ࡱ> } $?bjbj55 4v__5 3L L 8'd|A_:AAAA ^^^^^^^)ac^G G G ^AA^{&{&{&G AA^{&G ^{&{&NlX}^<]Aś, 0Z0^_0A_`Zad!ad`<]ad<]h{&T< ^^$A_G G G G adL U: California State University -- Northridge Instructor: C. Robert Putnam Office Hours:  HYPERLINK "http://python.ecs.csun.edu/compsci/faculty/putnam.html" http://python.ecs.csun.edu/compsci/faculty/putnam.html Office: EN 4442 Phone: 818/ 677-3539 E-Mail:  HYPERLINK "mailto:cputnam@csun.edu" cputnam@csun.edu Web Page:  HYPERLINK "http://www.ecs.csun.edu/~cputnam" www.ecs.csun.edu/~cputnam Course Description: This course is an introduction to the operational aspects of personal computers and their common home and small business applications. No prior knowledge or prerequisite class work is needed for entrance to this class. The survey of personal computer hardware is designed to acquaint the student with basic operational theories and the variety of equipment used to support an individual system. The course uses computer systems built around the Intel processor using Microsoft operating systems and the following application packages: MS Word processing, Excel spreadsheet, Access database management, PowerPoint presentation system and Internet Explorer browser. Prerequisites: None COMP 100 Course Objectives General Outline Comp 100 is part of Section E of the General Education Code. The general goal of Section E is to have the student understand how human beings function in technological, cultural and social environments. Through the study of applied arts and science, students should become more integrated and well-rounded individuals. As such, the student should be able to do and have knowledge of all the following elements: Identify and apply behaviors leading to individual well being and development Identify factors leading to community well being and development Describe the roles of science and technology; apply them in daily life situations at the individual and/or community levels. By the end of the semester, students will: Demonstrate knowledge and understanding of basic computer concepts such as computer hardware, software, architecture, networks, ethics, security, and the Internet (see next section for details) Demonstrate file management ability in the MS Windows environment Demonstrate ability to effectively use email Demonstrate ability to conduct effective web-based research Demonstrate working knowledge of word processing using MS Word Demonstrate working knowledge of spreadsheet construction and manipulation using MS Excel Demonstrate working knowledge of database management using MS Access Prepare a presentation with MS PowerPoint Learning Outcomes The student should be able to: Explain the need for computer literacy in todays and tomorrows computer society. Understand and discuss the computers positive and negative effects on society. Discuss current, ethical and social issues associated with computing. Discuss the characteristics of computers that explain why they are so widely used. Distinguish the major types of computers and their principal uses. Name and know the functions of computer hardware and peripheral devices and how they work. Use basic features of the PC operating systems. Distinguish between data and information. Explain how computers represent data (bits and bytes). Identify the main steps of a typical computing process. Explain what a computer is and how it processes data to produce