![会计信息系统12版英文教辅资源rais12-IM-CH05GE_第1页](http://file4.renrendoc.com/view/923576e71bc66b657a02bc8284c5f08c/923576e71bc66b657a02bc8284c5f08c1.gif)
![会计信息系统12版英文教辅资源rais12-IM-CH05GE_第2页](http://file4.renrendoc.com/view/923576e71bc66b657a02bc8284c5f08c/923576e71bc66b657a02bc8284c5f08c2.gif)
![会计信息系统12版英文教辅资源rais12-IM-CH05GE_第3页](http://file4.renrendoc.com/view/923576e71bc66b657a02bc8284c5f08c/923576e71bc66b657a02bc8284c5f08c3.gif)
![会计信息系统12版英文教辅资源rais12-IM-CH05GE_第4页](http://file4.renrendoc.com/view/923576e71bc66b657a02bc8284c5f08c/923576e71bc66b657a02bc8284c5f08c4.gif)
![会计信息系统12版英文教辅资源rais12-IM-CH05GE_第5页](http://file4.renrendoc.com/view/923576e71bc66b657a02bc8284c5f08c/923576e71bc66b657a02bc8284c5f08c5.gif)
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Page1of23
CHAPTER5
COMPUTERFRAUD
Instructor’sManual
LearningObjectives:
1.Explainthethreatsfacedbymoderninformationsystems.
2.Definefraudanddescribetheprocessonefollowstoperpetuatea
fraud.
3.Discusswhoperpetratesfraudandwhyitoccurs,includingthe
pressures,opportunities,andrationalizationsthatarepresent
inmostfrauds.
4.Definecomputerfraudanddiscussthedifferentcomputerfraud
classifications.
5.Explainhowtopreventanddetectcomputerfraudandabuse.
Jasonanticipatedthefollowingquestionsthatmanagementwasgoingto
ask:
1.Whatconstitutesafraud,andisthewithholdingproblemafraud?
2.Howwasthefraudperpetrated?WhatmotivatedDontocommitit?
3.Whydidthecompanynotcatchthesemistakes?Wasthereabreakdownincontrols?
4.Howcanthecompanydetectandpreventfraud?
5.Howvulnerableisthecompany’scomputersystemtofraud?
Introduction
Oursocietyhasbecomeincreasinglydependentonaccountinginformation
systems.
Assystemcomplexityandourdependenceonsystemsincrease,companies
facethegrowingriskoftheirsystemsbeingcompromised.
Arecentsurveydisclosedthat
1.67percentofcompanieshadasecuritybreach
2.Morethan45percentweretargetedbyorganizedcrime
3.60percentreportedfinanciallosses
ThefourtypesofthreatsacompanyfacesareexplainedinTable5-1on
page142.
Page2of23
LearningObjectiveOne
Explainthethreatsfacedbymoderninformation
systems.
AISThreats
FourTypesofSystemsThreats:
1.Naturalandpoliticaldisasters
2.Softwareerrorsandequipmentmalfunctions
3.Unintentionalacts
4.Intentionalacts(computercrimes)
1.Naturalandpoliticaldisasters
Fires,excessiveheat,floods,earthquakes,highwinds,war,
andattacksbyterrorists
▪WorldTradeCenterinNewYorkCity
▪FloodinChicago
▪HeavyrainsinMississippiandMissouriRivers
▪EarthquakesinLosAngelesandSanFrancisco
▪Attacksongovernmentinformationsystemsbyforeigncountries,espionageagents,andterrorists
2.SoftwareErrorsandEquipmentMalfunctions
Lossesduetosoftwarebugsareatalmost$60billiona
year.
Morethan60percentofthecompaniesstudiedhad
significantsoftwareerrorsinthepreviousyear.For
example,
▪BugsinnewtaxaccountingsystemweretoblameforCalifornia’sfailuretocollect$635millioninbusinesstaxes.
▪Therehavebeenanumberofmassivepowerfailuresthathavelefthundredsofthousandsofpeopleandmanybusinesseswithoutpower.
Page3of23
▪AsoftwarebuginBurgerKing’ssoftwareresultedina$4,334.33debitcardchargeforfourhamburgers.Thecashieraccidentallykeyedinthe$4.33chargetwice.
