Enviar búsqueda
Cargar
គម្រោងបង្កើតគេហទំព័រអង្គរមាស
•
1 recomendación
•
1,311 vistas
Phannarith Ou, G-CISO
Seguir
This is the proposal t
Leer menos
Leer más
Empresariales
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 37
Descargar ahora
Descargar para leer sin conexión
Recomendados
Robotics
Robotics
Divya Ravali
Arificail Intelligence and robotics
Arificail Intelligence and robotics
Salman Vadsarya
Immersive Learning Environments
Immersive Learning Environments
Leonel Morgado
7 tough brainteasers to test your interviewees’ critical thinking
7 tough brainteasers to test your interviewees’ critical thinking
Coburg Banks Recruitment
Khmer translation about lao pdr
Khmer translation about lao pdr
Pheng Chandara
yi noeunចិត្តអវិជ្ជមាន2
yi noeunចិត្តអវិជ្ជមាន2
Mony Mun
Research method
Research method
Monyoudum Chhun
កិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាល
kongsochet
Recomendados
Robotics
Robotics
Divya Ravali
Arificail Intelligence and robotics
Arificail Intelligence and robotics
Salman Vadsarya
Immersive Learning Environments
Immersive Learning Environments
Leonel Morgado
7 tough brainteasers to test your interviewees’ critical thinking
7 tough brainteasers to test your interviewees’ critical thinking
Coburg Banks Recruitment
Khmer translation about lao pdr
Khmer translation about lao pdr
Pheng Chandara
yi noeunចិត្តអវិជ្ជមាន2
yi noeunចិត្តអវិជ្ជមាន2
Mony Mun
Research method
Research method
Monyoudum Chhun
កិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាល
kongsochet
3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
Phannarith Ou, G-CISO
Understanding NMAP
Understanding NMAP
Phannarith Ou, G-CISO
Reconnaisance
Reconnaisance
Phannarith Ou, G-CISO
Case - How to protect your information
Case - How to protect your information
Phannarith Ou, G-CISO
Case - How to protect your website
Case - How to protect your website
Phannarith Ou, G-CISO
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
Phannarith Ou, G-CISO
Internet Security Policy - Khmer
Internet Security Policy - Khmer
Phannarith Ou, G-CISO
How to Protect Computer From Virus
How to Protect Computer From Virus
Phannarith Ou, G-CISO
How to Secure Your WiFi
How to Secure Your WiFi
Phannarith Ou, G-CISO
Facebook Security in 3 Ways
Facebook Security in 3 Ways
Phannarith Ou, G-CISO
Understanding Keylogger
Understanding Keylogger
Phannarith Ou, G-CISO
Exchange Server 2003
Exchange Server 2003
Phannarith Ou, G-CISO
Network Security with ISA Server 2006
Network Security with ISA Server 2006
Phannarith Ou, G-CISO
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
Phannarith Ou, G-CISO
Secure System Development Proposal
Secure System Development Proposal
Phannarith Ou, G-CISO
How to know you was hacked
How to know you was hacked
Phannarith Ou, G-CISO
ូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
Phannarith Ou, G-CISO
Understanding Malware by BBU Student
Understanding Malware by BBU Student
Phannarith Ou, G-CISO
Heartbleed vulnerability
Heartbleed vulnerability
Phannarith Ou, G-CISO
P12 r202t8 05-spam
P12 r202t8 05-spam
Phannarith Ou, G-CISO
Más contenido relacionado
Más de Phannarith Ou, G-CISO
3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
Phannarith Ou, G-CISO
Understanding NMAP
Understanding NMAP
Phannarith Ou, G-CISO
Reconnaisance
Reconnaisance
Phannarith Ou, G-CISO
Case - How to protect your information
Case - How to protect your information
Phannarith Ou, G-CISO
Case - How to protect your website
Case - How to protect your website
Phannarith Ou, G-CISO
