Turbo NAS hardware manual
|
|
- 재모 심
- 6 years ago
- Views:
Transcription
1 QNAP Turbo NAS TVS-871T 하드웨어사용설명서 QNAP Systems, Inc. All Rights Reserved.
2 QNAP 제품을선택해주셔서감사합니다. 이사용설명서는 Turbo NAS 의하드웨어설명및특정기능에대한관련가이드라인에대한설명을제공합니다. 본설명서를주의해서읽고반드시지침을따르십시오. 본사용설명서는다음 Turbo NAS 모델에적용됩니다. TVS-871T-i5-16G, TVS-871T-i7-16G 참고 Turbo NAS 는이하 NAS 로통칭합니다. 구입한제품은특정모델에서만작동되는특정기능을지원하지않을수있습니다. 모든특징, 기능및기타제품사양은사전통지또는의무사항없이변경될수있습니다. 제공된정보는통지없이변경될수있습니다. 본사용설명서의어떠한부분도 QNAP Systems, Inc. 의사전서면허가없이어떠한형태또는어떠한방법으로든기계적, 전기적, 복사, 녹화, 재생산, 검색시스템에저장되거나전송될수없습니다. QNAP 및 QNAP 로고는 QNAP Systems, Inc. 의등록상표입니다. 본사용설명서에기재된기타제품및회사이름은관련회사의상표입니다. 2
3 고지사항어떤경우에도 QNAP Systems, Inc. (QNAP) 는제품및첨부된소프트웨어또는관련문서사용으로야기되는직접, 간접, 특수, 부수적또는결과적손해에대해해당제품에지불된금액을초과하는금액은책임을지지않습니다. QNAP 는제품또는본문서및첨부된모든소프트웨어의내용및사용에관하여, 특히품질, 성능, 상품성또는특정목적의적합성에대하여명시적, 함축적또는법적으로보증또는대표하지않습니다. QNAP 는제품, 소프트웨어, 문서의콘텐츠에대하여개인또는기업에통지의무없이업데이트하거나수정할권리를보유합니다. 참고 : 1. 시스템을정기적으로백업하여잠재적데이터손실을방지하십시오. QNAP 는모든종류의데이터손실또는복구에대해어떠한책임도부인합니다. 2. NAS 패키지구성요소에대해환불또는유지보수가필요한경우조심스럽게포장하여보내주십시오. 부적합한포장으로인한제품파손은보상되지않습니다. 3
4 규정통지 FCC 공지 QNAP NAS 는다양한 FCC 적합성클래스를준수합니다. 세부정보는 Chapter 9 을 ( 를 ) 참조하십시오. 장치클래스가결정되면다음해당선언문을참조하십시오. ======================================================= FCC 클래스 A 공지 이장치는 FCC 규정의파트 15 를준수합니다. 본장치는작동시다음두조건을만족시켜야 합니다. 1. 이장치는유해한간섭을일으켜서는안됩니다. 2. 이장치는원치않는작동을일으킬수있는간섭을포함하여수신된간섭을수용해야 합니다. 참고 : 이장비는 FCC 규정의파트 15 에따라클래스 A 디지털장치에대한제한사항을준수하는지테스트를받았고해당사항을준수하는것으로평결을받았습니다. 이러한제한사항은장비를상용환경에서작동할경우유해한간섭으로부터적절히보호하기위해제정된것입니다. 이장비는라디오주파수에너지를발생시키고, 사용하고, 방출할수있으며지침설명서에따라설치되지않았거나사용되지않을경우무선통신에유해한간섭을야기할수있습니다. 가정에서이장치를작동하면유해한간섭을일으킬수있으며, 이경우사용자가자신의비용으로간섭을수정해야합니다. 개조 : 이장치에 QNAP Systems, Inc. 가승인하지않은개조가이루어질경우사용자에게이 장비를작동하도록 FCC 에의해부여된권한이무효화될수있습니다. 4
5 FCC 클래스 B 공지 이장치는 FCC 규정의파트 15 를준수합니다. 본장치는작동시다음두조건을만족시켜야 합니다. 1. 이장치는유해한간섭을일으켜서는안됩니다. 2. 이장치는원치않는작동을일으킬수있는간섭을포함하여수신된간섭을수용해야 합니다. 참고 : 이장비는 FCC 규정의파트 15 에따라클래스 B 디지털장치에대한제한을준수하는지테스트를받았고해당사항을준수하는것으로평결을받았습니다. 이러한제한사항은거주환경에서설치할경우유해한간섭으로부터적절히보호하기위해제정된것입니다. 이장비는라디오주파수에너지를발생시키고, 사용하고, 방출할수있으며지침설명서에따라설치되지않았거나사용되지않을경우무선통신에유해한간섭을야기할수있습니다. 그러나, 특정설치시간섭이발생하지않을것이라는보장은없습니다. 이장비가라디오또는텔레비전수신에유해한간섭을일으킬경우, 간섭발생여부는장비를끄고켜기를해봄으로써판별할수있으며, 다음과같은방법중한두가지를사용하여간섭을수정해볼수있습니다. 수신안테나의방향을바꾸거나위치를변경합니다. 장비와수신기사이의간격을더넓혀줍니다. 수신기가연결되어있는콘센트가아닌다른전원콘센트에장비를연결합니다. 판매업체또는숙련된라디오 / 텔레비전기술자에게상의하여도움을받습니다. 개조 : 이장치에 QNAP Systems, Inc. 가승인하지않은개조가이루어질경우사용자에게이 장비를작동하도록 FCC 에의해부여된권한이무효화될수있습니다. CE 공지 QNAP NAS 는다양한 CE 적합성클래스를준수합니다. 세부정보는 Chapter 9 을 ( 를 ) 참조하십시오. 5
6 문서에사용된기호 경고 주의 이아이콘은반드시따라야하는지침을나타냅니다. 준수하지않을경우신체에해를끼치거나사망에이를수있습니다. 이아이콘은해당행위시디스크삭제또는손실을초래할수있으며, 또는지침을준수하지않으면데이터파손, 디스크파손또는제품파손의결과를가져올수있음을나타냅니다. 6
7 목차 안전경고 8 Chapter 1. CPU 및메모리사양... 9 Chapter 2. 전원버튼및리셋버튼동작 Chapter 3. USB 원터치복사 Chapter 4. LED 및알람버저사양 Chapter 5. 삐소리알람 : 모든 NAS 모델 Chapter 6. 하드드라이브핫스왑 Chapter 7. RAID 복구 Chapter 8. 기술지원 Chapter 9. 제품적합성클래스 GNU GENERAL PUBLIC LICENSE
8 안전경고 1. NAS 는 0ºC 40ºC (32ºF -104ºF) 의실내온도및상대습도 5% 95% 에서정상작동될수있습니다. 주변환경이통풍이잘되는지확인하십시오. 2. NAS 에연결된전원코드및장치는올바른공급전압 (100W, 90~264V) 을제공해야합니다. 3. NAS 를직사광선이닿는곳또는화학제품근처에놓지마십시오. 주변온도및습도가최적의수준인지확인하십시오. 4. 청소하기전에전원코드및모든연결된케이블을제거하십시오. 마른수건으로 NAS 를닦으십시오. NAS 를청소할때화학제품또는에어로졸을사용하지마십시오. 5. 서버의정상작동및과열방지를위해 NAS 위에어떠한물체도올려놓지마십시오. 6. 하드디스크를설치할때정상작동을위해제품패키지에동봉된납작머리나사를사용하여 NAS 에있는하드디스크를고정시키십시오. 7. NAS 를액체근처에놓지마십시오. 8. 낙하및파손을방지하려면 NAS 를표면이고르지못한곳에올려놓지마십시오. 9. NAS 를설치한장소의전압이올바른지확인하십시오. 세부정보는대리점또는현지전력공급회사에문의하십시오. 10. 전원코드위에어떠한물체도올려놓지마십시오. 11. 어떠한경우에도 NAS 를수리하려고시도하지마십시오. 제품의부적절한분해는사용자를감전또는그밖의위험에노출시킬수있습니다. 질문사항이있으면대리점에연락하십시오. 12. NAS 는서버룸에만설치해야하며자격있는서버관리자또는 IT 관리자만유지보수할수있습니다. 서버룸은열쇠또는키카드로만액세스하고자격있는직원만서버룸에출입해야합니다. 경고 : 배터리를잘못교체하면폭발할위험이있습니다. 제조업체에서권장하는것과동일한것또는동급배터리만사용하십시오. 사용한배터리는제조업체의지침에따라폐기하십시오. 심각한부상을입을수있으므로시스템내부의팬을만지지마십시오. 8
9 Chapter 1. CPU 및메모리사양 주의 : QNAP 제품의하드웨어, 소프트웨어또는펌웨어변경시보증이무효가됩니다. QNAP 는 QNAP 제품의변경으로인한어떠한형태의데이터파손또는손실에대해서도책임지지않습니다. 사용자는 QNAP 제품의하드웨어부품변경, 기본시스템펌웨어수정또는인증받지않은타사제품설치등으로인한시스템불안정또는모든종류의데이터손실의위험을스스로감수해야합니다. 시스템 TVS-871T-i5 TVS-871T-i7 CPU Intel 4 세대 Core i3 듀얼코어 프로세서 Intel 4 세대 Core i3 듀얼코어 프로세서 메모리 16GB DDR3 RAM 16GB DDR3 RAM 플래시 512MB(USB DOM) 512MB(USB DOM) CPU 대체가능성 없음 없음 메모리대체가능성 없음 없음 SO-DIMM 슬롯수 2 2 하드드라이브슬롯 수 PCIe 슬롯수 (thunderbolt HBA 어댑터와 10GbE 2 (thunderbolt HBA 어댑터와 10GbE 어댑터에서사용됨 ) 어댑터에서사용됨 ) Thunderbolt 포트수 2 2 기가비트네트워크포트수 10 기가비트네트워크포트수
10 Chapter 2. 전원버튼및리셋버튼동작 전원버튼 : 눌러서켜거나끕니다. 시스템 전원버튼 ( 켜기 ) 전원버튼 ( 하드웨어끄기 ) 전원버튼 ( 강제종료 ) 모든모델 한번누름 1.5 초 5 초 리셋버튼 : 누르면시스템설정이리셋됩니다. 기본시스템리셋고급시스템리셋시스템 ( 삐소리 1 번 ) ( 삐소리 2 번 ) 모든모델 3 초 10 초 기본시스템리셋 (3 초 ) 3 초동안리셋버튼을누르면삐소리가납니다. 다음설정이기본설정으로리셋됩니다. 시스템관리비밀번호 : admin TCP/IP 구성 : DHCP 를통해자동으로 IP 주소확보 TCP/IP 구성 : 점보프레임비활성화 TCP/IP 구성 : 포트트렁킹이활성화된경우 ( 듀얼 LAN 모델에서만 ), 포트트렁킹모드가 백업활성화 ( 장애조치 ) 로리셋됩니다. 시스템포트 : 8080( 시스템서비스포트 ) 보안수준 : 낮음 ( 모든연결허용 ) LCD 패널비밀번호 : ( 공란 )* VLAN 이비활성화됩니다. 서비스바인딩 : 모든 NAS 서비스는사용가능한모든네트워크인터페이스에서실행됩니다. 이기능은 LCD 패널이있는 NAS 모델에만제공됩니다. 세부정보는 을 참조하십시오. 10
