTIFICATE OF PROFESSIONALISM

FORMATIVE MODULE 1

Naming: PLANNING AND MAINTAINING LOCAL AND METROPOLITAN AREA WIRELESS NETWORKS.

Code: MF1221_3

Professional qualification level: 3

Associated with the Competition Unit: UC1221_3 Organize and manage the commissioning and maintenance of local and metropolitan area wireless networks.

Duration: 210 hours

Training Unit 1

Naming: PLANNING FOR LOCAL AND METROPOLITAN AREA DATA WIRELESS NETWORKING

Code: UF2182

Duration: 90 hours

Competition reference: This training unit corresponds to RP1

Assessment capabilities and criteria

C1: Identify the topologies of local and metropolitan area wireless networks and equipment characteristics, and plan and coordinate project execution by following given technical specifications.

CE1.1 Explain the fundamentals of signal transmission, especially the one performed by the air (radio frequency) to understand the nature of wireless networks of personal, local and metropolitan areas, having to account for technical specifications of the networks themselves.

CE1.2 Distinguished existing technologies and standards for wireless data networks in personal, local and metropolitan areas, comparing their core features and relating them to their applications typical.

CE1.3 Identify the physical elements that integrate the main types of wireless data networks and the characteristic topology of each of them, taking into account their functional technical specifications.

CE1.4 Describe the technological solutions that allow the expansion of coverage of local wireless networks to entire buildings or large areas.

CE1.5 Distinguished operations, calculate time and establish the material and human resources needed for the service of wireless data networks in personal, local and metropolitan areas.

CE1.6 Use project planning tools to implement and coordinate the commissioning of the local and metropolitan area wireless radio communications system, according to given technical specifications.

CE1.7 Perform the planning of putting into service a wireless network of local or metropolitan area, following the specifications indicated in the project:

-Interpret the functional requirements of the project.

-Identify the operations required for commissioning and establish the deployment phases

-Determine required equipment and facilities and precise human and material resources.

-Calculate the times of each operation, identify critical points, and represent task diagrams.

-Perform cost estimation.

-Document the entire process using planning software tools.

CE1.8 In a practical case of fixed-mobile convergence for voice over IP (VoIP) service delivery for portable device users in a residential or enterprise environment, following specifications given:

-Determine the type and number of wireless interfaces available on the user device.

-Verify the correct installation on the software device required to allow VoIP communication over the chosen interface.

-Associate the mobile device with one of the local area wireless network access points.

-Check and adjust the IP parameters on the associated device.

-Confirm that you can log in with the remote service provider through the broadband connection provided by the fixed network.

-Document the entire process using planning software tools.

C2: Identify the parameters of the devices and equipment of the local and metropolitan area wireless networks, and establish the configuration and test procedures for commissioning.

CE2.1 Describe typical configurations for local area wireless network backbone according to given functional specifications.

CE2.2 Explain the main environmental factors that may influence the coverage area and the functionality of the implemented wireless network and be the source of quality errors or losses in the service.

CE2.3 Describe the aspects of the network that are subject to legal regulations and the requirements to be applied, taking into account the current legal regulations.

CE2.4 Defend the configuration options for wireless network access points and adapters, specifying the meaning of the parameters and values selected in each case.

CE2.5 Identify the operating system configuration parameters required to service the wireless network.

CE2.6 Citar models and guidelines for creating test procedures that allow the functionality of the implemented wireless network to be established and compliance with the requirements set for it.

CE2.7 In a practical case in which the execution of a project for the implementation of a wireless network in an enclosure with local coverage areas and wireless trunk links, establish a procedure of configuration and test for putting into service that you collect:

-Describe the overall operation of the system, according to project specifications.

-Verify the availability of the channels and frequency ranges specified in the project by comparing this information with the data obtained during the pre-inspection process.

-Describe the technical characteristics of the devices that make up the implemented network.

-Define the configuration parameters for access points and trunk links that ensure system functionality.

-Generate test procedures to verify the functionality of the implemented network.

-Document the processes performed using specified formats.

-Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it.

Contents

1. Basic concepts of Transmission

-Guided and unguided media.

-Spread characteristics by media.

-Transmission power.

-Disturbances in radio transmission.

-An antenna's gain.

-Radioelectric Coverage.

-The radio spectrum:

-Basic concepts.

-Services using spectrum:

-Broadcast.

-Communications.

-Positioning.

-Radar.

-Other.

-Spectrum exploitation: Common, proprietary, special use.

-Frequency Bands.

-Transmission powers.

-Allocation of frequencies to the various services.

-Cable and wireless data networks.

2. Transmission in local and metropolitan area wireless networks

-Propagation, particularities for exteriors and interiors.

-Evolution of wireless standards.

-System types, topologies, and wireless data network architectures.

-Comparative to wired networks.

-Wireless network symbology.

3. Personal, local, and metropolitan area wireless data networks

-Classification of wireless networks.

-Personal Area Wireless Networks (WPAN):

-Definition.

-Bluetooth.

-Features.

-Network Topologies.

-802.15 Standards

-Other networks.

-Local Area Wireless Networks (WLAN):

-Classification.

-Reference standards.

-802.11 Standard:

-Architecture.

-Evolution.

-Access to media.

-Fragmentation.

-Priorities

-Quality of service.

-Hidden terminal.

-Occupation of the channel.

-Coordinated and distributed modes.

-Energy saving.

-Local area network devices and equipment:

-Network adapters.

-Access points:

-Features.

-Description of the computer. Meaning of the LEDs.

-Connection of the network access point.

-Power Inject

-Antennas.

-LAN Bridges for Exterior.

-Others (cameras, phones, ...).

-Power supply over twisted pair.

-Installing local area wireless network devices and equipment.

-Metropolitan Area Wireless Networks (WMAN):

-Architecture.

-Evolution.

-Frequency planning.

-IEEE 802.16 Standards. WIMAX. Main features.

-Topologies: Point-to-Point, Point-Multipoint, Mesh (Malla).

-Metropolitan Area Wireless Network Devices and Equipment:

-Subscriber unit.

-Base stations. Components and features.

-Antennas.

-Installing metro area network devices and equipment.

-WPAN/WLAN/WMAN Comparative. Typical applications.

-Technology solutions that enable coverage expansion.

-Convergence between fixed and wireless data networks.

4. Regulation and regulation in the use of local and metropolitan area wireless data networks

-Electromagnetic spectrum regulation:

-ITU regions.

-National Frequency Attribution Table (CNAF).

-Definition of radio communications services, modes and other radio terms.

-National Usage Notes UN:

-ICM Bands for WPAN and WLAN:

-UN-51 ICM Applications above 2.4 GHz.

-UN- 85 RLANs and data at 2400 to 2483.5 MHz.

-UN-128 RLANs at 5 GHz.

-Operation frequencies.

-Maximum power transmission levels.

-Dynamic frequency allocation.

-Power control transmitted.

-Security.

-Public health.

5. Planning to service and configure local and metropolitan area data wireless networks

-Planning for commissioning:

-Put in service operations:

-Operations and times of each operation.

-Identification of hotspots.

-Task diagrams.

-Deployment phases.

-Required equipment and installations.

-Human and material resources.

-Materials.

-Cost estimate.

-Planning tools:

-Data Management Tools.

-Building Tools for the Buildings Database.

-Propagation Model Prediction Tools: coverage map, capacity calculation, and equipment location.

-Network and Application Simulation Tools.

-Test Tools:

-Protocol Analizers.

-Network Analyzers.

-Ports Scanner.

-Configuring local area wireless networks:

-Parameters.

-Access Points (AP):

-Operation modes

-Configuring the AP.

-Configuration tools. Operating system configuration parameters.

-Influence of environmental factors.

-Configuring metro wireless networks:

-Parameters.

-Configuration.

-Influence of environmental factors.

-Configuration tools. Operating system configuration parameters.

-Put in service procedure:

-Description of system operation.

-Verifying the availability of channels and frequency ranges.

-Description of the technical characteristics of the devices.

-Defining the configuration parameters for access points and trunk links that ensure system functionality.

-Test procedures.

-Documentation of the processes performed.

Training Unit 2

Naming: CONFIGURING THE SECURITY OF LOCAL AND METROPOLITAN AREA WIRELESS NETWORKS

Code: UF2183

Duration: 70 hours

Competition reference: This formative unit corresponds to the RP2

Assessment capabilities and criteria

C1: Distinguished the mechanisms and security systems of the local and metropolitan area wireless networks, and configure the security of the wireless network, following the technical and functional specifications given.

CE1.1 Describe the main encryption techniques by relating them to the level of security offered and the conditions imposed by each case, taking into account the required security requirements.

CE1.2 Explain the various solutions based on user authentication protocols and security standards, describing the necessary functionalities and requirements.

CE1.3 Identify configurable protection levels and filters at a wireless access point based on technical specifications.

CE1.4 Explain the basic procedures to ensure the security of the user equipment associated with the wireless network.

CE1.5 Perform the configuration of the security parameters of a wireless access point, according to needs given:

-Determine the strengths and weaknesses in terms of security.

-Modify the default SSID identifier and turn off its automatic broadcast.

-Set filtering rules related to the physical addresses of the associated teams.

-Define encryption keys in accordance with the selected encryption and authentication techniques.

-Configure the appropriate security parameters on user equipment and check their correct association with the access point.

-Document the processes performed using specified formats.

-Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it.

Contents

1. Security in wireless networks

-Wireless Network Vulnerabilities: Evaluation and categorization of security risks inherent in wireless data networks:

-Intrusion of unauthorized users.

-User impersonation.

-Security and Integrity of Information.

-Types of attacks on WLAN networks:

-Passive attacks.

-Active attacks.

-Espionage.

-Listen.

-Password discovery attacks.

-Unauthorized access points.

-Spoofing.

-Interception.

-Sequestration of sessions.

-Denial of service.

-Dictionary attack.

-Classification of security technologies.

-Elementary security mechanisms in base stations and equipment:

-MAC Filtering.

-Modification of the SSID Identification (of access points).

-Disactivation of automatic broadcast.

-Security standards.

2. Security systems for local and metropolitan area data wireless networks

-Encryption techniques: static and dynamic. Data integrity.

-WEP (Wired Equivalent privacy) protocol:

-Components, features, and operation.

-Vulnerabilities.

-Types of attacks.

-Alternatives to WEP: WEP2, dynamic WEP, Virtual Private Network (VPN).

-Security based on authentication and user identification:

-Extensible Authentication Protocol (EAP) protocol.

-802.1x specification.

-Radius Servers.

3. WEP successors

-Wireless Fidelity Protected Access (WPA):

-WPA features.

-Included Technologies: IEEE 802.1x, EAP, Temporary Key Integrity Protocol (TKIP), Message Integrity Code (MIC).

-WPA enhancements regarding WEP.

-WPA operating modes.

-Updating security systems and mechanisms:

-WPA2 (IEEE802.11i).

-The new architecture for wireless networks: Robust Security Network (RSN).

-802.11i operational phase.

-Comparative between security mechanisms: WEP, WPA, 802.11i.

4. Configuring the security of a local area wireless network

-Security in corporate environments. Design recommendations.

-Remote access tools.

-Configuring the access point (AP).

-Configuring the authentication server (RADIUS).

-Configuring filtering policies (Firewall).

-Configuring wireless clients.

-Authentication of computers and users through Extended Authentication Protocol (EAP).

-Managing digital certificates for client/team authentication.

Training Unit 3

Naming: LOCAL AND METROPOLITAN AREA WIRELESS NETWORK MONITORING

Code: UF2184

Duration: 50 hours

Competition reference: This training unit corresponds to the RP3

Assessment capabilities and criteria

C1: Develop monitoring and maintenance procedures for local and metropolitan area wireless networks, following technical and functional specifications given.

CE1.1 Identify the services offered by the network and explain the quality parameters that apply to them to determine the requirements of each one, taking into account functional specifications.

CE1.2 Describe situations that may degrade the performance of the wireless network, such as excessive number of users, electromagnetic interference, misconfigured equipment, or decreased signal/noise ratio, taking into account technical specifications.

CE1.3 Evaluate radio scanning measures to detect or prevent incidents affecting the coverage area and quality of service, and to maintain compliance with safety regulations radio.

CE1.4 Describe features and functionalities of local and metropolitan area wireless network monitoring tools, taking into account technical specifications.

CE1.5 In a practical case where the performance of the network is lower than the one required for the provision of the associated services, generate a corrective procedure that includes diagnostic and repair tasks that allow:

-Determine the coverage area of the network affected by the failure.

-Measure and verify noise levels in the areas where user teams are located.

-Monitor the signal and noise levels received at the wireless access point.

-Monitor the presence of non-network active wireless access points and assess their level of interference.

-Analyze the data obtained and establish a hypothesis to determine the devices or causes causing degradation of network performance.

-Perform corrective operations according to the established intervention plans.

-Confirm the suitability of the actions performed and document the entire process followed during them.

CE1.6 In a practical case, properly characterized, develop a maintenance procedure for prevention tasks that allow:

-Verify that the security configuration is expected.

-Verify that the desired channel is working.

-physically inspect the data connection and power connection.

-Measure interference due to other existing networks.

-Move the signal level to the various points in the coverage area.

Contents

1. Monitoring and maintaining local and metropolitan area wireless networks

-Quality of Services (QoS):

-Quality parameters in wireless networks. Requirements:

-Effective flow (Throughput).

-Delay (Delay).

-Change in delay (delay jitter).

-Error or loss rate.

-QoS mechanisms:

-Traffic handling mechanisms.

-Bandwidth administration mechanisms.

-QoS limitations on WLAN 802.11.

-The IEEE 802.11e standard.

-Monitoring types and procedures.

-Monitoring Network Security.

-Quality monitoring of the service: scan and coverage measures.

-Handling "software" tools for network traffic analysis and monitoring:

-Network Maps.

-List of Access Points.

-List of Network Connections.

-Collecting statistics.

-Signal Level measures.

-Retard measures.

