
2026 Accounting New Support Computer General
Description
Book Introduction
1.
Customized accounting textbook reflecting the latest exam questions
2.
Step-by-step structure from basic concepts to advanced learning
3.
Presenting diagrams and pictures to aid visual understanding
4.
Includes fill-in-the-blank questions and true/false quizzes based on actual past exam questions and key points.
Customized accounting textbook reflecting the latest exam questions
2.
Step-by-step structure from basic concepts to advanced learning
3.
Presenting diagrams and pictures to aid visual understanding
4.
Includes fill-in-the-blank questions and true/false quizzes based on actual past exam questions and key points.
- You can preview some of the book's contents.
Preview
index
Part 1 Computer Architecture
Chapter 1 Computer System Overview
Chapter 2 Data Representation and Computer Operations
Chapter 3 Digital Logic
Chapter 4 Central Processing Unit (CPU)
Chapter 5 Memory Devices
Chapter 6 Input/Output Devices
Chapter 7 Parallel Processing
Part 2 Operating System
Chapter 1: Concept of Operating System
Chapter 2 Processes and Threads
Chapter 3 Parallel Processes
Chapter 4 Memory Management
Chapter 5 Disk Scheduling
Chapter 6 File Management
Part 3 Database
Chapter 1 Database
Chapter 2 Database System
Chapter 3 Data Modeling
Chapter 4 Relational Data Model
Chapter 5 Database Design and Normalization
Chapter 6 Relational Algebra, SQL
Chapter 7 Indexes and Views
Chapter 8 Transactions
Chapter 9 Distributed Databases
Part 4: Data Communications and the Internet
Chapter 1 Overview of Data Communications
Chapter 2 Data Transmission Technology
Chapter 3 Communication Protocols
Chapter 4 OSI Reference Model
Chapter 5 TCP/IP
Chapter 6 Communication Networks
Chapter 7 Local Area Network (LAN)
Part 5 Software Engineering
Chapter 1: Overview of Software Engineering
Chapter 2 Software Life Cycle
Chapter 3 Project Planning and Management
Chapter 4 Requirements Analysis
Chapter 5 Software Design
Chapter 6 Object-Oriented Paradigm
Chapter 7 Software Testing and Debugging
Chapter 8 Software Maintenance and Configuration Management
Chapter 9 Software Reengineering/Reverse Engineering
Part 6: Spreadsheets
Chapter 1: Data Entry and Formatting
Chapter 2: Using Formulas and Functions
Part 7: Information Protection Theory
Chapter 1 Information Systems
Chapter 2 Cryptographic Systems
Chapter 3 Integrity, Authentication, and Non-Repudiation
Chapter 4: Network-Based Attacks, App Vulnerabilities, and Malware
Chapter 5 Network Protection System
Chapter 6 Personal Information Protection Act
Chapter 1 Computer System Overview
Chapter 2 Data Representation and Computer Operations
Chapter 3 Digital Logic
Chapter 4 Central Processing Unit (CPU)
Chapter 5 Memory Devices
Chapter 6 Input/Output Devices
Chapter 7 Parallel Processing
Part 2 Operating System
Chapter 1: Concept of Operating System
Chapter 2 Processes and Threads
Chapter 3 Parallel Processes
Chapter 4 Memory Management
Chapter 5 Disk Scheduling
Chapter 6 File Management
Part 3 Database
Chapter 1 Database
Chapter 2 Database System
Chapter 3 Data Modeling
Chapter 4 Relational Data Model
Chapter 5 Database Design and Normalization
Chapter 6 Relational Algebra, SQL
Chapter 7 Indexes and Views
Chapter 8 Transactions
Chapter 9 Distributed Databases
Part 4: Data Communications and the Internet
Chapter 1 Overview of Data Communications
Chapter 2 Data Transmission Technology
Chapter 3 Communication Protocols
Chapter 4 OSI Reference Model
Chapter 5 TCP/IP
Chapter 6 Communication Networks
Chapter 7 Local Area Network (LAN)
Part 5 Software Engineering
Chapter 1: Overview of Software Engineering
Chapter 2 Software Life Cycle
Chapter 3 Project Planning and Management
Chapter 4 Requirements Analysis
Chapter 5 Software Design
Chapter 6 Object-Oriented Paradigm
Chapter 7 Software Testing and Debugging
Chapter 8 Software Maintenance and Configuration Management
Chapter 9 Software Reengineering/Reverse Engineering
Part 6: Spreadsheets
Chapter 1: Data Entry and Formatting
Chapter 2: Using Formulas and Functions
Part 7: Information Protection Theory
Chapter 1 Information Systems
Chapter 2 Cryptographic Systems
Chapter 3 Integrity, Authentication, and Non-Repudiation
Chapter 4: Network-Based Attacks, App Vulnerabilities, and Malware
Chapter 5 Network Protection System
Chapter 6 Personal Information Protection Act
GOODS SPECIFICS
- Date of issue: November 14, 2025
- Page count, weight, size: 560 pages | 190*260*35mm
- ISBN13: 9791167736130
- ISBN10: 1167736133
You may also like
카테고리
korean
korean