ŠĻą”±į>ž’ IKž’’’FGH’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’ģ„Į šæ‹bjbjąą %œ‚j‚je†¢’’’’’’l:::::::NŲ_Ų_Ų_8`Td`lN;ɶÜbÜb(cccßcN-d$QdŗČ¼Č¼Č¼Č¼Č¼Č¼Č$ńÉ ĢJąČ:edßcßcededąČĻ::ccŪõČĻĻĻedB:c:cŗČĻedŗČĻxĻG„jRø¼::F¼cŠb Pæ+uł&ÄNŠ[Ų_§hr ŗ2F¼t É0;É@ŗ[Ģv¶ [ĢF¼ĻNN::::ŁChapter 5 Ethical and Social Issues in the Digital Firm True-False Questions Establishing accountability is one of the pressing ethical issues raised by the widespread use of information systems. Answer: True Difficulty: Medium Reference: p. 152 Information technology can be used to achieve social progress. Answer: True Difficulty: Easy Reference: p. 153 Ethical issues are closely linked to political issues. Answer: True Difficulty: Easy Reference: p. 153 “Politically correct” attitudes take years to develop. Answer: True Difficulty: Easy Reference: p. 154 Social rules and laws do not yet address our dependence on systems and our vulnerability to systems errors. Answer: True Difficulty: Medium Reference: p. 155 Profiling, while helpful to the marketer, is illegal. Answer: False Difficulty: Easy Reference: p. 155 Arriving at a “good” or ethical solution should always balance the consequences to stakeholders. Answer: False Difficulty: Medium Reference: p. 157 Accountability permits an injured party to recover damages. Answer: False Difficulty: Medium Reference: p. 157 The Utilitarian Principle states that one should take the action that produces the least harm or incurs the least cost. Answer: False Difficulty: Medium Reference: p. 158 The “slippery slope” rule says that an action is unethical if it is correct for one instance but may have disastrous consequences if it is taken frequently. Answer: True Difficulty: Medium Reference: p. 158 Any group that claims to be a “profession”, takes on special rights and obligations not given to, or required of, others. Answer: True Difficulty: Medium Reference: p. 158 Codes of Ethics are nothing more than promises. Answer: True Difficulty: Medium Reference: p. 158 In the United States, privacy is protected by the Twenty-First Amendment. Answer: False Difficulty: Medium Reference: p. 159 The Computer Matching and Privacy Protection Act of 1973 is a set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most United States and European privacy laws. Answer: False Difficulty: Hard Reference: p. 160 FIP principles are based on the notion of a “mutuality of interest” between the record holder and the individual. Answer: True Difficulty: Medium Reference: p. 160 Due process is a key concept in defining privacy. Answer: True Difficulty: Easy Reference: p. 160 FIP governs the collection and use of information about individuals in the United States and Europe. Answer: True Difficulty: Hard Reference: p. 160 Most U.S. federal privacy laws apply both to the federal government and the private sector. Answer: False Difficulty: Medium Reference: p. 160 The Electronic Communications Privacy Agreement is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulations but does not involve government regulation or enforcement. Answer: False Difficulty: Hard Reference: p. 161 In Europe, privacy protection is less stringent than in the United States. Answer: False Difficulty: Medium Reference: p. 161 Web bugs are tiny graphic files embedded in e-mail messages and Web pages that are designed to monitor online Internet user behavior. Answer: True Difficulty: Medium Reference: p. 162 It is illegal to use cookie technology without the knowledge of the Web site visitor. Answer: False Difficulty: Easy Reference: p. 162 The online industry has chosen not to self-regulate in an attempt to force public legislation. Answer: False Difficulty: Medium Reference: p. 163 The social issue of privacy concerns the development of statutes that govern the relationship between record keepers and individuals. Answer: False Difficulty: Medium Reference: p. 166 A copyright lasts 17 years and then expires. Answer: False Difficulty: Medium Reference: p. 166 When ideas and their expressions merge, the expression cannot be copyrighted. Answer: True Difficulty: Medium Reference: p. 167 Similar concept, function, general functional features, and colors are protected by copyright. Answer: False Difficulty: Easy Reference: p. 167 Brown Bag Software vs. Symantec Corp. is a landmark case in which the court determined that trade secret law protects the ideas in a work project. Answer: False Difficulty: Hard Reference: p. 167 The difficulty in patent protection is passing stringent criteria on nonobviousness, originality, and novelty. Answer: True Difficulty: Easy Reference: p. 167 Digital media make the theft of intellectual property easy. Answer: True Difficulty: Easy Reference: p. 167 The DMCA implemented a World Intellectual Property Organization treaty that makes it illegal to circumvent technology-based protections of copyrighted materials. Answer: True Difficulty: Medium Reference: p. 168 The SIIA believes that greater social benefit results from the free distribution of software than from laws making such free distribution illegal. Answer: False Difficulty: Hard Reference: p. 169 Information systems executives are ultimately responsible for the harm done by systems developed by their staffs. Answer: True Difficulty: Medium Reference: p. 170 Common carriers like telephone systems are not held liable for the messages transmitted over their services. Answer: True Difficulty: Medium Reference: p. 170 Under current laws, organizations like AOL might be held liable for offensive postings by their users. Answer: True Difficulty: Medium Reference: p. 170 The “empowerment” described in current business literature is often false in its implications because the key policy decisions are usually still centralized, with only trivial decisions allowed to lower-level employees. Answer: True Difficulty: Medium Reference: p. 172 In general, employees inflict the most damaging computer crimes. Answer: True Difficulty: Easy Reference: p. 173 Computer forensics is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law. Answer: True Difficulty: Medium Reference: p. 175 The largest source of RSI is computer keyboards. Answer: True Difficulty: Easy Reference: p. 179 Computer-related jobs now top the list of stressful occupations. Answer: True Difficulty: Easy Reference: p. 179  Multiple- Choice Questions New technologies can be used to: a. threaten social values. b. achieve social progress. c. commit crimes. d. All of the above e. None of the above Answer: d Difficulty: Easy Reference: p. 153 The moral dimensions of the information society: a. are geographically and politically biased. b. are covered by existing laws and customs in most countries. c. are “quality of life” issues. d. cut across individual, social, and political levels of action. e. are as yet unknown. Answer: d Difficulty: Medium Reference: p. 154 Advances in data storage techniques and rapidly declining storage costs have: a. created huge publicly