인터넷 브라우저
|
|
- 창민 담
- 5 years ago
- Views:
Transcription
1 인터넷브라우저 1 사용하기전에시작하기전에 2 유저콘텐츠에대하여 3 보호자여러분께 4 인터넷브라우저란? 사용방법 기본편 5 각화면에서의조작 6 브라우저화면보는방법 7 웹페이지열람하기 8 즐겨찾기메뉴사용하기사용방법 응용편 9 비디오재생하기 10 이미지표시하기 11 탭을사용해열람하기
2 12 설정변경하기 이제품에대하여 13 주요사양 14 권리표기등
3 1 사용하기전에 사용하기전에이전자설명서를잘읽고올바른방법으로사용해주십시오. 안전을위한주의사항본소프트웨어를사용하기전에 HOME 메뉴의를선택하여 안전을위한주의사항 의내용을확인해주십시오. 여기에는고객님의건강과안전을위한중요한내용이기재되어있습니다. 또한본체의사용설명서도함께읽어주십시오.
4 2 유저콘텐츠에대하여 유저가작성하는텍스트와메시지, Mii, 이미지, 사진, 동영상, 음성등을 유저콘텐츠 라합니다. 유저콘텐츠에관한주의사항 다른유저와유저콘텐츠 ( 이하, 콘텐츠 ) 를주고받는소프트웨어전반에관한주의사항입니다. 주고받는콘텐츠의타입은소프트웨어에따라각각다릅니다. 전송한콘텐츠는불특정다수에게공개될수있습니다. 또한, 받은사람측에서복사 개조 재전송등을할가능성이있습니다. 한번타인에게전송된내용은전송자측에서삭제하거나이용을제한할수없으므로주의해주십시오. 인터넷상의서버등에업로드한콘텐츠는제반사정에의해예고없이삭제될수있습니다. 또한, 당사가부적절하다고판단한콘텐츠는삭제및비공개로전환될수있습니다. 사전에양해부탁드립니다. 다음에해당하는행위또는해당될우려가있는행위를하지마십시오. - 본인또는타인의실명이나주소등개인정보를전송하는행위 - 타인의명예및신용을훼손하는행위, 타인을모욕하거나불쾌감을주는행위 - 타인의저작물을권리자의허락없이무단으로이용하는등타인의저작물등에대해지적재산권및기타일체의권리를침해하는행위 - 범죄행위또는이를조장하는행위 - 공공질서, 미풍양속을해치는행위 - 이용약관과가이드라인등에서금지
5 하고있는행위 - 기타, 당사가부적절하다고판단하는행위 타인의권리를침해하는콘텐츠, 본인과타인의개인적인정보, 타인에게불쾌감을주는콘텐츠등을 QR Code 로만들어다른사람에게제공하거나공개하지마십시오. 본인의의도와는상관없이해당정보가전달될가능성이있습니다. 콘텐츠를인터넷상에업로드하거나타인과콘텐츠를주고받는등, 인터넷이용으로인해발생하는어떠한손해에대해서도당사는일절책임을지지않습니다.
6 3 보호자여러분께 어린이및청소년의사용을제한하고자할경우에는 청소년보호기능 에서항목을선택해주십시오. 청소년보호기능 의설정방법에관한내용은본체설정의전자설명서를읽어주십시오. 인터넷브라우저사용브라우저의기동을제한할수있습니다. 배포동영상시청배포동영상의시청을제한할수있습니다. 사진 영상 음성 동영상 장문텍스트송수신이미지와동영상의업로드, 이미지저장을제한할수있습니다.
7 4 인터넷브라우저란? 인터넷브라우저 는터치펜을사용한간단한조작으로인터넷웹페이지를볼수있습니다. 웹페이지를보기위해서는인터넷에접속해야합니다. 3DS 소프트웨어를플레이중일때도, 소프트웨어를중단하고인터넷브라우저를사용할수있습니다. 을눌러 HOME 메뉴에서인터넷브라우저를시작해주십시오. 플레이중인소프트웨어에따라서는인터넷브라우저를사용할수없는경우도있습니다.
8 5 각화면에서의조작 인터넷브라우저는아래화면을터치하거나슬라이드하여조작합니다. 화면아래쪽의 툴바 를터치해인터넷브라우저를조작하거나웹페이지의링크를터치해링크가연결된웹페이지로이동할수있습니다.( 6) 화면을빠르게 2 번터치하면, 터치한부분을중심으로표시를확대합니다. 동일하게조작을한번더하면아래화면의가로폭에맞게비율이조정됩니다. 화면을슬라이드하면표시된웹페이지를스크롤할수있습니다. 버튼을사용한조작방법 인터넷브라우저는버튼이나슬라이드패드로조작할수있습니다. 인터넷브라우저의종료 브라우저화면 ( 6) 에서의조작 웹페이지스크롤 툴바표시없애기 / / / / 툴바표시하기 아날로그줌인 / 줌아웃 아래화면을터치 웹페이지상의하기 링크 선택 선택한링크를열기 새로운탭에서열기 길게누르기
9 뒤로열람중인탭닫기줌인줌아웃 길게누르기 뒤로 / 앞으로탭전환즐겨찾기표시하기액션메뉴표시하기 / / 이미지뷰어화면 ( 10) 에서의조작 화면스크롤아날로그줌인 / 줌아웃줌인줌아웃이미지저장하기이미지뷰어종료하기 비디오재생화면 ( 9) 에서의조작 비디오재생 / 정지 뒤로감기 / 앞으로감기 재생속도변경하기 10초뒤로점프 / 프레임넘기기
10 15 초앞으로점프 10 초뒤로점프 비디오재생종료하기 즐겨찾기메뉴 / 탭목록화면 / 설정화면에서의조작 항목선택 결정 닫기
11 6 브라우저화면보는방법 ❷ ❶ ❸ 1 ❹ 10 ❾ ❺ ❻ ❽ ❶ 타이틀바 웹페이지에설정된타이틀이표시됩니다. ❷ 보안아이콘 : 암호화된웹페이지를표시하고있는상태입니다. : 보안인증서의안전성을확인할수없는웹페이지를표시하고있는상태입니다. ❸ 미니맵 회색사각형은페이지전체크기를, 하늘색사각형은화면에표시중인범위를나타냅니다. ❹ 다시불러오기버튼 ❼ 현재표시중인웹페이지를다시불러옵니다. 불러오기중에터치하면불러오기를중지할수있습니다.
12 ❺ 줌아웃 / 줌인버튼 화면을축소 / 확대합니다. ❻ 액션메뉴버튼 : 표시중인페이지를즐겨찾기 ( 8) 에추가합니다. : 웹페이지를확대하거나축소했을때, 아래화면폭에맞추어문장개행이자동으로이루어집니다. 웹페이지에따라서는개행이이루어지지않는경우도있습니다. : 표시중인웹페이지를모바일버전페이지로표시합니다. 웹페이지가모바일버전페이지에대응하지않을경우에는표시가바뀌지않습니다. 또한복수의탭을열고있을경우, 탭을전환했을때모바일버전페이지를다시불러옵니다. : 설정화면을표시합니다.( 12) 소프트웨어중단중에인터넷브라우저를시작한경우, 해당소프트웨어의타이틀명으로검색하는메뉴가추가됩니다. ❼ 탭버튼 탭목록화면 ( 11) 을표시합니다. ❽ 뒤로 / 앞으로버튼 를터치하면이전페이지를, 하면다음페이지를표시합니다. ❾ 즐겨찾기버튼 즐겨찾기메뉴가열립니다.( 8) 를터치
13 주소바 URL 및검색어를입력해웹페이지를열람하거나검색엔진으로검색을실행합니다.( 7) 주소바가표시되지않을경우에는액션메뉴버튼을터치해주십시오. 페이지아이콘 터치하면웹페이지의정보를표시합니다.
14 7 웹페이지열람하기 주소바사용하기 주소바를터치해키보드를표시합니다. 열람하려는웹페이지의 URL 이나검색어를입력한다음 열기 나 검색 을터치합니다. URL 을입력한경우에는해당웹페이지가표시됩니다. 검색어를입력한경우에는인터넷을검색한결과가표시됩니다. 주소바가표시되지않을경우에는액션메뉴버튼 ( 6) 을터치해주십시오. 선택한문자의복사와검색 웹페이지에서문자를길게터치하면화면아래쪽에버튼이표시됩니다. 터치한상태에서원하는문자를슬라이드하면문자를선택할수있습니다. 링크가설정되어있는문자등문자를선택할수없는경우도있습니다. 복사 를터치하면선택한문자를복사할수있습니다. 검색 을터치하면선택한문자로인터넷을검색할수있습니다.