3.UnintentionalActs
TheComputingTechnologyIndustryAssociationestimates
thathumanerrorscause80percentofsecurityproblems.
ForresterResearchestimatesthatemployeesunintentionally
createlegal,regulatory,orfinancialrisksin25percent
oftheiroutbounde-mails.
Programmersmakelogicerrors.Examplesincludethe
following:
▪InJapan,adataentryclerkatMizuhoSecuritiesmistakenlykeyedinasalefor610,000sharesofJ-Comfor1yeninsteadofthesaleof1sharefor610,000yen.Theerrorcostthecompany$250million.
▪Abankprogrammermistakenlycalculatedinterestforeachmonthusing31days.Resultedinmorethan$100,000inexcessinterestpaid.
▪AnerrorinaFannieMaespreadsheetresultedina$1.2billionmisstatementofitsearnings.
▪UPSlostacardboardboxwithcomputertapescontaininginformation,suchasnames,SocialSecuritynumbers,accountnumbers,andpaymenthistorieson3.9millionCitigroupcustomers.
▪TreasuryDepartmentmistakeininterestrate8.67percentthatshouldhavebeen6.87percent.Thiswascaughtbeforethechecksweresentout;couldhaveresultedinoverpaymentsofmorethan$14million.
NotetoInstructor:Thefollowingexampleisnotinthe11th
editionofthisbook.However,itwasinthe10theditionof
thebook.
▪AdataentryclerkatGiantFoodmistakeinquarterlydividend$2.50shouldbe$0.25.Resultedin$10millioninexcessdividends.
4.IntentionalActs(ComputerCrimes)
Themostfrequenttypeofcomputercrimeisfraud.Thisis
wheretheintentistostealsomethingofvalue.
Page4of23
Thethreatcanalsobeintheformofsabotage,inwhich
theintentistodestroyorharmasystemorsomeofits
components.
Informationsystemsareincreasinglyvulnerabletoattack.
Inarecentthree-yearperiod,thenumberofnetworksthat
werecompromisedrose700percent.
Exampleofsecuritybreaches,considerthecaseof
OpenTable,
designits
arestaurantreservationservicethatdidnot
cookieproperly.
AcookieisdatathatWebsitesstoreonyourcomputer.
ThecookieidentifiestheWebsitestoyourcomputer
andidentifiesyoutotheWebsitesoyoudonothave
tologoneachtimeyouvisitthesite.
AtOpenTable,thecustomernumberstoredinthe
cookiewasveryeasytochange.
Anexperiencedprogrammeropenedanaccountat
OpenTableand,inlessthananhour,wrotea
programthatcycledthroughallthecustomer
numbersanddownloadedmostofthecompany’s
database.
MultipleChoice1
Operatingsystemcrashesisanexampleof:
a.naturalandpoliticaldisasters
b.intentionalacts
c.unintentionalacts
d.softwareerrorsandequipmentmalfunctions
LearningObjectiveTwo
Definefraudanddescribetheprocessonefollows
toperpetuateafraud.
INTRODUCTIONTOFRAUD
Fraudisanyandallmeansapersonusestogainanunfair
advantageoveranotherperson.Legally,foranacttobe
consideredfraudulenttheremustbe:
1.Afalsestatement,representation,ordisclosure
2.Amaterialfact,whichissomethingthatinducesaperson
toact
Page5of23
3.Anintenttodeceive
4.Ajustifiablereliance;thatis,thepersonreliesonthe
misrepresentationtotakeanaction
5.Aninjuryorlosssufferedbythevictim
AttemptstoEstimatetheStaggeringLossesfromFraud:
1.TheAssociationofCertifiedFraudExaminersestimates
totalfraudlossesintheUnitedStatestobeabout$660
billionayear.
2.Income-taxfraud(thedifferencebetweenwhattaxpayersowe
andwhattheypaytothegovernment)isestimatedatwell
over$350billiondollarsayear.
3.Fraudinthehealth-careindustryisestimatedtoexceed
$100billionayear.
75to90percentofallcomputercrimesareperpetratedby
insiders.
Fraudperpetratorsarealsoreferredtoaswhite-collarcriminals.
