Greek e-commerce designer Exam Training Video Tutorial (2016) Introduction

Source: Internet
Author: User
Tags asymmetric encryption

I. Introduction of the Course

e-Commerce designer Exam Training Video tutorial (2016) taught by Wang Yong, senior lecturer of Greek education and Wang Cunzhi. According to the latest test trends of e-commerce designers, the paper classifies and summarizes all the knowledge points in the examination, and digs out the key points and difficulties of the examination, pointing out the proposition direction of the examination and the proportion of each knowledge point in the actual examination.

This video tutorial summarizes and summarizes some of the problems often appearing in exams, and compresses all the key and difficult knowledge of the exam. The key knowledge of the exam includes more than 90% of the exam knowledge points (basic knowledge, case analysis), except professional English, which will appear almost every exam. This video tutorial is based on the author's experience in exam coaching and grading, and the difficult problems are analyzed and explained in detail. For case analysis, the paper introduces the method and skill of question answering, as well as the common problems and countermeasures in the examination.

e-Commerce designer Exam Training Video tutorial (2016) Sub-section to explain, suitable for anytime, fragmented learning. Candidates can learn this video tutorial by:

(1) Through the detailed explanation of experts, quickly grasp the examination required more than 90% of the knowledge points;

(2) Master the method and skill of solving the problem, solve the problem of "not answering the idea" completely.

(3) Play a multiplier effect, greatly improve the passing of the exam

II. Catalogue of courses

1th E-Commerce designer exam Introduction (22 minutes)

1th Section E-Commerce designer exam Introduction

2nd. Fundamentals of computer hardware (68 minutes)

Section 1th Introduction to the Fundamentals of computer hardware

2nd section arithmetic and controller

3rd section Addressing method

4th section Multi-level storage structure

5th section main Memory

6th Section disk storage

7th parity Check

8th section cyclic check code (CRC)

9th Section Hamming Check Code

3rd Chapter Computer Network Foundation (72 minutes)

Section 1th OSI seven-layer model

2nd Section TCPIP Protocol Family

3rd Section IP Address

4th Sub-Network Division

5th section domain name and domain name resolution

6th Section IPv6

7th Section Internet Services

4th. Database Basics (135 minutes)

1th three-level and two-level mapping

Section 2nd ER Model

Section 3rd Relationship Algebra

4th Section Normalization Theory _ function dependence

The value and use of the theory of normalization in the 5th section

The 6th section of the normalization theory _ seeking candidate key words

The 7th Section Normalization theory _ Paradigm

The 8th section standardization theory _ Paradigm Exercises

The 9th section Normalization theory _ mode decomposition

10th Section Database concurrency control

Section 11th Database Integrity constraints

5th Chapter compiling principle and programming language Foundation (13 minutes)

The first section of compiling principle and programming language Foundation preface

The 2nd section of the compilation process

3rd Section Program Control structure

6th. Multimedia Foundation (29 mins)

Section 1th Introduction to Multimedia knowledge

The 2nd section audio related concepts

Section 3rd related concepts of graphics and images

Section 4th Types of media

7th. Cyber Security (106 minutes)

Section 1th Information Security threats and information security requirements

2nd Section E-Commerce security system

The 3rd section symmetric encryption technology

4th. Asymmetric encryption Technology concept

5th Asymmetric Encryption technology The generation of public key and private key

6th Section Digital Envelopes

Section 7th Information Summary

8th Section Digital Signature

9th Section identity Authentication

10th Section Digital Certificate

Section 11th CA Center

Section 12th DOS and DDoS attacks

The 13th section Computer Virus and Trojan horse

14th Section Firewall

8th Chapter Network Marketing (93 minutes)

The 1th section The meaning of network marketing

The 2nd section of Network Marketing theory

The 3rd section Network Marketing main function

The 4th section Price strategy of network Marketing

The 5th Section Network Marketing Method

The 6th Section Network marketing Method--viral sex marketing

The 7th Section Network marketing Method--Network Community Marketing

The 8th section Network Marketing Method--Network Member System marketing

The 9th section Network Marketing Method--blog marketing and Weibo marketing

The 10th section Network Marketing Method--email Marketing

Greek e-commerce designer Exam Training Video Tutorial (2016) Introduction

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.