-Elaboration of first-level fault diagnosis, localization, and repair procedures:

-IP Configuration Tests.

-Connection Tests.

-HW replacement.

-Second-level incident breakdown repair:

-Package Analysis.

-Analysis of Traffic Statistics.

-Possible software or hardware configuration problems.

-Redesigning and optimizing networks.

-SW updates.

2. Specific instrumentation

-Network Analizers.

-Protocol Analizers.

-Port Scanner.

Methodological guidelines

The training units must be exceeded in a correlative way.

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 2

Naming: MANAGING FIXED AND MOBILE NETWORK RADIO COMMUNICATIONS SYSTEMS COMMISSIONING

Code: MF1222_3

Professional qualification level: 3

Associated with the Competition Unit: UC1222_3 Coordinate the putting into service of fixed and mobile network radio communications systems.

Duration: 180 hours

Training Unit 1

Naming: SCHEDULING OF FIXED AND MOBILE NETWORK RADIO COMMUNICATIONS SYSTEMS COMMISSIONING

Code: UF2185

Duration: 90 hours

Competition reference: This training unit corresponds to RP1

Assessment capabilities and criteria

C1: Interpret the specifications and technical documentation of the fixed and mobile radio communications system project to coordinate and put into service.

CE1.1 Describe the main fixed and mobile network architectures of radio communications and their characteristics to identify the needs of putting these systems into service.

CE1.2 Explain the parts and characteristics of a project for installation and configuration of fixed and mobile radio communications systems, detailing the basic requirements it must contain, taking into account methodologies and design standards.

CE1.3 To analyze the technical specifications of the radio communications systems of fixed and mobile networks identifying the material and human resources required for its implementation, taking into account specifications Given functionality.

CE1.4 In a practical scenario, properly characterized, to interpret a given technical documentation for the installation and configuration of a mobile network radio communications system, according to the needs of administering system elements:

-Identify base stations and radio controllers in the mobile radio communications system to act on the technical specifications and requirements catalog.

-Identify the means of transmission between base stations and the radio controllers of the mobile radio communications system.

-Recognize the security regulations regarding the installation and commissioning of a mobile radio communications system.

-Describe the relationships between mobile radio communications devices by determining the order of putting into service, quality of communication, and signal levels according to the functional design and system specifications.

-Specify the conditions required to track requirements during the installation and configuration of a mobile network radio communications system, according to established quality criteria.

CE1.5 In a practical scenario, properly characterized, to interpret a given technical documentation for the installation and configuration of a fixed network radio communications system, according to the needs of administering system elements:

-Identify the terminals and fixed radio elements of the radio communications system to act upon from the technical specifications and requirements catalog.

-Identify the communication standards between the fixed radiocommunications system elements and the global communications network.

-Recognize the security regulations regarding the installation and commissioning of a fixed radio communications system.

-Describe relationships between fixed radio communications devices by determining the order of putting into service, quality of communication, and signal levels according to the functional design and system specifications.

-Specify the conditions required to track requirements during the installation and configuration of a fixed network radio communications system, according to established quality criteria.

CE1.6 Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it.

C2: Describe planning techniques for the commissioning of radio communications systems equipment for fixed and mobile networks, and schedule their execution according to technical specifications of the project.

CE2.1 Describe planning and coordination techniques to achieve optimal performance and determine the status of the radio communications system, analyzing the results of the in-service process, taking into account The specifications of the project are counted.

CE2.2 Describe and use project planning tools to implement and coordinate the commissioning of the radio communications system, taking into account technical specifications and functional.

CE2.3 In a practical scenario, properly characterized, program the commissioning of a system of radio communications of fixed and mobile networks, following the specifications indicated in the project:

-Identify the jobs required for commissioning

-Set the implementation phases.

-Determine the required equipment and facilities.

-Calculate the times of each operation.

-Identify critical points.

-Represent job diagrams.

-Determine the required human and material resources.

-Perform Cost Estimate.

-Develop a report and document.

-Analyze deviations from a schedule by defining the critical points and proposing possible modifications and improvements to the schedule.

C3: Identify the characteristics and configuration parameters of mobile and fixed network radio communications equipment, develop configuration procedures for in-service entry, and coordinate their execution, following technical specifications of the project.

CE3.1 Perform the diagrams prior to the installation phase for the commissioning of the radio communications system, according to established technical specifications and quality criteria.

CE3.2 Describe the characteristics and functionalities of radio equipment and radiating systems used in fixed and mobile radio communications networks.

CE3.3 Explain the configuration parameters of the equipment and devices of the radio communications systems of fixed and mobile networks to prepare their putting into service, distinguishing the different technologies and standards.

CE3.4 Describe the different types of connectors and connections between the equipment and devices of the radio communications system, taking into account their functionalities.

CE3.5 Describe the features and functionality of the tools that are used in the verification of the radio communications system.

CE3.6 Citar the current regulations on exposure to electromagnetic fields, to ensure their compliance with the installation and putting into service of radio communications systems of fixed and mobile networks.

CE3.7 In practical cases, duly characterised, the procedure for verifying the installation of the radio communications system of the fixed and mobile network, according to the technical specifications of the project:

-Identify specific tools and tools to use to check equipment and devices, the transceiver, and the system's radiant system.

-Identify specific tools and tools to use to check connections between devices, equipment, and radiant system.

-Identify the job security rules to apply in the checking process.

-Define procedures for different verifications.

CE3.8 In practical cases, properly characterized, the procedure for configuring the devices and equipment of the mobile radio communications system, according to the technical specifications of the project:

-Identify the configuration parameters for base stations and radio controllers.

-Identify transmission parameters between base stations and controllers.

-Identify the computer's own software for installation.

-Identify the configuration media.

-Define the procedures for installing the software and configuring the base stations and radio controllers.

CE3.9 In practical cases, properly characterized, the procedure for configuring the devices and equipment of the fixed radio communications system, according to the technical specifications of the project:

-Identify the configuration parameters of fixed radio terminal equipment.

-Identify the computer's own software.

-Define the procedures for configuring fixed radio terminal equipment.

CE3.10 In the three previous practical cases of drawing up procedures for putting into service, performing the distribution of works and coordinating their execution, following specifications established by the organization.

Contents

1. Radio communications

-Propagation of the token.

-Transmission power.

-Receive power.

-Antennas:

-Types and features.

-An antenna's gain.

-Radio coverage.

-Disturbances in radio TX.

-Transmission technologies. Multiplexing. Modulation, modulation techniques. Resource allocation. Access to the media. Signal quality.

-Characterization of a radio link.

2. The Radio Spectrum

-Services using spectrum:

-Broadcast.

-Communications.

-Positioning.

-Radar.

-Other.

-Spectrum exploitation: Common, proprietary, special use.

-Frequency Bands.

-Allocation of frequencies to the various services.

-Electromagnetic spectrum regulation:

-ITU regions.

-National Frequency Attribution Table (CNAF).

-Definition of radio communications services, modes and other radio terms.

3. Fixed and mobile radio communications networks

-Private mobile networks: PMR (Private Mobile Radio):

-Features. Channel Allocation.

-Network architecture. Nodes in a PMR network.

-Trunking networks.

-New technologies. TETRA. Frequency bands.

-Mobile phone networks:

-Cell mobile phone.

-Classification and technologies. Evolution of Mobile Phone Systems: AMPS, NMT450, NMT900, TACS, GSM, DCS1800, GPRS, HDSPA, UMTS, LTE.

-The GSM (Groupe Special Mobile) standard: features, spectrum occupancy, network architecture, protocols and interfaces, services, nodes in the GSM architecture.

-The Universal Mobile Telecommunication System (UMTS) standard: features, spectrum occupancy, network architecture, protocols and interfaces, services, nodes in the UMTS architecture. Evolution of GSM networks.

-HDSPA (High Speed Downlink Packet Access), transition to LTE.

-Fourth generation: LTE (Long term evolution). HSDPA.

-Access networks via radio on land fixed systems:

-Architecture.

-Classification and technologies.

-Protocols and interfaces.

4. Quality Coverage & Parameters

-Extension: coverage zone size.

-Scenario: streets and roads, interior of vehicles, buildings or tunnels.

-Degree of coverage.

-Terminal quality.

-Availability: probability of lock or congestion.

-Reliability: Maximum allowable percentage of interrupts.

-Fidelity: degree of intelligibility or number of errors a communication is received.

-Signal/Noise Ratio (SNR) on Analogical systems.

-Bit Error Rate (BER) on Digital systems.

5. Fixed and mobile network radio communications systems projects

-Defining projects and specifications.

-Documentation for a project: memory, plans, specifications, and budget.

6. Planning and coordination of fixed and mobile radio communications systems projects

-Time schedule, resource scheduling, and cost estimation. Relationship of phases and tasks.

-Determination of times.

-Estimated forms.

-PERT, CPM, and GANTT techniques, rules, and application.

7. Planning for the putting into service of fixed and mobile radio communications systems

-Cost reports.

-Documentation for planning and tracking.

-Using computer tools.

-Implementation and networking procedures: testing, checking, and recording.

-Phases and implementation and commissioning tasks.

-Procedures logs.

8. Fixed and mobile radio communications network devices and equipment.

-Classification.

-Characteristic parameters.

-Functions.

-Interfaces.

-Configuration.

Training Unit 2

Naming: PROCESSING OF FIXED AND MOBILE NETWORK RADIO COMMUNICATIONS EQUIPMENT TEST PROTOCOLS

Code: UF2186

Duration: 40 hours

Competition reference: This formative unit corresponds to the RP2

Assessment capabilities and criteria

C1: Describe techniques and develop test protocols to verify the commissioning of radio communications equipment for fixed and mobile networks, according to technical specifications of the project.

CE1.1 Describe the characteristics of the existing fixed and mobile network radio link to define the test protocols for providing services according to specifications of the networks themselves and of standardisation bodies and standardization of communications services.

CE1.2 Describe the parameters and optimal operating conditions of fixed and mobile radio communications devices and equipment taking into account technical and functional specifications.

CE1.3 Explain the various types of functionality and network integration tests that are performed on radio communications devices and equipment.

CE1.4 In several practical cases, properly characterized, define the test protocol to test the functionality of the fixed and mobile radio communications system, according to the technical specifications of the project:

-Identify the equipment and devices on which the tests will be performed as well as the parameters and operating conditions.

-Perform tests and trials to determine the most appropriate procedure by optimizing resources.

-Develop the test protocol: battery of procedures where the phases of the tests are indicated, tests and adjustments, expected results, optimal operating conditions, and the results plan to be filled in, other.

CE1.5 In the previous practical case of developing test protocols for the verification of commissioning, performing the distribution of works and coordinating its execution, following specifications established by the organization.

Contents

1. Means and protocols for testing on radio communications equipment for fixed and mobile networks

-Instrumentation:

-Types.

-Features.

-Applications.

-Tools for taking action.

Local and remote tools. Power meters. Probes. Spectrum analyzers. Communications probes.

-Parameter measures on devices. Power of emission, Power of reception. Maximum powers. Units of measure.

-Specific application of parameter measures. Functional and integration tests according to specifications

-The characteristic parameters of the media. Levels of radio exposure. Power, Power Density, Electromagnetic Field Levels.

-Optimal operation parameters of the radio link and equipment

-Test protocol elaboration:

-Collection of information, environmental and radio factors. Identification of the necessary measures and appropriate equipment. Adjust them.

-Fast characterization of the radio environment

-Take measurements with isotropic probes. Electric field and Power density. Reference levels and Decision levels

-More precise measures with selective spectrum analyzers or broadband receivers.

-Making the Template for the Measures Report.

Training Unit 3

Naming: MONITORING MEASUREMENTS OF RADIO FREQUENCY SIGNALS

Code: UF2187

Duration: 50 hours

Competition reference: This training unit corresponds to the RP3

Assessment capabilities and criteria

C1: Identify service quality parameters and exposure levels, and monitor the performance and outcome of radio frequency signal measurements, according to technical specifications of the project.

CE1.1 Describe the standards for the quality and availability of radio communications systems for fixed and mobile networks related to the commissioning phase of the radio communications system, identifying the various possible levels of operation depending on the type of network object of the project.

CE1.2 Describe the current regulations on safety levels for exposure to electromagnetic fields, applicable to radio communications systems for fixed and mobile networks.

CE1.3 Describe the measurement processes and the types of instrumentation required to ensure, for each radio communications facility, compliance with the exposure limits established by the legislation in force, taking into account the requirements to be applied.

CE1.4 Explain the characteristics and procedures of use of the instruments and tools for measuring the quality of the signal and safety levels.

CE1.5 In practical cases, properly characterized, coordinate the taking of measures to ensure the quality of the communication and propose improvements in the service, taking into account technical specifications:

-Select the appropriate measuring instrument.

-To properly connect the different measuring devices according to the characteristics of the measures to be measured.

-Measure the signals according to the procedures indicated.

-Develop the measurement protocol.

-Distribute jobs and coordinate their execution.

CE1.6 In practical, duly characterized cases, analysis of the results of the exposure measurements:

-Interpret the legislation in this regard.

-Interpret the recorded measures and check that the maximum limits established by the current legislation are not exceeded.

-Document results and conclusions.

CE1.7 In practical, duly characterized cases, analysis of the results of quality level measurements:

-Interpret the standards in this respect.

-Interpret the recorded measures and check that they meet the quality levels of the service specified in the service contract.

-Document results and conclusions.

Contents

1. Regulations and standards applicable to fixed and mobile radio communications

-Telecom regulatory framework:

-The General Telecommunications Law.

-CMT (Telecommunications Market Commission).

-Standardization Organizations:

-ITU

-ISO

-IMT 2000

-CENELEC

-Radiation:

-ICNIRP (International Commission on Non-Ionizing Radiation Protection) regulatory measures for field exposure.

-Royal Spanish Decree on Radio Emissions: Spanish regulations.

-Exposure levels measures:

-Issue Level.

-Protection Limits.

-Compliance Assessment Procedures and Protection Requirements relating to electromagnetic compatibility of equipment, systems and installations.

