Malicious Mobile Codes: Viruses and Worms Viruses crackings 3 Laroux: Excel Macro Virus 4 2
|
|
- ゆりな つちかね
- 5 years ago
- Views:
Transcription
1 Security Hiroshi Toyoizumi Today s Contents 1. Examples of Security Threats 1. Computer Virus 2. Cracking 3. Phishing 2. Basic of Cryptography 2 1
2 Malicious Mobile Codes: Viruses and Worms Viruses crackings 3 Laroux: Excel Macro Virus 4 2
3 Current epidemics 5 Cracking 1. Hijacking your machine. 2. Stepping stone. 3. Tamper with www pages. 4. Leak of important information. 6 3
4 Scanning IP addresses 7 Detect Windows shared folder 8 4
5 How to protect cracking» Anti-virus» Pacth» Encryption» Firewalls» IDS:Intrusion Detection System 9 BlackICE: An IDS 10 5
6 Phishing ebay (phishing) Asking you to go to the fake ebay site and submit your information of password of ebay. From 11 Detail of Phishing The scammers typically send out an e- mail that appears to come from a trusted company such as a bank or an e-commerce Web site. The phishing messages attempt to lure people to a bogus Web site, where they're asked to divulge sensitive personal information. The attackers can then use those details to steal money from the victims' accounts. According to a report from online privacy watchdog Truste, 7 out of 10 people who go online have received phishing s, and 15 percent of those have successfully been duped into providing personal information. From CNET NEWS
7 Secure communication using cryptography» Encrypt important information.» Certify the other party. 13 Common key system Cryptograhpy Plain text Same key for encrypt and decrypt Cipher text 14 7
8 Give it a try! Bob Alice 15 Any problems?» It is easy to eavesdropping the key on thei internet. 16 8
9 Public Key Cryptograhpy Unique keys for encrypt and decrypt Plain text Cipher text 17 Give it a try! Bob Alice 18 9
10 Any problems» Swiching the public key.» Man-in-the-middle-attack. Bob Alice 19 Plain text Digital signature Cipher text 1. A makes a cipher text using the key only known to A. 2. B decrypts the cipher text with the public key of A 3. This is the proof of the plain text is made by A! 20 10
11 Key with digital signature Bob Alice 21 Real cipher communication 22 11
12 Public key and digital signature
13 25 Examples of Topics 1. Stop Blaming the Victims 2. The author of Sasser 3. Adware,Spyware 4. Spoofing, Backdoor 5. Personal Firewall 6. Anti-virus 7. Spam 8. Intrusion Detection System 9. Cookies, Java, Active-x 10. Biometric 11. Examples of Phishing 12. Bot 26 13
14 » Cast Role Play 27»
15 » 1. PC 2. 29»
16 Scene 1: call from Takada delivery 1. Yano: Hello, this is Yano, general affair section in Waseda Hospital. 2. Yamada: Hi, this is Takada delivery calling. It seems that one of our customer wrongly faxed her address to your company. Could you fax it to us? 3. (after checking the fax machine.) 4. Yano: No, we haven t received your fax. 5. Yamada: You may found it other place Maybe in your accounting section? If you find it, please fax it to us at Yano: OK. 31 Scene 2: call from Microsoft 1. Ohta: Hello, this Ohta from Microsoft customer service. We found that your PC is sending too much viruses on the internet, and we received many complaints about it. Please download the anti-virus software that I will mention and install it on your PC. 2. Yano: Sure. Where can I find the software? 32 16