15 이미지나웹페이지의데이터용량이너무클경우, 우측의화면메시지가표시되는경우가있습니다. 불러오기 를터치하면데이터를다시불러옵니다. 그만두기 를터치하면불러오기를중지하고브라우저화면으로돌아갑니다. 웹페이지에따라서는인터넷브라우저로표시할수없는경우가있습니다.
16 8 즐겨찾기메뉴사용하기 ❶ ❷ ❸ ❺ ❹ ❶ 즐겨찾기버튼 터치하면 즐겨찾기화면 을표시합니다. ❷ 이력버튼 터치하면 이력화면 을표시합니다. ❸ 즐겨찾기편집버튼 즐겨찾기에추가한웹페이지의타이틀과 URL 을편집할수있습니다. 즐겨찾기에서삭제 를터치하면추가한웹페이지를즐겨찾기에서삭제합니다. ❹ 즐겨찾기추가버튼 즐겨찾기메뉴를표시했을때열람중이던웹페이지를즐겨찾기에추가할수있습니다. 이력화면을표시하고있을경우 이력을삭제 버튼으로바뀝니다. 터치하면모든이력이삭제됩니다. ❺ 즐겨찾기 즐겨찾기에추가한웹페이지명이표시됩니다. 웹페이지명을터치한상태에서슬라이드하면표시순서를바꿀수있습니다.
17 9 비디오재생하기 인터넷브라우저상에서는비디오파일을재생할수있습니다. 웹페이지에서비디오파일을터치하면위화면에서비디오가재생되고아래화면에조작화면이표시됩니다. 비디오파일이 3D 동영상일경우입체적으로표시할수있습니다. 비디오파일의형식과데이터사이즈에따라서는재생할수없는경우도있습니다.( 13) ❶ ❾ ❽ ❶ 재생시간 / 총재생시간 ❷ 3D 3D 동영상을재생하면표시됩니다. ❸ 재생바 ❹ 재생위치 동영상재생표시 ❷ ❸ ❹ ❺ ❻ ❼ 슬라이드하면비디오를앞이나뒤로빨리돌릴수있습니다. ❺ 반복재생버튼 비디오를끝까지재생하면저절로처음부터반복해서재생합니다.
18 ❻ 3D 방식버튼 3D 동영상이제대로표시되지않는것처럼보일경우사용합니다. 3D 가적절히표시될때까지버튼을터치해조작해주십시오. ❼ 전체화면버튼 위화면에꽉차도록비디오표시를변경할수있습니다. ❽ 자막버튼 비디오에서자막을지원할경우표시합니다. ❾ 닫기버튼 비디오재생화면을종료하고브라우저화면으로돌아갑니다. 재생속도버튼 비디오의재생속도를선택합니다. 비디오재생 / 일시정지버튼 비디오를재생합니다. 재생중터치하면일시정지합니다.
19 10 이미지표시하기 웹페이지상의이미지파일을길게터치하면나타나는 이미지뷰어로표시 를터치하면위화면과아래화면에이미지뷰어화면이표시됩니다. 인터넷브라우저에대응하는 3D 이미지표시도가능합니다. 이미지파일의형식과데이터사이즈에따라서는표시할수없는경우도있습니다.( 13) ❸ ❶ 저장버튼 터치하면표시중인이미지를 microsd 카드에저장합니다. 저장한이미지는 닌텐도 3DS 카메라 에서확인할수있습니다. 날짜정보가없는이미지는 1900/1/1 날짜로저장됩니다. ❷ 줌아웃 / 줌인버튼 3D 이미지를표시하고있을경우에는줌아웃과줌인, 스크롤조작을할수없습니다. ❸ 뒤로버튼 이미지뷰어화면을종료하고브라우저화면으로돌아갑니다. 이미지및동영상을업로드 ( 송신 ) 하기 ❶ ❷ 인터넷상에 블로그나게시판등이미지및동영상을업로드할수있는웹페이지에접속해본
20 체저장메모리및 microsd 카드에저장된이미지와동영상을업로드할수있습니다. 음악파일은업로드할수없습니다. 청소년보호 기능으로이미지의업로드및저장, 동영상의업로드를제한할수있습니다. 디지털카메라와휴대전화로촬영한데이터는업로드및저장할수없는경우가있습니다. 또한닌텐도 3DS 본체로촬영한데이터라하더라도컴퓨터등으로편집및가공하거나 microsd 카드내에서파일이동및삭제, 파일명변경을할경우, 업로드나저장이불가능한경우가있습니다. 동영상을업로드할경우, 업로드를준비할시간이필요합니다. 공공질서및미풍양속을해치는이미지와동영상, 불법적인이미지와동영상, 타인의권리를침해하는이미지와동영상등을업로드하지마십시오. 법령및조례에따라책임이발생할수있습니다. 본체로촬영한이미지및동영상에는축소이미지 ( 섬네일 ) 가포함되어있습니다. 이미지와동영상을컴퓨터등으로편집해도축소이미지에는편집내용이반영되지않는경우가있습니다. 이미지와동영상을인터넷상에업로드하거나제삼자에게전달할때편집전의축소이미지가노출될가능성이있으므로주의해주십시오. 본체로촬영한이미지를 3DS 카메라를사용해편집했을경우에는편집내용이축소이미지에반영됩니다.
21 11 탭을사용해열람하기 인터넷브라우저는탭브라우징에대응됩니다. 동시에병행해서복수의웹페이지를열람하고싶은경우등에탭을추가하거나전환해서표시할수있습니다. ❶ ❶ 페이지타이틀 탭에표시되어있는웹페이지의타이틀이표시됩니다. 터치하면탭을전환해표시합니다. 탭을전환하면자동적으로다시불러오는경우가있습니다. ❷ 탭삭제버튼 ❸ 탭추가버튼 ❷ ❸ ❹ 터치하면탭을추가합니다. 추가한탭에는 신규페이지 가표시되고즐겨찾기에등록한웹페이지중표시빈도가높은순으로 4 개까지표시됩니다. 탭은최대 12 개까지열수있습니다. ❹ 탭버튼 터치하면탭목록화면을종료하고브라우저화면으로돌아갑니다.
22 웹페이지상의링크를길게터치해 신규탭에서열기 를터치하면링크가연결된웹페이지를새로운탭에서직접열수있습니다. 신규탭에서열기 로탭을열었을경우, 현재표시하고있는탭의백그라운드에서탭이작성됩니다. 이때, 이미 12개의탭을열고있을경우에는가장오래된탭의내용에덮어쓰기가이루어집니다. 백그라운드에작성된탭에는탭목록화면에서가표시됩니다.
23 12 설정변경하기 인터넷브라우저의설정을변경할수있습니다. 검색엔진 인터넷검색시사용할색엔진을고릅니다. 검 쿠키삭제하기 저장데이터초기화 네트워크정보 버전정보 쿠키를전부삭제합니다. 쿠키에는웹페이지를확인한일시및횟수, 입력한인증정보등이기록되어있습니다. 일단삭제한쿠키는원래대로되돌릴수없습니다. 주의해주십시오. 인터넷브라우저의설정및이력, 즐겨찾기등을포함한모든저장데이터를삭제해초기상태로되돌립니다. 일단삭제한데이터는원래대로되돌릴수없습니다. 주의해주십시오. 접속중인네트워크에관한정보가표시됩니다. 인터넷브라우저의버전을표시합니다.
24 13 주요사양 브라우저엔진 NetFront v3.0 Browser NX 대응프로토콜웹표준이미지포맷이미지프리뷰비디오포맷비디오코덱오디오코덱 HTTP1.0/HTTP1.1/TLS1. 0/TLS1.1/TLS1.2 HT M L / HT M L 5/ XHTML1.1/Fullscreen/ Ga m ep a d/ SVG / W eb So c k et / Vi de o S ub t i t l e/ W OF F/ We b Messaging/Server-Sent/ W eb Sto r a g e 일부 / XMLHttpRequest/canvas/ V id eo / D OM 1-3 / ECMAScript/CSS1/CSS2. 1/CSS3 일부 bmp/gif/ico/jpeg/png/svg ( 단, 일부표시할수없는이미지가있습니다.) mpo/jpeg( 단, 일부표시할수없는이미지가있습니다.) M P 4, M 3 U 8+ TS (HTTPLiveStreaming)( 단, 일부재생할수없는비디오가있습니다.) H MPEG-4 AVC V id eo ( m ax 8 54 x 4 80 level 3.2, 3D 대응 )( 단, 일부재생할수없는비디오가있습니다.) AAC - ISO/IEC MPEG-4AAC,MP3 ( 단, 일부재생할수없는비디오가있습니다.)
25 업로드시의동영상포맷플러그인 3D.mkv ( 단, 동영상을재생하려면업로드한사이트에서포맷을변환해야합니다. 또한, 포맷을변환해도재생할수없는경우가있습니다.) Adobe Flash등의플러그인은지원하지않습니다.