-Regulation, National Frequency Attribution Table, Signal Quality Regulatory Measures.

-Signal level at Receipt.

-Quality in Reception. BER (Bit Error Rate).

-Safety and hygiene regulations at work:

-Labor and environmental risk prevention rules.

-Security regulations in the use of electronic tools and equipment.

Methodological guidelines

The training units must be exceeded in a correlative manner.

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: MANAGING FIXED AND MOBILE NETWORK RADIO COMMUNICATIONS SYSTEMS MAINTENANCE

Code: MF1223_3

Professional qualification level: 3

Associated with the Competition Unit: UC1223_3 Manage the maintenance of fixed and mobile network radio communications systems.

Duration: 210 hours

Training Unit 1

Naming: SCHEDULING PREVENTIVE MAINTENANCE ON MOBILE AND FIXED NETWORK RADIO COMMUNICATIONS SYSTEMS

Code: UF2188

Duration: 70 hours

Competition reference: This training unit corresponds to RP1

Assessment capabilities and criteria

C1: Schedule the preventive maintenance tasks of the radio communications systems of fixed and mobile networks, in order to avoid or minimize the cut of the service, taking into account the specifications project techniques.

CE1.1 Identify preventive maintenance tasks depending on the technologies and the equipment and systems that form the fixed and mobile radio network.

CE1.2 Describe the features and functionality of the workflow tool for planning preventive maintenance tasks, taking into account technical specifications.

CE1.3 Analyze the components that make up the cost of the preventive maintenance processes of the radio communications systems of fixed and mobile networks, according to given technical specifications and taking into account maintenance contracts.

CE1.4 In a scenario where the scheduling of the preventive maintenance work of a fixed or mobile radio communications system is performed, following technical specifications given:

-Describe the elements that make up the radio communications system.

-Set the phases of the maintenance process.

-Identify the preventive maintenance operations required for each item.

-Determine the equipment and tools required for their realization.

-Identify protection systems that can enable maintenance tasks without service outage.

-Identify the associated service cutoff times for each operation.

-Identify and describe the critical points in the process.

-Select the workflow tool to schedule preventive maintenance tasks.

-Represent workflows by using diagrams.

-Determine the human and material resources required in the process.

-Perform the cost estimate.

Contents

1. Maintenance of fixed and mobile network radio communications systems

-Mobile radio network: technologies, equipment and systems, physical architecture, and functional features:

-GSM, GPRS, UMTS, HSDPA, LTE Technologies

-Differences in the architecture.

-Evolution of existing networks to new technologies. New interfaces and configuration of new nodes.

-Operation and Maintenance functions on the radio communication nodes. The Operation Support System (OSS) system.

-The Operation and Maintenance Center (WTO).

-Mobile radio network systems maintenance processes:

-Corrective maintenance and preventive maintenance.

-Monitoring the network elements. List of Alarms.

-Major causes of failure in radio communication systems.

-Remote actuations and in-place actions.

-Transaction logs. Statistics files.

-Realization and Maintenance of Backups. Maintaining the files.

-SW Updates and SW Functional Increments.

-SW version log.

-HW control.

-Fixed radio network: technologies, equipment and systems, physical architecture, and functional features.

-Fixed radio network system maintenance processes.

-Developing radio communication system maintenance protocols:

-Action Routines in case of incident.

-Recommended preventive maintenance routines.

-Periodic review of power equipment. Battery maintenance.

-Periodic review of air conditioning equipment. Temperature and humidity control.

-Using the Operation and Maintenance guides.

-Command guides.

-Alarm Guide. Interpretation of the fault alarm indicators

-How to report an incident and reset the alarm.

-HW replacement.

-Data in the action form. Record of the spare parts used.

-Problem escalation protocol.

2. Planning maintenance of mobile and fixed network radio communications systems

-Planning tools and techniques. Task relationship, breakdown of details, units of work.

-Estimated forms: materials, characteristics of human resources, cost contingencies.

-Subcontracting. Determination of times. Workflow tools.

-The security plan in the maintenance of radio communications systems: safety and hygiene plans and standards, risk factors and situations, means, equipment and safety techniques.

-Planning for software updates:

-Makers Delivery Time Plan

-Pre-Release Security Copies

-Regression plan.

-Verification and test plan after upgrade

-Event Forecast. Contingency plans.

Training Unit 2

Naming: DIAGNOSIS AND RESOLUTION OF INCIDENTS IN MOBILE FIXED AND MOBILE RADIO COMMUNICATIONS EQUIPMENT

Code: UF2189

Duration: 90 hours

Competition reference: This training unit corresponds to RP2 and RP3

Assessment capabilities and criteria

C1: Identify the characteristics of the computers that will be used as local managers of the radio communications equipment of fixed and mobile networks, and install and configure the local management software, agreement to given technical specifications.

CE1.1 Identify the operating system and describe the use and configuration of the computer equipment user interface that will connect to and perform the local manager functions of the radiocommunications.

CE1.2 Recognize the structure of the file system and explain the use of the computer equipment folder scanning tools.

CE1.3 Identify the parameters required to perform the installation and configuration of the local management software, taking into account technical and functional features.

CE1.4 Describe the network protocols and parameters needed to connect the computer equipment to the radio communications equipment, and to remotely control it from the Control Center or from the manager remote and central.

CE1.5 In a convenient case of configuring a portable computer equipment as a local manager and as a remote-connected manager to the management communications network (DCN), following technical specifications given:

-Identify the hardware and software features of the computer to be configured.

-Navigate the desktop and file system.

-Configure the user environment.

-Perform the installation and configuration of the local management software for radio communication equipment.

-Configure computer equipment to access the radio communications equipment.

-Perform the reconfiguration of the computer equipment ports to the characteristics of the radio communications equipment monitoring channel.

-Check the local management program startup.

-Develop the procedure that collects operations to install the local management applications.

C2: Identify the techniques and tools for the diagnosis and resolution of incidents derived from alarms presented by the hardware and software of the radio communications equipment of fixed and mobile networks, and resolve them by following technical and functional specifications.

CE2.1 Classify the typology of alarms of a physical nature, and logic that are presented in the fixed and mobile radio communications equipment, and identify the correlation between them.

CE2.2 Describe the input and output signals of each unit, as well as the monitoring points of each unit of the radio communication equipment of fixed and mobile networks, identifying the optimal values operation for the same.

CE2.3 Describe the different phenomena of anomalous propagation that can occur in radio communications systems, identifying the alarms and effects they cause in the system.

CE2.4 Explain the characteristics and procedures of use of the measuring equipment (voltmeters, frequency and spectrum analyzers among others) that allow to verify the operation of each unit of the radio communications equipment, taking into account technical specifications.

CE2.5 Describe the process, the general techniques and the technical means necessary for the diagnosis, localization and resolution of the physical and logical incidents of the equipment of the radio communications, taking into account technical and functional specifications.

CE2.6 Describe the features and functionality of local management applications for incident resolution.

CE2.7 Identify the different systems of protection of radio communications equipment against the different phenomena of propagation and in the face of the breakdowns of the different units, the effect of their activation and malfunction in the radio communications system.

CE2.8 Describe the functionality of the alarm tracking tools to report the detected breakdowns to the first level and to proceed to their resolution.

CE2.9 In a practical case where the analysis and resolution of incidents arising from alarms of radio communications equipment of fixed and mobile networks is carried out, following a given specification:

-Use the local management application and the measurement equipment, to obtain alarm data.

-Identify the alarm and characterize it by the incident it produces.

-Make at least one hypothesis of the possible cause that can cause alarm by relating it to the incident that is detected on the computer.

-Perform an intervention plan on the computer to determine the cause of the incident that occurred.

-Identify and locate the element, physical or logical, which produces the incident and perform the substitution or modification of the element, configuration and/or programming by applying the required procedures (check wired, activity monitoring, protocol analysis, among others) and at an appropriate time.

-Perform checks and tuning of system parameters according to technical specifications and using the appropriate tools.

-Verify the incident resolution.

-Develop a report of the developed activities and results that are properly structured in the required sections.

-Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it.

C3: Identify the techniques and tools for detecting and resolving incidents resulting from complaints and solving them, to maintain quality in the service of radio communications equipment fixed and mobile networks, following technical and functional specifications.

CE3.1 Identify quality regulations associated with radio communications systems, both fixed and mobile networks.

CE3.2 Describe the types of claims that have to do with quality in the service.

CE3.3 Explain the characteristics and procedures of use of signal-meter generators, for checking the quality of the radio communications system, taking into account specifications functional.

CE3.4 Identify the points of the radio communication equipment where hardware or software loops can be activated to verify the operation of each of the units of the equipment radiocommunication.

CE3.5 Explain the frequency plans used by the radio communications systems of fixed and mobile networks, and the effect of interference in the degradation of the quality of the service of these systems.

CE3.6 In a practical scenario, properly characterized, locate the cause of the quality problem in the service and manage its resolution, following some specifications given:

-Activate the quality counters.

-Use the local or central management tools, programming the quality measures.

-Use the token-meter generators.

-Analyze the results obtained.

-Detect and identify the unit causing the lack of quality.

-Use the alarm tracking tool to refer to the first level for resolution.

-Document procedures performed according to specified formats.

-Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it.

C4: Manage software updates for fixed and mobile radio communications systems, following technical and functional specifications.

CE4.1 Explain the procedures for managing the updates of radio communications systems, taking into account the technologies and technical specifications thereof.

CE4.2 Distinguished the types of updates (first updates, mass updates, among others) and the media used for software package distribution, which are performed on the radio communications to develop and coordinate the procedures for its implementation.

CE4.3 In a scenario where the management of a software update on a radio communications system is performed, according to given specifications:

-Identify the active software on the radio communications equipment using the local management application.

-Identification of the required process, duration, and connection between the local management computing team and the radio communications team for the download of new equipment software.

-Configure the computer equipment by following given specifications.

-Back up the previous situation.

-Preview contingency plan for failures.

-Activating the new software and identifying the service cutoff time.

-Verifying the new functionality built into the software version or verifying the removal of the previous version's operating error.

-Verifying the overall operation of the radio communications equipment with the new software version.

-Prepare the software update procedure.

-Document procedures performed according to specified formats.

Contents

1. Local management teams in fixed and mobile radio communications networks

-The operating system and local management software.

-Installing and configuring the local management software.

-Local network architecture and protocols.

-TCP/IP protocol: IP routing and port configuration; routing, management, and application-level protocols.

2. Centralised management of fixed and mobile radio communications networks

-Centralized Network Management. The server client model on the management platforms.

-The NOC (Operation and Maintenance Center).

-The operator position. Graphical user interface.

-The tools and applications built into the management platform

-The OSI standard: Telecom network management areas:

-Managing False.

-Managing the Configuration.

-Managing the Prstations.

-Managing Security.

3. Resolution of second-level incidents in fixed and mobile radio communications networks

-Types of alarms for equipment and systems in the fixed and mobile radio network.

-Setting alarm thresholds.

-Elaboration of diagnostic procedures and location of faults. Repair/recovery procedures.

-Alarm detection. Allocation of resources for resolution or Escalation according to the organization's protocol.

-Incident handling system: opening of the ticket, notification according to the protocol of the organization. Shutdown of the incident.

-Diagnostic and measurement tools: voltmeters, frequenceters, spectrum analyzers, and PDH, SDH, and Ethernet traffic signal-meters.

-Local and centralized network management systems.

-Warning solution in second-level incidents and complaints. Status of the failure. Staff assigned. Estimated solution time. Time worked, history of actions, statistical analysis, responsibilities.

-Tools for tracking alarms. The network map. Display alarms.

-Maintenance of the Scheduled and Unscheduled SW Update Database and scheduled times.

4. Quality in the service of fixed and mobile network radio communications systems

-Quality standards. Tools for quality checking in the system. Network probes, Software packages for data analysis and presentation. Centralized management system: data collection, storage and processing.

-Quality control. Phases and procedures. Resources and documentation.

-Quality of Service. Coverage, network availability, access time, off-duty, dropped calls, voice quality ...

-Quality indicators: error rate (B.E. R), wrong blocks, seconds with error (ES), severely missed seconds (SES), unavailability time.

5. Updating software for fixed and mobile radio communications systems.

-Management procedures.

-Update types:

-First updates.

-Mass updates.

-Other types.

-Means used for software package distribution on radio communications systems.

Training Unit 3

Naming: MANAGING THE INVENTORY OF RADIO COMMUNICATIONS SYSTEMS

Code: UF2190

Duration: 50 hours

Competition reference: This training unit corresponds to RP4

Assessment capabilities and criteria

C1: Identify inventory procedures and perform their management in order to control the equipment deployed in the communications network and the supply of materials, according to Given technical and functional specifications.

CE1.1 Explain procurement control procedures (warehouse control, form, and delivery times, destinations, orders, among others) indicating the most common correction measures as discounts or returns among others.

CE1.2 Explain the procedures of the equipment control deployed in the plant, to record and update the inventory of the radio communications equipment.

CE1.3 Identify, by name or standard code, the materials, products, components and equipment required to undertake the various activities involving the maintenance of the equipment radiocommunications.

CE1.4 Generate the information to decide the required supplies and intermediate stocks.

CE1.5 Explain the features and functionality of the software tools used to manage the inventory of the material required in the maintenance of the systems radiocommunications.

CE1.6 Describe the different variants of spare drives required by the radio communications system.

CE1.7 Describe the technical characteristics of the different types of wiring and connectors required in radio communications systems to ensure that the supply of material is made with the quality defined by the project.

CE1.8 In a practical scenario, properly characterized, perform inventory management to control the situation of the equipment and materials of the radio communications network, following specifications given:

-Use the inventory management tool.

-Identify the various material required for the maintenance of the radio communications system.

-Identify the provisioning times for each of the materials

-Identify critical elements of material supplies

-Schedule early alerts to start the process of purchasing the material.

-Document the processes performed according to established formats.

