ࡱ>   ޸bjbj## AAx%%D#D#0 0 000111p2dZ7T1zFIJJJKfn$Ǥ90rKKrr00JJHU~z~z~zr|0J0J~zr~z~z }JBkjGv"tk0V0yN08 rr~zrrrrr~zrrrrrrrrrrrrrrrrD# R/:  2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework June 2016Massachusetts Department of Elementary and Secondary Education 75 Pleasant Street, Malden, MA 02148-4906 Phone 781-338-3000 TTY: N.E.T. Relay 800-439-2370 www.doe.mass.edu  This document was prepared by the Massachusetts Department of Elementary and Secondary Education Mitchell D. Chester, Ed.D. Commissioner Board of Elementary and Secondary Education Members Mr. Paul Sagan, Chair, Cambridge Mr. James Morton, Vice Chair, Boston Ms. Katherine Craven, Brookline Dr. Edward Doherty, Hyde Park Dr. Roland Fryer, Cambridge Ms. Margaret McKenna, Boston Mr. Michael Moriarty, Holyoke Dr. Pendred Noyce, Boston Mr. James Peyser, Secretary of Education, Milton Ms. Mary Ann Stewart, Lexington Mr. Donald Willyard, Chair, Student Advisory Council, Revere Mitchell D. Chester, Ed.D., Commissioner and Secretary to the Board The Massachusetts Department of Elementary and Secondary Education, an affirmative action employer, is committed to ensuring that all of its programs and facilities are accessible to all members of the public. We do not discriminate on the basis of age, color, disability, national origin, race, religion, sex, gender identity, or sexual orientation. Inquiries regarding the Departments compliance with Title IX and other civil rights laws may be directed to the Human Resources Director, 75 Pleasant St., Malden, MA 02148-4906. Phone: 781-338-6105. 2016 Massachusetts Department of Elementary and Secondary Education Permission is hereby granted to copy any or all parts of this document for non-commercial educational purposes. Please credit the Massachusetts Department of Elementary and Secondary Education. This document printed on recycled paper Massachusetts Department of Elementary and Secondary Education 75 Pleasant Street, Malden, MA 02148-4906 Phone 781-338-3000 TTY: N.E.T. Relay 800-439-2370 www.doe.mass.edu  Table of Contents  TOC \o "1-1" Commissioners Foreword  PAGEREF _Toc452472869 \h i Acknowledgments  PAGEREF _Toc452472870 \h ii Digital Literacy and Computer Science Education for All Students  PAGEREF _Toc452472871 \h 1 Guiding Principles for Effective Digital Literacy and Computer Science Education  PAGEREF _Toc452472872 \h 3 Digital Literacy and Computer Science (DLCS) Overview  PAGEREF _Toc452472873 \h 7 Description of Strands  PAGEREF _Toc452472874 \h 8 Description of Practices  PAGEREF _Toc452472875 \h 11 DLCS Standards  PAGEREF _Toc452472876 \h 13 Kindergarten to Grade 2  PAGEREF _Toc452472877 \h 14 Grades 3 to 5  PAGEREF _Toc452472878 \h 19 Grades 6 to 8  PAGEREF _Toc452472879 \h 24 Grades 9 to 12  PAGEREF _Toc452472880 \h 30 Glossary  PAGEREF _Toc452472881 \h 36  Commissioners Foreword Dear Colleagues, In the last decade, changes in technology, communication, and the information life cycle have contributed to significant changes in our world. Increasingly, people are becoming technology creators as well as technology users. Meaningful participation in modern society requires fluency in the uses of, impact of, and ability to manipulate technology for living, learning, and working. Given this context, knowledge and skills included in the Digital Literacy and Computer Science (DLCS) standards are essential for all students. Student of all backgrounds should be prepared for personal and civic efficacy in the twenty-first century and should have the opportunity to consider innovative and creative technology-based careers of the future. I am pleased to present to you the 2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework. The standards presented here: Address core concepts in four key domains: Computing and Society, Digital Tools and Collaboration, Computing Systems, and Computational Thinking. Integrate practices necessary to successfully act in a technological world. Present coherent progressions of core concepts and practices from grades K to 12. Complement other Massachusetts Curriculum Frameworks. The DLCS Framework is a significant step forward from the states prior Instructional Technology and 2008 Technological Literacy standards. The DLCS Framework incorporates and updates expectations for Technological Literacy, reframes those as Digital Literacy, and adds expectations for Computer Science, which is now such a critical aspect of our daily lives. I would like to thank all of the individuals and groups that provided input, reviewed comments, and suggested edits to the standards. I believe that the ability to effectively use and manipulate technology to solve complex problems is the new literacy skill of the twenty-first century. The DLCS Framework provides guidance and resources intended to help educators and professionals prepare students across the Commonwealth for such success. Sincerely, Mitchell D. Chester, Ed.D. Commissioner of Elementary and Secondary Education Acknowledgments The 2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework is the result of the contributions of many educators and professionals across the state. The Department of Elementary and Secondary Education wishes to thank all of the Massachusetts groups that contributed to the development of these standards and all of the individual teachers, administrators, professionals, faculty, and parents who took the time to provide thoughtful comments during the public comment periods. The Department collaborated with the Massachusetts Computing Attainment Network ( HYPERLINK "file:///C:\\Users\\Amne\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\YWHV5ETE\\masscan.edc.org\\" MassCAN), an alliance of organizations supporting computer science in school, and Massachusetts Computer Using Educators ( HYPERLINK "http://www.masscue.org/pages/MassCUE" MassCUE), the states professional organizations for technology educators. A review panel, representing diverse perspectives relevant to both digital literacy and computer science, was essential in guiding this work. Review Panel Members Robert AckermanPrincipal, Lane School, BedfordW. Richard AdrionProfessor of Computer Science, University of Massachusetts AmherstKris AhoTechnology/Engineering Teacher, Collins Middle School, SalemDelcie BeanPresident, Paragus Strategic IT, SpringfieldAyora BerryGlobal Schools Manager, PTC Inc., NeedhamDavid BirnbachSchool Committee Member, AndoverDeborah BoisvertExecutive Director of the Boston-Area Advanced Technological Education Connections (BATEC), University of Massachusetts BostonGeorge BracketPrincipal, George Brackett Associates; Co-founder of the Codman Academy Charter Public School, BostonShelley ChamberlainExecutive Director of MassCUE, WalthamMark CheckMuseum of Science, BostonKim CochraneCoordinator - C&I Technology and Education Technology, Framingham State UniversitySandra ColePrincipal Systems Engineering, MITRE Corporation, BedfordBenjamin DavisonQuantitative User Experience Researcher, Google, Inc., CambridgeLauren DietzInstructional Technology Specialist, Newton Public SchoolsDavid DigiammerinoTechnology Teacher, Millis Public SchoolJennifer DimmickLibrary Teacher, Newton South High SchoolKatheryn FislerProfessor of Computer Science, Worcester Polytechnic InstituteCarla FitzgeraldSocial Studies Teacher, Marshal Middle School, Billerica Robert FordDirector of Technology, Lincoln Public Schools, LincolnRayna FreedmanTeacher/ITS, Jordan and Jackson Elementary, MansfieldJen GoreeSoftware Portfolio and Project Manager, The Concord ConsortiumWendy HaskellDirector of Technology and Library/Media, Falmouth Public SchoolsDiane Hauser Senior Program Director, Educational Technology, Boston Public SchoolsJohn HeffernanTechnology Teacher, Williamsburg School, WilliamsburgLinda HerbisonBusiness Teacher, Montachusett Regional Vocational Technical School, FitchburgSue HowardInstructional Technology Specialist, Concord Public SchoolsEric JewartSoftware Developer, Ab Initio; AP Computer Science Teacher, Cambridge Rindge & Latin High SchoolKimberle KoileResearch Scientist, Center for Educational Computing Initiatives, MIT, CambridgeNancy Lanza-WelshComputer Teacher, Richardson Middle School, DracutJeffery LeBoeufTeacher, Worcester Technical High SchoolMichael LooneyCurriculum Chair, Technology Department, Mashpee High SchoolFred MartinAssociate Professor, University of Massachusetts LowellChad McGowanTeacher, Ashland High SchoolHamed NilforoshanCEO AlNoor Games; Student, Wellesley High SchoolJessica Parson JarboeMathematics and Computer Science Teacher, Milton High SchoolDavid PettyComputer Science Teacher, STEM Coordinator, Winchester Public SchoolsAlec ResnickDirector, Sprout & Co./Somerville STEAM AcademyVivian SiegelDirector of Education and Outreach, Broad Institute of MIT and Harvard, CambridgeSusanne Steizer-EscobarComputer Science Faculty and Department Chair, MassBay Community College, WellesleyPeter WongDirector of University Relations, Museum of Science, Boston Department of Elementary and Secondary Education (ESE) and Education Development Center (EDC; MassCAN) Staff Marilyn DeckerDirector, Science, Technology/Engineering and Mathematics, ESEAnne DeMallieComputer Science and STEM Integration Specialist, ESEJake FosterDirector, Science, Technology/Engineering and Mathematics, ESEKen KlauDirector, Digital Learning, ESEAndrea CoteCoordinator of Professional Learning Services and Accessibility, ESEJoyce Malyn-SmithPrincipal Investigator Focusing on Strategic Initiatives in STEM Workforce & Human Development, EDCKelly PowersProject Director, MassCAN, EDCJim StantonExecutive Director, MassCAN, EDC Organizations and Key Documents Referenced CSTA K-12 Computer Science Standards, 2011:  HYPERLINK "http://csta.acm.org/Curriculum/sub/CurrFiles/CSTA_K-12_CSS.pdf" csta.acm.org/Curriculum/sub/CurrFiles/CSTA_K-12_CSS.pdf Massachusetts Technology Literacy Standards, April 2008 Standards for the 21st Century Learner, October 2007:  HYPERLINK "http://www.ala.org/aasl/standards" www.ala.org/aasl/standards ISTE Standards, 2007:  HYPERLINK "http://www.iste.org/standards/iste-standards" www.iste.org/standards/iste-standards Computing at School, 2013:  HYPERLINK "http://www.computingatschool.org.uk" www.computingatschool.org.uk College Boards Computer Science Principles:  HYPERLINK "https://secure-media.collegeboard.org/digitalServices/pdf/ap/ap-computer-science-principles-course-and-exam-description.pdf" https://secure-media.collegeboard.org/digitalServices/pdf/ap/ap-computer-science-principles-course-and-exam-description.pdf Digital Literacy and Computer Science (DLCS) Education for All Students Vision Digital Literacy and Computer Science (DLCS) knowledge, reasoning, and skills are essential both to prepare students for personal and civic efficacy in the twenty-first century and to prepare and inspire a much larger and more diverse number of students to pursue the innovative and creative careers of the future. The abilities to effectively use and create technology to solve complex problems are the new and essential literacy skills of the twenty-first century. Digital literacy and computer science standards in this Framework articulate critical learning outcomes for Kindergarten through Grade 12 to help prepare students for success in world. The standards represent the core elements of digital literacy and computer science and are intended to drive coherent, rigorous instruction which results in the mastery and application of digital literacy and computer science knowledge, reasoning, and skills. Key Features The DLCS standards include core concepts in four strands: Computing and Society, Digital Tools and Collaboration, Computing Systems, and Computational Thinking. The DLCS standards articulate practices necessary for success. The practices cultivate the internalization of dispositions that skillful people in digital literacy and computer science apply in reasoning, creation, and problem solving. Practices speak to the skills needed to successfully use and create technology. When integrated with core concepts the practices in the standards define the types of performance students should be able to demonstrate as a result of learning DLCS. The DLCS standards coherently progress from Kindergarten to grade 12. The standards emphasize a focused and coherent progression of knowledge and skills. As students progress through their K-12 education, they acquire increasingly sophisticated knowledge, skills and dispositions in digital literacy and computer science. The DLCS standards prepare students for post-secondary opportunities civic, college, and career. DLCS skills, knowledge and practices are essential to prepare all students for personal and civic efficacy, as well as the workplace. The importance of DLCS knowledge and skills are pervasive in virtually all fields, from transportation to entertainment and the arts, from energy to the life sciences, from business and manufacturing to health care, from physics, chemistry and environmental sciences to all areas of research, and in many personal and civic decisions from telephones to garage doors to technological systems in communities. The DLCS standards complement other Massachusetts Curriculum Frameworks. The DLCS standards overlap in meaningful and substantive ways with standards from other academic disciplines and offer an opportunity for all students to better apply and learn digital literacy and computer science. Much of the knowledge, skills, and dispositions central to digital literacy and computer science, such as computational thinking, also apply to other subjects, including, but not limited to, science, technology and engineering and mathematics. Considerations There are a few aspects of state learning standards that are important to keep in mind as curriculum and instruction is developed to help students learn the DLCS standards: The standards reflect what a student should know and be able to do as a result of instruction within each grade span (K-2, 3-5, 6-8, and 9-12). Educators have the flexibility of arranging the standards in any order within a grade span to suit the needs of students and local DLCS programs. The practices articulate the dispositions and skills students acquire over time. Practices form the basis of analytical reasoning, specifically in the context of effectively using technology to support problem solving. Coupling practice with content gives the context for student performance. Curricula and assessment should be developed in a way which builds students knowledge and ability toward mastery of the standards. Effective instruction engages students in multiple practices simultaneously. The standards identify the most essential material for students to know and be able to do. They are not an exhaustive list of all that could be included in a students digital literacy and computer science education, nor should they prevent students from going beyond the standards where appropriate. Some standards have multiple functions or multiple components, the purpose of which is to convey the richness of expected outcomes. Preparation for Career Options Providing consistent exposure to curricula based on the standards during grades K-8 will create the necessary foundation for college- and career-focused learning in grades 9-12. In grades K-8, the standards afford opportunities to: (1) integrate core concepts and practices across the curriculum, and (2) more deeply explore DLCS practices in contexts, such as introductory programming, data collection and analysis, robotics, etc., in specific subject areas or as exploratory courses. In grades 9-12, the standards provide opportunities for students to gain proficiency and incorporate substantive expectations of the  HYPERLINK "http://www.collegeboard.com/prod_downloads/computerscience/Learning_CSPrinciples.pdf" College Boards Computer Science Principles, the widely recognized benchmark for postsecondary preparation. With a strong foundation provided by the 2016 DLCS standards, students will be well prepared for a variety of civic, college, and career options that include the use and creation of technology. Guiding Principles for Effective Digital Literacy and Computer Science Education The vision of the Massachusetts Digital Literacy and Computer Science (DLCS) standards is to engage students in digital literacy and computer science skills and concepts through the integration of practices, while making connections to what they know and the world they live in. The goal of the Guiding Principles is to help educators create relevant, rigorous, and coherent DLCS programs that support student engagement, curiosity, computational thinking, and excitement for learning over time. The following five Guiding Principles are intended to inform the development of programs that effectively engage students in learning the Digital Literacy and Computer Science (DLCS) standards. They should guide the development and evaluation of programs in the schools and the broader community. Strong DLCS programs effectively support student learning so students are prepared for a dynamic world. Guiding Principle 1: Learning Digital Literacy and Computer Science ideas should be explored in ways that stimulate curiosity, create enjoyment, and develop depth of understanding. Students need to understand digital literacy and computer science concepts and use them effectively. The standards for digital literacy and computer science practice describe ways in which students increasingly engage with the subject matter as they grow in digital literacy and computer science maturity and expertise through the elementary, middle, and high school years. Students should be actively engaged in designing, creating and inventing, discussing ideas, and applying their skills in interesting, thought-provoking situations. As students develop technology skills, it is important they apply these skills in their classroom, school, and life so that they will understand why these skills are important. For example, a student who needs to gather data in a science experiment and organize and manipulate the data in order to analyze the results will see a reason for learning about the features and function of a data collection tool and database. This is context-sensitive learning in which technology skills instruction is centered on the students needs. Student understanding is further developed through ongoing reflection about cognitively demanding and worthwhile tasks. Tasks should be designed to challenge students in multiple ways. Activities should build upon curiosity and prior knowledge and enable students to solve progressively deeper, broader, and more sophisticated problems. Digital literacy and computer science tasks reflecting sound and significant concepts should generate active classroom talk, promote the development of conjectures, and lead to an understanding of the necessity for digital literacy and computer science reasoning. Guiding Principle 2: Teaching An effective program is based on a carefully designed set of content standards that are clear and specific, focused, and articulated over time as a coherent sequence. The sequence of topics and performances should be based on what is known about how students knowledge, skill, and understanding develop over time. What and how students are taught should reflect not only the topics, but also the key ideas that determine how knowledge is organized and generated. Students should be asked to apply their learning and to show their thinking and understanding. Creating and problem solving are the hallmark of computational thinking and an effective program. Skills in computational thinking require practice with a variety of problems, as well as a firm grasp of devices, tools, services, and techniques, and their underlying principles. Armed with this deeper knowledge, the student can then use digital literacy and computer science skills in a flexible way to create new products, attack various problems, and devise different ways of solving any particular problem. Problem solving calls for reflective thinking, persistence, learning from the ideas of others, and going back over one's own work with a critical eye. Students should be able to communicate their ideas and work collaboratively. They should analyze situations and justify their solutions. As digital tools, computing devices, and services become an integral part of the learning environment, and as students gain the knowledge and skills to use, modify and create with them appropriately, new opportunities for learning open up. Dynamic geometric applets, for example, can help students visualize and understand complex mathematics concepts. Simulation software enables students to investigate models of real-world problems, such as climate change and population growth. Success in creating and solving problems helps to create an abiding interest. Students learn to solve problems arising in everyday life, society, and the workplace. For a program to be effective, it must also be taught by knowledgeable teachers. Guiding Principle 3: Equity All students should have a high quality digital literacy and computer science program that prepares them for college and a career. All Massachusetts students should have a high quality digital literacy and computer science program that meets the goals and expectations of these standards and addresses students individual interests and talents. The standards provide clear signposts along the way to the goal of college and career readiness for all students. The standards provide for a broad range of students, from those requiring tutorial support to those with talent in digital literacy and computer science. To promote achievement of these standards, teachers should encourage classroom talk, reflection, use of multiple problem-solving strategies, and a positive disposition toward digital literacy and computer science. They should have high expectations for all students. At every level of the education system, teachers should act on the belief that every child should learn challenging digital literacy and computer science concepts. Teachers and guidance personnel should advise students and parents about why it is important to take advanced courses in digital literacy and computer science and how this will prepare students for success in college and the workplace. All students should have the benefit of quality instructional materials, good libraries, and adequate technology. All students must have the opportunity to learn and meet the same high standards. In order to meet the needs of the greatest range of students, digital literacy and computer science programs should provide the necessary intervention and support for those students who are below or above grade-level expectations. Practice and enrichment should extend beyond the classroom. Tutorial sessions, digital literacy and/or computer science clubs, competitions, and apprenticeships are examples of digital literacy and computer science activities that promote learning. Because digital literacy and computer science is the cornerstone of our digital world, a comprehensive curriculum should include modeling activities that demonstrate the connections among disciplines. Schools should also provide opportunities for communicating with experts in applied fields to enhance students knowledge of these connections. Guiding Principle 4: Literacy Across the Content Areas An effective digital literacy and computer science program builds upon and develops students literacy skills and knowledge. Reading, writing, and communication skills are necessary elements of learning