accessible databases. b. made routine violations of privacy cheap and effective. c. doubled every 18 months. d. made universal access possible. e. doubled humanity’s knowledge. Answer: b Difficulty: Hard Reference: p. 155 Ethics is a concern of humans who: a. have a religious belief. b. are civilized. c. are members of a global society. d. have freedom of choice. e. deal with the feelings of others. Answer: d Difficulty: Hard Reference: p. 156 Advances in networking promise to: a. greatly reduce the costs of moving and accessing large quantities of data. b. open the possibility of mining large pools of data using small, remote desktop machines. c. permit invasion of privacy on a scale heretofore unimaginable. d. All of the above e. None of the above Answer: d Difficulty: Easy Reference: p. 156 The basic concepts of ethics are: a. liability. b. responsibility. c. accountability. d. due process. e. All of the above Answer: e Difficulty: Easy Reference: p. 157 The ethical rules discussed in the textbook: a. are always guides to actions. b. cannot be guides to actions. c. do not always apply in the digital firm. d. do not allow for competing values. e. are based on political philosophies. Answer: b Difficulty: Medium Reference: p. 158 One reason companies monitor employee time on the Internet is to: a. check their ethical decisions. b. check for pornography. c. see whom they contact in other businesses. d. prevent the waste of company resources. e. prevent the spread of viruses. Answer: d Difficulty: Medium Reference: p. 159 Information technology and systems threaten individual claims to privacy by making the invasion of privacy: a. profitable. b. cheap. c. effective. d. All of the above e. None of the above Answer: d Difficulty: Easy Reference: p. 159 A key concept in defining privacy has become the use of: a. First Amendment studies. b. the utilitarian principle. c. the rule of change. d. due process. e. liability for accountability. Answer: d Difficulty: Medium Reference: p. 160 Fair information practices are based on the principle of: a. accountability. b. responsibility. c. mutuality of interest. d. ethical behavior. e. financial integrity. Answer: c Difficulty: Medium Reference: p. 160 European privacy protection is _________________ than in the United States. a. less far-reaching b. less liable to laws c. based more on responsibility d. much less stringent e. much more stringent Answer: e Difficulty: Easy Reference: p. 161 U.S. businesses are allowed to use personal data from EU countries if they: a. have informed consent. b. translate EU rules into U.S. laws. c. develop a safe harbor framework for the data. d. develop privacy protection policies that meet EU standards. e. All of the above Answer: d Difficulty: Medium Reference: p. 161 When a cookie is created during a Web site visit, it is stored: a. on the Web site computer. b. on the visitor’s computer. c. on the ISP’s computer. d. in a Web directory. e. at the node. Answer: b Difficulty: Easy Reference: p. 162 Web sites using cookie technology: a. automatically store visitors’ names and addresses. b. leave invisible GIFs. c. cannot directly obtain visitors’ names and addresses. d. can bug data. e. have opt-out potential. Answer: c Difficulty: Medium Reference: p. 162 The Online Privacy Alliance: a. encourages self-regulation to develop a set of privacy guidelines for its members. b. protects user privacy during interactions with Web sites. c. lobbies for better privacy legislation for the consumer. d. is composed of members of the advertising industry. e. was recommended by a Congressional committee. Answer: a Difficulty: Hard Reference: p. 163 Tools are being developed to help users determine: a. who is leaving cookies. b. how to encrypt e-mail. c. what recourse they have to prevent datamining. d. who is doing market research. e. the kind of personal data that can be extracted by Web sites. Answer: e Difficulty: Easy Reference: p. 163 P3P stands for: a. Privacy for Personal Protection. b. Platform for Privacy Preferences. c. Personal Preferences for Personal Privacy. d. Platform for Pretty Personal Privacy. e. Project for Protection of Personal Privacy. Answer: b Difficulty: Hard Reference: p. 163 The “expectation of privacy” refers to: a. the right to assume one’s online dealings are private. b. the cultural difference between privacy in different areas of business. c. the culturally understood difference between private and public areas of life. d. the validity of privacy only in legal transactions. e. the laws protecting against search and seizure. Answer: c Difficulty: Easy Reference: p. 166 The political issue of privacy concerns: a. governmental monitoring of private data. b. the development of statutes that govern the relations between record keepers and individuals. c. the data collected by Web sites without the knowledge of the site visitor. d. ownership of private data. e. the development of statutes that govern the relations between Internet participants. Answer: b Difficulty: Medium Reference: p. 166 “Look and feel” copyright infringement lawsuits are about: a. the ability to copyright similar products. b. the distinction between an idea and its expression. c. the merging of an idea with its expression. d. the single way in which an idea is best expressed. e. hidden differences in similar copyrighted materials. Answer: b Difficulty: Hard Reference: p. 167 The strength of patent protection is that it: a. puts the strength of law behind copyright. b. allows protection from Internet theft of ideas put forth publicly. c. is easy to define. d. grants a monopoly on the underlying concepts and ideas. e. allows free transmission of information. Answer: d Difficulty: Medium Reference: p. 167 Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials? a. Electronic Communications Privacy Act b. Privacy Act c. Freedom of Information Act d. Digital Millennium Copyright Act e. Computer Security Act Answer: d Difficulty: Hard Reference: p. 168 New information technologies are challenging existing: a. liability law and social practices for holding individuals and institutions accountable. b. standards of ethics. c. standards of computer literacy rights and computer activities. d. educational theories and practices. e. technology boundaries between societies. Answer: a Difficulty: Easy Reference: p. 169 It is difficult to hold software producers liable for their software products when: a. these products are used for so many different purposes. b. software users expect infallibility. c. that software is considered to be like books. d. that software is considered to be a service. e. there are so many conflicting laws governing such products. Answer: c Difficulty: Medium Reference: p. 170 _____________________ are not held liable for the messages they transmit. a. Common carriers b. Digital providers c. LDCs d. Organizations and businesses e. Congressional delegates Answer: a Difficulty: Easy Reference: p. 170 Service users want organizations: a. liable to suits over privacy issues. b. held responsible for maximizing quality of services. c. to restrict liability to privacy issues. d. maintain unfeasible economic promises. e. All of the above Answer: b Difficulty: Medium Reference: p. 171 The new and more efficient global marketplace has: a. destroyed political boundaries. b. made cultural differences obsolete. c. reduced the normal social buffers that permitted businesses many years to adjust to competition. d. reduced the time most people have to spend at home with their families. e. All of the above Answer: c Difficulty: Medium Reference: p. 172 Employees can inflict the most injurious computer crimes because: a. they have knowledge to know what will hurt. b. they have access to information and data. c. they often have a job-related motive to commit such crimes. d. All of the above e. None of the above Answer: d Difficulty: Medium Reference: p. 173 It is now a federal crime to: a. send spam to a mass audience. b. access a computer system without authorization. c. sell used software. d. create an online personality. e. use anonymizers. Answer: b Difficulty: Medium Reference: p. 174 Although many firms now use antivirus software, the proliferation of computer networks will: a. decrease the probability of infections. b. make viruses obsolete. c. require physical protections rather than antivirus software programs. d. probably make protection impossible. e. increase the probability of infections. Answer: e Difficulty: Easy Reference: p. 174 Computer abuse is: a. mostly a personal problem. b. sometimes legal but always unethical. c. illegal and unethical. d. most common in the business environment. e. the special province of hackers. Answer: b Difficulty: Easy Reference: p. 174 The “do anything anywhere” computing environment can: a. make work environments much more pleasant. b. create economies of efficiency. c. centralize power at corporate headquarters. d. blur the traditional boundaries between work and family time. e. create privacy problems. Answer: d Difficulty: Easy Reference: p. 175 Computer forensics deals with: a. recovering data from computers while preserving evidential integrity. b. securely storing and handling recovered electronic data. c. finding significant information in a large volume of electronic data. d. presenting recovered information to a court of law. e. All of the above Answer: e Difficulty: Medium Reference: p. 175 The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law best describes: a. computer protection. b. computer forensics. c. computer analysis. d. information preservation. e. crime scene preservation. Answer: b Difficulty: Medium Reference: p. 175 A form of electronic eavesdropping that is carried out by placing a piece of software to intercept information passing from a user to the computer hosting a Web site best describes: a. sniffing. b. spoofing. c. jamming. d. hacking. e. spamming. Answer: a Difficulty: Medium Reference: p. 177 Redesigning business processes could potentially: a. result in computer abuse. b. cause millions of mid-level managers and clerical workers to lose their jobs. c. give greater rise to computer crime. d. increase Internet dangers. e. cause widespread business failures. Answer: b Difficulty: Medium Reference: p. 177 Which of the following refers to large disparities in access to computers and the Internet among different social groups and different locations? a. Computer divide b. Technology divide c. Digital divide d. Information divide e. Social divide Answer: c Difficulty: Medium Reference: p. 178 Which of the following is stress induced by computer use, and its symptoms include aggravation, hostility toward humans, impatience, and enervation? a. Computer stress b. Techno-aggravation c. Carpal tunnel syndrome d. Technostress e. Computer vision syndrome Answer: d Difficulty: Medium Reference: p. 179 CVS refers to: a. eyestrain related to computer display screen use. b. computer virus syndrome. c. wrist injuries brought about by incorrect hand position when using a keyboard. d. stress induced by computer use. e. injuries occurring when the same muscle groups are worked continuously. Answer: a Difficulty: Easy Reference: p. 179  Fill In the Blanks Ethics defines principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior. Difficulty: Easy Reference: p. 153 Information rights define the rights that individuals and organizations have with respect to information that pertains to them. Difficulty: Medium Reference: p. 154 Profiling is the use of computers to combine data from multiple sources to create an electronic dossier of detailed information on an individual. Difficulty: Medium Reference: p. 155 Responsibility means accepting the potential costs, duties, and obligations for the decisions one makes. Difficulty: Easy Reference: p. 157 Accountability refers to the mechanisms for assessing responsibility for decisions made and actions taken. Difficulty: Easy Reference: p. 157 Liability refers to the existence of laws that permit individuals to recover the damages done to them by other actors, systems, or organizations. Difficulty: Easy Reference: p. 157 Due process means that the laws are well-known and understood and there is an ability to appeal to higher authorities to ensure that laws are applied correctly. Difficulty: Medium Reference: p. 157 The Categorical Imperative (Kant) states that if an action is not right for everyone to take, it is not right for anyone to take. Difficulty: Hard Reference: p. 158 The rule of change (Descartes) states that if an action cannot be taken repeatedly, then it is not right to be taken at any time. Difficulty: Hard Reference: p. 158 The Utilitarian Principle assumes one can put values in rank order and understand the consequences of various courses of action. Difficulty: Hard Reference: p. 158 The Risk Aversion Principle states that one should take the action that produces the least harm or incurs the least cost. Difficulty: Hard Reference: p. 158 The ethical “no free lunch” rule states that someone else owns all tangible and intangible objects, unless there is a specific declaration otherwise, and that the creator wants compensation for this work. Difficulty: Hard Reference: p. 158 Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state. Difficulty: Medium Reference: p. 159 The Fair Information Practices is a set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most U.S. and European privacy laws. Difficulty: Hard Reference: p. 160 Informed consent is given with the knowledge of all the facts needed to make a rational decision. Difficulty: Medium Reference: p. 161 A(n) cookie is a tiny file deposited on a computer hard drive when an individual visits certain Web sites. Difficulty: Easy Reference: p. 162 A(n) Web bug is a tiny graphic file embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior. Difficulty: Medium Reference: p. 162 Opt-out is a model of informed consent permitting the collection of personal information until the consumer specifically requests that the data not be collected. Difficulty: Medium Reference: p. 163 Opt-in is a model of informed consent prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. Difficulty: Medium Reference: p. 163 A(n) spyware program traces online user activities without the users’ permission or knowledge. Difficulty: Hard Reference: p. 163 P3P is an industry standard designed to give users more control over personal information gathered on Web sites they visit. Difficulty: Easy Reference: p. 164 Intellectual property is intangible property created by individuals or corporations that is subject to protections under the various laws of the country. Difficulty: Easy Reference: p. 166 A(n) trade secret is any intellectual work or product used for a business purpose than can be classified as belonging to that business, provided it is not based on information in the public domain. Difficulty: Medium Reference: p. 166 A(n) copyright is a statutory grant protecting creators of intellectual property against copying by others for any purpose for a minimum of 70 years. Difficulty: Medium Reference: p. 166 A(n) patent is a legal document that grants the owner an exclusive monopoly on the ideas behind an invention for 20 years; it is designed to ensure that inventors of new machines or methods are rewarded for their labor while making widespread use of their inventions. Difficulty: Medium Reference: p. 167 Framing displays the content of another Web site inside one’s own Web site within a window. Difficulty: Easy Reference: p. 168 The Digital Millennium Copyright Act adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials. Difficulty: Hard Reference: p. 168 Computer crime is the commission of an illegal act through the use of a computer or against a computer system. Difficulty: Easy Reference: p. 173 Computer abuse is the commission of an act involving a computer that may not be illegal but is considered unethical. Difficulty: Easy Reference: p. 174 Spamming is the practice of sending unsolicited e-mail and other electronic communication. Difficulty: Easy Reference: p. 174 The Computer Fraud and Abuse Act, passed by Congress in 1986, made it illegal to access a computer system without authorization. Difficulty: Medium Reference: p. 174 Computer forensics is the collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law. Difficulty: Medium Reference: p. 175 Sniffing is a form of electronic eavesdropping involving the placement of software to intercept information passing from a user to the computer hosting a Web site. Difficulty: Medium Reference: p. 177 Jamming is the use of software routines to tie up a computer hosting a Web site so that legitimate visitors cannot access the site. Difficulty: Medium Reference: p. 177 Spoofing is a practice in which users or organizations misrepresent themselves as other organizations. Difficulty: Medium Reference: p. 177 The digital divide refers to large disparities in access to computers and the Internet among different social groups and different locations. Difficulty: Medium Reference: p. 178 A(n) repetitive stress injury occurs when muscle groups are forced through repetitive actions with high-impact loads or thousands of repetitions with low-impact loads. Difficulty: Easy Reference: p. 179 Computer vision syndrome is an eyestrain condition related to computer display screen use; its symptoms include headaches, blurred vision, and dry and irritated eyes. Difficulty: Easy Reference: p. 179 Carpal tunnel syndrome injury occurs when pressure on the median nerve through the wrist structure produces pain. Difficulty: Easy Reference: p. 179 Technostress, induced by computer use, includes the symptoms of aggravation, hostility towards humans, impatience, and enervation. Difficulty: Medium Reference: p. 179  Essay Questions A moral and ethical issue raised by the information age is the collection and use of information about individuals, i.e. privacy concerns. What aspect of this information collection do you find most alarming? There are many alarming aspects, among them the difficulty of protecting the data that is gathered from inappropriate uses, the ownership of personal data, and the line between public and private information and its uses. Foreseeable problems include the possibility of refusal of insurance to persons who have been tested and found to have certain diseases, the evils associated with national identity cards for everyone, racial profiling, and spamming based on personal purchasing choices. Identify and briefly describe the five moral dimensions raised by information systems. Information rights and obligations—What rights do individuals and organizations have with respect to information pertaining to themselves? Property rights—How can intellectual property rights be protected when it is so easy to copy digital materials? Accountability and control—Who will be held accountable and liable for the harm done to individual and collective information and property rights? System quality—What standards of data and system quality should we demand to protect individual rights and the safety of society? Quality of life—What values should be preserved? What institutions must we protect? What cultural values can be harmed? List the four technology trends given by the authors of your text that raise ethical issues. Give an example of an ethical or moral impact connected to each one. Computing power doubles every 18 months. Ethical impact: Because more organizations depend on computer systems for critical operations, these systems are vulnerable to computer crime and computer abuse. Data storage costs are declining rapidly. Ethical Impact: It is easy to maintain detailed databases on individuals. Who has access to and control of these databases? Data analysis advances. Ethical impact: Vast databases full of individual information may be used to develop detailed profiles of individual behavior. Networking advances and the Internet. Ethical impact: It is easy to copy data from one location to another. Who owns data? How can ownership be protected? What is “profiling”? What are the advantages and disadvantages of its use? How does the use of profiling relate to ethics? Profiling is the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals or groups. The advantages include creating behavioral profiles to help solve crimes and disease profiles in medical research. Disadvantages include social and political prejudices, as well as privacy issues. Define and distinguish between the basic concepts of responsibility, accountability, and liability as applied to ethical decisions. Responsibility is the first key element of ethical action. Responsibility means that an individual, group, or organization accepts the potential costs, duties, and obligations for decisions made. Accountability