Contents

1. Control of purchases and materials, management of the inventory of radio communications systems

-Types of network elements. Map of Network Settings. Identification of each item. Vendor-provided management tools.

-HW and SW components of the different nodes. Critical components.

-Materials required for the resolution of an incident.

-Stock, storage, and order control:

-Vendor-recommended parts volume

-Coding of spare parts and stocks. Variants of spare parts

-Obsolescence of spare parts. Removal procedure.

-High and low code.

-Periodic review of the status and number of spare parts.

-Cycles and procurement specifications:

-Replenishment of spare parts. The supply chain. Estimated delivery times.

-Organization procurement processes.

-Record of orders, inputs, and outputs of materials.

-Software tools for inventory management:

-Network Configuration Data Base.

-Integrated inventory management systems.

-Access security.

-Interrelation of the inventory system to the work order management system.

-Safety and hygiene regulations at work.

Methodological guidelines

The training units must be exceeded in a correlative manner.

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

SECOND-LEVEL NON-WORK PROFESSIONAL PRACTICE MODULES IN RADIO COMMUNICATIONS SYSTEMS

Code: MP0453

Duration: 80 hours

Assessment capabilities and criteria

C1: Participate in the planning and maintenance of wireless networks in the local and metropolitan area, as well as in the management of commissioning and maintenance of network radio communications systems fixed and mobile, according to the procedures established in the company.

CE1.1 Interpret the technical documentation associated with the computers and systems of the different types of networks.

CE1.2 Collaborate on planning and maintaining local and metropolitan area wireless networks according to business procedures.

CE1.3 Participate in the management of the putting into service of radio communications systems of fixed and mobile networks, in accordance with the procedures and plans of the organization.

CE1.4 Collaborate in the management of the maintenance of fixed and mobile network radio communications systems, in accordance with business procedures.

CE1.5 Document the work done according to business requirements and procedures.

C2: Participate in the company's work process, following the rules and instructions set out in the job center.

CE2.1 Behave responsibly in both human relationships and the jobs to be performed.

CE2.2 Respect the procedures and rules of the work center.

CE2.3 Diligently undertake the tasks according to the instructions received by trying to bring them into line with the company's work rate.

CE2.4 Integrate into the production processes of the job center.

CE2.5 Use the established communication channels.

CE2.6 To respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Maintenance on radio communications systems

-The inventory of enterprise radio communications networks and systems.

-Organization operational specifications.

-The work items, incident parties, and other business documentation.

-Standards and quality criteria defined by the organization.

-Tools used in different business procedures.

-Business planning and maintenance procedures for local and metropolitan area wireless networks.

-Business procedures for the putting into service of fixed and mobile radio communications systems.

-Maintenance management business procedures in fixed and mobile radio communications systems.

2. Integration and communication in the job center

-Responsible behavior in the job center.

-Respect to the procedures and rules of the work center.

-Interpreting and diligently performing the instructions received.

-Recognition of the communication channels established in the job center.

-Adequation to the company's work rate.

-Tracking the regulations for risk prevention, occupational health and environmental protection.

IV. TRAINERS ' PRESCRIPTIONS

Modules

Required Accreditation

*Professional Experience required in the scope of the Competition

MF1221_3 Local and metropolitan area wireless network maintenance and planning

▪ Licensed, Engineer. Architect or corresponding degree title or other equivalent titles.▪ Diplomate, Technical Engineer, Technical Architect or corresponding degree degree or other equivalent titles.

1 year

MF1222_3 Fixed and mobile network radio communications system commissioning management.

▪ Licensed, Engineer. Architect or corresponding degree title or other equivalent titles.▪ Diplomate, Technical Engineer, Technical Architect or corresponding degree degree or other equivalent titles.

1 year

MF1223_3 Maintenance management of fixed and mobile network radio communications systems.

▪ Licensed, Engineer. Architect or corresponding degree title or other equivalent titles.▪ Diplomate, Technical Engineer, Technical Architect or corresponding degree degree or other equivalent titles.

1 year

* In the last three years

V. MINIMUM REQUIREMENTS FOR SPACES, FACILITIES AND EQUIPMENT

Forative space

Mt15 students surface

Surface m2/25 students

Radiocommunications Workshop

65

110

Forative Space

M1

M2

M3

Radiocommunications Workshop

X

X

X

Training Space

Aula Workshop Radiocommunications.

-Computer equipment, personal computers.-Wireless communications equipment (modems and bridges, among others).-Computer tools for connectivity tests.- Office tools.-WiFi equipment: access points, cards, adapters, different types of antennas.-WiMax equipment: inner unit, base station, different types of antennas.-Field gauge for the 2.4 GHz band and the WiMax band (up to 10 GHz).-Project planning tools.-Plan for implementation areas of the wireless network.-Computer simulation applications of indoor and outdoor coverage areas.-Graphic design programs for network schemes.-Portable computer with WiFi and WiMax network scanning software. -Mobile devices.-GPS positioner.-Digital camera.-Network traffic monitoring programs.-Portable wireless and wired networks.-Radio communications equipment for fixed and mobile networks.-Equipment for the Measurement of specific parameters of radio communications of fixed and mobile networks.-Tools specific to the measurement and configuration of parameters in the equipment and in the system.-Tools of installation of software.-Tools network management software and services.-Tools management software incidents.-Radio signal measurement equipment.-Network displaymakers.-Computer applications for project management, reporting, databases.-Specific programs and software for local management of equipment radiocommunication. -Voltmeter.-Frequency.-Quality meter-meter generators. -Installation-specific tools.-Tools inventory management software. -Work-flow software tools.-Protection and safety elements-Canon projection.-Rotafolios.-Pizarra.-Classroom material.-Table and chair for the trainer.-Mesas and chairs for students.-Auxiliary furniture for the equipment aula.* The appropriate equipment and software must be up to date.

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

The facilities and equipment must comply with the relevant industrial and sanitary sanitary regulations and respond to the universal accessibility and safety measures of the participants.

The number of units that must be available for the tools, machines and tools specified in the training space equipment, will be sufficient for a minimum of 15 students and must increase, if any, to attend to the higher number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.

ANNEX IV

I. CERTIFICATE IDENTIFICATION OF PROFESSIONALISM

Naming: PROGRAMMING WITH OBJECT-ORIENTED LANGUAGES AND RELATIONAL DATABASES

Code: IFCD0112

Professional Family: Computing and Communications

Professional Area: Development

Professional qualification level: 3

Professional reference qualification: IFC080_3 Programming with object oriented languages and relational databases (Royal Decree 295/2004, February 20).

Relationship of competency units that configure the certificate of professionalism

UC0223_3: Configure and exploit computer systems.

UC0226_3: Schedule relational databases.

UC0227_3: Develop software components in object-oriented programming languages.

General Competition

Develop computer applications on the specified design using object-oriented languages and relational databases.

Professional environment:

Professional scope:

Develops your professional activity in the following areas:

-Companies that have as their business objective the marketing of analytics, design and construction of computer applications.

-As part of the computer systems team of large organizations.

Productive Sectors:

This is present in the sectors where processes are developed:

-Software development companies.

-Technical consulting firms in information systems.

-Telecare and technical assistance services companies.

-Companies or entities that use computer systems for their management.

Occupations and related jobs:

Technical in data mining.

Management Application Programmer.

Duration of the associated training: 710 hours

Relationship of training modules and training units

MF0223_3: (Cross) Operating Systems and Computer Applications (170 hours)

• UF1465: Computers for databases (60 hours):

• UF1466: Storage Systems (70 hours)

• UF1467: Microcomputer and Internet applications for consultation and documentation generation (40 hours)

MF0226_3: (Transversal) Relational Database Programming (210 hours):

• UF2175: Relational database design (50 hours)

• UF2176: Data definition and manipulation (80 hours)

• UF2177: Developing programs in the database environment (80 hours)

MF0227_3: Object-oriented programming (250 hours):

• UF2404: Principles of object-oriented programming (90 hours)

• UF2405: Web programming model and databases (80 hours)

• UF2406: Application development lifecycle (80 hours)

MP0501: Non-work professional practice module for Programming with object oriented languages and relational databases (80 hours)

II. PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: CONFIGURING AND EXPLOITING COMPUTER SYSTEMS

Level: 3

Code: UC0223_3

Professional realizations and realization criteria

RP1: Adapt the logical configuration of the system for operation, according to the needs of use and within the directives of the organization.

CR1.1 System parameters that affect memory, processor, and peripherals conform to the usage needs.

CR1.2 The required devices and their control files are added or removed using operating system utilities.

CR1.3 The team's logical connections are configured to access remote services within or outside the organization.

CR1.4 System parameters that affect ergonomics or ease of use are adjusted to improve the user's working conditions, within the organization's directives.

RP2: Organize information in operating system file systems and maintain their properties to make it easier to exploit resources and ensure compliance with the organization's directives.

CR2.1 Computer applications are organized with a structure and configuration that allow their use in optimal conditions.

CR2.2 Operating system user information is maintained in organized structures according to the capabilities of the system itself (files, directories, volumes, etc.) to facilitate access to such information and maintain homogeneity in the various teams of the organization.

CR2.3 The structure and configuration of the file system are kept available for use to avoid accidental failures and share information.

CR2.4 The information storage space is kept free of useless or outdated information to improve system performance and increase its lifespan.

RP3: Develop and transfer documents by using general purpose computing applications.

CR3.1 The office tools are used with the skills required to assist in the planning and documentation tasks of the jobs.

CR3.2 The exchange of information with other people is done using e-mail or electronic messaging systems to facilitate the flow of information and reduce costs and times when the nature of such an exchange of information information allows.

CR3.3 The services available on the Internet, or other networks, are obtained, by means of the correct use of the necessary tools (navigation, forums, ftp clients, etc.), to facilitate access to information necessary for the work.

RP4: Ensure the integrity, availability, and confidentiality of the information that you are responsible for and are stored in the file system.

CR4.1 the stored information (data and software) can be returned to a state that allows it to be used at any time by, among other means, the backups.

CR4.2 Access to information is protected by the use of keys and other security measures set in the organization.

CR4.3 Disaster or access protection means (antivirus, firewall, proxies, change management systems, etc.) are deployed and used on the systems that you are responsible for.

CR4.4 The system remains free of non-licensed software.

CR4.5 The internal rules of the organization and the current data protection legislation are met in the systems that you are responsible for.

CR4.6 Incidents are reported to the System Administrator to perform the appropriate tasks.

Professional Context

Production media

Computer and peripheral equipment. Operating systems and configuration parameters. Office tools. File transfer and messaging services. Backup tools. Antivirus firewall and proxy servers. Change, incident, and configuration management tools.

Products and results

Operating system with optimal performance and proper utilization of your resources. Proper network connection within an organization. Operating system and configured and parameterized applications according to needs. Files with information according to the nature of the professional activity developed (programs, queries, text documents, spreadsheets, etc.) Stored in appropriate physical media. Backups of information based on integrity, confidentiality, and availability criteria.

Information used or generated

Manuals for the use and operation of computer systems. Operating manuals for the associated software. Training course material. Support systems for the IT applications support technical support (telephone, internet, messaging, forums, etc.).

Competition Unit 2

Naming: SCHEDULING RELATIONAL DATABASES

Level: 3

Code: UC0226_3

Professional realizations and realization criteria

RP1: interpret the data structures and the design of the database so that you can perform the assigned programming tasks correctly, while respecting the integrity and constraints rules of the system information.

CR1.1 The logical layout and structure of the database are known at the level required to establish relationships between the data elements.

CR1.2 The restrictions, integrity rules, and semantics of the data are identified and interpreted in order to properly perform the scheduled programming tasks.

CR1.3 The physical design and particularities of the database implementation are known at the level required to allow data manipulation, identifying data types, indexes, views, and other features implemented.

RP2: Manipulate relational database content interactively.

CR2.1 The received specifications are interpreted with correction by identifying the objects in the database to be manipulated.

CR2.2 Database access client tools are used as appropriate to query the structure of the database and its elements (tables, attributes, data types, relationships, views, procedures stored, etc.).

CR2.3 Data manipulation operations are constructed with correction, according to the specifications received and using a data manipulation language or graphical data access tools.

CR2.4 Built data manipulation operations are tested in controlled environments and with known information to verify that they meet the specifications received.

RP 3: Schedule database manipulation modules

CR3.1 The received specifications are interpreted with correction by identifying the objects in the database to be manipulated.

CR3.2 The encoding is done in the database system's own programming language and following the design specifications.

CR3.3 The developed code must end transactions by ensuring the integrity and consistency of the database in any case.

CR3.4 Queries are tested in controlled environments and with known information.

CR3.5 Queries are optimized using the available techniques and tools.

CR3.6 The required temporary storage structures are handled according to the database design rules.

Professional Context

Production media

Computer and peripheral equipment:

-Office tools.

-Database managers systems.

-Data dictionaries (catalog, system tables, and so on).

-Data manipulation languages.

-Structured languages.

-Object-oriented languages.

-4GL languages.

-Change control tools.

-Debug tools.

-Programming element documentation systems.

Products and results

Computer system with appropriate configuration for database access:

-Programming environment adapted for use of data access objects.

-Ficheros stored in physical media with information according to the nature of the professional activity developed (programs, query scripts, text documents, spreadsheets, etc.).

-Queries for database manipulation interactively.

-Applications that manipulate the database through embedded code.

-Available logical connections to allow access to clients.

-Appropriate mechanisms for transaction recovery.

-Test programs.

-Procedures and test cases.

-Documentation associated with the developed code.

Information used or generated

Software Operating Manuals:

-Training course material.

-SGBD operation Manuals.

-The logical and physical layout of the BBDD.

-Current legislation on data protection and information confidentiality.

-Online help for applications.

-Technical support supports (telephone, Internet, messaging, forums, etc.).

Competition Unit 3

Naming: DEVELOPING SOFTWARE COMPONENTS IN OBJECT-ORIENTED PROGRAMMING LANGUAGES

Level: 3

Code: UC0227_3

Professional realizations and realization criteria

RP1: Implement the software components commissioned to meet the design specifications and quality levels set.