and engaging in digital literacy and computer science, as well as in other content areas. Supporting the development of students literacy skills will allow them to deepen their understanding of digital literacy and computer science concepts and help them to determine the meanings of symbols, key terms and phrases, as well as develop reasoning skills that apply across the disciplines. In reading, teachers should consistently support students ability to gain and deepen understanding of concepts from written material by helping them acquire comprehension skills and strategies, as well as specialized vocabulary and symbols. Digital literacy and computer science classrooms should make use of a variety of text materials and formats, including textbooks, notebook/journals, contextual problems, -Internet, and data presented in a variety of media. In communicating, teachers should consistently support students ability to reason and achieve deeper understanding of concepts, and to express their understanding in a focused, precise, and convincing manner. In collaborating, teachers should facilitate opportunities for digital literacy and computer science discourse using precise language to convey ideas, communicate solutions, and support arguments. Guiding Principle 5: Assessment Assessment of student learning in digital literacy and computer science should take many forms to inform instruction and learning. Assessment reflects classroom expectations and shows outcomes of student learning based on established knowledge and performance goals. The learning standards in this Framework are a key resource for setting such knowledge and performance objectives. Assessment assists teachers in improving classroom practice, planning curricula, developing self-directed learners, reporting student progress, and evaluating programs. It provides students with feedback about how their knowledge and skills are developing and what can be done to improve them. It lets parents know how well their children are doing and what needs to be done to help them do better. Diagnostic information gained from different types of assessment enables teachers to adjust their day-to-day and week-to-week practices to foster greater student achievement. There are many types of assessment, such as paper-and-pencil testing, performance assessments, interviews, and portfolios, as well as less formal inventories, such as regular observation of student responses to instruction. Given the emphasis on practices in the standards, performance-based assessments should be developed that allow students to demonstrate what they have learned in the context of real-world problems and applications. Guiding Principle 6: Planning and Support An effective digital literacy and computer science program requires coherent district-wide planning and ongoing support for implementation. An effective curriculum that addresses the learning standards of this Framework must be planned as a cohesive K12 program. Teachers in different classrooms and at different levels should agree about what is to be taught in given grades. For example, middle school teachers should be able to expect that students coming from different elementary schools within a district share a common set of DLCS understandings and skills and that the students they send on to high school will be well prepared for what comes next. In order for this expectation to be met, middle school teachers need to plan curricula in coordination with their elementary and high school colleagues and with district staff. To facilitate planning, a district coordinator or administrator should be involved in articulating, coordinating, and implementing a district-wide (K12) DLCS curriculum. School districts should choose engaging, challenging, and accurate curriculum materials that are based on research into how children learn DLCS. When planning for the introduction of a new curriculum, it is important to explicitly identify how success will be measured. Indicators need to be determined and should be communicated to all stakeholders. Supervisors should monitor whether the curriculum is actually being used, how instruction has changed, and how student learning is being realized. Teacher teams, working across grade levels, should look at student work and other forms of assessment to determine whether there is evidence of achievement of the sought-for gains in student understanding. Implementation of a new curriculum is accomplished over multiple years and requires opportunities for extensive professional development. Teachers must have both content knowledge and pedagogical expertise to use curricular materials in a way that enhances student learning. A well-planned program for professional development provides for both content learning and content-based pedagogical training. It is further recommended that middle and high school courses be taught by teachers who are certified in their areas and who are, therefore, very familiar with the safe use of materials, equipment, and processes. Finally, students will be more likely to succeed in meeting the standards if they have the curricular and instructional support that encourages their interests in DLCS. Further, students who are motivated to continue their studies and to persist in more advanced and challenging courses, are more likely to become STEM-engaged citizens and, in some cases, pursue careers in STEM fields. These affective goals should be an explicit focus of quality DLCS programs. Digital Literacy and Computer Science (DLCS) Overview The standards for Kindergarten to grade12 are organized by grade span: Kindergarten to grade 2, grade 3 to grade 5, grade 6 to grade 8, and grade 9 to grade 12. Within each grade span, standards are grouped in four strands: Computing and Society, Digital Tools and Collaboration, Computing Systems, and Computational Thinking. Each strand is further subdivided into topics comprised of related standards. Standards define performance expectations, as well as what students should know and be able to do. Standards from different strands or topics may sometimes be closely related. Standards in every grade span and strand demonstrate a range of cognitive complexity such as reflected in Blooms Revised Taxonomy: remembering, understanding, applying, analyzing, evaluating, and creating. VisionDigital Literacy and Computer Science (DLCS) knowledge, reasoning, and skills are essential both to prepare students for personal and civic efficacy in the twenty-first century and to prepare and inspire a much larger and more diverse number of students to pursue the innovative and creative careers of the future. The abilities to effectively use and create technology to solve complex problems are the new and essential literacy skills of the twenty-first century. Learning ProgressionGrade SpansStrandsK-2CAS: Computing and Society Safety and Security Ethics and Laws Interpersonal and Societal ImpactDTC: Digital Tools and Collaboration Digital Tools Collaboration and Communication ResearchCS: Computing Systems Computing Devices Human and Computer Partnerships Networks ServicesCT: Computational Thinking Abstraction Algorithms Data Programming and Development Modeling and Simulation3-56-89-12Practices: Connecting, Creating, Abstracting, Analyzing, Communicating, Collaborating, Research Description of Strands Progressions of Core Concepts The Kindergarten through grade 12 DLCS standards are organized by grade span: Kindergarten to grade 2, grade 3 to grade 5, grade 6 to grade 8, and grade 9 to grade 12. Within each grade span, standards are grouped into four strands: Computing and Society, Digital Tools and Collaboration, Computing Systems, and Computational Thinking. Each strand is further subdivided into topics comprised of related standards. DLCS practices are integrated throughout the standards and help define performance expectations that specify what students should know and be able to do. Computing and Society (CAS) Computing impacts all people and has global consequences on such things as communications, assistive technology, social networking, and the economy. Society values many different computing innovations. Computing is a key component of many professions and the content of digital media influences all citizens and society. Global disparities in access to the Internet, media, and devices may lead to an imbalance in equity and power. Principles of privacy, ethics, security, and copyright law influence digital safety and security, as well as interpersonal and societal relations. Safety and Security: Responsible citizens in the modern world apply principles of personal privacy and network security to the use of computing systems, software, the Internet, media, and data. Ethics and Laws: Ethics include standards of conduct, fairness, and responsible use of the Internet, data, media, and computing devices. An understanding of principles and laws of software licenses, copyrights, and acceptable use policies are necessary to be responsible citizens in the modern world. Interpersonal and Societal Impact: The use of computing devices, assistive technologies and applying a computational perspective to solving problems changes the way people think, work, live, and play. Computational approaches lead to new understanding, discoveries, challenges, and questions. Most professions rely on technology and advances in computing foster innovations in many fields. Differential access to principles of computing, computing devices, digital tools, and media in the global society, has potentially significant effects. Digital Tools and Collaboration (DTC) Digital tools are applications that produce, manipulate, or store data in a digital format (e.g., word processors, drawing programs, image/video/music editors, simulators, Computer-Aided Design (CAD) applications, publishing programs). Digital tools are critical for conducting research, communicating, collaborating and creating in social, work, and personal environments. The use of digital tools is integral to success in school and career. Digital Tools: Digital tools are used to create, manipulate, analyze, edit, publish, or develop artifacts. Individuals and groups identify, evaluate, select, and adapt new tools as they emerge. Collaboration and Communication: A variety of digital tools are used to work collaboratively anytime and anywhere, inside and outside the classroom, both synchronously and asynchronously, to develop artifacts or solve problems, contribute to the learning of others, and communicate. Research: A variety of digital tools are used to conduct research, answer questions, and develop artifacts to facilitate learning and convey understanding. Access to the Internet and digital tools allows people to gather, evaluate (for validity, bias, relevance, accuracy, etc.), organize, analyze, and synthesize information, data and other media from a variety of sources. Effective use of information, data, and media requires consideration of validity, ethics, and attribution of sources. Computing Systems (CS) Computing systems are comprised of components, such as devices, software, interfaces, and networks that connect communities, devices, people, and services. They empower people to create, collaborate, and learn via human-computer partnerships. The design of many computing systems empowers people to debug, extend, and create new systems. Computing systems require troubleshooting and maintenance to consistently function. Computing Devices: Computing devices take many forms (e.g., car, insulin pump, or robot), not just personal computers, phones and tablets. They use many types of input data (collected via gesture, voice, movement, location, and other data) and run instructions in the form of programs to produce certain outputs (e.g., images, sounds, and actions). Computing will continue to be increasingly embedded into devices that are used in social, recreational, personal, and workplace environments. Human and Computer Partnerships: Some tasks, such as repetitive tasks, or those involving complex computations, are best done by computers, while other tasks that do not have defined rules or are dynamic in nature, are best done by humans. Many tasks, however, are done through human-computer partnerships. Human-computer partnerships are characterized by the interaction of humans with devices and systems that work together to achieve a purpose or solution that would not be independently possible. These skills and knowledge inform the decision to use technology in creating, innovating, or solving a problem or sub-problem. Networks: Network components, including hardware and software, carry out specific functions to connect computing devices, people, and services. The Internet facilitates global communication and relies on considerations of network functionality and security. Services: Data storage and computing occurs in many interconnected devices creating computational services that are the building blocks of computing systems. These services make use of data, algorithms, hardware, and connectivity that may occur on remote systems. Computational Thinking (CT) Computational thinking is a problem solving process that requires people to think in new ways to enable effective use of computing to solve problems and create solutions. The capacity of computers to rapidly and precisely execute programs makes new ways of designing, creating, and problem solving possible. Computational thinking is characterized by: analyzing, modeling, and abstracting ideas and problems so people and computers can work with them; designing solutions and algorithms to manipulate these abstract representations (including data structures); and identifying and executing solutions (e.g., via programming). Abstraction: Abstraction is a process of reducing complexity by focusing on the main idea. By hiding details irrelevant to the question at hand and bringing together related and useful details, abstraction reduces complexity and allows one to focus on the problem. This process creates a new representation which successfully reframes the problem. At the most basic level of abstraction, data structures are used to represent information so that algorithms can operate on the data to create a result. Algorithms: An algorithm is a sequence of precisely defined steps to solve a particular problem. Carefully designed algorithms are essential to solving complex problems using computers. Effective algorithms are efficient, clear, reusable, and accurate. Data: Collecting, managing, and interpreting a vast amount of raw data is part of the foundation of our information society and economy. The storage of data impacts how data is used and accessed. Computational tools enable insights and decisions through new techniques for data collection and analysis. Programming and Development: Programming articulates and communicates instructions in such a way that a computer can execute a task. Programming makes use of abstractions, algorithms, and data to implement ideas and solutions as executable code through an iterative process of design and debugging. The process of creating software includes understanding the development life cycle, such as testing, usability, documentation, and release. Software development is the application of engineering principles (usually by a team) to produce useful, reliable software at scale and to integrate software into other engineered artifacts. Modeling and Simulation: Computational modeling and simulation help people to represent and understand complex processes and phenomena. Computational models and simulations are used, modified, and created to analyze, identify patterns, and answer questions of real phenomena and hypothetical scenarios. Description of Practices Practices cultivate the internalization of dispositions and skills that students apply to solve digital literacy and computer science problems. As students progress through their education, they should acquire increasingly sophisticated practices. Effective instruction couples practices with digital literacy and computer science content to provide a context for performance. Creating Digital literacy and computer science are disciplines in which students demonstrate creative thinking, construct knowledge, and develop innovative artifacts and processes using technology. Students engage in the creative aspects of computing by designing and developing interesting computational artifacts and by applying techniques to creatively solve problems. Skills include: Creating artifacts or computational projects with practical, personal, and/or social intent; Selecting appropriate methods, paths, or techniques to develop artifacts; Using appropriate algorithmic and information-management principles and/or digital tools; Applying critical thinking, digital tools, and technology to solve problems; Making ethical and responsible choices in selecting tools, information, and media to create and share artifacts; and Reviewing, revising, and iterating work to create high-quality artifacts. Connecting Developments in computing have far-reaching effects on society and have led to significant innovations. The developments have implications for individuals, society, commercial markets, and innovation. Students study their effects and draw connections between different computing concepts. Skills include: Describing the impact of computing on society (humanity), economies, laws, and histories; and Distinguishing between ethical and unethical practices with respect to safe and responsible use of information, data, media, and computing devices. Abstracting Computational thinking requires understanding and applying abstraction at multiple levels. Students use abstraction to develop models and to classify and manage information. Skills include: Identifying abstractions; Describing modeling in a computational context; Using abstraction and decomposition when addressing complex tasks or designing complex systems; Classifying data into groups and hierarchies; and Identifying attributes (properties) of the data groups. Analyzing Students use critical thinking and analytical skills to locate, evaluate, and analyze information, information sources, their own computational artifacts, and the computational artifacts others have produced. Skills include: Asking questions to define a problem or information need; Describing and articulating a problem or information need; Evaluating information sources, research, data, proposed solutions, models, or prototypes; Identifying ways to improve solutions or information quality; and Selecting and justifying appropriateness, precision, or quality of best solutions and information sources. Communicating Communication is the expression and exchange of information between two or more people. Communication includes written and oral mediums, as well as tangible representations supported by graphs, visualizations, demonstrations, stories, and analysis. Effective communication is accurate, clear, concise, persuasive, and responsible. Skills include: Evaluating various digital tools for best expression of a particular idea or set of information; Selecting and using digital media and tools to communicate effectively; Communicating to or with different audiences; Describing computation with accurate and precise language, notations, or visualizations where relevant; Summarizing the purpose of a proposed solution, model, prototype, or computational artifact; Justifying the design, appropriateness of choices, and selection of a solution; and Communicating responsibly, such as respecting intellectual property. Collaborating People working collaboratively in teams, locally or globally, can often achieve more than individuals working alone. Effective collaboration draws on diverse perspectives, skills, knowledge, and dispositions to address complex and open-ended problems or goals. Skills include: Collaborating with others to conduct research, solve a computational problem, or developing digital artifacts; Collaborating with others to create computational artifacts, computational projects, or digital by-products; and Exchanging knowledge and feedback with a partner or team member. Researching Students apply digital tools to gather, evaluate, and use information in a legal, safe, and ethical manner. Skills include: Defining a problem, research question, or goal; Identifying information needs, whether primary (e.g., raw data, experimentation, collection), or secondary (e.g., existing information); Employing research strategies to locate all possible sources; Evaluating and selecting the best sources of information for credibility, accuracy, and relevance, which may include original data, creating a prototype, or conducting other tangible work; Using information ethically: attributing sources of information (text, written, images, other media) using the appropriate citation format for the discipline; Organizing and analyzing information; Synthesizing and inferring information and data; and Creating a thesis that addresses the research question. DLCS Standards The coding system used for the standards identifies the strand and topic of the standard. Grade Codes:Strand Codes:Kindergarten to Grade 2K-2Computing and SocietyCASGrades 3 to 53-5Digital Tools and CollaborationDTCGrades 6 to 86-8Computing SystemsCSGrades 9 to 129-12Computational ThinkingCTTopic Codes:Standard Number:Topic codes are the letter of the topic.The Standard number is the numerical order of the standard as presented; the order does not imply teaching order.  