ࡱ> ` Dbjbj 3<  33383L4t R664666777QQQQQQQ$pShUR :77::R 66R2>>>:X 6 6Q>:Q>>M +Q6|6 ^3;dPQHR<RP~`Vk;`V$+Q`V +Q7S8>8lE9j777RRc>X777R:::: (3 3  Chapter 13: Electronic commerce and E-Business Multiple Choice: Who founded Amazon.com? Steve Wozniak Jeff Bezos Phil Knight Steven Jobs Answer: B Reference: Jeff Bezos: The Virtual Bookseller Difficulty: Easy Traditional e-commerce tools include all of the following EXCEPT: fax communication. a local area network. a wide area network. printing system. Answer: D Reference: Electronic Commerce in Perspective Difficulty: Easy What involves sharing information, developing and maintaining business relationships, and the use of telecommunications networks to conduct business? E-commerce Business-to-business (B2B) commerce Business-to-consumer (B2C) commerce Consumer-to-consumer (C2C) commerce Answer: A Reference: Electronic Commerce in Perspective Difficulty: Moderate The World Wide Web was developed in the decade of the: 1960s. 1970s. 1980s. 1990s. Answer: D Reference: Electronic Commerce in Perspective Difficulty: Moderate The dot-com bust of 2000-2001 caused approximately ___________ technology start-up businesses to close. 100 1,000 10,000 35,000 Answer: B Reference: Electronic Commerce in Perspective Difficulty: Moderate Internet-based companies are often referred to as: technology-savvy companies. brick-and-mortar companies. Fortune 100 companies. dot coms. Answer: D Reference: How E-Commerce is Transforming Business Difficulty: Easy E-commerce sales currently account for approximately ____________ percent of the U.S. economy. 5 10 25 35 Answer: A Reference: How E-Commerce is Transforming Business Difficulty: Moderate In a survey of CEOs that asked how e-commerce has changed the way they do business, CEOs cited all of the following EXCEPT: boosted online sales. decreased productivity. improved relationships with customers and suppliers. created more efficient supply chains. Answer: B Reference: How E-Commerce is Transforming Business Difficulty: Moderate What did a University of Texas study find in regard to market share growth for Internet-based companies in comparison to U.S. businesses overall? Internet-based companies are two and a half times higher than U.S. businesses overall. Internet-based companies have about the same rate of market share growth. Internet-based companies have slightly less market share growth than U.S. businesses overall. Internet-based companies have ten times higher overall business growth. Answer: A Reference: How E-Commerce is Transforming Business Difficulty: Moderate The basic idea of ____________ is that a minimum of two parties exchange products, services, and/or information using network technology. m-commerce e-commerce information interchange business-to-business structures Answer: B Reference: E-Commerce Models Difficulty: Moderate Business-to-employee (B2E) most closely equates to and is sometimes referred to as: consumer-to-consumer (C2C). business-to-consumer (B2C). business-to-business (B2B). consumer-to-business (C2B). Answer: C Reference: E-Commerce Models Difficulty: Moderate ____________ refers to an intranet that handles activities that take place within an organization. C2C B2C B2B B2E Answer: D Reference: E-Commerce Models Difficulty: Easy An example of B2C is: a law firm buying computer software for employees. Wal-Mart buying pet food directly from Iams. a student buying a