17 Scene 3: call from accounting section 1. Tahara: This is Tahara from accounting. Could you do me a favor? 2. Yamaguchi: Yes. What? 3. Thara: Our computers are all infected by viruses, but I need the address of a patient, Ryoko Hirosue. Could you call up the data on your screen and fax it to me at accounting section? 4. Yamaguchi: No problem. 33 Quiz» Did you find any security problem in the role-play?» Write them down.» Describe the counter measures
18 Steps to obtain the address of Hirosue. 1. By pretending Tahara of accounting section, have Yamaguchi to fax the address to accounting section. 2. By pretending a wrong fax, asking Yano to send the fax to Takada delivery. Each employee did what seems to be OK, but as a whole it would make a leak of private information
Microsoft Word - j201drills27.doc
Drill 1: Giving and Receiving (Part 1) Directions: Describe each picture using the verb of giving and the verb of receiving. (1) (2) (3) (4) 1 (5) (6) Drill 2: Giving and Receiving (Part 1) Directions:
More informationはじめに
IT 1 NPO (IPEC) 55.7 29.5 Web TOEIC Nice to meet you. How are you doing? 1 type (2002 5 )66 15 1 IT Java (IZUMA, Tsuyuki) James Robinson James James James Oh, YOU are Tsuyuki! Finally, huh? What's going
More informationMicrosoft Word - j201drills27.doc
Drill 1: Giving and Receiving (Part 1) [Due date: ] Directions: Describe each picture using the verb of giving and the verb of receiving. E.g.) (1) (2) (3) (4) 1 (5) (6) Drill 2: Giving and Receiving (Part
More informationWhat s your name? Help me carry the baggage, please. politeness What s your name? Help me carry the baggage, please. iii
What s your name? Help me carry the baggage, please. politeness What s your name? Help me carry the baggage, please. iii p. vi 2 50 2 2016 7 14 London, Russell Square iv iii vi Part 1 1 Part 2 13 Unit
More information国際恋愛で避けるべき7つの失敗と解決策
7 http://lovecoachirene.com 1 7! 7! 1 NOT KNOWING WHAT YOU WANT 2 BEING A SUBMISSIVE WOMAN 3 NOT ALLOWING THE MAN TO BE YOUR HERO 4 WAITING FOR HIM TO LEAD 5 NOT SPEAKING YOUR MIND 6 PUTTING HIM ON A PEDESTAL
More information生研ニュースNo.132
No.132 2011.10 REPORTS TOPICS Last year, the Public Relations Committee, General Affairs Section and Professor Tomoki Machida created the IIS introduction video in Japanese. As per the request from Director
More informationC. S2 X D. E.. (1) X S1 10 S2 X+S1 3 X+S S1S2 X+S1+S2 X S1 X+S S X+S2 X A. S1 2 a. b. c. d. e. 2
I. 200 2 II. ( 2001) 30 1992 Do X for S2 because S1(is not desirable) XS S2 A. S1 S2 B. S S2 S2 X 1 C. S2 X D. E.. (1) X 12 15 S1 10 S2 X+S1 3 X+S2 4 13 S1S2 X+S1+S2 X S1 X+S2. 2. 3.. S X+S2 X A. S1 2
More information15717 16329 2
2 161012 1 15717 16329 2 3 4 5 1980 55 1991 16 6 m 1.32m/0.88m 35m 1.32m 0.88m 0.88m 27m 1.5m 2.1m/1.32m 10.9m 10.9m 16m 12m 7 km 1km 1,000km 3km( 9 km 1,000km ( 1,000km 300km 6 10 250kg500kg 200 1t B291
More information10 2000 11 11 48 ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) CU-SeeMe NetMeeting Phoenix mini SeeMe Integrated Services Digital Network 64kbps 16kbps 128kbps 384kbps
More informationfx-9860G Manager PLUS_J
fx-9860g J fx-9860g Manager PLUS http://edu.casio.jp k 1 k III 2 3 1. 2. 4 3. 4. 5 1. 2. 3. 4. 5. 1. 6 7 k 8 k 9 k 10 k 11 k k k 12 k k k 1 2 3 4 5 6 1 2 3 4 5 6 13 k 1 2 3 1 2 3 1 2 3 1 2 3 14 k a j.+-(),m1
More information紀要1444_大扉&目次_初.indd
1. Hi, How are you? / What s up? / How s it going? A / Nice talking to you. 2. Oh really? / That s great! / That s A, B interesting! / Are you serious? / Sounds good. / You too! / That s too bad. 3. Sorry?