26 14 권리표기등 NAVER 는네이버 의등록상표입니다. Google search is a trademark of Google Inc. This product contains NetFront Browser NX of ACCESS CO., LTD. ACCESS, the ACCESS logo, and NetFront are registered trademarks or trademarks of ACCESS CO., LTD. in the United States, Japan and/or other countries ACCESS CO., LTD. All rights reserved. This software includes open source software distributed under the terms of the GNU LIBRARY GENERAL PUBLIC LICENSE2. 0 or the GNU Lesser General Public license 2.1 (collectively "LGPL") and modified version of those(collectively "the OSS"). In compliance with the LGPL, the source code of the OSS is made available via Nintendo official website. Notice Webkit Copyright (c) 2005, 2007, Google Inc. All rights reserved. Copyright (C) 2005, 2006, 2007, 2008, 2009, 2011 Apple Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the
27 distribution. * Neither the name of Google Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (C) 2005, 2006, 2007, 2008, 2009 Apple Inc. All rights reserved. Copyright (c) 2013 ACCESS CO., LTD. All rights reserved. This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
28 FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details. You should have received a copy of the GNU Library General Public License along with this library; see the file COPYING.LIB. If not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA , USA. Copyright (C) 2005, 2006, 2007, 2008, 2009 Apple Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. GNU LIBRARY GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the library GPL. It is numbered 2 because it goes with version 2 of the ordinary GPL.] Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to any other libraries whose authors decide to use it. You can use it for your libraries, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do
30 these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link a program with the library, you must provide complete object files to the recipients so that they can relink them with the library, after making changes to the library and recompiling it. And you must show them these terms so they know their rights. Our method of protecting your rights has two steps: (1) copyright the library, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the library. Also, for each distributor's protection, we want to make certain that everyone understands that there is no warranty for this free library. If the library is modified by someone else and passed on, we want its recipients to know that what they have is not the original version, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that companies distributing free software will individually obtain patent licenses, thus in effect transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be licensed for
31 everyone's free use or not licensed at all. Most GNU software, including some libraries, is covered by the ordinary GNU General Public License, which was designed for utility programs. This license, the GNU Library General Public License, applies to certain designated libraries. This license is quite different from the ordinary one; be sure to read it in full, and don't assume that anything in it is the same as in the ordinary license. The reason we have a separate public license for some libraries is that they blur the distinction we usually make between modifying or adding to a program and simply using it. Linking a program with a library, without changing the library, is in some sense simply using the library, and is analogous to running a utility program or application program. However, in a textual and legal sense, the linked executable is a combined work, a derivative of the original library, and the ordinary General Public License treats it as such. Because of this blurred distinction, using the ordinary General Public License for libraries did not effectively promote software sharing, because most developers did not use the libraries. We concluded that weaker conditions might promote sharing better. However, unrestricted linking of non-free programs would deprive the users of those programs of all benefit from the free status of the libraries themselves. This Library General Public License is intended to permit developers of non-free programs to use free libraries, while preserving your freedom as a user of such programs to change the free libraries that are incorporated in them. (We have not seen how to achieve this as regards changes in header files, but we have achieved it as
32 regards changes in the actual functions of the Library.) The hope is that this will lead to faster development of free libraries. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, while the latter only works together with the library. Note that it is possible for a library to be covered by the ordinary General Public License rather than by this special one. GNU LIBRARY GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Library General Public License (also called "this License"). Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term
33 "modification".) "Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
34 a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License,
35 whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of
36 Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical
37 parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 6. As an exception to the Sections above, you may also compile or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete
38 machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. c) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. d) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both
39 them and the Library together in an executable that you distribute. 7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any
40 work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to
41 induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free
42 Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/ OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
43 SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License). To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. <one line to give the library's name and a brief idea of what it does.> Copyright (C) <year> <name of author> This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This library is distributed in the hope that
44 it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details. You should have received a copy of the GNU Library General Public License along with this library; if not, write to the Free Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA USA Also add information on how to contact you by electronic and paper mail. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James Random Hacker. <signature of Ty Coon>, 1 April 1990 Ty Coon, President of Vice That's all there is to it! Copyright (C) 2006 Apple Computer, Inc. Portions are Copyright (C) mozilla. org Other contributors: Stuart Parmenter <stuart@mozilla.com> Copyright (C) Torch Mobile, Inc. Copyright (c) ACCESS CO., LTD. All rights reserved. This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public
45 License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA USA Alternatively, the contents of this file may be used under the terms of either the Mozilla Public License Version 1.1, found at (the "MPL") or the GNU General Public License Version 2.0, found at gpl.html (the "GPL"), in which case the provisions of the MPL or the GPL are applicable instead of those above. If you wish to allow use of your version of this file only under the terms of one of those two licenses (the MPL or the GPL) and not to allow others to use your version of this file under the LGPL, indicate your decision by deleting the provisions above and replace them with the notice and other provisions required by the MPL or the GPL, as the case may be. If you do not delete the provisions above, a recipient may use your version of this file under any of the LGPL, the MPL or the GPL. GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software
46 Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below. When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.
47 To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.
48 Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing nonfree programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances. For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License.
49 In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run. GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such
50 software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) "Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in
51 exchange for a fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of
52 that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and
53 derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a "work that uses the Library" uses material from a header file that is part of
YPR0-KOREAN0.0.indb
1 2 3 6 7 8 10 11 12 13 19 20 20 22 23 23 25 26 14 15 15 16 17 17 18 28 29 29 30 30 31 32 32 33 33 34 35 36 37 37 38 39 40 41 41 41 42 42 44 45 45 45 46 48 50 52 7 n 8 초기화 ( 리셋 ) 홀 n n o a b 9 10 11 no
More informationPI ZH-CN
www.philips.com/welcome PI5000316 1 5 5 5 2 8 8 8 8 3 9 9 4 10 10 10 USB 10 11 11 11 12 12 Safe Sound 12 13 14 14 / 14 15 15 5 16 Wi-Fi 16 16 17 17 18 Micro SD 18 6 19 19 19 19 QQ 19 19 19 20 20 20 7
More information- 2 -
- 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - - 25 - - 26 - - 27 - - 28 - - 29 - - 30 -
More informationProduct A4
2 APTIV Film Versatility and Performance APTIV Film Versatility and Performance 3 4 APTIV Film Versatility and Performance APTIV Film Versatility and Performance 5 PI Increasing Performance PES PPSU PSU
More informationPage 2 of 5 아니다 means to not be, and is therefore the opposite of 이다. While English simply turns words like to be or to exist negative by adding not,
Page 1 of 5 Learn Korean Ep. 4: To be and To exist Of course to be and to exist are different verbs, but they re often confused by beginning students when learning Korean. In English we sometimes use the
More information슬라이드 1
변호사박종백 한국오픈소스법센터대표 법무법인 ( 유한 ) 태평양파트너 2 오픈소스소프트웨어의이해 오픈소스소프트웨어는무엇인가? 자유 누구의자유, 사용, 수정, 재배포의자유와한계 공짜배포 유료판매, 관련서비스의유료화허용여부 코드의공개 무엇을어느범위까지? 공유와기여 공유자와기여자는누구? 저작권 보호가능여부, 보호범위 라이선스계약 계약체결여부, 보호범위 적용법률과관할법원
More informationPage 2 of 6 Here are the rules for conjugating Whether (or not) and If when using a Descriptive Verb. The only difference here from Action Verbs is wh
Page 1 of 6 Learn Korean Ep. 13: Whether (or not) and If Let s go over how to say Whether and If. An example in English would be I don t know whether he ll be there, or I don t know if he ll be there.