StatementonAuditingStandards(SAS)No.99:
Fraudtakestwoforms
1.Misappropriationofassetsand
2.Fraudulentfinancialreporting
MisappropriationofAssets
Misappropriationofassetsisoftenreferredtoasemployee
fraud
Atypicalemployeefraudhasanumberofimportantelements
orcharacteristics:
1.Thefraudperpetratormustgainthetrustor
confidenceofthepersonorcompanybeingdefrauded.
2.Insteadofaweaponorphysicalforcetocommita
crime,fraudperpetratorsusetrickery,cunning,or
falseormisleadinginformationtoobtainmoneyor
assets.
3.Theyhidetheirtracksbyfalsifyingrecordsorother
information.
4.Fewfraudsareterminatedvoluntarily.Instead,the
fraudperpetratorcontinuesdueto“needorgreed.”
Page6of23
Often,perpetratorsbegintodependonthe“extra”
incomeandgettoapointwheretheycannotaffordto
stop.
Othertimestheymovetoahigherlifestylethat
requiresagreateramountofmoney.
It’satthispointwheretheygetbraver,orshould
wesaymorerelaxed,wheretheperpetratorgets
greedyandstartsstealinglargeramountsofmoney;
thisiswheretheynormallygetcaught.
5.Fraudperpetratorsspendtheirill-gottengains,
usuallyonanextravagantlifestyle.Rarelydothey
saveorinvestthemoneytheytake.Someofthese
highcostluxuriousitemsincludebighomes,fancy
cars,gambling,orjustabigspendertypeperson.
6.Manyperpetratorsthatbecomegreedynotonlystart
takinggreateramountsofmoney,butalsotakethe
moneymoreoften.
7.Aspreviouslymentioned,perpetratorsatsomepoint
startgettingbraverandgrowcarelessor
overconfident.Thisisthepointwheretheycanalso
makeamistakeandgetcaught.
8.Thefraudperpetratorcannotgetawaywithstealing
cashorpropertyforever.Atsomepoint,althoughit
maytakesometime,theyaregoingtogetcaught.
9.Themostsignificantcontributingfactorsinmost
employeefraudsaretheabsenceofinternalcontrols
orfailuretoenforceexistinginternalcontrols.
Afterall,ifapersonthatisalreadydishonestin
hisorhernature;iftheyfindoutthemanagementis
notconcernedaboutinternalcontrols,thenthis
makesitveryeasyforthemtobecomeafraud
perpetratorandstartstealingcashorproperty.
FraudulentFinancialReporting
TheTreadwayCommissiondefinedfraudulentfinancial
reportingasintentionalorrecklessconduct,whetherby
actoromission,thatresultsinmateriallymisleading
financialstatements.
TheTreadwayCommissionstudied450lawsuitsagainst
auditorsandfoundundetectedfraudtobeafactorin
halfofthem.
SomeprimeexamplesareEnron,WorldCom,Tyco,
Adelphia,HealthSouth,GlobalCrossing,andXerox.
Executivescookthebooks,astheysay,byfictitiously
inflatingrevenues,recognizingrevenuesbeforetheyare
Page7of23
earned,closingthebooksearly(delayingcurrentperiod
expensestoalaterperiod),overstatinginventoriesor
fixedassets,andconcealinglossesandliabilities.
TheTreadwayCommissionrecommendedfouractionstoreduce
thepossibilityoffraudulentfinancialreporting:
1.Establishanorganizationalenvironmentthat
contributestotheintegrityofthefinancial
reportingprocess.
2.Identifyandunderstandthefactorsthatleadto
fraudulentfinancialreporting.
3.Assesstheriskoffraudulentfinancialreporting
withinthecompany.
4.Designandimplementinternalcontrolstoprovide
reasonableassurancethatfraudulentfinancial
reportingisprevented.
AstudybytheAssociationofCertifiedFraudExaminersfound
thatmisappropriationofassetsbyemployeesismorethan17
timesmorelikelythanfraudulentfinancialreporting.
SASNo.99:TheAuditor’sResponsibilitytoDetectFraud
SASNo.99requiresauditorsto:
1.Understandfraud.
2.Discusstherisksofmaterialfraudulent
misstatements.
3.Obtaininformation.
4.Identify,assess,andrespondtorisks.
5.Evaluatetheresultsoftheiraudittests.
