Á¦1° |
p3 IT - Governance Overview |
60ºÐ |
Á¦2° |
p6 Business Information System |
65ºÐ |
Á¦3° |
p8 Input / Output Devices |
59ºÐ |
Á¦4° |
p14 Client-Server architecture |
66ºÐ |
Á¦5° |
p18 Program Language |
60ºÐ |
Á¦6° |
p22 ¼ÒÇÁÆ®¿þ¾î °³¹ß ¹æ¹ý·Ð |
61ºÐ |
Á¦7° |
p22 Methodology |
62ºÐ |
Á¦8° |
p31 Software Acquisition Methodology |
58ºÐ |
Á¦9° |
p36 Application System |
67ºÐ |
Á¦10° |
p45 AI |
66ºÐ |
Á¦11° |
p49 Enterprise Resource Planning |
62ºÐ |
Á¦12° |
p55 Data Base |
60ºÐ |
Á¦13° |
p59 Database |
69ºÐ |
Á¦14° |
p62 ¹®Á¦Ç®ÀÌ |
49ºÐ |
Á¦15° |
p69 Data processing |
65ºÐ |
Á¦16° |
p75 Information Analysis |
62ºÐ |
Á¦17° |
p82 Big Data |
62ºÐ |
Á¦18° |
p94 Passwords |
63ºÐ |
Á¦19° |
p100 Network Structure |
61ºÐ |
Á¦20° |
p105 classification of network |
67ºÐ |
Á¦21° |
p113 Security |
55ºÐ |
Á¦22° |
p120 GAPP |
57ºÐ |
Á¦23° |
p124 Electronic Commerce |
63ºÐ |
Á¦24° |
p131 Electronic Funds Transfer |
71ºÐ |
Á¦25° |
p147 Business Continuity |
51ºÐ |
Á¦26° |
p150 Backup |
64ºÐ |
Á¦27° |
p160 IT Control Activity |
67ºÐ |
Á¦28° |
p167 Information Processing |
68ºÐ |
Á¦29° |
p176 COMPUTER APPLICATION CONTROL ACTIVITIES |
46ºÐ |
Á¦30° |
p190 Business Information System |
67ºÐ |
Á¦31° |
p182 ¹®Á¦Ç®ÀÌ |
43ºÐ |
Á¦32° |
p196 Revenue Cycle |
80ºÐ |
Á¦33° |
p211 Governance |
50ºÐ |
Á¦34° |
p214 Regulations |
77ºÐ |
Á¦35° |
p223 Corporate Governance |
58ºÐ |
Á¦36° |
p231 Monitoring Devices |
70ºÐ |
Á¦37° |
p234 New York Stock Exchange |
62ºÐ |
Á¦38° |
p247 Internal Control |
54ºÐ |
Á¦39° |
p249 The Control Environment |
52ºÐ |
Á¦40° |
p256 Information and Communication |
64ºÐ |
Á¦41° |
p261 Internal Control System Monitoring and |
65ºÐ |
Á¦42° |
p269 Limitations of Internal Control |
55ºÐ |
Á¦43° |
p278 ERM |
63ºÐ |
Á¦44° |
p285 ERM 5 Components |
72ºÐ |
Á¦45° |
p299 Implement Risk Responses |
59ºÐ |
Á¦46° |
p308 ±âŸ |
57ºÐ |
Á¦47° |
p322 IT Governance |
55ºÐ |
Á¦48° |
p334 IT Audit |
45ºÐ |
Á¦49° |
p337 CAAT (Á¾°) |
87ºÐ |