°£Æí°áÁ¦, ½Å¿ëÄ«µå û±¸ÇÒÀÎ
ÀÎÅÍÆÄÅ© ·Ôµ¥Ä«µå 5% (23,750¿ø)
(ÃÖ´ëÇÒÀÎ 10¸¸¿ø / Àü¿ù½ÇÀû 40¸¸¿ø)
ºÏÇǴϾð ·Ôµ¥Ä«µå 30% (17,500¿ø)
(ÃÖ´ëÇÒÀÎ 3¸¸¿ø / 3¸¸¿ø ÀÌ»ó °áÁ¦)
NH¼îÇÎ&ÀÎÅÍÆÄÅ©Ä«µå 20% (20,000¿ø)
(ÃÖ´ëÇÒÀÎ 4¸¸¿ø / 2¸¸¿ø ÀÌ»ó °áÁ¦)
Close

Discovering Computers 4/E: Fundamentals

¼Òµæ°øÁ¦

2013³â 9¿ù 9ÀÏ ÀÌÈÄ ´©Àû¼öÄ¡ÀÔ´Ï´Ù.

°øÀ¯Çϱâ
  • Àú : Shelly
  • ÃâÆÇ»ç : Thomson
  • ¹ßÇà : 2021³â 01¿ù 01ÀÏ
  • Âʼö : 488
  • ISBN : 9781423912095
Á¤°¡

25,000¿ø

  • 25,000¿ø

    750P (3%Àû¸³)

ÇÒÀÎÇýÅÃ
Àû¸³ÇýÅÃ
  • S-Point Àû¸³Àº ¸¶ÀÌÆäÀÌÁö¿¡¼­ Á÷Á¢ ±¸¸ÅÈ®Á¤ÇϽŠ°æ¿ì¸¸ Àû¸³ µË´Ï´Ù.
Ãß°¡ÇýÅÃ
¹è¼ÛÁ¤º¸
  • 5/8(¼ö) À̳» ¹ß¼Û ¿¹Á¤  (¼­¿ï½Ã °­³²±¸ »ï¼º·Î 512)
  • ¹«·á¹è¼Û
ÁÖ¹®¼ö·®
°¨¼Ò Áõ°¡
  • À̺¥Æ®/±âȹÀü