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
Phannarith Ou, G-CISO
Internet Security Policy - Khmer
Internet Security Policy - Khmer
Phannarith Ou, G-CISO
How to Protect Computer From Virus
How to Protect Computer From Virus
Phannarith Ou, G-CISO
How to Secure Your WiFi
How to Secure Your WiFi
Phannarith Ou, G-CISO
Facebook Security in 3 Ways
Facebook Security in 3 Ways
Phannarith Ou, G-CISO
Understanding Keylogger
Understanding Keylogger
Phannarith Ou, G-CISO
Exchange Server 2003
Exchange Server 2003
Phannarith Ou, G-CISO
Network Security with ISA Server 2006
Network Security with ISA Server 2006
Phannarith Ou, G-CISO
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
Phannarith Ou, G-CISO
Secure System Development Proposal
Secure System Development Proposal
Phannarith Ou, G-CISO
How to know you was hacked
How to know you was hacked
Phannarith Ou, G-CISO
ូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
Phannarith Ou, G-CISO
Understanding Malware by BBU Student
Understanding Malware by BBU Student
Phannarith Ou, G-CISO
Heartbleed vulnerability
Heartbleed vulnerability
Phannarith Ou, G-CISO
P12 r202t8 05-spam
P12 r202t8 05-spam
Phannarith Ou, G-CISO
Más de Phannarith Ou, G-CISO
(20)
3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
Understanding NMAP
Understanding NMAP
Reconnaisance
Reconnaisance
Case - How to protect your information
Case - How to protect your information
Case - How to protect your website
Case - How to protect your website
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
Internet Security Policy - Khmer
Internet Security Policy - Khmer
How to Protect Computer From Virus
How to Protect Computer From Virus
How to Secure Your WiFi
How to Secure Your WiFi
Facebook Security in 3 Ways
Facebook Security in 3 Ways
Understanding Keylogger
Understanding Keylogger
Exchange Server 2003
Exchange Server 2003
Network Security with ISA Server 2006
Network Security with ISA Server 2006
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
Secure System Development Proposal
Secure System Development Proposal
How to know you was hacked
How to know you was hacked
ូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
Understanding Malware by BBU Student
Understanding Malware by BBU Student
Heartbleed vulnerability
Heartbleed vulnerability
P12 r202t8 05-spam
P12 r202t8 05-spam
គម្រោងបង្កើតគេហទំព័រអង្គរមាស
1.
MO www.angkormeas.com
2.
3.
I MO www.angkormeas.com
4.
II
5.
III 7 7 7 8 .....................................................................................8 8 9 9 10 11 11 11 11 11 12 .............................................................................................12 12 12 12 12
6.
IV 12 12 13 18 18 18 18 19 19 19 20 20 21 21 21
7.
V 10 11 11 14 15 16 17 18
8.
1
9.
2
10.
3
11.
4
12.
5 ) ) Web Email Sub Domains Web
Mail 100 Daily Back Up 20
13.
6
14.
7
15.
8
16.
9
17.
10
18.
11
19.
12 PeopleOrMachine Days Unit
Price Subtotal I. Workshop Attendance 3 2 $15 $90 LCD 1 1 1 $200 $200 Designer 1 $100 $100 Programmer 1 $200 $200 III. Training and Support Trainee 2 2 $15 $60 Computer 1 $20 $20 1 0 Grand Total $980 Month1 Month2 Week1Week2Week3Week4Week1Week2 Gathering&Consultancy
20.
13
21.
14
22.
15
23.
!កុម%រ'បចំ(និសិ.តជំ12!គប់!គងព័ត៌9នវិទ< ជំ1ន់ទី១១) ! " "
" ! " ស$%&&ចរ&)*&នំៈ អ៊ូ ផន់ណរ5ទ្! ១-ណំ ពុទ<&! ២-ម៉ុន មស! ៣-ហ៊ុន សរD!
24.
! អំពីគំ@Aង ! រច1សមB័នCេគហទំព័រ !
បេចFកេទសកGុងHររច1េគហទំព័រ ! Hររច1េគហទំព័រ ! ថវិHរJសGKរសុំគ@!9ង ! រយៈេពលៃនHរអនុវតPន៍គ@!9ង ! យុទCR!សS!បកួត!បែជង និង ផ.ពWផXយ ! ឯកRរ@Zង មតិករ&
25.