More informationCopyrights and Trademarks Autodesk SketchBook Mobile (2.0.2) 2013 Autodesk, Inc. All Rights Reserved. Except as otherwise permitted by Autodesk, Inc.,
Autodesk SketchBook Mobile Copyrights and Trademarks Autodesk SketchBook Mobile (2.0.2) 2013 Autodesk, Inc. All Rights Reserved. Except as otherwise permitted by Autodesk, Inc., this publication, or parts
More information00829A_SHR-6164-KOR.indb
SHR-6080/6082/6160/6162/6163/6164 8 Channel/16 Channel DVR 2_ _3 4_ 15cm 5cm _5 15cm 5cm 6_ J _7 8_ _9 6080 1 2 3 4 10 8 7 6 5 6160/6163 1 2 3 4 10 8 7 6 5 6082 1 2 3 4 10 9 8 7 6 5 6162/6164 1 2 3 4 10
More informationK5763 초판 2010년 8월 Copyright 2010 ASUSTeK COMPUTER INC. All Rights Reserved. 설명서에 기술된 제품과 소프트웨어를 포함하여 ASUSTeK COMPUTER INC.(이하 ASUS)로부터의 서면 동의 없이 보관을 위
HD 미디어 플레이어 O!Play HD2 사용 설명서 K5763 초판 2010년 8월 Copyright 2010 ASUSTeK COMPUTER INC. All Rights Reserved. 설명서에 기술된 제품과 소프트웨어를 포함하여 ASUSTeK COMPUTER INC.(이하 ASUS)로부터의 서면 동의 없이 보관을 위한 목적의 시스템 저장 외에 임의의 양식이나
More information204 205
-Road Traffic Crime and Emergency Evacuation - 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 Abstract Road Traffic Crime
More informationDirectIP Gigabit PoE Switch 사용설명서 DH-2328PF Powered by
DirectIP Gigabit PoE Switch 사용설명서 DH-2328PF Powered by 사용설명서를읽기전에 본사용설명서는 아이디스의제품인 DirectIP Gigabit PoE Switch의설치및운영을위한기본설명서입니다. 본기기를처음대하는사용자는물론, 이전에동급의장비를많이다루어본사용자라도사용전에는반드시본사용설명서의내용을읽어본뒤설명서내의주의사항에유의하여제품을다루는것이좋으며,
More information11¹Ú´ö±Ô
A Review on Promotion of Storytelling Local Cultures - 265 - 2-266 - 3-267 - 4-268 - 5-269 - 6 7-270 - 7-271 - 8-272 - 9-273 - 10-274 - 11-275 - 12-276 - 13-277 - 14-278 - 15-279 - 16 7-280 - 17-281 -
More information` Companies need to play various roles as the network of supply chain gradually expands. Companies are required to form a supply chain with outsourcing or partnerships since a company can not
More information07_Àü¼ºÅÂ_0922
176 177 1) 178 2) 3) 179 4) 180 5) 6) 7) 8) 9) 10) 181 11) 12) 182 13) 14) 15) 183 16) 184 185 186 17) 18) 19) 20) 21) 187 22) 23) 24) 25) 188 26) 27) 189 28) 29) 30)31) 32) 190 33) 34) 35) 36) 191 37)
More information본문01
Ⅱ 논술 지도의 방법과 실제 2. 읽기에서 논술까지 의 개발 배경 읽기에서 논술까지 자료집 개발의 본래 목적은 초 중 고교 학교 평가에서 서술형 평가 비중이 2005 학년도 30%, 2006학년도 40%, 2007학년도 50%로 확대 되고, 2008학년도부터 대학 입시에서 논술 비중이 커지면서 논술 교육은 학교가 책임진다. 는 풍토 조성으로 공교육의 신뢰성과
More informationDBPIA-NURIMEDIA
방송통신연구 2011년 봄호 연구논문 64 98 PD수첩 관련 판례에서 보이는 사법부의 사실성에 대한 인식의 차이 연구* 1)2) 이승선 충남대학교 언론정보학과 부교수** Contents 1. 문제제기와 연구문제 2. 공적인물에 대한 명예훼손 보도의 면책 법리 3. 분석결과의 논의 4. 마무리 본 이른바 PD수첩 광우병 편 에 대해 다양한 법적 대응이 이뤄졌다.
More information시작하기전에 본설명서는 THX-100 케이블방송수신기를설치하거나운영하고자하는사용자를주독자로하고있습니다. 케이블방송을수신하기위해수신기를처음사용하거나사용이익숙하지않은사용자는설치하거나사용하는중에반드시구입처로문의하여전문가의도움을받도록합니다. 설명서에대한소개 본설명서의내용은 T
시작하기전에 본설명서는 THX-100 케이블방송수신기를설치하거나운영하고자하는사용자를주독자로하고있습니다. 케이블방송을수신하기위해수신기를처음사용하거나사용이익숙하지않은사용자는설치하거나사용하는중에반드시구입처로문의하여전문가의도움을받도록합니다. 설명서에대한소개 본설명서의내용은 THX-100 케이블방송수신기의기본사양을기준으로하여제품소개와설치방법에대해설명합니다. 케이블방송을수신하기위해수신기를처음대하는사용자나이전에이와유사한제품을많이다루어본사용자라도수신기를사용하기전에는반드시이설명서의내용을차분히읽어본후설명서내의주의사항을잘숙지하고제품을다루도록하는것이좋습니다.
More information사용시 기본적인 주의사항 경고 : 전기 기구를 사용할 때는 다음의 기본적인 주의 사항을 반드시 유의하여야 합니다..제품을 사용하기 전에 반드시 사용법을 정독하십시오. 2.물과 가까운 곳, 욕실이나 부엌 그리고 수영장 같은 곳에서 제품을 사용하지 마십시오. 3.이 제품은
OPERATING INSTRUCTIONS OPERATING INSTRUCTIONS 사용자설명서 TourBus 0 & TourBus 5 사용시 기본적인 주의사항 경고 : 전기 기구를 사용할 때는 다음의 기본적인 주의 사항을 반드시 유의하여야 합니다..제품을 사용하기 전에 반드시 사용법을 정독하십시오. 2.물과 가까운 곳, 욕실이나 부엌 그리고 수영장 같은 곳에서
More information<C1A4BAB8B9FDC7D031362D335F3133303130322E687770>
권리범위확인심판에서는 법원이 진보성 판단을 할 수 없는가? Can a Court Test the Inventive Step in a Trial to Confirm the Scope of a Patent? 구대환(Koo, Dae-Hwan) * 41) 목 차 Ⅰ. 서론 Ⅱ. 전원합의체판결의 진보성 판단 관련 판시사항 1. 이 사건 특허발명 2. 피고 제품 3.
More information<30353132BFCFB7E15FC7D1B1B9C1A4BAB8B9FDC7D0C8B85F31352D31BCF6C1A4C8AEC0CE2E687770>
지상파 방송의 원격송신과 공중송신권 침해여부에 관한 사례연구 Case Study on Copyright Infringement of Remote Transmission of Television Program 최정열(Choe, Jeong-Yeol) * 목 차 Ⅰ. 서론 Ⅱ. 사실 관계 및 재판의 경과 1. 원격시청기기 및 그 사용방법 등 2. 피고의 서비스 3.
More informationstep 1-1
Written by Dr. In Ku Kim-Marshall STEP BY STEP Korean 1 through 15 Action Verbs Table of Contents Unit 1 The Korean Alphabet, hangeul Unit 2 Korean Sentences with 15 Action Verbs Introduction Review Exercises
More information06_ÀÌÀçÈÆ¿Ü0926
182 183 184 / 1) IT 2) 3) IT Video Cassette Recorder VCR Personal Video Recorder PVR VCR 4) 185 5) 6) 7) Cloud Computing 8) 186 VCR P P Torrent 9) avi wmv 10) VCR 187 VCR 11) 12) VCR 13) 14) 188 VTR %
More informationMicrosoft Word - TViX_3100_Korean.doc
T V i X M - 3100U 본 사용설명서는 펌웨어 버전에 따라 다를 수 있습니다. 최신 사용설명서는 TViX 홈페이지에서 다운로 드 할 수 있습니다. 목 차 1 제품의 특징...3 1.1 멀티미디어 플레이어 기능... 3 1.2 이동식 저장장치의 기능... 3 1.3 제품사양... 4 1.4 동작 모드... 5 2 주의사항...6 2.1 안전상의 주의사항...
More information시작하기전에 본설명서는 UC2600 케이블방송수신기를설치하거나운영하고자하는사용자를주독자로하고있습니다. 케이블방송을수신하기위해수신기를처음사용하거나사용이익숙하지않은사용자는설치하거나사용하는중에반드시구입처로문의하여전문가의도움을받도록합니다. 설명서에대한소개 본설명서의내용은 UC
시작하기전에 본설명서는 UC2600 케이블방송수신기를설치하거나운영하고자하는사용자를주독자로하고있습니다. 케이블방송을수신하기위해수신기를처음사용하거나사용이익숙하지않은사용자는설치하거나사용하는중에반드시구입처로문의하여전문가의도움을받도록합니다. 설명서에대한소개 본설명서의내용은 UC2600 케이블방송수신기의기본사양을기준으로하여제품소개와설치방법에대해설명합니다. 케이블방송을수신하기위해수신기를처음대하는사용자나이전에이와유사한제품을많이다루어본사용자라도수신기를사용하기전에는반드시이설명서의내용을차분히읽어본후설명서내의주의사항을잘숙지하고제품을다루도록하는것이좋습니다.