snowboard from burton.com. a university buying desks from a manufacturer. Answer: C Reference: E-Commerce Models Difficulty: Easy An example of C2C is: eBay. burton.com. Amazon.com. Yahoo!. Answer: A Reference: E-Commerce Models Difficulty: Moderate A ____________ is a necessary part of an intranet. printer LAN with a minimum of ten PCs computer with server software mainframe Answer: C Reference: Characteristics of a B2E Intranet Difficulty: Moderate Most intranets use ____________ topology to connect the nodes of the network. Ethernet fiber optic satellite wireless Answer: A Reference: Characteristics of a B2E Intranet Difficulty: Moderate The communication software that an intranet uses is known as: firmware. Ethernet software. NICware. middleware. Answer: D Reference: Characteristics of a B2E Intranet Difficulty: Moderate ____________ manages the communication protocols for an intranet. Middleware TCP/IP Telecommunications NIC Answer: B Reference: Characteristics of a B2E Intranet Difficulty: Moderate What keeps unauthorized Internet users from accessing a computer? Middleware TIP/IP Firewall Secure wall Answer: C Reference: Characteristics of a B2E Intranet Difficulty: Moderate All of the following are examples of typical uses of an intranet EXCEPT: posting the employee handbook. allowing a group of employees to work on a file simultaneously. allowing customers to purchase products through the Web. posting changes in company health insurance policies. Answer: C Reference: How Organizations Use B2E Intranets Difficulty: Easy The connection of multiple private networks that can communicate through a private interorganizational information system is known as a(n): intranet. extranet. Internet. WAN. Answer: B Reference: Extranets to Connect Business Alliances Difficulty: Moderate A secure private network physically attaches intranets to an extranet through: coaxial cable. fiber optics. private leased phone lines. microwave and wireless transmissions. Answer: C Reference: Characteristics of a B2B Extranet Difficulty: Moderate A ___________ network has fairly low security and is relatively inexpensive. public secure private virtual private Internet virtual private Answer: A Reference: Characteristics of a B2B Extranet Difficulty: Moderate Internet virtual private networks are preferred for extranets for all of the following reasons EXCEPT they are: relatively economical in comparison to other options. reasonably private. fairly secure. complex which makes them more secure. Answer: D Reference: Characteristics of a B2B Extranet Difficulty: Moderate The ability of Proctor & Gamble to have up-to-the-minute inventory information and to know when to ship more product to Wal-Mart is an example of: B2B. C2C. B2C. an expert system. Answer: A Reference: How Business Alliances Use B2B Extranets Difficulty: Moderate Electronic communication between Wal-Mart and Proctor & Gamble is an example of a(n): intranet. extranet. LAN. WAN. Answer: B Reference: How Business Alliances Use B2B Extranets Difficulty: Moderate A typical problem with extranets is: employees dont trust the security provided. high cost. transaction costs are much higher than with traditional methods. extranet transactions are much slower than traditional methods. Answer: A Reference: How Business Alliances Use B2B Extranets Difficulty: Moderate The Global Trading Web Council involves companies from all of