អំពីគំ@Aង! ១ @[លបំណងៃនគំ@Aង! •
'ើម*+ីឲ*.មនករ0្ើទីផ*4 5ើបណ8*ញ អ៊<នធឺ?*ត ( ) សំរួលឲ*.មនករDEកចំDEន និង ផ*Iព្ផ*4យនូវផលិតផល & • សំរួលឲ*.អតិថិជន ឬQ R*ិយមិត្ អចQផ*Iព្ផ*4យQទំនិញផV*ល់ខ្Zន( )& • អចផ្ល់ឱកសករងរQដល់បុគ្លិក ឬ ភb*ក់ងរcើង& • ផ្ល់ទំននុលចិត្ដល់អតិថិ& • បd្ើតឲ*.មនករទិញលក់f*បច*gប់ និង សុវត្ិភពចំhះអ្កលក់ និង អ្កទិញ& • ផ្ល់អត្R*lជន៍ដល់អតិថិជន ឬ n*ុមហ៊ុនp*លបនផ*Iព្ផ*4យ rយ ឥតគិតt្*ក្uង លក្័ណកំណត់របស់ពួកcើង ។& • ផ្ល់ឲ*.មនករDEកចំDEនទំងពួកcើង និង ទំងn*ុមហ៊ុន {*មទំងអតិថជនក្uងស}*រតី សមគ្ីភព ក្uងករអភិវឌ*Äន៍R*Å*សជតិ ។& &
26.
២ @[ល^_ៃនគ@!9ង! • É្*ងរកអតិថិជន'ើម*+ីឲ*.មនករផ*Iព្ផ*4យពQណិជ្កម្5ើá*ហទំព័ររបស់ cើង
។& • ទញយកថវàករពីក្uងករផ*Iព្ផ*4យពនិជ្កម្ ។& • ឈនäរកករទិញលក់ជលក្ណៈ - ។& • បd្ើតជ & & & សំរប់çé*ទីn*ុងភ្ំè*ញ ចំhះករDៀបចំករលក់& ករផ*4ព្ផ*4យទូរទំងR*Å*ស ។& ៣ @[ល^_អតិថិជន!
27.
៤ វិធីR!សSកGុងHរJលKកកំពស់ េគហទំព័រ!1-បd្ើតបណ8*ញទំនក់ទំនងសង្ម ដូចជ
í្*សប៊ុក ( )& & 2-ករផ*Iព្ផ*4យតមរយៈបណ8*រថយន្n*ុង ម៉ូតូតុកតុក តកសុី ï*I*ងៗ &
28.
៥ ខeឹមRរៃនគ@!9ង! ខ្ឹមសរសំខន់ៗ ô*គö**ង
õះគឺ ផ*4ព្ផ*4យ នូវផលិតផល និង ទំនិញ p*ល n*ុមហ៊ុន រú អ្កចង់លក់ផលិតផល បន រú ផ*Iព្ផ*4យ äដល់អតិថិជន រú អ្ក p*លមនតំរូវករអច ចូលÉ្*ងរក ចូលùើលនូវ5ើ á*ហទំព័រ ។ & ៦ J!ជKសJរKស Domain'Name'និង Hos,ng!• www.angkormeas.com.kh តំû* $20 & • Hos,ng តü្* $30 & ទំហំផhុងកឯកRរ(Disk'Space)& 2'GB& HរេផhរទិនG័យកGុងមួយែខ(Bandwidth'Per'Month)& 20GB& Web'Email& Unlimited& Sub'Domains& Unlimited& Web'Mail'& 100& Daily'Back'Up& Unlimited& ijេបស(MySQL)& 20&
29.
ចំ†*កឯរចនសម្័ន្á*ហទំព័ររបស់ អង្រមស បនDៀបចំ§យមន៖& រច1សមB័នCេគហទំព័រ! អងkរ9ស ទំព័រJដKម
ចលនៈ!ពទm Zនជំនិះ របស់J!បK!oស់ p!គqងេអឡិច!តូនិច Register អំពីពួកJយKង " ចលនៈ¶*ទ*. គឺជទំព័រមន៖ និង & " យនជំនិះ គឺជទំព័រp*លមន៖ និង & " p!គqងេអឡិច!តូនិច:!tទំព័រែដល9ន៖Phone និង Computer!& : គឺជទំព័រ p*លអច§យcើង អច ®*©** កំណត់ ផ្ល់សិទ្ លុប ប´្≠ល មន លក្ណៈï*I*ងៗ ។&
30.