More informationKD-X252_M_H2
KD-X252 / KD-X152 B5A-2128-01 [H2] KD-X252 2 ( 19) KD-X252 ( 5) [XX] ( XX) SOURCE ( 15) 3 1 1 [YES] 2 2 1 2 [CLOCK] 3 [CLOCK ADJUST] 4 5 [CLOCK FORMAT] 6 [12H][24H] 7 [DATE SET] 8 9 3 1 2 3 2 4 XX SYSTEM
More information중국 상장회사의 경영지배구조에 관한 연구
仁 荷 大 學 校 法 學 硏 究 第 18 輯 第 3 號 2015년 09월 30일, 261~295쪽 Inha Law Review The Institute of Legal Studies Inha University Vol.18, No.3, September, 2015 표현의 자유와 명예훼손 - 인터넷에서의 명예훼손을 중심으로 - * 박 윤 경 숙명여자대학교 법학박사
More information슬라이드 1
CJ 2007 CONTENTS 2006 CJ IR Presentation Overview 4 Non-performing Asset Company Profile Vision & Mission 4 4 - & 4-4 - & 4 - - - - ROE / EPS - - DreamWorks Animation Net Asset Value (NAV) Disclaimer IR
More information¹Ìµå¹Ì3Â÷Àμâ
MIDME LOGISTICS Trusted Solutions for 02 CEO MESSAGE MIDME LOGISTICS CO., LTD. 01 Ceo Message We, MIDME LOGISTICS CO., LTD. has established to create aduance logistics service. Try to give confidence to
More information<BCADBFEFC1F6B9E6BAAFC8A3BBE7C8B85FBAAFC8A3BBE7203437C1FD2831B1C7292E687770>
기업의 영업비밀 보호정책의 한계 The Limitation of Internal Corporate Polices 辯 護 士 Bae Su Young 논문요약 영업비밀 이란 공공연히 알려져 있지 아니하고 독립된 경제적 가치를 가지는 것으로서, 상당한 노력에 의하여 비밀로 유지된 생산방법, 판매방법, 그 밖에 영업활동에 유용한 기술상 또는 경영상의 정보를 말한다.
More informationMicrosoft PowerPoint - ch03ysk2012.ppt [호환 모드]
전자회로 Ch3 iode Models and Circuits 김영석 충북대학교전자정보대학 2012.3.1 Email: kimys@cbu.ac.kr k Ch3-1 Ch3 iode Models and Circuits 3.1 Ideal iode 3.2 PN Junction as a iode 3.4 Large Signal and Small-Signal Operation
More informationPT A-SND-3080C-KOREAN-.indb
SND-3080C www.samsungcctv.co.kr FOR KOREA UNIT STANDARD ONLY Copyright 2011 Samsung Techwin Co., Ltd. All rights reserved. Trademark Restriction Disclaimer Warranty _3 4_ _5 6_ 3 14 22 32 43 51 71 _7 8_
More informationOutput file
240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 An Application for Calculation and Visualization of Narrative Relevance of Films Using Keyword Tags Choi Jin-Won (KAIST) Film making
More information#Ȳ¿ë¼®
http://www.kbc.go.kr/ A B yk u δ = 2u k 1 = yk u = 0. 659 2nu k = 1 k k 1 n yk k Abstract Web Repertoire and Concentration Rate : Analysing Web Traffic Data Yong - Suk Hwang (Research
More information산은매거진13
www.kdb.co.kr 2010. 01_January Vol. 01 2009. 12. 21 16-3 02)787-4000 02)701-6373 04 08 10 12 18 22 24 26 2 Pension Guardian Pension Guardian 3 Expert Column 4 Pension Guardian ( ) ( ) ( ) 1-4 2,646,122
More information시작하기전에 본설명서는 UC2000 케이블방송수신기를설치하거나운영하고자하는사용자를주독자로하고있습니다. 케이블방송을수신하기위해수신기를처음사용하거나사용이익숙하지않은사용자는설치하거나사용하는중에반드시구입처로문의하여전문가의도움을받도록합니다. 설명서에대한소개 본설명서의내용은 UC
UC2000 케이블방송수신기사용설명서 시작하기전에 본설명서는 UC2000 케이블방송수신기를설치하거나운영하고자하는사용자를주독자로하고있습니다. 케이블방송을수신하기위해수신기를처음사용하거나사용이익숙하지않은사용자는설치하거나사용하는중에반드시구입처로문의하여전문가의도움을받도록합니다. 설명서에대한소개 본설명서의내용은 UC2000 케이블방송수신기의기본사양을기준으로하여제품소개와설치방법에대해설명합니다.
More information°í¼®ÁÖ Ãâ·Â
Performance Optimization of SCTP in Wireless Internet Environments The existing works on Stream Control Transmission Protocol (SCTP) was focused on the fixed network environment. However, the number of
More information04-다시_고속철도61~80p
Approach for Value Improvement to Increase High-speed Railway Speed An effective way to develop a highly competitive system is to create a new market place that can create new values. Creating tools and
More information16<CC44><B110> <C0AC><C6A9><C124><BA85><C11C>.pdf
CH 3 10 21 33 77 3 4 5 5 6 7 8 10 HDD 12 13 25 33 34 36 44 45 46 48 52 58 61 71 77 78 81 84 87 90 121 126 81 84 87 88 90 92 96 98 121 Backup Player 123 Backup Player 126 128 HDD 129 131 (FAQ) 133 Open
More information장양수
한국문학논총 제70집(2015. 8) 333~360쪽 공선옥 소설 속 장소 의 의미 - 명랑한 밤길, 영란, 꽃같은 시절 을 중심으로 * 1)이 희 원 ** 1. 들어가며 - 장소의 인간 차 2. 주거지와 소유지 사이의 집/사람 3. 취약함의 나눔으로서의 장소 증여 례 4. 장소 소속감과 미의식의 가능성 5.
More informationI&IRC5 TG_08권
I N T E R E S T I N G A N D I N F O R M A T I V E R E A D I N G C L U B The Greatest Physicist of Our Time Written by Denny Sargent Michael Wyatt I&I Reading Club 103 본문 해석 설명하기 위해 근래의 어떤 과학자보다도 더 많은 노력을
More information歯kjmh2004v13n1.PDF
13 1 ( 24 ) 2004 6 Korean J Med Hist 13 1 19 Jun 2004 ISSN 1225 505X 1) * * 1 ( ) 2) 3) 4) * 1) ( ) 3 2) 7 1 3) 2 1 13 1 ( 24 ) 2004 6 5) ( ) ( ) 2 1 ( ) 2 3 2 4) ( ) 6 7 5) - 2003 23 144-166 2 2 1) 6)
More information300 구보학보 12집. 1),,.,,, TV,,.,,,,,,..,...,....,... (recall). 2) 1) 양웅, 김충현, 김태원, 광고표현 수사법에 따른 이해와 선호 효과: 브랜드 인지도와 의미고정의 영향을 중심으로, 광고학연구 18권 2호, 2007 여름
동화 텍스트를 활용한 패러디 광고 스토리텔링 연구 55) 주 지 영* 차례 1. 서론 2. 인물의 성격 변화에 의한 의미화 전략 3. 시공간 변화에 의한 의미화 전략 4. 서사의 변개에 의한 의미화 전략 5. 창조적인 스토리텔링을 위하여 6. 결론 1. 서론...., * 서울여자대학교 초빙강의교수 300 구보학보 12집. 1),,.,,, TV,,.,,,,,,..,...,....,...