Kindergarten to Grade 2 Early elementary school students are introduced to foundational concepts by integrating basic digital literacy skills with simple ideas about computational thinking. They learn that tools help people do things better, or more easily, or do some things that could otherwise not be done at all. Through the exploration of differences between humans, computing devices, and digital tools, students begin to understand if, when, and how they should use technology. Kindergarten through grade 2 standards integrate all seven practices. Standards in this grade span ask students to demonstrate the ability to: Computing and Society (CAS) Understand basic safety and security concepts and basic understanding of safe information sharing. Explore what is means to be a good digital citizen. Observe and describe how people use technology and how technology can influence people. Digital Tools and Collaboration (DTC) Develop basic use of digital tools and research skills to create simple artifacts. Develop basic use of digital tools to communicate or exchange information. Computing Systems (CS) Understand that computing devices take many forms and have different components. Consider basic structures of computing systems and networks. Explore human and computer differences to determine when technology is beneficial. Computational Thinking (CT) Explore abstraction through identification of common attributes. Create and enact a simple algorithm. Understand how information can be collected, used, and presented with computing devices or digital tools. Create a simple computer program. Use basic models and simulations. Students in this grade span develop concepts through exploration, discovery, and creativity with the guidance, support, and encouragement of their educator. They design, build, and test inventions and solutions through exploration and play. The standards are designed with a focus on active learning, creativity, and exploration. Standards for the earliest grade span allow teacher flexibility in deciding when students are ready to use technology. Basic technology skills may be learned through the use of manipulatives, pencil-and-paper, and other manual methods through which children acquire basic skills. Many skills introduced in this grade span will be further developed in later grade spans. Kindergarten Grade 2: Computing and Society (CAS) K-2.CAS.aSafety and SecurityK-2.CAS.a.1Demonstrate proper ergonomics (e.g., body position, stretching) when using devices.K-2.CAS.a.2Use electrical devices safely and in moderation (e.g., unplug devices by pulling the plug rather than the cord, do not mix water/food and electric devices, avoid gaming and walking).K-2.CAS.a.3Care for devices appropriately (e.g., handling devices gently, completely shutting down devices when not in use, storing devices in the appropriate container).K-2.CAS.a.4Explain that a password helps protect the privacy of information.K-2.CAS.a.5Identify safe and unsafe examples of online communications.K-2.CAS.a.6Explain why we keep personal information (e.g., name, location, phone number, home address) private.K-2.CAS.a.7Identify which personal information (e.g., user name or real name, school name or home address) should and should not be shared online and with whom.K-2.CAS.a.8Explain why it is necessary to report inappropriate electronic content or contact.K-2.CAS.bEthics and LawsK-2.CAS.b.1Define good digital citizenship as using technology safely, responsibly, and ethically.K-2.CAS.b.2Demonstrate responsible use of computers, peripheral devices, and resources as outlined in school rules (Acceptable Use Policy [AUP] for K-2).K-2.CAS.b.3Explain that most digital artifacts have owners.K-2.CAS.b.4Explain the importance of giving credit to media creators/owners when using their work.K-2.CAS.cInterpersonal and Societal ImpactK-2.CAS.c.1Identify and describe how people (e.g., students, parents, policemen) use many types of technologies in their daily work and personal lives.K-2.CAS.c.2Recognize when the purpose of content is to provide information or to influence you to act. Kindergarten Grade 2: Digital Tools and Collaboration (DTC) K-2.DTC.aDigital ToolsK-2.DTC.a.1Operate a variety of digital tools (e.g., open/close, find, save/print, navigate, use input/output devices).K-2.DTC.a.2Identify, locate, and use letters, numbers, and special keys on a keyboard (e.g., Space Bar, Shift, Delete).K-2.DTC.a.3Create a simple digital artifact.K-2.DTC.a.4Use appropriate digital tools individually and collaboratively to create, review, and revise simple artifacts that include text, images and audio. K-2.DTC.bCollaboration and CommunicationK-2.DTC.b.1Collaboratively use digital tools and media resources to communicate key ideas and details in a way that informs, persuades, and/or entertains.K-2.DTC.b.2Use a variety of digital tools to exchange information and feedback with teachers.K-2.DTC.b.3Use a variety of digital tools to present information to others.K-2.DTC.cResearchK-2.DTC.c.1Conduct basic keyword searches to gather information from teacher-provided digital sources (e.g., online library catalog, databases).K-2.DTC.c.2Create an artifact individually and collaboratively that answers a research question, while clearly expressing thoughts and ideas.K-2.DTC.c.3Acknowledge and name sources of information or media (e.g., title of book, author of book, website). Kindergarten Grade 2: Computing Systems (CS) K-2.CS.aComputing DevicesK-2.CS.a.1Identify different kinds of computing devices in the classroom and other places (e.g., laptops, tablets, smart phones, desktops). K-2.CS.a.2Identify visible components of computing devices (e.g., keyboard, screen, monitor, printer, pointing device).K-2.CS.a.3Explain that computing devices function when applications, programs, or commands are executed.K-2.CS.a.4Operate a variety of computing systems (e.g., turn on, use input/output devices such as a mouse, keyboard, or touch screen; find, navigate, launch a program).K-2.CS.bHuman and Computer PartnershipsK-2.CS.b.1Explain that computing devices are machines that are not alive, but can be used to help humans with tasks.K-2.CS.b.2Recognize that some tasks are best completed by humans and others by computing devices (e.g., a human might be able to rescue someone in a normal environment, but robots would be better to use in a dangerous environment).K-2.CS.b.3Recognize that different tools can solve the same problem (e.g., pen and paper, calculators, and smart phones can all be used to solve simple mathematical problems)K-2.CS.cNetworksK-2.CS.c.1Explain that networks link computers and devices locally and around the world allowing people to access and communicate information.K-2.CS.dServicesThere are no standards in this strand for this grade span. Kindergarten Grade 2: Computational Thinking (CT) K-2.CT.aAbstractionK-2.CT.a.1List the attributes of a common object, for example, cars have a color, type (e.g., pickup, van, sedan), number of seats, etc. K-2.CT.bAlgorithmsK-2.CT.b.1Define an algorithm as a sequence of defined steps. K-2.CT.b.2Create a simple algorithm, individually and collaboratively, without using computers to complete a task (e.g., making a sandwich, getting ready for school, checking a book out of the library).K-2.CT.b.3Enact an algorithm using tangible materials (e.g., manipulatives, your body) or present the algorithm in a visual medium (e.g., storyboard).K-2.CT.cDataK-2.CT.c.1Identify different kinds of information (e.g., text, charts, graphs, numbers, pictures, audio, video, collections of objects.)K-2.CT.c.2Identify, research, and collect information on a topic, issue, problem, or question using age-appropriate digital technologies.K-2.CT.c.3Individually and collaboratively propose a solution to a problem or question based on an analysis of information.K-2.CT.c.4Individually and collaboratively create information visualizations (e.g., charts, infographics).K-2.CT.c.5Explain that computers can save information as data that can be stored, searched, retrieved, and deleted.K-2.CT.dProgramming and DevelopmentK-2.CT.d.1Define a computer program as a set of commands created by people to do something.K-2.CT.d.2Explain that computers only follow the programs instructions.K-2.CT.d.3Individually or collaboratively create a simple program using visual instructions or tools that do not require a textual programming language (e.g., unplugged programming activities, a block-based programming language).K-2.CT.eModeling and SimulationK-2.CT.e.1Describe how models represent a real-life system (e.g., globe, map, solar system, digital elevation model, weather map).K-2.CT.e.2Define simulation and identify the concepts illustrated by a simple simulation (e.g., growth and health, butterfly life cycle). Grades 3 to 5 Upper elementary students learn to differentiate tasks that are best done by computing systems or digital tools and those best done by humans. Students explore a variety of computing devices and digital tools and further develop their computational thinking problem solving skills. As students progress through grades 35, they begin to evaluate the uses and limitations of existing artifacts and modify parts of existing artifacts to develop something new. Students are able to describe and document their computational work in writing, using presentation tools and through demonstrations of their work. Grade 3 to 5 standards integrate all seven practices. Standards in this grade span ask students to demonstrate the ability to: Computing and Society (CAS) Understand safety and security concepts, safe and appropriate use of technology, and how to deal with cyberbulling. Demonstrate responsible use of technology, digital content, and interactions. Observe and describe how technology can influence people. Basic understanding of digital media messaging and equity of access to technology. Digital Tools and Collaboration (DTC) Use digital tools and keyboarding skills to publish multimedia artifacts. Use digital tools to communicate or exchange information. Develop intermediate research skills to create artifacts and attribute credit. Computing Systems (CS) Understand different computing devices and their components. Use different computing devices and troubleshoot and solve simple problems. Differentiate tasks that are best done by computing systems and humans. Understand the components of a network and basic network authentication. Basic understanding of services. Computational Thinking (CT) Create a new representation and breakdown a larger problem into sub problems. Write, debug, and analyze an algorithm. Understand databases and organizing and transforming data. Write, debug, and correct programs using successively sophisticated techniques. Create a model and use data from a simulation. With increased maturity, students in third through fifth grade are able to engage in learning in ways that are both more systematic and creative. Upper elementary is a critical time to engage students in the DLCS practices. Students capabilities as creators and problem solvers build on their experiences in K2. They continue to develop concepts through exploration, discovery, and creativity with the guidance, support, and encouragement of their educator. Standards for this grade span allow teacher flexibility in deciding when students are ready to use technology. Grades 3 5: Computing and Society (CAS) 3-5.CAS.aSafety and Security3-5.CAS.a.1Describe how to use proper ergonomics (e.g., body position, lighting, positioning of equipment, taking breaks) when using devices.3-5.CAS.a.2Describe the threats to safe and efficient use of devices (e.g., SPAM, spyware, phishing, viruses) associated with various forms of technology use (e.g., downloading and executing software programs, following hyperlinks, opening files).3-5.CAS.a.3Identify appropriate and inappropriate uses of technology when posting to social media, sending e-mail or texts, and browsing the Internet.3-5.CAS.a.4Explain the proper use and operation of security technologies (e.g., passwords, virus protection software, spam filters, popup blockers, cookies).3-5.CAS.a.5Describe ways to employ safe practices and avoid the potential risks/dangers associated with various forms of online communications, downloads, linking, Internet purchases, advertisements, and inappropriate content within constrained environments.3-5.CAS.a.6Identify different types of cyberbullying (e.g., harassment, flaming, excluding people, outing, and impersonation).3-5.CAS.a.7Explain that if you encounter cyberbullying or other inappropriate content, you should immediately tell a responsible adult (e.g., teacher, parent).3-5.CAS.bEthics and Laws3-5.CAS.b.1Demonstrate responsible use of computers, peripheral devices, and resources as outlined in school rules (Acceptable Use Policy [AUP]).3-5.CAS.b.2Describe the difference between digital artifacts that are open or free and those that are protected by copyright.3-5.CAS.b.3Explain the guidelines for the fair use of downloading, sharing, or modifying of digital artifacts.3-5.CAS.b.4Describe the purpose of copyright and the possible consequences for inappropriate use of digital artifacts that are protected by copyright.3-5.CAS.b.5Explain that laws exist (e.g., Section 508, Telecommunication Act of 1996) that help ensure that people with disabilities can access electronic and information technology.3-5.CAS.cInterpersonal and Societal Impact3-5.CAS.c.1Explain the different forms of web advertising (e.g., search ads, pay-per-click ads, banner ads, targeted ads, in-game ads, e-mail ads).3-5.CAS.c.2Explain why websites, digital resources, and artifacts may include advertisements and collect personal information.3-5.CAS.c.3Define the digital divide as unequal access to technology on the basis of differences, such as income, education, age, and geographic location.3-5.CAS.c.4Use critical thinking to explain how access to technology helps empower individuals and groups (e.g., gives them access to information, the ability to communicate with others around the world, allows them to buy and sell things).3-5.CAS.c.5Identify resources in the community that can give people access to technology (e.g., libraries, community centers, education programs, schools, hardware/software donation programs).3-5.CAS.c.6Identify ways in which people with disabilities access and use technology (e.g., audio players and recorders, FM listening systems, magnifiers). 3-5.CAS.c.7Identify the impact of social media and cyberbullying on individuals, families, and society. Grades 3 5: Digital Tools and Collaboration (DTC) 3-5.DTC.aDigital Tools3-5.DTC.a.1Type five words-per-minute times grade level (e.g., for Grade 5, type 25 words/minute). 3-5.DTC.a.2Navigate between local, networked, or online/cloud environments and transfer files between each (upload/download).3-5.DTC.a.3Use digital tools (local and online) to manipulate and publish multimedia artifacts.3-5.DTC.bCollaboration and Communication3-5.DTC.b.1Communicate key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using digital tools and media-rich resources.3-5.DTC.b.2Collaborate through online digital tools under teacher supervision.3-5.DTC.cResearch3-5.DTC.c.1Identify digital information sources to answer research questions (e.g., online library catalog, online encyclopedias, databases, websites).3-5.DTC.c.2Perform searches to locate information using two or more key words and techniques to refine and limit such searches.3-5.DTC.c.3Evaluate digital sources for accuracy, relevancy, and appropriateness.3-5.DTC.c.4Gather and organize information from digital sources by quoting, paraphrasing, and/or summarizing.3-5.DTC.c.5Create an artifact that answers a research question and clearly communicates thoughts and ideas.3-5.DTC.c.6Cite text-based sources using a school- or district-adopted format.3-5.DTC.c.7Provide basic source information (e.g., Uniform Resource Locator [URL], date accessed) for non-text-based sources (e.g., images, audio, video). Grades 3 5: Computing Systems (CS) 3-5.CS.aComputing Devices3-5.CS.a.1Identify a broad range of computing devices (e.g., computers, smart phones, tablets, robots, e-textiles) and appropriate uses for them.3-5.CS.a.2Describe the function and purpose of various input and output devices (e.g., monitor, keyboard, speakers, controller, probes, sensors, Bluetooth transmitters, synthesizers).3-5.CS.a.3Demonstrate an appropriate level of proficiency (connect and record data, print, send command, connect to Internet, search) in using a range of computing devices (e.g., probes, sensors, printers, robots, computers).3-5.CS.a.4Identify and solve simple hardware and software problems that may occur during everyday use (e.g., power, connections, application window or toolbar).3-5.CS.a.5Describe the differences between hardware and software.3-5.CS.a.6Identify and explain that some computing functions are always active (e.g., locations function on smart phones).3-5.CS.bHuman and Computer Partnerships3-5.CS.b.1Compare and contrast human and computer performance on similar tasks (e.g., sorting alphabetically, finding a path across a cluttered room) to understand which is best suited to the task.3-5.CS.b.2Explain how hardware and applications (e.g., Global Positioning System [GPS] navigation for driving directions, text-to-speech translation, language translation) can enable everyone, including people with disabilities, to do things they could not do otherwise.3-5.CS.b.3Explain advantages and limitations of technology (e.g., a spell-checker can check thousands of words faster than a human could look them up, however, a spell-checker might not know whether underserved is correct or if the authors intent was to type undeserved).3-5.CS.cNetworks3-5.CS.c.1Describe how a network is made up of a variety of components and identify the common components (e.g., links, nodes, networking devices).3-5.CS.c.2Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.3-5.CS.c.3Define and explain why devices are numbered/labeled in networks (e.g., the World Wide Web Uniform Resource Locator [URL], the Internet Protocol [IP] address, the Machine Access Code [MAC]).3-5.CS.c.4Recognize that there are many sources of and means for accessing information within a network (e.g., websites, e-mail protocols, search engines)3-5.CS.dServices3-5.CS.d.1Identify common services (e.g., driving directions apps that access remote map services, digital personal assistants that access remote information services). Grades 3 5: Computational Thinking (CT) 3-5.CT.aAbstraction3-5.CT.a.1Use numbers or letters to represent information in another form (e.g., secret codes, Roman numerals, abbreviations).3-5.CT.a.2Organize information in different ways to make it more useful/relevant (e.g., sorting, tables).3-5.CT.a.3Make a list of sub-problems to consider, while addressing a larger problem. 3-5.CT.bAlgorithms3-5.CT.b.1Define an algorithm as a sequence of instructions that can be processed by a computer. 3-5.CT.b.2Recognize that different solutions exist for the same problem (or sub-problem).3-5.CT.b.3Use logical reasoning to predict outcomes of an algorithm. 3-5.CT.b.4Individually and collaboratively create an algorithm to solve a problem (e.g., move a character/robot/person through a maze).3-5.CT.b.5Detect and correct logical errors in various algorithms (e.g., written, mapped, live action, or digital). 3-5.CT.cData3-5.CT.c.1Describe examples of databases from everyday life (e.g., library catalogs, school records, telephone directories, contact lists).3-5.CT.c.2Collect and manipulate data to answer a question using a variety of computing methods (e.g., sorting, totaling, averaging) and tools (such as a spreadsheet) to collect, organize, graph, and analyze data.3-5.CT.dProgramming and Development3-5.CT.d.1Individually and collaboratively create, test, and modify a program in a graphical environment (e.g., block-based visual programming language).3-5.CT.d.2Use arithmetic operators, conditionals, and repetition in programs. 3-5.CT.d.3Use interactive debugging to detect and correct simple program errors. 3-5.CT.d.4Recognize that programs need known starting values (e.g., set initial score to zero in a game). 3-5.CT.eModeling and Simulation3-5.CT.e.1Individually and collaboratively create a simple model of a system (e.g., water cycle, solar system) and explain what the model shows and does not show.3-5.CT.e.2Identify the concepts, features, and behaviors illustrated by a simulation (e.g., object motion, weather, ecosystem, predator/prey) and those that were not included.3-5.CT.e.3Individually and collaboratively use data from a simulation to answer a question.  Grades 6 to 8 The goal for middle school students is to define problems more precisely, to conduct a more thorough process of selecting the best devices, tools, and solutions. Students learn to differentiate problems or sub-problems that are best solved by computing systems or digital tools and those best solved by humans. Students further develop their computational thinking problem solving skills, which facilitates the use of technology. Grade 6 to 8 standards integrate all seven practices. Standards in this grade span ask students to demonstrate the ability to: Computing and Society (CAS) Understand safety and security concepts, online identity and privacy, and how to deal with cyberbullying and inappropriate content. Demonstrate responsible use of technology and laws regarding ownership of material/ideas, licensing, and fair use. Understand consequences of inappropriate technology use, including harassment and sexting. Examine the impact of emerging technology in schools, communities, and societies. Evaluate digital media bias and messaging. Digital Tools and Collaboration (DTC) Use a variety of digital tools to create artifacts, online content, and online surveys. Understand that different digital tools have different uses. Communicate and publish online. Advance research skills. Computing Systems CS) Understand hardware and software components of a computing device; troubleshoot hardware and software problems. Use a variety of computing devices to manipulate data. Differentiate tasks/problems best solved by computing systems or by humans. Understand that network components carry out specific functions to connect computing devices, people, and services. Understand the capabilities services can provide. Computational Thinking (CT) Create a new representation, define functions, and use decomposition. Write, debug, and analyze advanced algorithms and basic programs. Understand how computing devices represent and manipulate information. Create, modify, and manipulate databases. Use a variety of data collection devices. Create a model and use and modify a simulation for analysis. By the time students reach middle school, they should have had numerous experiences in using technology to create artifacts and solve problems. Active engagement of middle school students with the practices is critical: students generally make up their minds about whether they identify with science and engineering by the time they leave grade 8. Students should have opportunities to develop the skills necessary for a meaningful progression of development in order to engage in reasoning, which is critical to success in civic life, post-secondary education, and career. Grades 6 8: Computing and Society (CAS) 6-8.CAS.a Safety and Security6-8.CAS.a.1Identify threats and actively protect devices and networks from viruses, intrusion, vandalism, and other malicious activities.6-8.CAS.a.2Describe how cyberbullying can be prevented and managed.6-8.CAS.a.3Explain the connection between the persistence of data on the Internet, personal online identity, and personal privacy.6-8.CAS.a.4Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).6-8.CAS.a.5Differentiate between appropriate and inappropriate content on the Internet.6-8.CAS.b Ethics and Laws6-8.CAS.b.1Explain how copyright law and licensing protect the owner of intellectual property. 6-8.CAS.b.2Explain possible consequences of violating intellectual property law and plagiarism.6-8.CAS.b.3Apply fair use for using copyrighted materials (e.g., images, music, video, text).6-8.CAS.b.4Identify the legal consequences of sending or receiving inappropriate content (e.g., cyberbullying, harassment, sexting). 6-8.CAS.b.5Differentiate among open source and proprietary software licenses and their applicability to different types of software and media. 6-8.CAS.b.6Demonstrate compliance with the schools Acceptable Use Policy [AUP].6-8.CAS.b.7Identify software license agreements and application permissions. 6-8.CAS.b.8Explain positive and malicious purposes of hacking.6-8.CAS.b.9License original content and extend license for sharing in the public domain (e.g., creative commons).6-8.CAS.c Interpersonal and Societal Impact6-8.CAS.c.1 Describe current events and emerging technologies in computing and the effects they may have on education, the workplace, individuals, communities, and global society.6-8.CAS.c.2 Identify and discuss the technology proficiencies needed in the classroom and the workplace, and how to meet the needs.6-8.CAS.c.3Relate the distribution of computing resources in a global society to issues of equity, access, and power.6-8.CAS.c.4 Evaluate how media and technology can be used to distort, exaggerate, and misrepresent information.6-8.CAS.c.5Evaluate the bias of digital information sources, including websites. Grades 6 8: Digital Tools and Collaboration (DTC) 6-8.DTC.aDigital Tools6-8.DTC.a.1Identify and explain the strengths, weaknesses, and capabilities of a variety of digital tools.6-8.DTC.a.2Identify the kinds of content associated with different file types and why different file types exist (e.g., formats for word processing, images, music, three-dimensional drawings.).6-8.DTC.a.3Integrate information from multiple file formats into a single artifact.6-8.DTC.a.4Individually and collaboratively use advanced tools to design and create online content (e.g., digital portfolio, multimedia, blog, webpage).6-8.DTC.a.5Individually and collaboratively develop and conduct an online survey.6-8.DTC.bCollaboration and Communication6-8.DTC.b.1Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources.6-8.DTC.b.2Collaborate synchronously and asynchronously through online digital tools. 