CR1.1 The objects, classes, attributes, methods, relationships, and interfaces of the software components are identified by correctly interpreting the detailed layout.

CR1.2 The design inconsistencies that are detected are transmitted to the design manager by the established channels.

CR1.3 The defined classes, their attributes, relationships, methods, and interfaces are encoded using the chosen programming language and the defined class libraries, according to the specifications received.

CR1.4 Implementation is done by following object-oriented methodological techniques, and in accordance with the programming and quality standards of the software in place in the organization.

CR1.5 The code implements the error control specified by the organization's quality rules and the requirements specification.

CR1.6 The development tools are used to facilitate the process of code generation.

CR1.7 Debug tools are used to detect and correct errors in the developed code.

CR1.8 The problems encountered in the implementation are resolved by consulting the technical documentation and other information sources.

CR1.9 The technical documentation is interpreted correctly whether it is edited in Spanish or the official languages of the Autonomous Communities or in the foreign language of most frequent use in the sector.

CR1.10 The encoding of each class is performed by maintaining the principles of maximum cohesion and minimum coupling.

CR1.11 The corrections required as a result of errors or discrepancies found in the tests are encoded in the affected software components.

CR1.12 The changes in implementation as a result of changes in the specifications are encoded by adapting the structure of the code and maintaining its quality.

RP2: Manipulate databases through interfaces to integrate the programming language with the data access language in the construction of an application.

CR2.1 The data access programming interface (OLE DB, JDBC, DAO, RDO, ADO, ADO.NET, etc.) is selected according to the needs of the application.

CR2.2 The programming tool is adapted according to the selected data access object interface (library integration, route configuration, etc.).

CR2.3 The programming interface is used to start, configure, and close a session with the database, or one of the open sessions in the pool (pool) is used if available.

CR2.4 The data manipulation operations required for the operation of the application are run through the programming interface.

CR2.5 The programming interface is used to ensure that database accesses end transactions by ensuring their integrity and consistency in any case.

RP3: Test the software components developed to ensure they meet the specifications received

CR3.1 The set of basic paths of a code unit is identified for the preparation of white box tests.

CR3.2 Each code unit is tested by performing structural or white box tests to verify its operation.

CR3.3 Each code unit is tested by performing functional or black box tests to verify that it meets the specifications.

CR3.4 The code units are tested in isolation and/or in unit groups considering the lowest level.

CR3.5 The regression tests required as a result of changes to the specifications are performed to ensure the prior functionality.

CR3.6 The software components developed are tested in controlled environments and with known information.

CR3.7 The tests are encoded to verify that the passing of messages and/or events through the interface maintains the status of the objects in the class consistent.

CR3.8 Possible scenarios are tested by the interaction of the objects involved.

CR3.9 All methods are tested as part of some sequence.

CR3.10 The test cases defined in the design (inputs, expected results, required resources, and evaluation criteria for those tests) are performed using the specified test tools.

RP4: Use object-oriented components as the basis for application development for the web programming model.

CR4.1 Object-oriented code is used in the software components of a web application to provide the information necessary for the preparation of the interface for the client.

CR4.2 Object-oriented code is called from client request acceptance software components to perform the requested operation.

CR4.3 Object-oriented code is downloaded to thin clients to collaborate on the performance of the presentation layer by integrating into that layer.

CR4.4 The objects of an object-oriented application in the web programming model travel from client computers to servers or between servers to perform the functions entrusted to them according to protocols and standards defined.

RP5: Develop the code documentation developed according to the organization's standards.

CR5.1 The documentation for each class is written according to the rules and models included in the application design.

CR5.2 The documentation for a developed class is generated by the automatic documentation production tools from the text included in the software component, if such tools are available.

CR5.3 The code contains the necessary comments for the best understanding of the software as well as identifiers with self-explanatory names (mnemonics), tabs, etc.

CR5.4 Code documentation is consistent with its successive modifications.

CR5.5 The procedures for performing unit and regression tests as well as the results of these tests are properly documented.

Professional Context

Production media

Computer and peripheral equipment:

-Operating systems and configuration parameters.

-Office tools.

-Structured languages.

-Object-oriented languages.

-Change control tools.

-Debug tools.

-Test tools.

-Integrated development environments.

Products and results

Application source code:

-Application executable code.

-Test programs.

-Procedures and test cases.

-Documentation associated with the code.

Information used or generated

Manuals for the use and operation of computer systems:

-Software operating manuals.

-Training course material.

-Manuals of the programming language used.

-Manuals of the programming tool used.

-Online help for applications.

-Technical support supports (telephone, Internet, messaging, forums, etc.).

III. TRAINING OF THE CERTIFICATE OF PROFESSIONALISM

FORMATIVE MODULE 1

Naming: OPERATING SYSTEMS AND COMPUTER APPLICATIONS

Code: MF0223_3

Professional Qualification Level: 3

Associated with the Competition Unit: UC0223_3: Configure and exploit computer systems.

Duration: 170 hours

Training Unit 1

Naming: COMPUTERS FOR DATABASES

Code: UF1465

Duration: 60 hours

Competition reference: This training unit corresponds to RP1

Assessment capabilities and criteria

C1: Defer the main components of a computer by indicating its functions and technical characteristics.

CE1.1 Explain the main components of a general purpose computer or server on the basis of its function and utility.

CE1.2 List and describe the elements of a computer's motherboard by recognizing its core functions.

CE1.3 Classify the main processor types based on your technology family, historical evolution, and most relevant features.

CE1.4 Classify and explain the peripherals and main input/output components of a computer by pointing to the function they perform in the system assembly.

CE1.5 List and sort the main commands in the low-level instruction set of a processor based on the function they are running.

CE1.6 In a series of practical scenarios for configuring microcomputer systems properly characterized by connection diagram and technical documentation:

-Identify the motherboard and recognize: the processor, the memory banks, locate the disks and diskette and CD/DVD drives, locate the /output connectors, and classify them by type.

C2: Analyze the core functions of a multi-user and multi-task operating system, recognizing and classifying the different types of existing operating systems.

CE2.1 Explain kernel, virtual core, and command interpreter concepts for an operating system.

CE2.2 Explain the different ways to route and store file systems and file systems for an operating system and to structure read and edit permissions.

CE2.3 Analyze the function of memory in the process of computer tasks and identify concepts related to it: central and expanded memory, virtual memory and paging and exchange.

CE2.4 List the different processor time-sharing policies implemented on the operating systems, identifying the impact of each of them on the process types.

CE2.5 Recognize and explain the functions of context changes, semaphores, job scheduler, and interrupt handlers in the operation of multiuser and multitask operating systems.

CE2.6 Explain the different input/output mechanisms that an operating system handles based on resource management.

CE2.7 Classify operating systems and architectures by the different forms that have been historically employed.

CE2.8 From a practical scenario of configuring a multi-user and multi-process computer system:

-Install different operating systems on the machine by identifying important milestones in the process.

-Configure the paging and memory swap areas and recognize their impact on the system.

-Cause and interpret resource locks and their impact on system behavior.

-Create and organize files and file systems.

C3: Distinguished and analyze the configuration variables of an operating system, specifying its effect on system behavior.

CE3.1 List and explain the different types of logical devices used for installing services and applications.

CE3.2 Recognize and explain the core configuration parameters of the core of an operating system and its impact on system behavior.

CE3.3 Analyze the core services that run on an operating system and its influence and competence on resource management.

CE3.4 Describe the different ways to monitor and adjust the components of an operating system and analyze trends from the load state.

CE3.5 Map alarms sent by the previously implemented monitoring system and define events for resolution.

CE3.6 From a practical scenario by technical documentation of the installation and configuration of the operating system:

-Confect the file structure and file systems with user permissions.

-Drill down the started processes on the machine.

-Drill down the load status of: Disk Occupation, Memory Usage, Identify System Defined Networks, Install and Compile Different Hardware Component Device Handlers, Start Monitors system and analyze the data in real time and in aggregate mode.

Contents

1. Definition and identification of the main structure and components of a general purpose computer based on its function and utility

-Processor:

-Identification of different types of processors (CISC and RISC), as well as their different parts (Set of Instructions, Records, Counter, Unit-Logical, Interrupts):

-Enumeration and classification of the main instruction sets of an 8086 family processor.

-The advantages and disadvantages of the CISC and RISC models.

-RAM and xPROM Memories:

-Description of current RAM memory models and DDR, SDRAM differences.

-Description of xPROM memory models.

-Defining caches.

-Cache levels.

-Determining its importance in system performance.

-Valuation of memory by speed and storage unit cost.

-Input/Output interfaces:

-External devices.

-General enumeration of more common interface types.

-Disks:

-Definition and description.

-Identification and location of mechanical disk parts.

-Classification of disks by their Input/Output interface.

-The advantages and disadvantages of different types of disks.

-Analysis of the SCSI disk and its interface.

-Solid state disk analysis and its advantages and disadvantages as a replacement storage medium for mechanical disks.

-SATA disk analysis and comparison with PATA disks.

-Families and processor types:

-Classification of processors ' families based on their compatibility with Intel's 8086 microprocessor (CISC and RISC).

-Classification and 64-bit processor models.

-Advantages and drawbacks of different solutions from leading manufacturers.

-The history of Intel processors from the 8086 model to the Pentium family.

-Comparison to AMD.

-Power Processor. Advantages and types of peripherals.

-Classification by input or output peripherals.

-Introduction to the assembler language.

-Development of a scenario of identification and assembly of a computer, according to the guidelines indicated.

-Operating systems.

2. Functions and objectives of operating systems and memory management

-The operating system as the user/computed interface.

-The operating system as the resource administrator.

-An operating system's evolution facility.

-Memory management requirements (relocation, protection, sharing, logical and physical organization).

-Virtual memory concept.

-Paging concept.

-Paging incident on system performance.

-Description of memory management on Linux, Windows, and Solares systems.

3. File systems

-Files.

-Directories.

-Implementing file systems.

-Examples and comparison of file systems.

-File systems with journaling.

-File system security.

4. Identification and description of multiprocess and multi-user concepts.

-Multiprocessor hardware.

-Types of operating systems for multiprocessor.

-Multicomputers.

-Explanation of the user organization. Description of the different organizational models.

5. Logical partitioning and virtual cores.

-Concept of virtualization.

-History of virtualization.

-Description and comparison of different virtualization implementations. (full virtualization, paravirtualization ...).

6. Applying system configuration and tuning techniques

-System performance. Enumeration, description, and interpretation of the main tools for observing resource consumption on in-memory, CPU, and disk systems on Windows, Linux, and Solaris.

-Examples of resolving high resource and competitive situations on Windows, Linux, and Solaris systems.

-Enumeration and description the main services processes running on Windows, Linux, and Solaris operating systems and their effect on the system assembly.

-Description of different accounting systems that allow you to set predictive models and trend analysis on Windows, Linux, and Solaris operating systems.

-Pre-production test plans. Description of different tools for performing load tests that affect CPU, Memory, and Input/Output on Windows, Linux, and Solaris operating systems.

-Making a test plan for the operating system.

Training Unit 2

Naming: STORAGE SYSTEMS

Code: UF1466

Duration: 70hours

Competition reference: This training unit corresponds to RP2 and RP4

Assessment capabilities and criteria

C1: Recognize and describe encodings and nomenclatures of computer elements according to the most widespread standardization criteria.

CE1.1 Describe and apply the regulations concerning the classification and classification of files and their required containers to facilitate the safeguarding and administration of system data.

CE1.2 Describe and employ standardized naming regulations for machines, services, and applications required to facilitate administration tasks.

CE1.3 Recognize and apply the migration and archive policies of files to be used in system storage management based on their need for further processing and efficiency of use resources.

CE1.4 In several scenarios and case studies properly characterized from servers connected to different TCP/IP communications networks:

-Generate a network and server IP address map

-Define and deploy a name server (DNS)

CE1.5 From a convenient convenient scenario of file system architecture:

-Analyze and explain the implemented structure.

-Identify the creation, validity, and last modification dates of a characteristic set of files.

-Identify authorized users to open and modify a characteristic set of files.

-Apply different data migration policies by analyzing their influence on space availability and process runtime.

C2: Distinguished the different types of storage used in multi-user operating systems, indicating their structure, characteristics, and modes of operation.

CE2.1 List and classify different storage systems based on their capacity, performance characteristics, and compatibility with the most extended operating systems.

CE2.2 Describe and classify the physical protection and recovery mechanisms of the information according to its mode of operation and performance.

CE2.3 List and analyze the volume pools, logical volumes, and format types that are defined and implemented on each operating system and volume manager.

CE2.4 Choose and use the logical volume management tools that are used for storage management on the basis of their operating mode and compatibility with the different systems

CE2.5 Explain how it works and what value it brings to the operating system in parallel to multiple physical volumes.

CE2.6 List tape and cartridge storage systems and classify them by type of support, by manual or automatic management, and by their use on operating systems and applications.

CE2.7 In various scenarios and cases properly characterized by systems with external and internal storage and tape libraries:

-Document a physical/logical map of capabilities that you define: Physical volumes with their capacity, address and access mode, tape drives and their labels, implemented parity protections, and number of accesses each volume.

-Define logical volumes and file systems with different sizes and structure.

-Install and configure a fault-tolerant access balancing system.

-Define parallel access to file systems and analyze the impact on system performance using operating system monitoring tools.

-Implement software volume mirroring with the logical volume manager and analyze its utility for operating system recovery.

C3: Apply techniques and procedures related to security of systems, communications networks, and data.

CE3.1 Explain the fundamental concepts of data protection and security policies and their relationship in the recovery and continuity of services and applications.

CE3.2 Explain the differences between physical and logical backups and their influence on operating systems, file systems, and databases.

CE3.3 Identify the major systems and component high availability architectures and analyze their strengths and weaknesses based on each case.

CE3.4 Explain how firewalls, antivirus, and proxies work on communications network architectures.