information. Able to write sequential steps to accomplish a task. Explain how to organize and retrieve information on a computer. Select, set up, troubleshoot a home or work computer. Describe and use networks and communications such as e-mail. Able to follow the source of a Web page. Understand use of browsers, search engines and become familiar with Internet resources. Gain a working knowledge of the most widely used software applications (word processing, spreadsheets, PowerPoint presentations and the Internet). Survey During the second week of the semester, students will be given a survey to determine their expertise with computer systems. The survey will be repeated sometime during the last two weeks of the semester. The survey contents will NOT be used for grading purposes; the results will be anonymous and will be used to evaluate course design and teaching methods. An evaluation of the students serious approach to the completion of the survey will be used in the computation of the final grade. Application SAM Tests The students will be expected to score at least 70% on the computer-based tests for MSWord, Excel, Access, and PowerPoint applications. These tests may be repeated multiple times in order to reach or exceed the minimum acceptable score. The tests must be taken in the assigned classroom during scheduled class times. Evaluation Lab Projects (Excel, Access, Word, PowerPoint) 30% SAM Tests (Word, Excel, Access, PowerPoint) 20% Concepts login.course.com Exams 10% Midterm Examinations 1&2 (Concepts) 20% Final Examination (Concepts) 20% 100% Print Quota The School of Engineering has established a print quota for all student accounts. The limit is 75 pages/month; if you exceed that amount, you may very well not be able to print anything from that account until the next month. Storage Quota Students will be able to securely store documents on UBS Memory Sticks, diskettes, Zip drives and on the CSUN system, i.e., the U-drive subsystem. Documents stored on the local computer C drive may be deleted at any time by other students, instructors, and on a regular schedule by system administrators. The School of Engineering has established a storage quota for all student U-drive accounts. The limit is 100MB; if you exceed that amount, you will not be able to store anything else until you delete items from the storage device. Projects Projects may be assigned according to the demonstrated abilities of individual students; different students will be assigned different projects. For each of the disciplines, i.e., MSWord, Excel, Access, and PowerPoint, students will be given a discipline SAM evaluation test to determine their ability. According to the results of the evaluation test, students will be assigned projects appropriate to their ability. Projects will be graded on a zero, 50-70, 80-90, and 90-100 point basis if the project is fundamentally incorrect it will be given zero points if the project contains substantial errors, it will be a score between 50 points and 70 points if the project is substantially correct but contains minor errors, it will be given a score between 80 points and 90 points if the project is correct, it will be given a score between 90 points and 100 points  Provide a cover sheet for each project; it should contain the following information a project number provided by the instructor when the homework is assigned, e.g., #1, #2, etc, your