១ កមvវិធិJ!បK!oស់ • ចំhះលក្ណៈពិÆ*សរបស់Ø∞*បសយ
គឺវអចùើលបន≤*ប់កម្វàធី និង ≤*ប់ឧបករណ៍ ពី¥**ះវមនលក្ណៈ អចùើលបន & ២ កមvវិធិJ!បK!oស់ Q ចំhះករDៀបចំQ និង Ø∞*បសយµ*ះ∂ើងគឺ∑*∏វបនយកកម្វàធីមួយចំនួនមក ចូលរួមp*លរួមកម្វàធី ៖& 5 & 2.2 គឺជកម្វàធីសំរប់ នូវ Q រួមមន៖& – 2.2.22 & – 5.3.13& – 3.4.10.1 & 5 គឺជកម្វàធីសំរប់ រូបភពï*I*ងៗ& គឺជកម្វàធីសំរប់ចប់ពណ៌ï*I*ងៗp*លcើងចង់បន & ៣ ឧបករណ៍J!បK!oស់ស!9ប់JបKកេគហទំព័រ , , , , , , ទូរស័ព្R*º*ទ ( , , , , , .) , ។& បេចFកេទសកGុងHររច1េគហទំព័រ! !
31.
Hររច1េគហទំព័រ! គ!មូបeង់េគហទំព័រ
32.
33.
ថវិHរJសGKរសុំគ@!9ង! ' People'Or'Machine Days
Unit'Price Subtotal I.'Workshop ''''AKendance 3 2 $15 $90 ''''LCD 1 2 $15 $30 ''''Building 1 2 $60 $120 II.'Website'Development ''''Analysis 1 ! $200 $200 ''''Designer 1 ! $100 $100 ''''Programmer 1 ! $200 $200 III.'Training'and'Support ''''Trainee 2 2 $15 $60 ''''Computer 3 2 $15 $90 Data'Entry 2 2 $20 $40 IV.'Domain'and'Hos,ng ''''Domain 1 ! $20 $20 ''''Hos,ng 1 ! $30 30 Grand'Total $980
34.
! Month1 Month2 Week1
Week2 Week3 Week4 Week1 Week2 Week3 Week4 Collect!InformaEon ! ! ! ! ! ! ! ! Gathering!&!Consultancy ! ! ! ! ! ! ! ! Project!Design ! ! ! ! ! ! ! ! Template!Design ! ! ! ! ! ! ! ! Content!Gathering ! ! ! ! ! ! ! ! Web!Develop ! ! ! ! ! ! ! ! TesEng!&!Debug ! ! ! ! ! ! ! ! Develop!User!Manual ! ! ! ! ! ! ! ! Training ! ! ! ! ! ! ! ! Entry!Data ! ! ! ! ! ! ! ! Upgrade!&!Maintenance ! ! ! ! ! ! ! ! រយៈេពលៃនHរអនុវតPន៍គ@!9ង!
35.
១ ដំxក់Hលដំបូង – %រ'បចំ@yយ9នHរផ.ពWផXយឥតគិតៃថeកGុងដំxក់Hលដំបូង
JដKម{ី@yយ អតិថិជនR|ល់oនJ!ចKនtមុនសិន! – !តូវJធWKHរផ.ពWផXយjមរយៈបx}ញសងkម ដូចt Facebook!,!TwiSer,…! – JធWKHរផ.ពWផXយjមរយៈRរពត៌9ន ទស.1វដPី ! – ែចកខិតបណព័ត៌9ន ! – iក់ Link!^ÄJលKេគហទំព័រព័ត៌9ន េគហទំព័រផ.ពWផXយេផ.ងៗ! ២ ដំxក់Hលប1Çប់(បែនÉមនូវចំនុចÑងJល█) – %រ'បចំ@yយ9នHរផ.ពWផXយ គិតៃថe ចំ@Öះចំនួនែដលoនកំណត់! – JធWKHរផ.ពWផXយjមម៉ូតូតុកតុក áន!កុង និង Taxi!! 'យុទCR!សS!បកួត!បែជង និង ផ.ពWផXយ!
36.
! ឯកសរù*Dៀនរបស់ Ωកសæø**ចរ*.
អ៊ូ âន់xរិទC ! á*ហទំព័រ . & ! ឯកសរ¿្*កច*gប់0្ើកិច្សន*¡ របស់Ωក ស សូវ¬*ន (បណ√ិតច*gប់ R*Å*សបរំង)& ! Æៀវƒសរណរបស់n*ុមនិសិ*Iត និស*Iិត ≈ៀល∆**យ ជំនន់ទី០៩& (គំ…ង វàបសយ)& ឯកRរ@Zង! !
37.
សំនួរ និង ចJមeKយ!
Descargar ahora