Á¦1° |
OT |
53ºÐ |
Á¦2° |
p6 Business Information System |
56ºÐ |
Á¦3° |
p10 Cloud Computing |
67ºÐ |
Á¦4° |
p16 Computer Program |
59ºÐ |
Á¦5° |
p91 ¼ÒÇÁÆ®¿þ¾î °³¹ß ¹æ¹ý·Ð |
67ºÐ |
Á¦6° |
p27 Project Management |
57ºÐ |
Á¦7° |
p30 Application System |
67ºÐ |
Á¦8° |
p34 Simulation |
52ºÐ |
Á¦9° |
p39 AI |
52ºÐ |
Á¦10° |
p45 Database |
55ºÐ |
Á¦11° |
p273 2-004¹ø |
57ºÐ |
Á¦12° |
p53 SQL |
64ºÐ |
Á¦13° |
p57 Data Processing Configurations |
54ºÐ |
Á¦14° |
p60 Business Intelligence |
67ºÐ |
Á¦15° |
p69 End user computing |
54ºÐ |
Á¦16° |
p74 Network Structure |
55ºÐ |
Á¦17° |
p77 Ethernet |
67ºÐ |
Á¦18° |
p82 Security |
53ºÐ |
Á¦19° |
p86 IT Security Principles |
55ºÐ |
Á¦20° |
p91 Authentication |
88ºÐ |
Á¦21° |
p103 EDI |
38ºÐ |
Á¦22° |
p110 Business Operation |
59ºÐ |
Á¦23° |
p113 Backup |
60ºÐ |
Á¦24° |
p118 IT Control Activity |
64ºÐ |
Á¦25° |
p124 Information Processing |
55ºÐ |
Á¦26° |
p130 Computer Application Control Activities |
57ºÐ |
Á¦27° |
p135 Business Information System |
58ºÐ |
Á¦28° |
p139 AIS |
63ºÐ |
Á¦29° |
p144 Production |
42ºÐ |
Á¦30° |
p150 Governance |
58ºÐ |
Á¦31° |
p153 Regulations |
64ºÐ |
Á¦32° |
p159 Forms of Executive Compensation |
61ºÐ |
Á¦33° |
p167 Monitoring Devices |
70ºÐ |
Á¦34° |
p172 External Auditors |
54ºÐ |
Á¦35° |
p176 Internal Control |
51ºÐ |
Á¦36° |
p182 Control Activitity |
52ºÐ |
Á¦37° |
p186 Monitoring |
69ºÐ |
Á¦38° |
p190 COSO Model |
64ºÐ |
Á¦39° |
p196 ERM |
53ºÐ |
Á¦40° |
p200 Mission, Vision, Values, and Strategy in ERM |
60ºÐ |
Á¦41° |
p207 ERM Strategy and Objective Setting |
57ºÐ |
Á¦42° |
p217 Implement Risk Responses |
47ºÐ |
Á¦43° |
p228 The boards role in ERM |
66ºÐ |
Á¦44° |
p226 The Role of internal Auditng |
46ºÐ |
Á¦45° |
p235 IT Governance |
57ºÐ |
Á¦46° |
p240 Enterprise Requirements |
26ºÐ |
Á¦47° |
p247 IT Audit (p191->p136) |
45ºÐ |
Á¦48° |
p250 CAAT (Á¾°) |
87ºÐ |