6.Documentandcommunicatefindings.
7.Incorporateatechnologyfocus.
MultipleChoice2
TheAssociationofCertifiedFraudExaminersestimatestotalfraud
lossesintheUnitedStatestobemorethan
a.$350billionayear
b.$660billionayear
c.$100billionayear
d.$800billionayear
MultipleChoice3
WhichofthefollowingstatementsisFALSE?
a.Foranacttobefraudulenttheremustbeafalsestatement,
representation,ordisclosure.
Page8of23
b.Fraudperpetratorsareoftenreferredtoasmanagementfraud.
c.Misappropriationofassetsisoftenreferredtoasemployee
fraud.
d.SASNo.82wasadoptedin1997.
LearningObjectiveThree
Discusswhoperpetratesfraudandwhyitoccurs,
includingthepressures,opportunities,and
rationalizationsthatarepresentinmostfrauds.
WhoPerpetratesFraudandWhyItOccurs
Perpetratorsofcomputerfraudtendtobeyoungerandpossess
morecomputerknowledge,experience,andskills.
Somehackersandcomputerfraudperpetratorsaremoremotivated
bycuriosity,aquestforknowledge,thedesiretolearnhow
thingswork,andthechallengeof“beatingthesystem.”
Mosthavenopreviouscriminalrecord.
Researchshowsthatthreeconditionsarenecessaryforfraudto
occur:apressure,anopportunity,andarationalization.Thisis
referredtoasthefraudtriangleandisshownasthemiddle
triangleinFigure5-1onpage147.
Pressures
Apressureisaperson’sincentiveormotivationforcommittingthefraud.Thethreecommontypesofpressuresare1)financial,emotional,andlifestyle,whichissummarizedinTable5-2onpage147.Table5-3onpage148providesthepressuresthatcanleadtofinancialstatementfraud.
Opportunities
AsshownintheopportunitytriangleinFigure5-1onpage
147,opportunityistheconditionorsituationthatallows
apersonororganizationtodothreethings:
1.Committhefraud
Mostfraudulentfinancialreportingconsistsofthe
overstatementofassetsorrevenuesorthe
understatementofliabilities,orthefailureto
discloseinformation.
2.Concealthefraud
Page9of23
Acommonandeffectivewaytohideatheftisto
chargethestolenitemtoanexpenseaccount.For
example,chargesuppliestoanexpenseaccountwhen
theyareinitiallypurchased;beforetheyareused.
Thisallowstheperpetratortheopportunitytouse
someofthesuppliesforpersonalbenefitatthe
expenseofthecompany.Theseunusedsuppliesshould
havebeenrecordedasanassetcalledSuppliesuntil
theyareused.
Anotherwaytohideadecreaseinassetsisby
lapping.Inalappingscheme,theperpetratorsteals
thecashorcheckthatcustomerAmailsintopayits
accountsreceivable.Fundsreceivedatalaterdate
fromcustomerBareusedtopayoffcustomerA’s
balance.FundsfromcustomerCareusedtopayoff
customerB,andsoforth.
Inakitingscheme,theperpetratorcoversupatheft
bycreatingcashthroughthetransferofmoney
betweenbanks.Forexample,supposeafraud
perpetratoropenscheckingaccountsinthreebanks,
calledbankA,B,andC,anddeposits$100ineach
account.Thentheperpetrator“creates”cashby
depositinga$1,000checkfrombankAintobankBand
thenwithdrawsthe$1,000frombankB.Ittakestwo
daysforhischecktoclearbankA.Becausethereare
insufficientfundsinbankAtocoverthe$1,000
check,theperpetratordepositsa$1,000checkfrom
bankCtobankAbeforehischecktobankBclears
bankA.BecausebankCalsohasinsufficientfunds,
$1,000mustbedepositedtobankCbeforethecheck
tobankAclears.ThechecktobankCiswrittenfrom
bankB,whichalsohasinsufficientfunds.Andthe
schemecontinues.Ihavealsoseensituationswhere
kitingalsoincludescreditcardsinwiththeuseof
checkingaccounts.