  • ¿¬°üµµ¼­

  • »óÇ°±Ç

AD

¸ñÂ÷

Introduction to Computers 1
A World of Computers 2
What is a Computer? 3
Data and Information 3
Advantages of Using Computers 5
Disadvantages of Using Computers 5
Looking Ahead: Medical Implants Can Enhance Lifestyles 5
Information Processing Cycle 5
The Components of a Computer 6
Input Devices 6
Output Devices 7
System Unit 7
Storage Devices 7
Communication Devices 8
Networks and the Internet 8
Computer Software 10
System Software 10
Application Software 11
Ethics & Issues: Do Computer Games Do More Harm than Good? 11
Installing and Running Programs 11
Software Development 12
Categories of Computers 13
Personal Computers 14
Desktop Computers 14
Mobile Computers and Mobile Devices 14
Notebook Computers 14
Mobile Devices 15
Game Consoles 16
Servers 16
Mainframes 17
Supercomputers 17
Embedded Computers 17
Examples of Computer Usage 18
Home User 18
Ethics & Issues: Who Should Monitor Online Social Networks? 19
Small Office/Home Office User 20
Mobile User 20
Power User 21
Large Business User 21
Computer Applications in Society 22
Looking Ahead: Robots Perform Mundane, Dangerous Tasks 22
Education 22
Finance 23
Government 23
Health Care 23
Science 24
Publishing 25
Travel 25
Manufacturing 25
Chapter Summary 26
Companies on the Cutting Edge 27
Dell 27
Apple Computer 27
Technology Trailblazers 27
Bill Gates 27
Anne Mulcahy 27
Chapter Review 28
Key Terms 29
Checkpoint 30
Web Research 31
Learn How To 32
Learn It Online 34
Special Feature: Timeline: Milestones in Computer History 35
The Internet and World Wide Web 49
The Internet 50
How the Internet Works 51
Connecting to the Internet 51
Access Providers 52
How Data Travels the Internet 52
Internet Addresses 53
The World Wide Web 54
Browsing the Web 54
Web Addresses 56
Navigating Web Pages 57
Looking Ahead: Internet Speeds into the Future 57
Searching for Information on the Web 57
Types of Web Sites 61
Ethics & Issues: Should You Trust a Wiki for Academic Research? 63
Evaluating a Web Site 63
Multimedia on the Web 64
Web Publishing 66
E-Commerce 67
Other Internet Services 68
E-Mail 69
FTP 71
Newsgroups and Message Boards 71
Mailing Lists 71
Chat Rooms 71
Instant Messaging 72
Internet Telephony 73
Netiquette 73
Chapter Summary 74
Ethics & Issues: Should Companies Be Able to Tract Your Online Habits? 74
Companies on the Cutting Edge 75
Google 75
Yahoo! 75
Technology Trailblazers 75
Tim Berners-Lee 75
Meg Whitman 75
Chapter Review 76
Key Terms 77
Checkpoint 78
Web Research 79
Learn How To 80
Learn It Online 82
Special Feature: Making Use of the Web 83
Application Software 99
Application Software 100
The Role of System Software 101
Working with Application Software 102
Looking Ahead: Touch Drive Your Computer Screen 103
Business Software 104
Word Processing Software 105
Developing a Document 106
Spreadsheet Software 107
Database Software 108
Presentation Graphics Software 109
Note Taking Software 110
Personal Information Manager Software 110
PDA Business Software 110
Software Suite 110
Project Management Software 111
Accounting Software 111
Document Management Software 111
Enterprise Computing Software 112
Graphics and Multimedia Software 112
Computer-Aided Design 113
Desktop Publishing Software (for the Professional) 113
Paint/Image Editing Software (for the Professional) 113
Video and Audio Editing Software (for the Professional) 114
Ethics & Issues: What Should Be Done to Prevent Music and Video File Sharing? 114
Multimedia Authoring Software 114
Web Page Authoring Software 114
Software for Home, Personal, and Educational Use 115
Software Suite (for Personal Use) 116
Personal Finance Software 116
Legal Software 117
Tax Preparation Software 117
Desktop Publishing Software (for Personal Use) 117
Paint/Image Editing Software (for Personal Use) 118
Clip Art/Image Gallery 118
Video and Audio Editing Software (for Personal Use) 119
Home Design/Landscaping Software 119
Educational and Reference Software 119
Entertainment Software 120
Application Software for Communications 120
Looking Ahead: 3-D Scans May Reduce Surgeries 122
Popular Utility Programs 121
Web-Based Software 121
Learning Aids and Support Tools for Application Software 122
Ethics & Issues: Should Companies Monitor Employees' E-Mail and Internet Traffic? 122
Web-Based Training 123
Chapter Summary 124
Ethics & Issues: Copying Software - A Computer Crime! 124
Companies on the Cutting Edge 125
Adobe Systems 125
Microsoft 125
Technology Trailblazers 125
Dan Bricklin 125
Masayoshi Son 125
Chapter Review 126
Key Terms 127
Checkpoint 128
Web Research 129
Learn How To 130
Learn It Online 132
The Components of the System Unit 133
The System Unit 134
The Motherboard 136
Processor 137
The Control Unit 137
The Arithmetic Logic Unit 137