name course identification Comp 100 and Section Number date submitted for each case in the project use a sub-cover sheets, i.e., Cover Sheet, SubCover Sheet, Case, SubCover Sheet, Case, SubCover Sheet, Case, etc. remember to replace all data written in red with the correct data for the project, written in black, e.g., replace John Paul Jones with your name. Absences A maximum of three unexcused absences will be allowed for the entire semester. Roll will be taken at every class session; manually for the first few days and then by tracking your activity during class hours. After 3 unexcused absences, your grade will drop for every additional unexcused absence; e.g., A becomes A-, A- becomes B+, etc. Unannounced Quizes & Participation During selected class meetings there will be unannounced quizzes and/or class discussions concerning homework, concepts and activities. Non-participation will affect your final grade. Cheating Cheating will not be tolerated; any cheating attempt will result in immediate failure for the assignment and possibly for the course. Serious violations may result in referral to the University for disciplinary action. Using another students work product will result in both students receiving an "F" for the assignment. The Universities Code of Conduct will be strictly enforced. Comp 100 Section # 10034 Project #3: Word John Paul Jones 28 August 2005 WD 84 Case 3 Schedule of Activity CSUN System CSUN Account CSUN Email Account CSUN Server U Drive Mapping USB ports Memory Stick SSH -- FTP Discovering Computers (Concepts) Chapters 1-12 CSUN Library Utilization Word Tutorial 1, 2, 3, 4 Excel Tutorial 1, 2, 3, 4, 5 Access Tutorial 1, 2, 3, 4 PowerPoint Tutorial 1, 2, 3 Integration Projects Computer Concepts -- Learning Objectives CHAPTER 1 Recognize the importance of computer literacy Identify the components of a computer Discuss the uses of the Internet and World Wide Web Identify the types of software Describe the categories of computers Identify the types of computer users Discuss various computer applications in society CHAPTER 2 Explain how to access and connect to the Internet Explain how to view pages and search for information on the Web Describe the types of Web sites Describe the types of e-commerce Explain how e-mail, FTP, newsgroups and message boards, mailing lists, chat rooms, and instant messaging work Identify the rules of netiquette Identify the steps required for Web publishing CHAPTER 3 Identify the categories of application software Explain how to start and interact with application software Identify the key features of widely used business programs Identify the key features of widely used graphics and multimedia programs Identify the key features of widely used home, personal, and educational programs Identify the types of application software used in communications Describe the learning aids available for application software CHAPTER 4 Differentiate among various styles of system units Describe the components of a processor and how they complete a machine cycle Define a bit and describe how a series of bits represents data Differentiate among the various types of memory Describe the types of expansion slots and adapter cards Explain the differences among a serial port, a parallel port, a USB port, and other ports Describe how buses contribute to a computers processing speed Identify components in mobile computers