NotetoInstructor:Becausemostbankswouldrequireyoutodepositsomemoneytostartacheckingaccount,aninitialdepositof$100ineachbankwasincludedabove.Inaddition,thechartsbelowprovideasomewhatpictureexplanationoftheabovekitingscheme.Thechartbelowusesdates,balances,andNSFduedates.
Page10of23
BANKA
#11/11,000check
Bal.-1,000
NSFdueon1/3
1/3+1,000
Bal.-0-
NoNSFDue
BANKB
1,000
1/1Bal.+1,000
#21/2W/D-1,000
Bal.-0-
NoNSFDue
#41/51,000check
Bal.-1,000
NSFDue1/7
Deposit+1,0001
PERPETRATOR
1/2+1,000
#31/31,000check
Bal.-1,000
NSFDue1/5
+1,000
Bal.-0-
NoNSFDue
Note#1:Atthispointtheperpetratormaywanttodepositthe$1,000hehashadfor5days(1/2
through1/6),onthemorningof1/7andstartoveragainwithBankA.
Legend:W/D=withdrawscashNSF=nonsufficientfundsBal.=balance
BANKC
3.ConverttheTheftorMisrepresentationtoPersonalGain
Inemployeefraud,allfraudperpetratorsgothroughtheconversionphaseunlessthey
stealactualcashthatcanbespentorusetheassetpersonally.
Table5-4onpage149listssomeofthemorefrequentlymentionedopportunitiesthat
permitemployeeandfinancialstatementfraud.
Opportunitiesforfraudoftenstemfrominternalcontrolfactors.
Acontrolfeaturemanycompanieslackisabackgroundcheckonallpotentialemployees.
Page11of23
[Thispageisleftblankintentionally]
Rationalizations
Rationalizationallowsperpetratorstojustifytheirillegal
behavior.
Alistofsomeoftherationalizationspeopleuse:
1.Iamonly“borrowing”themoney(orasset)andwill
repaymy“loan.”
2.YouwouldunderstandifyouknowhowbadlyIneeded
it.
3.WhatIdidwasnotthatserious.
4.Itwasforagoodcause(theRobinHoodsyndrome,
robbingfromtherichtogivetothepoor).
5.Ioccupyaveryimportantpositionoftrust.Iam
abovetherules.
6.Everyoneelseisdoingit,soitisnotthatwrong.
7.Noonewilleverknow.
8.Thecompanyowesittome,andIamtakingnomore
thanisrightfullymine.
MultipleChoice4
Thethreeconditionsthatarepresentwhenfraudoccursincludes:
a.attitude
b.opportunity
c.lackofcontrol
d.financial
MultipleChoice5
Thepressuresthatcanleadtoemployeefraudinclude
a.fearoflosingjob
b.lackofcontrol
c.poorperformanceratings
d.familyorpeerpressure
e.AandD
MultipleChoice6
Internalcontrolfactorsthatprovideanopportunityforemployeeand
financialstatementfraudincludes
a.incompetentpersonnel
b.operatingonacrisisbasis
c.inadequatesupervision
d.lowemployeemoraleandloyalty
LearningObjectiveFour
Definecomputerfraudanddiscussthedifferent
Page12of23
computerfraudclassifications.
Page13of23
ComputerFraud
TheU.S.DepartmentofJusticedefinescomputerfraudasany
illegalactforwhichknowledgeofcomputertechnologyis
essentialforitsperpetration,investigation,orprosecution.
Morespecifically,computerfraudincludesthefollowing:
1.Unauthorizedtheft,use,access,modification,copying,and
destructionofsoftwareordata
2.Theftofmoneybyalteringcomputerrecords
3.Theftofcomputertime
4.Theftordestructionofcomputerhardware
5.Useortheconspiracytousecomputerresourcestocommita
felony
6.Intenttoillegallyobtaininformationortangibleproperty
throughtheuseofcomputers
TheAssociationoftheCertifiedFraudExaminersprovidesthe
generaldefinitionofcomputerfraud:
Anydefalcationorembezzlementaccomplishedbytamperingwithcomputerprograms,datafiles,operations,equipment,ormediaandresultinginlossessustainedbytheorganizationwhosecomputersystemwasmanipulated.