More information評論・社会科学 84号(よこ)(P)/3.金子
1 1 1 23 2 3 3 4 3 5 CP 1 CP 3 1 1 6 2 CP OS Windows Mac Mac Windows SafariWindows Internet Explorer 3 1 1 CP 2 2. 1 1CP MacProMacOS 10.4.7. 9177 J/A 20 2 Epson GT X 900 Canon ip 4300 Fujifilm FinePix
More information平成29年度英語力調査結果(中学3年生)の概要
1 2 3 1 そう思う 2 どちらかといえば そう思う 3 どちらかといえば そう思わない 4 そう思わない 4 5 楽しめるようになりたい 6 1 そう思う 2 どちらかといえば そう思う 3 どちらかといえば そう思わない 4 そう思わない 7 1 そう思う 2 どちらかといえば そう思う 3 どちらかといえば そう思わない 4 そう思わない 8 1 そう思う 2 どちらかといえば そう思う
More informationL1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? Well,/ you re very serious person/ so/ I think/ your blood type is A. Wow!/ G
L1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? 当ててみて / 私の血液型を Well,/ you re very serious person/ so/ I think/ your blood type is A. えーと / あなたはとっても真面目な人 / だから / 私は ~ と思います / あなたの血液型は
More informationMicrosoft Word - Win-Outlook.docx
Microsoft Office Outlook での設定方法 (IMAP および POP 編 ) How to set up with Microsoft Office Outlook (IMAP and POP) 0. 事前に https://office365.iii.kyushu-u.ac.jp/login からサインインし 以下の手順で自分の基本アドレスをメモしておいてください Sign
More informationelemmay09.pub
Elementary Activity Bank Activity Bank Activity Bank Activity Bank Activity Bank Activity Bank Activity Bank Activity Bank Activity Bank Activity Bank Activity Bank Activity Bank Number Challenge Time:
More information2
2011 8 6 2011 5 7 [1] 1 2 i ii iii i 3 [2] 4 5 ii 6 7 iii 8 [3] 9 10 11 cf. Abstracts in English In terms of democracy, the patience and the kindness Tohoku people have shown will be dealt with as an exception.
More informationHospitality-mae.indd
Hospitality on the Scene 15 Key Expressions Vocabulary Check PHASE 1 PHASE 2 Key Expressions A A Contents Unit 1 Transportation 2 Unit 2 At a Check-in Counter (hotel) 7 Unit 3 Facilities and Services (hotel)
More information1 ( 8:12) Eccles. 1:8 2 2
1 http://www.hyuki.com/imit/ 1 1 ( 8:12) Eccles. 1:8 2 2 3 He to whom it becomes everything, who traces all things to it and who sees all things in it, may ease his heart and remain at peace with God.
More information1 3.90 1.96 3.31 3.40 3.32 2.83 3.98 3.83 3.91 3.24 2.66 2.63 3.57 1.54 3.40 3.01 2.53 2.78 3.89 2.59 3.53 3.40 3.07 2.57 3.81 3.34 3.66 2.79 2.62 2.4
18 ( ) 0 14 187,698 16 182,827 2 16 0 14 12,298 18 15,002 2 0 14 2 4,020 ( 18 9 1 ) 365 9 (2004) 60 ( 1) (World Values Survey) 60 18 ( 83,820) 90 190 4 3 2.5 2 1 59 10 59 10 1 3.90 1.96 3.31 3.40 3.32
More information10 11 12 33.4 1 open / window / I / shall / the? 79.3 2 something / want / drink / I / to. 43.5 3 the way / you / tell / the library / would / to / me
-1- 10 11 12 33.4 1 open / window / I / shall / the? 79.3 2 something / want / drink / I / to. 43.5 3 the way / you / tell / the library / would / to / me? 28.7 4 Miyazaki / you / will / in / long / stay
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationA Contrastive Study of Japanese and Korean by Analyzing Mistranslation from Japanese into Korean Yukitoshi YUTANI Japanese, Korean, contrastive study, mistranslation, Japanese-Korean dictionary It is already
More informationContents Logging in 3-14 Downloading files from e-ijlp 15 Submitting files on e-ijlp Sending messages to instructors Setting up automatic
e-ijlp(lms) の使い方 How to Use e-ijlp(lms) 学生用 / Guidance for Students (ver. 2.1) 2018.3.26 金沢大学総合日本語プログラム Integrated Japanese Language Program Kanazawa University Contents Logging in 3-14 Downloading files
More informationTo the Conference of District 2652 It is physically impossile for Mary Jane and me to attend the District Conferences around the world. As a result, we must use representatives for that purpose. I have
More information-2-
-1- -2- -3- -4- -5- -6- -7- -8- -9- B -10- 10-11- ALT1.2 Homeroom teacher Good afternoon! wait outside Good afternoon! enter the classroom confirm an aim greet Good afternoon! ALT1.2 Welcome to our school.