6-8.DTC.b.3Demonstrate ability to communicate appropriately through various online tools (e.g., e-mail, social media, texting, blog comments).6-8.DTC.cResearch6-8.DTC.c.1Perform advanced searches to locate information using a variety of digital sources (e.g.,Boolean Operators, limiters like reading level, subject, media type).6-8.DTC.c.2Evaluate quality of digital sources for reliability, including currency, relevancy, authority, accuracy, and purpose of digital information.6-8.DTC.c.3Gather, organize, and analyze information from digital sources by quoting, paraphrasing, and/or summarizing.6-8.DTC.c.4Create an artifact, individually and collaboratively, that answers a research question and communicates results and conclusions.6-8.DTC.c.5Use digital citation tools to cite sources using a school- or district-adopted format (e.g., Modern Language Association [MLA]), including proper citation for all text and non-text sources (e.g., images, audio, video). Grades 6 8: Computing Systems (CS) 6-8.CS.aComputing Devices6-8.CS.a.1Describe the main functions of an operating system.6-8.CS.a.2Recognize that there is a wide range of application software.6-8.CS.a.3Identify and describe the function of the main internal parts of a basic computing device (e.g., motherboard, hard drive, Central Processing Unit [CPU]).6-8.CS.a.4Identify and describe the use of sensors, actuators, and control systems in an embodied system (e.g., a robot, an e-textile, installation art, smart room).6-8.CS.a.5Individually and collaboratively design and demonstrate the use of a device (e.g., robot, e-textile) to accomplish a task.6-8.CS.a.6Use a variety of computing devices (e.g., probes, sensors, handheld devices, Global Positioning System [GPS]) to individually and collaboratively collect, analyze, and present information for content-related problems.6-8.CS.a.7Identify steps involved in diagnosing and solving routine hardware and software problems (e.g., power, connections, application window or toolbar, cables, ports, network resources, video, sound) that occur during everyday computer use.6-8.CS.bHuman and Computer Partnerships6-8.CS.b.1Explain why some problems can be solved more easily by computers or humans based on a general understanding of types of tasks at which each excels.6-8.CS.b.2Describe how humans and machines interact to solve problems that cannot be solved by either alone (e.g., big data experiments that involve drawing conclusions by analyzing vast amounts of data).6-8.CS.cNetworks6-8.CS.c.1Explain the difference between physical (wired), local and wide area, wireless, and mobile networks.6-8.CS.c.2Model the components of a network, including devices, routers, switches, cables, wires, and transponders.6-8.CS.c.3Describe how information, both text and non-text, is translated and communicated between digital devices over a computer network.6-8.CS.dServices6-8.CS.d.1Identify capabilities of devices that are enabled through services (e.g., a wearable device that stores fitness data in the cloud, a mobile device that uses location services for navigation). Grades 6 8: Computational Thinking (CT) 6-8.CT.aAbstraction6-8.CT.a.1Describe how data is abstracted by listing attributes of everyday items to represent, order and compare those items (e.g., street address as an abstraction for locations; car make, model, and license plate number as an abstraction for cars). 6-8.CT.a.2Define a simple function that represents a more complex task/problem and can be reused to solve similar tasks/problems. 6-8.CT.a.3Use decomposition to define and apply a hierarchical classification scheme to a complex system, such as the human body, animal classification, or in computing.6-8.CT.bAlgorithms6-8.CT.b.1Design solutions that use repetition and conditionals.6-8.CT.b.2Use logical reasoning to predict outputs given varying inputs. 6-8.CT.b.3Individually and collaboratively decompose a problem and create a sub-solution for each of its parts (e.g., video game, robot obstacle course, making dinner). 6-8.CT.b.4Recognize that more than one algorithm can solve a given problem. 6-8.CT.b.5Recognize that boundaries need to be taken into account for an algorithm to produce correct results. 6-8.CT.cData6-8.CT.c.1Demonstrate that numbers can be represented in different base systems (e.g., binary, octal, and hexadecimal) and text can be represented in different ways (e.g., American Standard Code for Information Interchange [ASCII]).6-8.CT.c.2 Describe how computers store, manipulate, and transfer data types and files (e.g., integers, real numbers, Boolean Operators) in a binary system.6-8.CT.c.3Create, modify, and use a database (e.g., define field formats, add new records, manipulate data), individually and collaboratively, to analyze data and propose solutions for a task/problem. 6-8.CT.c.4 Perform a variety of operations such as sorting, filtering, and searching in a database to organize and display information in a variety of ways such as number formats (scientific notation and percentages), charts, tables, and graphs.6-8.CT.c.5Select and use data-collection technology (e.g., probes, handheld devices, geographic mapping systems) to individually and collaboratively gather, view, organize, analyze, and report results for content-related problems.6-8.CT.dProgramming and Development6-8.CT.d.1Individually and collaboratively compare algorithms to solve a problem, based on a given criteria (e.g., time, resource, accessibility).6-8.CT.d.2Use functions to hide the detail in a program.6-8.CT.d.3Create a program, individually and collaboratively, that implements an algorithm to achieve a given goal.6-8.CT.d.4Implement problem solutions using a programming language, including all of the following: looping behavior, conditional statements, expressions, variables, and functions. 6-8.CT.d.5Trace programs step-by-step in order to predict their behavior. 6-8.CT.d.6Use an iterative approach to development and debugging to understand the dimensions of a problem clearly. 6-8.CT.eModeling and Simulation6-8.CT.e.1Create a model of a real-world system and explain why some details, features and behaviors were required in the model and why some could be ignored.6-8.CT.e.2Use and modify simulations to analyze and illustrate a concept in depth (e.g., light rays/mechanical waves interaction with materials, genetic variation).6-8.CT.e.3Select and use computer simulations, individually and collaboratively, to gather, view, analyze, and report results for content-related problems (e.g., migration, trade, cellular function). Grades 9 to 12 The concepts and skills in grades 912 build on K8 experiences and progress to more technical and sophisticated applications. Students continue to refine their skills in differentiating problems or sub-problems that are best solved by computing systems or digital tools and those best solved by humans. Students work independently and collaborative to achieve the high school standards. Students further develop their computational thinking problem solving skills, which facilitate the selection and use of technology. The high school standards provide opportunities for students to gain proficiency and incorporate substantive expectations of the College Boards Computer Science Principles, the widely recognized benchmark for postsecondary preparation. The high school standards specify the skills that all students should study in order to be college and career ready. Grade 9 to 12 standards integrate all seven practices. Standards in this grade span ask students to demonstrate the ability to: Computing and Society (CAS) Understand safety and security concepts, security and recovery strategies, and how to deal with cyberbullying and peer pressure. Analyze the impact and intent of new technology laws. Interpret license agreements and permissions. Examine the impact of technology, assistive technology, technology proficiencies, and cybercrime in peoples lives, commerce, and society. Digital Tools and Collaboration (DTC) Select and use best digital tools or resources to create an artifact or solve a problem. Communicate and publish online. Advance research skills including advance searches, digital source evaluation, and synthesis of information. Computing Systems (CS) Select and use best computing devices to accomplish a real-world task. Understand how computing device components work. Use troubleshooting strategies to solve routine hardware and software problems. Decompose tasks/problems into sub-problems to plan solutions. Understand how networks communicate, their vulnerabilities and issues that may impact their functionality. Evaluate the benefits of using a service with respect to function and quality. Computational Thinking (CT) Create a new representation through generalization and decomposition. Write and debug algorithms in a structured language (pseudocode). Understand how different data representation effects storage and quality. Create, modify, and manipulate data structures, data sets, and data visualizations. Use an iterative design process to create an artifact or solve a problem. Create models and simulations to formulate, test, analyze, and refine a hypothesis. Throughout high school, students should develop increasingly sophisticated skills relevant to their goals for college and career. By the completion of high school, students should have the opportunity to use more specialized computing systems and digital tools, and develop an appreciation for the capabilities and capacities of technology in civic, college, and career contexts. Students should be knowledgeable about the role technology plays in various fields of work, enabling them to better plan for their careers in the twenty-first century. Grades 9 12: Computing and Society (CAS) 9-12.CAS.a Safety and Security9-12.CAS.a.1Evaluate and design an ergonomic work environment.9-12.CAS.a.2Explain safe practices when collaborating online, including how to anticipate potentially dangerous situations.9-12.CAS.a.3Construct strategies to combat cyberbullying/harassment.9-12.CAS.a.4Identify the mental health consequences of cyberbullying/harassment.9-12.CAS.a.5Explain how peer pressure in social computing settings influences choices.9-12.CAS.a.6Apply strategies for managing negative peer pressure and encouraging positive peer pressure.9-12.CAS.b Ethics and Laws9-12.CAS.b.1Model mastery of the schools Acceptable Use Policy [AUP].9-12.CAS.b.2Identify computer-related laws and analyze their impact on digital privacy, security, intellectual property, network access, contracts, and consequences of sexting and harassment.9-12.CAS.b.3Discuss the legal and ethical implications associated with malicious hacking and software piracy.9-12.CAS.b.4Interpret software license agreements and application permissions.9-12.CAS.c Interpersonal and Societal Impact9-12.CAS.c.1Explain the impact of the digital divide on access to critical information.9-12.CAS.c.2Discuss the impact of computing technology on business and commerce (e.g., automated tracking of goods, automated financial transaction, e-commerce, cloud computing).9-12.CAS.c.3Describe the role that assistive technology can play in peoples lives.9-12.CAS.c.4Create a digital artifact that is designed to be accessible (e.g., closed captioning for audio, alternative text for images).9-12.CAS.c.5Analyze the beneficial and harmful effects of computing innovations (e.g., social networking, delivery of news and other public media, intercultural communication).9-12.CAS.c.6Cultivate a positive web presence (e.g., digital resume, portfolio, social media).9-12.CAS.c.7Identify ways to use technology to support lifelong learning.9-12.CAS.c.8Analyze the impact of values and points of view that are presented in media messages (e.g., racial, gender, political).9-12.CAS.c.9Discuss the social and economic implications associated with malicious hacking, software piracy, and cyber terrorism. Grades 9 12: Digital Tools and Collaboration (DTC) 9-12.DTC.aDigital Tools9-12.DTC.a.1Use digital tools to design and develop a significant digital artifact (e.g., multipage website, online portfolio, simulation).9-12.DTC.a.2Select digital tools or resources based on their efficiency and effectiveness to use for a project or assignment, and justify the selection. 9-12.DTC.bCollaboration and Communication9-12.DTC.b.1Communicate and publish key ideas and details to a variety of audiences using digital tools and media-rich resources.9-12.DTC.b.2Collaborate on a substantial project with outside experts or others through online digital tools (e.g., science fair project, community service project, capstone project).9-12.DTC.cResearch9-12.DTC.c.1Generate, evaluate, and prioritize questions that can be researched through digital resources or tools.9-12.DTC.c.2Perform advanced searches to locate information and/or design a data-collection approach to gather original data (e.g., qualitative interviews, surveys, prototypes, simulations).9-12.DTC.c.3Evaluate digital sources needed to solve a given problem (e.g., reliability, point of view, relevancy).9-12.DTC.c.4Gather, organize, analyze, and synthesize information using a variety of digital tools.9-12.DTC.c.5Create an artifact that answers a research question, communicates results and conclusions, and cites sources. Grades 9 - 12: Computing Systems (CS) 9-12.CS.aComputing Devices9-12.CS.a.1Select computing devices (e.g., probe, sensor, tablet) to accomplish a real-world task (e.g., collecting data in a field experiment) and justify the selection.9-12.CS.a.2Examine how the components of computing devices are controlled by and react to programmed commands.9-12.CS.a.3Apply strategies for identifying and solving routine hardware and software problems that occur in everyday life (e.g., update software patches, virus scan, empty trash, run utility software, close all programs, reboot, use help sources).9-12.CS.a.4Explain and demonstrate how specialized computing devices can be used for problem solving, decision-making and creativity in all subject areas.9-12.CS.a.5Describe how computing devices manage and allocate shared resources (e.g., memory, Central Processing Unit [CPU]).9-12.CS.a.6Examine the historical rate of change in computing devices (e.g., power/energy, computation capacity, speed, size, ease of use) and discuss the implications for the future.9-12.CS.bHuman and Computer Partnerships9-12.CS.b.1Identify a problem that cannot be solved by humans or machines alone and design a solution for it by decomposing the task into sub-problems suited for a human or machine to accomplish (e.g., a human-computer team playing chess, forecasting weather, piloting airplanes).9-12.CS.cNetworks9-12.CS.c.1Explain how network topologies and protocols enable users, devices, and systems to communicate with each other.9-12.CS.c.2Examine common network vulnerabilities (e.g., cyberattacks, identity theft, privacy) and their associated responses.9-12.CS.c.3Examine the issues (e.g., latency, bandwidth, firewalls, server capability) that impact network functionality.9-12.CS.dServices9-12.CS.d.1Compare the value of using an existing service versus building the equivalent functionality (e.g., using a reference search engine versus creating a database of references for a project).9-12.CS.d.2Explain the concept of quality of service (e.g., security, availability, performance) for services providers (e.g., online storefronts that must supply secure transactions for buyer and seller).  Grades 9 12: Computational Thinking (CT) 9-12.CT.aAbstraction9-12.CT.a.1Discuss and give an example of the value of generalizing and decomposing aspects of a problem in order to solve it more effectively.9-12.CT.bAlgorithms9-12.CT.b.1Recognize that the design of an algorithm is distinct from its expression in a programming language. 9-12.CT.b.2Represent algorithms using structured language, such as pseudocode. 9-12.CT.b.3 Explain how a recursive solution to a problem repeatedly applies the same solution to smaller instances of the problem. 9-12.CT.b.4Describe that there are ways to characterize how well algorithms perform and that two algorithms can perform differently for the same task. 9-12.CT.b.5Explain that there are some problems which cannot be computationally solved. 9-12.CT.cData9-12.CT.c.1Describe how data types, structures, and compression in programs affect data storage and quality (e.g., digital image file sizes are affected by resolution and color depth).9-12.CT.c.2Create an appropriate multidimensional data structure that can be filtered, sorted, and searched (e.g., array, list, record).9-12.CT.c.3Create, evaluate, and revise data visualization for communication and knowledge.9-12.CT.c.4Analyze a complex data set to answer a question or test a hypothesis (e.g., analyze a large set of weather or financial data to predict future patterns).9-12.CT.c.5Identify different problems (e.g., large or multipart problems, problems that need specific expertise, problems that affect many constituents) that can benefit from collaboration when processing and analyzing data to develop new insights and knowledge.9-12.CT.dProgramming and Development9-12.CT.d.1Use a development process in creating a computational artifact that leads to a minimum viable product and includes reflection, analysis, and iteration (e.g., a data-set analysis program for a science and engineering fair, capstone project that includes a program, term research project based on program data).9-12.CT.d.2Decompose a problem by defining functions which accept parameters and produce return values.9-12.CT.d.3Select the appropriate data structure to represent information for a given problem (e.g., records, arrays, lists).9-12.CT.d.4Analyze trade-offs among multiple approaches to solve a given problem (e.g., space/time performance, maintainability, correctness, elegance).9-12.CT.d.5Use appropriate looping structures in programs (e.g., FOR, WHILE, RECURSION).9-12.CT.d.6Use appropriate conditional structures in programs (e.g., IF-THEN, IF-THEN-ELSE, SWITCH).9-12.CT.d.7Use a programming language or tool feature correctly to enforce operator precedence.9-12.CT.d.8Use global and local scope appropriately in program design (e.g., for variables).9-12.CT.d.9Select and employ an appropriate component or library to facilitate programming solutions (e.g., turtle, Global Positioning System [GPS], statistics library).9-12.CT.d.10Use an iterative design process, including learning from making mistakes, to gain a better understanding of the problem domain. 9-12.CT.d.11Engage in systematic testing and debugging methods to ensure program correctness.9-12.CT.d.12Demonstrate how to document a program so that others can understand its design and implementation.9-12.CT.e Modeling and Simulation9-12.CT.e.1Create models and simulations to help formulate, test, and refine hypotheses.9-12.CT.e.2Form a model from a hypothesis generated from research and run a simulation to collect and analyze data to test that hypothesis. Glossary The following terms and definitions were developed using various resources listed in the reference section that follows the glossary terms. abstraction (process)The process of reducing complexity by focusing on the main idea. By hiding details irrelevant to the question at hand and bringing together related and useful details, abstraction reduces complexity and allows one to focus on the problem.abstraction (product) An abstraction is a new representation of a thing, a system or a problem which helpfully reframes a problem by hiding details irrelevant to the question at hand.Acceptable Use Policy (AUP)An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a district/corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an AUP before being granted a network ID.algorithmA set of unambiguous rules or instructions to achieve a particular objective.1alphanumericA combination of alphabetic and numeric characters, including other symbols, such as punctuation and mathematical symbols.2 Example: ABC123annotated bibliographyAn annotated bibliography includes a summary and/or evaluation of each of the sources in a bibliography.applicationSoftware (program) that is used by people to accomplish a task.arrayA data structure comprising a collection of values of the same type accessible through an index.1 Fixed size. Example: [A, B, C, D] is an array of letters. The second element of the array is B.assistive technology In general, the term `assistive technology device means any item, piece of equipment, or product system, whether acquired commercially off-the-shelf, modified, or customized, that is used to increase, maintain, or improve functional capabilities of a person with a disability. Exception: The term does not include a medical device that is surgically implanted, or the replacement of such device. 3asynchronousNot necessarily in the same time and place.attributeA specification that defines a property of an object, element, or file. It may also refer to or set the specific value for a given instance of such. For clarity, attributes should more correctly be considered metadata. An attribute is frequently and generally a property of a property.2 Example: The color attribute of a red car would have the value red.authenticationAny process by which you verify someone or something (a device) is who or what or they or it claim(s) to be. Example: Some websites use a combination of e-mail address and password as a means of authentication.bandwidthDescribes the maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time.4big dataData sets that are so large or complex that traditional data processing applications are inadequate.2 binary A method of encoding data using two symbols, 1 and 0. 1binary number A number written in the Base-2 Number System.1 Example: the number 4 written in binary is 100.bit A basic unit of data that stores one binary value, 1 or 0. 1Boolean A data type with only two values, TRUE or FALSE. 