11 고급시스템리셋 (10 초 ) 10 초동안리셋버튼을누르고있으면 3 초와 10 초경과시에두번의삐소리가납니다. NAS 는모든시스템설정을초기화로리셋합니다. 이것은 Control Panel( 제어판 ) > System Settings( 시스템설정 ) > Backup / Restore( 백업 / 복원 ) > Restore to Factory Default( 공장설정값으로복원 ) 에서웹기반시스템리셋에의해수행되며, 다만데이터는모두보존됩니다. 이전에생성된사용자, 사용자그룹및네트워크공유폴더와같은설정이지워집니다. 고급시스템리셋이후이전의데이터를검색하려면 NAS 에서동일한네트워크공유폴더를생성하면해당데이터에다시액세스할수있습니다. 11
12 Chapter 3. USB 원터치복사 이기능은 USB 원터치복사버튼이있는 NAS 모델에만제공됩니다. 세부정보는 을참조하십시오. 시스템 모든 NAS 모델 초수 ( 데이터복사를시작하도록원터치복사 버튼을누름 ) 0.5 초 전면 USB 포트로데이터복사 NAS 는전면에있는원터치복사버튼을실행함으로써 USB 장치에서 NAS 로, 또는그반대방향으로즉각적인데이터백업을지원합니다. 이기능을사용하려면다음단계를따르십시오. 1. 하드드라이브가 NAS 에적어도한개설치되고포맷되어있는지확인합니다. 기본네트워크공유 Qusb 또는 Usb 가생성됩니다. 2. NAS 를켭니다. 3. Backup Station > External Backup( 외부백업 ) > USB one touch copy(usb 원터치복사 ) 에서복사버튼의동작을구성합니다. 4. USB 저장장치를 NAS 의전면 USB 포트에연결합니다. 5. 복사버튼을누릅니다. USB LED 가깜박거리고데이터가 NAS 설정에따라 USB 장치로복사되거나장치에서 NAS 로복사됩니다. 참고 : 이기능은증분백업을채택합니다. 처음으로데이터를백업한후에 NAS 는마지막으로 백업한이후에변경된파일만복사하게됩니다. 12
13 Chapter 4. LED 및알람버저사양 NAS 의 LED 표시기가시스템상태및정보를나타냅니다. NAS 가켜지면, 다음항목을체크하여시스템상태가정상인지확인하십시오. 다음 LED 정보는사용자가하드드라이브를제대로설치하고 NAS 를네트워크및전원공급장치에제대로연결한경우에만해당되는것임을유의하십시오. LED 색상 LED 상태설명 녹색과빨간색이 0.5 초씩교대로깜박임 1. NAS 에있는하드드라이브가포맷되는 중입니다. 2. NAS 가초기화되는중입니다. 3. 시스템펌웨어가업데이트되는중입니다. 4. RAID 재구축이진행중입니다. 5. 온라인 RAID 용량확장이진행중입니다. 6. 온라인 RAID 레벨마이그레이션이진행 중입니다. 시스템상태 빨간색 / 녹색 빨간색 1. 하드드라이브가유효하지않습니다. 2. 디스크볼륨용량이최고에달했습니다. 3. 디스크볼륨이거의최고에달하고있습니다. 4. 시스템팬이작동하지않습니다. 5. 디스크데이터액세스 ( 읽기 / 쓰기 ) 중오류가발생합니다. 6. 하드드라이브에서불량섹터가감지되었습니다. 7. NAS 가저급읽기전용모드에있습니다 (2 개의멤버드라이브가 RAID 5 또는 RAID 6 구성에서오작동하며, 디스크데이터는계속읽을수있음 ). 8. 하드웨어자가테스트오류입니다. 0.5 초마다빨간색으로깜박임 NAS 가저급모드에있습니다 (1 개의멤버드라이브가 RAID 1, RAID 5 또는 RAID 6 구성에서오작동함 ). 0.5 초마다녹색으로깜박임 1. NAS 가가동중입니다. 2. NAS 가구성되지않았습니다. 3. 하드디스크드라이브가포맷되지 않았습니다. 녹색 NAS 가사용할준비가되었습니다. 꺼짐 NAS 에있는모든하드드라이브가대기모드에있습니다. 13
14 LAN 주황색 주황색 디스크데이터가네트워크에서액세스중이며처리중에읽기 / 쓰기오류가발생합니다. 주황색깜박임 NAS 가네트워크에연결되었습니다. USB** 파란색 파란색깜박임 0.5 초마다 파란색 꺼짐 1. USB 장치 ( 전면 USB 포트에연결 ) 가감지되는중입니다. 2. USB 장치 ( 전면 USB 포트에연결 ) 가 NAS 에서제거되는중입니다. 3. USB 장치 (NAS 의전면 USB 포트에연결 ) 에액세스하는중입니다. 4. 데이터가외부 USB 또는 esata 장치로또는이장치에서복사되는중입니다. 전면 USB 장치가감지되었습니다 ( 장치가장착된후 ). 1. 감지된 USB 장치가없습니다. 2. NAS 가데이터를전면 USB 포트에연결된 USB 장치로복사하거나장치에서복사작업을완료했습니다. HDD 빨간색 / 녹색 빨간색깜박임 네트워크에서 NAS 에액세스하는중입니다. 빨간색 하드드라이브읽기 / 쓰기오류가발생합니다. 녹색깜박임 디스크데이터에액세스하는중입니다. 녹색 하드드라이브에액세스할수있습니다. 14
15 Chapter 5. 삐소리알람 : 모든 NAS 모델 삐소리알람은 Control Panel( 제어판 ) > System Settings( 시스템설정 ) > Hardware( 하드웨어 ) 에서비활성화할수있습니다. 삐소리횟수설명 짧은삐소리 (0.5 초 ) 1 짧은삐소리 (0.5 초 ) 3 1. NAS 가가동중입니다. 2. NAS 가종료되는중입니다 ( 소프트웨어 종료 ). 3. 사용자가리셋버튼을눌러서 NAS 를 초기화합니다. 4. 시스템펌웨어가업데이트되었습니다. NAS 데이터를전면 USB 포트에서외부저장장치로복사할수없습니다. 긴삐소리 (1.5 초 ) 3 회, 5 분마다시스템팬이작동하지않습니다. 긴삐소리 (1.5 초 ) 디스크볼륨이거의최고에달하고있습니다. 2. 디스크볼륨용량이최고에달했습니다. 3. NAS 에있는하드드라이브가저급모드에있습니다. 4. 사용자가하드드라이브재구축과정을시작합니다. 5. 하드드라이브가꽂혀있거나빠져있습니다. 1. NAS 가강제종료에의해꺼집니다 ( 하드웨어종료 ). 2. NAS 가켜졌고사용할준비가되었습니다. 15
16 Chapter 6. 하드드라이브핫스왑 QNAP NAS 는주요유명브랜드에서제조한 2.5 인치 /3.5 인치 SATA 하드드라이브와 호환됩니다. 업데이트된하드드라이브호환목록을보려면 을 방문하십시오. 주의 : QNAP 는어떠한경우에서든어떠한이유로든하드디스크의오용또는부적합한설치로인한제품손상 / 오작동또는데이터손실 / 복원에대해책임지지않습니다. 이전에 NAS 에설치된적이없는하드드라이브 ( 신형또는구형 ) 가설치되는경우, 해당하드드라이브는자동으로포맷되고파티션이구성되며모든디스크데이터가삭제된다는것을유의하십시오. 시스템 TVS-871T-i5-16G, TVS-871T-i7-16G 3.5 인치 SATA 하드드라이브지원 2.5 인치 SATA 하드드라이브지원 SSD 지원 하드드라이브핫스와핑지원 (RAID 1 또는그이후버전만해당 ) 예 예 예 예 16
17 NAS 는 RAID 1 에서멤버드라이브 1 개또는 RAID 5 나 RAID 6 에서멤버드라이브 1 ~ 2 개가충돌할때하드드라이브를핫스왑하는기능을지원합니다. RAID 구성에고장난멤버드라이브가있을경우아래순서에따라하드드라이브를핫스왑하십시오. 1. NAS 에로그인하고 Storage Manager( 저장소관리자 ) > Storage Pools( 저장소풀 ) 에서저장소풀상태를확인합니다. 2. 저장소풀상태는 Warning( 경고 ) 이어야하며 RAID 그룹상태는 "Degraded_ 저하됨 )" 이어야합니다. 3. 파손된하드드라이브와교체할새하드드라이브를준비합니다. 새하드드라이브용량은파손된하드드라이브와동일하거나더커야합니다. 4. NAS 에서파손된드라이브를분리합니다. 약 20 초간또는서버에서삐소리가두번울릴때까지기다립니다. 5. 드라이브트레이에서파손된드라이브를제거합니다. 6. 드라이브트레이에새하드드라이브를설치합니다. 드라이브를 NAS 에삽입합니다. 7. 서버가 1.5 초간두번삐소리를내야합니다. 8. 웹관리자페이지에서볼륨상태를확인합니다. 볼륨이재구축되어야합니다. 경고 : 감전위험을줄이려면하드드라이브를교체하기전에반드시서버를끌것을 강력히권장합니다. 17
18 Chapter 7. RAID 복구 QNAP NAS 는시스템에서하드드라이브의의도치않은연결해제또는제거로인해오작동하는 RAID 그룹의복구를지원합니다. 사용자는비활성화된 RAID 1, RAID 5, RAID 6 그룹을저급 모드로또는비활성화된 RAID 0 및 JBOD 구성을정상으로복구할수있습니다. 디스크볼륨 RAID 복구지원 최대디스크제거허용개수 단일 없음 - JBOD 있음 1 개이상 RAID 0 있음 1 개이상 RAID 1 있음 1 개또는 2 개 RAID 5 있음 2 개이상 RAID 6 있음 3 개이상 RAID 10 없음 - NAS 에서비활성화된 RAID 그룹을복구하려면아래단계를따르십시오. 1. RAID 그룹의볼륨상태가 " 활성화되지않음 " 이되도록합니다. 2. 앞서 NAS 에서빼낸것과동일한하드드라이브를동일한하드드라이브슬롯에다시설치합니다. 3. Storage Manager( 저장소관리자 ) > Storage Pools( 저장소풀 ) 로이동합니다. 저하된또는비활성화된 RAID 그룹을선택합니다. Manage( 관리 ) > Recover( 복구 ) 를클릭합니다. 4. 이과정이완료될때까지약 1 분간기다립니다. 완료되면 NAS 데이터에액세스할수있습니다. 참고 : 사용자는 RAID 1, RAID 5, RAID 6 RAID 그룹을 " 비활성화된 " 모드에서저급모드로 RAID 복구에의해복구한후정상적으로볼륨읽기또는쓰기를할수있습니다. 볼륨상태는동기화후정상으로복구됩니다. 연결해제된드라이브멤버가손상되면 RAID 복구기능이작동하지않습니다. 18
19 표준 RAID QNAP RAID 5 표준 RAID QNAP RAID 저급모드 N-1 N-1 N-1 및 N-2 N-1 및 N-2 읽기전용보호 ( 즉시데이터백업및하드드라이브교체 ) 해당없음 N-1, 배열해있는잔존드라이브에서불량블록이발견됨. 해당없음 N-2, 배열해있는잔존드라이브에서불량블록이발견됨. RAID 복구 (RAID 상태 : 활성화되지않음 ) 해당없음 NAS 에모든초기하드디스크드라이브를재삽입하고, 드라이브가회전, 식별, 액세스될수있고, 하드드라이브수퍼블록이손상되지않은경우. 해당없음 NAS 에모든초기하드디스크드라이브를재삽입하고, 드라이브가회전, 식별, 액세스될수있고, 하드드라이브수퍼블록이손상되지않은경우. RAID 충돌 N-2 N-2 파손된하드드라이브및모든잔여하드드라이브가회전또는식별또는액세스될수없음. N-3 N-3 및모든잔여하드드라이브가회전또는식별또는액세스될수없음. 19