CE3.5 Recognizes the technical and operational procedures used to ensure user access security to services and applications with special interest in Internet-related architectures.

CE3.6 In a number of scenarios and case studies properly characterized by computer systems connected to communications networks:

-Implement backups of files and databases.

-Retrieve applications that use databases from physical and incremental backups and continuity specifications.

-Install and configure firewalls on servers that only allow access from the specified clients and protocols.

Contents

1. Organization and management of information

-File systems:

-Nomenclature and encoding.

-Storage hierarchies.

-Migrations and archiving of data.

-Logical and physical volumes:

-Concept of partitioning.

-Partition table concept and MBR.

-Description of NAS and SAN storage systems. Comparison and applications. Comparison of iSCSI, FC, and FCoE SAN systems.

-Managing logical volumes. The LVM volume management system. Basic LVM usage guide.

-Parallel access.

-RAID protection. Comparison of different levels of RAID protection. Software or hardware RAID controller option mention: RAID 0, RAID 1, RAID 5 (Recovery of large disks with RAID 5), and RAID 6.

-Analysis of Safeguard policies:

-The unique points of failure, concept, and identification.

-Backup and backup types of copies.

-Physical and logical safeguard.

-Safeguard at block and file level.

-High Availability Concepts. Differences between cluster, grid, and load balancing.

-Data integrity and service recovery. Minimum guide to develop a business continuity plan. Recovery Point Objective (RTO) and Recovery Time Objective (RTO) concepts.

-Custody of security files. The problem of safeguarding and storing confidential data. Some implications Data Protection Organic Law (LOPD).

-Security Policy Analysis:

-Restricted access by user accounts. Ownership of the information.

-Single access identifier. Single Sign On (SSO) systems.

-Anti-virus protection.

-Security audits.

2. Development of different practical scenarios, duly characterised, in which they are analysed

-The effect of possible partitioning and disk access decisions as well as the implementation of a data safeguarding policy.

-The nomenclature policy of the different systems and the development of a network map to document it.

-Different file systems to study the selected nomenclature and the data access and modification of the files, as well as the permissions of the users of access to them.

-The migration of data between different systems.

Training Unit 3

Naming: MICROCOMPUTING AND INTERNET APPLICATIONS FOR REFERENCE AND DOCUMENTATION GENERATION

Code: UF1467

Duration: 40hours

Competition reference: This training unit corresponds to the RP3

Assessment capabilities and criteria

C1: Use the main types of office tools and services and applications associated with the Internet.

CE1.1 List and explain the main functions of text processors, spreadsheets, and presentation editing.

CE1.2 Relate the main services associated with the Internet and classify them on the basis of their function and specificity.

CE1.3 Apply the functions of the office tools and Internet services to the elaboration of properly structured and standardized technical documentation to facilitate the understanding and control of versions.

CE1.4 Use file transfer services for information exchange with support services that information technology manufacturers publish on the Internet.

CE1.5 From a convenient scenario of microcomputer system with the possibility of Internet connection:

-Elaborate text documents, spreadsheets, and presentations from a series of delivered models that require the use of different functionality of the tools in increasing difficulty.

-Configure the computer for your Internet access from the Service Provider specifications.

-Find and extract technical documentation and applications from different service providers on the Internet from a situation relationship.

Contents

1. Microcomputing and Internet applications

-Text Processors, Calculation Sheets, and Presentations Edition:

-User-level management and knowledge.

-Technical documentation processing techniques.

-Standard document formats. Structure of information and metadata in documents.

-The Wiki as a collaborative writing tool.

-Internet Usage:

-Knowledge of www. Browsers.

-Email, chat and forum systems. Rules of conduct apply in forums, chat and email.

-File transfer. Explanation of user-level file transfer techniques and discriminating against security elements for both identification and encryption.

-Free software projects on the web. Identifying sites to find them, where to download the software and how to contact the community.

-Version control systems.

Methodological guidelines

To access the UF2 formative unit the UF1 training unit must have been exceeded.

The UF3 training unit can be programmed independently.

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 2

Naming: RELATIONAL DATABASE PROGRAMMING

Code: MF0226_3

Professional qualification level: 3

Associated with the Competition Unit :UC0226_3: Schedule relational databases.

Duration: 210 hours

Training Unit 1

Naming: RELATIONAL DATABASE DESIGN

Code: UF2175

Duration: 50hours

Competition reference: This training unit corresponds to RP1

Assessment capabilities and criteria

C1: Understand and apply the conceptual fundamentals and techniques of relational databases.

CE1.1 Describe the fundamentals and objectives of the relational model.

CE1.2 List and describe the main elements of the relational data model: relationships/tables, attributes, key keys, foreign keys, indexes, views.

CE1.3 List the types of constraints associated with the keys.

CE1.4 Explain the concept of functional dependency and list existing types.

CE1.5 Explain the objectives of the normalization theory and describe the different normal ways: 1FN, 2FN, 3FN, 4FN and 5FN.

CE1.6 Explain the reasons why data models are being de-normalised.

CE1.7 In a scenario study of the logical design of a relational database:

-Identify tables, primary and foreign keys, indexes, and views.

-Recognize the degree of normalization of database tables.

-Justify possible model denormalizations.

-Recognize the domain of the attributes of the tables by indicating the range or set of values that they can take.

-Indicate the integrity constraints associated with each primary key.

-Indicate the constraints of integrity associated with the foreign keys, describing in each case how the deleted or modifications performed on them behave (restriction of the action, propagation of the action, override of keys in related records).

C2: Determine the elements of the database to be manipulated, by interpreting the database design and analyzing user requirements.

CE2.1 Explain the concept of data dictionary and its structure (tables and auxiliary variables for manipulation of the data dictionary).

CE2.2 List the database system tools for data dictionary query and manipulation.

CE2.3 List the main models for obtaining conceptual schemas from the database.

CE2.4 Describe the symbology associated with the concept-relationship model.

CE2.5 Explain the need for quality control within the lifecycle of a project.

CE2.6 List the main strategies for tracking user requirements, specifying the specific ones for the software development phase.

CE2.7 In a scenario of study of the design of the BBDD and user requirements:

-Identify the functionality to be developed from user requirements.

-Identify the elements of the BBDD to manipulate for each functionality and locate them in the conceptual schema.

-Use the data dictionary to observe the particularities of the elements of the BBDD to manipulate.

-Document the elements of the BBDD that are to be used for each functionality to facilitate tracking of user requirements.

-Identify the definition needs of new elements in the BBDD: auxiliary tables, views, indexes.

-Document the new elements of the BBDD for further creation.

Contents

1. Introduction to databases

-Historical evolution of databases.

-Benefits and drawbacks of databases.

-General concepts:

-Concept of databases.

-Objectives of the database systems:

-Redundancy and data inconsistency.

-Difficulty to access data.

-Isolation of the data.

-Concurrent access failures.

-Security problems.

-Integrity problems.

-Administration of data and database administration.

-Architecture levels: internal, conceptual, and external.

-Data Models. Classification.

-Independence of the data.

-Data definition language.

-Database handling language. Types.

-The Database Management System (DBMS). Functions.

-The Database Administrator (DBA). Functions.

-Users of the databases.

-The overall structure of the database. Functional components.

-Database system architecture.

2. Conceptual models of databases

-The relationship-relationship model:

-Entities.

-Interrelationships: Cardinality, Role, and Degree.

-Domains and values.

-Attributes.

-Identifying properties.

-Link-to-relationship diagrams. Symbology.

-The extended-relationship model extended.

-Integrity constraints:

-Inherent Restrictions.

-Explicit constraints.

3. The relational model

-Evolution of the relational model.

-Relational model structure:

-The concept of relationship. Properties of the relationships.

-Attributes and domain of attributes.

-Tupla, degree, and cardinality.

-Relationships and tables.

-Keys in the relational model:

-Candidate keys.

-Primary keys.

-Alternative keys

-Non-foreign keys.

-Integrity constraints:

-Value "Null" in the model.

-Integrity of entities.

-Referential Integrity.

-Standardisation theory:

-The normalization process. Types of functional dependencies.

-First normal shape (1FN).

-Second normal shape (2FN).

-Third normal shape (3FN).

-Other Normal Forms (4FN, 5FN).

-Desnormalization. Reasons for de-normalization.

4. The lifecycle of a project

-The lifecycle of a database:

-Previous study and work plan. Activities.

-Conception of DB and selection of physical and logical equipment:

-General concepts about application analysis.

-Concepcion of the database.

-Selecting the required physical and logical equipment.

-Design and Load:

-General concepts about application design.

-Logical layout.

-Physical design.

-Loading and optimizing the database.

-Quality control general concepts:

-Quality control of functional specifications.

-Tracking user requirements.

5. Creating and designing databases

-Design approaches:

-Incorrect designs. Causes.

-Analysis approach. Advantages and disadvantages.

-Synthesis approach. Advantages and disadvantages.

-Design methodologies:

-Concept.

-Conceptual, logical, and physical designs.

-Entries and outputs of the process.

-Study of the logical layout of a relational database.

-The Data Dictionary: concept and structure.

-Study of the design of the BBDD and user requirements.

Training Unit 2

Naming: DEFINITION AND MANIPULATION OF DATA

Code: UF2176

Duration: 80hours

Competition reference: This formative unit corresponds to the RP2

Assessment capabilities and criteria

C1: Formulate data manipulation and definition queries, based on the design of the BBDD and user requirements.

CE1.1 Explain the fundamentals of algebra and relational calculation and list and differentiate the languages associated with the database.

CE1.2 Explain the type of queries (for selection, update, insert, erasure) that can be performed using the DML language.

CE1.3 Explain the type of elements that can be created and manipulated using the DDL language.

CE1.4 Describe the syntax of a relational query language.

CE1.5 Explain the concept of view and describe its usefulness.

CE1.6 Indicate relational query language extensions to specify integrity constraints, to define access control to BBDD elements, and to control the execution of the transactions.

CE1.7 List and describe the BBDD tools for interactive data manipulation and definition formulations.

CE1.8 Describe the database tools for query optimization.

CE1.9 Perform data manipulation formulations, based on database design and user requirements:

-Select the appropriate language to perform the encoding.

-Select the appropriate BBDD tool for interactive execution of the encoded formulation.

-Use the DML language to construct the data manipulation formulation.

-Test the manipulation formulation in a controlled environment that interferes with the minimum possible with the system.

-Use the relational query language facilities for transaction execution control, ensuring the integrity of the BBDD data.

-Analyze the results obtained in the execution and make the necessary modifications to the code to correct any malfunction.

-Optimize encrypted queries using the database tools.

-Document the code done and the tests to help you track requirements.

CE1.10 Perform data definition formulations, based on database design and user requirements:

-Select the appropriate language to perform the encoding.

-Select the appropriate BBDD tool for interactive execution of the encoded formulation.

-Use the DDL language to construct the data definition formulation.

-Check that the created elements meet the design specifications.

Contents

1. Relational languages

-Types of relational languages.

-Operations in the relational model:

-Relational Algebra:

-Classification of operators.

-Attribute naming.

-Derived Relationships.

-primitive operations: selection, projection, cartesian product, union, and difference.

-Other operations: intersection, join, division, etc.

-Relational Calculation:

-Domain-oriented relational calculation

-Tuple-oriented relational calculation.

-Transformation of queries between algebra and relational calculation.

-Commercial languages: Structured Query Language (SQL), QBE (Query By Example):

-SQL origin and evolution.

-SQL characteristics.

-Database management systems with SQL support.

6. The database manipulation language

-The data definition language (DDL):

-Language data types.

-Creating, modifying, and deleting tables.

-Creating, modifying, and deleting views.

-Creating, modifying, and clearing indexes.

-Specifying integrity constraints.

-The data manipulation language (DML):

-Build selection queries: Aggregation, Subqueries, Union, Intersection, Difference.

-Build insert queries.

-Build modification queries.

-Construction of cleanup queries.

-Language clauses for grouping and ordering queries.

-Arithmetic, logical, and language comparison capabilities.

-Aggregate language functions.

-Treatment of null values.

-Building nested queries.

-Union, intersection, and query difference.

-Cross-table queries.

-Other language clauses.

-Language Extensions:

-Creating, manipulating, and clearing views.

-Specifying integrity constraints.

-Authorization instructions.

-Control of transactions.

-The data control language (DCL):

-Transactions.

-Transaction properties: atomicity, consistency, isolation, and persistence:

-A transaction states: active, partially committed, failed, aborted, and committed.

-Queries and storage of structures in XML.

-Structure of the data dictionary.

-Control of transactions.

-Privileges: authorizations and disauthorizations.

-Processing and optimizing queries:

-Processing a query.

-Optimization types: rule-based, cost-based, other.

-BBDD tools for query optimization.

Training Unit 3

Naming: PROGRAM DEVELOPMENT IN THE DATABASE ENVIRONMENT

Code: UF2177

Duration: 80hours

Competition reference: This training unit corresponds to the RP3

Assessment capabilities and criteria

C1: Formulate queries using the database programming language, based on database design and user requirements.

CE1.1 List and describe the integrated development environments available in the database management system.

CE1.2 List the programming languages available in development environments.

CE1.3 Describe the syntax of a programming language available in an integrated environment in the database. Detail the general characteristics of the same: variable types, data types, control structures, function libraries.

CE1.4 List and describe the possible tools for developing integrated user graphical environments in the database scope.

CE1.5 List and describe the utilities for debugging and code control available in the database environment.

CE1.6 List and describe the techniques for controlling transaction execution.

CE1.7 Describe the database tools for query optimization.

CE1.8 Develop programs in the database environment, based on the design of the database and user requirements:

-Select the appropriate development environment based on the design needs.

-Select the appropriate programming language according to the design needs.

-Encode modules using programming techniques according to the design specifications and user requirements.

-Use the tools for developing user graphical environments based on user requirements and database design.

-Select the most appropriate transaction control technique and use it to ensure the integrity of the BBDD data.

-Test modules developed in controlled environments that do not interfere with the normal operation of the system.