the following regions EXCEPT: Asia. North America. Europe. South America. Answer: D Reference: How Business Alliances Use B2B Extranets Difficulty: Challenging The primary obstacles that retails face in expansion of B2C e-commerce include all EXCEPT: ensuring safe transactions. ensuring private transactions. the complexity of Web pages. consumer perception of the safety of the Internet. Answer: C Reference: Customer-Centered Web Design Difficulty: Moderate An important Web site feature that companies use to foster customer loyalty is: allowing feedback from customers. creating multiple Web pages so customers do not get bored. creating complex Web pages. sending a thank-you e-mail after a purchase. Answer: A Reference: Customer-Centered Web Design Difficulty: Easy What does a company like UPS use to track packages through the transportation process? An extranet An intranet A VPN Bluetooth technology Answer: D Reference: How It Works 13.1: Package Routing and Tracking Difficulty: Moderate When a customer chooses an item for purchase on a Web site, the item is placed in a virtual: hand basket. paper bag. grocery bag. shopping cart. Answer: D Reference: How It Works 13.2: Online Shopping Difficulty: Easy A small Web file that contains information on particular items and is sent to and stored on a users computer is known as a(n): cookie. archived file. cracker. private security file. Answer: A Reference: How It Works 13.2: Online Shopping Difficulty: Moderate When a customer enters private credit card information on a Web site, it is: coded. encrypted. deciphered. programmed. Answer: B Reference: How It Works 13.2: Online Shopping Difficulty: Moderate Many small- and medium-sized businesses use e-commerce software developed by other businesses; these businesses therefore use: server software. server firewalls. Web client software. Web hosting service. Answer: D Reference: Some Technical Requirements of E-Commerce Difficulty: Moderate The Web Host Guild develops industry standards for: Web hosting companies. Web page design. hyperlinks and Web page graphics. ethical standards of e-commerce. Answer: A Reference: Some Technical Requirements of E-Commerce Difficulty: Challenging A business code of ethics should include all of the following EXCEPT information on: the organizations privacy policy. the companys intent to use personal information. how the company monitors Web usage behavior. how company employees should treat one another within a technical environment. Answer: D Reference: Ethical Issues of E-Commerce Difficulty: Moderate Fill in the Blank: ____________, the revolutionary Internet bookseller, was founded in 1994. Answer: Amazon.com Reference: Jeff Bezos: The Virtual Bookseller Difficulty: Easy The principles of ____________, conducting business transactions through telecommunications networks, are based on 50-year-old business practices. Answer: e-commerce Reference: Electronic Commerce in Perspective Difficulty: Moderate The term ____________ is sometimes used interchangeably with the term e-commerce. Answer: e-business Reference: Electronic Commerce in Perspective Difficulty: Moderate Traditional businesses are also called ____________ companies. Answer: brick-and-mortar Reference: How E-Commerce is Transforming Business Difficulty: Moderate ____________ is connecting to the Internet and intranets through handheld computers, cell phones, and PDAs. Answer: M-commerce or Mobile commerce Reference: How E-Commerce is Transforming Business Difficulty: Moderate When a nursery buys from a farmer who grows plants specifically for nurseries, it is known as ____________. Answer: B2B or business-to-business Reference: E-Commerce Models Difficulty: Moderate B2C stands for ____________. Answer: business-to-consumer Reference: E-Commerce Models Difficulty: Moderate B2E stands for ____________. Answer: business-to-employee Reference: E-Commerce Models Difficulty: Moderate C2C stands for ____________. Answer: consumer-to-consumer Reference: E-Commerce Models Difficulty: Moderate An internal company network is known as a(n) ____________. Answer: intranet Reference: E-Commerce Models Difficulty: Easy On a network, there is a computer with server software and computers with ____________ software. Answer: client Reference: Characteristics of a B2E Intranet Difficulty: Moderate VPN stands for ___________. Answer: virtual private network Reference: Characteristics of a B2B Extranet Difficulty: Moderate Information within a company is often stored in ____________ that employees can access, depending on their positions within the company. Answer: databases Reference: Information Access for Employees Difficulty: Moderate To access information through an intranet, a user needs ____________ software. Answer: browser Reference: Internal Business Transactions Difficulty: Moderate The enabling of business alliances with vendors and suppliers in a secure, private environment through technology is known as a(n) ____________. Answer: extranet Reference: Extranets to Connect Business Alliances Difficulty: Moderate Business alliances with vendors, suppliers, and other organizations may also be referred to as a(n) ____________. Answer: e-marketplace Reference: Extranets to Connect Business Alliances Difficulty: Moderate When a company uses private leased telephone lines to physically attach intranets to an extranet, this connection is referred to as a(n) ____________ network. Answer: secure or private Reference: Characteristics of a B2B Extranet Difficulty: Challenging A well-designed Web page should include a tool to find product or service information within the Web site; this tool is known as a(n) ____________. Answer: search engine Reference: Customer-Centered Web Design Difficulty: Moderate ___________ is an example of an electronic payment system. Answer: PayPal Reference: Customer-Centered Web Design Difficulty: Moderate Message ____________ standards use software to authenticate the parties involved in a credit card purchase on the Internet, thereby making Web transactions fairly secure. Answer: encryption Reference: Customer-Centered Web Design Difficulty: Challenging Three interactive features that enable users to provide feedback to a company are email, discussion groups, and ____________. Answer: chat rooms Reference: Customer-Centered Web Design Difficulty: Challenging CRM stands for ____________. Answer: customer relationship management Reference: Customer Relationship Management Difficulty: Challenging When an Internet shopper proceeds to checkout, a(n) ____________ part of the Web site is accessed and personal data is encrypted. Answer: secure Reference: How It Works 13.2: Online Shopping Difficulty: Easy A confirmation ___________ is sent to a consumer after a transaction has been approved and the order is filled. Answer: email