20 N = 배열내의하드디스크드라이브수 Chapter 8. 기술지원 QNAP 는인스턴트메신저를통해전용온라인지원및고객서비스를제공합니다. 온라인지원 : Skype: qnapskype 포럼 : 미국과캐나다지역기술지원 : 이메일 : q_supportus@qnap.com 전화 : 주소 : 168 University Parkway, Pomona CA 근무시간 : 08:00~17:00(GMT- 08:00 태평양표준시, 월 ~ 금 ) 20
21 Chapter 9. 제품적합성클래스 NAS 모델 FCC CE TVS-871T-i5-16G, TVS-871T-i7-16G 클래스 B 클래스 B 21
22 GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright 2007 Free Software Foundation, Inc. < Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things. To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. 22
23 Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it. For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions. Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users. Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS 0. Definitions. This License refers to version 3 of the GNU General Public License. Copyright also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. The Program refers to any copyrightable work licensed under this License. Each licensee is addressed as you. Licensees and recipients may be individuals or organizations. To modify a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called 23
24 a modified version of the earlier work or a work based on the earlier work. A covered work means either the unmodified Program or a work based on the Program. To propagate a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well. To convey a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying. An interactive user interface displays Appropriate Legal Notices to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion. 1. Source Code. The source code for a work means the preferred form of the work for making modifications to it. Object code means any non-source form of a work. A Standard Interface means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language. The System Libraries of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A Major Component, in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it. 24
25 The Corresponding Source for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law. You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you. Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary. 3. Protecting Users' Legal Rights From Anti-Circumvention Law. No covered work shall be deemed part of an effective technological measure under any 25
26 applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures. When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program. You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee. 5. Conveying Modified Source Versions. You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: a) The work must carry prominent notices stating that you modified it, and giving a relevant date. b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to keep intact all notices. c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it. d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal 26
27 Notices, your work need not make them do so. A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an aggregate if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate. 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange. b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements. e) Convey the object code using peer-to-peer transmission, provided you inform other 27
28 peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d. A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. A User Product is either (1) a consumer product, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, normally used refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product. Installation Information for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made. If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM). The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for 28
29 communication across the network. Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying. 7. Additional Terms. Additional permissions are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions. When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or d) Limiting the use for publicity purposes of names of licensors or authors of the material; or e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to 29
30 the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors. All other non-permissive additional terms are considered further restrictions within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying. If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms. Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way. 8. Termination. You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section
31 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so. 10. Automatic Licensing of Downstream Recipients. Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License. An entity transaction is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts. You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. A contributor is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's contributor version. A contributor's essential patent claims are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, 31