is a feature of systems and social institutions. It means that mechanisms are in place to determine who took responsible action; i.e., who is responsible for the action. Liability is a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by others. In one sentence, the three may be distinguished thus: I will assume the blame or benefit for the actions I take (responsibility); this blame or benefit accrues to me through the requirement that I be able to explain why I have taken the actions I have (accountability) for actions traceable to me by defined mechanisms in the organization, and if those actions result in harm to another, I will be held by law to reparations for those actions (liability). Identify the five step process for analyzing an ethical issue. Identify and describe clearly the facts. Define the conflict or dilemma and identify the higher-order values involved. Identify the stakeholders. Identify the options you can reasonably take. Identify the potential consequences of your options. Identify and briefly discuss the six candidate principles presented in the textbook. The six candidate principles include the Golden Rule, Immanuel Kant’s Categorical Imperative, Descartes’ rule of change, Utilitarian Principle, Risk Aversion Principle, and ethical “no free lunch” rule. The Golden Rule “Do unto others as you have them do unto you.” Immanuel Kant’s Categorical Imperative states that if an action is not right for everyone to take, it is not right for anyone. Descartes’ rule of change states that if an action cannot be taken repeatedly, then it is not right to be taken at any time. The Utilitarian Principle assumes one can put values in rank order and understand the consequences of various courses of action. The Risk Aversion Principle states that one should take the action that produces the least harm or incurs the least cost. The “no free lunch” rule assumes that someone else owns all tangible and intangible objects, unless there is a specific declaration otherwise, and that the creator wants compensation for this work. List and describe at least three health risks that arise from the use of computer. Carpal tunnel syndrome, computer vision syndrome, and technostress are three health risks mentioned in the textbook. Carpal tunnel syndrome occurs when pressure on the median nerve through the wrist’s structure produces pain. Computer vision syndrome is an eyestrain condition related to computer display use. Technostress is induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation. What are the five areas a corporate code of ethics should address? Give at least three examples of items that must be covered in each area. The five areas include information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control. Information rights and obligation examples include employee e-mail and Internet privacy, workplace monitoring, treatment of corporate information, and policies on customer information. Property rights and obligation examples include software licenses, ownership of firm data and facilities, ownership of software created by employees on company hardware, and software copyrights. When considering accountability and control, the code should specify a single individual responsible for all information systems, and reporting to this individual should be others who are responsible for individual rights. Additional examples include the protection of property rights, system quality, and quality of life. In terms of system quality, the code should describe the general levels of data quality and system error that can be tolerated with detailed specifications left to specific projects. All systems must attempt to estimate data quality and system error probabilities. Quality of life examples include high levels of product quality, customer service, employee satisfaction and human dignity through proper ergonomics, job and work flow design, and human resource development. What is computer forensics? What problems does it deal with? Computer forensics is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law. Problems include recovering data from computers while preserving evidential integrity, securely storing and handling recovered electronic data, finding significant information in a large volume of electronic data, and presenting the information to a court of law.     5- PAGE 8 Ethical and Social Issues in the Digital Firm Chapter 5 Chapter 5 Ethical and Social Issues in the Digital Firm 5- PAGE 1 9:OÜŻHIėģWXdeč é ™ š ‚ ƒ æ Ą YZķīĢĶcd!"†‡¢£¦Źkl€"#ĖĢop !"—˜$%š›¹ŗ»Qkl~œ£¤ōēŚōĶōĶōĶōĶōĶōĶōĶōĶōĶōĶōĶōĶōĶōĶōĶōĶōæōĶōĶōĶōĶōĶōĶōĶōĶōĶōĶōĶōŚōēō±ōĶō±ō5B*OJQJ\^Jph6B*OJQJ]^Jph5B*OJQJ^JphB*CJOJQJ^JphB*CJOJQJ^JphB*OJQJ^JphF 89:OPQČÉüżž’?@żūöōņōŻ××Ģ׃ŌŻ××I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  Ęr$If$If$ & F „„°$If^„`„°a$$a$eŠ‹żż@qrst«¬ŻŽßąIJKLōō«°–ōŠ«°–ōŠ«Œ–$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  Ęr$IfLø¹ģķīļ%&XYZ[¼½ńņłłī蟰ŠłłīčŸdŠłłīč$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  Ęr$If$Ifņóō01efghąį    µ ¶ ¶Š”›››¶Ą”››Š¶P”››$If  Ęr$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö¶ é ź ė ģ f g š › œ  Ķ Ī     ōī„ĐŠŠōī„œŠŠōī„$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  Ęr$If N O ƒ „ … † } ~ ° ± ² ³ % & Y Z łłīčŸ“Šłłī蟤Šłłīč$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  Ęr$If$IfZ [ \ Ž  Ą Į Ā Ć ()Z[\]¹ŗ¶œ”››Š¶h”››Š¶P”››$If  Ęr$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laöŗīļšńĪĻOP„…†‡ōī„LŠŠōī„ ŠŠōī„ō$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  Ęr$If‡ ABCDš›ĶĪĻŠ/0dełłīčŸ0ŠłłīčŸ\Šłłīč$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  Ęr$If$Ifefgķī"#$%RS‡ˆ‰ŠŁŚ¶ų”››Š¶””››Š¶”››$If  Ęr$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laöŚpq£¤„¦9:lmnoōī„TŠŠōī„$ŠŠōī„$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  Ęr$IfoŽßOP‚ƒ„&'Z[łłīčŸÄŠłłīčŸdŠłłīč$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  Ęr$If$If[\]šń#$%&˜™ĢĶĪĻ<=¶$”››Š¶¤”››Š¶”››$If  Ęr$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö=pqrsŚŪķļ"#$%ōī„xŠŠōī„PŠŠōŠ„Ų$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  Ęr$If%fg˜™š›‹ŒæĄĮĀóō%&łłīł„œłłīŠ„˜łłīł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  Ęr$If$If&'(ij›œžŸŗ»¼ŻŽ¶Ų”››Š¶ˆˆˆ†”›€$If$If  Ęr$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laöŽł';PQ€‚³“ā!łłłłłłģā™4„~łłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If!B„›œĢĶĪĻ  M ˆ ¤ Ē łłłłģā™,„~łłłłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If¤ø¹Ėé !!!Ń!Ų!ė!ģ!ž!=#X#Y#k#ė#ņ#$$$%"%#%5%3&P&Q&c&$'?'@'R'(/(0(B(ī( ) ))é)***,+I+J+\+,8,9,K,'-D-E-W-°.Ė.Ģ.Ž.ß/ś/ū/ 0ņ0 11 1Ž2©2Ŗ2¼2;4X4Y4k4­5Č5É5Ū5’677/7Š8ńęŁęńęŁęńŁęŁęńęŁęńŁęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁęńęŁę5B*OJQJ^JphB*OJQJ^Jph5B*OJQJ\^JphVĒ č é !!!!=!>!Z!l!!«!Š!Ń!łłģā™ „~łłłłłłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$IfŃ!’!"""