Reference: How It Works 13.2: Online Shopping Difficulty: Easy Most Web servers use ____________, Unix- or Linux-based operating systems. Answer: Windows- Reference: Some Technical Requirements of E-Commerce Difficulty: Moderate To make employees and customers clearly aware of a companys Web policies and e-commerce policies, the company should publish a(n) ____________ on its Web site. Answer: code of ethics Reference: Ethical Issues of E-Commerce Difficulty: Moderate The United States FTC, which stands for ____________, handles complaints in regard to e-commerce business abuse of customers private and personal information. Answer: Federal Trade Commission Reference: Ethical Issues of E-Commerce Difficulty: Moderate Matching: Match the following e-commerce ethics issues, acts, and organizations to their descriptions: I. European Unions Data Protection Directive A. requires client confidentiality II. COPPA B. responsibility of businesses to institute their own privacy and protection laws III. Health Insurance Portability and C. requirement of parental consent before Accountability Act collecting, using, or disclosing personal information of children under age 13 IV. Self-regulation D. government agency that oversees e- commerce privacy violations V. Federal Trade Commission E. legal protection of privacy of personal data Answers: E, C, A, B, D Reference: Ethical Issues of E-Commerce Difficulty: Easy Complete the following phrases for well-designed Web sites: I. Speed of A. Product selection II. Large, up-to-date B. Secure III. Ease of C. Transaction IV. transactions D. After-sale V. features E. Use Answers: C, A, E, B, D Reference: Customer-Centered Web Design Difficulty: Moderate     Chapter 13: Electronic Commerce and E-Business PAGE  PAGE 13 Copyright 2006 Prentice-Hall. All rights reserved. PAGE 1 Copyright 2006 Prentice-Hall. All rights reserved.  01BC ( * , @ B U d f n o {  0 D E O P Q T s t u ^ f g s , 4 5 A d o y    B M he h1h1 h15h1h-a hk5h$ h$hk hkaJ hkaJ hkO  01BC[i`F & FEƀ"F.FEƀ"F.gd$gd$gd$DDitq*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F. * @ k$F & FEƀ"F.F & FEƀ"F.CEƀ"F. $  a$@ U f E qg$CEƀ"F. $  a$F & FEƀ"F.F & FEƀ"F.E P t q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F. B kCEƀ"F. $  a$F & FEƀ"F.B I P W k!I & FEƀ"F.gd1I & FEƀ"F.gd1I & FEƀ"F.gd1W ^  eCEƀ"F. $  a$gd1I & FEƀ"F.gd1   % k!I & FEƀ"F.gd1I & FEƀ"F.gd1I & FEƀ"F.gd1% , y eCEƀ"F. $  a$gd1I & FEƀ"F.gd1 q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.  S k$F & FEƀ"F.CEƀ"F. $  a$F & FEƀ"F. q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F. )R]NOPo>?@HIT}jrs~jrs~"#.AL%-.9LW"V^_j!"-hC'Yhc*,h\hrh1hk hk5Y k$F & FEƀ"F.F & FEƀ"F.CEƀ"F. $  a$gqg$CEƀ"F . $  a$F & FEƀ"F.F & FEƀ"F.Pq*F & FEƀ"F .F & FEƀ"F .F & FEƀ"F .@'k$F & FEƀ"F .CEƀ"F . $  a$F & FEƀ"F .'2Jjq*F & FEƀ"F .F & FEƀ"F .F & FEƀ"F .j2k$F & FEƀ"F .F & FEƀ"F .CEƀ"F . $  a$2Nj qg$CEƀ"F . $  a$F & FEƀ"F .F & FEƀ"F . q*F & FEƀ"F .F & FEƀ"F .F & FEƀ"F .Rhk$F & FEƀ"F .CEƀ"F . $  a$F & FEƀ"F .%q*F & FEƀ"F .F & FEƀ"F .F & FEƀ"F .%]syk$F & FEƀ"F.F & FEƀ"F.CEƀ"F. $  a$qg$CEƀ"F. $  a$F & FEƀ"F.F & FEƀ"F..Lq*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.LVk$F & FEƀ"F.CEƀ"F. $  a$F & FEƀ"F.q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.-P[ CKLWz9GIz,5 ^ ` h j r t w y | ~ !!!!hJhWht-h!h1 hk5hkZek$F & FEƀ"F.F & FEƀ"F.CEƀ"F. $  a$!cqg$CEƀ"F. $  a$F & FEƀ"F.F & FEƀ"F.cnuq*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.