32 but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, control includes the right to grant patent sublicenses in a manner consistent with the requirements of this License. Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a patent license is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To grant such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party. If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. Knowingly relying means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid. If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it. A patent license is discriminatory if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties 32
33 who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law. 12. No Surrender of Others' Freedom. If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program. 13. Use with the GNU Affero General Public License. Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License or any later version applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any 33
34 version ever published by the Free Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. Limitation of Liability. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee. END OF TERMS AND CONDITIONS 34
- 2 -
- 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - - 25 - - 26 - - 27 - - 28 - - 29 - - 30 -
More information00829A_SHR-6164-KOR.indb
SHR-6080/6082/6160/6162/6163/6164 8 Channel/16 Channel DVR 2_ _3 4_ 15cm 5cm _5 15cm 5cm 6_ J _7 8_ _9 6080 1 2 3 4 10 8 7 6 5 6160/6163 1 2 3 4 10 8 7 6 5 6082 1 2 3 4 10 9 8 7 6 5 6162/6164 1 2 3 4 10
More informationPT A-SND-3080C-KOREAN-.indb
SND-3080C www.samsungcctv.co.kr FOR KOREA UNIT STANDARD ONLY Copyright 2011 Samsung Techwin Co., Ltd. All rights reserved. Trademark Restriction Disclaimer Warranty _3 4_ _5 6_ 3 14 22 32 43 51 71 _7 8_
More informationYPR0-KOREAN0.0.indb
1 2 3 6 7 8 10 11 12 13 19 20 20 22 23 23 25 26 14 15 15 16 17 17 18 28 29 29 30 30 31 32 32 33 33 34 35 36 37 37 38 39 40 41 41 41 42 42 44 45 45 45 46 48 50 52 7 n 8 초기화 ( 리셋 ) 홀 n n o a b 9 10 11 no
More informationProduct A4
2 APTIV Film Versatility and Performance APTIV Film Versatility and Performance 3 4 APTIV Film Versatility and Performance APTIV Film Versatility and Performance 5 PI Increasing Performance PES PPSU PSU
More information슬라이드 1
변호사박종백 한국오픈소스법센터대표 법무법인 ( 유한 ) 태평양파트너 2 오픈소스소프트웨어의이해 오픈소스소프트웨어는무엇인가? 자유 누구의자유, 사용, 수정, 재배포의자유와한계 공짜배포 유료판매, 관련서비스의유료화허용여부 코드의공개 무엇을어느범위까지? 공유와기여 공유자와기여자는누구? 저작권 보호가능여부, 보호범위 라이선스계약 계약체결여부, 보호범위 적용법률과관할법원
More information16<CC44><B110> <C0AC><C6A9><C124><BA85><C11C>.pdf
CH 3 10 21 33 77 3 4 5 5 6 7 8 10 HDD 12 13 25 33 34 36 44 45 46 48 52 58 61 71 77 78 81 84 87 90 121 126 81 84 87 88 90 92 96 98 121 Backup Player 123 Backup Player 126 128 HDD 129 131 (FAQ) 133 Open
More informationPage 2 of 6 Here are the rules for conjugating Whether (or not) and If when using a Descriptive Verb. The only difference here from Action Verbs is wh
Page 1 of 6 Learn Korean Ep. 13: Whether (or not) and If Let s go over how to say Whether and If. An example in English would be I don t know whether he ll be there, or I don t know if he ll be there.
More information<30353132BFCFB7E15FC7D1B1B9C1A4BAB8B9FDC7D0C8B85F31352D31BCF6C1A4C8AEC0CE2E687770>
지상파 방송의 원격송신과 공중송신권 침해여부에 관한 사례연구 Case Study on Copyright Infringement of Remote Transmission of Television Program 최정열(Choe, Jeong-Yeol) * 목 차 Ⅰ. 서론 Ⅱ. 사실 관계 및 재판의 경과 1. 원격시청기기 및 그 사용방법 등 2. 피고의 서비스 3.
More informationCopyrights and Trademarks Autodesk SketchBook Mobile (2.0.2) 2013 Autodesk, Inc. All Rights Reserved. Except as otherwise permitted by Autodesk, Inc.,
Autodesk SketchBook Mobile Copyrights and Trademarks Autodesk SketchBook Mobile (2.0.2) 2013 Autodesk, Inc. All Rights Reserved. Except as otherwise permitted by Autodesk, Inc., this publication, or parts
More information11¹Ú´ö±Ô
A Review on Promotion of Storytelling Local Cultures - 265 - 2-266 - 3-267 - 4-268 - 5-269 - 6 7-270 - 7-271 - 8-272 - 9-273 - 10-274 - 11-275 - 12-276 - 13-277 - 14-278 - 15-279 - 16 7-280 - 17-281 -
More information<C1A4BAB8B9FDC7D031362D335F3133303130322E687770>
권리범위확인심판에서는 법원이 진보성 판단을 할 수 없는가? Can a Court Test the Inventive Step in a Trial to Confirm the Scope of a Patent? 구대환(Koo, Dae-Hwan) * 41) 목 차 Ⅰ. 서론 Ⅱ. 전원합의체판결의 진보성 판단 관련 판시사항 1. 이 사건 특허발명 2. 피고 제품 3.
More information<BCADBFEFC1F6B9E6BAAFC8A3BBE7C8B85FBAAFC8A3BBE7203437C1FD2831B1C7292E687770>
기업의 영업비밀 보호정책의 한계 The Limitation of Internal Corporate Polices 辯 護 士 Bae Su Young 논문요약 영업비밀 이란 공공연히 알려져 있지 아니하고 독립된 경제적 가치를 가지는 것으로서, 상당한 노력에 의하여 비밀로 유지된 생산방법, 판매방법, 그 밖에 영업활동에 유용한 기술상 또는 경영상의 정보를 말한다.