Machine Cycle 138
The System Clock 138
Looking Ahead: Hybrid Technology to Power Supercomputer 139
Dual-Core and Multi-Core Processors 139
Comparison of Personal Computer Processors 139
Buying a Personal Computer 139
Ethics & Issues: Discarded Computer Components: Whose Problem Is It? 139
Data Representation 140
Memory 142
Bytes and Addressable Memory 142
Memory Sizes 142
Types of Memory 142
RAM 143
Ethics & Issues: Should Schools Supply Computers to All Students? 144
Cache 144
ROM 145
Flash Memory 145
CMOS 146
Memory Access Times 146
Expansion Slots and Adapter Cards 147
Flash Memory Cards, USB Flash Drives, PC Cards, and ExpressCards 147
Ports and Connectors 148
Serial Ports 149
Parallel Ports 149
USB Ports 149
FireWire Ports 150
Special Purpose Ports 150
Buses 151
Bays 151
Power Supply 152
Mobile Computers and Devices 152
Putting It All Together 153
Looking Ahead: Healing Bodies with Nanotechnology 154
Keeping Your Computer Clean 155
Chapter Summary 156
Companies on the Cutting Edge 157
AMD 157
Intel 157
Technology Trailblazers 157
Jack Kilby 157
Gordon Moore 157
Chapter Review 158
Key Terms 159
Checkpoint 160
Web Research 161
Learn How To 162
Learn It Online 164
Input and Output 165
What is Input? 166
Keyboard and Pointing Devices 167
The Keyboard 168
Mouse 169
Ethics & Issues: Are Employees Responsible for Medical Problems Related to Computer Use? 169
Trackball 170
Touchpad 170
Pointing Stick 170
Light Pen 170
Touch Screen 171
Pen Input 171
Gaming and Media Player Controllers 172
Gamepads 172
Joystick and Wheels 172
Light Guns 172
Dance Pads 172
Motion-Sensing Game Controllers 172
Touch-Sensitive Pads 172
Other Types of Input 173
Looking Ahead: Controlling Games by Thinking 173
Voice Input 173
Input for PDAs, Smart Phones, and Tablet PCs 174
Digital Cameras 175
Video Input 176
Scanners and Reading Devices 177
Ethics & Issues: Scanner Errors at the Checkout Counter? 178
Looking Ahead: Paying with Your Cellular Telephone 179
Terminals 180
Biometric Input 181
What is Output? 182
Display Devices 183
LCD Monitors and Screens 184
Plasma Monitors 185
CRT Monitors 186
Printers 187
Producing Printed Output 188
Nonimpact Printers 189
Ink-Jet Printers 189
Ethics & Issues: Should Companies Prohibit Consumers from Refilling Ink Cartridges? 190
Photo Printers 190
Laser Printers 190
Thermal Printers 191
Mobile Printers 192
Plotters and Large-Format Printers 192
Impact Printers 192
Other Output Devices 193
Speakers, Headphones, and Earphones 193
Fax Machines and Fax Modems 194
MultiFunction Peripherals 194
Data Projectors 195
Looking Ahead: Ultra HDTV Puts Viewers in the Picture 195
Putting It All Together 196
Input and Output Devices for Physically Challenged Users 197
Ethics & Issues: Should Web Sites Be Held Accountable for Accessibility Levels for Physically Challenged People? 197
Chapter Summary 198
Companies on the Cutting Edge 199
Logitech 199
Hewlett-Packard 199
Technology Trailblazers 199
Douglas Engelbart 199
Donna Dubinsky 199
Chapter Review 200
Key Terms 202
Checkpoint 203
Web Research 204
Learn How To 205
Learn It Online 207
Special Feature: Digital Imaging and Video Technology 208
Storage 219
Storage 220
Magnetic Disks 222
Hard Disks 223
Looking Ahead: Heat Increases Disk Capacity 223
Floppy Disks 228
Optical Discs 229
CD-ROMs 231
CD-Rs and CD-RWs 232
Ethics & Issues: Is the Blu-Ray and HD DVD Competition Good for Consumers? 233
DVD-ROMs, BD-ROMs, and HD DVD-ROMs 233
Looking Ahead: Bookshelf Design Streamlines Entertainment Storage 233
Recordable and Rewritable DVDs 234
Tape 234
PC Cards and Expresscards 235
Miniature Mobile Storage Media 235
Flash Memory Cards 236
USB Flash Drives 236
Smart Cards 237
Ethics & Issues: Should the World Become a Cashless Society? 237
Microfilm and Microfiche 238
Enterprise Storage 238
Putting It All Together 239
Ethics & Issues: Who Should Be Looking at Your Medical Records? 239
Chapter Summary 240
Companies on the Cutting Edge 241
Seagate Technology 241
SanDisk Corporation 241
Technology Trailblazers 241
Al Shugart 241
Mark Dean 241
Chapter Review 242
Key Terms 243
Checkpoint 244
Web Research 245
Learn How To 246
Learn It Online 248
Operating Systems and Utility Programs 249
System Software 250
Operating Systems 251
Operating System Functions 252
Starting a Computer 252
Providing a User Interface 253
Managing Programs 253
Managing Memory 255
Scheduling Jobs 255
Configuring Devices 256
Establishing an Internet Connection 256
Monitoring Performance 257
Providing File Management and Other Utilities 257
Controlling a Network 257
Administering Security 258
Ethics & Issues: Who Should Be Responsible for Notebook Computer Security? 258
Operating System Utility Programs 259
File Manager 259
Search Utility 259