and mobile devices CHAPTER 5 List the characteristics of a keyboard Summarize how these pointing devices work: mouse, trackball, touchpad, pointing stick, joystick, wheel, light pen, touch screen, stylus, and digital pen Describe other types of input, including voice input; input devices for PDAs, Tablet PCs, and smart phones; digital cameras; video input; scanners and reading devices; terminals; and biometric input Describe the characteristics of CRT monitors, LCD monitors, and LCD screens Summarize the various types of printers Explain the characteristics of speakers and headsets, fax machines and fax modems, multifunction peripherals, and data projectors Identify input and output options for physically challenged users CHAPTER 6 Describe the characteristics of a floppy disk drive Identify the uses of Zip disks Describe the characteristics of a hard disk Identify the advantages of using an Internet hard drive Describe the characteristics of CDs and DVDs Identify the uses of tape Discuss PC Cards and the various types of miniature storage media Identify uses of microfilm and microfiche CHAPTER 7 Identify the types of system software Describe the functions of an operating system Explain the purpose of the utilities included with most operating systems Summarize the features of several stand-alone operating systems Identify devices that use embedded operating systems Explain the purpose of several stand-alone utility programs CHAPTER 8 Discuss the components required for successful communications Describe uses of computer communications Differentiate among types of networks Explain the purpose of communications software Describe various types of lines for communications over the telephone network Describe commonly used communications devices Discuss different ways to set up a home network Identify various physical and wireless transmission media CHAPTER 9 Identify the qualities of valuable information Discuss the terms character, field, record, and file Identify file maintenance techniques Differentiate between a file processing system approach and the database approach Discuss the functions common to most DBMSs Describe characteristics of relational, object-oriented, and multidimensional databases Explain how Web databases work Discuss the responsibilities of database analysts and administrators CHAPTER 10 Identify ways to safeguard against computer viruses, worms, and Trojan horses Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways to protect against software theft and information theft Discuss the types of devices available that protect from system failure Identify safeguards that protect against Internet security risks Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use CHAPTER 12 Discuss the information requirements of an enterprise-sized corporation Identify information systems used in the functional units of an enterprise List general purpose and integrated information systems used throughout an enterprise List types of technologies used throughout an enterprise Explain how e-retailing works and identify e-commerce market sectors Discuss the computer hardware needs and solutions for an enterprise Determine why computer backup is important and how it is accomplished Discuss the steps in a disaster recovery plan Discuss the importance of computer security in an enterprise     Plus/Minus Grading System will be used. Points are accumulated