More information중국 상장회사의 경영지배구조에 관한 연구
仁 荷 大 學 校 法 學 硏 究 第 18 輯 第 3 號 2015년 09월 30일, 261~295쪽 Inha Law Review The Institute of Legal Studies Inha University Vol.18, No.3, September, 2015 표현의 자유와 명예훼손 - 인터넷에서의 명예훼손을 중심으로 - * 박 윤 경 숙명여자대학교 법학박사
More informationPI ZH-CN
www.philips.com/welcome PI5000316 1 5 5 5 2 8 8 8 8 3 9 9 4 10 10 10 USB 10 11 11 11 12 12 Safe Sound 12 13 14 14 / 14 15 15 5 16 Wi-Fi 16 16 17 17 18 Micro SD 18 6 19 19 19 19 QQ 19 19 19 20 20 20 7
More information0125_ 워크샵 발표자료_완성.key
WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. WordPress is installed on a web server, which either is part of an Internet hosting service or is a network host
More information204 205
-Road Traffic Crime and Emergency Evacuation - 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 Abstract Road Traffic Crime
More informationPage 2 of 5 아니다 means to not be, and is therefore the opposite of 이다. While English simply turns words like to be or to exist negative by adding not,
Page 1 of 5 Learn Korean Ep. 4: To be and To exist Of course to be and to exist are different verbs, but they re often confused by beginning students when learning Korean. In English we sometimes use the
More informationstep 1-1
Written by Dr. In Ku Kim-Marshall STEP BY STEP Korean 1 through 15 Action Verbs Table of Contents Unit 1 The Korean Alphabet, hangeul Unit 2 Korean Sentences with 15 Action Verbs Introduction Review Exercises
More information#Ȳ¿ë¼®
http://www.kbc.go.kr/ A B yk u δ = 2u k 1 = yk u = 0. 659 2nu k = 1 k k 1 n yk k Abstract Web Repertoire and Concentration Rate : Analysing Web Traffic Data Yong - Suk Hwang (Research
More information2 KHU 글로벌 기업법무 리뷰 제2권 제1호 또 내용적으로 중대한 위기를 맞이하게 되었고, 개인은 흡사 어항 속의 금붕어 와 같은 신세로 전락할 운명에 처해있다. 현대정보화 사회에서 개인의 사적 영역이 얼마나 침해되고 있는지 는 양 비디오 사건 과 같은 연예인들의 사
연구 논문 헌법 제17조 사생활의 비밀과 자유에 대한 소고 연 제 혁* I. II. III. IV. 머리말 사생활의 비밀과 자유의 의의 및 법적 성격 사생활의 비밀과 자유의 내용 맺음말 I. 머리말 사람은 누구나 타인에게 알리고 싶지 않은 나만의 영역(Eigenraum) 을 혼자 소중히 간직하 기를 바랄 뿐만 아니라, 자기 스스로의 뜻에 따라 삶을 영위해 나가면서
More information06_ÀÌÀçÈÆ¿Ü0926
182 183 184 / 1) IT 2) 3) IT Video Cassette Recorder VCR Personal Video Recorder PVR VCR 4) 185 5) 6) 7) Cloud Computing 8) 186 VCR P P Torrent 9) avi wmv 10) VCR 187 VCR 11) 12) VCR 13) 14) 188 VTR %
More informationTurbo NAS hardware manual
QNAP Turbo NAS 하드웨어사용설명서 2013. QNAP Systems, Inc. All Rights Reserved. QNAP 제품을선택해주셔서감사합니다! 이사용설명서는 Turbo NAS 하드웨어를설명하고 일부기능의관련지침을제공합니다. 사용설명서의지침을주의하여읽고엄격하게 준수하십시오. 이사용설명서는다음 NAS 모델에적용할수있습니다 : TS-112,
More informationK5763 초판 2010년 8월 Copyright 2010 ASUSTeK COMPUTER INC. All Rights Reserved. 설명서에 기술된 제품과 소프트웨어를 포함하여 ASUSTeK COMPUTER INC.(이하 ASUS)로부터의 서면 동의 없이 보관을 위
HD 미디어 플레이어 O!Play HD2 사용 설명서 K5763 초판 2010년 8월 Copyright 2010 ASUSTeK COMPUTER INC. All Rights Reserved. 설명서에 기술된 제품과 소프트웨어를 포함하여 ASUSTeK COMPUTER INC.(이하 ASUS)로부터의 서면 동의 없이 보관을 위한 목적의 시스템 저장 외에 임의의 양식이나
More informationPowerPoint 프레젠테이션
Autodesk Software 개인용 ( 학생, 교사 ) 다운로드가이드 진동환 (donghwan.jin@autodesk.com) Manager Autodesk Education Program - Korea Autodesk Education Expert 프로그램 www.autodesk.com/educationexperts 교육전문가프로그램 글로벌한네트워크 /
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.,.,,,,,,,,,,,,.,...,. U.S. GOVERNMENT END USERS. Oracle programs, including any oper
Windows Netra Blade X3-2B( Sun Netra X6270 M3 Blade) : E37790 01 2012 9 Copyright 2012, Oracle and/or its affiliates. All rights reserved.,.,,,,,,,,,,,,.,...,. U.S. GOVERNMENT END USERS. Oracle programs,
More information슬라이드 1
CJ 2007 CONTENTS 2006 CJ IR Presentation Overview 4 Non-performing Asset Company Profile Vision & Mission 4 4 - & 4-4 - & 4 - - - - ROE / EPS - - DreamWorks Animation Net Asset Value (NAV) Disclaimer IR
More information- iii - - i - - ii - - iii - 국문요약 종합병원남자간호사가지각하는조직공정성 사회정체성과 조직시민행동과의관계 - iv - - v - - 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - α α α α - 15 - α α α α α α
More information목차 안전을위한주의사항... 3 시작하기... 5 구성품... 5 각부분의명칭및기능... 6 케이블및커넥터... 8 올바른얼굴등록및인증방법... 9 얼굴등록시주의사항... 9 얼굴인증시주의사항... 9 설치 브래킷및제품고정 전원연결 네트
FaceStation 2 설치 가이드 버전 1.20 한국어 KO 101.00.FS2 V1.20A 목차 안전을위한주의사항... 3 시작하기... 5 구성품... 5 각부분의명칭및기능... 6 케이블및커넥터... 8 올바른얼굴등록및인증방법... 9 얼굴등록시주의사항... 9 얼굴인증시주의사항... 9 설치... 10 브래킷및제품고정... 10 전원연결... 12
More information¹Ìµå¹Ì3Â÷Àμâ
MIDME LOGISTICS Trusted Solutions for 02 CEO MESSAGE MIDME LOGISTICS CO., LTD. 01 Ceo Message We, MIDME LOGISTICS CO., LTD. has established to create aduance logistics service. Try to give confidence to
More information사용시 기본적인 주의사항 경고 : 전기 기구를 사용할 때는 다음의 기본적인 주의 사항을 반드시 유의하여야 합니다..제품을 사용하기 전에 반드시 사용법을 정독하십시오. 2.물과 가까운 곳, 욕실이나 부엌 그리고 수영장 같은 곳에서 제품을 사용하지 마십시오. 3.이 제품은
OPERATING INSTRUCTIONS OPERATING INSTRUCTIONS 사용자설명서 TourBus 0 & TourBus 5 사용시 기본적인 주의사항 경고 : 전기 기구를 사용할 때는 다음의 기본적인 주의 사항을 반드시 유의하여야 합니다..제품을 사용하기 전에 반드시 사용법을 정독하십시오. 2.물과 가까운 곳, 욕실이나 부엌 그리고 수영장 같은 곳에서
More informationDBPIA-NURIMEDIA
방송통신연구 2011년 봄호 연구논문 64 98 PD수첩 관련 판례에서 보이는 사법부의 사실성에 대한 인식의 차이 연구* 1)2) 이승선 충남대학교 언론정보학과 부교수** Contents 1. 문제제기와 연구문제 2. 공적인물에 대한 명예훼손 보도의 면책 법리 3. 분석결과의 논의 4. 마무리 본 이른바 PD수첩 광우병 편 에 대해 다양한 법적 대응이 이뤄졌다.