Image Viewer 259
Personal Firewall 260
Uninstaller 260
Disk Scanner 260
Disk Defragmenter 261
Diagnostic Utility 261
Backup Utility 261
Screen Saver 261
Types of Operating Systems 262
Stand-Alone Operating Systems 262
Windows XP 262
Windows Vista 263
Mac OS X 264
UNIX 264
Linux 265
Looking Ahead: Apple Marching to Its Own Tune 265
Ethics & Issues: Closed Source vs. Open Source Operating Systems 265
Network Operating Systems 266
Embedded Operating Systems 266
Stand-Alone Utility Programs 267
Antivirus Programs 267
Spyware Removers 268
Internet Filters 268
File Compression 269
File Conversion 269
Media Player 269
CD/DVD Burning 269
Personal Computer Maintenance 270
Chapter Summary 270
Companies on the Cutting Edge 271
Red Hat 271
Research in Motion (RIM) 271
Technology Trailblazers 271
Alan Kay 271
Linus Torvalds 271
Chapter Review 272
Key Terms 273
Checkpoint 274
Web Research 275
Learn How To 276
Learn It Online 278
Special Feature: Buyer's Guide: How to Purchase a Personal Computer 279
Communications and Networks 295
Communications 296
Uses of Computer Communications 297
Internet, Web, E-Mail, Instant Messaging, Chat Rooms, Newsgroups, Internet Telephony, FTP, Web Folders, Video Conferencing, and Fax 298
Wireless Messaging Services 298
Ethics & Issues: High Tech Cheating via Wireless Messaging Services? 299
Wireless Internet Access Points 300
Cybercafes 301
Global Positioning System 301
Collaboration 302
Groupware 302
Voice Mail 302
Web Services 302
Networks 303
LANs, MANs, and WANs 303
Network Architectures 305
Network Topologies 306
Intranets 307
Network Communications Standards 308
Ethics & Issues: Should You Worry about Cellular Phone and Cellular Antenna Radiation? 309
Communications Software 310
Communications Over the Telephone Network 310
Dial-Up Lines 311
Dedicated Lines 311
Communications Devices 312
Dial-Up Modems 313
ISDN and DSL Modems 314
Cable Modems 314
Wireless Modems 314
Network Cards 315
Wireless Access Points 315
Routers 315
Home Networks 316
Wired Home Networks 316
Wireless Home Networks 316
Communications Channel 317
Looking Ahead: Teleprescence Expands Face-to-Face Communication 319
Physical Transmission Media 319
Twisted-Pair Cable 319
Coaxial Cable 320
Fiber-Optic Cable 320
Wireless Transmission Media 320
Infrared 321
Broadcast Radio 321
Cellular Radio 321
Microwaves 321
Communications Satellite 321
Looking Ahead: Fighting Fires, Savings Lives with Satellites 322
Chapter Summary 322
Companies on the Cutting Edge 323
Cisco Systems 323
QUALCOMM 323
Technology Trailblazers 323
Robert Metcalfe 323
Patricia Russo 323
Chapter Review 324
Key Terms 325
Checkpoint 326
Web Research 327
Learn How To 328
Learn It Online 330
Database Management 331
Databases, Data, and Information 332
Data Integrity 333
Qualities of Valuable Information 334
The Hierarchy of Data 334
Characters 335
Fields 335
Records 336
Files 336
Ethics & Issues: Are Portable Storage Devices a Threat to Businesses? 336
Maintaining Data 336
Adding Records 336
Changing Records 338
Deleting Records 338
Validating Data 339
File Processing Versus Databases 340
File Processing Systems 341
The Database Approach 341
Database Management Systems 343
Data Dictionary 343
File Retrieval and Maintenance 344
Looking Ahead: Archive an Entire Lifetime 345
Backup and Recovery 346
Data Security 346
Ethics & Issues: Would You Carry a Contactless Smart Card? 346
Relational, Object-Oriented, and Multidimensional Databases 347
Relational Databases 347
Object-Oriented Databases 349
Multidimensional Databases 349
Web Databases 350
Ethics & Issues: Can the Government Be Trusted with Personal Data? 350
Database Administration 351
Database Design Guidelines 351
Role of the Database Anaylsts and Administrators 351
Role of the Employee as User 351
Chapter Summary 352
Looking Ahead: Preserving Electronic Files for Future Generations 352
Companies on the Cutting Edge 353
Oracle 353
Sybase 353
Technology Trailblazers 353
E. F. Codd 353
Larry Ellison 353
Chapter Review 354
Key Terms 355
Checkpoint 356
Web Research 357
Learn How To 358
Learn It Online 360
Computer Security, Ethics, and Privacy 361
Computer Security Risks 362
Internet and Network Attacks 364
Computer Viruses, Worms, and Trojan Horses 364
Safeguards against Computer Viruses, Worms, and Trojan Horses 365
Denial of Service Attacks 367
Back Doors 367
Spoofing 367
Safeguards against Botnets, DoS Attacks, Back Doors, and Spoofing 367
Firewalls 367
Intrusion Detection Software 368
Unauthorized Access and Use 368
Safeguards against Unauthorized Access and Use 368
Identifying and Authenticating Users 368
Looking Ahead: Three Dimensional Facial Recognition Software - A Step Forward for Security 370
Hardware Theft and Vandalism 371