More information<BCF6BDC3323030392D31385FB0EDBCD3B5B5B7CEC8DEB0D4C5B8BFEEB5B5C0D4B1B8BBF3BFACB1B85FB1C7BFB5C0CE2E687770>
... 수시연구 2009-18.. 고속도로 휴게타운 도입구상 연구 A Study on the Concept of Service Town at the Expressway Service Area... 권영인 임재경 이창운... 서 문 우리나라는 경제성장과 함께 도시화가 지속적으로 진행되어 지방 지역의 인구감소와 경기의 침체가 계속되고 있습니다. 정부의 다각 적인
More information06_±è¼öö_0323
166 167 1) 2) 3) 4) source code 5) object code PC copy IP Internet Protocol 6) 7) 168 8) 9)10) 11) 12)13) / / 14) 169 PC publisher End User distributor RPG Role-Playing Game 15) FPS First Person Shooter
More information2 동북아역사논총 50호 구권협정으로 해결됐다 는 일본 정부의 주장에 대해, 일본군 위안부 문제는 일 본 정부 군 등 국가권력이 관여한 반인도적 불법행위이므로 한일청구권협정 에 의해 해결된 것으로 볼 수 없다 는 공식 입장을 밝혔다. 또한 2011년 8월 헌 법재판소는
일본군 위안부 피해자 구제에 관한 일고( 一 考 ) 1 일본군 위안부 피해자 구제에 관한 일고( 一 考 ) 김관원 / 동북아역사재단 연구위원 Ⅰ. 머리말 일본군 위안부 문제가 한일 간 현안으로 불거지기 시작한 것은 일본군 위안부 피해를 공개 증언한 김학순 할머니 등이 일본에서 희생자 보상청구 소송을 제 기한 1991년부터다. 이때 일본 정부는 일본군이 위안부
More information2 환경법과 정책 제16권(2016.2.28.) Ⅰ. 들어가며 Ⅱ. 가습기살균제 사건의 경과 Ⅲ. 가습기살균제 사건과 제조물 책임 Ⅳ. 가습기살균제 사건과 인과관계 입증 완화 Ⅴ. 나가며 Ⅰ. 들어가며 피해유발행위(혹은 인자)가 직접적인 손해를 즉각적으로 유발하는 경우
가습기 살균제 사건의 민사적 쟁점: 제조물책임과 인과관계 입증 송 정 은* 1)정 남 순**2) 가습기살균제를 사용함으로써 손해를 입은 피해자들은 현재 가습기살균제를 제조 및 판매한 업 체를 상대로 손해배상소송을 진행하고 있다. 가습기살균제 사건은 고도의 기술이 집약되어 대량으 로 생산되는 제품의 결함으로 인하여 피해자에게 손해가 발생한 사안으로
More informationHardware Manual TSP100
Trademark acknowledgments TSP: Star Micronics., Ltd. Notice All rights reserved. Reproduction of any part of this manual in any form whatsoever, without STAR s express permission is forbidden. The contents
More information10송동수.hwp
종량제봉투의 불법유통 방지를 위한 폐기물관리법과 조례의 개선방안* 1) 송 동 수** 차 례 Ⅰ. 머리말 Ⅱ. 종량제봉투의 개요 Ⅲ. 종량제봉투의 불법유통사례 및 방지대책 Ⅳ. 폐기물관리법의 개선방안 Ⅴ. 지방자치단체 조례의 개선방안 Ⅵ. 결론 국문초록 1995년부터 쓰레기 종량제가 시행되면서 각 지방자치단체별로 쓰레기 종량제 봉투가 제작, 판매되기 시작하였는데,
More information182 동북아역사논총 42호 금융정책이 조선에 어떤 영향을 미쳤는지를 살펴보고자 한다. 일제 대외금융 정책의 기본원칙은 각 식민지와 점령지마다 별도의 발권은행을 수립하여 일본 은행권이 아닌 각 지역 통화를 발행케 한 점에 있다. 이들 통화는 일본은행권 과 等 價 로 연
越 境 하는 화폐, 분열되는 제국 - 滿 洲 國 幣 의 조선 유입 실태를 중심으로 181 越 境 하는 화폐, 분열되는 제국 - 滿 洲 國 幣 의 조선 유입 실태를 중심으로 - 조명근 고려대학교 BK21+ 한국사학 미래인재 양성사업단 연구교수 Ⅰ. 머리말 근대 국민국가는 대내적으로는 특정하게 구획된 영토에 대한 배타적 지배와 대외적 자주성을 본질로 하는데, 그
More information정진명 남재원 떠오르고 있다. 배달앱서비스는 소비자가 배달 앱서비스를 이용하여 배달음식점을 찾고 음식 을 주문하며, 대금을 결제까지 할 수 있는 서비 스를 말한다. 배달앱서비스는 간편한 음식 주문 과 바로결제 서비스를 바탕으로 전 연령층에서 빠르게 보급되고 있는 반면,
소비자문제연구 제46권 제2호 2015년 8월 http://dx.doi.org/10.15723/jcps.46.2.201508.207 배달앱서비스 이용자보호 방안 정진명 남재원 요 약 최근 음식배달 전문서비스 애플리케이션을 이용한 음식배달이 선풍적인 인기를 끌면서 배달앱서비스가 전자상거래의 새로운 거래유형으로 떠오르고 있다. 배달앱서비스는 소비자가 배달앱서비스를
More information大学4年生の正社員内定要因に関する実証分析
190 2016 JEL Classification Number J24, I21, J20 Key Words JILPT 2011 1 190 Empirical Evidence on the Determinants of Success in Full-Time Job-Search for Japanese University Students By Hiroko ARAKI and
More informationUser Manual-iPOLiS Mobile-Android-KOREAN-v2,6,1.indd
ipolis mobile Android 2.6.1 ipolis mobile PC Galaxy S4,. ipolis mobile Google Play ipolis mobile "ipolis", "SASUNG TECHWIN", "TECHWIN". 1.0 SW. 1.3 SW Galaxy NW CPU RA RA OS 1.6GHz OctaCore 1.9GHz QuadCore
More informationhttp://www.kbc.go.kr/ Abstract Competition and Concentration in the Market for the Multichannel Video Programming G h e e - Young Noh ( P r o f e s s o, rschool of Communication,
More information4 5 4. Hi-MO 애프터케어 시스템 편 5. 오비맥주 카스 카스 후레쉬 테이블 맥주는 천연식품이다 편 처음 스타일 그대로, 부탁 케어~ Hi-MO 애프터케어 시스템 지속적인 모발 관리로 끝까지 스타일이 유지되도록 독보적이다! 근데 그거 아세요? 맥주도 인공첨가물이
1 2 On-air 3 1. 이베이코리아 G마켓 용평리조트 슈퍼브랜드딜 편 2. 아모레퍼시픽 헤라 루즈 홀릭 리퀴드 편 인쇄 광고 올해도 겨울이 왔어요. 당신에게 꼭 해주고 싶은 말이 있어요. G마켓에선 용평리조트 스페셜 패키지가 2만 6900원! 역시 G마켓이죠? G마켓과 함께하는 용평리조트 스페셜 패키지. G마켓의 슈퍼브랜드딜은 계속된다. 모바일 쇼핑 히어로
More informationStage 2 First Phonics
ORT Stage 2 First Phonics The Big Egg What could the big egg be? What are the characters doing? What do you think the story will be about? (큰 달걀은 무엇일까요? 등장인물들은 지금 무엇을 하고 있는 걸까요? 책은 어떤 내용일 것 같나요?) 대해 칭찬해
More information216 동북아역사논총 41호 인과 경계공간은 설 자리를 잃고 배제되고 말았다. 본고에서는 근세 대마도에 대한 한국과 일본의 인식을 주로 영토와 경계인 식을 중심으로 고찰하고자 한다. 이 시기 대마도에 대한 한일 양국의 인식을 살펴볼 때는 근대 국민국가적 관점에서 탈피할
전근대시기 한국과 일본의 대마도 인식 215 전근대시기 한국과 일본의 대마도 인식 하우봉 전북대학교 사학과 교수 Ⅰ. 머리말 브루스 배튼(Bruce Batten)의 정의에 따르면 전근대의 국경에는 국경선으로 이루어진 boundary가 있고, 공간으로 이루어진 frontier란 개념이 있다. 전자 는 구심적이며 내와 외를 격리시키는 기능을 지니고, 후자는 원심적이며
More information한국성인에서초기황반변성질환과 연관된위험요인연구
한국성인에서초기황반변성질환과 연관된위험요인연구 한국성인에서초기황반변성질환과 연관된위험요인연구 - - i - - i - - ii - - iii - - iv - χ - v - - vi - - 1 - - 2 - - 3 - - 4 - 그림 1. 연구대상자선정도표 - 5 - - 6 - - 7 - - 8 - 그림 2. 연구의틀 χ - 9 - - 10 - - 11 -
More information0125_ 워크샵 발표자료_완성.key
WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. WordPress is installed on a web server, which either is part of an Internet hosting service or is a network host
More information이 설명서의 올바른 참고문헌 인용은 다음과 같습니다. SAS Institute Inc. 2015. SAS University Edition: Amazon Web Services 용 설치 가이드 Cary, NC: SAS Institute Inc. SAS Universit
SAS University Edition: Amazon Web Services 용 설치 가이드 i 2014 년 6 월 17 일 이 설명서의 올바른 참고문헌 인용은 다음과 같습니다. SAS Institute Inc. 2015. SAS University Edition: Amazon Web Services 용 설치 가이드 Cary, NC: SAS Institute
More information歯1.PDF
200176 .,.,.,. 5... 1/2. /. / 2. . 293.33 (54.32%), 65.54(12.13%), / 53.80(9.96%), 25.60(4.74%), 5.22(0.97%). / 3 S (1997)14.59% (1971) 10%, (1977).5%~11.5%, (1986)
More information<B3EDB9AEC1FD5F3235C1FD2E687770>
오용록의 작품세계 윤 혜 진 1) * 이 논문은 생전( 生 前 )에 학자로 주로 활동하였던 오용록(1955~2012)이 작곡한 작품들을 살펴보고 그의 작품세계를 파악하고자 하는 것이다. 한국음악이론이 원 래 작곡과 이론을 포함하였던 초기 작곡이론전공의 형태를 염두에 둔다면 그의 연 구에서 기존연구의 방법론을 넘어서 창의적인 분석 개념과 체계를 적용하려는
More information<32382DC3BBB0A2C0E5BED6C0DA2E687770>
논문접수일 : 2014.12.20 심사일 : 2015.01.06 게재확정일 : 2015.01.27 청각 장애자들을 위한 보급형 휴대폰 액세서리 디자인 프로토타입 개발 Development Prototype of Low-end Mobile Phone Accessory Design for Hearing-impaired Person 주저자 : 윤수인 서경대학교 예술대학
More information歯M991101.PDF
2 0 0 0 2000 12 2 0 0 0 2000 12 ( ) ( ) ( ) < >. 1 1. 1 2. 5. 6 1. 7 1.1. 7 1.2. 9 1.3. 10 2. 17 3. 25 3.1. 25 3.2. 29 3.3. 29. 31 1. 31 1.1. ( ) 32 1.2. ( ) 38 1.3. ( ) 40 1.4. ( ) 42 2. 43 3. 69 4. 74.