More informationRead the following text messages. Study the names carefully. 次のメッセージを読みましょう 名前をしっかり覚えましょう Dear Jenny, Iʼm Kim Garcia. Iʼm your new classmate. These ar
LESSON GOAL: Can read a message. メッセージを読めるようになろう Complete the conversation using your own information. あなた自身のことを考えて 会話を完成させましょう 1. A: Whatʼs your name? B:. 2. A: Whatʼs your phone number, (tutor says studentʼs
More information高2SL高1HL 文法後期後半_テキスト-0108.indd
第 20 講 関係詞 3 ポイント 1 -ever 2 3 ポイント 1 複合関係詞 (-ever) ever whoever whatever whichever whenever wherever You may take whoever wants to go. Whenever she comes, she brings us presents. = no matter whoever =
More informationimai@eng.kagawa-u.ac.jp (phishing) URL HP web URL URL Phishing Phishing "fishing" "sophisticated" WikiPedia http://en.wikipedia.org/wiki/phishing "fishing" "phreaking" phreak http://www.atmarkit.co.jp/fsecurity/special/83phishing/phishing00.html
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More information目次 1. レッスンで使える表現 レッスンでお困りの際に使えるフレーズからレッスンの中でよく使われるフレーズまで 便利な表現をご紹介させていただきます ご活用方法として 講師に伝えたいことが伝わらない場合に下記の通りご利用ください 1 該当の表現を直接講師に伝える 2 該当の英語表現を Skype
レッスンで使える 表現集 - レアジョブ補助教材 - 目次 1. レッスンで使える表現 レッスンでお困りの際に使えるフレーズからレッスンの中でよく使われるフレーズまで 便利な表現をご紹介させていただきます ご活用方法として 講師に伝えたいことが伝わらない場合に下記の通りご利用ください 1 該当の表現を直接講師に伝える 2 該当の英語表現を Skype のチャットボックスに貼りつけ 講師に伝える 1-1.
More information鹿大広報149号
No.149 Feb/1999 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Learned From Japanese Life and Experiences in Kagoshima When I first came to Japan I was really surprised by almost everything, the weather,
More informationS1Šû‘KŒâ‚è
are you? I m thirteen years old. do you study at home every day? I study after dinner. is your cat? It s under the table. I leave for school at seven in Monday. I leave for school at seven on Monday. I
More informationNextWebBtoB_BtoC _suwa.pdf
twitter ID: suwaws 29.3 Billion$ GAAP:8.5 Billion$ 2010 Google :7,200 HONDA : 5,340 NTT : 5,096 docomo : 4,904 mitsubishi corp. : 4,631 TOYOTA : 4,081 On the Internet, nobody knows you're
More informationby CASIO W61CA For Those Requiring an English/Chinese Instruction
by CASIO W61CA http://www.au.kddi.com/torisetsu/index.html http://www.au.kddi.com/manual/index.html For Those Requiring an English/Chinese Instruction Manual English/Chinese Simple Manual can be read on
More informationSFCJ2-安村
Communication and Interaction Michiaki Yasumura / Professor, Faculty of Environmental Information, Keio University From the beginning, communication is an action or process conducted by human to human.
More information~ ユリシーズ における語りのレベル Synopsis Who Is the Man in Macintosh? - Narrative Levels in Ulysses Wataru TAKAHASHI Who is the man in macintosh? This is a famous enigma in Ulysses. He comes out of the blue on the
More information日本語教育紀要 7/pdf用 表紙
JF JF NC JF JF NC peer JF Can-do JF JF http : // jfstandard.jpjf Can-doCommon European Framework of Reference for Languages : learning, teaching,assessment CEFR AABBCC CEFR ABB A A B B B B Can-do CEFR
More informationuntitled
Show & Tell Presentation - 170 - Presentation 1) Choose 1 topic 2) Write the reasons why you chose the topic. 3) Think about 3 points for the topic. Class No Name What would you like to do after graduation?
