ࡱ> oqn (bjbj D xLL8<du$8{{(~~~#######$%O($~~~~~$/$@#@#@#~#@#~#@#@#@#m @##E$0u$@#(&(@#(@#~~@#~~~~~$$~~~u$~~~~(~~~~~~~~~L U: BCIS 1305 BUSINESS COMPUTER APPLICATIONS Homework 10 Part I True/False 1. Ethics are the principles and standards that guide our behavior toward other people. a) True b) False 2. Copyright is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents. a) True b) False 3. The Fair Use Doctrine says that you may not use copyrighted material in certain situations for example, in the creation of new work or, within certain limits, for teaching purposes. a) True b) False 4. Pirated software is the unauthorized use, duplication, distribution or sale of copyrighted software. a) True b) False 5. A worm hides your identity from the Web sites you visit. a) True b) False 6. Spyware is software that comes hidden in free downloadable software and collects information about you and your computer and reports it to someone without your permission. a) True b) False 7. A Web log consists of one line of information for every visitor to a Web site and is usually stored on a Web server. a) True b) False 8. Anonymous Web browsing (AWB) service gives your identity to the Web sites you visit. a) True b) False 9. Hackers are generally very knowledgeable computer users who use their knowledge to invade other people's computers. a) True b) False 10. Encryption scrambles the contents of a file so you can't read it without having the right decryption key. a) True b) False 11. People rarely do anything unethical involving computers. a) True b) False 12. E-mail is completely secure. a) True b) False 13. Phishing is often used to steal identities online. a) True b) False 14. One way you can sometimes separate legitimate e-mails from phishing e-mails is to examine the addresses closely. a) True b) False 15. It is illegal for companies to monitor employee e-mail. a) True b) False 16. A cookie a small file created by a Web page and stored on your computer. a) True b) False 17. Spam is unsolicited e-mail that advertises goods and services. a) True b) False 18. Spyware, sneakware, and stealthware are all different versions of cookies. a) True b) False 19. Biometrics identifies individuals based on physiological characteristics. a) True b) False 20. Denial-of-service means not being able to log on because of an invalid password. a) True b) False Part II Multiple Choice 21. What are the principles and standards that guide our behavior toward other people? a) Personal Morals b) Ethics c) Organizational culture d) Laws 22. There are different levels of uncertainty when faced with ethical decisions; each creates a sort of ring around the dilemma. What is true of the inside level or ring? a) Choices or decisions regarding the ethical dilemma become harder to make; uncertainty is high b) You are more certain of what is right or wrong; decisions become easier to make c) Illegal and/or unethical behavior become less tolerated by society d) Choices become harder to make and illegal and/or unethical behavior less tolerated 