More information歯kjmh2004v13n1.PDF
13 1 ( 24 ) 2004 6 Korean J Med Hist 13 20 36 June 2004 ISSN 1225 505X * 1 1886 ( ) 1) 1905 * 1) 20 2) 1910 1926 1910 1926 1930 40 2 1899 1907 3) 4) 1908 1909 ( ) ( ) ( 2) 1995 1998 3) 1997 p 376 4) 1956
More information2 KHU 글로벌 기업법무 리뷰 제2권 제1호 또 내용적으로 중대한 위기를 맞이하게 되었고, 개인은 흡사 어항 속의 금붕어 와 같은 신세로 전락할 운명에 처해있다. 현대정보화 사회에서 개인의 사적 영역이 얼마나 침해되고 있는지 는 양 비디오 사건 과 같은 연예인들의 사
연구 논문 헌법 제17조 사생활의 비밀과 자유에 대한 소고 연 제 혁* I. II. III. IV. 머리말 사생활의 비밀과 자유의 의의 및 법적 성격 사생활의 비밀과 자유의 내용 맺음말 I. 머리말 사람은 누구나 타인에게 알리고 싶지 않은 나만의 영역(Eigenraum) 을 혼자 소중히 간직하 기를 바랄 뿐만 아니라, 자기 스스로의 뜻에 따라 삶을 영위해 나가면서
More information6자료집최종(6.8))
Chapter 1 05 Chapter 2 51 Chapter 3 99 Chapter 4 151 Chapter 1 Chapter 6 7 Chapter 8 9 Chapter 10 11 Chapter 12 13 Chapter 14 15 Chapter 16 17 Chapter 18 Chapter 19 Chapter 20 21 Chapter 22 23 Chapter
More information저작자표시 - 비영리 - 변경금지 2.0 대한민국 이용자는아래의조건을따르는경우에한하여자유롭게 이저작물을복제, 배포, 전송, 전시, 공연및방송할수있습니다. 다음과같은조건을따라야합니다 : 저작자표시. 귀하는원저작자를표시하여야합니다. 비영리. 귀하는이저작물을영리목적으로이용할
저작자표시 - 비영리 - 변경금지 2.0 대한민국 이용자는아래의조건을따르는경우에한하여자유롭게 이저작물을복제, 배포, 전송, 전시, 공연및방송할수있습니다. 다음과같은조건을따라야합니다 : 저작자표시. 귀하는원저작자를표시하여야합니다. 비영리. 귀하는이저작물을영리목적으로이용할수없습니다. 변경금지. 귀하는이저작물을개작, 변형또는가공할수없습니다. 귀하는, 이저작물의재이용이나배포의경우,
More information<BFA9BAD02DB0A1BBF3B1A4B0ED28C0CCBCF6B9FC2920B3BBC1F62E706466>
001 002 003 004 005 006 008 009 010 011 2010 013 I II III 014 IV V 2010 015 016 017 018 I. 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 III. 041 042 III. 043
More informationDBPIA-NURIMEDIA
27(2), 2007, 96-121 S ij k i POP j a i SEXR j i AGER j i BEDDAT j ij i j S ij S ij POP j SEXR j AGER j BEDDAT j k i a i i i L ij = S ij - S ij ---------- S ij S ij = k i POP j a i SEXR j i AGER j i BEDDAT
More information<31342D3034C0E5C7FDBFB52E687770>
아카데미 토론 평가에 대한 재고찰 - 토론승패와 설득은 일치하는가 - 장혜영 (명지대) 1. 들어가는 말 토론이란 무엇일까? 토론에 대한 정의는 매우 다양하다. 안재현 과 오창훈은 토론에 대한 여러 정의들을 검토한 후 이들을 종합하 여 다음과 같이 설명하고 있다. 토론이란 주어진 주제에 대해 형 식과 절차에 따라 각자 자신의 의견을 합리적으로 주장하여 상대
More information레이아웃 1
i g d e d mod, t d e d e d mod, t e,0 e, n s,0 e,n e,0 Division of Workers' Compensation (2009). Iowa workers' compensation manual. Gamber, E. N. & Sorensen, R. L. (1994). Are net discount rates stationary?:
More informationPowerPoint 프레젠테이션
Autodesk Software 개인용 ( 학생, 교사 ) 다운로드가이드 진동환 (donghwan.jin@autodesk.com) Manager Autodesk Education Program - Korea Autodesk Education Expert 프로그램 www.autodesk.com/educationexperts 교육전문가프로그램 글로벌한네트워크 /
More information- iii - - i - - ii - - iii - 국문요약 종합병원남자간호사가지각하는조직공정성 사회정체성과 조직시민행동과의관계 - iv - - v - - 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - α α α α - 15 - α α α α α α
More information퇴좈저널36호-4차-T.ps, page 2 @ Preflight (2)
Think Big, Act Big! Character People Literature Beautiful Life History Carcere Mamertino World Special Interview Special Writing Math English Quarts I have been driven many times to my knees by the overwhelming
More informationPart No. : GL A
Part No. : GL68-00657A 2014 SAMSUNG ELECTRONICS Co., Ltd. All rights reserved. 안전을위한주의사항 사용자의안전과재산상의손해를예방하기위한내용입니다. 아래의내용을잘읽고제품을올바르게사용해주십시오. 경고, 참고의미설명 경고하는내용신체적인상해를방지하기위하여독자가따라야하는정보를제공합니다. 주의할내용서비스장애나제품의손상을방지하기위하여독자가따라야하는정보를제공합니다.