&k$F & FEƀ"F.CEƀ"F. $  a$F & FEƀ"F.&.7Cq*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.C8k$F & FEƀ"F.F & FEƀ"F.CEƀ"F. $  a$8q~qg$CEƀ"F. $  a$F & FEƀ"F.F & FEƀ"F.~q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.BQk$F & FEƀ"F.CEƀ"F. $  a$F & FEƀ"F.Q_{q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.:APk$F & FEƀ"F.F & FEƀ"F.CEƀ"F. $  a$P`yzqbX $  a$ & F@^@`F & FEƀ"F.F & FEƀ"F.7mu.F & FEƀ"F.F & FEƀ"F.CEƀ"F.qg$CEƀ"F. $  a$F & FEƀ"F.F & FEƀ"F.q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F. ` j k$F & FEƀ"F.CEƀ"F. $  a$F & FEƀ"F.j t y ~ q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.~ #!.!k$F & FEƀ"F.F & FEƀ"F.CEƀ"F. $  a$.!o!!"_"qg$CEƀ"F. $  a$F & FEƀ"F.F & FEƀ"F.!!!""""""""""":#<#V#X#v#w#########$$$% % %%6%A%G%%%%%%%%%%%%%%%%%%%&"&#&+&-&&&&&&&&''''''''''((((((((( hQf5hhWhQfhJhhi hk5hkV_"e"t"|"q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.|"""<#X#k$F & FEƀ"F.CEƀ"F. $  a$F & FEƀ"F.X#w###q*F & FEƀ"F.F & FEƀ"F.F & FEƀ"F.#$^$$$k$F & FEƀ"F.F & FEƀ"F.CEƀ"F. $  a$$$%G%%qg$CEƀ"F. $  a$F & FEƀ"F.F & FEƀ"F.%%%%k!I & FEƀ"F.gdQfI & FEƀ"F.gdQfI & FEƀ"F.gdQf%%,&&eCEƀ"F . $  a$gdQfI & FEƀ"F.gdQf&&&&q*F & FEƀ"F .F & FEƀ"F .F & FEƀ"F .&&'''k$F & FEƀ"F!.CEƀ"F!. $  a$F & FEƀ"F .''''q*F & FEƀ"F!.F & FEƀ"F!.F & FEƀ"F!.' (X(_(j(k$F & FEƀ"F".F & FEƀ"F".CEƀ"F". $  a$j(v(((N)qg$CEƀ"F#. $  a$F & FEƀ"F".F & FEƀ"F".N)_)q))q*F & FEƀ"F#.F & FEƀ"F#.F & FEƀ"F#.())))))))) * *********++,+:+ ,,,!,?,J,T,g,,,,,,,------5.?.A.G.I.S.T.^.......#/./D/G/y///////// h1hk h1h1h1hc*,hk]hk56] hk] hkaJhZ hZ hZ hhTh hk5hn&hkE)))$*dCEƀ"F$. $ & Fa$gdn&L$ & FEƀ"F#.a$gdn&$*;*L*n*q*F & FEƀ"F$.F & FEƀ"F$.F & FEƀ"F$.n***<+_+k$F & FEƀ"F%.CEƀ"F%. $  a$F & FEƀ"F$._+++ ,q*F & FEƀ"F%.F & FEƀ"F%.F & FEƀ"F%. ,T,g,h,,---bCEƀ"F'. @ CEƀ"F&. $  a$-A...8//r/CEƀ"F*.CEƀ"F). @ CEƀ"F(.//0000000000011&191D1k1s11111111122 2*2+262>2E2H2e2m2v22223 333A3L3V3r3z333333a4i4s4}4445 555=5H55555'626666667777777 hG5hGhyhh5qhk5haYhk hk5V/0000N1oh @ CEƀ"F,.CEƀ"F+. $ @ a$N1k111*2e2r/CEƀ"F/.CEƀ"F.. @ CEƀ"F-.e223V3r33rh @ gdGCEƀ"F1.CEƀ"F0. @ 3a445R55r/CEƀ"F4.CEƀ"F3. @ CEƀ"F2.5<66 77 8rCEƀ"F6.CEƀ"F5. @ 77 88888888-9598999<9F9d9o9y9$:,:7:A:_:j:k:v:::;;0;;;<;G;e;m;;;;;;;<<<<'<g<h<p<v<w<<<<<<<%=&=.=4=>=b=m=s=====>>>>>>>??????@ h*&5h*&h5qhhQf hJ5hJ hk5hhkT 888-9y9rh @ gdJCEƀ"F8. @ CEƀ"F7.y9$:w::H;e;r/CEƀ"F;.CEƀ"F:. @ CEƀ"F9.e;;h<<&=s=h^ @ gd*&CEƀ"F=. @ CEƀ"F<. $ @ a$s==>>?oh @ CEƀ"F?. $ @ a$CEƀ"F>.??@@@|@@/AABBkXXXX$ ^a$gdCKCEƀ"FA. $ @ a$CEƀ"F@. @@@@~@@@@@@@@@@@ AA3A4AWAXAYAdAwAxA~AAAAAAAAAAAAB!B&BDBEB`BaBbBBBBBBBBBBBBCC C*C-C.CCCDCECXC[C\CgChCiCqCtCvCCCCCCCCCCCh`W hn&5 hk5hh5qhn&hCK hkaJ hEaJhkSBBBBBBC@CcCCCCDDDD xdh^gdn&CEƀ"FB. gdn&$ dh^a$gdCKCCCCCCCCCDDDDDDDDDDDDDLDMDNDTDUDVDWDXDYD_D`DbDcDdDDDDDDDDDDDDɸɸh5q0JmHnHu h5q0Jjh5q0JUh5qh.Hijh.HiUh hn&5hn& hn&hn& hk5hk.DDDDDDDLDMDVDWDXDdDDDDDDDD &`#$gd.Hi1 0:p5q/ =!8"8#8$8%  F@F Normal $a$CJ_HmH sH tH R@R Heading 1$ & F@&5;CJKHP@P Heading 2$ $<@&5CJ^@^ Heading 3$ & F<@&5CJOJQJ\^JaJR@R Heading 4$ & F<@&5CJ\aJT@T Heading 5 & F<@&56CJ\]aJN@N Heading 6 & F<@&5CJ\aJH@H Heading 7 & F<@&CJaJN@N Heading 8 & F<@&6CJ]aJT @T Heading 9 & F<@&CJOJQJ^JaJDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k@(No List JOJ Chapter Title $ha$ 5;CJ 0O0 Book title<O< Chapter NumberFO"F Chapter Outline  & FCJDOA2D Document title CJ$OJQJD>@BD Title$<@&a$ 5CJ$KH>0@R> List Bullet  & FCJ>1@b> List Number  & FCJB'qB Comment ReferenceCJaJ8@8  Comment TextCJHH  Balloon TextCJOJQJ^JaJhOh Beekman - keyword Char#5B*CJ_HmH ph3fsH tH u@j@ Comment Subject5\4@4 5qHeader  !