23. What countRy experiences the greatest revenue losses from pirated software? a) China b) United Kingdom c) Japan d) United States 24. What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent? a) Ethics b) Personal safety laws c) Identity theft laws d) Privacy 25. What program records every keystroke and mouse click executed on a computer? a) Keyboard recorder b) Trojan horse c) Virus d) Key logger 26. What happens to a CD when you burn images, videos, and music to it? a) Information about the software and hardware that you used are stored on the CD b) Personal and identifying information about you is stored on the CD c) Cookies that are stored on your computer are also transferred to your CD d) A distinct signature from the CD drive is left on your CD 27. What type of device can be installed on a vehicle that collects information about a person's reckless driving? a) Event data recorder (EDR) b) Traffic Safety Monitor (TSM) c) Mom's Offsite Monitor for Automobiles (MOMA) d) Parents Against Reckless Driving (PARD) 28. What is phishing? a) An investigative Web service b) A type of Internet game that allows subscribers to find out information about you and others living in its "virtual city" c) Information bots that surf the Web for you searching for specific information that you need d) Email and other online techniques that attempt to gain personal information from you 29. What browser image informs you that you're visiting a legitimate Web site? a) Chain link b) Key c) Green traffic light d) Padlock 30. Who commits most of the computer crime made against companies? a) Employees b) Competitors c) Terrorists d) Hackers 31. As an owner of a company, what would be a safe assumption on your part regarding your employees and their potential to commit crime? a) Most would not commit a crime b) Most will commit a crime c) It will depend on the socio economic status of your employees d) If "push came to shove" most employees would commit a crime 32. Often times, a company will hire a hacker to find vulnerabilities in systems and plug up the holes. What is this person called? a) Black-hat hacker b) Hactivist c) Cracker d) White-hat hacker 33. If you were trying to access your campus network but the system was unable to respond to you because it was overwhelmed with a flood of requests coming from some virus, what type of attack would you be experiencing? a) Worms b) Script kiddies c) Denial-of-service d) Cyber blackmail 34. What software should you install to protect your computer from computer viruses? a) Spyware b) Adware c) Worms d) Anti-virus 35. Which of the following cannot be used for biometrics? a) Fingerprint b) Retina c) Password d) Voice 36. Which of the following can a virus do? a) Hurt your hardware b) Hurt any files it wasn't designed to attack c) Infect files on write-protected disks d) Target and corrupts specific applications or files 37. Which of the following is a characteristic of a firewall? a) Examines each message as it seeks entrance to the network b) Blocks messages without