1browser cookie A small piece of text recording activity about websites one visits stored on ones computer.1classIn object-oriented programming, a class is an extensible program-code template for creating objects, providing initial values for state (member variables) and implementations of behavior (member functions, methods).2 code Any set of instructions expressed in a programming language.1coding The act of writing computer programs in a programming language.1color depth The number of different colors that may be used in an image dictated by the number of bits used to represent the color of each pixel.1componentA reusable element with a specification for how it is to be used (with inputs and outputs, as appropriate).computational artifactInventions, creations, final products, and development byproducts, created by the act or process of computing.computational devicesSee computing devices.computational thinking A way of thinking when computing that uses decomposition, pattern recognition, abstraction, pattern generalization, and algorithm design.Computer Science (CS) The study of computers and algorithmic processes, including their principles, hardware and software designs, applications, and their impact on society.5computing Any goal-oriented activity requiring, benefiting from, or creating algorithmic processes.2computing artifactsAny creation facilitated by a computer, such as digital documents, digital videos, databases, computer program including computational models, and simulations.computing devices A machine that can be programmed to carry out a set of logical or arithmetic operations (e.g., a laptop computer, a mobile phone, a computer chip inside an appliance).conditional/conditional statementIn  HYPERLINK "http://en.wikipedia.org/wiki/Computer_science" \h computer science, conditional statements, conditional expressions, and conditional constructs are features of a  HYPERLINK "http://en.wikipedia.org/wiki/Programming_language" \h programming language which perform different computations or actions depending on whether a programmer-specified  HYPERLINK "http://en.wikipedia.org/wiki/Boolean_datatype" \h Boolean Condition evaluates to true or false.2Central Processing Unit (CPU) The device within a computer that executes instructions.1cyberbullyingThe use of electronic communication to bully a person typically by sending messages of an intimidating or threatening nature.cyber harassmentThe use of the Internet or other electronic means to harass an individual, a group, or an organization.databaseAn integrated and organized collection of logically related records or files or data that are stored in a computer system which consolidates records previously stored in separate files into a common pool of data records which provides data for many applications.2data structure A particular way to store and organize data within a computer program. 1data visualizationThe presentation of data in a static or dynamic graphical format. Example: chart, table, or infographic.De Morgans LawsA pair of logical rules that are used to help build conditions in computers programs. The rules are: NOT (A and B) = NOT A or NOT B NOT (A or B) = NOT A and NOT Bdebugging The process of finding and correcting errors in programs.1decimal The base 10 number system.1decomposition Breaking a problem or system down into its components.1digital Created in a form that is the 1s and 0s a computer uses to store information.digital artifact Digital content made by a human with intent and skill.1 Example: computer animation, LED infused clothing, interactive sculpture, 3-D printed objects, songs.digital citizenshipThe norms of appropriate, responsible behavior with regard to the use of technology.digital creator A person who makes digital artifacts.1digital device An electronic device that can receive, store, process, or send  HYPERLINK "http://itlaw.wikia.com/wiki/Digital_information" \h digital information.6digital divideThe gap between those who have access to digital technology and those who do not, which is influenced by social, cultural and economic factors.digital literacyThe ability to use digital technology, communication tools or networks to locate, evaluate, use, and create information.7 The ability to understand and use information in multiple formats from a wide range of sources when it is presented via computers.8 A persons ability to perform tasks effectively in a digital environment. Literacy includes the ability to read and interpret media, reproduce data and images through digital manipulation, and evaluate and apply new knowledge gained from digital environments.9 digital media Media encoded in a computer-readable form.1digital privacyThe protection of personal information on the Internet.digital safety The knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the Internet and the self-protection from computer crime in general.digital toolsAn application that produces, manipulates, or stores data in a digital format (e.g., word processors, drawing programs, image/video/music editors, simulators, 3D-design sketchers, publishing programs).ergonomicsDesigning and arranging things people use so the people and things interact most efficiently and safely.expressionAn expression in a programming language is a combination of explicit values, constants, variables, operators, and functions that are interpreted according to the particular rules of precedence and of association for a particular programming language which computes and then produces (returns, in a stateful environment) another value.2 Example: b = a + 2.fair use The legal concept that allows brief excerpts of copyrighted material to be used for purposes such as review, news reporting, teaching, scholarship, or art.firewallA network security system with rules to control incoming and outgoing traffic.functionA function is a type of procedure or routine. Some programming languages make a distinction between a function, which returns a value, and a procedure, which performs some operation, but does not return a value.10hackingAppropriately applying ingenuity12, cleverly solving a programming problem13, and using a computer to gain unauthorized access to data within a system.hardware The physical components that make up a computer.1hexadecimalA positional numeral system with a radix or base of 16. It uses sixteen distinct symbols, most often the symbols 09 to represent values zero to nine, and A, B, C, D, E, F (or alternatively a, b, c, d, e, f) to represent values of ten to fifteen. Hexadecimal numerals are widely used by computer system designers and programmers.2HTML HyperText Mark-up Language; the language used to create web pages.1infographicsA static data visualization used to condense large amounts of information that is more easily understood by the reader (e.g., maps, hierarchies, networks.14 input (noun) An input is a data value passed from the outside world to a computer.1input (verb) To input is to send data from the outside world into a computer system. 1Internet A network of interconnected networks.1intellectual propertySomething (such as an idea, invention, or process) that comes from a person's mind.15 IP address Internet Protocol address is a unique numeric value that is assigned to a computer or other device connected to the Internet so that it may be identified and located.1 Example: 127.0.0.1.iterativeThe act of repeating a process with the aim of approaching a desired goal, target, or result, such as a grammatical rule that can be repeatedly applied.2latencyThe amount of time it takes a packet of data to move across a network connection.3library/ code libraryA collection of programs, applications, or resources files. The goal of the code library is to provide students with sample applications and supplemental information to help them create or customize their own program or application.lifelong learningAll learning activity undertaken throughout life, with the aim of improving knowledge, skills and competences within a personal, civic, social and/or employment-related perspective.11lists A data structure for storing ordered values.1 Data is of arbitrary/unfixed size.Local Area Network (LAN)A Local Area Network is a computer network limited to a small area, such as an office building, university, or even a residential home.3loopA loop is a sequence of statements which is specified once but which may be carried out several times in succession.2 Media Access Control Address (MAC)Media Access Control Address is a hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured into every network card and, therefore, cannot be changed.memoryTemporary storage used by computing devices.minimum viable productA prototype that embodies an initial set of design goals and facilitates live testing and revision.model (noun)A representation of (some part of) a problem or a system.1modeling (verb)The act of creating a model.1network A computer network is a collection of nodes connected to one another by networking devices and links (cables or by wireless media) and arranged so data may be sent between devices either directly or via other devices.1networking devicesNetwork devices are units that mediate data in a network.1 Networking hardware such as hubs, switches, routers, and bridges are used to connect nodes on a network, so that they can share data or resources.nodeComputational devices (e.g., personal computers, printer, smart phones, servers) on a network.open source softwarePublishers of open source software provide copies of both the source code and the object code when they distribute computer programs to the public. In addition, they establish the terms of use of the software by means of a license.6open source licenseA contract that provides users with a sufficient set of privileges to access and modify the open source software's source code.6operating system A set of programs that manage the functioning of, and other programs access to, hardware.1operatorA character that represents a specific action (e.g., x is an arithmetic operator that represents multiplication). In computer programs, one of the most familiar sets of operators, the Boolean Operators, is used to work with true/false values.16 output (noun) A response from a system.1 Example: a program that adds could have inputs of 2 and 2 with an output of 4.output (verb) To generate an output.1parameterA parameter is a special kind of variable used in a subroutine to refer to one of the pieces of data provided as input to the subroutine. These pieces of data are called arguments. An ordered list of parameters is usually included in the definition of a subroutine so each time the subroutine is called, its arguments for that call can be assigned to the corresponding parameters.2peripheral deviceA peripheral device is any external device that provides input and output for the computer. For example, a keyboard and mouse are input peripherals, while a monitor and printer are output peripherals. Computer peripherals, or peripheral devices, are sometimes called I/O devices, because they provide input and output for the computer. Some peripherals, such as external hard drives, provide both input and output for the computer.3pixel The smallest controllable element of a picture/display.1pop-upAppearing suddenly on a computer screen.15 process (noun) A process is a running program.1process (verb) The act of using data to perform a calculation or other operation.1problem domainThe area of expertise or application that needs to be examined to solve a problem. Simply, looking at only the topics of an individual's interest and excluding everything else.2 program A set of instructions that the computer executes in order to achieve a particular objective.1programming (computer programming)The craft of analyzing problems and designing, writing, testing, and maintaining programs to solve them.1programming language Formal language used to give a computer instructions.1proprietary software licenseProprietary software is licensed under legal right of the copyright holder, with the intent that the licensee is given the right to use the software only under certain conditions, and restricted from other uses, such as modification, sharing, studying, redistribution, or reverse engineering.2 proprietary softwareSoftware distributed in object code form. The developers or distributors reserve all freedoms and rights.6pseudocode An informal  HYPERLINK "http://en.wikipedia.org/wiki/High-level_programming_language" \h high-level description of the operating principle of a  HYPERLINK "http://en.wikipedia.org/wiki/Computer_program" \h computer program or other  HYPERLINK "http://en.wikipedia.org/wiki/Algorithm" \h algorithm.recursiveA recursive function refers to a procedure or subroutine, implemented in a programming language, whose implementation references itself.2repetition The process of repeating a task a set number of times or until a condition is met.1resolution A measurement of the number of pixels needed to display an image.1router A device that connects networks to one another.safetyThe awareness of personal, physical, and psychological well-being in a digital society. selection Using conditions to control the flow of a program.1sequence (noun) An ordered set of instructions.1sequence (verb) To arrange a set of instructions in a particular order.1server A computer or program dedicated to a particular set of tasks that provides services to other computers or programs on a network.1servicesSoftware and hardware that provide some capability that can be accessed by another program or device remotely or through a defined, discoverable interface.sextingThe act of sending, receiving, or forwarding sexually explicit messages, photos, or images via cell phone, computer, or other digital device.17 simulationImitation of the operation of a real-world process or system over time.social computingAn umbrella term for communications and collaboration via the Internet.software The programs that run on the hardware/computer system.1software piracyIllegal copying, distribution, or use of software.spamUnsolicited commercial advertisements distributed online. Most spam comes to people via e-mail, but spam can be found in online chat rooms and message boards.18 subroutineA sequence of program instructions that perform a specific task packaged as a unit. This unit can then be used in programs wherever that particular task should be performed. In different programming languages, a subroutine may be called a procedure, function, routine, method, or subprogram.2switch More precisely, a network switch. This is a device that connects multiple computers to one another on a single local area network (LAN) and directs packets from machine to machine.1synchronousIn telecommunication occurring at the same time. In programming a relationship between events in that one has to complete before the other starts.table A data type storing organized sets of data under column headings.1traceTo follow it (program) to its origin or destination.variable (computer science)In computer science variables are a symbolic name associated with a value and whose value may be changed.2 They are a way that computers can store, retrieve or change simple data.1visualizationThe process of representing data graphically and interacting with these representations in order to gain insight into the data. Any technique for creating images, diagrams, or animations to communicate a message.2Wide Area Network (WAN)Wide Area Networks span long distances via telephone lines, fiber optic cables, or satellite links. They can also be composed of smaller LANs that are interconnected. 8web presence All aspects of ones personal or corporate online identity (e.g., social media profiles, personal and business websites).World Wide WebA service made of connected hypertext documents linked together across the Internet. Glossary References 1 Computing At School, accessed May 2015:  HYPERLINK "http://www.computingatschool.org.uk" www.computingatschool.org.uk 2 Wikipedia accessed June 2015:  HYPERLINK "https://www.wikipedia.org/" https://www.wikipedia.org/ 3 IDEA.ed.gov accessed May 2015:  HYPERLINK "http://idea.ed.gov" http://idea.ed.gov 4 TechTerms.com -The Tech Terms Computer Dictionary, accessed May 2015:  HYPERLINK "http://techterms.com/" http://techterms.com/ 5 ACM/CSTA Model Curriculum for K12 Computer Science, Revised 2011 6 IT Law Wiki accessed June 2015:  HYPERLINK "http://itlaw.wikia.com" http://itlaw.wikia.com 7 Digital Strategy Glossary of Key Terms, accessed August 21, 2008:  HYPERLINK "http://www.digitalstrategy.govt.nz/Media-Centre/Glossary-of-Key-Terms/" www.digitalstrategy.govt.nz/Media-Centre/Glossary-of-Key-Terms/ 8 Paul Gilster, Digital Literacy, New York: Wiley and Computer Publishing, 1997, p. 1. 9 Barbara R. Jones-Kavalier and Suzanne L. Flannigan: Connecting the Digital Dots: Literacy of the 21st-Century 10 Webopedia, accessed June 2015:  HYPERLINK "http://www.webopedia.com" www.webopedia.com 11 European Commission, Making a European Area of Lifelong Learning a Reality, COM Brussels, Commission of European Communities, 2001, p. 9 12 The Meaning of Hack, accessed May 2015:  HYPERLINK "http://www.catb.org/jargon/html/meaning-of-hack.html" http://www.catb.org/jargon/html/meaning-of-hack.html 13 Speed Guide.net Glossary, accessed May 2015:  HYPERLINK "http://www.speedguide.net/glossary.php" http://www.speedguide.net/glossary.php 14 Adaptation of definition by Edward Rolf Tufte 15Merriam Webster Dictionary online, accessed May 2015:  HYPERLINK "http://www.merriam-webster.com/" http://www.merriam-webster.com/ 16 WhatIs.com, accessed May 2015:  HYPERLINK "http://whatis.techtarget.com/definition/operator" http://whatis.techtarget.com/definition/operator 17 Mass.Gov, accessed May 2016:  HYPERLINK "http://www.mass.gov/berkshireda/crime-awareness-and-prevention/sexting/sexting.html" http://www.mass.gov/berkshireda/crime-awareness-and-prevention/sexting/sexting.html 18 About Tech, accessed May 2015:  HYPERLINK "http://compnetworking.about.com/od/traceipaddresses/qt/ip-blacklist.htm" http://compnetworking.about.com/od/traceipaddresses/qt/ip-blacklist.htm  Anderson, L.W. (Ed.), Krathwohl, D.R. (Ed.), Airasian, P.W., Cruikshank, K.A., Mayer, R.E., Pintrich, P.R., Raths, J., & Wittrock, M.C. (2001). A taxonomy for learning, teaching, and assessing: A revision of Bloom's Taxonomy of Educational Objectives (Complete edition). New York: Longman.      PAGE \* MERGEFORMAT 2 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework  PAGE \* MERGEFORMAT iii 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework  PAGE \* MERGEFORMAT i  PAGE \* MERGEFORMAT 12 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework  PAGE \* MERGEFORMAT 7  PAGE \* MERGEFORMAT 8 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework  PAGE \* MERGEFORMAT 11  PAGE 34 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework  PAGE \* MERGEFORMAT 13  PAGE \* MERGEFORMAT 14 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework 45YZ[\^_hij       # ռxtiXQ h]4h~l j3Xhlh1s/UmHnHuh1s/h~lCJaJhhPh1s/hq|VCJOJQJhhHhq|VCJh1s/hq|V5CJ OJQJh1s/hq|VCJOJQJj,Vh1s/h,-U h1s/hq|Vh1s/hq|VCJ(h1s/hq|V5CJ4OJQJaJ0h1s/hq|VCJ4OJQJaJ0 h1s/h~l jhlh1s/UmHnHuhq|VEZ[]SHkdU$$IfTs4 t44 saef4yt#TZ$d$Ifa$gd~lEkdvU$$IfTsI  t44 saeyt#T $$Ifa$gd~l]^_ijMA5 \$$Ifa$gd~l [$$Ifa$gd~lHkdW$$IfTs4 t44 saef4yt#T\$$If]a$gd#\$$If]a$gd.HkdV$$IfTs4W t44 saef4yt#T       $Ifgd~ldHkdxW$$IfTs4P t44 saef4yt#T \$$Ifa$gd~l  ! " #  + K i $7$8$H$a$gd~l]gd~lgd~l$a$gd~lXkdW$$IfTlP0 t44 la^ytq|VT# i h  MYʵztnjc[W[hQOjhU hQOhQOh haJ h4{aJ jhlh1s/UmHnHu h]4h~lh~lOJQJaJh^h~lCJaJh^h~lOJQJaJhh^h~lOJQJaJh+^kCJaJh~lCJaJh~l5B*phh{h~l5CJ\aJh~lCJ\aJh^h~lCJOJQJ + h i   Mw^gd~lgd~l]gd~l $7$8$H$a$gd~l$a$gd~lKsM| !"#4gd1ogdOUgdP ^gdX gdQO$a$gd4{*+EFGIJKRSTnopqrs{j jYhUmHnHuh|ZhXmHnHu jhUmHnHu j_hUmHnHu jhUmHnHu'h1s/hXCJOJQJaJmHnHuhROmHnHu jehUmHnHujhUmHnHuhXmHnHu)s,-GHIKLM[\vwxz{|v jhUmHnHu jMhUmHnHu jhUmHnHu jShUmHnHu'h1s/hXCJOJQJaJmHnHuhROmHnHu jhUmHnHujhUmHnHuhXmHnHu+ !#5ĻỪĻộđ|uqf`WNh&0h\aJh&0h@ aJ h"!aJh1ohOUCJaJhOU hAhOUh4{ h1s/hP>*B*CJaJphjhU jAhUmHnHu jhUmHnHuhXmHnHu'h1s/hXCJOJQJaJmHnHuhROmHnHujhUmHnHu jGhUmHnHu45H FGRSTo  & F]9Dgd8f9Dgd1ogd1ogd>gd1o?ci&48DsA`yH~rh&0h\CJ]aJh&0h\6CJ]aJh&0h\CJaJhDv6CJaJh>6CJaJh&0h>6CJaJh&0h>CJaJh>CJaJ hDvaJh&0h1oaJ h>]aJh&0hK]aJh&0hKaJh&0h\aJ h>aJ*HRfip$2hOP+CMsu3FGQʶʰʧʞʞʧh&0hOUaJ h@ aJh&0h@ 6aJ h~S(aJh&0hKaJh&0h@ aJ hDvaJh9 Zh9 Z6aJh"!h"!6aJ h"!aJhh\6CJ]aJh&0h\CJ]aJh&0hKCJ]aJh>CJ]aJ0QRSLYôpaUI=hF B*CJaJphhf`B*CJaJphhGMB*CJaJphhOhf`B*CJaJph hOhf`6B*CJaJph hOhF 6B*CJaJph hf`hy6B*CJaJph hf`hF 6B*CJaJphhOhF B*CJaJphh8hOVhYvCJaJh&0hMs&t&&&xoo $IfgdMkdm$$If<0"F FP t0V"64<BapytM&&&'xoo $IfgdMkd $$If<0"F FP t0V"64<BapytM'''n'xoo $IfgdMkd$$If<0"F FP t0V"64<BapytMn'o'z''xoo $IfgdMkd$$If<0"F FP t0V"64<BapytM'''$(xoo $IfgdMkd9$$If<0"F FP t0V"64<BapytM$(%(4((xoo $IfgdMkd$$If<0"F FP t0V"64<BapytM((((xoo $IfgdMkd$$If<0"F FP t0V"64<BapytM((()xoo $IfgdMkdR$$If<0"F FP t0V"64<BapytM)))R)xoo $IfgdMkd$$If<0"F FP t0V"64<BapytMR)S)_))xoo $IfgdMkd$$If<0"F FP t0V"64<BapytM))))xoo $IfgdMkdk$$If<0"F FP t0V"64<BapytM)))*xob $IfgdM $IfgdMkd$$If<0"F FP t0V"64<BapytM***Z*xoo $IfgdMkd$$If<0"F FP t0V"64<BapytM*Y*[*f*g*h*p*q*x******************L+N+e+f+g+o+p+v++++++,,,p,q,,,,͞|u| h1s/hPh1s/hPCJaJhMhf:OJQJhWOJQJh8 h1s/hxnh1s/hxnCJaJ h1s/hW;+h1s/hW;+CJaJh1s/hlvCJaJh1s/hWCJaJh1s/h9wCJaJh1s/h8CJaJ h1s/h8h1s/hr@CJaJ.Z*[*g**xoo $IfgdMkd$$If<0"F FP t0V"64<BapytM****xob $Ifgdlv $IfgdMkd7$$If<0"F FP t0V"64<BapytM***M+xoo $IfgdMkd$$If<0"F FP t0V"64<BapytMM+N+f++xoo $IfgdMkd$$If<0"F FP t0V"64<BapytM+++,xob $IfgdM $IfgdMkdP$$If<0"F FP t0V"64<BapytM,,,q,,,xsnX> d$IfgdMl d$IfgdMl gdMgd8kd$$If<0"F FP t0V"64<BapytM,,,,,,,,-----L-O-P-Q-Y-Z-y-z-{-|--------³¨ߕ~rg\Lh1s/hPCJaJmHnHuh1s/hlvCJaJh1s/hCJaJh1s/hMmHnHuh1s/hMCJaJmHnHu h1s/hMh1s/hxnmHnHu h1s/hxnh1s/hxnCJaJh1s/hB*CJaJph h1s/hWh1s/hWB*CJaJph h1s/hPh1s/hWCJaJh1s/hPCJaJh1s/hMCJaJ,,,-d$IfgdMl bkd$$If0!F F2 t62<4BapytM---P-j d$IfgdMl d$IfgdMl dkdI$$If0!F F2 t62<4BapytMP-Q-Z-z-l d$IfgdMl d$IfgdMl bkd$$If0!F F2 t62<4BapytMz-{---o d$IfgdMl d$Ifgdl _kds$$If0! 2 t62<4apytM---C.s$IfgdMl d$IfgdMl bkd $$If0!F F2 t62<4BapytM----?.B.C.D.P.Q.c.l.o.q.|.}.........F/G/~////¨{w{hXKh:hJ>OJQJ^Jjh,-0JOJQJU^Jhf:hJ>0JOJQJ^Jh,-jh,-Uhf:hJ>OJQJ^JhhJ>OJQJ^J hf:hf:hJ>h1s/hM\ h1s/hMh1s/hMCJaJh1s/hMCJ\aJh1s/hPCJ\aJh1s/hP\h1s/hWCJ\aJh1s/hPCJaJ h1s/hPC.D.Q.p.i dd$If[$\$gdMl d$IfgdMl akd $$If#0! 2 t62<4apytMp.q.}..h dd$If[$\$gdMl d$IfgdMl bkd$ $$If0!F F2 t62<4BapytM.....//<00"1X2Y2Z2|ss >dgdJ>m$  & Fgd%  & Fgd8fgdf:gdJ>gd8_kd $$If0! 2 t62<4apytM //////////0 0:0;0<0J0S0T0000Ϳ󯞖m]SF7h]Ghf:0JOJQJ^Jhf:hJ>OJQJ^JhOJQJ^Jhf:hJ>6OJQJ]^J(jh1s/h,-0JOJQJU\^Jh1s/hf:0JOJQJ\^Jh,-jh,-U!h:hJ>6OJQJ\]^Jh:hJ>OJQJ\]^Jh:hf:OJQJ]^Jh:hJ>OJQJ]^JhOJQJ]^Jh:hJ>OJQJ^Jh:hf:OJQJ^J00000011 1!1"121M1P1Q111V2W2X2Z22222н福yjXRNJNC hOVhh$Lh*, h&}aJ"h%h%0J45OJQJ\^Jh 0\h%0JOJQJ^Jhf:hJ>0J45OJQJ^J"hh0J456OJQJ^Jh0J45OJQJ^J(hf:hJ>0J>*B*OJQJ^Jphhf:hJ>0JOJQJ^Jh,-jh,-UhOJQJ^Jhf:hJ>OJQJ^Jjh,-0JOJQJU^JZ2222244?6@6M6N6660789::<  & FIh^hgd8fh^hgd * & FIh9D^hgd * h^hgdN)9DgdN) & FIh9D^hgd8fgd*,gdN) $a$gddgdN)gdOV22222222G3S3T3U3_333h4t4u4v444444'51575f5g5n5o5{5|5555555?6M6N6X6ݺh"6B*CJ]aJph h1!CJhN)CJaJh[hN)CJaJ hN)6CJ hN)CJ h *CJhdh*,CJaJh$LCJaJhOCJaJh *CJaJh*,h*,CJaJhdhN)CJaJhN)h hN)aJ*X6a6z666770747=7>777777{88888899::::xmx^^^S^SGhdh[6]aJhdh *CJaJhdh *B*CJaJphhdhN)CJaJhdhN)B*CJaJph333 hdhN)5B*CJaJph hdhN)B*CJ]aJphhdhN)B*CJaJph&hdhN)56B*CJ]aJphh"6B*CJ]aJph#hdh *6B*CJ]aJph#hdhN)6B*CJ]aJph:#:-:}:::;;(;T;U;<V<Z<<<<<<<<#=R===>>>n?o?@d@yn]RhdhN)CJaJ hdhN)B*CJ]aJphhdh F4CJaJh F4CJaJhN)CJaJ hdhN) h"aJ#hdh *6B*CJ]aJphh"6B*CJ]aJphhdh *aJhdhS1@aJhdhdaJ hNoaJhdh[aJhdhS1@6aJhdhS1@6]aJh"6]aJ<<<>>>n?o?@ABCMBMɾ}n_SGhfR CJOJQJaJh`qnCJOJQJaJhwChwCCJOJQJaJhwChJCJOJQJaJhwChJ6CJOJQJaJhwChJ56CJaJhVhJ56CJaJhVhwC56CJaJ hVhJhJhOACJaJ hJaJhfR h: h: hyOaJ hZ'faJ hL)uaJhJhJaJh: hh: BMUMbMMMMNNNNNNOOP P=PDPQQ/QkRlRmRRRRDSjSsStSuSvS嵦|maRhVhCJOJQJaJhJCJOJQJaJhE=hJCJOJQJaJhaCJOJQJaJhE=h/CJOJQJaJhE=huCJOJQJaJhE=hE=CJOJQJaJ)h1s/hE=B*CJOJPJQJaJphhKYCJOJQJaJhwChwCCJOJQJaJhwChJCJOJQJaJh`qnCJOJQJaJ vSSi?ijjjjj~kn ngdgdgd*$gd*$gd%*$gdJgdr0 &`0p@ P !$`'0*-*$gdV\\ ^E^^^^_R____o```a bbc@cfcccccddddde*ePeeeʿʿʴ{m{bhZ'fhJCJaJhZ'fhc]B56CJaJhZ'fhJ56CJ^JaJ hVh2a hVhJhAACJaJh SCJaJhj hj CJaJhj hJCJaJhj hl'CJaJhj hJCJaJhhl'hJCJaJhh`CJaJhl'hJCJaJhl'hl'CJaJ"efff-g7g^hhhhi iiiBiOiQij#j5j?jRjxjjjjjjjk:k;kBkCk~kl%l귬tjahZ'fh{aJhZ'fh{\aJhZ'fha256CJaJhZ'fhc]B56CJaJhZ'fhJ56CJaJ hrhc]B hrhJhZ'fhf<CJaJhJCJaJhf<CJaJhAACJaJh/CJaJh/CJaJhZ'fhuCJaJhZ'fhJCJaJhZ'fhc]BCJaJ$%l/lyl nUoVoopppppppppppp'qmqvqsltmttxxyyyXz\zzz{ {{{N{W{u{{{{{{{ʴ™““†††††††~zu hN)6hMph&}hK` hoht hK`@ ht@ ht6h/6OJQJaJh6OJQJaJhtht6OJQJaJhth hrhthZ'fh{CJaJ h/aJhZ'fh{\aJhZ'fh{aJhZ'fh{6aJ- nopppp'qssuuLwMwyy{{{{{{~~~$$Ifa$gdN)l gdN)gdN)gdt `$$a$gdgd*$gdgd{{{{{{{||||||/}5}K}T}V}_}s}~~~~~~~~ͶtjZOhqNhN)CJaJjhB70J-CJPJUaJhN)CJPJaJhqNhN)CJPJaJhB7CJPJaJh+|hN)CJPJaJh+|hN)CJaJh8&hN)CJh8&hN)5CJh8&hN)5CJ]aJhN)CJ]aJhShN)CJ]aJ hN)5CJ hN)CJ hQOCJhN) hJ{36 hN)6 h"6~~~~~~!