>O> Keyword 256B*CJph334 @4 5qFooter  !.)@. 5q Page Number< 01BC[it*@UfEPt  BIPW^%,ySgP@  ' 2 J j  2 N j     R h % ] s y .LVe!cnu&.7C8q~BQ_{:AP`yz7m `jty~#.o_et|<Xw^G, X _ j v N!_!q!!!!$";"L"n"""<#_### $T$g$h$$%%%A&&&8''((((N)k)))**e**+V+r++a,,-R--<.. // 000-1y1$2w22H3e33h44&5s556677888|88/99B:::::;@;c;;;;<<<<<<<<<<L<M<V<X<d<<<<<<<0P000001 01 0C1 0C1 0C1 0C101 01 01 01 01 0101 01 01 01 01 010101 01 0 1 0 1 0 1 0 101 01 01 01 01 0101 01 0y1 0y1 0y1 0y101 01 0S1 0S1 0S1 0S101 01 01 01 01 0101 01 0g1 0g1 0g1 0g101 0 1 0 1 0 1 0 1 0 101 0 1 0 1 0 1 0 1 0 101 0 1 0 1 0 1 0 1 0 101 0 1 0R 1 0R 1 0R 1 0R 101 0 1 0] 1 0] 1 0] 1 0] 101 01 0 1 0 1 0 1 0 101 01 01 01 01 0101 01 0e1 0e1 0e1 0e101 01 0!1 0!1 0!1 0!101 01 01 01 01 0101 01 01 01 01 0101 01 01 01 01 0101 01 01 01 01 0101 01 01 01 01 010101 01 01 01 01 0101 01 01 01 01 0101 01 0 1 0 1 0 1 0 101 01 01 01 01 0101 01 01 01 01 0101 01 01 01 01 0101 01 01 01 01 0101 01 0G1 0G1 0G1 0G101 01 0,1 0,1 0,1 0,101 0 1 01 01 01 0101 0!1 0 1 0 1 0 1 0 101 0"1 0 1 0 1 0 1 0 101 0#1 0!1 0!1 0!1 0!101 0$1 0"1 0"1 0"1 0"10100T$ 0%T$0T$ 0&T$0T$ 0'T$0T$ 0(T$0T$ 0)T$0T$ 0*T$0T$ 0+T$0T$ 0,T$0T$ 0-T$0T$ 0.T$0T$ 0/T$0T$ 00T$0T$ 01T$0T$ 02T$0T$ 03T$0T$ 04T$0T$ 05T$0T$ 06T$0T$ 07T$0T$ 08T$0T$ 09T$0T$ 0:T$0T$ 0;T$0T$ 0<T$0T$ 0=T$0T$ 0>T$0T$ 0?T$0T$008 0@80808080808080808 0A80000000y00(y00y00(y00y00y00y00y00@0y0 0 d(@0y00@(@0@0y00@(@0@0y00Q(y00 <G -!(/7@CD#2BVdkqwyi@ E B W  % 'j2 %Lc&C8~QPj ~ .!_"|"X##$%%&&''j(N))$*n*_+ ,-/N1e235 8y9e;s=?BBDD$&'()*+,-./013456789:;<=>?@ACDEFGHIJKLMNOPQRSTUWXYZ[\]^_`abcefghijlmnoprstuvxzD%<CGNQ!!!8@0(  B S  ? gWI gW !gW"gW #gW $gWZ %gW\&gW%j'gW (gW, )gW ԧ *gW +gWk 77_et|'';<    ;;crz'';< B *urn:schemas-microsoft-com:office:smarttagscountry-regionV *urn:schemas-microsoft-com:office:smarttagsplacehttp://www.5iantlavalamp.com/h*urn:schemas-microsoft-com:office:smarttagsCity0http://www.5iamas-microsoft-com:office:smarttags   <<<<<<<<<<<<<<44<<<<<<<<<<<<<<31ACfEtB^, j j       s .Vctu%&-.C~B:zm`~#._st<w^X i j N!!$"L"<#_#T$h$((N)k)))V+r+H3e388*;@;X;c;;;<<<<<<<<<<<<d<<<<<<<<<<<<<<<<<<ZaA#  q%*5V4)l@cj/h ^`hH.h^`OJQJo(hHh pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH. h^`o(hH ^`o(hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. ^`hH Article . 8^`hH Section . P^`PhH() `p`^``phH() P^`PhH) P^`PhH) ^`hH) P^`PhH. 0p0^0`phH.h ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.@@^@`56CJOJQJo(hH. ^`o(hH. pLp^p`Lo(hH. @ @ ^@ `o(hH. ^`o(hH. L^`Lo(hH. ^`o(hH. ^`o(hH. PLP^P`Lo(hH.@@^@`o(.x^`o(.H ^`o(.  ^ `o( ^ `o(P^P`o( ^ `o(X^`o((^`o(@c\f V4aAq%*f @@^@`o(.g !x^`o(.`g "H ^`o(.8 #  ^ `o( $ ^ `o( %P^P`o(@ & ^ `o( 'X^`o( ((^`o( :ʅ       ?s                &%rJk5q]*&n&c*,t-E`WC'Y\_j`-a.HiQfzQG$CKaYWZ ?yTe!9!1i@<< ;<<<P@Unknown Cheryl SlavikGz Times New Roman5Symbol3& z Arial5& zaTahoma"1h*f 3m3m!4d;; 2qHX?2 Beekman 7e Chapter 13Michele Fitzpatrick-Somody$      Oh+'0  8 D P \hpx Beekman 7e  Chapter 13NormalMichele Fitzpatrick-Somody5Microsoft Office Word@H'@@pA<@3՜.+,D՜.+,8 hp|  m;  Beekman 7e Title<@0_AdHocReviewCycleID_EmailSubject _AuthorEmail_AuthorEmailDisplayName_ReviewingToolsShownOnceCIYF TB Melissa_Edwards@prenhall.comEdwards, Melissa  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{}~Root Entry F$21Table|VWordDocument3SummaryInformation(DocumentSummaryInformation8CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q