More information강의10
Computer Programming gdb and awk 12 th Lecture 김현철컴퓨터공학부서울대학교 순서 C Compiler and Linker 보충 Static vs Shared Libraries ( 계속 ) gdb awk Q&A Shared vs Static Libraries ( 계속 ) Advantage of Using Libraries Reduced
More information하나님의 선한 손의 도우심 이세상에서 가장 큰 축복은 하나님이 나와 함께 하시는 것입니다. 그 이 유는 하나님이 모든 축복의 근원이시기 때문입니다. 에스라서에 보면 하나님의 선한 손의 도우심이 함께 했던 사람의 이야기 가 나와 있는데 에스라 7장은 거듭해서 그 비결을
새벽이슬 2 0 1 3 a u g u s t 내가 이스라엘에게 이슬과 같으리니 그가 백합화같이 피 겠고 레바논 백향목같이 뿌리가 박힐것이라. Vol 5 Number 3 호세아 14:5 하나님의 선한 손의 도우심 이세상에서 가장 큰 축복은 하나님이 나와 함께 하시는 것입니다. 그 이 유는 하나님이 모든 축복의 근원이시기 때문입니다. 에스라서에 보면 하나님의 선한
More information- i - - ii - - iii - - iv - - v - - vi - - 1 - - 2 - - 3 - 1) 통계청고시제 2010-150 호 (2010.7.6 개정, 2011.1.1 시행 ) - 4 - 요양급여의적용기준및방법에관한세부사항에따른골밀도검사기준 (2007 년 11 월 1 일시행 ) - 5 - - 6 - - 7 - - 8 - - 9 - - 10 -
More informationVol.257 C O N T E N T S M O N T H L Y P U B L I C F I N A N C E F O R U M
2017.11 Vol.257 C O N T E N T S 02 06 38 52 69 82 141 146 154 M O N T H L Y P U B L I C F I N A N C E F O R U M 2 2017.11 3 4 2017.11 6 2017.11 1) 7 2) 22.7 19.7 87 193.2 160.6 83 22.2 18.4 83 189.6 156.2
More information11. 일반 10 김린 지니 3(cwr).hwp
仁 荷 大 學 校 法 學 硏 究 第 18 輯 第 4 號 2015년 12월 31일, 225~260쪽 Inha Law Review The Institute of Legal Studies Inha University Vol.18, No.4, December, 2015 VMI 관련 계약의 법적 쟁점 * ** - 하도급거래 공정화에 관한 법률을 중심으로 - 김 린 인하대학교
More information<31325FB1E8B0E6BCBA2E687770>
88 / 한국전산유체공학회지 제15권, 제1호, pp.88-94, 2010. 3 관내 유동 해석을 위한 웹기반 자바 프로그램 개발 김 경 성, 1 박 종 천 *2 DEVELOPMENT OF WEB-BASED JAVA PROGRAM FOR NUMERICAL ANALYSIS OF PIPE FLOW K.S. Kim 1 and J.C. Park *2 In general,
More information274 한국문화 73
- 273 - 274 한국문화 73 17~18 세기통제영의방어체제와병력운영 275 276 한국문화 73 17~18 세기통제영의방어체제와병력운영 277 278 한국문화 73 17~18 세기통제영의방어체제와병력운영 279 280 한국문화 73 17~18 세기통제영의방어체제와병력운영 281 282 한국문화 73 17~18 세기통제영의방어체제와병력운영 283 284
More information歯3이화진
http://www.kbc.go.kr/ Abstract Terrestrial Broadcasters Strategies in the Age of Digital Broadcasting Wha-Jin Lee The purpose of this research is firstly to investigate the
More information2. 박주민.hwp
仁 荷 大 學 校 法 學 硏 究 第 15 輯 第 1 號 2012년 3월 31일, 149~184쪽 Inha Law Review The Institute of Legal Studies Inha University Vol.15, No.1, March 2012 인터넷을 통한 선거운동과 공직선거법 * 박 주 민 법무법인(유한) 한결 변호사 < 목 차 > Ⅰ. 머리말
More informationuntitled
Logic and Computer Design Fundamentals Chapter 4 Combinational Functions and Circuits Functions of a single variable Can be used on inputs to functional blocks to implement other than block s intended
More information음주측정을 위한 긴급강제채혈의 절차와 법리, A Study on the Urgent Compulsory Blood
음주측정을 위한 긴급강제채혈의 절차와 법리 A Study on the Urgent Compulsory Blood Collecting for Investigation of Driving while Intoxicated 양 동 철 * (Yang, Dong-Chul) < 차 례 > Ⅰ. 서론 Ⅱ. 체내신체검사와 긴급압수ㆍ수색ㆍ검증의 허용범위 Ⅲ. 긴급강제채혈의 허용범위와
More information05_±è½Ã¿Ł¿Ü_1130
132 133 1) 2) 3) 4) 5) 134 135 6) 7) 8) 136 9) 10) 11) 12) 137 13) 14) 15) 16) 17) 18) 138 19) 20) 21) 139 22) 23) 140 24) 141 25) 142 26) 27) 28) 29) 30) 31) 32) 143 33) 34) 35) 36) 37) 38) 39) 40) 144
More information공급 에는 3권역 내에 준공된 프라임 오피스가 없었다. 4분기에는 3개동의 프라임 오피스가 신규로 준공 될 예정이다.(사옥1개동, 임대용 오피스 2개동) 수요와 공실률 2014년 10월 한국은행이 발표한 자료에 따르면 한국의 2014년 경제성장률 예측치는 3.5%로 지
Savills World Research 브리핑 서울 프라임 오피스 사진 : Yeouido, Seoul 개요 삼성SDS가 지난 2분기 준공한 잠실 사옥 주변으로의 이전을 지속하고 증권업계의 임차면적 감소가 계속되어 GBD와 YBD 의 수요는 감소하였고 에서는 소폭의 수요 증가가 나타났다. 의 수요 회복에도 불구하고 GBD, YBD의 수요 감소로 서울프라임오피스의
More information12È«±â¼±¿Ü339~370
http://www.kbc.go.kr/ k Si 2 i= 1 Abstract A Study on Establishment of Fair Trade Order in Terrestrial Broadcasting Ki - Sun Hong (Professor, Dept. of Journalism & Mass Communication,
More information2009년 국제법평론회 동계학술대회 일정
한국경제연구원 대외세미나 인터넷전문은행 도입과제와 캐시리스사회 전환 전략 일시 2016년 3월 17일 (목) 14:00 ~17:30 장소 전경련회관 컨퍼런스센터 2층 토파즈룸 주최 한국경제연구원 한국금융ICT융합학회 PROGRAM 시 간 내 용 13:30~14:00 등 록 14:00~14:05 개회사 오정근 (한국금융ICT융합학회 회장) 14:05~14:10
More information<303833315FC1A4BAB8B9FDC7D02031362D325FC3D6C1BEBABB2E687770>
개인정보보호법의 보호원칙에 대한 벌칙조항 연구 A Legal Study of Punishments in Terms of Principles of Private Informaion Protection Law 전동진(Jeon, Dong-Jin)*19) 정진홍(Jeong, Jin-Hong)**20) 목 차 Ⅰ. 들어가는 말 Ⅱ. OECD 개인정보 보호원칙과의 비교
More information2017.09 Vol.255 C O N T E N T S 02 06 26 58 63 78 99 104 116 120 122 M O N T H L Y P U B L I C F I N A N C E F O R U M 2 2017.9 3 4 2017.9 6 2017.9 7 8 2017.9 13 0 13 1,007 3 1,004 (100.0) (0.0) (100.0)
More informationJournal of Educational Innovation Research 2017, Vol. 27, No. 2, pp DOI: : Researc
Journal of Educational Innovation Research 2017, Vol. 27, No. 2, pp.251-273 DOI: http://dx.doi.org/10.21024/pnuedi.27.2.201706.251 : 1997 2005 Research Trend Analysis on the Korean Alternative Education
More information09김정식.PDF
00-09 2000. 12 ,,,,.,.,.,,,,,,.,,..... . 1 1 7 2 9 1. 9 2. 13 3. 14 3 16 1. 16 2. 21 3. 39 4 43 1. 43 2. 52 3. 56 4. 66 5. 74 5 78 1. 78 2. 80 3. 86 6 88 90 Ex e cu t iv e Su m m a r y 92 < 3-1> 22 < 3-2>
More informationMicrosoft PowerPoint - Freebairn, John_ppt
Tax Mix Change John Freebairn Outline General idea of a tax mix change Some detailed policy options Importance of casting assessment in the context of a small open economy Economic effects of a tax mix
More information[Story K] Manual Ver1.0
3rd IRIV ER STORY Story K USER GUIDE CONTENTS 01 시작하기 03 기타정보 구성품각부의명칭키보드전원관리연결하기 Adobe Digital Editions 사용하기 KYOBO ebook Store에서 ebook 구입하기 0 3 0 4 0 5 0 7 0 9 1 3 1 4 안전을위한주의사항문제해결저작권인증등록상표면책조항 A/S 신청하기
More information<4D6963726F736F667420506F776572506F696E74202D20454C53BDC3BCBCC1B6C1BEC0EFBCDBC0C720C0EFC1A1B0FA20B9FDB8AE2831353035303829>
ELS 시세조종쟁송의 주요 쟁점과 법리 2015. 5. 8. 변호사 김 주 영 발표에 앞서 먼저 말씀드려야 할 사항 ELS 시세조종쟁송은 아직 대부분의 사건에 관하여 최종 판결이 내려지지 않은 사안 임 발표자는 ELS 시세조종쟁송에서 원고(투자자)측을 대리하고 있는 법무법인 소속임 본 발표자는 ELS 시세조종쟁송에 있어서 어떠한 쟁점들이 다루어지고 있고 그것이
More informationDBPIA-NURIMEDIA
The e-business Studies Volume 17, Number 6, December, 30, 2016:237~251 Received: 2016/11/20, Accepted: 2016/12/24 Revised: 2016/12/21, Published: 2016/12/30 [ABSTRACT] Recently, there is an increasing
More information아니라 일본 지리지, 수로지 5, 지도 6 등을 함께 검토해야 하지만 여기서는 근대기 일본이 편찬한 조선 지리지와 부속지도만으로 연구대상을 한정하 기로 한다. Ⅱ. 1876~1905년 울릉도 독도 서술의 추이 1. 울릉도 독도 호칭의 혼란과 지도상의 불일치 일본이 조선
근대기 조선 지리지에 보이는 일본의 울릉도 독도 인식 호칭의 혼란을 중심으로 Ⅰ. 머리말 이 글은 근대기 일본인 편찬 조선 지리지에 나타난 울릉도 독도 관련 인식을 호칭의 변화에 초점을 맞춰 고찰한 것이다. 일본은 메이지유신 이후 부국강병을 기도하는 과정에서 수집된 정보에 의존하여 지리지를 펴냈고, 이를 제국주의 확장에 원용하였다. 특히 일본이 제국주의 확장을
More information