Anotherdefinitionofcomputercrime:
Inacomputercrime,thecomputerisinvolved—directlyorindirectly—incommittingthecriminalact.Sabotageofcomputerfacilitiesisclassifiedasadirectcomputercrimeandunauthorizedaccessofstoreddataisanindirectcomputercrimebecausethepresenceofthecomputercreatedtheenvironmentforcommittingthecrime.
TheRiseinComputerFraud
Computersystemsareparticularlyvulnerabletocomputercrimes
forthefollowingreasons:
1.Billionsofcharactersofdataarestoredincompany
databases.Peoplewhomanagetobreakintothesedatabases
cansteal,destroy,oraltermassiveamountsofdatain
verylittletime.
2.Organizationswantemployees,customers,andsuppliersto
haveaccesstotheirsystem.Thenumberandvarietyof
theseaccesspointssignificantlyincreasetherisks.
3.Computerprogramsonlyneedtobechangedormodifiedonce
Page14of23
withoutpermissionforthesystemtooperateimproperlyfor
aslongasthesystemisinuse.
4.Modernsystemsutilizepersonalcomputers(PCs),whichare
inherentlymorevulnerabletosecurityrisks.Itis
difficulttocontrolphysicalaccesstoeachnetworkedPC.
Inaddition,PCsandtheirdatacanbelost,stolen,or
misplaced.
5.Computersystemsfaceanumberofuniquechallenges:
reliability(i.e.,accuracy,completeness),equipment
failure,environmentaldependency(i.e.,power,damagefrom
waterorfire),vulnerabilitytoelectromagnetic
interferenceandinterruption,eavesdropping,and
misrouting.
Theincreaseincomputerfraudschemesisduetosomeofthe
followingreasons:
1.Noteveryoneagreesonwhatconstitutescomputerfraud.
2.Manycomputerfraudsgoundetected.
TheFBIestimatedthatonlyonepercentofallcomputer
crimewasdetected;whereasothersestimatedittobe
between5and20percent.
3.Ahighpercentageofuncoveredfraudsarenotreported.
4.Manynetworkshavealowlevelofsecurity.
5.ManyInternetpagesgivestep-by-stepinstructionsonhow
toperpetratecomputercrimesandabuses.
6.Lawenforcementisunabletokeepupwiththegrowing
numberofcomputerfrauds.
7.Thetotaldollarvalueoflossesisdifficulttocalculate.
ComputerFraudClassifications
AsshowninFigure5-2onpage152,onewaytocategorize
computerfraudistousethedataprocessingmodel:input,
processor,computerinstructions,storeddata,andoutput.
Input
Thesimplestandmostcommonwaytocommitfraudistoalter
computerinput.Itrequireslittle,ifanycomputerskills.
Instead,perpetratorsneedonlyunderstandhowthesystem
operatessotheycancovertheirtracks.
Tocommitpayrollfraud,perpetratorscanenterdatato
increasetheirsalary,createafictitiousemployee,orretain
aterminatedemployeeontherecords.
Page15of23
Exampleofinputfraud,aNewYorkbankemployeechangesthe
companydepositslipstoforgeddepositslips.Forthreedays
hedepositedbankdepositsinhispersonalaccount.Thenhe
disappearedandwasnotcaughtasheusedanaliasname.
Therearemoreexamplesonpages152and153.
Processor
Computerfraudcanbecommittedthrou
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 《东元刹车马达》课件
- 《高能束加工》课件
- 《pdg转的方法》课件
- 紫色插画风小学时间管理主题
- 职场晋升述职模板
- 农村重建申请书
- 救灾申请书范文
- 残疾人写申请书
- 大学生创业课项目机会来源
- 小学三年级数学因数中间或末尾有零的乘法能力测试练习题大全附答案
- 别让心态毁了你:受益一生的情绪掌控法
- 人大商学院博士研究生入学考试试题-企业管理历年卷
- CJ/T316-2009《城镇供水服务》(可编辑)
- 学校膳食委员会工作方案
- 2023质量月知识竞赛试题及答案
- 32m现浇简支箱梁施工方案【完整版】
- 中央财政成品油价格调整对渔业补助资金项目实施方案
- 2023-2024新苏教版小学6六年级数学下册(全册)优秀教案
- PFMEA模板完整版文档
- 论生产安全对于家庭的重要性
- 风力发电变桨系统外文翻译
评论
0/150
提交评论