for each assignment, test, and other assigned activity. Final Grades will be assigned by fitting the distribution of points to the standard distribution curve and making judgments with respect to the results. See example on next page *+JKZ[g 2 3 4 D E F øÄøwfRfCfhn0J5OJQJ\^J'jQhn5OJQJU\^J!jhn5OJQJU\^Jh@5OJQJ\^Jhv hW,0J5OJQJ^J*jhv hW,5OJQJU^JhPhW,5OJQJ^JhW,5OJQJ^JjhW,5OJQJU^JhW,5OJQJ\^Jhn5OJQJ\^Jhnhn5>*CJ OJQJ\*+JK F ; N O ^ c d . h]^hgd6i]gd6i @  @ gdW,F O Q R e i    " : ; ? m ˽˧֗֌|xtxtxtxtxtxp^p^p^"hxhw[5>*CJOJQJaJhw[h@hnh+hn>*OJQJh mh5OJQJ^Jhjh]50J5OJQJ^J*jhjh]55OJQJU^Jh]5h]55OJQJ^Jh]55OJQJ^Jjh]55OJQJU^Jh m5OJQJ^Jh mh m5OJQJ^J  - : K N O ^ d :&CJuk[J[=[=[=[=h6i5OJQJ\^J!h-h6i5>*OJQJ\^Jh h6i5OJQJ\^J&h"h6i5CJOJQJ\^JaJ"h?Ch6i>*OJQJ\^JaJhn5OJQJ\^J"h?Chn5>*OJQJ^JaJhnhx"hxhn5>*CJOJQJaJ"hxh@5>*CJOJQJaJ"hxhw[5>*CJOJQJaJ"hxhx5>*CJOJQJaJ.|:e'ik ^ & F !@ ]gd6i  !]gd6i & F @ |]|gd6i & F @ ]gd6i]gd6i & F h@ ]^gd6i & F h!@ ]^gd6i 24aesffXJh?Ch?C>*OJQJ^Jh?Ch+5OJQJ^Jh6i5>*OJQJ^Jh6ih6i5OJQJ^Jh6ih+5OJQJ^Jh+5>*OJQJ^Jh{]Jh+5>*OJQJ^Jh?Ch+>*h+5OJQJ\^Jhxuah6i5OJQJ\^J"h?Ch6i>*OJQJ\^JaJh6i5OJQJ\^Jh h6i5OJQJ\^J^G?v0p d>?gdNgd?Cgd+ !]gd+ & F !@ ]gd6i8KUp =?@JKLMbp}~|p|gg|Y|jh20\UmHnHuhWUW5OJQJhtmjhF5OJQJh20\5OJQJh6i5OJQJhF5OJQJ%jh20\5OJQJUmHnHu+jhtmjh20\5OJQJUmHnHuhWUWhWUW>* hNhFhX|h25OJQJ^JhN5OJQJ^Jh6i5OJQJ^Jh?C5OJQJ^J ?KLY;<J~s   0]0gd0 ]gd0  @ gdXE !]gd?C  !gdNd ]gd?C !]gdNd  @ [$\$gd?Cgd+gdFgdWUW "#'KLMYs:;<JgǺ}r}reXF;}rhNd 5OJQJ^J"hNd h?C>*OJQJ\^JaJh?C>*OJQJ\^Jh?C5OJQJ\^Jh?C5OJQJ^Jh8{h?C5OJQJ^JhNd h?C>*OJQJ%jhl>*OJQJUmHnHuhFh+5OJQJ\^JhF5OJQJ\^JhFhF5>*OJQJh20\5>*OJQJhF5OJQJh20\5OJQJhtmjh20\5OJQJghiqs|'L  ' 2 B M \ ] !%!I!K!L!{!}!!!!!!!!!!!"" "8"zrm hMJ>*h9whMJ>* jhXE5U\mHnHujhXEUmHnHuh05OJQJ\^JhMJ5OJQJ\^Jhn5OJQJ\^Jh5OJQJ\^JhMJhh0 h2h2h!h2hnh2hn>*h2hsG>*h+* ] !J!!!!! "8""""" & F h@ ,h^hgd0 80h]0^h`gd0 8@ ,gdXE h@ ,0h]0^h`gd0 & F h@ ,0h]0^hgd0 0h]0^h`gd08":"A"K""[#\#v#w### $ $$c$$$$$,%6%g%h%~%%%%%̼̯tme`e`e`e\XTGh>K5OJQJ\^Jhnh>KhXE h>K\h Fhn\ h Fhnhn>*OJQJ\^Jhn5OJQJ\^J'hN|\hN|\5B*OJQJ\^JphhN|\5OJQJ\^JhM5OJQJ\^Jh?h?5OJQJ\^Jh?5OJQJ\^JhMJ5OJQJ\^Jhw5OJQJ\^Jh05OJQJ\^J"w# $ $$$g%h%%&D&E&O&'''''''gdn $ @ a$gdn 0h]0^hgdbt  8h^hgdbt $ 8@ a$ @  & F h@ ,h^hgd0%%%%%%&&&D&E&M&8'A'''''''''''''''' ((朒|un_nP_uhN|\hM>*B*CJHphhN|\hn>*B*CJHph hM>*CJH h FhnhN|\hN|\>*B*CJHph hN|\>*CJHh Fhn>*CJHhMJ5OJQJ\^JhJW5OJQJ\^Jhbt5OJQJ\^Jhn>*OJQJ^JhXE>*OJQJ^Jh"5OJQJ\^Jhn5OJQJ\^Jh>K5OJQJ\^J'''' (((((((((((((((((-(.(0(1(2($ !]a$gdM $ @ a$gdngdn(+(-(.(<(B(G(H(I(^(((())1)2)))))Ͷzmz`SmS`SB!h h4;5>*OJQJ\^Jh4;5OJQJ\^Jh w5OJQJ\^Jh 95OJQJ\^Jh{5OJQJ\^J"hlh4;>*OJQJ\^JaJh4;5>*OJQJ\^JhMCJ0OJQJ\^JaJ0,hN|\hMB*CJ0OJQJ\^JaJ0phhM5>*OJQJ\^J h FhnhN|\hn>*B*CJHphhN|\h2>*B*CJHph2(3(4(5(6(7(8(9(:(;(<(B(^(j(w(((((() & F !]^gd{ & F !hh]^hgd{$ !00]0^0a$gdM$ !]a$gdM)2)P)l))))))*'*[*z***** & F @ ]gdl & F @ ]gd4; X]^gd4;]gd4; & F hh]^hgd w & F hh]^hgd{)***p,y,z,>.?.H.I.D0M0N0 33344445555777T9^9_9{;|;;;===vfh hn5OJQJ\^Jh h4;5OJQJ^Jh4;5>*OJQJ\^Jhlh 5OJQJ\^Jh 5>*OJQJ\^Jh h{5OJQJ\^Jhl5>*OJQJ\^J!hh4;5>*OJQJ\^J!h h4;5>*OJQJ\^Jh h4;5OJQJ\^J%*1+q+++ ,A,p,z,,,!-k---=.>.I.|../8/ & F @ ]gd4; @ @ ]^@ gd4; & F @ ]gd4;]gd4; & F @ ]gd4;8/p// 0D0N0u011!2I22 33K3j33334 & F @ ]gdl & F @ ]gd4; & F @ ]gd4;]gd4; & F @ ]gdl & F @ ]gd4;4W44444)5i55555$6M6s6667N777]gd4; @ @ ]^@ gd4;  ]gd4; & F @ ]gdl & F @ ]gd4;7778m8889T9_999):r:::*;|;;;<p<<< & F @ ]gd4;]gd4; & F @ ]gdl & F @ ]gd4;<2=x==============?????? ?!?gdMJ @ ,gdMJgd+ & F @ ]gd  & F @ ]gd4;==========????"?