&,{ȀʀԀՀր݀߀ʺºʺʺʳզՐՐ|nah&lhN)CJPJaJh&lhN)5CJPJaJh&lhN)CJPJhN)5CJPJh&lhN)5CJPJh1s/hN)5CJhMphN)CJPJaJ h*,hN)hK`CJaJhfCJaJh*,hfCJaJ h1s/hN)hN)5CJPJaJhR!+hN)5CJPJaJh|hN)CJaJ$~~{$IfgdK`l qkdD $$IfTlw00 t0044 lap PytOTɀl$(($Ifa$gdN)l dgdN)qkd $$IfTlw00 t0044 lap ytOTɀʀրހrr$(($Ifa$gdN)l skdJ $$IfTlxj00 t0044 lap PytOTހ߀tZ;I(($If^`IgdN)l $(($Ifa$gdN)l kd $$IfTl:0j0K+ t0044 lapytOT$Gm{eeN(($IfgdN)l  & FMo(($If`ogd8fl ! & FMod(($If`ogd8fl `(($If^``gdN)l  & FL(($If`gd8fl  & FL(($If`gd8fl #$FGlmz{́́&'1267STklmpvyɽɽؠؠؠؒzh1s/hN)CJaJhlhN)CJPJaJhlhN)5CJPJaJh&lhN)CJPJh2hN)PJhzMohN)PJhN)OJPJQJ^Jh&lhN)OJPJQJ^J h1s/hN)h&lhN)5CJPJaJh&lhN)CJPJaJ hN)PJ/́'27Tlaaaaa & FJ(($If`gd8fl (($If^`gdN)l  & FK(($If`gd8fl " & FK(($If^`gd8fl ! & FKd(($If`gd8fl lm*kdv $$IfTl4Ur%j0K` ` ` ` t0044 lap2ytOTmqrstu(($IfgdN)l (($1$IfgdN)l $(($Ifa$gdN)l uv*kd^$$IfTl4Vr%j0K     t0044 lap2ytOTvz{|}~(($IfgdN)l (($1$IfgdN)l $(($Ifa$gdN)l ~*kdT$$IfTl4Vr%j0K     t0044 lap2ytOT(($IfgdN)l (($1$IfgdN)l $(($Ifa$gdN)l *kdJ$$IfTl4Vr%j0K     t0044 lap2ytOT ![wmhh`[[O  & FP`gd8fgdN)$a$gdN)gdN)wkd@$$IfTl/j00 t002 44 lap PytOT$(($Ifa$gdfl  CGcm ń΄ %-;Z[w  *+ƼysissƼcc h[CJh!h!5CJ h!CJh8&hN)5CJ hN)5CJhfhN)5CJ]aJhN)CJ]aJhShN)CJ]aJhfhN)CJ hfCJ hN)CJhfhN) ha2hN)hN)mHnHuhJ{3mHnHuhMpmHnHu%hMphMp56CJaJmHnHu&w}ʋoy6! & FS`gd8f & FR^`gd8f & FO^`gd8fh^hgdN)  & FP`gd8f & FN `gd8f h^hgdN)·χЇ}̉Ή+,tuɋʋKMŌڌیgjorļļļļļļı{ h#eCJhN)CJPJaJh#eCJPJaJhhN)CJPJaJhhN)CJaJhN)hW3hN)CJaJhN)CJaJhPhN)CJaJh9GhN)CJ\aJhPhN)5CJ\aJhohN)CJ hN)CJ hN)5CJ0o[\yVWd56GHIt!@ACŕ˕Ԛ 4?@A*+567)*./0XY hHCJheyhN)CJheyhN)5CJhOhN)CJhOh1gCJ h1gCJ h0CJhN) h#eCJ hN)5CJ hN)CJF4+*YϢ^gdN)  & F[`gd8fgdN)gdN)gdN) dgdN) 7$8$H$gdN)^gdN) & FQ^`gd & FQ^`gd8f & FS`gd8fYtuv΢Ϣ$%.S^ckl¹sdXLX@XhEbB*CJaJph333h0B*CJaJph333hN)B*CJaJph333hBhN)B*CJaJph333 hlhN)5B*CJaJph h0hN)B*CJ]aJphhN)CJaJ ha2hN)hN)mHnHuh3hN)mHnHuhJ{3mHnHuh&}mHnHuh[UhN)B*CJaJph h h hCJ h5CJhN) hN)CJ hN)5CJlr{|@AHIUV^_e;Z*CDݨ'(23ݩ4Tº“«…zq““h!hN)CJh!hN)OJQJ *hN)CJ *h0CJ h0CJ h(hN)h9GhN)OJQJhN)h[hN)CJaJhN)CJaJ hN)CJhN)B*CJaJphh[hDNCJaJhDNCJaJhN)B*CJaJph333h0B*CJaJph333,vhݨ(3dªVb :jʬ5?! & FY$^$`gd8fm$ & FZ$^$`gd8fm$^gdN)  & F[`gd8f & FX$^$`gd8fm$TcdªUVab 5>? !Cΰܰ Wm~rhN)OJPJQJ^Jh0hN)CJPJaJh0hN)CJaJhMhN)CJPJhR.hN)CJPJhN)CJPJhR.hN)CJ h9GhN) h0CJhN)CJaJhR.hN)CJaJ h(hN)h9GhN)OJQJ *hN)CJhN) hN)CJ&![4 mKBPf & FU$^$`gd8fm$ & FU8d1$^8`gd8fm$ & FU81$^8`gd8fm$^gdN)  & F[`gd8f & FW$^$`gd8fm$±ñͱJKٲڲ?@BOPųKMefAEGûûûûóóûΦΛ}w}lh9GhN)CJPJ hMCJhN) h0CJ hN)CJ h(hN) h9GhN)h'|hN)CJaJh'|hN)CJPJaJh0CJaJhN)CJaJhhN)CJaJhN)CJPJaJhhN)OJQJ^JhN)OJPJQJ^JhhN)OJPJQJ^J)fմF?ɶķc cdgdN)gdN)gdyMgdM & FV`gd8f^gdN)  & F[`gd8f & FT$^$`gd8fm$GJ^϶ҶķɷƸ 9<bƹ̹ʹʦzz h1s/hN)hzhN)aJ hN)aJ hAyhN)hN)hJ{3 hyMhyMhN)CJaJh]GhN)CJPJ h]GhN)CJOJPJQJ^Jh]GhN)CJhN)CJPJh9GhN)CJPJ hMCJ hN)CJhN)CJOJPJQJ^J0dqrhekd$$IflF!||5 t-"    44 laytey(($IfgdN)l $(($Ifa$gdN)l ǹ˹̹s\\\\\(($IfgdN)l kd$$Iflr :!D 8|  t-"44 layteys\\\\\(($IfgdN)l kdH$$Iflr :!D 8|  t-"44 laytey/EFHIJMOPopպ *+,-3һrh1s/h~CJPJaJh1s/hY<CJPJaJh5B*CJaJphh5h5B*CJaJphh1s/hY<CJPJ\aJ hlRihY<hY<hyMhN) jhlh1s/UmHnHuhWshN)CJaJ h5aJ hN)aJhzhN)aJ h1s/hN),)./FIs\\\\\(($IfgdN)l kd $$Iflr :!D 8|  t-"44 layteyIJKLMNOs\\\\\(($IfgdN)l kd$$Iflr :!D 8|  t-"44 layteyOP]^osYBY(($IfgdN)l $(($Ifa$gdN)l kd$$Iflr :!D 8|  t-"44 layteyop k(($Ifgd5l (($IfgdN)l ekdb$$IflF!||5 t-"    44 laytey +,xnii`[gd5 7$8$H$gdY<gdY< dgdN)$d]^a$gdeygdN)gdN)gkd$$IflF!||5 t-"    44 laytey PQ˼ݼ"ASX̽սʻʻʯʤʘziZNZ?h5h. hB*CJaJphh~B*CJaJphh5hjB*CJaJph *h(hSkB*CJaJphh5h= B*CJaJphh5hSkB*CJaJph *h(h;$CJaJh5h5CJaJhlB*CJaJphh5h5B*CJaJphh5he\B*CJaJphh1s/h5CJPJaJh1s/hY<CJPJaJh1s/h~CJPJaJ >Zq¿Rn>b 7$8$9DH$gd5 & Fk87$8$9DH$^8gdl & Fk87$8$9DH$^8gd5h^hgd5gdjgde\սٽ ž޾߾ 5AHIMXYkpq{¿̿ѿۿܿ7Ʒ᨜ըը~ըoՍh5hB*CJaJphh5h3YB*CJaJphh5hkPB*CJaJphh~B*CJaJphh5hjB*CJaJphh5h5B*CJaJphh5h&B*CJaJphhlB*CJaJphh5h. hB*CJaJphh5hL{B*CJaJph+78CPQRhmntu$+<=>?EGWX`abeƷ~~ըըըըըrhjB*CJaJphh5h^{B*CJaJphh5h0gB*CJaJphh~B*CJaJphh5hjB*CJaJphh5h&B*CJaJphh5hB*CJaJphhlB*CJaJphh5h5B*CJaJphh5h B*CJaJph'!vGNX,DEFGIJV`alow~ɺأ{wphpwpw]hdhY<CJaJh~dhY<5 hg)hY<hY<hdhOCJaJh1s/h. `CJPJ\aJh5hZQB*CJaJphh;$hZQCJaJhZQB*CJaJphh;$hZQB*CJaJphh5h5B*CJaJphh5B*CJaJphhCh7h5B*CJaJphh1s/h5CJPJaJ#EFGIJ~k^kd$$Ifs0($ t$44 sapyt1s/c(($Ifgd1s/l gdY<gdY< 7$8$H$gdY<gdZQgd5  Fz{ ?op{#0Rnyz(|}Ui;<迳 *h1s/hCJaJ *h1s/h[CJaJh1s/hDACJaJh1s/hCJaJ h1s/h[h1s/h[CJaJh1s/h[5CJaJF *`kd$$Ifs(0($ t$44 sapyt1s/c(($Ifgd1s/l ^kdH$$Ifs0($ t$44 sapyt1s/op|^kd$$Ifs0($ t$44 sapyt1s/c(($Ifgd1s/l ,^kd$$Ifs0($ t$44 sapyt1s/c(($Ifgd1s/l ^kdJ$$Ifs0($ t$44 sapyt1s/yz^kd$$Ifs0($ t$44 sapyt1s/c(($Ifgd1s/l )|},^kd$$Ifs0($ t$44 sapyt1s/c(($Ifgd1s/l ^kdH$$Ifs0($ t$44 sapyt1s/}^kd$$Ifs0($ t$44 sapyt1s/c(($Ifgd1s/l  g"c(($If]^`gd1s/l c(($Ifgd1s/l ^kdb$$Ifs0($ t$44 sapyt1s/*^kd$$Ifs0($ t$44 sapyt1s/c(($Ifgd1s/l `kd $$Ifs(0($ t$44 sapyt1s/;<Fh^kdd$$Ifs0($ t$44 sapyt1s/c(($Ifgd1s/l <EFghitklmopABCNO7ǾҹҰ||h1s/hW+CJaJh1s/h6CJaJ h1s/h6h1s/h6B*phh1s/h65CJaJhdh6CJ hY<5hdhY<CJhzhY<CJaJhY<h1s/hCJaJ h1s/h[h1s/h[CJaJh1s/h[5CJaJ0hiu*`kdԑ$$Ifs(0($ t$44 sapyt1s/c(($Ifgd1s/l ^kd$$Ifs0($ t$44 sapyt1s/klmopytmhT(($Ifl gd6gddgdY< dgdY<gdY<`kd$$Ifs(0($ t$44 sapyt1s/c(($Ifgd1s/l BC2Ukd$$Ifl0p$$FF t$44 lBayt6ckd0$$IflU0p$$FF t$44 lBapytV(($Ifl CO|Wkd]$$Ifl(0p$$FF t$44 lBayt6(($IfgdW+l (($Ifl ~(UkdI$$Ifl0p$$FF t$44 lBayt6(($Ifgdl (($Ifl UkdՔ$$Ifl0p$$FF t$44 lBayt67STU`a "# 89:EFQR[bz㮪 hY<5hdhY<CJhY<h6B*phh1s/hW+CJaJh1s/hDACJaJh1s/h(sCJaJh1s/h65CJaJ h1s/h6h1s/h6B*phh1s/h6CJaJ:Ts(($Ifgd(sl akd$$Ifl0p$$FF t$44 lBapyt6(($Ifl TUa=Wkd$$Ifl(0p$$FF t$44 lBayt6(($Ifl Ukdr$$Ifl0p$$FF t$44 lBayt6 ||(($Ifl Wkd^$$Ifl(0p$$FF t$44 lBayt6(($Ifgd(sl #4Ukd$$Ifl0p$$FF t$44 lBayt6(($Ifl akd֗$$Ifl0p$$FF t$44 lBapyt69:F|(($IfgdW+l Wkd$$Ifl(0p$$FF t$44 lBayt6(($Ifl zz(($Ifgd6l gddgddgdY<gd6Wkdw$$Ifl(0p$$FF t$44 lBayt6noq{|$%DFPQVX`aikuv JLMOٻƩhY<h6 h1s/h(sh1s/ha-2CJaJh1s/hE+_CJaJh1s/h(sCJaJh1s/h65h1s/h6CJaJ h1s/h6h1s/h65CJaJhdh6CJ>7Rkd$$Ifl04$$ t$44 layt6(($Ifgd6l ^kd $$Ifl04$$ t$44 lapyt6p|e(($IfgdE+_l (($Ifgd6l Tkd6$$Ifl(04$$ t$44 layt6(($Ifgd(sl pq|%E>TkdR$$Ifl(04$$ t$44 layt6(($Ifgd6l Tkdě$$Ifl(04$$ t$44 layt6EFQw$Rkd$$Ifl04$$ t$44 layt6$Ifgd(sl (($Ifgd6l ^kd$$Ifl04$$ t$44 lapyt6W|Tkd $$Ifl(04$$ t$44 layt6(($Ifgd(sl (($Ifgd6l WXajkv5^kd'$$Ifl04$$ t$44 lapyt6(($Ifgd6l Tkd$$Ifl(04$$ t$44 layt6~(($Ifgd(sl (($Ifgd6l Rkdȟ$$Ifl04$$ t$44 layt6KL*`kd$$Ifl 04$$ t$44 lapyt(s(($IfgdSl ^kdR$$Ifl04$$ t$44 lapyt6LMOP(t](($Ifgd(sl akd$$Ifl04$$FF t$44 lBapyt-^(($Ifl gddgddgdY<gd6 OPfg&'()12<=>HI}~JKLVW&}~μμμμμh1s/hp9CJaJh1s/h-^B*CJaJphh1s/h(sCJaJh1s/h-^CJaJ h1s/h-^h1s/h-^B*phh1s/h-^5CJaJhdh-^CJ hY<5hY<hdhY<CJ8()2=>I4akdϢ$$Ifl04$$FF t$44 lBapytQUq(($Ifl UkdM$$Ifl04$$FF t$44 lBaytQUqI~KLW?Ukd$$Ifl04$$FF t$44 lBayt-^Ukdv$$Ifl04$$FF t$44 lBaytQUq(($Ifl 4akd $$Ifl04$$FF t$44 lBapyt-^(($Ifl Ukdl$$Ifl04$$FF t$44 lBayt-^~ ~(($Ifl Ukd$$Ifl04$$FF t$44 lBayt-^(($Ifgdp9l  8{jkltu9:;EFW#$%-.EFG㪟h1s/h&CJaJ h1s/hp9h1s/hp9B*phh1s/hp95CJaJh1s/hp9CJaJh1s/h-^CJaJh1s/h(sCJaJh1s/h-^5CJaJ h1s/h-^h1s/h-^B*phh1s/ha-2CJaJ7 ~(Ukd$$Ifl04$$FF t$44 lBayt-^(($Ifgd(sl (($Ifl Ukd3$$Ifl04$$FF t$44 lBayt-^k{dd(($Ifgd)Ul Ukd$$Ifl04$$FF t$44 lBayt-^(($Ifgd(sl (($Ifgdp9l klu4akd$$Ifl04$$FF t$44 lBapytQUq(($Ifl Ukd$$Ifl04$$FF t$44 lBaytQUq:;F?Ukd:$$Ifl04$$FF t$44 lBayt-^Ukd$$Ifl04$$FF t$44 lBaytQUq(($Ifl F$%.F~~(($Ifl Ukd$$Ifl04$$FF t$44 lBayt-^(($Ifgd&l FGRp(($Ifgd>Wl (($Ifgd2~l akdL$$Ifl04$$FF t$44 lBapyt2~GQRVWXYZhinzǼ赩󞓞|n_P_Ahh4B*CJaJphh1h`B*CJaJphh1h`B*CJaJph&&&h1s/hwCJPJ\aJhY<h&}h-^B*ph h1s/h-^h1s/h-^CJaJh1s/h-^B*phh1s/h-^5CJaJ h1s/h2~h1s/h&CJaJh1s/hDACJaJh1s/h>WCJaJh1s/h2~CJaJh1s/h2~B*phh1s/h2~5CJaJWX~(Ukdu$$Ifl04$$FF t$44 lBayt2~(($Ifl (($Ifgd2~l Ukd$$Ifl04$$FF t$44 lBayt2~XYZhiGHd'a$^M & Fk87$8$9DH$^8gdxNh^hgdxNgd= gdwgdpT 7$8$H$gdwgdY< dgdY<gd-^>FM34GH]cdҷrcRcFchW+B*CJaJph *h(h= B*CJaJphhxNh= B*CJaJphhh`DyB*CJaJphhx/h`DyB*CJaJphh1s/hx/CJPJaJh1s/hpTCJPJaJh1s/h`DyCJPJaJhpTB*CJaJphhhB*CJaJphhhQeB*CJaJphhh4B*CJaJphhhe\B*CJaJphd%a%'=]^gMƷƨƍƍ~ooo`hxNhB*CJaJphhxNh3YB*CJaJphhxNht0B*CJaJphhxNhlB*CJaJphhW+B*CJaJphhxNh= B*CJaJphhxNhB*CJaJphhxNh8B*CJaJphhxNhBB*CJaJphhB*CJaJphhxNhXB*CJaJph%M7ijkoKL÷èҙҨ~oooҨo`hxNh(PB*CJaJphhxNh>B*CJaJphhxNh^{B*CJaJphhB*CJaJphhxNh$B*CJaJphhxNhB*CJaJphhW+B*CJaJphhxNh= B*CJaJphhxNh\B*CJaJphhxNhB*CJaJphhxNh|)B*CJaJph!jLM(($Ifl gddgddgdgdwh^hgdxN & Fk87$8$9DH$^8gdxNLMdeGOi',efgrs_`a೤}n}ng}n\ng}n\ngh1s/hQUqCJaJ h1s/hQUqh1s/hQUqB*CJaJphh1s/hQUq5CJaJhdhQUqCJ hY<5hY<hdhdCJhh(B*CJaJph *h(CJaJhB*CJaJphh`DyB*CJaJphhW+B*CJaJphhhB*CJaJph *h(h= B*CJaJphfff$fgs4Ukd$$Ifl0.$FF t$44 lBaytQUq(($Ifl akd$$Ifl0.$FF t$44 lBapytQUqs`am;Wkd$$Ifl(0.$FF t$44 lBaytQUqWkd $$Ifl*0.$FF t$44 lBaytV(($Ifl alm +,5gmopq|}`abmnٰ *h1s/hCJaJ *h1s/hQUqCJaJ h1s/hQUqh1s/hKCJaJh1s/hSCJaJh1s/hQUqCJaJh1s/hQUqB*CJaJphh1s/hQUq5CJaJ@;Wkd$$Ifl(0.$FF t$44 lBaytQUqWkd$$Ifl(0.$FF t$44 lBaytQUq(($Ifl  ,|(($IfgdKl Wkd$$Ifl(0.$FF t$44 lBaytQUq(($Ifl 2akd$$Ifl0.$FF t$44 lBapytQUq(($Ifl Wkdx$$Ifl(0.$FF t$44 lBaytQUqpq}=Wkd'$$Ifl(0.$FF t$44 lBaytQUqUkd$$Ifl0.$FF t$44 lBaytQUq(($Ifl abn;Wkd$$Ifl(0.$FF t$44 lBaytQUqWkd$$Ifl(0.$FF t$44 lBaytQUq(($Ifl &'tuvw(GHIJKVWRSTUWXdeԲ hY<5hY<hdhY<CJhvhY<CJaJhvhQUqCJaJh1s/hKCJaJh1s/hQUq5CJaJ h1s/hQUqh1s/hQUqB*CJaJphh1s/h {CJaJh1s/hQUqCJaJ:||(($Ifl Wkd$$Ifl(0.$FF t$44 lBaytQUq(($Ifgd {l vs(($IfgdKl (($Ifl akd$$Ifl0.$FF t$44 lBapytQUqvw;WkdB$$Ifl(0.$FF t$44 lBaytQUq(($Ifl Wkd$$Ifl(0.$FF t$44 lBaytQUq|$Wkd2$$Ifl(0.$FF t$44 lBaytQUq(($IfgdKl (($Ifl Wkd$$Ifl(0.$FF t$44 lBaytQUqJKW|Wkd$$Ifl(0.$FF t$44 lBaytQUq(($IfgdKl (($Ifl STW;6gdY<Wkd$$Ifl(0.$FF t$44 lBaytQUq(($Ifl Wkd"$$Ifl(0.$FF t$44 lBaytQUqWX ~g(($IfgdKl akd.$$Ifl06$$FF t$44 lBapyt(($Ifl gddgdde &'Ii&'/01<=KLMXYQʿʿʿʿʿh1s/hKCJaJh1s/hCJaJ h1s/hh1s/hB*phh1s/h5CJaJhdhCJhY<K =Wkds$$Ifl(06$$FF t$44 lBayt(($Ifl Ukd$$Ifl06$$FF t$44 lBayt'4akd$$Ifl06$$FF t$44 lBapyt(($Ifl Ukd$$Ifl06$$FF t$44 lBayt'~~(($Ifl UkdL$$Ifl06$$FF t$44 lBayt(($IfgdKl '01=2akdp$$Ifl06$$FF t$44 lBapyt(($Ifl Wkdܺ$$Ifl(06$$FF t$44 lBayt=L~~(($Ifl Ukd$$Ifl06$$FF t$44 lBayt(($IfgdKl LMY;Wkd;$$Ifl(06$$FF t$44 lBayt(($Ifl Wkd$$Ifl(06$$FF t$44 lBayt~;Wkdc$$Ifl(06$$FF t$44 lBayt(($Ifl WkdϽ$$Ifl(06$$FF t$44 lBaytQi}~"Jiklmnpq}~&FHRS wxعh1s/hwCJaJhdhCJ hY<5hdhY<CJhY<hB*phh1s/hDACJaJh1s/h5CJaJ h1s/hh1s/hB*phh1s/hCJaJh1s/hKCJaJ6lm|$Wkd$$Ifl(06$$FF t$44 lBayt(($IfgdKl (($Ifl Wkd$$Ifl(06$$FF t$44 lBaytmnpqRkd$$Ifl04$$ t0$44 lapyt)U(($Ifgd)Ul gddgddgd GHSnWW(($Ifgd)Ul ykd$$Ifl04$$ t0$44 layt)U(($IfgdKl  nW(($Ifgdwl (($Ifgd)Ul ykd\$$Ifl04$$ t0$44 layt)Unn(($Ifgd)Ul ykd$$Ifl04$$ t0$44 layt)Unn(($Ifgd)Ul ykdf$$Ifl04$$ t0$44 laytE+_InW(($IfgdTl (($Ifgd)Ul ykd$$Ifl04$$ t0$44 laytE+_HJRSrt~:<FGHo"%KMWX@_bdlmuw   ¶xmxh1s/hHMCJaJh1s/h7UCJaJh1s/hwCJaJh1s/h:eCJaJh1s/hKCJaJh1s/hCJaJ h1s/hh1s/h5CJaJ h1s/hE+_h1s/hE+_CJaJh1s/hTCJaJh1s/hE+_5h1s/hT5CJaJh1s/hE+_5CJaJ*IJSsnn(($Ifgd)Ul ykd$$Ifl04$$ t0$44 laytE+_st;zcL(($IfgdKl (($Ifgd)Ul kd-$$Ifl04$$ t0$44 lapyt)U;<GLnW(($IfgdKl (($Ifgd)Ul ykd$$Ifl04$$ t0$44 layt)ULMXcnW(($Ifgdwl (($Ifgd)Ul ykdj$$Ifl04$$ t0$44 layt)Ucdmvnn(($Ifgd)Ul ykd$$Ifl04$$ t0$44 layt)Uvw zcL(($IfgdHMl (($Ifgd)Ul kd$$Ifl04$$ t0$44 lapyt)U  nW(($IfgdoTl (($Ifgd)Ul ykd,$$Ifl04$$ t0$44 layt)U  <_.1UWYcd Llmuyyh1s/h;OPB*phh1s/h;OP5CJaJhdh;OPCJ hY<5hdh(PCJhY<h1s/hoTCJaJh1s/hwCJaJh1s/ha-2CJaJh1s/hKCJaJh1s/h5fCJaJh1s/hCJaJh1s/h5CJaJ h1s/h-Xnn(($Ifgd)Ul ykd$$Ifl04$$ t0$44 layt)UXYdnn(($Ifgd)Ul ykdD$$Ifl04$$ t0$44 layt)Unn(($Ifgd)Ul ykd$$Ifl04$$ t0$44 layt)U zcL(($Ifgdwl (($Ifgd)Ul kd\$$Ifl04$$ t0$44 lapyt)U{t{``(($Ifl gddgddgdY<ykd$$Ifl04$$ t0$44 layt)Uywcc(($Ifl kd$$Ifl04$$FF t0$44 lBapyt;OPxyz=>?GHRST^_Z[\fgy  ( / X Y [ \ ] e f j k l u תתתh1s/hoTCJaJh1s/hMCJaJh1s/hCJaJh1s/h 5CJaJh1s/h;OPCJaJh1s/h;OPB*phh1s/h;OP5CJaJ h1s/h;OPAyznn(($Ifl |kds$$Ifl04$$FF t0$44 lBayt;OP>nn(($Ifl |kd6$$Ifl04$$FF t0$44 lBayt;OP>?HSnn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt;OPST_wcc(($Ifl kd$$Ifl04$$FF t0$44 lBapyt;OPnn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt;OP[nn(($Ifl |kdY$$Ifl04$$FF t0$44 lBayt;OP[\gnW(($IfgdMl (($Ifl |kd$$Ifl04$$FF t0$44 lBayt;OP\ nW(($IfgdoTl (($Ifl |kd$$Ifl04$$FF t0$44 lBayt;OP\ ] f k nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt;OPk l w  w`I(($Ifgd l (($Ifgdl kde$$Ifl04$$FF t0$44 lBapyt;OPu v w                 % r            7 8 9 C D             ( K j k l m ݿֳ h1s/h2~h1s/hoTCJaJh1s/h2~CJaJh1s/h2~B*phh1s/h2~5CJaJh1s/h CJaJh1s/h;OP5CJaJ h1s/h;OPh1s/h;OPCJaJh1s/h;OPB*phh1s/h5CJaJ6    kT(($Ifgd l (($Ifgdl |kd?$$Ifl04$$FF t0$44 lBayt;OP    nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt;OP    wcL(($Ifgd l (($Ifl kd$$Ifl04$$FF t0$44 lBapyt;OP    nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt;OP   8 nn(($Ifl |kdb$$Ifl04$$FF t0$44 lBayt;OP8 9 D  nn(($Ifl |kd%$$Ifl04$$FF t0$44 lBayt;OP    nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt;OP   l w`I(($IfgdoTl (($Ifgd2~l kd$$Ifl04$$FF t0$44 lBapyt2~l m x kT(($IfgdoTl (($Ifgd2~l |kd$$Ifl04$$FF t0$44 lBayt2~m v w x      )*L[z|}~%-./ѻѰܩܞўܩ~o`o`o`ohhB*CJaJphhh!dB*CJaJphhY<5CJaJ hWPhY<hY<h^ThtB*phh1s/hCJaJ h1s/h;OPh1s/h2~CJaJh1s/hoTCJaJh1s/haGCJaJh1s/h;OPCJaJh1s/h;OPB*phh1s/h2~5CJaJh1s/h;OP5CJaJ *}nW(($Ifgdl (($Ifl |kdH$$Ifl04$$FF t0$44 lBayt2~}~<=}xsssnneh^hgdxNgd@%gdY<gdY<gd;OP|kd $$Ifl04$$FF t0$44 lBayt;OP /0P#$= >?B\+pt(cdfq䷫󷍷󍷍rcrchxNht0B*CJaJphhxNh B*CJaJphh7B*CJaJphhxNhCB*CJaJphhxNhu B*CJaJphh%J~B*CJaJphhxNh@%B*CJaJphhhlsB*CJaJphhhQB*CJaJphhh8|B*CJaJphhB*CJaJph&_-(e$[Nj9c gdgd@%h^hgdxN & Fk87$8$9DH$^8gdxN"#(5GYiox}  'Mdi!XƺhxNhI@B*CJaJphhxNhmFB*CJaJphhxNhI-WB*CJaJphhI-WB*CJaJphhxNh B*CJaJphh7B*CJaJphhxNhOxB*CJaJphhxNh@%B*CJaJph4Xac06   67BCVWXcdvj_j_Xj_ h1s/h)Uh1s/h)UB*phh1s/h)U5CJaJhdh)UCJ hY<5hY<h@%5CJaJh(5CJaJh7B*CJaJphhB*CJaJphhhB*CJaJph *h(h@%B*CJaJphfffhxNhB*CJaJphhxNh@%B*CJaJphhxNhaGB*CJaJph   67CWXdPkd$$Ifl04$$FF t0$44 lBapytg$(($Ifl gddgddd d()*56~ijkvwBCDOP5Uv ! h1s/h h1s/hCJaJh1s/hn*CJaJh1s/hNACJaJh1s/h=CJaJh1s/h)U5CJaJ h1s/h)Uh1s/h)UB*phh1s/h)UCJaJ@)nn(($Ifl |kd$$Ifl04$$FF t0$44 lBaytg$)*6nn(($Ifl |kdy$$Ifl04$$FF t0$44 lBaytg$jnn(($Ifl |kd<$$Ifl04$$FF t0$44 lBaytg$jkwnn(($Ifl |kd$$Ifl04$$FF t0$44 lBaytg$nn(($Ifl |kd$$Ifl04$$FF t0$44 lBaytg$Cwcc(($Ifl kd$$Ifl04$$FF t0$44 lBapytg$CDPnn(($Ifl |kdm$$Ifl04$$FF t0$44 lBayt)Ujj~(($If]~l |kd0$$Ifl04$$FF t0$44 lBayt)UjO~(($If]~gdn*l ~(($If]~l |kd$$Ifl04$$FF t0$44 lBayt)U jjjj(($If]jl |kd$$Ifl04$$FF t0$44 lBayt)U !-sjjj(($If]jl |kdy$$Ifl04$$FF t0$44 lBayt)U!,-kqrstwxy\ ] ^ i j k        Z![!\!g!h!i!!!!!!" "!"""#"%"&"2"4"["˸ hY<5hdhdCJhY<h)Uh)UB*phh1s/h=CJaJ h1s/h)Uh1s/h CJaJh1s/h)UCJaJh1s/h)UB*phh1s/h)U5CJaJ@stjjj(($If]jl |kd<$$Ifl04$$FF t0$44 lBayt)Ujjj(($If]jl |kd$$Ifl04$$FF t0$44 lBayt)Uxnn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt)Uxynn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt)U] wcc(($Ifl kdH$$Ifl04$$FF t0$44 lBapyt)U] ^ k  nW(($Ifgd=l (($Ifl |kd"$$Ifl04$$FF t0$44 lBayt)U   [!nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt)U[!\!i!!nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt)U!!! "nn(($Ifl |kdk$$Ifl04$$FF t0$44 lBayt)U "!"""%"&"["\"f"t"kfaZaFF(($Ifl gddgddgd)U 44<^4`gd)U|kd.$$Ifl04$$FF t0$44 lBayt)U["\"e"f"s"t"u""""""""##########$$*$$$$$$$$$$$$$$%%%!%"%#%P%p%%%%%%7&8&9&D&E&&&&&&&&&&&'''''θh1s/h*CJaJh1s/h4xCJaJh1s/h)UCJaJ h1s/h)Uh1s/h)UB*phh1s/h)U5CJaJhdh)UCJHt"u"""wcc(($Ifl kd$$Ifl0p`$FF t0$44 lBapyt)U"""#nW(($Ifgd4xl (($Ifl |kd$$Ifl0p`$FF t0$44 lBayt)U####nn(($Ifl |kd$$Ifl0p`$FF t0$44 lBayt)U##$$nW(($Ifgd4xl (($Ifl |kdQ$$Ifl0p`$FF t0$44 lBayt)U$$$$nW(($Ifgd4xl (($Ifl |kd$$Ifl0p`$FF t0$44 lBayt)U$$$%nn(($Ifl |kd$$Ifl0p`$FF t0$44 lBayt)U%%"%%wcL(($Ifgd4xl (($Ifl kd$$Ifl0p`$FF t0$44 lBapyt)U%%%8&nW(($Ifgdl (($Ifl |kdt$$Ifl0p`$FF t0$44 lBayt)U8&9&E&&nW(($Ifgdl (($Ifl |kd7$$Ifl0p`$FF t0$44 lBayt)U&&&&nn(($Ifl |kd$$Ifl0p`$FF t0$44 lBayt)U&&&'wcc(($Ifl kd$$Ifl0p`$FF t0$44 lBapyt)U'''$(nW(($Ifgdl (($Ifl |kd$$Ifl0p`$FF t0$44 lBayt)U'''#($(%(0(1((((((+),)-)8)9)))******%*&*?*@*H*I*Z*\*f*g*********d++++++2,h1s/h!aCJaJh1s/hMCJaJ h1s/hMh1s/hM5CJaJhdhMCJ hY<5hdhdCJhY<h)UB*phh1s/h)U5CJaJ h1s/h)Uh1s/h)UB*phh1s/hCJaJh1s/h)UCJaJ2$(%(1((nn(($Ifl |kdZ$$Ifl0p`$FF t0$44 lBayt)U(((,)nn(($Ifl |kd$$Ifl0p`$FF t0$44 lBayt)U,)-)9)*nW(($Ifgdl (($Ifl |kd$$Ifl0p`$FF t0$44 lBayt)U*****?*@*I*id_X_A(($Ifgdg$l gddgddgd)U 4;<<^;`gd)U|kd$$Ifl0p`$FF t0$44 lBayt)UI*[*\*g**ckdf$$Ifl04$$ t0$44 lapytg$(($Ifgdg$l ****nn(($Ifgdg$l ykd$$Ifl04$$ t0$44 laytg$***+nn(($Ifgdg$l ykd$$Ifl04$$ t0$44 laytg$+++3,nn(($Ifgdg$l ykd($$Ifl04$$ t0$44 laytg$3,4,?,,nW(($Ifgd!al (($Ifgdg$l ykd$$Ifl04$$ t0$44 laytg$2,4,>,?,a,,,,,,,*-2-7-X-------........a/c/m/n///2040<0=0E0G0Q0R000000011%1+1,1.18191111111111111<2]2222hY<h1s/h*CJaJh1s/hSCJaJh1s/hMCJaJh1s/h!aCJaJh1s/hM5CJaJ h1s/hMI,,,-nW(($Ifgd!al (($Ifgdg$l ykd2$$Ifl04$$ t0$44 laytg$---.nW(($Ifgd!al (($Ifgdg$l ykd$$Ifl04$$ t0$44 laytg$....nn(($Ifgdg$l ykd<$$Ifl04$$ t0$44 laytg$...b/zcL(($Ifgd*l (($Ifgdg$l kd$$Ifl04$$ t0$44 lapytg$b/c/n/30nn(($Ifgdg$l ykdy$$Ifl04$$ t0$44 laytg$3040=0F0nn(($Ifgdg$l ykd $$Ifl04$$ t0$44 laytg$F0G0R00zcc(($Ifgdg$l kd$$Ifl04$$ t0$44 lapytg$000-1nn(($Ifgdg$l ykdI$$Ifl04$$ t0$44 laytg$-1.1911nW(($Ifgd*l (($Ifgdg$l ykd$$Ifl04$$ t0$44 laytg$1111nn(($Ifgdg$l ykda$$Ifl04$$ t0$44 laytg$1112zcL(($Ifgd!al (($Ifgdg$l kd$$Ifl04$$ t0$44 lapytg$222222222{vov[[(($Ifl gddgddgdY<gdMykd$$Ifl04$$ t0$44 laytg$22222222222222223333333 444#4c4d4e4o4p444455555$5%5&50515g5h5i5s5t5555μΥ΄ΥΥh1s/h:CJaJh1s/hqCJaJh1s/hCJaJh1s/h:CJaJh1s/haG5CJaJh1s/haGCJaJ h1s/h:h1s/h:B*phh1s/h:5CJaJhdh:CJ hY<5hY<hdhdCJ42223wcc(($Ifl kd1$$Ifl04$$FF t0$44 lBapyt:333d4nW(($Ifgdql (($Ifl |kd $$Ifl04$$FF t0$44 lBayt:d4e4p45nW(($Ifgdj&l (($Ifl |kd$$Ifl04$$FF t0$44 lBayt:555%5nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt:%5&515h5wcc(($Ifl kdT$$Ifl04$$FF t0$44 lBapyt:h5i5t55nn(($Ifl |kd.$$Ifl04$$FF t0$44 lBayt:555`6nW(($IfgdifTl (($Ifl |kd$$Ifl04$$FF t0$44 lBayt:5555>6]6_6`6a6k6l6666667 7!7"7*7+7/70717;7<77778888&8'8(8888888 9'9J999999<:S:}:~:::::;F;e;f;g;h;p;q;;;;;;;;;;;h1s/hCJaJ h1s/h:h1s/h:CJaJh1s/hifTCJaJh1s/h:B*phh1s/h:5CJaJL`6a6l66nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt:666!7nn(($Ifl |kdw $$Ifl04$$FF t0$44 lBayt:!7"7+707nn(($Ifl |kd: $$Ifl04$$FF t0$44 lBayt:0717<78wcL(($IfgdifTl (($Ifl kd $$Ifl04$$FF t0$44 lBapyt:88(88nW(($IfgdifTl (($Ifl |kd $$Ifl04$$FF t0$44 lBayt:8889nW(($IfgdifTl (($Ifl |kd $$Ifl04$$FF t0$44 lBayt:999~:nW(($IfgdifTl (($Ifl |kd] $$Ifl04$$FF t0$44 lBayt:~:::g;nW(($IfgdifTl (($Ifl |kd $$Ifl04$$FF t0$44 lBayt:g;h;q;;nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt:;;;"<wcL(($IfgdifTl (($Ifl kd$$Ifl04$$FF t0$44 lBapyt:;;< <!<"<#<-<.<[<\<]<^<h<i<y<<<<<<<<<==================;>=>N>O>P>X>Y>p>q>r>|>͈h1s/h,3M5CJaJh1s/h[CJaJh1s/h5CJaJh1s/hCJaJh1s/hj&CJaJh1s/h:5CJaJ h1s/h:h1s/h:B*phh1s/hifTCJaJh1s/hCJaJh1s/h:CJaJ4"<#<.<]<nW(($Ifgdj&l (($Ifl |kd$$Ifl04$$FF t0$44 lBayt:]<^<i<<nW(($IfgdifTl (($Ifl |kdC$$Ifl04$$FF t0$44 lBayt:<<<=nn(($Ifl |kd$$Ifl04$$FF t0$44 lBayt:====kT(($Ifgd[l (($Ifgdl |kd$$Ifl04$$FF t0$44 lBayt:===O>kT(($Ifgd,3Ml (($Ifgdl |kd$$Ifl04$$FF t0$44 lBayt:O>P>Y>q>nn(($Ifl |kdO$$Ifl04$$F t0$44 lBayt:q>r>}>?w`I(($Ifgdg$l (($Ifgd,3Ml kd$$Ifl04$$FF t0$44 lBapyt,3M|>}>>>???????"?%?7?8?m????????? @m@o@@@@@@@@@@@@@ݿ鴩ݿ|pah@xhQB*CJaJphh^ThY<5CJaJ hWPhY<hY<hth&}h:B*phh1s/hCJaJ h1s/h:h1s/hCCJaJh1s/h:CJaJh1s/h:B*phh1s/h:5CJaJ h1s/h,3Mh1s/h,3M5CJaJh1s/h,3MCJaJh1s/h,3MB*ph&????kT(($IfgdCl (($Ifgd,3Ml |kd$$Ifl04$$FF t0$44 lBayt,3M???@kT(($IfgdCl (($Ifgd,3Ml |kd$$Ifl04$$FF t0$44 lBayt,3M@@@@@@@DDDDD}xssxnxii`h^hgdxNgdQgdgdY<gdY<gd:|kd$$Ifl04$$FF t0$44 lBayt,3M @@@ABAQAAB~BBBBC C0CKCCCDDDƷƫƜzrzfzWH9h^ThB*CJaJphh@xh@xB*CJaJphhxh@xB*CJaJphhxhx6CJaJhfCJaJhxhxCJaJhxCJaJhxhxB*CJaJphhxhB*CJaJphhVB*CJaJphh@xhh3`B*CJaJphh@xhB*CJaJphh@xB*CJaJphh@xhQB*CJaJphh@xh4=B*CJaJphDDDDDDD E EEE!E$E%E+E,ETEZE{EEEEEEEEEEEF2F8F9FEFHFOF[FmFFFFFFFG G2G𐮐uuh%B*CJaJphhxNhlsB*CJaJphhxNh#B*CJaJphhxNhB*CJaJphh@xB*CJaJphhxB*CJaJphhxNhFB*CJaJphhfB*CJaJphh^ThQB*CJaJphhxNhQB*CJaJph.D$EZEEF9FFF!G8GGGHAHHHI]III=JJJJMgdpTgdQh^hgdxN & Fk87$8$9DH$^8gdxN2G7G8G^G_GGGGGGGGGGGH H-H=H>HLHOHWHHHHHHII2INI[I\I]I^IbIgIlImIwIIIIIIIIƺƫ䫜䜍~hxNh%B*CJaJphhxNh3 B*CJaJphhxNhJB*CJaJphhxNhDB*CJaJphh%B*CJaJphhxNhmFB*CJaJphhxNhv!B*CJaJphhxNhQB*CJaJphhfB*CJaJph/IIIIIIJ:J;J=JAJCJJJJJJJJJJJJJJJJK KK-K.K^KƷզsesesehpTCJOJQJ^JaJ hKOhpTCJOJQJ^JaJ hKOhuCJOJQJ^JaJ hKOhKOCJOJQJ^JaJ *h^ThQB*CJaJphfffhxNhaGB*CJaJphhxNh>+B*CJaJphhxNhQB*CJaJphh%B*CJaJphhxNhtB*CJaJph ^KKKKKKKK/LVLXLYLLLMMMMMM.M/M;Ml gd@rgd@rgdY<ykd#$$Ifl0$$0` t0$44 layt@r7V8VEVVzcc(($IfgdJ>l kd"$$$Ifl0$$0` t0$44 lapyt@rVVVaWnn(($IfgdJ>l ykd$$$Ifl0$$0` t0$44 layt@raWbWmWWnn(($IfgdJ>l ykd_%$$Ifl0$$0` t0$44 layt@rmWWWWWXXXXXXXXXXXXXXUYWYcYdYZZ$Z%ZZZZZZZZZ[[#[B[F[e[n[p[q[s[t[[[[[[[[[켸 h1s/h; dh1s/h; d5CJaJh@rh; dCJh@rhY<CJhY<hh1s/hECJaJh1s/h9CJaJh1s/h!NCJaJh1s/hCJaJ h1s/hh1s/h5CJaJ5WWWXzcc(($IfgdJ>l kd%$$Ifl0$$0` t0$44 lapyt@rXXXXnn(($IfgdJ>l ykd&$$Ifl0$$0` t0$44 layt@rXXXXnn(($IfgdJ>l ykd/'$$Ifl0$$0` t0$44 layt@rXXXVYzcc(($IfgdJ>l kd'$$Ifl0$$0` t0$44 lapyt@rVYWYdYZnn(($IfgdJ>l ykdl($$Ifl0$$0` t0$44 layt@rZZ%ZZnn(($IfgdJ>l ykd($$Ifl0$$0` t0$44 layt@rZZZZnW(($Ifgd9l (($IfgdJ>l ykd)$$Ifl0$$0` t0$44 layt@rZZ[o[nW(($IfgdEl (($IfgdJ>l ykd *$$Ifl0$$0` t0$44 layt@ro[p[q[s[t[[[[[tojcjLL(($IfgdJ>l gd@rgd@rgdY<;<<^;`gdykd*$$Ifl0$$0` t0$44 layt@r[[[d\zcL(($IfgdVl (($IfgdJ>l kd+$$Ifl08($ t0$44 lapytJ>[[[b\c\e\p\q\\\\\Y]}]]]]]]]]]L^k^l^n^y^z^^^^^^^__________A`D`L`O`P`S`v`x```````````aa aa}aaaaaaah1s/hl1CJaJh1s/h@rCJaJh1s/h2CJaJh1s/h; d5CJaJ h1s/h; dh1s/hVCJaJh1s/h; dCJaJHd\e\q\\nn(($IfgdJ>l ykd+$$Ifl08($ t0$44 laytJ>\\\]nW(($Ifgd2l (($IfgdJ>l ykdP,$$Ifl08($ t0$44 laytJ>]]]m^nW(($IfgdVl (($IfgdJ>l ykd,$$Ifl08($ t0$44 laytJ>m^n^z^^nn(($IfgdJ>l ykdZ-$$Ifl08($ t0$44 laytJ>^^^_nW(($Ifgd@rl (($IfgdJ>l ykd-$$Ifl08($ t0$44 laytJ>____nn(($IfgdJ>l ykdd.$$Ifl08($ t0$44 laytJ>___`zcL(($Ifgdl1l (($IfgdJ>l kd.$$Ifl08($ t0$44 lapytJ>```ann(($IfgdJ>l ykd/$$Ifl08($ t0$44 laytJ>aaa~azcc(($IfgdJ>l kd40$$Ifl08($ t0$44 lapytJ>~aaabnW(($Ifgd@rl (($IfgdJ>l ykd0$$Ifl08($ t0$44 laytJ>bb b|bnW(($Ifgd@rl (($IfgdJ>l ykdq1$$Ifl08($ t0$44 laytJ>ab b b{b}bbbbbbbbcc cXcZcecfccc)d+d,d.d/dl ykd1$$Ifl08($ t0$44 laytJ>bbbYczcL(($Ifgd@rl (($IfgdJ>l kd2$$Ifl08($ t0$44 lapytJ>YcZcfc*dnW(($Ifgd@rl (($IfgdJ>l ykd33$$Ifl08($ t0$44 laytJ>*d+d,d.d/d[d\dfdrd{t{``(($Ifl gd@rgd@rgdY<ykd3$$Ifl08($ t0$44 laytJ>rdsddewcc(($Ifl kdK4$$Ifl04$$FF t0$44 lBapyteeeenn(($Ifl |kd%5$$Ifl04$$FF t0$44 lBaytee'eewcc(($Ifl kd5$$Ifl04$$FF t0$44 lBapyt&e'eeeeeeeeeeeeefffgfrfsffgg g gZg[g\gegfgjgkglgwgxggg#h$h%h&h'h1h2h3hhhhhhhhhh iiiiiiiiiiiiiiiiijjjֿֿֿֿh1s/hhCJaJh1s/hY~5CJaJh1s/hY~CJaJh1s/h5CJaJ h1s/hh1s/hCJaJh1s/hB*phGeeeenn(($Ifl |kd6$$Ifl04$$FF t0$44 lBayteeeffnn(($Ifl |kd7$$Ifl04$$FF t0$44 lBaytffgfsfgnn(($Ifl |kdH8$$Ifl04$$FF t0$44 lBaytgg g[gnn(($Ifl |kd 9$$Ifl04$$FF t0$44 lBayt[g\gfgkgnn(($Ifl |kd9$$Ifl04$$FF t0$44 lBaytkglgxg&hwcL(($Ifgdhl (($Ifl kd:$$Ifl04$$FF t0$44 lBapyt&h'h3hhkT(($Ifgdhl (($IfgdY~l |kdk;$$Ifl04$$FF t0$44 lBaythhhikT(($Ifgdhl (($IfgdY~l |kd.<$$Ifl04$$FF t0$44 lBaytiiiikT(($Ifgdhl (($IfgdY~l |kd<$$Ifl04$$FF t0$44 lBaytiiijkT(($Ifgdhl (($IfgdY~l |kd=$$Ifl04$$FF t0$44 lBaytjjjjjjjjjjk3kZkfkkkkk)l*l+l6l7llllllmmm m!mmmmmmmm n n nnnpnqnrn}n~nnnnnn1o2o3o>o?oooooooooo˵h1s/huCJaJh1s/h2CJaJh1s/hhCJaJh1s/hCJaJh1s/h5CJaJ h1s/hh1s/hB*phDjjjjnn(($Ifl |kdw>$$Ifl04$$FF t0$44 lBaytjjj*lwcL(($Ifgdhl (($Ifl kd:?