More information-1- -2- -1- A -1- -2- -3- -1- -2- -1- -2- -1- http://www.unicef.or.jp/kenri.syouyaku.htm -2- 1 2 http://www.stat.go.jp/index.htm http://portal.stat.go.jp/ 1871.8.28 1.4 11.8 42.7 19.3
More information自分の天職をつかめ
Hiroshi Kawasaki / / 13 4 10 18 35 50 600 4 350 400 074 2011 autumn / No.389 5 5 I 1 4 1 11 90 20 22 22 352 325 27 81 9 3 7 370 2 400 377 23 83 12 3 2 410 3 415 391 24 82 9 3 6 470 4 389 362 27 78 9 5
More informationP
03-3208-22482013 Vol.2 Summer & Autumn 2013 Vol.2 Summer & Autumn 90 527 P.156 611 91 C O N T E N T S 2013 03-3208-2248 2 3 4 6 Information 7 8 9 10 2 115 154 10 43 52 61 156 158 160 161 163 79 114 1 2
More informationPlease enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []: Using con
IIS で SSL(https) を設定する方法 Copyright (C) 2008 NonSoft. All Rights Reserved. IIS でセキュアサーバを構築する方法として OpenSSL を使用した方法を実際の手順に沿って記述します 1. はじめに IIS で SSL(https) を設定する方法を以下の手順で記述します (1) 必要ソフトのダウンロード / インストールする
More informationMESSAGE Dear Rotary Friends and Guests attending the District 2640 Conference, I send my warmest greetings to each and every one of you attending this 2004-2005 District Conference, I wish to express my
More informationVirtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking
23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual
More informationALT : Hello. May I help you? Student : Yes, please. I m looking for a white T-shirt. ALT : How about this one? Student : Well, this size is good. But do you have a cheaper one? ALT : All right. How about
More informationR R S K K S K S K S K S K S Study of Samuhara Belief : Transformation from Protection against Injuries to Protection against Bullets WATANABE Kazuhiro Samuhara, which is a group of letters like unfamiliar
More informationCONTENTS Public relations brochure of Higashikawa November No.745 Higashikawa 215 November 2
11 215 November No.745 CONTENTS 2 6 12 17 17 18 2 21 22 23 24 28 3 31 32 Public relations brochure of Higashikawa 11 215 November No.745 Higashikawa 215 November 2 816,18 832,686 8,326,862 196,93 43,573
More information3_39.dvi
Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar
More information:
An Analysis of TV Game Market: From the viewpoints of network externalities and whole of services Masaki Matsumura, Hiroyuki Kurimoto, and Toshio Kobayashi It has been understood that a standard would
More information,, 2024 2024 Web ,, ID ID. ID. ID. ID. must ID. ID. . ... BETWEENNo., - ESPNo. Works Impact of the Recruitment System of New Graduates as Temporary Staff on Transition from College to Work Naoyuki
More informationC H H H C H H H C C CUTION:These telephones are for use in Japan only. They cannot be used in other countries because of differences in voltages, tele
VE-PV01LVE-PVW01LVE-PVC01L 1 4 7 2 3 5 6 8 9 * 0 # C H H H C H H H C C CUTION:These telephones are for use in Japan only. They cannot be used in other countries because of differences in voltages, telephone
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationアンケート2
/ / / / / / 4/6 4/20 4/7 5/19 4/4 5/19 4/5 4/26 4/8 5/13 / / / / / / / / / / / / / / / / / / / / / / / / 7/6 10/12 6/7 11/29 7/13 9/28 5/22 10/2 6/3 10/7 5/24 10/4 5/30 9/12 6/2 7/21 6/1 7/27 6/13 9/5
More informationBurkina Faso Grades of 2 Learn What kind of food does Moussa grow? What did Moussa buy with the extra money he earned in the market? Pray Write
Burkina Faso Grades 1-3 1 of 2 Learn What kind of food does Moussa grow? What did Moussa buy with the extra money he earned in the market? Pray Write a prayer here asking God to help farmers like Moussa.