%"&"t"Š"#&#=#>#l#m#ņčŸ“Š„~~~~~~~ņč$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$Ifm#n#o#‘#’# #³#Ę#Ö#ź#ė#$$$$¶“”›•••••••ˆ~¶t”  ĘĄ$If  Ęr$1$If$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$I$J$k$‹$·$Ż$%%6%7%8%9%{%|%łóóóóóóóęܓø~łó$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If$If|%ž%ø%ę%&3&4&d&e&f&g&Ó&Ō&ć&ķ&łłłłłłģā™¼„~łłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$Ifķ&ū&'$'%'S'T'U'V'''¬'Ź'į'ń'łłłłģā™Ą„~łłłłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$Ifń'((C(D(E(F(€((”(§(Į(Ö(ī(ļ(łłģā™p„~łłłłłłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$Ifļ() )!)")n)o)„)›)»)Ņ)é)ź)**ņčŸäŠ„~~~~~~~ņč$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If***g*h*‚*Ø*Ł*+,+-+]+^+_+`+¶”›•••••••ˆ~¶¼”  ĘĄ$If  Ęr$1$If$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö`+ +”+¾+Ü+ö+ ,,,L,M,N,O,r,s,łóóóóóóóęܓ0~łó$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If$Ifs,©,Ā,ū, -'-(-X-Y-Z-[-x-y-Ļ- .łłłłłłģā™„~łłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If .H..°.±.ß.ą.į.ā.//1/K/}/ž/łłłłģā™¼„~łłłłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$Ifž/ß/ą/0000!0"0G0l0š0Ć0ņ0ó0łłģā™L„~łłłłłłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$Ifó0!1"1#1$1L1M1‡1Ņ1$2[2Ž22½2¾2ņčŸpŠ„~~~~~~~ņč$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If¾2æ2Ą2é2ź23w3Å3ć3;4<4l4m4n4o4¶¼”›•••••••ˆ~¶Ą”  ĘĄ$If  Ęr$1$If$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laöo4Ŗ4«4Ł45?5u5­5®5Ü5Ż5Ž5ß5 66łóóóóóóęęܓP~łó$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If$If6<6‚6˜6Ó6’6707172737õ7ö78.8L8łłłłłłģģ£ Žˆˆłłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  Ęr$1$If$IfL8p8‰8Š8ø8¹8ŗ8»8ņ8ó8O9g9©9Š9ü9łłšćŻ”ĢŻłłłłłł$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  Ęr$1$If $$Ifa$$IfŠ8¤8„8·8ü9::*:†;£;¤;¶;p<‹<Œ<ž<‘=®=Æ=Į=?#?$?6?A@^@_@q@4AQARAdA§BĀBĆBÕBžC¹CŗCĢCäD’DEEPFlFmFFķG H HHI3I4IFIXJuJvJˆJKKžK°KŗLŲLéLN)N*N*B*OJQJ^JphB*CJOJQJ^Jph5B*OJQJ^JphB*OJQJ^Jph5B*OJQJ\^JphJü9ż9+:,:-:.:‚:ƒ:¾:ę:;G;†;‡;·;łģā™0„~łłłłłłłģ$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If·;ø;¹;ŗ;<<<-<5<U<p<q<Ÿ< <”<ņ© ”Žˆˆˆˆˆˆˆņ~©Œ  ĘĄ$If$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  Ęr$1$If”<¢<Ä<Å<ķ<'=S=}=‘=’=Ā=Ć=Ä=Å=ų=źäŽŽŽŽŽŽŽŃĒ~ŌźäI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If$If$ & F „„°$If^„`„°a$ų=ł=>C>§>ņ>??7?8?9?:?|?}?¬?łłłłłłłģā™ģ„~łł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If¬?Ł?@,@A@B@r@s@t@u@“@”@µ@č@’@łłłłłģā™Ģ„~łłłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If’@ A4A5AeAfAgAhAÅAĘAńA BTB|B§Błłłģā™Ä„~łłłłłł$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$If§BØBÖB×BŲBŁBģBķB C4CNCzCžCŸCĶCłģā™Ü„~łłłłłłłģ$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$IfĶCĪCĻCŠCDD5DXD‡DČDäDåDEEEõ¬—‘‹‹‹‹‹‹‹~õ¬“  Ęr$1$If$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$IfEE5E6EE»EF;FOFPF€FF‚FƒFlGmGźä䎎ŽŽŽäŃäˆtźääI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  Ęr$1$If$If$If$ & F „„°$If^„`„°a$mG…GœG²GĻGģGķGHHH HÖH×HäHńHżHłłłłłóęóØˆóółłł$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  Ęr$1$If$If$IfżH IIIGIHIIIJI|I}IšIėIJ1JXJYJłłóęóˆółłłłłłł$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  Ęr$1$If$If$IfYJ‰JŠJ‹JŒJKK2KGKYKoK€KK±K²Kņ蟠Š„„~~~~~„ņ„$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If²K³K“KILJL]LsLLL¹LŗLźLėLģLķLüL¶ä”››•••••›ˆ›¶L”›  Ęr$1$If$If$If$ & F „„°$If^„`„°a$I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laöüLżL2MNM MĆMNN=N>N?N@NANTNUNłłłłłłłģā™——•“I$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö  ĘĄ$If  Ęr$1$If$IfUNVNčNéNOOOO‘O’O¹OŗOźäŽÅŽ|¬oäŽÅa„„$If^„`„  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If$ & F „„°$If^„`„°a$ \NčNéNśNūN OOO#O‘O’O„O¦OµO¹O¼OÅONPOPbPcPrPvPyP‡PāPćPōPõPQQ QQvQwQˆQ‰Q˜QœQŸQØQ1R2RCRDRSRXR[RfRüRżRSS S$S'S+SHS©SŖS»S¼SĖSĻSŅSÖSšSTTUTfTgTvTzT}TTńęŁęŁĖę»ńęŁęŁĖę»ńęŁęŁĖę»ńęŁęŁĖę»ńęŁęŁĖę»ńęŁęŁĖę»ńęŁęŁĖęń»ńęŁęŁĖęń»ńęŁęŁĖęń56>*B*OJQJ^Jph5B*OJQJ\^Jph5B*OJQJ^JphB*OJQJ^JphB*OJQJ\]^JphJŗO»O¼ONPOPvPwPxPyPāPćPQ Q Q¶ō©£„¶H©£„v¶P„„$If^„`„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö Q QvQwQœQQžQŸQ1R2RXRYRZR[RņģęĶævšņģęĶęv0ņI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö„„$If^„`„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If  & F Ę¾$If [RüRżR$S%S&S'S©SŖSĻSŠSŃSŅSTTłėŅĢƒ¬vłĢŅėƒ¬vł  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If ĘV. Ö“0Z„ˆ „$If^„ˆ `„„„$If^„`„$If TTUTzT{T|T}TžT’T$U%U&U'U”U¢UłąŅ‰Ø|vłąŅ‰Œ|vł$If  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö„„$If^„`„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If T–TžT’TUU U$U'U+UBU”U¢U³U“UĆUĒUŹUĪUźU—V˜V©VŖV¹V½VĄVĒVRWSWfWgWvWzW}WW›WRXSXdXeXtXxX{X‹XŻXŽXńXņXYYY YYsYtY…Y†Y•YšYY¢Y©Y&Z'Z:Z;ZJZNZQZXZóZōZ[[šā׏׏¼×āšā׏׏¼×āšā׏׏¼×šā׏׏¼×āšā׏׏¼×šā׏׏¼×āšā׏׏¼×āšā׏׏¼×šā׏×5B*OJQJ\^Jph5B*OJQJ^JphB*OJQJ^JphB*OJQJ\]^Jph56>*B*OJQJ^JphJ¢UĒUČUÉUŹU—V˜V½V¾VæVĄVRWSWzWęŲŲ‚|vęŲō‚|vę$If$If  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö„„$If^„`„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„ zW{W|W}WRXSXxXyXzX{XŻXŽXYYńØų›•vØ4›•v ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö„„$If^„`„ YYYsYtYšY›Y¶T©£„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö›YœYY&Z'ZNZOZ“Š§”›‚t„„$If^„`„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If  & F Ę¾$IfK$$If–l4”¤Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laöOZPZQZóZōZ[[[[ä[å[ \ \\¶4©£„¶Ä©£„v¶ „„$If^„`„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö [[[[[$[ä[å[ų[ł[\ \\\\n\o\€\\\”\—\š\]]%]&]5]9]<]H]Ö]×]č]é]ų]ü]’]^^Å^Ę^Ł^Ś^é^ķ^š^õ^ž^†_‡_š_›_Ŗ_®_±_¶_¼_½`¾`Ń`Ņ`į`å`č`ļ`DaóåŚĒ·©ŚóŚóåŚ©·©ŚóŚóåŚ·©ŚóŚóåŚ·©ŚóŚóåŚ©·©ŚóŚóåŚ©·©ŚóŚóåŚ©·©ŚóŚóåŚ·©B*OJQJ\]^Jph56>*B*OJQJ^Jph$56>*B*OJQJ\]^JphB*OJQJ^Jph5B*OJQJ\^Jph5B*OJQJ^JphB\\n\o\”\•\–\—\]]9]:];]<]ņģęĶæv”ņģęĶęv ņI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö„„$If^„`„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If  & F Ę¾$If <]Ö]×]ü]ż]ž]’]Å^Ę^ķ^ī^ļ^š^†_łóŚĢƒÄvłóŚĢƒvł  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö„„$If^„`„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If †_‡_®_Æ_°_±_½`¾`å`ę`ē`č`DaEałął—ÜŠ„łąv—Š„ł„„$If^„`„$If  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If DaEaUaVaeaiapaa=bbbebsbŌbÕbębēböbśbżb crcsc„c…c”c˜c›c£cöc÷cd dddd#d?d d”d“dµdÄdČdĖdŽd±eÄeÅeŌeŲeŪećef€f“f”f£f§fŖf±f.g/gBgCgRgVgYgagĄgĮgŌgÕgägčgėgōēōēŁōÉōēōÉ»ōēōēŁōÉ»ōēōēŁōÉ»ōēōēŁō»É»ōēōēŁōÉōēōēŁōÉ»ōēōēŁōÉ»ōēōēŁōÉ»ōēōēŁōB*OJQJ\]^Jph56>*B*OJQJ^Jph5B*OJQJ\^Jph5B*OJQJ^JphB*OJQJ^JphJEaiajakala*B*OJQJ^JphB*OJQJ\]^Jph?risitiuijjDjEjFjGj¹jŗjßjąjńØH›•vńØl›•vń ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö„„$If^„`„ ąjįjājekfkkŽkkk‘k”k¢k¶ø©£„v¶ttol1$$1$„„$If^„`„ ĘV. Ö“0Z„ˆ „$If^„ˆ `„$If$If  & F Ę¾$IfI$$If–l4Ö0”’„6$š’’’’’’’’’’’’’’’’² ’’’’’’’’’’’’’’’’ö¢$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö ¢k£kulvlcndnenfnænĄnKo»oNpšččŻÕœ €zzmmm  & F$7$8$If$If  & F Ę¾$IfG$$If–lÖ0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$1$If $1$7$8$If$1$If & F Ę¾$1$If NpŠpJqKqLqMqšqńq¾rgstŸt t”t¢tuņņģ£T –ƒƒƒƒģ£„–  & F$7$8$If$If  & F Ę¾$IfI$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If  & F$7$8$Ifu u€vv‚vƒv w w"y#yģzķzīzļz/{0{łšź”°”łłłłłź”ģ”łł  & F Ę¾$IfI$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$If $7$8$If$If0{Y{§{Ä{ņ{'|(|)|*||€|K}L}‹}L€ņņņņņ頔“€€€€ „Z$7$8$If^„Z$If  & F Ę¾$IfI$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö $7$8$If  & F$7$8$IfL€M€N€O€¤€„€Y‚Z‚[‚\‚é‚ź‚‡ƒˆƒL†(ˆö­4 šš†­< šš „¼$If^„¼ „Z$If^„Z$If  & F Ę¾$IfI$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö $7$8$If¤€„€Z‚\‚é‚ź‚)ˆ+ˆiˆcŠeŠfŠhŠiŠkŠlŠnŠoŠqŠsŠtŠzŠ{Š|Š}Š~ŠµŠ¶Š·ŠøŠĮŠĀŠņŠóęŪĪóęŪĄęŪ»»»»ÆžÆžŒž‚xpmxfx OJQJ^J0J6OJQJ^J6CJOJQJ^J0J6OJQJ^J"0J6CJOJQJ^JmHnHu j0J6CJOJQJU^J0J6CJOJQJ^J jU5B*OJQJ]^Jph5B*OJQJ^JphB*OJQJ^JphB*OJQJ]^Jph6B*OJQJ^Jph (ˆ)ˆ*ˆ+ˆiˆjˆcŠdŠeŠgŠhŠjŠkŠmŠnŠpŠqŠ¶ŠøŠł°č£łłł°”””””””””Ÿ”  & F Ę¾$IfI$$If–l4Ö0”’„$š’’’’’’’’’’’’’’’’ !’’’’’’’’’’’’’’’’