$$Ifl04$$FF t0$44 lBapyt*l+l7llnn(($Ifl |kd@$$Ifl04$$FF t0$44 lBaytlllmnn(($Ifl |kd@$$Ifl04$$FF t0$44 lBaytmm!mmnW(($Ifgdhl (($Ifl |kdA$$Ifl04$$FF t0$44 lBaytmmm nnn(($Ifl |kd]B$$Ifl04$$FF t0$44 lBayt n nnqnnn(($Ifl |kd C$$Ifl04$$FF t0$44 lBaytqnrn~nnnn(($Ifl |kdC$$Ifl04$$FF t0$44 lBaytnnn2onn(($Ifl |kdD$$Ifl04$$FF t0$44 lBayt2o3o?oonW(($Ifgd2l (($Ifl |kdiE$$Ifl04$$FF t0$44 lBaytooompnW(($Ifgd(/l (($Ifl |kd,F$$Ifl04$$FF t0$44 lBaytoolpmpnpzp{ppppp=q>q?qIqJqaqbqcqnqoqqqqqqJrKrLrMrNrOrXrrrrrrrŹع߹ععرh3hlhY<0J95B*CJOJQJ\^JaJph h8,CJ h!mCJh8,hY<CJhY<mHnHuh^TmHnHuh$'^JaJhB*phh1s/h5CJaJ h1s/h(/h1s/h(/5CJaJ h1s/hh1s/hB*phh1s/hCJaJh1s/h(/CJaJ&mpnp{ppnn(($Ifl |kdF$$Ifl04$$FF t0$44 lBaytppp>qqq(($Ifl ykdG$$Ifl04$$ t0$44 layt(/>q?qJqbqnn(($Ifl |kdoH$$Ifl04$$F t0$44 lBaytbqcqoqqwcc(($Ifl kd2I$$Ifl04$$FF t0$44 lBapytqqqKrnn(($Ifl |kd J$$Ifl04$$FF t0$44 lBaytKrLrMrNrOrXrYrrrr}rmmhhhQ>d$Ifgd8,l m$gdY<gdY< *$7$8$H$gd$'gd|kdJ$$Ifl04$$FF t0$44 lBayt rrrssssttttttttοr]J<1hY<5CJPJaJhlhY<5CJPJaJ%hlhY<B*CJOJQJ^Jph(hhAhY<5B*CJOJQJ^Jph0hlhY<0J95B*CJOJQJ^JaJph3hlhY<0J95B*CJOJQJ\^JaJph h1s/h^}c%hhAhY<B*CJOJQJ^JphhlhY<CJOJQJ^J3hhAhY<0J95B*CJOJQJ\^JaJph-hlhY<0J9B*CJOJQJ^JaJphrssttj~kdK$$Ifl40!,"  t0644 laf4ytJ>d$Ifgd8,l m$tttun[$Ifgd2l $Ifgd8,l ~kd!L$$Ifl40!,"  t0644 laf4ytJttuuuuuuuuuBvCvDvEvQvRvvǯo_L>1hlhY<CJPJaJhlhY<5CJPJaJ%hhAhY<B*CJOJQJ^JphhlhY<CJH*OJQJ^J-hlhY<0J9B*CJOJQJ^JaJph'hY<0J9B*CJOJQJ^JaJph(hhAhY<5B*CJOJQJ^Jph/h1s/hY<5B*CJOJPJQJ\^Jph h1s/h^}c *hlh/CJPJaJ *h/CJPJaJ *hlhY<CJPJaJh1s/hY<CJaJuuuDvfO>d$Ifgd8,l m$> N d$Ifgd8,l m$~kdL$$Ifl40!,"  t0644 laf4ytJDvEvRvvjW$Ifgd8,l  N $Ifgd8,l ~kd?M$$Ifl40!,"  t0644 laf4ytJvvvvvvvv^w_w`wawlwmwwwwww˽ү˖wdL7(hhAhY<5B*CJOJQJ^Jph/h1s/hY<5B*CJOJPJQJ\^Jph%hhAhY<B*CJOJQJ^Jph%hlhY<B*CJOJQJ^Jphh1s/hY<5CJaJhlhY<5CJaJhlhY<CJPJaJ *hlhY<CJPJaJhlhY<5CJPJaJ h1s/h^}ch1s/hY<CJaJhlhY<CJPJaJh1s/hY<CJH*aJh4HCJPJaJvvv`wnn$Ifgd8,l ~kdM$$Ifl40!,"  t0644 laf4ytJ`wawmwwfO>d$Ifgd8,l m$$-DIfM gd8,l ~kd]N$$Ifl40!,"  t0644 laf4ytJwwwvxjO> Gd$Ifgd8,l m$>d$Ifgd8,l m$~kdN$$Ifl40!,"  t0644 laf4ytJwxxxxPxuxvxwxxxyyyzzzzҾ谟ymbZRbF;hhAhY<CJaJhlhY<CJH*aJha5pCJaJhY<CJaJhlhY<CJaJhhAhY<5CJaJhlhY<5CJaJ h1s/h^}c%hhAhY<B*CJOJQJ^Jph hlhY<CJOJPJQJ^Jha5pCJOJPJQJ^J'ha5p0J9B*CJOJQJ^JaJph*ha5p0J9B*CJH*OJQJ^JaJph-hlhY<0J9B*CJOJQJ^JaJphvxwxxznT=$If[$\$gd8,l $Ifgd8,l ~kd{O$$Ifl40!,"  t0644 laf4ytJzz+zWzkk:d$Ifgd8,l ~kd P$$Ifl40!,"  t0644 laf4ytJz*z+zVzWzXzazbzzz{={{{{{{{{(|P|t|ŮwwlRD9D *ha5pCJPJaJ *hlhY<CJPJaJ3h1s/hY<5CJOJQJ\aJfHq hr`CJH*PJaJha5pCJPJaJhlhY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJ h1s/h^}c-h1s/hY<0J9B*CJOJQJ^JaJphhlhY<CJOJQJaJ3h1s/hY<0J95B*CJOJQJ\^JaJph"h1s/hY<5CJOJQJ\aJWzXzbz{n[$Ifgdr`l $Ifgd8,l ~kdP$$Ifl40!,"  t0644 laf4ytJ{{{|kX$Ifgd8,l :d$Ifgd8,l ~kd(Q$$Ifl40!,"  t0644 laf4ytJt|u||||||b}c}d}e}n}}̺hN7-h1s/hM0J9B*CJOJQJ^JaJph3h1s/hM0J95B*CJOJQJ\^JaJph1h1s/hY<0J9B*CJOJPJQJ^JaJphh1s/hY<CJH*OJQJaJh1s/hY<CJOJQJaJ3h1s/hY<0J95B*CJOJQJ\^JaJph"h1s/hY<5CJOJQJ\aJ h1s/h^}c%hhAhY<0J9B*CJ^JaJph *hlhY<CJPJaJ *hY<CJPJaJ |||d}kk:d$Ifgd8,l ~kdQ$$Ifl40!,"  t0644 laf4ytJd}e}n}}kk:d$Ifgd8,l ~kdFR$$Ifl40!,"  t0644 laf4ytJ}}}}}}~~~~%~&~M~S~W~~~~~~~~~ɯo`ɯIo:`ɯo`hlhY<CJOJQJaJ-h1s/h4H0J9B*CJOJQJ^JaJphh1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJph h1s/h^}c-h1s/hM0J9B*CJOJQJ^JaJph0h1s/hM0J9B*CJH*OJQJ^JaJph}}}~kk:d$Ifgd8,l ~kdR$$Ifl40!,"  t0644 laf4ytJ~~&~~kk:d$Ifgd8,l ~kddS$$Ifl40!,"  t0644 laf4ytJ~~~~kk:d$Ifgd8,l ~kdS$$Ifl40!,"  t0644 laf4ytJ~~~kk:d$Ifgd8,l ~kdT$$Ifl40!,"  t0644 laf4ytJ~~~~ uvwx}~UVWXY^_|ƯƯwj_jwƯH-h1s/h4H0J9B*CJOJQJ^JaJphhr`CJH*PJaJhlhY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJh1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJph h1s/h^}c wkk:d$Ifgd8,l ~kdU$$Ifl40!,"  t0644 laf4ytJwx~Xn[$Ifgdr`l $Ifgd8,l ~kdU$$Ifl40!,"  t0644 laf4ytJXY_kk:d$Ifgd8,l ~kd/V$$Ifl40!,"  t0644 laf4ytJkk:d$Ifgd8,l ~kdV$$Ifl40!,"  t0644 laf4ytJƀz{|}йy`I4!%hhAhY<B*CJOJQJ^Jph(hlhY<B*CJH*OJQJ^Jph-hlhY<0J9B*CJOJQJ^JaJph0hhAhY<0J95B*CJOJQJ^JaJph3hlhY<0J95B*CJOJQJ\^JaJph h1s/h^}ch1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/h4H0J9B*CJOJQJ^JaJph-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph |jj>d$Ifgd8,l m$~kdMW$$Ifl40!,"  t0644 laf4ytJ|}nn$Ifgd8,l ~kdW$$Ifl40!,"  t0644 laf4ytJ}  yz{JKLȼȼȀgXIh1s/hY<CJOJQJaJhlhY<CJOJQJaJ0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJphhhAhY<CJaJhlhY<CJaJhhAhY<5CJaJhlhY<5CJaJ h1s/h^}chY<CJPJaJhlhY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJ znn$Ifgd8,l ~kdkX$$Ifl40!,"  t0644 laf4ytJz{nn$Ifgd8,l ~kdX$$Ifl40!,"  t0644 laf4ytJKkk:d$Ifgd8,l ~kdY$$Ifl40!,"  t0644 laf4ytJKLcjj$7$8$H$Ifgd8,l ~kdZ$$Ifl40!,"  t0644 laf4ytJLbc  "#-.89>BJabcdwxʾ|eP(hhAhY<5B*CJOJQJ^Jph,hlhY<5B*CJOJPJQJ^JphhhAhY<CJaJh1s/hY<0JTCJaJhhAhY<5CJaJhlhY<5CJaJ h1s/h^}ch1s/hY<CJaJh1s/hY<CJH*aJh1s/h4HCJPJaJh1s/hY<CJPJaJh1s/hY<5CJaJh1s/hY<5CJPJ]aJcnn$Ifgd8,l ~kdZ$$Ifl40!,"  t0644 laf4ytJcdxjW$Ifgd8,l >d$Ifgd8,l m$~kd6[$$Ifl40!,"  t0644 laf4ytJxք+,ӅԅՅ9:JKab˿˥藌uueT!j *h,-6CJPJUaJ *hlhY<6CJPJaJj *h,-CJPJUaJ h1s/h,-jh1s/h,-U *hlhY<CJPJaJhlhY<5CJPJaJhhAhY<5CJaJhlhY<5CJaJ h1s/h^}chhAhY<CJaJh1s/ha5pCJaJh1s/hY<CJaJhlhY<CJPJaJ ,ԅnn$Ifgd8,l ~kd[$$Ifl40!,"  t0644 laf4ytJԅՅчnn$Ifgd8,l ~kdT\$$Ifl40!,"  t0644 laf4ytJχЇч҇)*+,9:ɾmVF7)hlhY<5CJPJaJh1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/h4H0J9B*CJOJQJ^JaJph-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJph h1s/h^}ch1s/hY<CJaJh1s/hY<CJH*aJ *hlhY<CJPJaJ *hlhY<6CJPJaJ *hY<6CJPJaJч҇+kk:d$Ifgd8,l ~kd\$$Ifl40!,"  t0644 laf4ytJ+,:nn$Ifgd8,l ~kdr]$$Ifl40!,"  t0644 laf4ytJ:Ɉʈ123;<BCDETU-.ĸߞn^Oh1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJphh1s/hY<CJH*aJhlhY<CJPJaJhlhY<5CJPJaJ h1s/h^}ch1s/hY<CJaJ *hlhY<CJPJaJʈ2nn$Ifgd8,l ~kd^$$Ifl40!,"  t0644 laf4ytJ23<Dnn$Ifgd8,l ~kd^$$Ifl40!,"  t0644 laf4ytJDEUkk:d$Ifgd8,l ~kd_$$Ifl40!,"  t0644 laf4ytJnn$Ifgd8,l ~kd_$$Ifl40!,"  t0644 laf4ytJ.ыnnnn$Ifgd8,l ~kd=`$$Ifl40!,"  t0644 laf4ytJNjʋЋыҋ܋݋!"<=>?MNe׽vfW׽vfW׽vfW׽h1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/h4H0J9B*CJOJQJ^JaJph-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJph h1s/h^}ch1s/hY<CJaJhlhY<CJPJaJhiCJPJaJыҋ݋kk:d$Ifgd8,l ~kd`$$Ifl40!,"  t0644 laf4ytJ">kk:d$Ifgd8,l ~kd[a$$Ifl40!,"  t0644 laf4ytJ>?Nkk:d$Ifgd8,l ~kda$$Ifl40!,"  t0644 laf4ytJތkk:d$Ifgd8,l ~kdyb$$Ifl40!,"  t0644 laf4ytJ݌ތߌ'(mtu  uiu[PBP *hlhY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJh2CJOJQJaJha5pCJOJQJaJh1s/ha5pCJH*OJQJaJ-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJph h1s/h^}ch1s/hY<CJOJQJaJhlhY<CJOJQJaJތߌkU:d$Ifgda5pl :d$Ifgd8,l ~kdc$$Ifl40!,"  t0644 laf4ytJnn$Ifgd8,l ~kdc$$Ifl40!,"  t0644 laf4ytJ 2kk:d$Ifgd8,l ~kd&d$$Ifl40!,"  t0644 laf4ytJ0123BCqÎĎ׎؎َڎێ܎z{|´}v}fZ´MhlhY<CJPJaJh1s/hY<CJH*aJj *h,-CJPJUaJ h1s/h,-jh1s/h,-U *hlhY<CJPJaJ$ *hlhY<B*CJPJaJph:::h1s/hY<CJaJhlhY<5CJPJaJ h1s/h^}ch1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/h4H0J9B*CJOJQJ^JaJph23Cێnn$Ifgd8,l ~kdd$$Ifl40!,"  t0644 laf4ytJێ܎{nn$Ifgd8,l ~kdDe$$Ifl40!,"  t0644 laf4ytJ{|jWWW$Ifgd8,l >d$Ifgd8,l m$~kde$$Ifl40!,"  t0644 laf4ytJ|Ĺ}cJ3-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJph h1s/h^}ch1s/hY<CJaJhhAhY<CJaJ%h1s/hY<CJaJfHq h1s/hY<CJH*aJhlhY<CJaJ(hhAhY<5B*CJOJQJ^Jph(hlhY<5B*CJOJQJ^Jph"hJ5B*CJOJQJ^Jphϑkk:d$Ifgd8,l ~kdbf$$Ifl40!,"  t0644 laf4ytJ͑ΑϑБߑ()ʓ˓̓֓ד>?@´‚vcSc‚G´h1s/hY<5CJaJ *hY<B*CJPJaJph"""$ *hlhY<B*CJPJaJph"""hhAhY<5CJaJhlhY<5CJaJhlhY<CJPJaJ *hlhY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJ h1s/h^}ch1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/h4H0J9B*CJOJQJ^JaJphϑБnn$Ifgd8,l ~kdf$$Ifl40!,"  t0644 laf4ytJ)nn$Ifgd8,l ~kdg$$Ifl40!,"  t0644 laf4ytJ˓fS$Ifgd8,l $-DIfM gd8,l ~kdh$$Ifl40!,"  t0644 laf4ytJ˓̓ד@nn$Ifgd8,l ~kdh$$Ifl40!,"  t0644 laf4ytJ@ALnn$Ifgd8,l ~kd-i$$Ifl40!,"  t0644 laf4ytJ@AKLXYZbcBCƹ~g]RRhr`CJH*PJaJha5pCJPJaJ-h1s/hY<0J9B*CJOJQJ^JaJphh1s/hY<CJOJQJaJ3h1s/hY<0J95B*CJOJQJ\^JaJph"h1s/hY<5CJOJQJ\aJhlhY<CJPJaJh1s/hY<CJH*aJ *hlhY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJ h1s/h^}c Ynn$Ifgd8,l ~kdi$$Ifl40!,"  t0644 laf4ytJYZckk:d$Ifgd8,l ~kdKj$$Ifl40!,"  t0644 laf4ytJnn$Ifgd8,l ~kdj$$Ifl40!,"  t0644 laf4ytJ4n[$Ifgdr`l $Ifgd8,l ~kdik$$Ifl40!,"  t0644 laf4ytJ2345>?Popqr}~pĽs\L=/hlhY<5CJPJaJh1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/h4H0J9B*CJOJQJ^JaJph-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJph h1s/h^}ch1s/hY<CJaJ!hlhY<B*CJPJaJph"""$ *hlhY<B*CJPJaJph"""hlhY<CJPJaJ45?qkk:d$Ifgd8,l ~kdk$$Ifl40!,"  t0644 laf4ytJqr~tnn$Ifgd8,l ~kdl$$Ifl40!,"  t0644 laf4ytJprtvǮpaSF<1Fhr`CJH*PJaJhr`CJPJaJhlhY<CJPJaJhlhY<5CJPJaJh1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/ha5p0J9B*CJOJQJ^JaJph-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJph h1s/h^}ch1s/hY<CJaJh1s/hY<CJH*aJtvkk:d$Ifgd8,l ~kdm$$Ifl40!,"  t0644 laf4ytJn[$Ifgdr`l $Ifgd8,l ~kdm$$Ifl40!,"  t0644 laf4ytJkk:d$Ifgd8,l ~kd4n$$Ifl40!,"  t0644 laf4ytJ^_`ajk ƯƯƯwj_jwOh1s/hY<5CJPJ\aJh"CJH*PJaJhlhY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJh1s/hY<CJOJQJaJh1s/hY<CJH*OJQJaJ-h1s/hY<0J9B*CJOJQJ^JaJph0h1s/hY<0J95B*CJOJQJ^JaJph3h1s/hY<0J95B*CJOJQJ\^JaJph h1s/h^}c`kk:d$Ifgd8,l ~kdn$$Ifl40!,"  t0644 laf4ytJ`akkk:d$Ifgd8,l ~kdRo$$Ifl40!,"  t0644 laf4ytJn[$Ifgd"l $Ifgd8,l ~kdo$$Ifl40!,"  t0644 laf4ytJ ɞjj$7$8$H$Ifgd8,l ~kdpp$$Ifl40!,"  t0644 laf4ytJ  ȞɞʞӞԞklmnovwȟɟʟ˟京{m]J5(h1s/hY<CJH*aJfHq %h1s/hY<CJaJfHq h1s/hY<5CJPJ\aJh1s/hY<5CJ\aJ *h4HCJH*PJaJ *h4HCJPJaJ *hlhY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJ h1s/h^}chlhY<CJPJaJha5pCJPJaJh1s/hY<CJH*aJh1s/hY<CJPJaJh1s/hY<5CJPJaJɞʞԞnnn$Ifgd8,l ~kdp$$Ifl40!,"  t0644 laf4ytJnowʟjj$7$8$H$Ifgd8,l ~kdq$$Ifl40!,"  t0644 laf4ytJʟ˟ԟʠnnW$7$8$H$Ifgd8l $Ifgd8,l ~kdr$$Ifl40!,"  t0644 laf4ytJ˟ӟԟ-.23ʠˠ̠ܠݠɡ͡  ٿٿٸٸvلiٸ[Kh1s/hJ5CJPJ\aJh1s/hJ5CJ\aJhlhY<CJPJaJh1s/hY<5CJPJaJh1s/hY<CJH*aJh1s/hY<5CJPJ\aJh1s/hY<5CJaJh1s/hJ5CJaJ h1s/h^}ch1s/h8CJPJaJh1s/hJCJPJaJh1s/hY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJʠˠݠjW$Ifgd8,l $7$8$H$Ifgd8,l ~kdr$$Ifl40!,"  t0644 laf4ytJjj$7$8$H$Ifgd8,l ~kd;s$$Ifl40!,"  t0644 laf4ytJ jj$7$8$H$Ifgdl ~kds$$Ifl40!,"  t0644 laf4ytJ  &-34õ}oaoQ>1}h1s/hY<CJPJaJ%h1s/hY<CJaJfHq h1s/hY<5CJPJ\aJh1s/hY<5CJ\aJh1s/hJ5CJ\aJ h1s/h^}c *h4HCJPJaJ *h4HCJH*PJaJ *hlhY<CJPJaJh1s/hY<CJaJhlhY<5CJPJaJ h1s/hJh1s/hJCJPJaJ(h1s/hJCJH*aJfHq %h1s/hJCJaJfHq nn$Ifgd8,l ~kdYt$$Ifl40!,"  t0644 laf4ytJ4jj$7$8$H$Ifgd8,l ~kdt$$Ifl40!,"  t0644 laf4ytJ 9jW$Ifgd8,l $7$8$H$Ifgd8,l ~kdwu$$Ifl40!,"  t0644 laf4ytJ 89:PQ¤äܤ+,-.678]c&🭒🭆ylll`h1s/hHM5CJaJh1s/h)VECJPJaJh1s/hHMCJPJaJh1s/hY<CJH*aJh1s/h4HCJPJaJh1s/hY<5CJPJaJh1s/hY<CJPJaJh1s/hY<CJaJh1s/hY<5CJ\aJ h1s/h^}chhAhY<CJaJhlhY<CJaJh1s/hY<5CJPJ\aJ$9:Qjj$7$8$H$Ifgd8,l ~kdv$$Ifl40!,"  t0644 laf4ytJäjj$7$8$H$Ifgd8,l ~kdv$$Ifl40!,"  t0644 laf4ytJ-jj$7$8$H$Ifgd8,l ~kd$w$$Ifl40!,"  t0644 laf4ytJ-.7jj$7$8$H$Ifgd8,l ~kdw$$Ifl40!,"  t0644 laf4ytJ&jj$7$8$H$Ifgd8,l ~kdBx$$Ifl40!,"  t0644 laf4ytJ&_`a}ʦ+:JXYZnoV󾷫ym]Rh1s/hY<CJaJh1s/hY<5CJPJ\aJh1s/hY<5CJaJh1s/hlZCJaJh1s/hJCJPJaJh1s/hlZCJPJaJh1s/ha-2CJPJaJh1s/hlZ5CJaJ h1s/h^}ch1s/hHMCJPJaJh1s/h)VECJPJaJh1s/hfCJPJaJh1s/hfCJH*PJaJh1s/hCJPJaJYjS$7$8$H$IfgdJl $7$8$H$Ifgd8,l ~kdx$$Ifl40!,"  t0644 laf4ytJYZoXjj$7$8$H$Ifgd8,l ~kd`y$$Ifl40!,"  t0644 laf4ytJVWXYlm[\]^fg'(Y[\]^em٪ڪ۪  xѨߌujߌh8CJH*PJaJhY<CJPJaJhlhY<CJPJaJhlhY<5CJPJaJh1s/hY<5CJPJaJh1s/hY<CJH*\aJh1s/hY<CJaJh1s/hY<5CJPJ\aJh1s/hY<5CJ\aJ h1s/h^}ch1s/hY<CJPJaJh1s/hY<CJH*aJ)XYmjj$7$8$H$Ifgd8,l ~kdy$$Ifl40!,"  t0644 laf4ytJ]jj$7$8$H$Ifgd8,l ~kd~z$$Ifl40!,"  t0644 laf4ytJ]^g]nn$Ifgd8,l ~kd {$$Ifl40!,"  t0644 laf4ytJ]^mڪjj$7$8$H$Ifgd8,l ~kd{$$Ifl40!,"  t0644 laf4ytJڪ۪jj$7$8$H$Ifgd8,l ~kd+|$$Ifl40!,"  t0644 laf4ytJ nn$Ifgd8,l ~kd|$$Ifl40!,"  t0644 laf4ytJxSTUV\]ƮȮɮʮˮӮ̾ӳӧ̗||qfXKX̗ *h8CJH*PJaJ *hlhY<CJPJaJhY<5CJPJaJhJ5CJPJaJh1s/hY<CJPJaJh1s/hY<5CJPJaJh1s/hY<5CJPJ\aJh1s/hY<CJH*aJh1s/hJCJaJhlhY<5CJPJaJ h1s/h^}ch1s/hY<CJaJh4HCJH*PJaJhlhY<CJPJaJhJCJPJaJUn[$IfgdJl $Ifgd8,l ~kdI}$$Ifl40!,"  t0644 laf4ytJUV]jj$7$8$H$Ifgd8,l ~kd}$$Ifl40!,"  t0644 laf4ytJʮn[$Ifgd8l $Ifgd8,l ~kdg~$$Ifl40!,"  t0644 laf4ytJʮˮۮjj$7$8$H$Ifgd8,l ~kd~$$Ifl40!,"  t0644 laf4ytJӮۮ OPQRaz{|}    !"WXYZvw фp' *hhAhY<5B*CJPJaJph%%%h1s/hY<5CJ\aJhhAhY<5CJaJhlhY<5CJaJh1s/h8CJH*aJh1s/hY<CJaJh1s/hY<5CJPJ\aJ h1s/h^}ch1s/hY<CJH*aJh1s/hY<CJPJaJh1s/hY<5CJPJaJ( Qjj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJQRajS$7$8$H$Ifgd8l $7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJ|jj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJ|} jWj$Ifgd8,l $7$8$H$Ifgd8,l ~kd2$$Ifl40!,"  t0644 laf4ytJ  "Yjj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJYZwn[$Ifgd8l $Ifgd8,l ~kdP$$Ifl40!,"  t0644 laf4ytJ  !*+,89Ʋԕn`UNU`>`UNj *h,-CJPJUaJ h1s/h,-jh1s/h,-U *hlhY<CJPJaJ$ *hlhY<B*CJPJaJph%%%' *hlhY<5B*CJPJaJph%%%! *hJ5B*CJPJaJph%%%h1s/hY<CJH*aJ' *hhAhY<5B*CJPJaJph%%%h1s/hY<5CJ\aJ h1s/h^}ch1s/h8CJH*aJh1s/hY<CJaJh1s/hY<6CJ]aJnn$Ifgd8,l ~kd߂$$Ifl40!,"  t0644 laf4ytJ ,_nn$Ifgd8,l ~kdn$$Ifl40!,"  t0644 laf4ytJRS\]^_`ijSTUVaּzj\OCOjh1s/hY<CJH*aJh1s/hY<CJPJaJh1s/hY<5CJPJaJh1s/hY<5CJPJ\aJh4HCJH*PJaJhY<CJPJaJhlhY<CJPJaJhlhY<5CJPJaJ h1s/h^}ch1s/hY<CJaJ$ *hlhY<B*CJPJaJph%%% h1s/h,-j *h,-CJPJUaJ *hlhY<CJPJaJjh1s/h,-U_`jnn$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJUjj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJUVbjj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJabݵ޵ߵ?@AKL~Ŷ./08Ѫўyh1s/hn*5CJ\aJhhAhY<CJaJhhAhY<5CJaJhlhY<5CJaJh1s/hY<5CJaJh1s/hY<CJaJh1s/hY<5CJPJ\aJ h1s/h^}ch1s/hY<CJH*aJh1s/hY<CJPJaJh1s/hY<5CJPJaJ-޵jj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJ޵ߵ@jj$7$8$H$Ifgd8,l ~kd9$$Ifl40!,"  t0644 laf4ytJ@ALjj$7$8$H$Ifgd8,l ~kdȆ$$Ifl40!,"  t0644 laf4ytJjj$7$8$H$Ifgd8,l ~kdW$$Ifl40!,"  t0644 laf4ytJŶjj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJjj$7$8$H$Ifgd8,l ~kdu$$Ifl40!,"  t0644 laf4ytJ/nn$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJ/08ɸjj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJ8;ŸǸɸʸԸո./vwxʹ˹ɹseYLhlhY<CJPJaJh1s/hY<CJH*aJh1s/hY<5CJPJaJ *hlhY<CJPJaJhlhY<5CJPJaJ h1s/h^}ch1s/hY<CJPJaJh1s/hmCJaJh1s/hY<CJaJh1s/hY<5CJPJ\aJh1s/hY<5CJ\aJ h1s/hn*h1s/h8CJH*aJh1s/hn*CJaJh1s/haGCJaJɸʸոjS$7$8$H$Ifgdml $7$8$H$Ifgd8,l ~kd"$$Ifl40!,"  t0644 laf4ytJ/wnn$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJwxjj$7$8$H$Ifgd8,l ~kd@$$Ifl40!,"  t0644 laf4ytJ˹nn$Ifgd8,l ~kdϋ$$Ifl40!,"  t0644 laf4ytJn[$Ifgd*[l $Ifgd8,l ~kd^$$Ifl40!,"  t0644 laf4ytJ^_{ػٻڻۻzm_mSmEh1s/h^}c5CJ\aJh1s/hY<CJH*aJh1s/hY<5CJPJaJh1s/hY<CJPJaJh1s/h4HCJH*aJh1s/hY<CJ\aJh1s/hY<5CJPJ\aJhlhY<5CJPJaJ h1s/h^}chY<CJPJaJ *h*[CJH*PJaJ *hPhY<CJPJaJ *hY<CJPJaJ *hlhY<CJPJaJh1s/hY<CJaJڻjj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJڻۻjj$7$8$H$Ifgd8,l ~kd|$$Ifl40!,"  t0644 laf4ytJ?nn$Ifgd8,l ~kd $$Ifl40!,"  t0644 laf4ytJ>?@FGŽƽǽнLOǷǷzǷlaUaUGh1s/hY<CJH*PJaJh1s/huOCJH*aJh1s/huOCJaJh1s/huOCJPJ\aJh1s/hY<CJaJh1s/ha-2CJaJh1s/hY<CJH*aJh1s/hY<CJPJaJh1s/hY<5CJPJaJh1s/hY<5CJPJ\aJ h1s/h^}chhAhY<CJaJh1s/h^}cCJaJhhAhY<57CJaJh1s/hY<5CJ\aJ?@Gjj$7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJƽjj$7$8$H$Ifgd8,l ~kd)$$Ifl40!,"  t0644 laf4ytJƽǽjS$7$8$H$IfgduOl $7$8$H$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4ytJ~n[$Ifgd*[l $Ifgd8,l ~kdG$$Ifl40!,"  t0644 laf4ytJ|}~>?@ANOǹu`SE:hH5CJPJaJ *hlhHCJPJaJh1s/hHCJPJaJ(h1s/hHCJH*aJfHq %h1s/hHCJaJfHq %h1s/hJCJaJfHq h1s/hH5CJPJ\aJh1s/hH5CJ\aJh1s/hJ5CJ\aJ h1s/hHh*[CJH*PJaJhlhHCJPJaJh1s/hHCJaJhlhH5CJPJaJ~@jj$7$8$H$Ifgd8,l ~kd֐$$Ifl40!,"  t0644 laf4yt@AOn[$Ifgd3yl $Ifgd8,l ~kde$$Ifl40!,"  t0644 laf4yt.nn$Ifgd8,l ~kd$$Ifl40!,"  t0644 laf4yt$%-./1EFH\]qr۽yuydR#jh,-0JCJOJQJU^J h*[hY<0JCJOJQJ^Jh,-jh,-Uh*[hCJOJQJ^Jh*[hY<CJOJQJ^Jh*[hY<CJH*OJQJ^J haJhhH h1s/hHhHCJPJaJhlhHCJPJaJh1s/hHCJaJhH5CJPJaJhlhH5CJPJaJ./01EF* |||fffRf=L[$\$^`LgdY<> 0L]0^`LgdY<m$gdY<~kd$$Ifl40!,"  t0644 laf4yt   '()*,KMNno񳧜rbK4-h*[h*[CJOJQJ^JfHq -h*[hY<CJOJQJ^JfHq h*[hY<CJH*OJQJ^Jjh,-0JCJUaJh*[hY<0JCJaJh*[hY<B*CJaJphh*[hY<CJaJh*[hY<CJH*aJh*[hY<CJOJQJ^J#jh,-0JCJOJQJU^J h*[h*[0JCJOJQJ^Jh,-jh,-Uh*[h*[CJOJQJ^J   NPQrsɬтr`rN:' *h*[hY<0JCJOJPJQJ^J# *h*[hY<CJOJPJQJ^J#h1s/hY<CJOJPJQJ]^Jh*[hY<CJH*OJQJ^Jh*[hY<CJOJQJ^J4jh,-0JCJOJQJU^JfHq 1h*[h*[0JCJOJQJ^JfHq h,-jh,-U-h*[h*[CJOJQJ^JfHq -h*[hY<CJOJQJ^JfHq  NWB{6ghgdOVh7$8$H$^h`gdB7gd%/> 0Ld]0^`LgdY<m$ +L^`LgdY<> 0L]0^`LgdY<m$KLɲo]Nɲ9)h*[hY<B*CJOJPJQJaJphh*[hY<CJOJQJaJ#jh,-0JCJOJQJUaJ h*[h0JCJOJQJaJh,-jh,-U%h*[h*[B*CJOJQJaJph%h*[hY<B*CJOJQJaJph-h*[hY<CJOJQJaJfHq h*[hY<CJH*OJQJaJ h*[hY<CJOJPJQJ^J*j *h,-0JCJOJPJQJU^JWZ[x{|ówew]Y]C,-jh,-0J6CJOJPJQJU]^J*h*[hY<0J6CJOJPJQJ]^Jh,-jh,-U#h*[hY<CJOJPJQJ]^J&h*[hY<6CJOJPJQJ]^J h*[hY<CJOJPJQJ^J-h*[hY<CJOJQJ^JfHq h*[hY<CJH*OJQJ^Jh*[hY<CJOJQJaJ)h*[hY<B*CJOJPJQJaJph/h*[hY<6B*CJOJPJQJ]aJphBEpqQRxy{~ııĜ}lZ}lZKh*[hr`CJOJQJ^J#jh,-0JCJOJQJU^J h*[hr`0JCJOJQJ^Jh,-jh,-U%h*[hr`B*CJOJQJ^Jph(h*[hr`B*CJH*OJQJ^Jph%h*[ha-2B*CJOJQJ^Jph%h*[hY<B*CJOJQJ^Jph(h*[hY<B*CJH*OJQJ^Jph&h*[hY<6CJOJPJQJ]^J34568XYMN̷}jYjF}jY%h*[hB*CJOJQJ^Jph h*[h80JCJOJQJ^J%h*[h8B*CJOJQJ^Jph(h*[h8B*CJH*OJQJ^Jph%h*[h"B*CJOJQJ^Jph#jh,-0JCJOJQJU^J h*[h"0JCJOJQJ^Jh,-jh,-UhmCJOJQJ^Jh*[h"CJOJQJ^Jh*[h"CJH*OJQJ^Jdeghij eiļđviYIvih1s/hhP6CJPJ]aJh1s/hhP6CJPJ]aJh1s/hhPCJPJaJh1s/hhPCJPJaJhhPjhhP0J-Uh#jh,-0JCJOJQJU^J h*[h*[0JCJOJQJ^Jh,-jh,-U%h*[h*[B*CJOJQJ^Jph(h*[h*[B*CJH*OJQJ^Jph%h*[h8B*CJOJQJ^JphqrstP# H$!$dNgd># ! $!gd{ ! $!gd|#!# H$!$dNgdYv# H$!$dNgdyMgdOVRSTklopqrstʼʸʥv崸ʼk^𸴸h1s/CJaJmHnHuhohhPCJaJ(jhKhCJUaJmHnHuhKhhPCJaJjhKhCJUaJh>#hhPCJOJQJaJh,-hhPh>#hhP6CJ]aJhOUhhP6CJ]aJh{"CJaJmHnHuh>#hhPCJaJjh>#hCJUaJ$OPQ'()vwxyz˜昧˲昧u!jh>#h0J%CJUaJ h ghhPhyMhhPCJaJhhPhohhPCJaJh,- h|#hhPhOUhhP6CJ]aJhhP6CJ]aJh>#hhP6CJ]aJh{"CJaJmHnHujh>#hCJUaJh>#hhPCJaJ*PQ()bcde!# H$!$dNgd&} ! $!gd{# H$!$dNgdyM# H$2$dNgd#DEF]^`abcdef}~MŶŠyyk`^UhyMhhPCJaJhyMhhP6CJ]aJh{"CJaJmHnHuh>#hhPCJaJjh>#hCJUaJh>#hhP6CJ]aJhhPh,-hm hhPCJOJQJaJhOUhhP6CJ]aJh{"0J%CJaJmHnHu!jh>#h0J%CJUaJh>#hhP0J%CJaJ$2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework  PAGE \* MERGEFORMAT 19  PAGE \* MERGEFORMAT 24 2016 Massachusetts Digital Literacy and Computer Science Curriculum Framework MNOPQhiklmnoٸڸ۸ݸ޸ͼhhOUhhP6CJ]aJh,-hhPh{"CJaJmHnHujh>#hCJUaJh>#hhPCJaJh>#hhP6CJ]aJhyMhhPCJaJmn۸ܸݸ޸gd%/# H$!$dNgdyML 0 000P&P1h:phP/ =!p"#8$% DpL 0 000P&P1h:p4{/ =!p"#8$% DpL 0 000P&P1h:po/ =!p"#8$% DpM 0 00P&P1F:p4{@P / =!p"#8$% Dp< 0 0&P:p4{@P / =!p"#8$% ? 0 0&P1h0:pMp= /!"#$8% < 0 0&P1h:pK/ =!p"#8$% < 0 0&P1h:pMp/ =!p"#8$% < 0 0&P1h:pMp/ =!p"#8$% < 0 0&P1h:pyM/ =!p"#8$% < 0 0&P1h:pMp/ =!p"#8$% < 0 0&P1h:pt/ =!p"#8$% < 0 0&P1h:pt/ =!p"#8$% < 0 0&P1h:p^T/ =!p"#8$% vUDd(MJ  nA?ESE logoPicture 3ESE logo"bTP8qqf~hTc^TD@nVTP8qqf~hTcPNG  IHDRRtEXtSoftwareAdobe ImageReadyqe<SIDATxs[G`WU.A꺧kNশ"YzArnFT7sc"*OY"{%yvAjQZ?  fijySE5P KTA*c!_of,'*U>WK  ngEJҲߝ)Xk?xoW),ZoKׂ_4- z6e8› [ӱ݀{7\= Mh4aXݑ[B,/{ ^o ͋ qK-ⶦȜgl/{R1@ ~X\i>sm?eG_ʸ%M@ֆ|4KћȬ?;7]q[)JvD+gmSp/@4 V,?Ok:!~jw?#jx^dp?e7=[m|GR^!ik7Ύݠfe ['i;vKk WߛۢeZ2L%_Wߝ^K nKA&)3#\8a{&nah: nKcr[7ǹ_fmsG79 \^W:*Bn//3 x-_W1 n ,^o|z/9oG q-)B4_q謁O.]4B{xaQ=#v߼)k&2>\Bu*pPʍiM( KPG>m\wrtx|O0ˢyn'򰆲ODMJõ*C(4;Bdք{@X$(+Օ?OIh@,v;xdNۥxmweڠ nӏ:o qҲ#Dlcn^V#LؽWR\kΤx-%q$lIB\&Ëi3¶xk7ⴝ.K=)* 92 ~_ř7-Sn]YC\I=+!~bvOpDWr$73~ZDτxYSq-@4ī[gϛ+ 3GIרq,^}3'9oГ R4J|=>R8-AxSkʻ@N ,3:_!4῎>@qicIMc⹅#y@䎨fcO+E _OW )t;vrJxY(W"WRc%v@6q~ q*hN~8x|?jb}oZKWhbW~WWߟ4es n-WX)} fC-Bw,?'66B f?i+l0}q:Į1lN e ّ! Mi/sfs,UWn0{Xh+TݳЅл4XXqj.8wƑ,'`ĭ#z +Ryu&ӆk+G̕UwrD̠p]*u^ E̳؈ub9loD{rp7yD\ ^W-q^"jgJ,-Ԋ\OaЏ}テhp\qj,^4$a7XP+0V nP>>͖0 ^kJNr fbeگuN.:\ׂדEk)T,!=&fB|G^},ԟ_gk @^y uF׾8 C(a;fq{^?/]cY]GZ D:h;͠ 0=;4_0,]#z!Ֆ̤% Cq+!6_;9W{ #gaݢV`YCy9s1^u-3G Arc,׎'3|TػtA*)ako#l`ѨaצXD0>,-a31vN#@kne l iZm=hMېbMeI_nSa3Ѷ2v6Rמ!4_=qZՆtAF)[|^~GGqI്G [УFS[?q VT_=-% 6[;2bӏBNBh( d~!PSqБl&C [cjKhHqb@mgzffU~Gm!S Fթ:(Eфm=m 8^ntYh* KP):c0L/e3܏W䓁0(x ?򬟻j1پApar1:9v]hȶUcY_笟IsmzS=}]׺O3 zX-̣2 q3)C4}B}(پqsUQse=%G\_(@/KKz3:LXv*0Br rl(줃Amt 4F߸N{`(Mu ޷TwJ$?M6{z9mYF",{kh۱m;=\g\[օM˟BU{-RE~Y4>s48OwSmϺQuo:]7zQu*A9w؝\cʾg{#U˲y9Mbǡ/Ki찄si1p[ 5QD%lm4_WӮQFj^};-MXԛAy(g騱i V}+%5%=E9]=>J vpX*i vF5dlٶe\ z،uK`7gU_}algZz+kiLJpۆ{֏KИ>vF̂x'c1[#oldD枮n_s1w0 5h/oBX_DX AF7PfXM=eDoI!d)ـʠŲ8)CZ l ˗ `4.Fޕi,o3icD{ ?emq(=dhһ+;289xh" ØȺXzycNraXmu3&盖خ{Ǖ^oU~FЍD,z m \ %|m8ކGǽꑱ>^Z[>\ʅj/щ p^;Z4- Ag%.SHP|ZX䦘_b,%M(FYa e{yd'cUe3\LVתگ?0bS.rZƀζG{10tT=OEt_[)KKlޡyg-b\Iv֬lc:|F^>t]b] YµZZmO* [Rsn?'6OH ;BFm8HJ,q[Vv|q+b#Q~(A,=-n+8W75+1IS8V&E\UZvA,.tq&mWDu=/JVzb'6{%V"М{| - ŅoVY.q7W}[oYm󋴂~Tu2ݙeE}}`?;i:2Gɤ COԾcJյ~ Ae6-خwD1y8^)!!˵=q1;^ZԸDņQo~ iZt0-02MN=ZB͐@8ݹ靦.q:9ھrjwZ Po[Ծm2ʻ3f0mb3]`ꠕe#65iTðzjv;925L=KR\m<`ګa[Z-|OVsYR6Uu[!r9v^ћfAI8c]!:,<K$oo|!C\{ܷ_«LM}2E{δ Kz`FH'wŒ=r0 %$M0]ˀ]IWӌ)|L=zek^]CoDi< -eIL۞g12HoQi&$g%.n^KKIVԘz&H':r"{ڲ*BF[4lk<šAE%$$?m/^%rX7w v1"0KHBÄ ج '$puegpյ6<ā)d[.TD٣ dt=ɑ\gnhyN + '്b.7]R%Uy}1)WS~<[&E{n/,l~}|e"R:3 ժ  L;FPuP+۪~7"^b5 o+1wZI^Q/#6GhgEBĵm{}N 3܋簼ku۬k%cL_- ÄuX<,Kac&7I8+NFWi8gE9?ܓ R'a1QO"A_c#6zNz_"/12I?}`TܻOfjHp1P䔏4[;wNRPo d#ȵJ*obEx"ہz$;1Hm痢ŭiPXRxpG^^aoV<(oX&Cρx.RhX`ڏiX7Ch-u!QkjÔY/ZbM)JuBRz}`V0# $ -pu*P$B/7\$ȍEzo;˝ԽhWY kp?&6[3םGjQp=E`Fe1hw1IԶa%Cnf{yݨceS\(/'%ܽa[ l'G| -ͥX$HSFN }˩>˜}%[Q؞;U޹. ڕeqeyI׸f6I1*.&nU) e8A'ez d^>FlA?T2af>uCF]kHU-KUx"e|sE%Y޹x\W ]x&嚕Gn*Bs7ţgy)]^ߞt2!637=zQc`3zç">hqݖp?bx2;6K=bK>;~w=vm:ŹɆ_˹}Nfѹu\w>q\OSy QVeQ}3VYvα-w#5/i6K򧸾Ю?0\ǧJôaxʸ⳾vڵN]mzEټ~縷Hyeq+|"sw;~wDt*sm=ϻR/("B'vv<(eN{":ĮOpG9iñ?I ʥ_\/D'4$d ;~/Gf±.m}8+eX:[qIuvڱcaQǺw^jAv.oE͕{">^e}lo>0R-I-^^+U]"N{ ƺ(UkTS(㖇GgSU݇?~퉸Kķ/_'Sqrz*Otॉ~'#9D[U]OɘLLnh+yjĬXh+`WȦe ŕY_[Tewj3kQIm umceeO340Nz7-Cq>f\;jmSFg? f=nb6¶En^[J/XUٜ`=#NJOFYoQgq*oӵn"lHfۜ`Gv~vFv/ߙ17JæCh_0}QFTк;ƃp%ۿKM!n1ܶқTp}E7ZIFQ GIU]@2q2E҄2!&jp{LBOI6M(9'etƕG FL/QiL\`Jk-׹2:Vy`q]X'WSۯ< k:v}2iѺP3m"Bc6*k,Ўm7ڀWGKi^f)pEsxWI=H;C27W.~"'ӫ-< it|E<+d4Sב>!];Ǧ6YnP-.Nz⽵U4 [K;=>.cgY879t09x&n> ;(iK #ҭ{CqY>LOFr"[ _$Sm$B*҄x9Bxz Xvy*bۄm.PBseA'G1xgѢv Ռ6;gEKUKqVؓ |y|"$_mXAȕ:*ifbW5 9ĵoN# +ᾲm*縸 SS{>liW\ EaܘY{GY&ͪ:[LqnE,>=4Ň*wRkZ :>tl2"!ƽiGS[1L0L}Wۤg.pE}7VvW_?N oP13=_z.$~Ji/)1b+YW%/̭[&Ú\;P`"g󸵶:^of6I/" '֑v*y}*oLdr1ʡ/lzNd * mvb*gzÉZ s;v^69]otGXU!;7n˱'UBwϹޛk{b.uϱ\x-ӷ:.q.*ΫCм>,>3䡝8WOiknzܵMB2\@Wc^<<RkbNrEP@vmW! z#\Pݮ#HaYÈB!? hHG' cjn(zထ~ⷿxWqe?C2c_>OF|ݏbK*vE^^ZjB,Qk ,F_%g-bNcS@\q r#Eݡe>,c$oha^LWV>kqҒ}Xts'dx`p [etKjJH6yPfsPNf-D FjZDS+z1fgLZzlYDXT9nKqr̭Ev=0'*E1kTTO:뤰yÈ"¦6srtq; dsPG1T#"MfᑈĨVXf^ G{вp3t i;-;^/WH6LWtKqV_{nrnWb"@Vk~>Vh REꂶjV*mZddΟbd{=@M<H/[zxf)$Mw[Ʒ%dQ""S^ϷZĮQ/=Kw,G[WL 0.DZm-Q{1:<GWҌs꽕Y^mm r|}C(p)06-_Cex^7[v=*9Xa\TI@;}.},׻ePlזڛjMP'Wc{zyG{D)d}V\-|EOLJ"aU\'ݏe^1r #2STHL[ϾxO\lz$MɉZelGQ~W;Ƙi M[TYW@ pl.;=8k 2Λz=CdvWنQ{;;`;6;[b0]OUCUOa(߻$_SZT 4OYquG~OǢ7- 3ܮ-6ifO,Ies|NE);d!f}×`{y˜'*Ŀ}߮0/Mx ŭbDZyo*CuuwK<}B5 *sKd&%mH޶0Ekfmq2iE@- VJ[ \&8^}ngDHɡS8 jT~GL%?cQIDBxO>N[IbH p!u%| =ekut,ˊEكO}4#*Ӵl9lx| XpXg0T :7blaB_@l^d@wvva<6ջo{zCܸvE|틉4+E@J,y.fq^Lբeյg,QD^whP>S8Hߞײ]32ʣ"Nr1=Ah;ZFVDfQ2sR^ߧ#>;8Tu$|J_<4]üy9ۖ$ lijqejj֮=D?ӎ=QB7D~J[0JK3?Z0dbVcNwV}R>=$}iYF|SR!~Q#ycq|:{xnFB=@U*:w*\ktQU/U쪚8;)I֡<(iUq[U W۷+.SGNZ[`̈́0 G8T̶_rbU-W߽}Ű1+jOˣ 9#/iB@L`\Pg)DzOMYvp]WW/B0ܛ[tΞJqY$~., y,Wk/:bJ[>sK<2WV'= OxUƲȶ0 2>Cq;)x3JЖ(o-5H+E~_B!Qn[Ry2Yp*۽UКnPA{KvCz:>9-ktɼwa8 ^ %`v&T9=UmXl \CZmO7#&VEeb|ÝǓi~TUvp<ܫR͚Vƀb1?X"GE0y#)^vs^qoWM}g}1|&86Mӗo`3\^.^{ةL$n`Ėf9^WHy}UƝ('Ir`sա t>+ sK'E4{UP:N0fΎ$u39Wzqv^.ycnǹn^\2Us:XZz &uk"2B2/1}8sVy K({Nk %>H. jS@ 5! {MDw>U[IWTjWe_۱U[۵=>Y[=nVEGUЧj1 H=dE2!s-1>Q^Peď'e|߼ũ.I+e3/zlxKyԎ2͢ǒ+2*ʥ6N=QYMJ+ qWש`SN;ݮS`%"o\8~}fXcJ>e;)zk\I*p[;#ܲ3(C*n"s6OtE HyrR kSUxw}WJLd҈IjB5^pjڟ\3\he 7=oY8ޢgy\|='㲾cΚWW\0ϲQM3rG宓ӠZZ%ojS k_㦠̳T /z:;y(\xż\hXBV_{{/;-m=YNy[(=Uv޾vszBDlyy|"\J]c,d,NVڭKGXj:J =QF8A1yʘݝE,wR8UoEۍ0IsXYT`ߌ maS.WZN\G?xz|X>3=e۩{1 pu4g} dVޖ=>_Vʻj3-L 񩧸ä˛0dvS'ծ a^ԇ1VVD3P{5yQR, /{tXBxn3RuIE窻yN#Q1⣯:2ѝqSvYO*U4afi<4AܖPzReP;}K^.JO |,8}dYM[IT!s+nG/O<6-of*H7Cw&D2씸5*Fo&VRp|] Ϭva=͒ON2 ᳩl,R[mvb (.ޤZc,OBerZ[rTaׄIA@zo/ ^7K w[ʤ:Q r7f%b M(|װfe)Ofɠ]% #n3C:'Cc<&nھ&.0b{a jtH:;YGZcnE~ bY ߍ ,%c9]Rj{!hxGp*`<"#B#;BSX0s'ej` l`?bEa3ωj2 |[լR.`Lɔ]ʓ3WT.nūi8`R6_4cZm.HOLe\G5z":ӂMHoQ[TY&;a Y7wuuE'H+5T9@~d`֭9o0}-2쵇mSXTp?Y) GeҢKS&ȡplKoQ]d.GON6 Ɩ<Ȧ)e*~//RK tldR~k4-jz g<;,~Xm@uC,Ҹ7q\=v.]W؎-ܫrL.BXԫx|zS[t"}Mn <_0, gJ1&T w+fU^Z99MwCnFrױ8[ZIBlGs;n;;C=uHȁ5ڮp<QvM-$SS3C_Qpb,ϰ s{ n]NspPgM%tO>YzH &q߷ɰUֵ!FOyDǚJliKX8:V;a,0x|F;8ٟdBB*{;g(A#&n[;y{숳xxA\Z1!EXNv2R)EMO92% IfCq慺$ !H{l+K60N<LaA^_De01gWlR-zծ{;>ѫ]}VOlENd ~?ї1hdj>rXRqA;,Ҹ$-؂/22S,vg&^<{e8eCt%SmkYCk/١bI2ZḄ.'r[KUԢtQ0s3'>7X@es){A mH|â?<qaDEWyHr Uwnh,HWL;Itq;w \2Y>6q&k#z,11iFs,-?X*G}wϣfUIkB3׵=l;|mY^~ bnuq۪#, ~*VD}g9\WݫiެYŷ|}|YoH--z|n`!یʖcnIIS(je>[{9}kV鹍zت'6>պ}#{&?Ȱ*k+!GBeǮ8*i3( n3V%wԶB-jX ќgk%+|IZؖ8:qhvxD%ڣǪJ ͍\cߝQ_W~O$n̡ '1diP~[a]b"j[lm.ª~,&mbZMA栬{Rkn4Jkخ]5H.{r8& ]eb\cyNԭq4I/8u.3T+E>u+˶WaivF)DzȦ=iO.u0.6Pj9o6--8ܞŭJ Rs#x'GeƛFJ4]PU1Y/=W >bCZB-4]n9Uqj9 f$n.nǎ 8!?qQ^;)H B gicDauuO]f:Mؚ z暛1^cDϽl 7VOPͩ^Qfm$+U<9t9rb2LExnTtM{wDRyG,] 73rnDU渍dÊLm6yWԢ[9Zo/:'&4v*ˆ[z!INnl漷uѩsQ^^A*vKQD{% pLeه@wnя+eqrbO:َYlUwa[EsM-5O8 fA6'LY[%TMf%?Y4ĸGxПe-u1ݘ=gZDH<5J\CoxkKTod3:t Pg3>EI:Uh3j%lu>oc;$fSؖl'8eڋpF#KCN3VO>qJdȐU7J?`W蛼ljQ׾5|,gN$} 8PnFa αZꩻԏ޳제}].d?ejƍL*Z a}TbRxaRX-z7˶M."ޤMve+r ],&*M⭢!%&Wĥ$Co_ *-= ;ȱxШSgWglO~ ޜG)몯#%\=@{NX^#hlqkڪ=s>'z["f<'* -(0~ * ψmϷ]%5^>o'|U+sli'bLmXȳ_Dţ`6lu'qX]ʣ߅OhV+j"EP6mq bhu?Gs|oOA/7ݒ;k(l10RO9|snEu"tKcu2RuǟuG٦u5{%}Z }vl8uauTk6'rYŭ֓q2^9^G#v5ZMj[lXB.(n޾vY\ZZ[*i3FnPvAjQZ?  fijySE5P KTA*c!_of,'*U>WK  ngEJҲߝ)Xk?xoW),ZoKׂ_4- z6e8› [ӱ݀{7\= Mh4aXݑ[B,/{ ^o ͋ qK-ⶦȜgl/{R1@ ~X\i>sm?eG_ʸ%M@ֆ|4KћȬ?;7]q[)JvD+gmSp/@4 V,?Ok:!