-Analyze test results and make appropriate code modifications to fix possible operating errors.

-Optimize the queries used in the modules using the database tools.

-Documenting developed modules and test batteries to facilitate tracking of user requirements.

Contents

1. Database programming languages

-Development environments:

-That is a development environment.

-Components.

-Language that they support.

-Development environments in the database environment.

-The syntax of the programming language:

-Variables.

-Data types.

-Control structures.

-Function stores.

-Programming of database manipulation modules: packages, procedures, and functions.

-Debug and code control tools.

-Integrated development graphical tools in the database:

-Creating forms.

-Reporting.

-Techniques for controlling transaction execution.

-Optimizing queries.

Methodological guidelines

The training units must be exceeded in a correlative manner.

Access criteria for pupils

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: OBJECT-ORIENTED PROGRAMMING

Code: MF0227_3

Professional qualification level: 3

Associated with the Competition Unit: UC0227_3 Develop software components in object-oriented programming languages.

Duration: 250 hours

Training Unit 1

Naming: PRINCIPLES OF OBJECT-ORIENTED PROGRAMMING

Code: UF2404

Duration: 90 hours

Competition Reference: This training unit corresponds to the RP1 as referred to the implementation of the software components.

Assessment Capabilities and Criteria

C1: Dominate the fundamental concepts of the object-oriented paradigm.

CE1.1 Explain the features of the software development cycle under the object orientation paradigm, distinguishing object-oriented programming as a phase within it.

CE1.2 Describe and enumerate the characteristics of a class: attributes, methods, and encapsulation mechanism, identifying the interface of the class and what it represents.

CE1.3 Describe and enumerate the characteristics that define an object, distinguishing the differences between object and class concepts.

CE1.4 Describe the structure and meaning of messages and their relationship to the behavior of objects.

CE1.5 Explain the fundamental characteristics that need to be present in a relationship between two classes so that it can be qualified as a inheritance relationship.

CE1.6 Describe the multiple inheritance mechanism and the problems it presents in the software development process.

CE1.7 Explain the concept of polymorphism and list and describe the features that you enter into the software development process.

CE1.8 In a practical scenario, from a typical detailed design documentation, identify the established classes, attributes, and relationships.

C2: Develop classes by applying the fundamentals of the Object Oriented paradigm.

CE2.1 List and describe the main quality criteria for the software and the main factors evaluated by the object-oriented metrics.

CE2.2 List and describe the memory management mechanisms used in the creation and destruction of objects.

CE2.3 Describe existing mechanisms to perform the implementation of class relationships. (Container classes, collection objects, etc).

CE2.4 Explain the use of "super" and "this" ("current", "self", or other) objects, in relation to access to the attributes defined in a class, from a subclass or from the code of the class itself.

CE2.5 Classify the different programming languages, identifying and recognizing the main features of the object-oriented paradigm: Classes, objects, inheritance, and polymorphism.

CE2.6 Distinguished and use the features provided by a development environment associated with an Object-Oriented language.

CE2.7 Distinguished the most common data structures (lists, stacks, trees, graphs, etc.) and possible building mechanisms in object-oriented languages.

CE2.8 Distinguished the standard class libraries of the programming language by knowing the usefulness of each and the basic form of use.

CE2.9 In a scenario, build the classes that represent the data structures in an object-oriented language.

CE2.10 In a practical scenario, in which you ask to perform the programming of a class with an object-oriented language and from a detailed design-level documentation:

-Design an algorithm for each operation defined in the class, applying structured and modular programming techniques.

-Choose the most appropriate data structure for each attribute.

-Encode each attribute using the base types provided by the language, if applicable, and existing class libraries.

-Encode the access methods to the attributes by following the quality criteria that are set

-Encode the builders methods using the overhead if necessary following the quality criteria that are set

-Encode methods, as a function or procedure, taking into account the class interface and the algorithms designed and following the quality criteria that are set

-Include the specialization/generalization, aggregation/composition and/or association relationships with the rest of the classes described in the design in the class building

-Include code for handling error cases and user exceptions

-Use existing class libraries to incorporate access to databases, graphical interfaces, and other libraries

Contents

1. Introduction to the object-oriented paradigm

-Software development cycle under the object orientation paradigm: Object-oriented analysis, design, and programming.

-Software Construction Process Analysis: Modularity.

− Distinction of the module concept in the object-oriented paradigm.

− Identification of objects as abstractions of real-world entities that you want to model.

− Object Description: A set of data that defines an object and set of behaviors that can be requested from the objects.

− Identifying the behavior of an object: Message concept.

2. Classes and objects

-Distinguished the concept of class and its attributes, methods and encapsulation mechanism:

− Relationship between interface and class.

− Distinction of data types and classes.

-Object analysis: Status, behavior, and identity:

− Message analysis.

− Method types and their classification: Access methods, selection or query, construction, destruction methods.

-Using objects as class instances. Current instance (this, self, current).

-Identification of the concept of program in the object oriented paradigm. POO = Objects + Messages.

3. Generalization/Specialization: inheritance

-Legacy concept description: Simple and multiple:

-Inheritance relationship: Features.

− Rules and features that define a inheritance relationship: "Es-un" rule.

-Transmission of attributes and methods.

− The specialization rule of the superclass in the subclass.

− Access to the attributes of a class and coupling between the classes.

− Using this (current, self, or other) and super objects.

− Demeter's Laws.

-Multiple inheritance flag:

− Problems: Name conflicts, repeated inheritance.

− Solutions.

-Creating objects in the inheritance.

-Hierarchical classification of classes:

-Root class.

− Abstract Classes.

− Virtual methods.

− Redefinition of methods.

4. Relationships between classes

-A distinction between Aggregation/Composition.

-A distinction between Generalization/Specialization.

-Identification of associations.

5. Analysis of polymorphism

-Concept.

-Types:

− Compilation time polymorphism (overload).

− Polymorphism at run time (dynamic ligature).

-Polymorphic objects.

− Static and dynamic checking of types.

6. Structured programming techniques

-Identifying basic elements: constants, variables, operators, and expressions.

-Analysis of control structures: Sequential, conditional, and repeating.

-Distinction between functions and procedures:

− Interface.

− Parameter step: By value and by reference.

− Current and formal parameters.

− Functions: Return value.

− Procedures.

− Scope of the variables.

− Storage of the variables.

-Demonstrating calls to functions and procedures.

-Job calls to functions and procedures included in the classes:

− Qualified and unqualified calls (current instance).

− Step of parameters.

− The attributes of the class.

7. Structure of the information

-Single data numbering: Numeric (integers and real), logical, character, string, pointer, or memory reference.

-Structured Data: Arrays:

− Linked Lists, Stacks, and Queues.

− Structures.

− Ficheros.

− Other complex structures: Hash tables and Introduction to trees and graphs.

-Memory management mechanisms:

− Use of automatic memory management.

− Building and destroying objects.

− Unreachable objects.

-Collection of "garbage".

-Constructors and destroyers methods.

8. Object-oriented programming languages

-Object-oriented programming language analysis and object oriented paradigm:

− Object-oriented programming languages.

− Object-based programming languages.

− Programming languages that use objects.

-Comparison between programming languages oriented to more common objects. Essential features.

-Classes of classes:

-Defining your structure.

− Creation and Utilization.

9. Implementing the paradigm using an object-oriented programming language

-Choosing the language.

-Enumeration of application types.

-Development tools.

-Data types and basic elements characteristic of the language. Instructions.

-Study and use of the basic classes included in the class library.

-Defining classes:

-Build methods. Overload.

-Building attributes.

-Building the class interface.

-Building classes including Aggregation/Composition and Association relationships.

-Building classes with inheritance.

-Building classes with multiple inheritance.

-Defining abstract classes.

-Building classes with inheritance including polymorphism.

-Exception employment.

-Managing events:

− Events, sources, and event auditors.

− Event Types. Event management mechanisms.

− Library of associated classes.

-Thread employment:

− Fundamentals.

− Creation.

− Priority.

− Communication.

− Synchronization.

− States.

− Creating and executing threads in the language.

− Library of associated classes.

− Multithread programming.

-Network programming definition and analysis:

− Server client applications.

− Sockets.

-Access to databases from applications. Associated class libraries.

Training Unit 2

Naming: WEB PROGRAMMING MODEL AND DATABASES

Code: UF2405

Duration: 80 hours

Competition Reference: This training unit corresponds to RP2 and RP4.

Assessment Capabilities and Criteria

C1: Apply the basic concepts of the web programming model.

CE1.1 List and describe the components of the multilayer web programming model. (Thin client, web servers, application servers, database servers).

CE1.2 List and describe the function of common protocols and technologies. (TCP/IP, http, HTML, XML, XSL, SOAP).

CE1.3 List the basic features of widely used programming models (J2EE and .NET).

CE1.4 Describe the logical layers of a web application (Presentation, Application, and Data).

CE1.5 Describe the basic features of the presentation language (HTML).

CE1.6 Describe the basic features of the client scripting languages (JavaScript, VBScript).

CE1.7 Describe the operation of an application session in the web programming model.

CE1.8 Apply the basic features of object-oriented languages to receiving and preparing the presentation layer (JSP, ASP, Servlets, PHP).

C2: Make connections to relational databases.

CE2.1 List and describe the different connection technologies with the BBDD from the applications.

CE2.2 Analyze the different connection and data access technologies, determining which ones should be used for database system manipulation.

CE2.3 List and describe the classes that provide the appropriate means for querying, updating, accessing, and operating with a relational database.

CE2.4 Describe the procedures for performing such queries (open and close connections, execute commands, collect their results, and use them).

CE2.5 In practical assumptions, properly characterized in incorporating an access to a relational database from a class, from a design:

-Select the most appropriate connection technology based on the design requirements and the workbench and the object-oriented language features to be used.

-Load the driver (if necessary) from the database connection.

-Make the connection between the program and the database using the classes in the database access library.

-Develop the class, according to the specification, by performing simple queries in the database and disposing of the results for treatment by the application, following the quality criteria that are set.

-Check the correct operation of the class developed by testing.

-Perform the documentation associated with the developed class.

CE2.6 In properly characterized scenarios of modifying an application with access to a relational database from a class, from a change in the application or database design:

-Modify the class code to incorporate the change by following the quality criteria set.

-Include in the modification site and in the software component header the history data and the modification explanation.

-Modify, if necessary, the associated test programs according to the quality criteria set.

-Check, by performing tests, that the modification has been successfully incorporated and that it has not altered the functionality of the rest of the class.

-Perform the update of all documentation that is affected by the proposed change.

Contents

1. Introduction to application development in the web programming model

-Web architecture analysis: Thin client, web server, application server, data server.

-Numbering of common protocols and technologies.

-Analysis of de facto standard programming models.

-Using object-oriented components as the basis for application development in the web programming model.

2. Multilayer (n-tier) architecture

-Multi-layer architecture analysis:

-Distinction and study of the three-layer model on the web: presentation, application, and data.

-Design application architectures based on the multilayer model

-Analysis of the concept of business logic and meaning of the logical layer

3. The presentation layer

-Presentation layer description: The hypertext language.

-Advanced presentation layer description: Scripting languages and dynamic hypertext language.

-Analysis of languages oriented to the preparation of the presentation layer and the execution of requests from web light clients. (JSP, Servlets, ASP, PHP).

4. Designing relational databases

-Defining relational databases.

-Design of databases at multiple levels.

-Analysis of the different types of relationships and their implementation on the database.

-Description of the database access language

-Description of mappings between the relational model and object-oriented model.

-Notions about the storage of objects in relational databases.

5. Accessing relational databases: data access layer

-Database access API analysis.

− Controller level.

− Database access interface (driver).

-Application-level analysis:

− Setting the connection to a database.

− Operate on the database. Statements in the database access language. Objects that allow you to run a query. Objects that allow you to manipulate the result of a query.

− Integrating the data types of the database access language in the application programming language.

− Stored Procedures.

− Distributed Transactions.

6. Data definition languages

-Basic concepts, notions, and standards

-Data Definition Language (SQL DDL) and application in current SGBD

-Discrimination of existing elements in the SQL-92 standard of other existing elements in commercial databases

-Create Statements: CREATE:

− Databases

− Tables

− Views

− Disparators or Triggers

− Procedures

-Modification Statements: ALTER:

− Databases

− Tables

− Views

− Disparators or Triggers

− Procedures

-Clear statements: DROP, TRUNCATE:

− Databases

− Tables

− Views

− Disparators or Triggers

− Procedures

7. Manipulating the data

-Data manipulation language (DML SQL)

-Data queries: SELECT

-Inserting data: INSERT

-Data Modification: UPDATE

-Removing data: DELETE

-Data Set Aggregation for Query: JOIN, UNION

-Subqueries

Training Unit 3

Naming: THE LIFECYCLE OF APPLICATION DEVELOPMENT

Code: UF2406

Duration: 80 hours

Competition Reference: This training unit corresponds to RP1 in terms of design specifications and quality levels, RP3 and RP5.

Assessment Capabilities and Criteria

C1: Handle software engineering tools.

CE1.1 List and compare software engineering models, indicating the main concepts on which they are based, their scope of use, and how they are structured.

CE1.2 Describe the phases, in each model, of the software engineering process, indicating for each:

-Starting data (entries).

-End data (outputs).

-Functions performed in the phase.

-Documentation generated.

-Traceability.

CE1.3 Describe in detail the fundamental concepts of a software engineering methodology based on object orientation.

CE1.4 Identify the available object-oriented development tools, the different components, and describe how the concepts of methodology and the different phases of the software engineering process are implemented, with special emphasis on the processes of:

-Design.

-Encoding.

-Unit tests.

-Documentation.

-Quality assessment and metrics.

-Managing the Configuration.

-Changes.

CE1.5 In a practical scenario, use the development tools, if possible, to:

-Extract the design information for a class.

-Encode the class.

-Perform debugging.

-Incorporate the definition and implementation of unit tests.

-Tracing the tests with the classes.

-Configure the tool for performing automatic test batteries.