öü$ööÖ’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’Ö’’’’’’’’4Ö laö$IfņŠóŠłŠśŠūŠüŠżŠ‹‹ķßķĢķĀ·B*OJQJ^Jph6CJOJQJ^J%0J6CJOJQJ]^JmHnHu0J6CJOJQJ]^J#j0J6CJOJQJU]^JøŠżŠžŠ’Š‹‹‹‹‹‹‹‹‹żūłūłūżūłūūū #0P°Š/ °ą=!°"°# $ %° i0@ń’0 Normal_HmH sH tH <@< Heading 1$7$8$@& 5\aJ@@@ Heading 2$7$8$@&5CJ\aJFF Heading 3$$7$8$@&a$5CJ \aJ <A@ņ’”< Default Paragraph Font*žOņ* question7$8$@žO@ question&Answer Ę¾7$8$2žOń2 answer ĘĢz Xņ8>@"8 Title$7$8$a$5CJ \aJ TžOń2T multiplechoiceanswer ĘV„V„Ŗž^„V`„Ŗž<žO1B< answerline Ę. Ö“(žOńR( FBquestion0žOAb0 FBanswerline\LžOrL TF answer! Ę ĢņÖ„“„Lä^„“`„Lä5\, @‚, Footer  ĘąĄ!,@’, Header  ĘąĄ!&)@¢”& Page Number8J@²8 Subtitle$a$ 5CJ \]‡œ’’’’ 89:OPQČÉüżž’?@qrst«¬ŻŽßąIJKLø¹ģķīļ%&XYZ[¼½ńņóō01efghąįµ¶éźėģfgš›œĶĪNOƒ„…†}~°±²³% & Y Z [ \ Ž  Ą Į Ā Ć ( ) Z [ \ ] ¹ ŗ ī ļ š ń Ī Ļ     O P „ … † ‡  A B C D š › Ķ Ī Ļ Š /0defgķī"#$%RS‡ˆ‰ŠŁŚpq£¤„¦9:lmnoŽßOP‚ƒ„&'Z[\]šń#$%&˜™ĢĶĪĻ<=pqrsŚŪķļ"#$%fg˜™š›‹ŒæĄĮĀóō%&'(ij›œžŸŗ»¼ŻŽł';PQ€‚³“ā!B„›œĢĶĪĻMˆ¤Ēčé=>Zl«ŠŃ’%&tŠ&=>lmno‘’ ³ĘÖźė    I J k ‹ · Ż !!6!7!8!9!{!|!ž!ø!ę!"3"4"d"e"f"g"Ó"Ō"ć"ķ"ū"#$#%#S#T#U#V###¬#Ź#į#ń#$$C$D$E$F$€$$”$§$Į$Ö$ī$ļ$% %!%"%n%o%„%›%»%Ņ%é%ź%&&&&g&h&‚&Ø&Ł&','-']'^'_'`' '”'¾'Ü'ö' (((L(M(N(O(r(s(©(Ā(ū( )')()X)Y)Z)[)x)y)Ļ) *H**°*±*ß*ą*į*ā*++1+K+}+ž+ß+ą+,,,,!,",G,l,š,Ć,ņ,ó,!-"-#-$-L-M-‡-Ņ-$.[.Ž..½.¾.æ.Ą.é.ź./w/Å/ć/;0<0l0m0n0o0Ŗ0«0Ł01?1u1­1®1Ü1Ż1Ž1ß1 22<2‚2˜2Ó2’2303132333õ3ö34.4L4p4‰4Š4ø4¹4ŗ4»4ņ4ó4O5g5©5Š5ü5ż5+6,6-6.6‚6ƒ6¾6ę67G7†7‡7·7ø7¹7ŗ7888-858U8p8q8Ÿ8 8”8¢8Ä8Å8ķ8'9S9}9‘9’9Ā9Ć9Ä9Å9ų9ł9:C:§:ņ:;;7;8;9;:;|;};¬;Ł;<,<A<B<r<s<t<u<“<”<µ<č<’< =4=5=e=f=g=h=Å=Ę=ń= >T>|>§>Ø>Ö>×>Ų>Ł>ģ>ķ> ?4?N?z?ž?Ÿ?Ķ?Ī?Ļ?Š?@@5@X@‡@Č@ä@å@AAAA5A6AA»AB;BOBPB€BB‚BƒBlCmC…CœC²CĻCģCķCDDD DÖD×DäDńDżD EEEGEHEIEJE|E}EšEėEF1FXFYF‰FŠF‹FŒFGG2GGGYGoG€GG±G²G³G“GIHJH]HsHHH¹HŗHźHėHģHķHüHżH2INI IĆIJJ=J>J?J@JAJTJUJVJčJéJKKKK‘K’K¹KŗK»K¼KNLOLvLwLxLyLāLćLM M M MvMwMœMMžMŸM1N2NXNYNZN[NüNżN$O%O&O'O©OŖOĻOŠOŃOŅOTPUPzP{P|P}PžP’P$Q%Q&Q'Q”Q¢QĒQČQÉQŹQ—R˜R½R¾RæRĄRRSSSzS{S|S}SRTSTxTyTzT{TŻTŽTUUUUsUtUšU›UœUU&V'VNVOVPVQVóVōVWWWWäWåW X XXXnXoX”X•X–X—XYY9Y:Y;Y€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0?€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0@€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0A€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0B€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0C€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0D€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0E€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0F€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0G€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0H€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0I€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0J€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0K€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0L€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0M€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0N€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ© 0O€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ©0€Ÿ«0€Ÿ©0€Ÿ™0€Ÿ0€€0€€0€@J˜0€AJ© 0P€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0Q€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0R€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0S€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0T€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0U€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0V€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0W€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0X€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0Y€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0Z€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0[€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0\€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0]€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0^€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0_€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0`€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0a€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0b€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0c€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0d€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0e€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0f€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0g€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0h€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0i€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0j€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0k€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0l€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0m€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0n€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0o€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0p€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0q€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0r€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0s€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0t€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0u€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0v€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ© 0w€AJ©0€AJ©0€AJ©0€AJ©0€AJ™0€AJ˜0€AJ˜0€AJ0€@J˜0€‘g© 0x€‘g©0€‘g©0€‘g©0€‘g©0€‘g™0€‘g© 0y€‘g©0€‘g©0€‘g© 0€‘g© 0€‘g© 0€‘g© 0€‘g© 0€‘g©0€‘g™0€‘g© 0z€‘g©0€‘g©0€‘g© 0€‘g© 0€‘g© 0€‘g© 0€‘g©0€‘g™0€‘g© 0{€‘g©0€‘g©0€‘g©0€‘g©0€‘g™0€‘g© 0|€‘g©0€‘g©0€‘g©0€‘g©0€‘g©0€‘g©0€‘g™0€‘g© 0}€‘g©0€‘g©0€‘g© 0€‘g© 0€‘g© 0€‘g© 0€‘g© 0€‘g©0€‘g™0€‘g© 0~€‘g©0€‘g©0€‘g©0€‘g©0€‘g©0€‘g©0€‘g©0€‘g™0€‘g© 0€‘g©0€‘g©0€‘g©0€‘g©0€‘g™0€‘g© 0€€‘g©0€‘g©0€‘g©0€‘g©0€‘g©0€‘g©0€‘g©0€‘g™0€‘g© 0€‘g©0€€©0€€©0€€™0€€ 0š@0€€˜@0€€š@0€€š@0€€˜@0€€š@0€€˜@0€€ 0 S™›Ÿ”¤¤Š8\NT[Daėg¤€ņŠ‹vŠ­²ø¼ĀŹĢ@Lņ¶  Z ŗ‡eŚo[=%&Ž!Ē Ń!m#$|%ķ&ń'ļ(*`+s, .ž/ó0¾2o46L8ü9·;”<ų=¬?’@§BĶCEmGżHYJ²KüLUNŗO Q[RTT¢UzWY›YOZ\<]†_EaśbdŪeĄgriąj¢kNpu0{L€(ˆøŠ‹wyz{|}~€‚ƒ„…†‡ˆ‰‹ŒŽ‘’“”•–—˜™š›œžŸ ”¢£¤„¦§Ø©Ŗ«¬®Æ°±³“µ¶·¹ŗ»½¾æĄĮĆÄÅĘĒČÉĖĶ‹x”–¤!’•€!’•€š8š@ń’’’€€€÷š’šš0š( š ššB šS šæĖ’ ?š’’ truefalse mulchoice fillblankessay:?J‘g ‡:?J‘g ‡ÉŠ@G¬³¹Ą&-½Ä18įč¶½gnĪÕOV~…& -  – ) 0 ŗ Į Ļ Ö P W   › ¢ 07īõSZŚįqx:AßęPW'.ńų™ =DŪāļögnŒ“ōūjqQXœ£éšŃŲ>Eėņ! !4";"%#,#$$ļ$ö$ź%ń%-'4'(%(()/)±*ø*ą+ē+ó,ś,.–.<0C0®1µ133Š4‘4ż56‡7Ž7q8x8’9™9;;B<I<5=<=Ø>Æ>Ÿ?¦?å@ģ@PBWBķCōCEEYF`FGˆGHœHŗHĮHJJd†e†e†g†g†h†h†j†k†m†n†p†q†s†}†ņ†ü†‡ ‡Q“™ČÉŠ@G¬³¹Ą&-½Ä18įč¶½ģfgnĪÕLNOV~…& -  – ) 0 ŗ Į Ļ Ö P W   › ¢ 07īõSZŚįqx:AßęPW'.ńų™ =Ds‡ŲŚŪāļögnŒ“ōūjqŽįéü'QX“·ŗåč$'EH‡Š›œ£!