More information取説_VE-PV11L(応用編)
* 0 # VE-PV11L VE-PVC11L VE-PS109N 1 2 3 4 5 6 7 8 9 C H H H C H H H C C CAUTION:These telephones are for use in Japan only. They cannot be used in other countries because of differences in voltages, telephone
More informationMicrosoft Word - PCM TL-Ed.4.4(特定電気用品適合性検査申込のご案内)
(2017.04 29 36 234 9 1 1. (1) 3 (2) 9 1 2 2. (1) 9 1 1 2 1 2 (2) 1 2 ( PSE-RE-101/205/306/405 2 PSE-RE-201 PSE-RE-301 PSE-RE-401 PSE-RE-302 PSE-RE-202 PSE-RE-303 PSE-RE-402 PSE-RE-203 PSE-RE-304 PSE-RE-403
More informationきずなプロジェクト-表紙.indd
P6 P7 P12 P13 P20 P28 P76 P78 P80 P81 P88 P98 P138 P139 P140 P142 P144 P146 P148 #1 SHORT-TERM INVITATION GROUPS 2012 6 10 6 23 2012 7 17 14 2012 7 17 14 2012 7 8 7 21 2012 7 8 7 21 2012 8 7 8 18
More informationKyushu Communication Studies 第2号
Kyushu Communication Studies. 2004. 2:1-11 2004 How College Students Use and Perceive Pictographs in Cell Phone E-mail Messages IGARASHI Noriko (Niigata University of Health and Welfare) ITOI Emi (Bunkyo
More information第16回ニュージェネレーション_cs4.indd
New Generation Tennis 2014 JPTA ALL JAPAN JUNIOR TENNIS TOURNAMENT U15U13 JPTA ALL JAPAN JUNIOR TENNIS TOURNAMENT U10 20142.21Fri 22Sat 20142.22Sat 23Sun Japan Professional Tennis Association New Generation
More informationVQT3B86-4 DMP-HV200 DMP-HV150 μ μ l μ
-4 DMP-HV200 DMP-HV150 μ μ l μ [DMP-HV200] l [DMP-HV200] l +- l l j j j[dmp-hv200] l l l [DMP-HV200] l l l l [DMP-HV200] l [DMP-HV200] l l [DMP-HV200] l [DMP-HV200] [DMP-HV150] l l Ë l l l l l l l l l
More informationPage 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a
Page 1 of 6 B (The World of Mathematics) November 0, 006 Final Exam 006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (a) (Decide whether the following holds by completing the truth
More information卒業論文2.dvi
15 GUI A study on the system to transfer a GUI sub-picture to the enlarging viewer for operational support 1040270 2004 2 27 GUI PC PC GUI Graphical User Interface PC GUI GUI PC GUI PC PC GUI i Abstract
More information日本ロータリー史
2680 RI ( ) RI 1971 50 1 2 FUKUSHIMA Kisaji 38 1912 Southern Products William 1915 1920 KISOJO 3 1918 10 1919 1920 1 Albert Adams 4 In Japan authority to organize Rotary in Tokyo, its capital, has been
More informationHi. Hello. My name is What s your name? Nice to meet you. How are you? I m OK. Good morning. How are you? I am fine, thank you. My name is. Nice to me
- 8 - English Day 10 Discover Japan 11 12 Hi. Hello. My name is What s your name? Nice to meet you. How are you? I m OK. Good morning. How are you? I am fine, thank you. My name is. Nice to meet you. ere
More informationWebster's New World Dictionary of the American Language, College Edition. N. Y. : The World Publishing Co., 1966. [WNWD) Webster 's Third New International Dictionary of the English Language-Unabridged.