More informationK7VT2_QIG_v3
1......... 2 3..\ 4 5 [R] : Enter Raid setup utility 6 Press[A]keytocreateRAID RAID Type: JBOD RAID 0 RAID 1: 2 7 " RAID 0 Auto Create Manual Create: 2 RAID 0 Block Size: 16K 32K
More information` Companies need to play various roles as the network of supply chain gradually expands. Companies are required to form a supply chain with outsourcing or partnerships since a company can not
More information2 환경법과 정책 제16권(2016.2.28.) Ⅰ. 들어가며 Ⅱ. 가습기살균제 사건의 경과 Ⅲ. 가습기살균제 사건과 제조물 책임 Ⅳ. 가습기살균제 사건과 인과관계 입증 완화 Ⅴ. 나가며 Ⅰ. 들어가며 피해유발행위(혹은 인자)가 직접적인 손해를 즉각적으로 유발하는 경우
가습기 살균제 사건의 민사적 쟁점: 제조물책임과 인과관계 입증 송 정 은* 1)정 남 순**2) 가습기살균제를 사용함으로써 손해를 입은 피해자들은 현재 가습기살균제를 제조 및 판매한 업 체를 상대로 손해배상소송을 진행하고 있다. 가습기살균제 사건은 고도의 기술이 집약되어 대량으 로 생산되는 제품의 결함으로 인하여 피해자에게 손해가 발생한 사안으로
More informationTurbo NAS hardware manual
QNAP Turbo NAS 하드웨어사용설명서 2014. QNAP Systems, Inc. All Rights Reserved. 2014/06/20 QNAP 제품을선택해주셔서감사합니다! 이사용설명서는 Turbo NAS 하드웨어를설명하고 일부기능의관련지침을제공합니다. 사용설명서의지침을주의하여읽고엄격하게 준수하십시오. 이사용설명서는다음 NAS 모델에적용할수있습니다
More information,,,,,,, ,, 2 3,,,,,,,,,,,,,,,, (2001) 2
2004- - : 2004 5 11 :?,,,,,? Sen (human capability) 1?,, I 1 2 1 Sen A Why health equity? Health Econ 2002:11;659-666 2 1991 p 17 1 ,,,,,,, 20 1 2,, 2 3,,,,,,,,,,,,,,,, 3 3 1 (2001) 2 1),, 2), 2),, 3),,,
More informationAPOGEE Insight_KR_Base_3P11
Technical Specification Sheet Document No. 149-332P25 September, 2010 Insight 3.11 Base Workstation 그림 1. Insight Base 메인메뉴 Insight Base Insight Insight Base, Insight Base Insight Base Insight Windows
More information182 동북아역사논총 42호 금융정책이 조선에 어떤 영향을 미쳤는지를 살펴보고자 한다. 일제 대외금융 정책의 기본원칙은 각 식민지와 점령지마다 별도의 발권은행을 수립하여 일본 은행권이 아닌 각 지역 통화를 발행케 한 점에 있다. 이들 통화는 일본은행권 과 等 價 로 연
越 境 하는 화폐, 분열되는 제국 - 滿 洲 國 幣 의 조선 유입 실태를 중심으로 181 越 境 하는 화폐, 분열되는 제국 - 滿 洲 國 幣 의 조선 유입 실태를 중심으로 - 조명근 고려대학교 BK21+ 한국사학 미래인재 양성사업단 연구교수 Ⅰ. 머리말 근대 국민국가는 대내적으로는 특정하게 구획된 영토에 대한 배타적 지배와 대외적 자주성을 본질로 하는데, 그
More informationDE1-SoC Board
실습 1 개발환경 DE1-SoC Board Design Tools - Installation Download & Install Quartus Prime Lite Edition http://www.altera.com/ Quartus Prime (includes Nios II EDS) Nios II Embedded Design Suite (EDS) is automatically
More information歯1.PDF
200176 .,.,.,. 5... 1/2. /. / 2. . 293.33 (54.32%), 65.54(12.13%), / 53.80(9.96%), 25.60(4.74%), 5.22(0.97%). / 3 S (1997)14.59% (1971) 10%, (1977).5%~11.5%, (1986)
More information레이아웃 1
i g d e d mod, t d e d e d mod, t e,0 e, n s,0 e,n e,0 Division of Workers' Compensation (2009). Iowa workers' compensation manual. Gamber, E. N. & Sorensen, R. L. (1994). Are net discount rates stationary?:
More informationTS-x53B 사용 설명서
TS-x53B TS-253B TS-453B TS-653B 사용설명서 문서버전 : 1 08/05/2017 목차 1. 머리말이가이드소개... 3 대상...3 문서범례...3 2. 제품개요 TS-x53B 관련정보...4 하드웨어사양... 4 패키지내용...5 구성요소...6 전면패널... 6 백패널...7 오른쪽패널...8 드라이브번호매김...8 설치요건...9
More informationTurbo NAS hardware manual
QNAP Turbo NAS 하드웨어사용설명서 2014. QNAP Systems, Inc. All Rights Reserved. 2014/06/12 QNAP 제품을선택해주셔서감사합니다! 이사용설명서는 Turbo NAS 하드웨어를설명하고일부기능의관련지침을제공합니다. 사용설명서의지침을주의하여읽고엄격하게준수하십시오. 이사용설명서는다음 NAS 모델에적용할수있습니다 :
More information본문01
Ⅱ 논술 지도의 방법과 실제 2. 읽기에서 논술까지 의 개발 배경 읽기에서 논술까지 자료집 개발의 본래 목적은 초 중 고교 학교 평가에서 서술형 평가 비중이 2005 학년도 30%, 2006학년도 40%, 2007학년도 50%로 확대 되고, 2008학년도부터 대학 입시에서 논술 비중이 커지면서 논술 교육은 학교가 책임진다. 는 풍토 조성으로 공교육의 신뢰성과
More information¹ýÁ¶ 12¿ù ¼öÁ¤.PDF
논문요약 146 [ 주제어 ] 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 abstract Recent Development in the Law of DPRK on the
More information<B0F8B0B35357B5B5C0D4C4C1BCB3C6C32D4F4C412D504F4C2D D C20312E3320B0F8B0B32E687770>
[OSS 라이선스이슈사례 ] GFDL 1.3 버전공개 한국소프트웨어진흥원 한글과컴퓨터컨소시엄 - 1 - < 문서정보 > 일자 VERSION 변경내역작성자 2008.11.28 1.0 내용추가작성박준완 - 2 - 목 차 1. 문서개요 4 가. 문서의목적 4 나. 참고사항 4 2. 공개SW 라이선스신규이슈정보 5 가. 이슈사항 5 나. 원문 5 다. 이슈내용 6
More informationhttp://www.kbc.go.kr/ Abstract Competition and Concentration in the Market for the Multichannel Video Programming G h e e - Young Noh ( P r o f e s s o, rschool of Communication,
More information<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>
327 Journal of The Korea Institute of Information Security & Cryptology ISSN 1598-3986(Print) VOL.24, NO.2, Apr. 2014 ISSN 2288-2715(Online) http://dx.doi.org/10.13089/jkiisc.2014.24.2.327 개인정보 DB 암호화
More informationMicrosoft Word - 국제중재
기업인과 변호사를 위한 국제 중재(International Arbitration)의 이해와 활용 법무법인 이산( 移 山 ) 서울시 서초구 서초4동 1698-2 형남빌딩 5층 전화: (02) 3477-0150 팩스: 3477-0160 http://www.esanlaw.com 들어가는 말 국제거래에서 발생할 수 있는 분쟁을
More informationQNAP 제품을선택해주셔서감사합니다! 이사용설명서는 Turbo NAS 하드웨어를설명하고 일부기능의관련지침을제공합니다. 사용설명서의지침을주의하여읽고엄격하게 준수하십시오. 이사용설명서는다음 NAS 모델에적용할수있습니다 : HS-210, HS-251, TS-112P, TS-
QNAP Turbo NAS 하드웨어사용설명서 2014. QNAP Systems, Inc. All Rights Reserved. 2014/10/28 QNAP 제품을선택해주셔서감사합니다! 이사용설명서는 Turbo NAS 하드웨어를설명하고 일부기능의관련지침을제공합니다. 사용설명서의지침을주의하여읽고엄격하게 준수하십시오. 이사용설명서는다음 NAS 모델에적용할수있습니다
More informationchapter4
Basic Netw rk 1. ก ก ก 2. 3. ก ก 4. ก 2 1. 2. 3. 4. ก 5. ก 6. ก ก 7. ก 3 ก ก ก ก (Mainframe) ก ก ก ก (Terminal) ก ก ก ก ก ก ก ก 4 ก (Dumb Terminal) ก ก ก ก Mainframe ก CPU ก ก ก ก 5 ก ก ก ก ก ก ก ก ก ก
More information07_Àü¼ºÅÂ_0922
176 177 1) 178 2) 3) 179 4) 180 5) 6) 7) 8) 9) 10) 181 11) 12) 182 13) 14) 15) 183 16) 184 185 186 17) 18) 19) 20) 21) 187 22) 23) 24) 25) 188 26) 27) 189 28) 29) 30)31) 32) 190 33) 34) 35) 36) 191 37)
More informationA B C D E F 1 4 2 3 6 5 11 10 7 8 9 2 4 6 5 3 7 8 9 1 8 7 6 2 3 9 1 4 5 1 6 3 4 5 2 RRC350 RRC350 1 2 3 4 5 6 7 12 11 5 7 9 3 1 10 4 6 8 13 2 Roteo 35
Roteo 20HV/25H/35/35G User Manual Version 1.2 A B C D E F 1 4 2 3 6 5 11 10 7 8 9 2 4 6 5 3 7 8 9 1 8 7 6 2 3 9 1 4 5 1 6 3 4 5 2 RRC350 RRC350 1 2 3 4 5 6 7 12 11 5 7 9 3 1 10 4 6 8 13 2 Roteo 35/35G:
More information2. 박주민.hwp
仁 荷 大 學 校 法 學 硏 究 第 15 輯 第 1 號 2012년 3월 31일, 149~184쪽 Inha Law Review The Institute of Legal Studies Inha University Vol.15, No.1, March 2012 인터넷을 통한 선거운동과 공직선거법 * 박 주 민 법무법인(유한) 한결 변호사 < 목 차 > Ⅰ. 머리말
More information<303833315FC1A4BAB8B9FDC7D02031362D325FC3D6C1BEBABB2E687770>
개인정보보호법의 보호원칙에 대한 벌칙조항 연구 A Legal Study of Punishments in Terms of Principles of Private Informaion Protection Law 전동진(Jeon, Dong-Jin)*19) 정진홍(Jeong, Jin-Hong)**20) 목 차 Ⅰ. 들어가는 말 Ⅱ. OECD 개인정보 보호원칙과의 비교
More information12È«±â¼±¿Ü339~370
http://www.kbc.go.kr/ k Si 2 i= 1 Abstract A Study on Establishment of Fair Trade Order in Terrestrial Broadcasting Ki - Sun Hong (Professor, Dept. of Journalism & Mass Communication,
More information장양수
한국문학논총 제70집(2015. 8) 333~360쪽 공선옥 소설 속 장소 의 의미 - 명랑한 밤길, 영란, 꽃같은 시절 을 중심으로 * 1)이 희 원 ** 1. 들어가며 - 장소의 인간 차 2. 주거지와 소유지 사이의 집/사람 3. 취약함의 나눔으로서의 장소 증여 례 4. 장소 소속감과 미의식의 가능성 5.