-Develop documentation using the templates built into the tool.

-Make modifications to the built-in templates for documentation processing.

-Generate quality and metrics reports and interpret the results.

-Incorporate changes.

C2: Verify the correction of classes developed by testing.

CE2.1 List and describe the most common tools and utilities for program debugging.

CE2.2 List and describe the types of possible tests that can be given in the application development process, especially distinguishing those that are the responsibility of the programmer.

CE2.3 List and describe the types of tests that must be performed on a class to verify their correctness.

CE2.4 Use the features provided by a development environment to debug a program by:

-Step-by-step execution.

-Setting stop points (conditional or unconditional).

-Variable monitoring.

CE2.5 In practical scenarios, document a complete test strategy to a class from its design documentation, so that optimal performance is ensured in aspects such as:

-Coherence in the status of the objects.

-All possible scenarios.

-Performance.

-Limit cases.

-Exceptional situations.

CE2.6 In scenarios, from a class and the defined test strategy:

-Set the set of sequences and initial states of the objects that are involved in the sequences.

-Set the criteria for evaluating the results.

-Automate the process using test programs.

CE2.7 Test a class using test tools.

C3: Develop the complete documentation for the developed classes and tests performed.

CE3.1 Describe information that should accompany a developed class.

CE3.2 Describe the fundamental criteria for the inclusion of headers and comments in the code.

CE3.3 Propose indexes (templates) for design documents and explain the contents of each of the sections.

CE3.4 Propose indexes (templates) for test documents (scheduling and results) and explain the contents of each of the sections.

CE3.5 Propose indexes (templates) for operation and maintenance documentation (technical manuals) and explain the contents of each of the sections.

CE3.6 Apply established normalization criteria to include headers and comments in the code.

CE3.7 In a practical scenario, from a developed class, elaborate the design documentation of the class according to an established index.

CE3.8 In a practical scenario, from a test class and set, work out the test documentation (planning and results) according to an established index.

CE3.9 In a practical scenario, from the development and test documentation, work out the operation and maintenance documentation according to an established index.

CE3.10 Perform class documentation using automatic documentation tools.

C4: Make modifications of existing classes by changes to specifications.

CE4.1 List and describe the fundamental concepts of software configuration management developed by an organization.

CE4.2 List and describe the fundamental concepts of documentation configuration management.

CE4.3 Describe the fundamental steps and precautions in the process of modifying existing classes.

CE4.4 In a scenario of modifying a document, and according to a procedure:

-Make the modification to the document.

-Mark the changed sheets with modification and revision code.

-Develop the change proposal according to the specified format.

-Edit the new edition or revision of the document.

CE4.5 In a scenario of modifying a class by a change in its design and according to a procedure.

-Modify the code to incorporate the change by following the quality criteria set.

-Include in the modification site and in the software component header the history data and the modification explanation.

-Modify, if necessary, the associated test programs according to the quality criteria set.

-Check, by performing tests, that the modification has been successfully incorporated and that it has not altered the functionality of the rest of the class.

-Perform the update of all documentation that is affected by the proposed change.

CE6.6 Use tools for configuration management and software versions.

C5: Develop user interfaces in object-oriented programming languages, from the detailed layout.

CE5.1 Interpret use case diagrams and analyze user needs and requests.

CE5.2 Identify and describe the basic classes that are used for the man/machine interface.

CE5.3 Explain the event concept and event-oriented programming and its implementation in object-oriented languages in relation to the classes required for interface development.

CE5.4 Identify the media resources that can be included in a user interface window.

CE5.5 Perform the design of the windows corresponding to the user interface, applying ergonomics criteria, efficiency and possible use by the disabled, in the communication of information.

CE5.6 In a scenario of building a user interface:

-Identify the basic elements that make up the interface, in the provided design documentation.

-Associate each identified item with the appropriate class of the available class library.

-Build the interface with a graphical interface design tool.

-Identify and describe the source code generated by the graphical interface tool.

CE5.7 In a scenario of building an application with a user interface, from the code generated by a graphical interface tool:

-Include the code needed to incorporate other multimedia resources from the available class libraries and follow the quality criteria that are set in an object-oriented language.

-Perform the programming of the classes required to connect the user interface to the application, following the quality criteria that are set and using the features provided by a language object-oriented programming.

CE5.8 In a practical scenario, about a developed user interface and the documentation for detailed design:

-Evaluate that implemented presentation services meet user-defined needs and optimally use system resources.

-Set presentation services validation criteria.

-Describe various types of errors depending on the interface.

-Check that the input and output formats are as expected according to the design specifications.

-Verify that performing improper operations does not alter system reliability.

-Develop the interface documentation.

-Compose the appropriate user guide.

Contents

1. Software Engineering Process

-Distinction of the phases of the software engineering process: specification, design, unit construction and testing, validation, implementation and maintenance.

-Analysis of engineering process models: cascading model, evolutionary development, formal developments, etc.

-Identification of requirements: concept, evolution and traceability.

-Analysis of object-oriented development methodologies.

− Resolution of a practical case of development methodologies that use UML.

-Defining the concept of CASE tools:

− Software Engineering Tools

− Development Environments

− Test Tools

− Configuration Management Tools

− Tools for metrics.

2. Planning and tracking

-Realizing estimates

-Schedules: models of diagrammed. Chart of Gantt

-Analysis of the tracking process: Meetings and Reports

3. Diagramed

-Identifying the basic principles of UML.

-Use diagrams jobs.

4. Developing the GUI

-Analysis of the components and events model.

-Identifying GUI elements.

-Presentation of the user-oriented design. Notions of usability.

-Using graphical interface tools

5. Quality in software development

-Numbering of quality criteria.

-Analysis of quality metrics and standards.

6. Tests

-Identification of evidence types.

-Defect Test Analysis: Black Box Tests. Structural tests. Evidence of trajectories. Evidence of integration. Interface tests:

− Preparing the test data.

− Test Cases.

− Code the tests.

− Define test processes.

− Execution of tests.

− Generation of test reports.

7. Exceptions

-Definition. Source of exceptions. Treatment of exceptions. Failure prevention. Exceptions defined and launched by the programmer.

-Using the exceptions treated as objects.

8. Documentation

-How to produce a document.

-Structure of the document.

-Automatic generation of documentation.

Methodological guidelines

To access the UF2 formative unit the UF1 training unit must have been exceeded.

The UF3 training unit can be programmed independently.

Access criteria for pupils

They shall be those established in Article 4 of the royal decree governing the certificate of professionalism of the professional family to which this annex accompanies.

NON-WORK PROFESSIONAL PRACTICE MODULE FOR PROGRAM-TO-WORK WITH LANGUAGE-ORIENTED LANGUAGES AND RELATIONAL DATABASES

Code: MP0501

Duration: 80 hours

Assessment capabilities and criteria

C1: Recognize and describe encodings and nomenclatures of computer elements according to the most widespread standardization criteria.

CE1.1 Describe and apply the regulations concerning the classification and classification of files and their required containers to facilitate the safeguarding and administration of system data.

CE1.2 Describe and employ standardized naming regulations for machines, services, and applications required to facilitate administration tasks.

CE1.3 Recognize and apply the migration and archive policies of files to be used in system storage management based on their need for further processing and efficiency of use resources.

C2: Dominate the fundamental concepts of the Object Oriented paradigm.

CE2.1 Explain the features of the software development cycle under the object orientation paradigm, distinguishing object-oriented programming as a phase within it.

CE2.2 Describe and enumerate the characteristics of a class: attributes, methods, and encapsulation mechanism, identifying the interface of the class and what it represents.

CE2.3 Describe and enumerate the characteristics that define an object, distinguishing the differences between object and class concepts.

CE2.4 Describe the structure and meaning of the messages and their relationship to the behavior of the objects.

CE2.5 Explain the fundamental characteristics that need to be present in a relationship between two classes so that it can be qualified as a inheritance relationship.

CE2.6 Describe the multiple inheritance mechanism and the problems it presents in the software development process.

CE2.7 Explain the concept of polymorphism and list and describe the features that you introduce into the software development process.

C3: Apply the basic concepts of the web programming model.

CE3.1 Describe the logical layers of a web application (Presentation, Application, and Data).

CE3.2 Describe the operation of an application session in the web programming model.

CE3.3 Apply the basic features of object-oriented languages to receiving and preparing the presentation layer (JSP, ASP, Servlets, PHP).

C4: Develop the complete documentation for the developed classes and tests performed.

CE4.1 Describe information that should accompany a developed class.

CE4.2 Describe the fundamental criteria for the inclusion of headers and comments in the code.

CE4.3 Propose indexes (templates) for design documents and explain the contents of each of the sections.

CE4.4 Propose indexes (templates) for test documents (scheduling and results) and explain the contents of each of the sections.

CE4.5 Propose indexes (templates) for operation and maintenance documentation (technical manuals) and explain the contents of each of the sections.

CE4.6 Apply established normalization criteria to include headers and comments in the code.

CE4.7 Perform class documentation using automatic documentation tools.

C5: Make connections to relational databases.

CE5.1 List and describe the classes that provide the appropriate means for querying, updating, accessing, and operating with a relational database.

CE5.2 Describe the procedures for performing such queries (open and close connections, execute commands, collect their results, and use them).

C6: Handle software engineering tools.

CE6.1 Describe the phases, in each model, of the software engineering process.

CE6.2 Describe in detail the fundamental concepts of a software engineering methodology based on object orientation.

C7: Formulate data manipulation and definition queries, based on the design of the BBDD and user requirements

CE7.1 Explain the type of queries (for selection, update, insert, erasure) that can be performed using the DML language.

CE7.2 Explain the type of elements that can be created and manipulated using the DDL language.

CE7.3 Perform data manipulation formulations, based on database design and user requirements:

CE7.4 Perform data definition formulations, based on database design and user requirements

C8: Participate in the company's work processes, following the rules and instructions set out in the job center.

CE8.1 Behave responsibly in both human relationships and the jobs to be performed.

CE8.2 Respect the procedures and rules of the work center.

CE8.3 Diligently undertake the tasks according to the instructions received, trying to bring them into line with the work rate of the company.

CE8.4 Integrate into the production processes of the job center.

CE8.5 Use the established communication channels.

CE8.6 Respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Organization and information management

-File systems:

-Nomenclature and encoding.

-Storage hierarchies.

-Migrations and archiving of data.

2. Analysis and class design

-Identification of classes.

-Modeling of classes with UML: class diagram.

3. Model implementation

-Implementing classes.

-Implementing interfaces.

4. Deploying web architecture

-Design client-server logical architecture.

-Implementation of the server.

-Deploying classes on the server.

-Developing a test client.

5. Data access

-Design client-server logical architecture.

-Implementation of the server.

-Deploying classes on the server.

-Developing a test client.

6. Test Plan

-Design of the test plan.

-Unit tests.

-Integration tests.

-Requirements management.

-Change management.

-Change Log.

-Implementing changes: Release and update documentation.

7. The database manipulation language.

-The data definition language (DDL)

-Language data types.

-Creating, modifying, and deleting tables.

-Creating, modifying, and deleting views.

-Creating, modifying, and clearing indexes.

-Specifying integrity constraints.

-The data manipulation language (DML).

-Build selection queries: Aggregation, Subqueries, Union, Intersection, Difference.

-Build insert queries.

-Build modification queries.

-Construction of cleanup queries.

-Language clauses for grouping and ordering queries.

-Arithmetic, logical, and language comparison capabilities.

-Aggregate language functions.

-Treatment of null values.

-Building nested queries.

-Union, intersection, and query difference.

-Cross-table queries.

-Other language clauses.

8. Integration and communication in the job center

-Responsible behavior in the job center.

-Respect procedures and rules in the work center.

-Interpreting and diligently performing the instructions received.

-Recognition of the organization's production process.

-Using the communication channels set in the job center.

-Adequation to the company's work rate.

-Follow up on regulations for the prevention of occupational health risks and environmental protection.

I. PRESCRIPTIONS OF TRAINERS

Modules

Required Accreditation

*Professional Experience required in the scope of the competency

MF0223_3 Operating systems and computer applications.

Licensed, Engineer, Architect or the corresponding Degree of Degree or other equivalent titles. Diplomat, Technical Engineer, Technical Architect or corresponding Degree Title or other equivalent titles.

1 year

MF0226_3 Database programming relational.

Licensed, Engineer, Architect, or corresponding Degree Title or other equivalent titles. Diplomacy, Technical Engineer, Technical Architect, or corresponding Degree Title or other equivalent titles.

1 year

MF0227_3 Object-Oriented Programming.

Licensed, Engineer, Architect, or corresponding Degree Title or other equivalent.Diplomate, Engineer Technician, Technical Architect, or corresponding Grade Title or other equivalent titles.

1 year

* In the last three years

MINIMUM SPACES, FACILITIES, AND EQUIPMENT REQUIREMENTS

Formative space

Surface m215 pupils

Surface m225 students

45

75

Forative Space

M1

M2

M3

X

X

X

Forative Space

Classroom

-Computer and peripheral equipment. PCs installed in network and Internet connection.-Office software, Internet tools.-Security and anti-virus software.-Operating systems and configuration parameters. -Office tools.-File transfer and courier services. -Backup tools.-Firewall, antivirus and proxy servers.-Change, incident and configuration management tools.-Database manager systems.-Data dictionaries (catalog, system tables, etc.).- programming element documentation.-Structured languages.-Debug tools.-Application distribution tools.-Application development environments.-Databases.-Database management software.- Documentation tools.-Canon projection.-Rotafolios.-Pizarra.-Classroom material. -Tables and chairs for students and table and chair for the trainer-Auxiliary furniture for the equipment of how.* The equipment and the corresponding software must be up to date

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

The facilities and equipment must comply with the relevant industrial and sanitary sanitary regulations and respond to the universal accessibility and safety measures of the participants.

The number of units to be provided with the tools, machines and tools specified in the training spaces will be sufficient for a minimum of 15 students and must be increased, in their case, to attend to the top number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.