Safeguards against Hardware Theft and Vandalism 371
Software Theft 372
Safeguards against Software Theft 372
Information Theft 373
Safeguards against Information Theft 373
Encryption 373
System Failure 374
Safeguards against System Failure 374
Backing Up - the Ultimate Safeguard 375
Wireless Security 375
Ethics and Society 376
Information Accuracy 377
Intellectual Property Rights 378
Ethics & Issues: Should It Be Illegal to Sell Programs That Copy Movies from DVDs? 379
Information Privacy 379
Electronic Profiles 380
Cookies 380
Spyware and Adware 381
Ethics & Issues: Should Spyware Be Legal? 381
Phishing 381
Spam 382
Privacy Laws 382
Socail Engineering 384
Employee Monitoring 384
Content Filtering 384
Computer Forensics 385
Looking Ahead: Computer Knowledge Assessment Using Brain Fingerprinting 385
Health Concerns of Computer Use 385
Computers and Health Risks 385
Ergonomics and Workplace Design 386
Computer Addiction 387
Green Computing 387
Chapter Summary 388
Companies on the Cutting Edge 389
McAfee 389
Symantec 389
Technology Trailblazers 389
Donn Parker 389
Clifford Stoll 389
Chapter Review 390
Key Terms 391
Checkpoint 392
Web Research 393
Learn How To 394
Learn It Online 396
Special Feature: Digital Entertainment 397
Information System Development and Programming Languages 405
The System Development Cycle 406
Who Participates in the System Development Cycle? 407
Looking Ahead: Strong Employment Opportunities for System Analysts 408
Project Management 408
Feasibility Assessment 409
Documentation 409
Data and Information Gathering Techniques 410
Ethics & Issues: Do You Work Harder When Someone Is Watching? 410
What Initiates the System Development Cycle? 410
Ethics & Issues: How Should Employees Combat Poor E-mail Writing Skills? 411
Cyber Coast Cafe - A Case Study 412
Planning Phase 412
Planning at Cyber Coast Cafe 413
Analysis Phase 413
Preliminary Investigation at Cyber Coast Cafe 414
Detailed Analysis at Cyber Coast Cafe 416
Design Phase 416
Hardware Acquisition at Cyber Coast Cafe 418
Detailed Design at Cyber Coast Cafe 420
Implementation Phase 420
Looking Ahead: Training Delivery Becomes Flexible 420
Implementation at Cyber Coast Cafe 421
Operation, Support, and Security Phase 422
Operation, Support, and Security at Cyber Coast Cafe 422
Programming Languages 423
Low-Level Languages 424
Procedural Languages 425
Object-Oriented Programming Languages and Program Development Tools 427
Other Programming Languages 430
Classic Programming Languages 431
Other Program Development Tools 431
Ethics & Issues: Should All Students Be Required to Learn Computer Programming? 432
Web Page Development 433
Multimedia Program Development 437
The Program Development Cycle 438
Ethics & Issues: Who is Responsible for Bugs 439
What Initiates the Program Development Cycle? 439
Looking Ahead: Software Factories Provide Low-Cost Programming Alternatives 439
Control Structures 440
Chapter Summary 442
Companies on the Cutting Edge 443
Computer Sciences Corporation (CSC) 443
Electronic Arts (EA) 443
Technology Trailblazers 443
Grace Hopper 443
James Gosling 443
Chapter Review 444
Key Terms 445
Checkpoint 446
Web Research 447
Learn How To 448
Learn It Online 450
Enterprise Computing 451
What is Enterprise Computing? 452
Types of Enterprise 454
Organizational Structure of an Enterprise 454
Looking Ahead: The CEO of the Future 455
Levels of Users in the Enterprise 455
How Managers Use Information 456
Information Systems in the Enterprise 456
Information Systems within Functional Units 457
General Purpose Information Systems 461
Integrated Information Systems 465
Enterprise-Wide Technologies and Methodologies 467
Portals 467
EDI 468
Data Warehouses 468
Extranets 469
Web Services 469
Workflow 469
Virtual Private Network 470
E-Commerce 470
E-Retailing 470
Ethics & Issues: Can You Trust When Making Purchases Online? 471
Finance 472
Health 472
Ethics & Issues: Would You Trust an Online Medical Diagnosis? 472
Entertainment and Media 472
Travel 473
Other Business Services 473
Enterprise Hardware 474
RAID 474
Network Attached Storage and Storage Area Networks 474
Enterprise Storage Systems 476
Ethics & Issues: How Much Data Should Companies Be Required to Keep? 476
Blade Servers 477
High-Availability Systems 477
Scalability 477
Utility and Grid Computing 478
Interoperability 478
Backup Procedures and Security 478
Looking Ahead: Internet Systems Provide Backup Solutions 478
Disaster Recovery Plan 479
Chapter Summary 480
Companies on the Cutting Edge 481
EMC 481
IBM 481
Technology Trailblazers 481
John Chambers 481
Jim Clark 481
Chapter Review 482
Key Terms 483
Checkpoint 484
Web Research 485
Learn How To 486
Learn It Online 488
Quiz Yourself Answers APP 1
Glossary/Index IND 1
Photo Credits IND 29