the correct markings from entering the network c) Detects computers communicating with the Internet without approval d) Each of these items are characteristics of a firewall 38. When you purchase copyrighted software, what actually are you paying for? a) The cost of the CDs b) The cost of the CDs, manuals, and the cost of the software development c) A share of the cost of software development d) The right to use it 39. What is the name of the new anti-Spam bill? a) No-Spam b) CAN-Spam c) Spam-Away d) Stop Spam 40. What is intangible creative work that is embodied in physical form? a) Ethics b) Intellectual property c) Copyright d) Fair Use Doctrine     Chapter 8 - Protecting People and Information Page  PAGE 1 of  NUMPAGES 6 245HIJLMN. }hVh}hE h@h\!CJOJQJ^JaJ#hxB*CJOJQJ^JaJph)hSChMkB*CJOJQJ^JaJph#hMkB*CJOJQJ^JaJphhMkCJOJQJ^JaJh\!CJOJQJ^JaJ h@h[|CJOJQJ^JaJh[|CJOJQJ^JaJ&h]h[|5CJOJQJ^JaJhh[|5CJOJQJ^JaJ#h]h[|5CJOJQJ^JaJ)56=HIJ/ w I v x  gdMkgd[|$a$gd[|. 3 u v w { | H N u v w x | } vhW h@h8CJOJQJ^JaJhpUCJOJQJ^JaJ h@hvCJOJQJ^JaJ#hMkB*CJOJQJ^JaJph#hxB*CJOJQJ^JaJph)hSChMkB*CJOJQJ^JaJph#h@h[|>*CJOJQJ^JaJhMk>*CJOJQJ^JaJ h@h[|CJOJQJ^JaJhvCJOJQJ^JaJ    ! % & J K T W Y [ \  ! k p IJyIJyhIJ h@h8CJOJQJ^JaJ#hMkB*CJOJQJ^JaJph#hxB*CJOJQJ^JaJph)hSChMkB*CJOJQJ^JaJph#h@h[|>*CJOJQJ^JaJhMk>*CJOJQJ^JaJhpUCJOJQJ^JaJ h@h[|CJOJQJ^JaJh8CJOJQJ^JaJ( ! T V W  l  B D w y z gdMkgd[|     A B C D H I m n w y z | } ~ ǶǨǨǨǚygǶYYYǚygh"lCJOJQJ^JaJ#hMkB*CJOJQJ^JaJph#h@h[|>*CJOJQJ^JaJhMk>*CJOJQJ^JaJhpUCJOJQJ^JaJh8CJOJQJ^JaJ h@h8CJOJQJ^JaJ h@h[|CJOJQJ^JaJ#hxB*CJOJQJ^JaJph)hSChMkB*CJOJQJ^JaJph" `fǹǹǹnj}kYHǹǹ h@h"lCJOJQJ^JaJ#hMkB*CJOJQJ^JaJph#h@h[|>*CJOJQJ^JaJhMk>*CJOJQJ^JaJhpUCJOJQJ^JaJ h@hxCJOJQJ^JaJhxCJOJQJ^JaJh"lCJOJQJ^JaJ h@h[|CJOJQJ^JaJ#hxB*CJOJQJ^JaJph)hSChMkB*CJOJQJ^JaJphaCExz{IKLgdMkgd[|!BCDEIJnoxz{|}IJyhIJyhZIJhYe CJOJQJ^JaJ h@h"lCJOJQJ^JaJ#hMkB*CJOJQJ^JaJph#hxB*CJOJQJ^JaJph)hSChMkB*CJOJQJ^JaJph#h@h[|>*CJOJQJ^JaJhMk>*CJOJQJ^JaJhpUCJOJQJ^JaJ h@h[|CJOJQJ^JaJh"lCJOJQJ^JaJ#?@IMNPQ 6789=>bcln굧vhhhYhMk>*CJOJQJ^JaJh_CJOJQJ^JaJ h@hpUCJOJQJ^JaJ#h@h[|>*CJOJQJ^JaJhpUCJOJQJ^JaJhYe CJOJQJ^JaJ h@h[|CJOJQJ^JaJ#hxB*CJOJQJ^JaJph#hMkB*CJOJQJ^JaJph)hSChMkB*CJOJQJ^JaJph" 79lno35hjk9;npqgdMkgd[|nopqrs23459:^_hjklmop³zhZ³hzZZh\!CJOJQJ^JaJ#hxB*CJOJQJ^JaJph#hMkB*CJOJQJ^JaJph)hSChMkB*CJOJQJ^JaJph#h@h[|>*CJOJQJ^JaJhMk>*CJOJQJ^JaJhpUCJOJQJ^JaJh_CJOJQJ^JaJ h@h[|CJOJQJ^JaJ h@h\!CJOJQJ^JaJ#89:;?@denpqrstuɷɥɔxxjɥɷɔYxxjɷ h@hMkCJOJQJ^JaJhpUCJOJQJ^JaJh\!CJOJQJ^JaJh_CJOJQJ^JaJ h@h[|CJOJQJ^JaJ#hMkB*CJOJQJ^JaJph#hxB*CJOJQJ^JaJph)hSChMkB*CJOJQJ^JaJph#h@h[|>*CJOJQJ^JaJhMk>*CJOJQJ^JaJ"EUW /N[]^gd@$a$gd[|$a$gd[|1$gd[|gdMkgd[|DJTUVW[\Ƕǚǚnj}kYH h@hpUCJOJQJ^JaJ#hxB*CJOJQJ^JaJph#h@h[|>*CJOJQJ^JaJhMk>*CJOJQJ^JaJhpUCJOJQJ^JaJh\!CJOJQJ^JaJh_CJOJQJ^JaJ hpU6CJOJQJ]^JaJ h@h[|CJOJQJ^JaJ)hSChMkB*CJOJQJ^JaJph#hMkB*CJOJQJ^JaJphнnnnnnnnnnnnnnn h@h@CJOJQJ^JaJh d(CJOJQJ^JaJ h@hG2CJOJQJ^JaJh[|CJOJQJ^JaJ hwh[|CJOJQJ^JaJ$hwh[|B*OJQJ^Jhphh[|5OJQJ^Jhwh[|5OJQJ^J,hxwh[|B*CJOJQJ^JaJhph+ $%(./7EFMNV[\^`abchilmvw}~򱣱ӕӕӕh d(CJOJQJ^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJhhrCJOJQJ^JaJhpUCJOJQJ^JaJ:   %&()23<=@AHIPQWX^_abgop{|~޴ hhrhhrCJOJQJ^JaJhpUCJOJQJ^JaJhhrCJOJQJ^JaJh d(CJOJQJ^JaJ h@hG2CJOJQJ^JaJ h@h@CJOJQJ^JaJ:h/ 123 012gd@ #$&'.7>?EFLMOPTUXY`aghqrzппппппппппппбпбппппппппбпппппппппhhrCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJ hhrhhrCJOJQJ^JaJhxCJOJQJ^JaJFz{   #)*1±ޣޣޣ’hxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJh\>CJOJQJ^JaJ h@h\>CJOJQJ^JaJhpUCJOJQJ^JaJhhrCJOJQJ^JaJ h@hG2CJOJQJ^JaJ h@h@CJOJQJ^JaJ412345678<=?@CDIJLMOPTUZ[_`cdhikloprswx±бббббббббббббббб±бббббббббббб h@h@CJOJQJ^JaJh\>CJOJQJ^JaJ h@hG2CJOJQJ^JaJ h@h\>CJOJQJ^JaJhpUCJOJQJ^JaJD  $%(0124567;<CDKLQR[\_`efkltuwxyzӱ„h\>CJOJQJ^JaJ h@hpUCJOJQJ^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJ h@h@CJOJQJ^JaJhpUCJOJQJ^JaJ h@hG2CJOJQJ^JaJhhrCJOJQJ^JaJ42#%u bde(]gd@ 򱣱Ӓssh\>CJOJQJ^JaJ h@h\>CJOJQJ^JaJ hpU6CJOJQJ]^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJhhrCJOJQJ^JaJhpUCJOJQJ^JaJ-  "#$%-89>?BCKLOPXY]^abfgjkqrt|}´´´hhrCJOJQJ^JaJhpUCJOJQJ^JaJh\>CJOJQJ^JaJ h@hG2CJOJQJ^JaJ h@h@CJOJQJ^JaJG  $%()*23<=ABEFHINOQRVWYZ^_bcdefghijnпh\>CJOJQJ^JaJ h@h\>CJOJQJ^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJhpUCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJ9nostvw}~ !"'(±•hhrCJOJQJ^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJhuCJOJQJ^JaJh\>CJOJQJ^JaJ h@hG2CJOJQJ^JaJ h@h@CJOJQJ^JaJ:(056=>EFIJUV\]elmtu}~  &дh\>CJOJQJ^JaJhuCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJhhrCJOJQJ^JaJGX+-.&:M]_` gd@&+,/034:;ABDEHIQRWX`klpquvz{~бhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJhhrCJOJQJ^JaJhuCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJ@  !"&'+,-.012378?@EFMNQRVW]^fghistwx}~޿ޱУУУhhrCJOJQJ^JaJh9 ?CJOJQJ^JaJ h@h\>CJOJQJ^JaJhuCJOJQJ^JaJ h@hG2CJOJQJ^JaJ h@h@CJOJQJ^JaJ?%&.9:BLMU]^_`bcdegпбппппппппппУЕЕЕпУпhhrCJOJQJ^JaJhuCJOJQJ^JaJhYCJOJQJ^JaJh9 ?CJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJ5ghjkpqstuv~         $ % ) * 0 1 2 ´´hhrCJOJQJ^JaJhuCJOJQJ^JaJhYCJOJQJ^JaJ h@hG2CJOJQJ^JaJ h@h@CJOJQJ^JaJG2 3 8 9 A C D H I O P R S V W \ ] e f l m o p t u ~  бޕhYCJOJQJ^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJhhrCJOJQJ^JaJhuCJOJQJ^JaJ h@hG2CJOJQJ^JaJ h@h@CJOJQJ^JaJ6 9  !T!U!n!!!!!!!O""""""""">#M#gd@ !!!!!!!! !#!$!(!)!+!,!/!0!6!7!;!!?!C!D!J!K!R!S!T!U!]!f!g!пппппппппппппбпппппппппппhhrCJOJQJ^JaJhuCJOJQJ^JaJhYCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJh9 ?CJOJQJ^JaJ h@hxCJOJQJ^JaJ:g!m!n!v!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"""´hYCJOJQJ^JaJ h@hYCJOJQJ^JaJ h@h@CJOJQJ^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJhhrCJOJQJ^JaJhuCJOJQJ^JaJ h@hG2CJOJQJ^JaJ4" " """""""""""#"."/"3"4"5"6";"<">"?"G"H"N"S"T"X"Y"]"^"d"e"i"j"n"o"q"r"x"y"~"""""""""""""""""""´´£ hhrhhrCJOJQJ^JaJhhrCJOJQJ^JaJhuCJOJQJ^JaJhYCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJ<""""""""""""""""""## # # ###### #!#%#&#.#/#3#4#<#=#C#K#L#M#N#V#]#^#f#m#u#{####´УУВУУУУУУУУУУУУУ´´дhYCJOJQJ^JaJ h@hYCJOJQJ^JaJ h@h@CJOJQJ^JaJhhrCJOJQJ^JaJhuCJOJQJ^JaJ h@hG2CJOJQJ^JaJ hhrhhrCJOJQJ^JaJhxCJOJQJ^JaJ4M#N#^########$$$$?