#?$?ュh hn5OJQJ\^JhnhG5OJQJ\^J#hxuahG5CJOJQJ^JaJhG5CJOJQJ^JaJhGhSjhSU!?"?#?$? & F @ ]gd 21h:pJ@/ =!"#$% QDyK 7http://python.ecs.csun.edu/compsci/faculty/putnam.htmlyK nhttp://python.ecs.csun.edu/compsci/faculty/putnam.htmlDyK cputnam@csun.eduyK 0mailto:cputnam@csun.eduDyK www.ecs.csun.edu/~cputnamyK Bhttp://www.ecs.csun.edu/~cputnam^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH >@>  Heading 1$@& 5>*aJZZ  Heading 2$ @ 0@&]05>*OJQJ\^Jbb  Heading 3 $ @ @ @&^@ `5OJQJ\]^J@@  Heading 4$@& >*CJaJ@@  Heading 5$@& CJ OJQJ@@@  Heading 6$@& >*OJQJRR  Heading 7$@&`5>*CJOJQJaJXX  Heading 8$@&]^5CJOJQJaJR @R  Heading 9 $ @ ,@&5OJQJ\^JDA`D Default Paragraph FontViV  Table Normal :V 44 la (k (No List B^@B Normal (Web)dd[$\$6U@6 Hyperlink >*B*phHB@H Body Text  @ 5OJQJ\^J@ @"@ Footer  ! OJQJaJTT2T Block Text>]>^5CJOJQJaJPPBP Body Text 2 F@ CJOJQJ^J4R4 1AHeader  !.)a. 1A Page NumberPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] /012$7/-/0125$7 v F g8"%()=$? "#%')*,.039.^? "'2()*8/47<!?$?!$&(+-/1245678:Z 3DQ$7XXX8LM@L(  V - # -"? V / # /"? \B 2 S D"?J 8 # "?6r B "?6r C "?B S  ?KLL$7/%ItCWtB/t8Lt-4&t2Htabstract%7%7 G6LH6I6T J6LlK6|L6tM6N6O6lP6 ]]g%7  crr%7 =*urn:schemas-microsoft-com:office:smarttags PlaceType9 *urn:schemas-microsoft-com:office:smarttagsplace= *urn:schemas-microsoft-com:office:smarttags PlaceName P"   08FN\dtzEM5555555555555%71CLN  wEN(5555555555555%73333333333ZQdd:: >>?@KM|} "YYhiqqss:Av ghDE^ !["""" $A$p$z$>&I&D(N( +++,,,--$.s..////001T1_12*3|33555555555555555555777777 7 7%7ZQdd:: >>?@KM|} "YYqqssv ghDE5555555555555555577%7   RVh&}jP|hiNx/1֑IOy;vmj; S#wAX(A^VmDXt,F[LOAخ_V%6V1[$&V\jYG]`.,I_*V`K{hgnm1o hh^h`OJQJo( hh^h`OJQJo(h hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.^`o(.pp^p`.@ L@ ^@ `L.^`.^`.L^`L.^`.PP^P`. L ^ `L.h88^8`OJQJo(hHh^`OJQJ^Jo(hHoh  ^ `OJQJo(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h^`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h ^`hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.h^`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h^`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`OJQJo(hH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHh^`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h^`OJQJo(hH ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH,I_&mDhiyRIOy;1o&V\F[LOA`x/G]_V#wA|mj;hgV1[                                                                                                                                                                  _^@{XENd W_ lBNpd?w=7#+,W,LF-}.14]5 9Gd9J[?J@1A?CGsGMJ{]JWUWpY*\20\N|\2^o`xua+Je$f6i|Xitmj mDjpm~pbt9wwzj{y|x P wl2*+*m{,FFJW4;X|Ca9mcKEMN"Q>+7w[!>K\7O$08{nS-"455@$7X@UnknownG* Times New Roman5Symbol3. * Arial?. Arial Black3* Times;Wingdings?= * Courier NewA BCambria Math"hofݱ - a - a!4d55- 2qHP?B2!xx(Comp100 -Computers:Their Impact and Use gmelaravisitor`                Oh+'0 (4 T ` l x,Comp100 -Computers:Their Impact and Use gmelaraNormalvisitor5Microsoft Office Word@캃@B@n_@C,  -՜.+,D՜.+,X hp  Homea5 )Comp100 -Computers:Their Impact and Use Title 8@ _PID_HLINKSA [!http://www.ecs.csun.edu/~cputnam+mailto:cputnam@csun.edu|y7http://python.ecs.csun.edu/compsci/faculty/putnam.html  !"#$%&'()*+,-./0123456789:;=>?@ABCEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvxyz{|}~Root Entry FPg,Data <1TableDdWordDocument4vSummaryInformation(wDocumentSummaryInformation8CompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q