Ã¥¼Ò°³

Discovering Computers Fundamentals is a concise yet thorough text ideal for use incomputer concepts or application software courses.

ÀúÀÚ¼Ò°³

»ý³â¿ùÀÏ -

ÇØ´çÀÛ°¡¿¡ ´ëÇÑ ¼Ò°³°¡ ¾ø½À´Ï´Ù.

ÄÄÇ»ÅÍ ºÐ¾ß¿¡¼­ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥

    ¸®ºä

    0.0 (ÃÑ 0°Ç)

    100ÀÚÆò

    ÀÛ¼º½Ã À¯ÀÇ»çÇ×

    ÆòÁ¡
    0/100ÀÚ
    µî·ÏÇϱâ

    100ÀÚÆò

    0.0
    (ÃÑ 0°Ç)

    ÆǸÅÀÚÁ¤º¸

    • ÀÎÅÍÆÄÅ©µµ¼­¿¡ µî·ÏµÈ ¿ÀǸ¶ÄÏ »óÇ°Àº ±× ³»¿ë°ú Ã¥ÀÓÀÌ ¸ðµÎ ÆǸÅÀÚ¿¡°Ô ÀÖÀ¸¸ç, ÀÎÅÍÆÄÅ©µµ¼­´Â ÇØ´ç »óÇ°°ú ³»¿ë¿¡ ´ëÇØ Ã¥ÀÓÁöÁö ¾Ê½À´Ï´Ù.

    »óÈ£

    (ÁÖ)±³º¸¹®°í

    ´ëÇ¥ÀÚ¸í

    ¾Èº´Çö

    »ç¾÷ÀÚµî·Ï¹øÈ£

    102-81-11670

    ¿¬¶ôó

    1544-1900

    ÀüÀÚ¿ìÆíÁÖ¼Ò

    callcenter@kyobobook.co.kr

    Åë½ÅÆǸž÷½Å°í¹øÈ£

    01-0653

    ¿µ¾÷¼ÒÀçÁö

    ¼­¿ïƯº°½Ã Á¾·Î±¸ Á¾·Î 1(Á¾·Î1°¡,±³º¸ºôµù)

    ±³È¯/ȯºÒ

    ¹ÝÇ°/±³È¯ ¹æ¹ý

    ¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹ÝÇ°/±³È¯/ȯºÒ¡¯ ¿¡¼­ ½Åû ¶Ç´Â 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¹× °í°´¼¾ÅÍ(1577-2555)¿¡¼­ ½Åû °¡´É