$@$[$$$$$$:%;%}%%&U&W&X&gd@###################################$ $$$$$→п~m h@hQCJOJQJ^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJhhrCJOJQJ^JaJ&h@hG26CJOJQJ]^JaJ h@h@CJOJQJ^JaJhYCJOJQJ^JaJ h@hhrCJOJQJ^JaJ h@hG2CJOJQJ^JaJ($$$$$$$$ $#$$$-$.$1$2$3$4$9$:$=$>$?$H$L$M$Q$R$Z$c$g$h$k$l$q$r$t$u${$|$$$$$$$$$$$$$$$$$$$$$$$$$$$±hxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJhhrCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJhQCJOJQJ^JaJ@$$$$$$$$$$$$$%%%% % %%%%%%%)%*%,%-%.%/%8%9%:%C%K%L%P%Q%X%Y%[%\%^%_%d%e%m%n%p%q%t%u%|%%%%%%%%%%%%%%%%%%Ϳ￱ޱhhrCJOJQJ^JaJh2CJOJQJ^JaJ h@h2CJOJQJ^JaJ h@hG2CJOJQJ^JaJ h@h@CJOJQJ^JaJF%%%%%%%%%%%%%%%&& &&&&&&&#&$&&&'&,&-&2&3&6&7&F&G&I&J&K&L&U&V&W&X&Z&[&\&]&a&b&e&f&n&o&z&{&&&пޒh2CJOJQJ^JaJ h@h2CJOJQJ^JaJhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJhhrCJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJ9&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&''''''#'$'&'''*'+'/'0'2'3';'<'G'H'L'± hhrhhrCJOJQJ^JaJhhrCJOJQJ^JaJh2CJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJCX&&&&'H'd'f'''''''''*(+(:(X(j(((((((((gd@L'M'P'S'T'Y'Z'\']'`'a'd'e'f'g'i'j'n'o'q'r'u'v'z'{'}'~'''''''''''''''''''''''''''пппппбпппппппппУЕЕЕппЄ h@h d(CJOJQJ^JaJhhrCJOJQJ^JaJh d(CJOJQJ^JaJh2CJOJQJ^JaJ h@h@CJOJQJ^JaJ h@hG2CJOJQJ^JaJ hhrhhrCJOJQJ^JaJhxCJOJQJ^JaJ4''''''''''(((( ( ( (((((("(#((()(*(3(9(:(>(?(B(N(O(W(`(i(r(v(w(z({(((((((((((((±hkh[|CJOJQJhQjhQUhxCJOJQJ^JaJ hhrhhrCJOJQJ^JaJhhrCJOJQJ^JaJ h@h@CJOJQJ^JaJh d(CJOJQJ^JaJ h@hG2CJOJQJ^JaJ6((((((((gd@gd[|gd[|((((((((((((((((((((((((铄铄ulhdS h@hG2CJOJQJ^JaJhQhCVxh[|hG2aJhkh[|CJOJQJaJhxCJOJQJmHnHu!jhkh[|CJOJQJUhkh[|CJOJQJaJh[|CJOJQJ^JaJ h[|h[|CJOJQJ^JaJ,hkh[|B*CJOJQJ\^JaJphhkh[|CJOJQJh[|CJOJQJB00P1N:p\!/ =!"#$% Dp^ 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH N@N [| Heading 1$1$7$8$@&5B*\phDA D 0Default Paragraph FontRiR 0 Table Normal4 l4a (k ( 0No List 44 G20Header  !66 0 Header CharCJaJ4 @4 G20Footer  !6!6 0 Footer CharCJaJF`2F [| No Spacing7$8$_HmH sH tH \A\ [|Heading 1 Char'5B*CJ\_HaJmH phsH tH PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK]  wwwz. nz1 n(&g2 g!""#$$%&L''(( !#$%&()*+-./01345679:;<>?@ABDEG 2 M#X&(("',28=CFW^`eqsz!8@0(  B S  ?   v !46NU!)qxfo!'  J R   p{}mt&+! #TX4<CJ36 !33333333333333333333333333333333333333{|%&VVHIyyIJzz?@KK6 7 = > n n 2 3 9 : j j 8 9 d e p p T U $ % ] ]  11$%00$%dd--__WWLMff> ? !{|%&VVHIyyIJzz?@KK6 7 = > n n 2 3 9 : j j 8 9 d e p p T U $ % ] ]  11$%00$%dd--__WWLMff> ? !" Ye  \!v! d(*2\>9 ?MkhrCVx[|_xu"lG2q%Q{qEpY8QGuR@pUtv7 @ d  X@UnknownG* Times New Roman5Symbol3. * Arial?= * Courier NewA BCambria Math"hE:fSFZ;;!9xv v 2Q$PG22!xx,Chapter 08 Protecting People and Informationdeepika.rameshfkumiOh+'0   0< \ h t0Chapter 08 Protecting People and Informationdeepika.ramesh Normal.dotmfkumi19Microsoft Office Word@ @6tOp@՜.+,0  hp  Hurix System;v  -Chapter 08 Protecting People and Information Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHJKLMNOPQRSTUVWXYZ[\]_`abcdeghijklmpRoot Entry Fſr1TableI(WordDocumentDSummaryInformation(^DocumentSummaryInformation8fCompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q