More information(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1
(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding
More informationRadiation induced colour centres in vitreous systems Stevels, J.M. Published in: Yogyo Kyokaishi Gepubliceerd: 01/01/1967 Document Version Uitgevers PDF, ook bekend als Version of Record Please check the
More information-5 DMP-BV300 μ μ l μ l l +- l l j j j l l l l l l l l l l l l l Ë l l l l l l l l l l l l l l l l l l l l l l l BD DVD CD SD USB 2 ALL 1 2 4 l l DETACH ATTACH RELEASE DETACH ATTACH DETACH ATTACH RELEASE
More information137. Tenancy specific information (a) Amount of deposit paid. (insert amount of deposit paid; in the case of a joint tenancy it should be the total am
13Fast Fair Secure PRESCRIBED INFORMATION RELATING TO TENANCY DEPOSITS* The Letting Protection Service Northern Ireland NOTE: The landlord must supply the tenant with the Prescribed Information regarding
More informationA B C B C ICT ICT ITC ICT
ICT Development of curriculum for improving of teachers ICT based on evaluation standards. Kazuhiko ISHIHARA Abstract Ministry of Education and Science announced Checklist of teacher s ICT in March,. All
More informationAnswers Practice 08 JFD1
Practice 8 Sentence Connectors 1) I / went / to Japan / for the first time last year. At first, I didn t understand / Japanese / *at all. [ ] [ ] [ ] [ ] * 2) I m / not hungry / because I *already ate
More informationVE-GP32DL_DW_ZA
VE-GP32DL VE-GP32DW 1 2 3 4 5 6 1 2 3 4 1 1 2 3 2 3 1 1 2 2 2006 Copyrights VisionInc. @. _ & $ % + = ^ @. _ & $ % + = ^ D11 D12 D21
More informationuntitled
1 20002030?? 2001~05 2006~10 2011~15 2016~20 2021~25 2026~30 2031~35 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 11 12 12 13 13 14 14 15 15 16 16 17 17 18 18 19 19 20 20 21 6.18 4.29 3.22 2.82 2.71 21 22
More informationVE-GD21DL_DW_ZB
V E-G D21D L V E-G D21D W 1 2 3 4 1 2 1 2 1 2 2 1 2 3 1 2 3 1 2 3 1 4 4 2 3 5 5 1 2 3 4 1 2 3 1 2 3 4 1 2 3 2006 Copyrights VisionInc. @. _ & $ % + = ^ 2011
More information05[ ]櫻井・小川(責)岩.indd
J-POP The Use of Song in Foreign Language Education for Intercultural Understanding: An Attempt to Employ a J-POP Covered in Foreign Languages SAKURAI Takuya and OGAWA Yoshiyuki This paper attempts to
More informationWarm Up Topic Question Who was the last person you gave a gift to? 一番最近誰にプレゼントをあげましたか? Special Topics2
This week is talking to about what to get for Tina's birthday, which is coming up in July. Lesson Targets Deciding on someone s birthday present 誰かの誕生日プレゼントを決める Giving advice Daily English Conversation
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More information日本版 General Social Surveys 研究論文集[2]
Implementing a Social Networks Module in the Japanese General Social Surveys (JGSS): Results of the Pre-test Keiko NAKAO, Ken ichi IKEDA, and Satoko YASUNO The project of Japanese General Social Surveys
More information先端社会研究 ★5★号/4.山崎
71 72 5 1 2005 7 8 47 14 2,379 2,440 1 2 3 2 73 4 3 1 4 1 5 1 5 8 3 2002 79 232 2 1999 249 265 74 5 3 5. 1 1 3. 1 1 2004 4. 1 23 2 75 52 5,000 2 500 250 250 125 3 1995 1998 76 5 1 2 1 100 2004 4 100 200
More information2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last
1 北陸大学 紀要 第33号 2009 pp. 173 186 原著論文 バーチャル世界における呼びかけ語の コミュニケーション機能 ポライトネス理論の観点からの考察 劉 艶 The Communication Function of Vocative Terms in Virtual Communication: from the Viewpoint of Politeness Theory Yan
More informationSocial ecology is based on looking rather than on analysis It is based on perception This I submit distinguishes it what is normally meant by a science. It is not only that it can not be reductionist.