    ¹ÝÇ°/±³È¯°¡´É ±â°£

    º¯½É ¹ÝÇ°ÀÇ °æ¿ì Ãâ°í¿Ï·á ÈÄ 6ÀÏ(¿µ¾÷ÀÏ ±âÁØ) À̳»±îÁö¸¸ °¡´É
    ´Ü, »óÇ°ÀÇ °áÇÔ ¹× °è¾à³»¿ë°ú ´Ù¸¦ °æ¿ì ¹®Á¦Á¡ ¹ß°ß ÈÄ 30ÀÏ À̳»

    ¹ÝÇ°/±³È¯ ºñ¿ë

    º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹ÝÇ°/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã
    »óÇ°À̳ª ¼­ºñ½º ÀÚüÀÇ ÇÏÀÚ·Î ÀÎÇÑ ±³È¯/¹ÝÇ°Àº ¹Ý¼Û·á ÆǸÅÀÚ ºÎ´ã

    ¹ÝÇ°/±³È¯ ºÒ°¡ »çÀ¯

    ·¼ÒºñÀÚÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óÇ° µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì
    (´ÜÁö È®ÀÎÀ» À§ÇÑ Æ÷Àå ÈѼÕÀº Á¦¿Ü)

    ·¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óÇ° µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì
    ¿¹) È­ÀåÇ°, ½ÄÇ°, °¡ÀüÁ¦Ç°(¾Ç¼¼¼­¸® Æ÷ÇÔ) µî

    ·º¹Á¦°¡ °¡´ÉÇÑ »óÇ° µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì
    ¿¹) À½¹Ý/DVD/ºñµð¿À, ¼ÒÇÁÆ®¿þ¾î, ¸¸È­Ã¥, ÀâÁö, ¿µ»ó È­º¸Áý

    ·½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆǸŰ¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì

    ·ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡ ÇØ´çµÇ´Â °æ¿ì

    »óÇ° Ç°Àý

    °ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ Ç°Àý/Áö¿¬µÉ ¼ö ÀÖÀ½

    ¼ÒºñÀÚ ÇÇÇغ¸»ó
    ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó

    ·»óÇ°ÀÇ ºÒ·®¿¡ ÀÇÇÑ ±³È¯, A/S, ȯºÒ, Ç°Áúº¸Áõ ¹× ÇÇÇغ¸»ó µî¿¡ °üÇÑ »çÇ×Àº ¼ÒºñÀÚºÐÀïÇØ°á ±âÁØ (°øÁ¤°Å·¡À§¿øȸ °í½Ã)¿¡ ÁØÇÏ¿© 󸮵Ê

    ·´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ ¼ÒºñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ

    (ÁÖ)KGÀ̴Ͻýº ±¸¸Å¾ÈÀü¼­ºñ½º¼­ºñ½º °¡ÀÔ»ç½Ç È®ÀÎ

    (ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º´Â ȸ¿ø´ÔµéÀÇ ¾ÈÀü°Å·¡¸¦ À§ÇØ ±¸¸Å±Ý¾×, °áÁ¦¼ö´Ü¿¡ »ó°ü¾øÀÌ (ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º¸¦ ÅëÇÑ ¸ðµç °Å·¡¿¡ ´ëÇÏ¿©
    (ÁÖ)KGÀ̴Ͻýº°¡ Á¦°øÇÏ´Â ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ Àû¿ëÇÏ°í ÀÖ½À´Ï´Ù.

    ¹è¼Û¾È³»

    • ±³º¸¹®°í »óÇ°Àº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óÇ°À» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù.

    • Ãâ°í°¡´É ½Ã°£ÀÌ ¼­·Î ´Ù¸¥ »óÇ°À» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óÇ°À» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.

    • ±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÕ´Ï´Ù.

    • ¹è¼Ûºñ´Â ¾÷ü ¹è¼Ûºñ Á¤Ã¥¿¡ µû¸¨´Ï´Ù.

    • - µµ¼­ ±¸¸Å ½Ã 15,000¿ø ÀÌ»ó ¹«·á¹è¼Û, 15,000¿ø ¹Ì¸¸ 2,500¿ø - »óÇ°º° ¹è¼Ûºñ°¡ ÀÖ´Â °æ¿ì, »óÇ°º° ¹è¼Ûºñ Á¤Ã¥ Àû¿ë