More information산은매거진13
www.kdb.co.kr 2010. 01_January Vol. 01 2009. 12. 21 16-3 02)787-4000 02)701-6373 04 08 10 12 18 22 24 26 2 Pension Guardian Pension Guardian 3 Expert Column 4 Pension Guardian ( ) ( ) ( ) 1-4 2,646,122
More information10송동수.hwp
종량제봉투의 불법유통 방지를 위한 폐기물관리법과 조례의 개선방안* 1) 송 동 수** 차 례 Ⅰ. 머리말 Ⅱ. 종량제봉투의 개요 Ⅲ. 종량제봉투의 불법유통사례 및 방지대책 Ⅳ. 폐기물관리법의 개선방안 Ⅴ. 지방자치단체 조례의 개선방안 Ⅵ. 결론 국문초록 1995년부터 쓰레기 종량제가 시행되면서 각 지방자치단체별로 쓰레기 종량제 봉투가 제작, 판매되기 시작하였는데,
More information°í¼®ÁÖ Ãâ·Â
Performance Optimization of SCTP in Wireless Internet Environments The existing works on Stream Control Transmission Protocol (SCTP) was focused on the fixed network environment. However, the number of
More information06_±è¼öö_0323
166 167 1) 2) 3) 4) source code 5) object code PC copy IP Internet Protocol 6) 7) 168 8) 9)10) 11) 12)13) / / 14) 169 PC publisher End User distributor RPG Role-Playing Game 15) FPS First Person Shooter
More informationDBPIA-NURIMEDIA
The e-business Studies Volume 17, Number 6, December, 30, 2016:237~251 Received: 2016/11/20, Accepted: 2016/12/24 Revised: 2016/12/21, Published: 2016/12/30 [ABSTRACT] Recently, there is an increasing
More information<BFA9BAD02DB0A1BBF3B1A4B0ED28C0CCBCF6B9FC2920B3BBC1F62E706466>
001 002 003 004 005 006 008 009 010 011 2010 013 I II III 014 IV V 2010 015 016 017 018 I. 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 III. 041 042 III. 043
More information歯3이화진
http://www.kbc.go.kr/ Abstract Terrestrial Broadcasters Strategies in the Age of Digital Broadcasting Wha-Jin Lee The purpose of this research is firstly to investigate the
More informationDirectIP Gigabit PoE Switch 사용설명서 DH-2328PF Powered by
DirectIP Gigabit PoE Switch 사용설명서 DH-2328PF Powered by 사용설명서를읽기전에 본사용설명서는 아이디스의제품인 DirectIP Gigabit PoE Switch의설치및운영을위한기본설명서입니다. 본기기를처음대하는사용자는물론, 이전에동급의장비를많이다루어본사용자라도사용전에는반드시본사용설명서의내용을읽어본뒤설명서내의주의사항에유의하여제품을다루는것이좋으며,
More information........pdf 16..
Abstract Prospects of and Tasks Involving the Policy of Revitalization of Traditional Korean Performing Arts Yong-Shik, Lee National Center for Korean Traditional Performing Arts In the 21st century, the
More informationDBPIA-NURIMEDIA
The e-business Studies Volume 17, Number 6, December, 30, 2016:275~289 Received: 2016/12/02, Accepted: 2016/12/22 Revised: 2016/12/20, Published: 2016/12/30 [ABSTRACT] SNS is used in various fields. Although
More information민속지_이건욱T 최종
441 450 458 466 474 477 480 This book examines the research conducted on urban ethnography by the National Folk Museum of Korea. Although most people in Korea
More informationOutput file
240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 An Application for Calculation and Visualization of Narrative Relevance of Films Using Keyword Tags Choi Jin-Won (KAIST) Film making
More information04-다시_고속철도61~80p
Approach for Value Improvement to Increase High-speed Railway Speed An effective way to develop a highly competitive system is to create a new market place that can create new values. Creating tools and
More information저작자표시 - 비영리 - 변경금지 2.0 대한민국 이용자는아래의조건을따르는경우에한하여자유롭게 이저작물을복제, 배포, 전송, 전시, 공연및방송할수있습니다. 다음과같은조건을따라야합니다 : 저작자표시. 귀하는원저작자를표시하여야합니다. 비영리. 귀하는이저작물을영리목적으로이용할
저작자표시 - 비영리 - 변경금지 2.0 대한민국 이용자는아래의조건을따르는경우에한하여자유롭게 이저작물을복제, 배포, 전송, 전시, 공연및방송할수있습니다. 다음과같은조건을따라야합니다 : 저작자표시. 귀하는원저작자를표시하여야합니다. 비영리. 귀하는이저작물을영리목적으로이용할수없습니다. 변경금지. 귀하는이저작물을개작, 변형또는가공할수없습니다. 귀하는, 이저작물의재이용이나배포의경우,
More informationJournal of Educational Innovation Research 2018, Vol. 28, No. 3, pp DOI: NCS : * A Study on
Journal of Educational Innovation Research 2018, Vol. 28, No. 3, pp.157-176 DOI: http://dx.doi.org/10.21024/pnuedi.28.3.201809.157 NCS : * A Study on the NCS Learning Module Problem Analysis and Effective
More information, 41 ( ) * 1) ***.,. I.,..., ( ) ( ).,. ( ) *. ** 1
, 41 (2007 12 ) * 1) ***.,. I.,..., ( ) ( ).,. ( ) *. ** 1 2, 41,. 0..,,.,,.,,.....,,.., 3..,,... II. ( ).,.,. ( ).. : 1 1. 1. ( : 1,000, 4, 41 : 8%, : 3 ) 1,000. ( ) 12%. 1 1, 10 5,000 1 5,800. 1 903.926
More information216 동북아역사논총 41호 인과 경계공간은 설 자리를 잃고 배제되고 말았다. 본고에서는 근세 대마도에 대한 한국과 일본의 인식을 주로 영토와 경계인 식을 중심으로 고찰하고자 한다. 이 시기 대마도에 대한 한일 양국의 인식을 살펴볼 때는 근대 국민국가적 관점에서 탈피할
전근대시기 한국과 일본의 대마도 인식 215 전근대시기 한국과 일본의 대마도 인식 하우봉 전북대학교 사학과 교수 Ⅰ. 머리말 브루스 배튼(Bruce Batten)의 정의에 따르면 전근대의 국경에는 국경선으로 이루어진 boundary가 있고, 공간으로 이루어진 frontier란 개념이 있다. 전자 는 구심적이며 내와 외를 격리시키는 기능을 지니고, 후자는 원심적이며
More informationPowerChute Personal Edition v3.1.0 에이전트 사용 설명서
PowerChute Personal Edition v3.1.0 990-3772D-019 4/2019 Schneider Electric IT Corporation Schneider Electric IT Corporation.. Schneider Electric IT Corporation,,,.,. Schneider Electric IT Corporation..