(PT‹’§«ŹŃčéš>AE]`or“—®²ŠŃŲ&)0w{ÓŁ>E’•ž£±¶ÄÉĢÖėņJ M P n t Ž  ŗ ¼ ą ć !! !|!!„!”!¦!»!¾!é!š!""3"4";"Ō"×"į"ę"ė"š"ł"ū"%#,#¬#Æ#²#Ķ#Š#ä#ē#ō#ż#$$$$„$’$—$„$Ŗ$³$Ä$Ė$Ł$ā$ī$ļ$ö$o%r%v%‡%‹%ž%£%¾%Ā%Õ%Ł%é%ź%ń%h&k&o&…&Ž&«&²&Ü&ć&'-'4'”'¤'¦'Į'Ć'ß'į'ö'ł'ū'(((%(v(ƒ(¬(±(Å(Ė(ž()))()/)|)†)Ņ)Ś)**K*M*‚*…*±*ø*++4+7+N+R+€+ƒ+”+¤+ą+ē+ó,ś,P-S-Š--Õ-Ų-'.*.^.a..–.ķ.ł.//z/}/Č/Ń/ę/é/<0C0®0±0Ü0ß011B1E1x1~1®1µ122?2E2…2‡2›2”2Ö2Ü233Š4‘4ö4’4R5[5j5s5¬5·5Ó5Ż5ż56†6‹6Į6É6é6ķ677J7O7‡7Ž7Š7Ó7q8x8Č8Ī8š8ō8*9,9V9^9’9™9ü9::#:F:M:Ŗ:±:;;€;„;Æ;³;Ü;ą;B<I<—<›<ø<¾<ė<ļ<==#=&=5=<=É=Ń=ō=ų=>>W>_>>‡>Ø>Æ>š>ö>??7?>?Q?U?}?€?Ÿ?¦? @@8@>@[@e@Š@Ž@Ė@Ń@å@ģ@9ACA‚AŠA¾AÅABBPBWBpCxCˆCCŸC§CµCĄCŅC×CķCōCŚDāDēDļDōDūDEE EEEE€E†EE¢EīEņEFF4F9FYF`FGˆGŗHĮHI I5I=IQIVI£I©IĘIĪIJJN‰NU UUŸUčVņVßWćWXX’YZšZņZ±[³[¤d¦d?kIkÖkŁküvwd†e†e†g†g†h†h†j†k†m†n†p†q†s†}†ņ†ü†‡ ‡33333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333ÉŠąįņó@GWXgh¬³ĆÄÓŌ/0?@¹ĄŠŃāć&->?NO½ÄÕÖēč18IJ[\įčłś  ¶½ĶĪßąöūgn~‘ĪÕåę÷ų OVghyzTa~…–—¦§& - = > O P  – ¦ § ¶ ·   ) 0 @ A P Q ŗ Į Ņ Ó ä å Ļ Ö ē č ÷ ų P W h i z {   % & 7 8 › ¢ ³ “ Ć Ä Ö Ö 07HIZ[īõSZkl}~Śįńņqx‰Š™šŗ»:ARSbcßęö÷PWghwx'.>?PQńų  ™ °±ĀĆ=DTUfgŪāņóļögn~ŽŒ“£¤µ¶ōū  jq‚‘’§©*+::>?OOQX()89œ£éšŃŲ%%(*+,<<>EeeŁŚééėņ  ! !4";"ž"’"########%#,#$$ļ$ö$ź%ń%''+'+'-'4'(%(()/)±*ø*ą+ē+ó,ś,l-l-.–.<0C0®1µ133Š4‘4ż56‡7Ž7q8x8€9999’9™9õ:ö:;;;;<<+<+</<0<@<@<B<I<==5=<=Ø>Æ>Ÿ?¦?å@ģ@>B?BNBNBPBWBķCōCEEYF`F"G#G5G6GJGKG\G]GrGsGGˆGMHNH`HaHvHwHH‘H H”HŗHĮHJJ½R½R$V%V-X-XķZķZ‰^Œ^—^—^!_$_'_'_Y_\_×aŲad9dAdwdfj‡jˆjjžj¼jĄjĄjKkKk»k»kNlNlŠlŠlgo}oppėvėvLy‹yŠ{‹{˜{™{x}x}d†e†g†h†s†}†~†«†“†µ†ø†ø†Ą†Į†Ā†ļ†š†ņ†ü†ż†ż†ž†‡ ‡’’KyleNC:\MyData\Texts\Laudon Ess 6e\Test Item File\1st draft\LaudonEss6_TIF_ch05.docUGOLDRO0C:\MyData\LaudonEss6eTIF\LaudonEss6_TIF_ch05.docKylePC:\MyData\Texts\Laudon Ess 6e\Test Item File\Final Draft\LaudonEss6_TIF_ch05.docKylePC:\MyData\Texts\Laudon Ess 6e\Test Item File\Final Draft\LaudonEss6_TIF_ch05.docDP_²XF’’’’’’’’’I.ĄÓfÉ’’’’’’’’’~LYžŅø™’’’’’’’’’&žŅø™’’’’’’’’’ŻĖ"īb”’’’’’’’’’NA'ŽbTY’’’’’’’’’īA>”’’’’’’’’’pIE@P՜?’’’’’’’’’VOÕExƒ“­’’’’’’’’’¹JkFŅ$r·’’’’’’’’’ö\AJĘqčt’’’’’’’’’5iVīA>”’’’’’’’’’÷iwVz‚q’’’’’’’’’7-„ZĘqčt’’’’’’’’’’x‘_J· ’’’’’’’’’~aĘqčt’’’’’’’’’8;Ücxƒ“­’’’’’’’’’oCuīA>”’’’’’’’’’”tv¬Ž^’’’’’’’’’1‚yīA>”’’’’’’’’’h „*„˜žĘ*^„*`„˜ž‡hˆH.h „„˜žĘ^„`„˜ž‡hˆH.’h „Ų „L’ĘŲ ^„Ų `„L’‡hˆH.h „Ø „˜žĘØ ^„Ø `„˜ž‡hˆH.h „x„˜žĘx^„x`„˜ž‡hˆH.’h „H„L’ĘH^„H`„L’‡hˆH.h „„˜žĘ^„`„˜ž‡hˆH.h „č„˜žĘč^„č`„˜ž‡hˆH.’h „ø„L’Ęø^„ø`„L’‡hˆH.h „Š„˜žĘŠ^„Š`„˜ž‡hˆH.h „ „˜žĘ ^„ `„˜ž‡hˆH.’h „p„L’Ęp^„p`„L’‡hˆH.h „@ „˜žĘ@ ^„@ `„˜ž‡hˆH.h „„˜žĘ^„`„˜ž‡hˆH.’h „ą„L’Ęą^„ą`„L’‡hˆH.h „°„˜žĘ°^„°`„˜ž‡hˆH.h „€„˜žĘ€^„€`„˜ž‡hˆH.’h „P„L’ĘP^„P`„L’‡hˆH.h „h„˜žĘh^„h`„˜ž‡hˆH.h „8„˜žĘ8^„8`„˜ž‡hˆH.’h „„L’Ę^„`„L’‡hˆH.h „Ų „˜žĘŲ ^„Ų `„˜ž‡hˆH.h „Ø „˜žĘØ ^„Ø `„˜ž‡hˆH.’h „x„L’Ęx^„x`„L’‡hˆH.h „H„˜žĘH^„H`„˜ž‡hˆH.h „„˜žĘ^„`„˜ž‡hˆH.’h „č„L’Ęč^„č`„L’‡hˆH.h „*„˜žĘ*^„*`„˜ž‡hˆH.h „ś„˜žĘś^„ś`„˜ž‡hˆH.h „Ź„L’ĘŹ^„Ź`„L’‡hˆH.h „š „˜žĘš ^„š `„˜ž‡hˆH.h „j„˜žĘj^„j`„˜ž‡hˆH.h „:„L’Ę:^„:`„L’‡hˆH.h „ „˜žĘ ^„ `„˜ž‡hˆH.h „Ś„˜žĘŚ^„Ś`„˜ž‡hˆH.h „Ŗ„L’ĘŖ^„Ŗ`„L’‡hˆH.„Š„˜žĘŠ^„Š`„˜žo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.„Š„˜žĘŠ^„Š`„˜žo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.h „€„˜žĘ€^„€`„˜ž‡hˆH.h „P„˜žĘP^„P`„˜ž‡hˆH.h „ „L’Ę ^„ `„L’‡hˆH.h „š „˜žĘš ^„š `„˜ž‡hˆH.h „Ą„˜žĘĄ^„Ą`„˜ž‡hˆH.h „„L’ʐ^„`„L’‡hˆH.h „`„˜žĘ`^„``„˜ž‡hˆH.h „0„˜žĘ0^„0`„˜ž‡hˆH.h „„L’Ę^„`„L’‡hˆH.+„Š„˜žĘŠ^„Š`„˜žo(.„ „˜žĘ ^„ `„˜žo(.„$ „˜žĘ$ ^„$ `„˜žo()€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.h „h„˜žĘh^„h`„˜ž‡hˆH.h „8„˜žĘ8^„8`„˜ž‡hˆH.’h „„L’Ę^„`„L’‡hˆH.h „Ų „˜žĘŲ ^„Ų `„˜ž‡hˆH.h „Ø „˜žĘØ ^„Ø `„˜ž‡hˆH.’h „x„L’Ęx^„x`„L’‡hˆH.h „H„˜žĘH^„H`„˜ž‡hˆH.h „„˜žĘ^„`„˜ž‡hˆH.’h „č„L’Ęč^„č`„L’‡hˆH.h „h„˜žĘh^„h`„˜ž‡hˆH.h „8„˜žĘ8^„8`„˜ž‡hˆH.’h „„L’Ę^„`„L’‡hˆH.h „Ų „˜žĘŲ ^„Ų `„˜ž‡hˆH.h „Ø „˜žĘØ ^„Ø `„˜ž‡hˆH.’h „x„L’Ęx^„x`„L’‡hˆH.h „H„˜žĘH^„H`„˜ž‡hˆH.h „„˜žĘ^„`„˜ž‡hˆH.’h „č„L’Ęč^„č`„L’‡hˆH.h „€„˜žĘ€^„€`„˜ž‡hˆH.h „P„˜žĘP^„P`„˜ž‡hˆH.’h „ „L’Ę ^„ `„L’‡hˆH.h „š „˜žĘš ^„š `„˜ž‡hˆH.h „Ą„˜žĘĄ^„Ą`„˜ž‡hˆH.’h „„L’ʐ^„`„L’‡hˆH.h „`„˜žĘ`^„``„˜ž‡hˆH.h „0„˜žĘ0^„0`„˜ž‡hˆH.’h „„L’Ę^„`„L’‡hˆH.h„Š„˜žĘŠ^„Š`„˜žo(.h„ „˜žĘ ^„ `„˜ž.’h„p„L’Ęp^„p`„L’.h„@ „˜žĘ@ ^„@ `„˜ž.h„„˜žĘ^„`„˜ž.’h„ą„L’Ęą^„ą`„L’.h„°„˜žĘ°^„°`„˜ž.h„€„˜žĘ€^„€`„˜ž.’h„P„L’ĘP^„P`„L’.+„Š„˜žĘŠ^„Š`„˜žo(.„ „˜žĘ ^„ `„˜žo(.„$ „˜žĘ$ ^„$ `„˜žo()„@ „˜žĘ@ ^„@ `„˜ž.„„˜žĘ^„`„˜ž.„ą„L’Ęą^„ą`„L’.„°„˜žĘ°^„°`„˜ž.„€„˜žĘ€^„€`„˜ž.„P„L’ĘP^„P`„L’.h „*„˜žĘ*^„*`„˜ž‡hˆH.h „ś„˜žĘś^„ś`„˜ž‡hˆH.h „Ź„L’ĘŹ^„Ź`„L’‡hˆH.h „š „˜žĘš ^„š `„˜ž‡hˆH.h „j„˜žĘj^„j`„˜ž‡hˆH.h „:„L’Ę:^„:`„L’‡hˆH.h „ „˜žĘ ^„ `„˜ž‡hˆH.h „Ś„˜žĘŚ^„Ś`„˜ž‡hˆH.h „Ŗ„L’ĘŖ^„Ŗ`„L’‡hˆH.h „€„˜žĘ€^„€`„˜ž‡hˆH.h „P„˜žĘP^„P`„˜ž‡hˆH.’h „ „L’Ę ^„ `„L’‡hˆH.h „š „˜žĘš ^„š `„˜ž‡hˆH.h „Ą„˜žĘĄ^„Ą`„˜ž‡hˆH.’h „„L’ʐ^„`„L’‡hˆH.h „`„˜žĘ`^„``„˜ž‡hˆH.h „0„˜žĘ0^„0`„˜ž‡hˆH.’h „„L’Ę^„`„L’‡hˆH.+„Š„˜žĘŠ^„Š`„˜žo(.„ „˜žĘ ^„ `„˜žo(.„$ „˜žĘ$ ^„$ `„˜žo()„@ „˜žĘ@ ^„@ `„˜ž.„„˜žĘ^„`„˜ž.„ą„L’Ęą^„ą`„L’.„°„˜žĘ°^„°`„˜ž.„€„˜žĘ€^„€`„˜ž.„P„L’ĘP^„P`„L’.„$ „˜žĘ$ ^„$ `„˜žo()€„ō „˜žĘō ^„ō `„˜ž.„Ä„L’ĘÄ^„Ä`„L’.€„”„˜žĘ”^„”`„˜ž.€„d„˜žĘd^„d`„˜ž.‚„4„L’Ę4^„4`„L’.€„„˜žĘ^„`„˜ž.€„Ō„˜žĘŌ^„Ō`„˜ž.‚„¤„L’ʤ^„¤`„L’.+„Š„˜žĘŠ^„Š`„˜žo(.„ „˜žĘ ^„ `„˜žo(.„$ „˜žĘ$ ^„$ `„˜žo()„@ „˜žĘ@ ^„@ `„˜ž.„„˜žĘ^„`„˜ž.„ą„L’Ęą^„ą`„L’.„°„˜žĘ°^„°`„˜ž.„€„˜žĘ€^„€`„˜ž.„P„L’ĘP^„P`„L’.h „€„˜žĘ€^„€`„˜ž‡hˆH.h „P„˜žĘP^„P`„˜ž‡hˆH.h „ „L’Ę ^„ `„L’‡hˆH.h „š „˜žĘš ^„š `„˜ž‡hˆH.h „Ą„˜žĘĄ^„Ą`„˜ž‡hˆH.h „„L’ʐ^„`„L’‡hˆH.h „`„˜žĘ`^„``„˜ž‡hˆH.h „0„˜žĘ0^„0`„˜ž‡hˆH.h „„L’Ę^„`„L’‡hˆH.h „*„˜žĘ*^„*`„˜ž‡hˆH.h „ś„˜žĘś^„ś`„˜ž‡hˆH.h „Ź„L’ĘŹ^„Ź`„L’‡hˆH.h „š „˜žĘš ^„š `„˜ž‡hˆH.h „j„˜žĘj^„j`„˜ž‡hˆH.h „:„L’Ę:^„:`„L’‡hˆH.h „ „˜žĘ ^„ `„˜ž‡hˆH.h „Ś„˜žĘŚ^„Ś`„˜ž‡hˆH.h „Ŗ„L’ĘŖ^„Ŗ`„L’‡hˆH.„Š„˜žĘŠ^„Š`„˜žo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.h „*„˜žĘ*^„*`„˜ž‡hˆH.h „ś„˜žĘś^„ś`„˜ž‡hˆH.h „Ź„L’ĘŹ^„Ź`„L’‡hˆH.h „š „˜žĘš ^„š `„˜ž‡hˆH.h „j„˜žĘj^„j`„˜ž‡hˆH.h „:„L’Ę:^„:`„L’‡hˆH.h „ „˜žĘ ^„ `„˜ž‡hˆH.h „Ś„˜žĘŚ^„Ś`„˜ž‡hˆH.h „Ŗ„L’ĘŖ^„Ŗ`„L’‡hˆH.¹JkFNA'×zÅ9”tvŻĖ"’x‘_÷iwVoCu5iV1‚y7-„ZpIE@’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’                                    @Š -        –Ļpx\Ś~©Pķ@4                                 ­(Y                 ‚V"        ø|„         :OPQżž’rstŽßąJKLķīļYZ[ņóōfghźėģ›œ„…†±²³Z [ \ Į Ā Ć [ \ ] ļ š ń    … † ‡ B C D Ī Ļ Š efg#$%ˆ‰Š¤„¦mno‚ƒ„[\]$%&ĶĪĻqrs#$%™š›ĄĮĀ&'(œ»¼€‚ĶĪĻmno   7!8!9!e"f"g"T#U#V#D$E$F$ %!%"%&&&^'_'`'M(N(O(Y)Z)[)ą*į*ā*,,,"-#-$-¾.æ.Ą.m0n0o0Ż1Ž1ß1132333¹4ŗ4»4,6-6.6ø7¹7ŗ7 8”8¢8Ć9Ä9Å98;9;:;s<t<u<f=g=h=×>Ų>Ł>Ī?Ļ?Š?AAAB‚BƒBDD DHEIEJEŠF‹FŒF²G³G“GėHģHķH>J?JUJVJKKKŗK»K¼KwLxLyL M M MMžMŸMYNZN[N%O&O'OŠOŃOŅO{P|P}P%Q&Q'QČQÉQŹQ¾RæRĄR{S|S}SyTzT{TUUU›UœUUOVPVQVWWW XXX•X–X—X:Y;Y?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ”¢£¤„¦§Ø©Ŗ«¬­®Æ°±²³“µ¶·ø¹ŗ»¼½¾æĄĮĀĆÄÅĘĒČÉŹĖĢĶĪž’’’ŠŃŅÓŌÕÖ×ŲŁŚŪÜŻŽßąįāćäåęēčéźėģķīļšńņóōõö÷ųłśūüżž’      !"#$%&'()*+,-./012345ž’’’789:;<=ž’’’?@ABCDEž’’’ż’’’ż’’’ż’’’Jž’’’ž’’’ž’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’Root Entry’’’’’’’’ ĄF Šuł&ÄL€1Table’’’’’’’’’’’’Ļ[ĢWordDocument’’’’’’’’%œSummaryInformation(’’’’6DocumentSummaryInformation8’’’’’’’’’’’’>CompObj’’’’jObjectPool’’’’’’’’’’’’ Šuł&Ä Šuł&Ä’’’’’’’’’’’’ž’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’ž’ ’’’’ ĄFMicrosoft Word Document MSWordDocWord.Document.8ō9²q