More informationTitle 社 会 化 教 育 における 公 民 的 資 質 : 法 教 育 における 憲 法 的 価 値 原 理 ( fulltext ) Author(s) 中 平, 一 義 Citation 学 校 教 育 学 研 究 論 集 (21): 113-126 Issue Date 2010-03 URL http://hdl.handle.net/2309/107543 Publisher 東 京
More informationuntitled
VQT3B82-1 DMP-BDT110 μ μ μ 2 VQT3B82 ÇÕÇ¹Ç Ç +- VQT3B82 3 4 VQT3B82 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ij SD 1 2 3 4 5 6 7 8 Í VQT3B82 5 BD DVD CD SD USB 6 VQT3B82 2 ALL 1 2 4 VQT3B82 7
More information2013 Vol.1 Spring 2013 Vol.1 SPRING 03-3208-2248 C O N T E N T S 2013 03-3208-2248 2 3 4 7 Information 6 8 9 11 10 73 94 11 32 37 41 96 98 100 101 103 55 72 1 2 201345135016151330 3 1 2 URL: http://www.wul.waseda.ac.jp/clib/tel.03-3203-5581
More informationL3 Japanese (90570) 2008
90570-CDT-08-L3Japanese page 1 of 15 NCEA LEVEL 3: Japanese CD TRANSCRIPT 2008 90570: Listen to and understand complex spoken Japanese in less familiar contexts New Zealand Qualifications Authority: NCEA
More informationForCustomer_rDNS_EC2 _Request_ update[1]
AWS EC2 E メール上限緩和 / 逆引き (rdns) 設定申請 順 1. Amazon EC2 E メール上限緩和申請 2. 逆引き (rdns) 設定申請 3. Amazon EC2 E メール上限緩和 + 逆引き設定 4. 逆引き (rdns) 設定解除申請 AWS サポート 2016/6 (2017/8 修正版 ) AWS EC2 E メール上限緩和 / 逆引き (rdns) 設定申請
More information189 2015 1 80
189 2015 1 A Design and Implementation of the Digital Annotation Basis on an Image Resource for a Touch Operation TSUDA Mitsuhiro 79 189 2015 1 80 81 189 2015 1 82 83 189 2015 1 84 85 189 2015 1 86 87
More informationBuilding a Culture of Self- Access Learning at a Japanese University An Action Research Project Clair Taylor Gerald Talandis Jr. Michael Stout Keiko Omura Problem Action Research English Central Spring,
More information1 G 01
2008 No.40 7 Yokohama National University 1 G 01 02 TOPICS 2 03 3 019.9 HI 000999 200299 210219 213 213.7 04 TOPICS 4 05 5 06 TOPICS 6 07 7 TOPICS 7 8 9 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
More informationGP05取説.indb
E -G V P 05D L V E -G P 05D W Ni-MH + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 1 + 2 + 3 + 4 + 5 + 6 1 2 3 4 5 6 + + + 1 + + + + + + + + + + + + + + + + + + 1 A B C + D + E
More information2. 投稿マニュアル.xlsm
User ID とパスワードを入力し Log In をクリックして下さい User ID:SPring- 8 ユーザーカード番号 (7 桁 ) パスワード : このシステム利用のため登録されたパスワード Enter your user ID and password. AAer that, click Log In. User ID:SPring- 8 User Card No. (7 - digit)
More information2015 8 65 87. J. Osaka Aoyama University. 2015, vol. 8, 65-87. 20 * Recollections of the Pacific War in the eyes of a school kid Hisao NAGAOKA Osaka Aoyama Gakuen Summary Seventy years have passed since
More informationA5 PDF.pwd
Kwansei Gakuin University Rep Title Author(s) 家 族 にとっての 労 働 法 制 のあり 方 : 子 どもにとっての 親 の 非 正 規 労 働 を 中 心 に Hasegawa, Junko, 長 谷 川, 淳 子 Citation 法 と 政 治, 65(3): 193(825)-236(868) Issue Date 2014-11-30 URL
More informationWebサービス本格活用のための設計ポイント
The Web Services are a system which links up the scattered systems on the Internet, leveraging standardized technology such as SOAP, WSDL and UDDI. It is a general thought that in the future business enterprises
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationIntroduction to Information and Communication Technology (a)
Introduction to Information and Communication Technology (a) 5 th week: 1.4 Transmission, exchange and evaluation of information Kazumasa Yamamoto Dept. Computer Science & Engineering Introduction to ICT(a)
More informationuntitled
-1- -2- -3- -4- -5- OPERATION 44.4% 20.4% 14.8% 20.4% RECEIVING OPERATION CALLING OTHERS -6- (Evaluation) (Synthesis) (Analysis) (Application) (Comprehension) (Knowledge) -7- Level 3 Level 2 Level 1 Level
More informationVol92.indd
年男年女インタビュー ベイタウン野鳥物語 With the holidays coming to an abrupt end, let us not forget the true meaning they provide. There is a certain spirit that people attain during the holidays. The "Holiday spirit" comes
More information