More information<4D6963726F736F667420506F776572506F696E74202D20454C53BDC3BCBCC1B6C1BEC0EFBCDBC0C720C0EFC1A1B0FA20B9FDB8AE2831353035303829>
ELS 시세조종쟁송의 주요 쟁점과 법리 2015. 5. 8. 변호사 김 주 영 발표에 앞서 먼저 말씀드려야 할 사항 ELS 시세조종쟁송은 아직 대부분의 사건에 관하여 최종 판결이 내려지지 않은 사안 임 발표자는 ELS 시세조종쟁송에서 원고(투자자)측을 대리하고 있는 법무법인 소속임 본 발표자는 ELS 시세조종쟁송에 있어서 어떠한 쟁점들이 다루어지고 있고 그것이
More information소프트웨어개발방법론
사용사례 (Use Case) Objectives 2 소개? (story) vs. 3 UC 와 UP 산출물과의관계 Sample UP Artifact Relationships Domain Model Business Modeling date... Sale 1 1..* Sales... LineItem... quantity Use-Case Model objects,
More information- i - - ii - - iii - - iv - - v - - vi - - 1 - - 2 - - 3 - 1) 통계청고시제 2010-150 호 (2010.7.6 개정, 2011.1.1 시행 ) - 4 - 요양급여의적용기준및방법에관한세부사항에따른골밀도검사기준 (2007 년 11 월 1 일시행 ) - 5 - - 6 - - 7 - - 8 - - 9 - - 10 -
More information<31325FB1E8B0E6BCBA2E687770>
88 / 한국전산유체공학회지 제15권, 제1호, pp.88-94, 2010. 3 관내 유동 해석을 위한 웹기반 자바 프로그램 개발 김 경 성, 1 박 종 천 *2 DEVELOPMENT OF WEB-BASED JAVA PROGRAM FOR NUMERICAL ANALYSIS OF PIPE FLOW K.S. Kim 1 and J.C. Park *2 In general,
More information274 한국문화 73
- 273 - 274 한국문화 73 17~18 세기통제영의방어체제와병력운영 275 276 한국문화 73 17~18 세기통제영의방어체제와병력운영 277 278 한국문화 73 17~18 세기통제영의방어체제와병력운영 279 280 한국문화 73 17~18 세기통제영의방어체제와병력운영 281 282 한국문화 73 17~18 세기통제영의방어체제와병력운영 283 284
More information강의지침서 작성 양식
정보화사회와 법 강의지침서 1. 교과목 정보 교과목명 학점 이론 시간 실습 학점(등급제, P/NP) 비고 (예:팀티칭) 국문 정보화사회와 법 영문 Information Society and Law 3 3 등급제 구분 대학 및 기관 학부(과) 전공 성명 작성 책임교수 법학전문대학원 법학과 최우용 2. 교과목 개요 구분 교과목 개요 국문 - 정보의 디지털화와 PC,
More information歯kjmh2004v13n1.PDF
13 1 ( 24 ) 2004 6 Korean J Med Hist 13 1 19 Jun 2004 ISSN 1225 505X 1) * * 1 ( ) 2) 3) 4) * 1) ( ) 3 2) 7 1 3) 2 1 13 1 ( 24 ) 2004 6 5) ( ) ( ) 2 1 ( ) 2 3 2 4) ( ) 6 7 5) - 2003 23 144-166 2 2 1) 6)
More information2009년 국제법평론회 동계학술대회 일정
한국경제연구원 대외세미나 인터넷전문은행 도입과제와 캐시리스사회 전환 전략 일시 2016년 3월 17일 (목) 14:00 ~17:30 장소 전경련회관 컨퍼런스센터 2층 토파즈룸 주최 한국경제연구원 한국금융ICT융합학회 PROGRAM 시 간 내 용 13:30~14:00 등 록 14:00~14:05 개회사 오정근 (한국금융ICT융합학회 회장) 14:05~14:10
More information大学4年生の正社員内定要因に関する実証分析
190 2016 JEL Classification Number J24, I21, J20 Key Words JILPT 2011 1 190 Empirical Evidence on the Determinants of Success in Full-Time Job-Search for Japanese University Students By Hiroko ARAKI and
More informationJournal of Educational Innovation Research 2017, Vol. 27, No. 2, pp DOI: : Researc
Journal of Educational Innovation Research 2017, Vol. 27, No. 2, pp.251-273 DOI: http://dx.doi.org/10.21024/pnuedi.27.2.201706.251 : 1997 2005 Research Trend Analysis on the Korean Alternative Education
More information서론
- i - - ii - - iii - - iv - - v - - vi - - 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - -
More informationuntitled
SDH-C75100 SDH-C75080 SDH-C74040 SDH-B73040 SDH-B73020 Hanwha Techwin 한화테크윈 한화테크윈 한화테크윈 .. /....,.,,....,,,.,,.,.,.,..,.,,,,.,,,...,,,,.., 15cm, 5cm.,,. 10%,.,,,.,. HDD. HDD HDD HDD.. _3 ... HDD. (.).
More information<31B1E8C0B1C8F128C6ED2E687770>
한국패션디자인학회지 제9권1호 The Korean Society of Fashion Design Vol. 9 No. 1 (2009) pp.1~17 모듈과 웨어넷을 이용한 유비쿼터스 패셔너블 컴퓨터 디자인 연구 - 탈ㆍ부착을 이용한 모듈러 시스템을 중심으로 - A Study on Ubiquitous Fashionable Computer Design Using
More information<32382DC3BBB0A2C0E5BED6C0DA2E687770>
논문접수일 : 2014.12.20 심사일 : 2015.01.06 게재확정일 : 2015.01.27 청각 장애자들을 위한 보급형 휴대폰 액세서리 디자인 프로토타입 개발 Development Prototype of Low-end Mobile Phone Accessory Design for Hearing-impaired Person 주저자 : 윤수인 서경대학교 예술대학
More informationsolution map_....
SOLUTION BROCHURE RELIABLE STORAGE SOLUTIONS ETERNUS FOR RELIABILITY AND AVAILABILITY PROTECT YOUR DATA AND SUPPORT BUSINESS FLEXIBILITY WITH FUJITSU STORAGE SOLUTIONS kr.fujitsu.com INDEX 1. Storage System
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.,,,,,,,,,,,,,.,..., U.S. GOVERNMENT END USERS. Oracle programs, including any operat
Sun Server X3-2( Sun Fire X4170 M3) Oracle Solaris : E35482 01 2012 9 Copyright 2012, Oracle and/or its affiliates. All rights reserved.,,,,,,,,,,,,,.,..., U.S. GOVERNMENT END USERS. Oracle programs, including
More informationCopyright 0, Oracle and/or its affiliates. All rights reserved.,.,,,,,,,,,,,,.,...,. U.S. GOVERNMENT RIGHTS Programs, software, databases, and related
Virtual Machine Sun Fire X4800 M : E4570 0 8 Copyright 0, Oracle and/or its affiliates. All rights reserved.,.,,,,,,,,,,,,.,...,. U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation
More informationChapter 1
3 Oracle 설치 Objectives Download Oracle 11g Release 2 Install Oracle 11g Release 2 Download Oracle SQL Developer 4.0.3 Install Oracle SQL Developer 4.0.3 Create a database connection 2 Download Oracle 11g
More informationMicrosoft Word - TViX_3100_Korean.doc
T V i X M - 3100U 본 사용설명서는 펌웨어 버전에 따라 다를 수 있습니다. 최신 사용설명서는 TViX 홈페이지에서 다운로 드 할 수 있습니다. 목 차 1 제품의 특징...3 1.1 멀티미디어 플레이어 기능... 3 1.2 이동식 저장장치의 기능... 3 1.3 제품사양... 4 1.4 동작 모드... 5 2 주의사항...6 2.1 안전상의 주의사항...
More information4번.hwp
Journal of International Culture, Vol.9-1 International Cultural Institute, 2016, 55~63 浅 析 影 响 韩 中 翻 译 的 因 素 A Brief Analysis on Factors that Affects Korean-Chinese Translation 韩 菁 (Han, Jing) 1) < 目
More informationSomething that can be seen, touched or otherwise sensed
Something that can be seen, touched or otherwise sensed Things about an object Weight Height Material Things an object does Pen writes Book stores words Water have Fresh water Rivers Oceans have
More informationTurbo NAS hardware manual
QNAP Turbo NAS 하드웨어사용설명서 2015. QNAP Systems, Inc. All Rights Reserved. 2015/04/23 QNAP 제품을선택해주셔서감사합니다! 이사용설명서는 Turbo NAS 하드웨어를설명하고일부기능의관련지침을제공합니다. 사용설명서의지침을주의하여읽고엄격하게준수하십시오. 이사용설명서는다음 NAS 모델에적용할수있습니다 :
More informationJournal of Educational Innovation Research 2016, Vol. 26, No. 3, pp DOI: * The Grounds and Cons
Journal of Educational Innovation Research 2016, Vol. 26, No. 3, pp.63-81 DOI: http://dx.doi.org/10.21024/pnuedi.26.3.201612.63 * The Grounds and Consequences of the Elementary School Teachers' Trust Formation
More information歯kjmh2004v13n1.PDF
13 1 ( 24 ) 2004 6 Korean J Med Hist 13 20 36 June 2004 ISSN 1225 505X * 1 1886 ( ) 1) 1905 * 1) 20 2) 1910 1926 1910 1926 1930 40 2 1899 1907 3) 4) 1908 1909 ( ) ( ) ( 2) 1995 1998 3) 1997 p 376 4) 1956
More information