~jw?#jx^dp?e7=[m|GR^!ik7Ύݠfe ['i;vKk WߛۢeZ2L%_Wߝ^K nKA&)3#\8a{&nah: nKcr[7ǹ_fmsG79 \^W:*Bn//3 x-_W1 n ,^o|z/9oG q-)B4_q謁O.]4B{xaQ=#v߼)k&2>\Bu*pPʍiM( KPG>m\wrtx|O0ˢyn'򰆲ODMJõ*C(4;Bdք{@X$(+Օ?OIh@,v;xdNۥxmweڠ nӏ:o qҲ#Dlcn^V#LؽWR\kΤx-%q$lIB\&Ëi3¶xk7ⴝ.K=)* 92 ~_ř7-Sn]YC\I=+!~bvOpDWr$73~ZDτxYSq-@4ī[gϛ+ 3GIרq,^}3'9oГ R4J|=>R8-AxSkʻ@N ,3:_!4῎>@qicIMc⹅#y@䎨fcO+E _OW )t;vrJxY(W"WRc%v@6q~ q*hN~8x|?jb}oZKWhbW~WWߟ4es n-WX)} fC-Bw,?'66B f?i+l0}q:Į1lN e ّ! Mi/sfs,UWn0{Xh+TݳЅл4XXqj.8wƑ,'`ĭ#z +Ryu&ӆk+G̕UwrD̠p]*u^ E̳؈ub9loD{rp7yD\ ^W-q^"jgJ,-Ԋ\OaЏ}テhp\qj,^4$a7XP+0V nP>>͖0 ^kJNr fbeگuN.:\ׂדEk)T,!=&fB|G^},ԟ_gk @^y uF׾8 C(a;fq{^?/]cY]GZ D:h;͠ 0=;4_0,]#z!Ֆ̤% Cq+!6_;9W{ #gaݢV`YCy9s1^u-3G Arc,׎'3|TػtA*)ako#l`ѨaצXD0>,-a31vN#@kne l iZm=hMېbMeI_nSa3Ѷ2v6Rמ!4_=qZՆtAF)[|^~GGqI്G [УFS[?q VT_=-% 6[;2bӏBNBh( d~!PSqБl&C [cjKhHqb@mgzffU~Gm!S Fթ:(Eфm=m 8^ntYh* KP):c0L/e3܏W䓁0(x ?򬟻j1پApar1:9v]hȶUcY_笟IsmzS=}]׺O3 zX-̣2 q3)C4}B}(پqsUQse=%G\_(@/KKz3:LXv*0Br rl(줃Amt 4F߸N{`(Mu ޷TwJ$?M6{z9mYF",{kh۱m;=\g\[օM˟BU{-RE~Y4>s48OwSmϺQuo:]7zQu*A9w؝\cʾg{#U˲y9Mbǡ/Ki찄si1p[ 5QD%lm4_WӮQFj^};-MXԛAy(g騱i V}+%5%=E9]=>J vpX*i vF5dlٶe\ z،uK`7gU_}algZz+kiLJpۆ{֏KИ>vF̂x'c1[#oldD枮n_s1w0 5h/oBX_DX AF7PfXM=eDoI!d)ـʠŲ8)CZ l ˗ `4.Fޕi,o3icD{ ?emq(=dhһ+;289xh" ØȺXzycNraXmu3&盖خ{Ǖ^oU~FЍD,z m \ %|m8ކGǽꑱ>^Z[>\ʅj/щ p^;Z4- Ag%.SHP|ZX䦘_b,%M(FYa e{yd'cUe3\LVתگ?0bS.rZƀζG{10tT=OEt_[)KKlޡyg-b\Iv֬lc:|F^>t]b] YµZZmO* [Rsn?'6OH ;BFm8HJ,q[Vv|q+b#Q~(A,=-n+8W75+1IS8V&E\UZvA,.tq&mWDu=/JVzb'6{%V"М{| - ŅoVY.q7W}[oYm󋴂~Tu2ݙeE}}`?;i:2Gɤ COԾcJյ~ Ae6-خwD1y8^)!!˵=q1;^ZԸDņQo~ iZt0-02MN=ZB͐@8ݹ靦.q:9ھrjwZ Po[Ծm2ʻ3f0mb3]`ꠕe#65iTðzjv;925L=KR\m<`ګa[Z-|OVsYR6Uu[!r9v^ћfAI8c]!:,<K$oo|!C\{ܷ_«LM}2E{δ Kz`FH'wŒ=r0 %$M0]ˀ]IWӌ)|L=zek^]CoDi< -eIL۞g12HoQi&$g%.n^KKIVԘz&H':r"{ڲ*BF[4lk<šAE%$$?m/^%rX7w v1"0KHBÄ ج '$puegpյ6<ā)d[.TD٣ dt=ɑ\gnhyN + '്b.7]R%Uy}1)WS~<[&E{n/,l~}|e"R:3 ժ  L;FPuP+۪~7"^b5 o+1wZI^Q/#6GhgEBĵm{}N 3܋簼ku۬k%cL_- ÄuX<,Kac&7I8+NFWi8gE9?ܓ R'a1QO"A_c#6zNz_"/12I?}`TܻOfjHp1P䔏4[;wNRPo d#ȵJ*obEx"ہz$;1Hm痢ŭiPXRxpG^^aoV<(oX&Cρx.RhX`ڏiX7Ch-u!QkjÔY/ZbM)JuBRz}`V0# $ -pu*P$B/7\$ȍEzo;˝ԽhWY kp?&6[3םGjQp=E`Fe1hw1IԶa%Cnf{yݨceS\(/'%ܽa[ l'G| -ͥX$HSFN }˩>˜}%[Q؞;U޹. ڕeqeyI׸f6I1*.&nU) e8A'ez d^>FlA?T2af>uCF]kHU-KUx"e|sE%Y޹x\W ]x&嚕Gn*Bs7ţgy)]^ߞt2!637=zQc`3zç">hqݖp?bx2;6K=bK>;~w=vm:ŹɆ_˹}Nfѹu\w>q\OSy QVeQ}3VYvα-w#5/i6K򧸾Ю?0\ǧJôaxʸ⳾vڵN]mzEټ~縷Hyeq+|"sw;~wDt*sm=ϻR/("B'vv<(eN{":ĮOpG9iñ?I ʥ_\/D'4$d ;~/Gf±.m}8+eX:[qIuvڱcaQǺw^jAv.oE͕{">^e}lo>0R-I-^^+U]"N{ ƺ(UkTS(㖇GgSU݇?~퉸Kķ/_'Sqrz*Otॉ~'#9D[U]OɘLLnh+yjĬXh+`WȦe ŕY_[Tewj3kQIm umceeO340Nz7-Cq>f\;jmSFg? f=nb6¶En^[J/XUٜ`=#NJOFYoQgq*oӵn"lHfۜ`Gv~vFv/ߙ17JæCh_0}QFTк;ƃp%ۿKM!n1ܶқTp}E7ZIFQ GIU]@2q2E҄2!&jp{LBOI6M(9'etƕG FL/QiL\`Jk-׹2:Vy`q]X'WSۯ< k:v}2iѺP3m"Bc6*k,Ўm7ڀWGKi^f)pEsxWI=H;C27W.~"'ӫ-< it|E<+d4Sב>!];Ǧ6YnP-.Nz⽵U4 [K;=>.cgY879t09x&n> ;(iK #ҭ{CqY>LOFr"[ _$Sm$B*҄x9Bxz Xvy*bۄm.PBseA'G1xgѢv Ռ6;gEKUKqVؓ |y|"$_mXAȕ:*ifbW5 9ĵoN# +ᾲm*縸 SS{>liW\ EaܘY{GY&ͪ:[LqnE,>=4Ň*wRkZ :>tl2"!ƽiGS[1L0L}Wۤg.pE}7VvW_?N oP13=_z.$~Ji/)1b+YW%/̭[&Ú\;P`"g󸵶:^of6I/" '֑v*y}*oLdr1ʡ/lzNd * mvb*gzÉZ s;v^69]otGXU!;7n˱'UBwϹޛk{b.uϱ\x-ӷ:.q.*ΫCм>,>3䡝8WOiknzܵMB2\@Wc^<<RkbNrEP@vmW! z#\Pݮ#HaYÈB!? hHG' cjn(zထ~ⷿxWqe?C2c_>OF|ݏbK*vE^^ZjB,Qk ,F_%g-bNcS@\q r#Eݡe>,c$oha^LWV>kqҒ}Xts'dx`p [etKjJH6yPfsPNf-D FjZDS+z1fgLZzlYDXT9nKqr̭Ev=0'*E1kTTO:뤰yÈ"¦6srtq; dsPG1T#"MfᑈĨVXf^ G{вp3t i;-;^/WH6LWtKqV_{nrnWb"@Vk~>Vh REꂶjV*mZddΟbd{=@M<H/[zxf)$Mw[Ʒ%dQ""S^ϷZĮQ/=Kw,G[WL 0.DZm-Q{1:<GWҌs꽕Y^mm r|}C(p)06-_Cex^7[v=*9Xa\TI@;}.},׻ePlזڛjMP'Wc{zyG{D)d}V\-|EOLJ"aU\'ݏe^1r #2STHL[ϾxO\lz$MɉZelGQ~W;Ƙi M[TYW@ pl.;=8k 2Λz=CdvWنQ{;;`;6;[b0]OUCUOa(߻$_SZT 4OYquG~OǢ7- 3ܮ-6ifO,Ies|NE);d!f}×`{y˜'*Ŀ}߮0/Mx ŭbDZyo*CuuwK<}B5 *sKd&%mH޶0Ekfmq2iE@- VJ[ \&8^}ngDHɡS8 jT~GL%?cQIDBxO>N[IbH p!u%| =ekut,ˊEكO}4#*Ӵl9lx| XpXg0T :7blaB_@l^d@wvva<6ջo{zCܸvE|틉4+E@J,y.fq^Lբeյg,QD^whP>S8Hߞײ]32ʣ"Nr1=Ah;ZFVDfQ2sR^ߧ#>;8Tu$|J_<4]üy9ۖ$ lijqejj֮=D?ӎ=QB7D~J[0JK3?Z0dbVcNwV}R>=$}iYF|SR!~Q#ycq|:{xnFB=@U*:w*\ktQU/U쪚8;)I֡<(iUq[U W۷+.SGNZ[`̈́0 G8T̶_rbU-W߽}Ű1+jOˣ 9#/iB@L`\Pg)DzOMYvp]WW/B0ܛ[tΞJqY$~., y,Wk/:bJ[>sK<2WV'= OxUƲȶ0 2>Cq;)x3JЖ(o-5H+E~_B!Qn[Ry2Yp*۽UКnPA{KvCz:>9-ktɼwa8 ^ %`v&T9=UmXl \CZmO7#&VEeb|ÝǓi~TUvp<ܫR͚Vƀb1?X"GE0y#)^vs^qoWM}g}1|&86Mӗo`3\^.^{ةL$n`Ėf9^WHy}UƝ('Ir`sա t>+ sK'E4{UP:N0fΎ$u39Wzqv^.ycnǹn^\2Us:XZz &uk"2B2/1}8sVy K({Nk %>H. jS@ 5! {MDw>U[IWTjWe_۱U[۵=>Y[=nVEGUЧj1 H=dE2!s-1>Q^Peď'e|߼ũ.I+e3/zlxKyԎ2͢ǒ+2*ʥ6N=QYMJ+ qWש`SN;ݮS`%"o\8~}fXcJ>e;)zk\I*p[;#ܲ3(C*n"s6OtE HyrR kSUxw}WJLd҈IjB5^pjڟ\3\he 7=oY8ޢgy\|='㲾cΚWW\0ϲQM3rG宓ӠZZ%ojS k_㦠̳T /z:;y(\xż\hXBV_{{/;-m=YNy[(=Uv޾vszBDlyy|"\J]c,d,NVڭKGXj:J =QF8A1yʘݝE,wR8UoEۍ0IsXYT`ߌ maS.WZN\G?xz|X>3=e۩{1 pu4g} dVޖ=>_Vʻj3-L 񩧸ä˛0dvS'ծ a^ԇ1VVD3P{5yQR, /{tXBxn3RuIE窻yN#Q1⣯:2ѝqSvYO*U4afi<4AܖPzReP;}K^.JO |,8}dYM[IT!s+nG/O<6-of*H7Cw&D2씸5*Fo&VRp|] Ϭva=͒ON2 ᳩl,R[mvb (.ޤZc,OBerZ[rTaׄIA@zo/ ^7K w[ʤ:Q r7f%b M(|װfe)Ofɠ]% #n3C:'Cc<&nھ&.0b{a jtH:;YGZcnE~ bY ߍ ,%c9]Rj{!hxGp*`<"#B#;BSX0s'ej` l`?bEa3ωj2 |[լR.`Lɔ]ʓ3WT.nūi8`R6_4cZm.HOLe\G5z":ӂMHoQ[TY&;a Y7wuuE'H+5T9@~d`֭9o0}-2쵇mSXTp?Y) GeҢKS&ȡplKoQ]d.GON6 Ɩ<Ȧ)e*~//RK tldR~k4-jz g<;,~Xm@uC,Ҹ7q\=v.]W؎-ܫrL.BXԫx|zS[t"}Mn <_0, gJ1&T w+fU^Z99MwCnFrױ8[ZIBlGs;n;;C=uHȁ5ڮp<QvM-$SS3C_Qpb,ϰ s{ n]NspPgM%tO>YzH &q߷ɰUֵ!FOyDǚJliKX8:V;a,0x|F;8ٟdBB*{;g(A#&n[;y{숳xxA\Z1!EXNv2R)EMO92% IfCq慺$ !H{l+K60N<LaA^_De01gWlR-zծ{;>ѫ]}VOlENd ~?ї1hdj>rXRqA;,Ҹ$-؂/22S,vg&^<{e8eCt%SmkYCk/١bI2ZḄ.'r[KUԢtQ0s3'>7X@es){A mH|â?<qaDEWyHr Uwnh,HWL;Itq;w \2Y>6q&k#z,11iFs,-?X*G}wϣfUIkB3׵=l;|mY^~ bnuq۪#, ~*VD}g9\WݫiެYŷ|}|YoH--z|n`!یʖcnIIS(je>[{9}kV鹍zت'6>պ}#{&?Ȱ*k+!GBeǮ8*i3( n3V%wԶB-jX ќgk%+|IZؖ8:qhvxD%ڣǪJ ͍\cߝQ_W~O$n̡ '1diP~[a]b"j[lm.ª~,&mbZMA栬{Rkn4Jkخ]5H.{r8& ]eb\cyNԭq4I/8u.3T+E>u+˶WaivF)DzȦ=iO.u0.6Pj9o6--8ܞŭJ Rs#x'GeƛFJ4]PU1Y/=W >bCZB-4]n9Uqj9 f$n.nǎ 8!?qQ^;)H B gicDauuO]f:Mؚ z暛1^cDϽl 7VOPͩ^Qfm$+U<9t9rb2LExnTtM{wDRyG,] 73rnDU渍dÊLm6yWԢ[9Zo/:'&4v*ˆ[z!INnl漷uѩsQ^^A*vKQD{% pLeه@wnя+eqrbO:َYlUwa[EsM-5O8 fA6'LY[%TMf%?Y4ĸGxПe-u1ݘ=gZDH<5J\CoxkKTod3:t Pg3>EI:Uh3j%lu>oc;$fSؖl'8eڋpF#KCN3VO>qJdȐU7J?`W蛼ljQ׾5|,gN$} 8PnFa αZꩻԏ޳제}].d?ejƍL*Z a}TbRxaRX-z7˶M."ޤMve+r ],&*M⭢!%&Wĥ$Co_ *-= ;ȱxШSgWglO~ ޜG)몯#%\=@{NX^#hlqkڪ=s>'z["f<'* -(0~ * ψmϷ]%5^>o'|U+sli'bLmXȳ_Dţ`6lu'qX]ʣ߅OhV+j"EP6mq bhu?Gs|oOA/7ݒ;k(l10RO9|snEu"tKcu2RuǟuG٦u5{%}Z }vl8uauTk6'rYŭ֓q2^9^G#v5ZMj[lXB.(n޾vY\ZZ[*i3FnPhM*̙fz/9ӧi44)5C@fgHÏukVgM%A933ff٬"ܯww)! \+-x‰ҎX.1ʳqA ܺ\rE%X=5#%mI^sz==mDKW?όPQl*joʓGbKGDHgIFg>U cmPPJCmp0712Hs1IDATx^\}\LiRH^L6UHbɤ&^vd2e0[*`(whJz,[mUImuyi^bg]6s=}| Bo) oy?}ڠh@AC#)--$C"f oqg۵y'v _jxQB!{ bqrXeL8k_,,V!w]p'D01:eJ _WW׫WǏzUOoL+T&cU?xw\+ JSco# ŏ5I^daۮ3^{{;s݈( @%6¬.Ɲֶ;5unI? }}wmMm/2ջ|qKr獑 Lo:gZfwpQ"E?삂PX ˲C*jwHO-;wva؏߀-%*睳U=`ԢB) B6MJ>˻a}n7d_$ ͯ7 vrx$; NXP`g)HB*RFFAz'_w.&79&ӗ1>^&*g0 hwғT:/] =@dE +37;@@cI$&މ{{%iفMAǠ}r}uHfm2n;4&#Iw:T u9ؒIjE[jdzUvbdg2ɉt}Y(6OBH?=KK`,vu$~H9)uz[iẖɼ|@^1B4˨:sKKl:;PE}$03ކzZO< @v&edtUb!*ze>Gvv{^ =gġlΎ0JXs,F(/ӏy2m-.ng_|:> 0EMP .c[f9l/M$$6<4j;J?œ%wMa#J|@` 9Pr'm4Ʒ"?#ŵ4[6ـtl201E&JikesƋ.ðPK (Ar m /see(%.?vuҰJByIPk4 +Ub|I  R ૤n0C yqtfk6"V%I`,f|Y D7rHg0H[AN؇QVeTMX:/1H@;19,W;(".?Z73@h\l^ T1]ˌ_dd!'#m X̍iHPNx6ͅpչ.l $<Y$Wğ\D$rj!l7 ?ͅ"qG"-J@Ǡ_S!DiPD"js7kjF6H Og8_B0J\9a&Z5qIїJҼ SsS  t9$ӟ6GEB Qmhn[2A b78 Iߗ!=[nPVlGK^(tzt6І<¤"`r~q"ÅA#NDIsԢ\gT>UvSd:ZjTXM 3.{_@:Q@Ք.@ d$J!Cx]0W`@Sq{=o"$nrmЧ4jBdVW,([jgq'<+܉]Pf`;Ǻy((0+#757=|9;5f^{>ޑz(-{Qx|VVp#԰(l=-] iaZUU8E,&u%B r(wP}"T/rEp̧plhk8*R 0@Oc˂LccrmƇ^s6pmD }{*xip:[\vN5PLeu H`$z :K2-Z%0CIݑZ>YMBS컦ݨ7EAVj->Žj1 ;T?,7oP7x eC1BL$M_KM>3 `A Pg 5l3իsNL킋0Saـ1S~{^]j'CR K%)٪E45X*l]Qb<MuOFHǥ; OX*UL~F]MIȮcrLC3'r p&٭X4n 6IBuM񚾙:t{ uN1O1޴f+^{Ek⑯Ox_j.<=jaúX!*:_c˔$Ln [Ez 'OJ:;Lq0O3j\&h9US!1 -d~O:0UZAJJ^C/>y")ʵٗ$ Ԫ`<]gUwl &4i5 $A,%eT*ɿEV8H-͢h< @] Ҽ{9gzL{@`ccLS z*7i"ɔFPLJ”6cRimŊ6m+gq|ʘzOdn!,:6wK\$pjvT=dqt<m{<4QQG ε=RIq-*j9mGKv/\f,ضw6 \YϐyYaW|Z3S] }@%1]YvBh ]r NǛ ,w>FƖB !K=P9g}~3@Xu],G"|F8 =EHD#e {n!7Qd\J(ǩd(Z0YjQ[a<}:+F mj="G +Ϟv` vuT %*LQ^q6z:@y=6lYsb EnX\n#XK+ [._@!&S]рȤ(]c44*,E)Uۿ@(hVIg1:p9DkF&z 0 Rwp#)o8_4Ru%wY3?u=M2WOqS Tjf%2_1=VRRFYY~f,r#;b<5KXC[GVr:~y =ܤi[!v߾R&~=˖}|Xȼ9b.Ng^M'(${{?@(&&{ w'XlmMGN4Z*em-- ܣw ̱n5mEޝ7bc~Q0^}2!y SȬ& mDdDIZz=i?fk8k@xc 5 #+K=kv{@W2 or<Ž<P&Y(QUhXTi7ثnW} ejhtzۢStΪu1@=@Cz%J$H)kAhM9/29k{EJPJ,Wo˰Uܴ6hF Tt:d?0p+g R`2@71ۏf5RGw|V^{gb9+t i+/Ԗ^y }EtApGfNό%QQQ}tw>$k5˞(5(X< n)RNF4llg皘(V?? kvi),̾wu[Pԑ֨][ss5,$[S ak'T@4 ҰX,}$i%5t>t Kv&#ο"SS>5 6k2mӸ!^,D6''xu,>.4WCH?CA˙S kͫv0-^eHŞAc2u;ŀRʦ e&25,:G<>g5 VdߔX8Q9@rJs0omPzCeaM?>=uqEQLCە{(kԜ!ޜH_KI{_|aou،D>2Hc1<^ +.r??A ="烿b "'}绱Yv-Z(*%DZpw蚜yHkѥba1<mР.=yF\z'cD( vr;zze_1 o葎%9V9zbiϷ3SM6@4~.JPxCrݟR0#ƫu2C{[aNZ~x|<ǗF)YlYlP9ӠOPa-|lv> =萆};(qkЫhZreBԤ12F90e 0S_}ql06+3Rn~|K&AEEt ո8Zb|)bn%r=bLvK8uV+;̏3Py85KtfX\:ڿ_j'tȗVDTkx7`C?߆f)C]iáQשxhQZ3&h+mOD.iaYwA.pnW|:ٛLoFϿkPTmp,ymsw;\auΎ3i':*[Y~6f jI\xGZ}W"T/O@!m7!á{hb.hzE:PK1?T1R.~:~Y96 MúgMFxc2 T %En&oh'2I%@Sm en|۳g Iy*?<'y5R>Z(hrY"qxMgj,=pu|Vwt(1ǫt4et&J[?V:X+H=X+s8cwf3a5hyi#,ʺ_$2Dq7AɘCD43ݥ%?}3u*H5ǀ?^W ʹg~mz,nÔގMBC-r3 "!QYeU' O4 y\"% (kok|v_.=S 'lE"t̮#TYJ')pZTC ,'`!Ky* l=uUfP;ΰ3sVhtt kS~QTr]^/1P0ͨSS 1IHO"wW9@dQAkB5-)++*χX2p~#.yoܒrIFkb@(O޾'Q;M@AsQ"VlR<|]-@5yf#:ѤKZWe|J = *䬽]6l{S[٫R\`qA&ͭbZk5/`))Fg ?sFx Kp8xy;5rͰXlK؜RW4/}Bi|aL= ~~y e#5>Ks̪*!NOU ]2٣! 5hm+ofjSZ~ 0'P -qHue:Lƕ>RjSfxB!dkG(1&"TE-lT&o%@Pa8jEr)B4rQ|/-rtOoq\岔Oq8dǪQ< pdcuu`qr˼ 9ɜ]s|p\g XKYLp 'vj-Ϛ^jyv'Kt_afUZ 4HV|U'UtDgךa5?Ct :y.]x+jEǥ-Ƴn:<GG(z -c^/V'n\[ %z1lX 4{rʆa/H!ՅxȝL2GjUpQLm H:TsdǬWbM}aUѣX-H(g[e,pLZ|/z !rt):5u;9qI8Í̔q+8/:\ NdϺ}ѻ|,s-hAɪE޻杊CevdAh "Y7l}PkSW~l\IW>y[f9bENufg?AU(>{E Ukzx`A}$GHXEA7=~R?/l9[æ4ﻡ榺|2,K)5L6l?ā;t(MA|/+]VWXZjW3En l+ZJZ`Ĭ̉Z%.7 @\6#6 4S%t=D3ڐlu 0H 5@LiqX= O6zQ16Vw#Ku_\F~>F< \'%= Eg R g:m޴-_Dnež"SP[eɱ. d e}/R[и5\Wd/N| δ͋~MIuW {]陪4޶gNٞLr (h nF|AE{xw2ޖn;Fl4A38v,d$&ztK H _GAw311߾h۴(pŕة$lF8(D'.+A7&R "JhՓrk۸aE7kƪ056Q\6Ij &EQH5&PV6UÝPEF,f+[7\u "nȘ;-aYV>\5b Go'AOGj*0JrOnDhksp WddmbaA AxX^|u\v{xIK98a{;Y㥷 AN*/,ϿY%b:U ZfI\z[}}!|ܪM`LF7B;a+X=H̤(6JQe`6uG(u⛅E$CֻIF,qHF_z[D[W]⶟2D1ə Z-A+QW:oC~;ϕZUTDx_$Y3&*Ă 7NƙQn zU1 % 괾  sYڒl$Oa/Ht5ݥ(xnOh4ΒQ'U"5l`ŔMոUSI# k%)=gz(ǣ7PҴ# LVۻjPwrD}7aIqY~c9+qwԙ!CRt*d)B1eRp_+-u,KZAԲT6lhy 7ȸU܄3g;>xzǧV" jV^o@]?cyP#mgLe.?W|ّp:,^n0A{GRމ [oihqmmnżdm[) h|׺9-wZ%ĿFПIt6Q("1%(J᮪u8S'xs ܸrsss+\9?^pu2|e(3@L'N򊌜 ?e13{IENDB`}DyK _Toc452472869}DyK _Toc452472870}DyK _Toc452472871}DyK _Toc452472872}DyK _Toc452472873}DyK _Toc452472874}DyK _Toc452472875}DyK _Toc452472876}DyK _Toc452472877}DyK _Toc452472878}DyK _Toc452472879}DyK _Toc452472880}DyK _Toc452472881$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #vP:V < t0V"6,5 5P4<BpytM$$If!vh#v #v2:V  t6,5 52/ 2<4BpytM$$If!vh#v #v2:V  t6,5 52/ 2<4BpytM$$If!vh#v #v2:V  t6,5 52/ 2<4BpytM$$If!vh#v #v2:V  t6,5 52/ 2<4pytM$$If!vh#v #v2:V  t6,5 52/ 2<4BpytM$$If!vh#v #v2:V # t6,5 52/ 2<4pytM$$If!vh#v #v2:V  t6,5 52/ 2<4BpytM$$If!vh#v #v2:V  t6,5 52/ 2<4pytM$$If!vh#v0:V l t0050p PytOT$$If!vh#v0:V l t0050p ytOT$$If!vh#v0:V lx t0050p PytOT$$If!vh#vK#v+:V l: t00,5K5+pytOT$$If!vh#vK#v #v :V l4U t00++++,5K5 5 p2ytOT$$If!vh#vK#v #v :V l4V t00++++,5K5 5 / p2ytOT$$If!vh#vK#v #v :V l4V t00++++,5K5 5 / p2ytOT$$If!vh#vK#v #v :V l4V t00++++,5K5 5 / p2ytOT$$If!vh#v0:V l/ t00,50/ 2 p PytOT$$If!vh#v|#v|#v5:V l t-"5|5|55/ / / / / ytey$$If!vh#vD #v8#v|#v #v:V l t-",5D 585|5 5/ / / / / ytey$$If!vh#vD #v8#v|#v #v:V l t-",5D 585|5 5/ / / / / ytey$$If!vh#vD #v8#v|#v #v:V l t-",5D 585|5 5/ / / / / ytey$$If!vh#vD #v8#v|#v #v:V l t-",5D 585|5 5/ / / / / ytey$$If!vh#vD #v8#v|#v #v:V l t-",5D 585|5 5/ / / / / /  ytey$$If!vh#v|#v|#v5:V l t-"5|5|55/ / / / / ytey$$If!vh#v|#v|#v5:V l t-",5|5|55/ / / / / yteyoDdPY  A6?6coding system on standardsPicture 4coding system on standardsS"bnx̺fd=jn@nbnx̺fd=PNG  IHDRb(]$sRGB pHYsodmIDATx^MeU_9p&QnBW3U')BS« Va:FBD_ᠻ^ThILĪFEДvMBBݳw}~wT^k>瞵{y@ @ S@ @ @if @ @k  @ &`@ @ P&@53 @   @ PM @ @KEL @z&pzq@@i& @ q :N\+3w0A 7O@djql v&h#@FE`8{ģɵy GG$tDtEl`WdwH,|`> ̏*Hʶ]gJ{s,TɄS-n:`pHM @CGg+H>ypQ[}p|Ŭ"(@,{B6 -@d &`v@CesA$/۷{U`2?znw>+KN￵5n[bWggܜ=H @Ht !@8~H>3&~١56?,-M//\v7֦|rWJ>4dI/ A8~miߚK k\X/MPѭo_bODO[/݋VqŬ:fxBz dk2˰  Ut-H ?7n?I 9X+9] M5aƇ D%tniN].\<|rt;a5<"{kGR/w=j([Xeês]i $ 4 y$WͳVJ4AUb @)~mׁMmhlsrvKӛ7 eGlp4{d-U"W{FlIOShU(1D7V lPP$W0&G4A=n @Zo OͼfΎW~8kmc @1)0!omc+ Tqt͛d37V`P4"O0 }FM ;hغ6Ƚ-!9X'VM4Amtt L@ֈ˖+LK$^}~_7M c,H 7qvszI xmi2)@l`M5u & Q(-׽Эj4=!)M7W@d8R6m-Kq3!l[H%kUӦ &h (--^Gjs*0WmF+K  $^¡D:C`$F^@` 0f-ku(U >`B9`5w^9T0X.&HǗX@ '{ҞF9q4H@L43 03v3#K 7+ J F"A# Tomkpyi ЛbKrN^5K{A3Y# @ V B[%]u%EFIX7KzPY:B4X< N4A@'ѻ!@ `j'tM4Ađ@hmd@`tLh}b#@`~>"@Xf ]1}` v!@U \!jV'伈“%uC" ΋Āl H6V   ̌fOL] @`nBI@X:>s'@&tƾ) M0%o+ , t:&C`iȄ.;r F ԃ Eyx,8G4| <:/  %@`A1@X.{,2 ]rHLs @$,݊QIL(#'@`B=@XlL" ]1zzHLgh @#|EEL(SS!@`*BO@-gZ  dBB<+wb  #@&y M090 ̄3q$f@dB(ujC #@?H Yyn(@$@&E M(wc, LG疁2 02dBGԁ@HA 0?<:ϧXXȄ2% L w Fxtn P M!\ y~>"@" ` M|   i :M5Z&@e @$,݊Q@3>|>2 &X߱*,B$@&tNCetH4ApNG{!$2ID4&XDZr Kv4  M9b@<90 PЪh M_c) d9   :Yס8z"@'Ј y>BC@!2 K @` ^F@H9͈  M+nA Ǩ#K;7r~Z@R@u ZGʀ@'4g >ۭ_[=tv=0[xt{Fnm+VF;F@s7[ @H M>SFZ&PBc ELUWɵg IEZFp @ MԀM |7?(w=v٭).9_zb @ &h@lt=0d݈^y;;'^:Nizm-jF{SC7SOiݞ{/~EaQ7|ihogk ^xA7vMr kA#G?f2-W[jXSm(ȽE,=\nF&yMD֏+I&PI+C`@7HHJo5KI_)-+_%G>oݭM?U[Ƿ-Ru(%\in]"4K;rr E4 MK;GP!`U~\Gz FZ9kXSm3o)2;Lis5DvGǏvkU[RCk??umC#&N$Z_$HvɃe R#O| g\3 C&m];jELq7S6+bHN5E>C49j 楙tU!^h#i(N❽bwzTjhEx-S .LM"#`с@#!pz-#*Nu>xz1WݯΝDc&'>E{̫ɋ/h>m?B)qruMZ3<# [MJ+M;;x;2 :R#/Z! fnܸ>1O<9[ I 9& M4D,{3=vmu|ӟvٌg>TM0۬cwÕ/˽OegUO&&5Ѥ^&ۄl=`&>OEFI]DFD.M@&ĥO{ !]GQ?۷oOGGGqe_ۿt~!>" L{&gE7X/UI+" CIh7a_q*TodT]G fU/_1Q[j@H@ Wf݌Qe ;.f[O3Fcy\׾/Wpڅ!-v~W~%)bؼFR -Ї>d<˿l g4'0x@ 5׫ xb5ɓiPr=) M0E3B`mk׶'.NJ "w}kA%B"P}if ݥ^miVPu"= \n!9"]h9?MPմ^??m iyȊL5ΥLrxkN @ M0~! Pi2U*n7M`-ehM`)M[1gжBM o9SnK+\H"5SPws3^P任-%ѹQb:;H qeaF[Kd5^]qT5pkK[t ITM &Poenh d78آ"CY3MݓQSNeI7wVqB=SWz ^+k Agq2@D䱾OT->"@B`۽69fZ?2OF4vVtA4ATsi_ i2*nswVlur%@`bؓX\5]GPhi| 0k/!<Pj% OֻtP/W\ 涸k+";X4@Έ_z@ӛ^;Yw$D+g.6(~u-)j%!$ʕ!2ݞb(C4h lK54r,4!K(+DxH<:0Qզp@@]ji@oCb[r)Au{Eh콷ޯ8 bN^R{HmppwEGM{ 0G{,uG`{1 0R]Gr%t R' aP xn\Zvĭ63|qvY,]YeTȰRadx:RI-(h"fZ-윃Th14ap@918 #p@#HEѤ3 @PM02 0zE(@ Pi ,ź!@ `.@@C,@.CC  Aj!#]P,v)(+`6@ ̌i9sN@'6A @=`APkGh@ &h$@`DWr"\@ - ~(g@~(ȅ @hiH2Exu(@~(ȅ @hZ / "\@ &&hB^n$E @MPMЄ}!0%[`;B!@j MP!0=C CG. @@U,:J0r"\@ &J^nE @&B֡| # @ r(3$@PNP @ CjJ r{} @H 9^n` @IT$K!A< A# @ Dj &AP@ @ M5ͨ`*CB $y~} @0 5Mpzk'҃o ׬nQ @X0"A`SctO8MoGp= :h|8,zh0Y1X@Y7&hDv.yW\ӯr׼]pjt$W ӧT4j͠=Zנ @ 'P|8\北>xgV·kuIEދ1gOW$ 3ژ}U՞J{NS @tTM*!K#.ݺa'LxrI A·sukN9G &H(kF=2]neL7U[Vd-s`.X @D Xtj˥σý o G[w{ =rvaGk#kc֎]|nԳt-:r~H aը!]rRH4. @`f*/:sy-}agS:,_/~yڡ:Yt#*{ ?77gvň??|'?t__z3?3^et??w_jR7^ *ӜnIr E$1Ys @69fPtWͱo=4O"nv636?,-M x&w^G:WLf-r[>-(wwmôs-no/(~V꺣؟純{.#S'?*G ooVRXu+Ux I1ʈ-5g2Jf @M⢃׶{ߧ~]îRưkgrEpZqtAZt/Yu<}D/9R V+ˬ@mGN9tb& BDZ+_t/}&_~;wAt,CL˗/ij3..(s}%kw$ @JZ%GZZI+ɵ[ mߋ][ .^{蔙[Xeês]>sIe{70{kU/~K-/󵬫W|R>W^yT/ww{rrby`ͿKookY(+)5&jk s|:!sP @;@so3֎Ɔ;'lDqIJB6whUs1KNRI Q_INJFvgN=D @h@4AXnM̈˝%ls7mcS6 W__E IПqC&@vBJl]~дN(S 7 gB[dmG$=,61_#$Iyo~S꫺V>TP PTB2P|%iII(me5H"wi+I1]"^vd" @@* J{`W5&xۛ+ 2X)\_ *U Ry}1BF98Q <"ţi^Ea;D{Z< 须TL=F"d=zUn4YOboM?amNLӳ ȂG^ @]&(mWz59Wsvv+ Qj@ Z@e>]文䵖e7N޲y{ZJzKRV,Sqf9F"b2&=5շ9m\C̵0{{{q\(ZkөO ,@4N)MmWep#et0vFP c펐1܎_A^W[JIjݵ5E 6Tf}m ʛڧomN Yb Gx9ܾAQ!@Z'P1M`'WކS 96+(یE7!o!V>ۜ62K%&Y|J @@4*Q`-4*!Ժp]z['%pybnsA,r5VqQ^>Lc lqꖊCZ5 ݷbls;}sI]XTTrZ7ainoe{o,'ix$AI@*#_uX:J>q0O@|D9mJLR&G惥% @@>i"v ;%vUoGi88" c#iqHkMz|ߨ40SՈ8S eUNtJRx7pv P tI@yi.yؿ+r¡(/s%ӯ]\y3<3d5__mȢ^F!j2j~NB V&hcAH474[}W\ hM+f ʆ2{t -[dۆ:@N434.\Jiε163NTSr=gfscf1 % M0I 4A2@ @%MȚÐ& nB$Mh &=}TfB^VIorp o/X@ $Z".(C $Zs2k'yȚQ @ -( d6t @FB PM0O @ @`x @ @FB4H @ 7>@H홺o%{@fǎ`X@ L@2~`ZE[́ܘh?y֠} @ M;rB`"HDX6W @@;HÑQ f/']L%hH@ ,iȮ@)_̂1ҷ?ې@  M0ObM #P'Vb8n/Q+j |<#pz|yVkUpc;kc+w[I7-!0_ŵxmoGm => MЄ}!P̘߿կ7//BR@uў}d;ٟ}g^yK2Vc+!o4۾ok'%)G}tjt:к{U@Ǥ_8[DGhmE['Ƀý I'A&bzF@RYk<Ц.ͪ)zWr;4A>+ZB}|#ԧȸqF; Y ?vI'Wė8_UPwЂ+*;|`xHk]Ɍwݫ;/={7{Uպ퇦4^m3j_YxǞ$]Fy.R[öQepN5Z! Wps˰dMHԱ5f/;Τ'WA㣣m}@h3̿[}3\?/$呣Ffdr!s_<(_!RO'..TA[DtAxy%]31/Vm-.(͍^oS-.i Q2!b(oR({zu#VlO) Q]Og;󶯒&(G`鿔r% vȑ`ݭ)ߺ0 9@v eFup9Y54( ;􄫛&v[.kfWO=_Mԗ%ohip}@XJ/oG3Lf+וY$H4; iVH^f41|]_r\қ+WER :# #M~;MhfT%sÏcj`>ݭWb@{38Y*kpx j<oNt{qh*^nqovnm3M2I6(K&:FiNI]4кvbc|hzxU5fzd}"~(=^ktks؆z(k1&XLBZM{Ӭt[^ %Rw/ZoZ.e{G<6uo3=Z4KvdiR6V ]2+Jm{bY$J㆟yfqWdB`^ǚ!$/3on D?!$Š7Hꕌ#i9 0RQ&mk$σl$LF7M*[c^bq ֕HYw~%ΦC)6d@+Ӡ4};iwN_̛NUEg8fx_g]-ݲ\]=F3n >V3o>Ho3՚%)"{>8\7RRk粊X5p{\Zl|k_ѩq5;w~;)o[2_WZs^X%08'I@NIя~O|B) ɂ~鹗: _l8=۝{Ҫ;v`W穫Oqɽ̣}ʪ$eܣ׎EוԵbXq<ޥ 6mgYMr|-*4쎜dl`+rxOiE ݍꑌnt\U..dZ͜{̎.dL՜0m.nХpI+"wL|{θFz&+ו~YTsҭ>M[y6WH!W͝{#$}Y9%A@E(?ڪ͐k|styljH)/I83΀ejX@=(Hd gsVU` Uۇj9$s:FI$ Rc -Aqw7WGM)f\]mbtuq'-afz5iTAbM&ɪ-20@4 ! /L;vM-PIZUDs] >ϟ?AK_Kh}ZI!ShYQ# EçwhWYV-)b WV0^sIVnSO.ׯ3\{خ|.2D Yw ȭxMdl1CŘ:,*k+Q*Zi`}=ahI x&ݫWU^˜{Ќ.ƬɬO@;w ҵ'L_4[Ohou;xGf][JQ 27|󩧞r+O>dRܤV%Bk7`=Twի{`!@MUKr:<R<%eUE+*9ҕ@kǎ$#iPq9Yra0i(bWSe:9{.Xf]q2]1Mf*vh+ފϚ4؃s1kOLX[L[Z/du&s۷oG\W5x9*d Y:LL M"蒀Y/zNs=wpY3ϘʪϚC8wX&A ㏛ 2:3"̂N.$uR9uf]Ʒ6#ӛվ{oK؎&EaY[jמAm[KOeK+.Dh ȶ]'GG~ eG<*Om6J7/bFcBgМI^z*- XiasXI)r[sw4KD~)֭&UR|}Iak+c] 9w V/rI^-YebˏVD<9XevnNۑ$ll].s)EY4^h; ! Wr5ɡrnV%3Qʩ^^uK3S`]FtQ$]=^OUTKuMQͲ&LhJE)}l x8ŭy$?jvh36&cntqVW΢Ԅqr"}Z@I@.y֞U3L d,\tc'V(]ZA` ^zjumjdsƣז+E#|VxGH/TL+6 foՎf-P{6E8hAFC} x$n`x Wq<$ǣ)tȡ 6I Xq{.ብ-PVڃe 2[IT&?C%@"P.1ΐE:~=ǣx4\`i3 X,@J' /,ufն[U9j.دMs.l,I(]XC^A_h8MSeSA3vIqgPGֺ1g)gxSĐuݒl. ,EfNyҜkVM-\ @@% *1 #0H ,bwÓkgϨU}$-~{vrcӨU(W5stUB= ljA@xRĭȔ44P ۙ W{fZyXD|벖't7}@ &X1\X TAR)i(_wfx),_٘"߳t >Y5^9qF{fuB=q\hd+9@sbL[optnq㤠պ(!@c$`TO@tB=k Wб]UVZ[vnSoZ/~hV!C5wkzd[ xKdcH'~ͦ5udE`2|gwz:lEg_O|ͦ 3M!@!_&c 08Pԋ\nY߆Sd6"*{ $Tí9 4xQnw^,.XN}Ly%[PkHb}V\= t}kͤy3m% 1NA %3{cCC@B9]Gbk L9.g>`BȉDf`P,!M{!Q2 +PP]jB* @`jHr*B,bW Sou]ZȀ @`.HœH,Xo$(bWmϩIP5KW@ ݱedL ,0lcw]\(P ç469bJ+ @`nfznHsXYXE9 @H/Tt@`l ꑉVT5 @ XMM =B L)@SnB9l ןe]PeL@ 1 M0/%@#,B  H4 vxg=@F @@oHAkIq @ MZ@H ~%G4 @@+HA 0 Ĩpɂ5 @j MP  02$F搕:8eNA%@ $ID4 =$ Fԃ @p&`R@`HLs8kBBU@ p >0ܘSx$Y$ ml @S%@`Ce A0u{!@ &1p&/g 9'ob  @3s(̐! J`N.@ 0} C,/2/c# @r.-$ n @c&@`AFN1XT 7Gc& @3c-I,p$Z1 iM l 'b6@  B4  @ @#Rd8y^^9ϕ.4 @ #@D q4fB @&h+v?|}zVn޼柿y$! 7zsq.uAC4b\=BCߺ?z\8)\;zN=T @BH07#ބ^w~kRG,h4ꇀ )1{ ъ{!@4ٿ{56ݫoĿ~D׹N8}%* uPvv.R+M4.-CZ=@M@ &}h7/u) *UgPMJރh؜;sY#@ h oKUץVOkf I#GJ,s&ڮZ=W;ZA{%&%` -,W^{= t3bZkkr&Xl`ޞ޷g4 IW@B4\<9i;$$m ^o]O]z<am)T76X~rt}${ L\܃4 'LRo]SSPӛ7s%Km覔R1i꾤G>w؉S7iVdbq\SUV3DۀV!퓳A( Vu>|cv=j([ b&v[|5G4Nʅ-4N9߽z]}-|uE<*8v$z }6 Li)zmV:oJHz{?Ow#g첓8%p.KG9^}UJY"(}ЋS[wpݧ^i$M&ku5sIfԥFaKcl5ts^ vncΨ(o*  ̂a o}Y/R[1Q29H cS]<:&_n#Q,G/-v=t0_OX SWΘ%';FNaN#dՏ ?~tN%V(*"x@9Zi'7GV Li Jk'-+e0f>w?f\wV#RY<3KL]R%`V;.۫~Z֮ǂRaPiNUT5+2"k i M0Mu@0i iܓqVV^`=Ta%ֆcFZe+VF:6WhǪ"'iRi@q"Q U; @#@`|>YFPی~]2EQz9X3esnDriAT(^t8SʃJWk UyZj   M0WT]$w}PB~Z^(RD}%XU[!^Z-g]?&Wè:ƚa[C#]f:fd_AjV1$ʃAI'*(2 0R FU/˱nc_j^{Ke׳hL` (U4o^P~VgzL,-f}k&V๙-SҶVuthYPp΃WQ1؎ B4A+jw1M䩽.;ĂѻTh3m;]w|5-cY'%VV`L6"]BY`k>-kU]n'nC5>5WQEQ.OA ́1EJaΗ{>#6o[׭9hz_{pwa{ucT6Wl ѝs_SaQU]C`=>g.(&ocvjCoR}a6I7H."\ ́(oDjm<޿(}>I-xӼ-hB& T5LucW=ƒ3CRQUm# sVC>~(:nBfǷvL [W'){Ӭ_7//'QcArJtEEF @$E?꓌KÙ~HsS_9O[xF#6W6lf_x}:ex \I..Ss0Z19^K+tUe\ lI@9SQEQ& @PH0  A@xe#ƗZe}e EJ(:hEJ(V-liQ+HU*Znn 7 UO0J(2jL @ pFGa(FΊqL@ @}OȂ @ iQ @ @} M'mdA @FM F @ Ij>i#  @ 0j F @ I4A@ @5vA @$@OȂ @ iQ @ @} M'mdA @FM4݃r @ > &6 @ @&@`A9@ @@HIY @ Q M0j @ @O ,@ @ &{P @ '%&IENDB`$$If!vh#v#v:V s t$55/ / /  / / 4 sapyt1s/$$If!vh#v#v:V s t$55/ /  / / 4 sapyt1s/$$If!vh#v#v:V s( t$55/  / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/  / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/  / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/  / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/  / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/  / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/  / / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/ / / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/ /  / / 4 sapyt1s/$$If!vh#v#v:V s( t$55/  / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/  / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/  / / / / 4 sapyt1s/$$If!vh#v#v:V s t$55/ / / / / 4 sapyt1s/$$If!vh#v#v:V s( t$55/  / / / 4 sapyt1s/$$If!vh#v#v:V s( t$55/  / / /  4 sapyt1s/$$If!vh#v#v:V lU t$55/ / /  / / BapytVr$$If!vh#v#v:V l t$55/ / Bayt6v$$If!vh#v#v:V l( t$55/ / Bayt6r$$If!vh#v#v:V l t$55/ / Bayt6r$$If!vh#v#v:V l t$55/ / Bayt6$$If!vh#v#v:V l t$55/  / / / / Bapyt6r$$If!vh#v#v:V l t$55/ / Bayt6v$$If!vh#v#v:V l( t$55/ / Bayt6v$$If!vh#v#v:V l( t$55/ / Bayt6$$If!vh#v#v:V l t$55/  / / / / Bapyt6r$$If!vh#v#v:V l t$55/ / Bayt6v$$If!vh#v#v:V l( t$55/ / Bayt6$$If!vh#v#v:V l( t$55/  / / /  Bayt6$$If!vh#v#v:V l t$55/ / /  / apyt6$$If!vh#v#v:V l t$55/ /  /  / ayt6$$If!vh#v#v:V l( t$55/  / / / ayt6$$If!vh#v#v:V l( t$55/  / / / ayt6$$If!vh#v#v:V l( t$55/  / / /  ayt6$$If!vh#v#v:V l t$55/ / /  / apyt6$$If!vh#v#v:V l t$55/ /  /  / ayt6$$If!vh#v#v:V l( t$55/  / / / ayt6$$If!vh#v#v:V l( t$55/  / / /  ayt6$$If!vh#v#v:V l t$55/ / /  / apyt6$$If!vh#v#v:V l t$55/ / /  / ayt6$$If!vh#v#v:V l t$55/ / /  / apyt6$$If!vh#v#v:V l  t$55/ / /  / apyt(s$$If!vh#v#v:V l t$55/ / /  / / Bapyt-^$$If!vh#v#v:V l t$55/ / /  BaytQUq$$If!vh#v#v:V l t$55/ / /  / BapytQUq$$If!vh#v#v:V l t$55/ / /  BaytQUqr$$If!vh#v#v:V l t$55/ / Bayt-^$$If!vh#v#v:V l t$55/  / / / / Bayt-^$$If!vh#v#v:V l t$55/ / / / / Bapyt-^r$$If!vh#v#v:V l t$55/ / Bayt-^r$$If!vh#v#v:V l t$55/ / Bayt-^r$$If!vh#v#v:V l t$55/ / Bayt-^r$$If!vh#v#v:V l t$55/ / Bayt-^$$If!vh#v#v:V l t$55/ / /  BaytQUq$$If!vh#v#v:V l t$55/ / /  / BapytQUq$$If!vh#v#v:V l t$55/ / /  BaytQUqr$$If!vh#v#v:V l t$55/ / Bayt-^$$If!vh#v#v:V l t$55/  / / / / Bayt-^$$If!vh#v#v:V l t$55/  / / /  Bapyt2~$$If!vh#v#v:V l t$55/ / /  Bayt2~$$If!vh#v#v:V l t$55/ / /  Bayt2~$$If!vh#v#v:V l t$55/ / /  / / BapytQUqr$$If!vh#v#v:V l t$55/ / BaytQUqv$$If!vh#v#v:V l* t$55/ / BaytVv$$If!vh#v#v:V l( t$55/ / BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUq$$If!vh#v#v:V l( t$55/ / /  BaytQUq$$If!vh#v#v:V l t$55/ / /  / BapytQUq$$If!vh#v#v:V l t$55/ / /  BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUq$$If!vh#v#v:V l( t$55/ / /  BaytQUq$$If!vh#v#v:V l t$55/ / /  / BapytQUq$$If!vh#v#v:V l( t$55/ / /  BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUqv$$If!vh#v#v:V l( t$55/ / BaytQUq$$If!vh#v#v:V l( t$55/  / / /  BaytQUq$$If!vh#v#v:V l t$55/ / /  / / Bapyt$$If!vh#v#v:V l t$55/  / / / Bayt$$If!vh#v#v:V l( t$55/  / / / Bayt$$If!vh#v#v:V l t$55/  / / /  Bayt$$If!vh#v#v:V l t$55/ / /  / / Bapyt$$If!vh#v#v:V l t$55/  / / / Bayt$$If!vh#v#v:V l( t$55/  / / /  Bayt$$If!vh#v#v:V l t$55/ / /  / Bapyt$$If!vh#v#v:V l t$55/ /  /  / Bayt$$If!vh#v#v:V l( t$55/  / / / Bayt$$If!vh#v#v:V l( t$55/  / / / Bayt$$If!vh#v#v:V l( t$55/  / / / Bayt$$If!vh#v#v:V l( t$55/  / / / Bayt$$If!vh#v#v:V l( t$55/  / / / Bayt$$If!vh#v#v:V l( t$55/  / / /  Bayt$$If!vh#v#v:V l t0$55/ apyt)U$$If!vh#v#v:V l t0$55/ ayt)U$$If!vh#v#v:V l t0$55ayt)U$$If!vh#v#v:V l t0$55ayt)U$$If!vh#v#v:V l t0$55/ aytE+_$$If!vh#v#v:V l t0$55/ aytE+_$$If!vh#v#v:V l t0$55/ / aytE+_$$If!vh#v#v:V l t0$55/ apyt)U$$If!vh#v#v:V l t0$55/ ayt)U$$If!vh#v#v:V l t0$55ayt)U$$If!vh#v#v:V l t0$55/ ayt)U$$If!vh#v#v:V l t0$55/ apyt)U$$If!vh#v#v:V l t0$55/ ayt)U$$If!vh#v#v:V l t0$55ayt)U$$If!vh#v#v:V l t0$55ayt)U$$If!vh#v#v:V l t0$55/ ayt)U$$If!vh#v#v:V l t0$55/ apyt)U$$If!vh#v#v:V l t0$55/ ayt)U$$If!vh#v#v:V l t0$55/ / /  / Bapyt;OP$$If!vh#v#v:V l t0$55/ /  /  / Bayt;OP$$If!vh#v#v:V l t0$55/  / / / Bayt;OP$$If!vh#v#v:V l t0$55/  / / /  Bayt;OP$$If!vh#v#v:V l t0$55/ / /  / Bapyt;OP$$If!vh#v#v:V l t0$55/ /  /  / Bayt;OP$$If!vh#v#v:V l t0$55/  / / / Bayt;OP$$If!vh#v#v:V l t0$55/  / / / Bayt;OP$$If!vh#v#v:V l t0$55/  / / / Bayt;OP$$If!vh#v#v:V l t0$55/  / / /  Bayt;OP$$If!vh#v#v:V l t0$55/ / /  / Bapyt;OP$$If!vh#v#v:V l t0$55/  / / / Bayt;OP$$If!vh#v#v:V l t0$55/  / / / Bayt;OP$$If!vh#v#v:V l t0$55/ / /  / Bapyt;OP$$If!vh#v#v:V l t0$55/ /  /  / Bayt;OP$$If!vh#v#v:V l t0$55/  / / / Bayt;OP$$If!vh#v#v:V l t0$55/  / / / Bayt;OP$$If!vh#v#v:V l t0$55/  / / /  Bayt;OP$$If!vh#v#v:V l t0$55/ / /  / Bapyt2~$$If!vh#v#v:V l t0$55/ /  /  / Bayt2~$$If!vh#v#v:V l t0$55/  / / / Bayt2~$$If!vh#v#v:V l t0$55/  / / /  Bayt;OP$$If!vh#v#v:V l t0$55/ / /  / / Bapytg$$$If!vh#v#v:V l t0$55/  / / / Baytg$$$If!vh#v#v:V l t0$55/  / / / Baytg$$$If!vh#v#v:V l t0$55/  / / / Baytg$$$If!vh#v#v:V l t0$55/  / / / Baytg$$$If!vh#v#v:V l t0$55/  / / /  Baytg$$$If!vh#v#v:V l t0$55/ / / / /  Bapytg$$$If!vh#v#v:V l t0$55/ /  /  / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / /  Bayt)U$$If!vh#v#v:V l t0$55/ / /  / Bapyt)U$$If!vh#v#v:V l t0$55/ /  /  / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / /  Bayt)U$$If!vh#v#v:V l t0$55/ / /  / Bapyt)U$$If!vh#v#v:V l t0$55/ /  /  / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / /  Bayt)U$$If!vh#v#v:V l t0$55/ / /  / Bapyt)U$$If!vh#v#v:V l t0$55/ /  /  / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / /  Bayt)U$$If!vh#v#v:V l t0$55/ / /  / Bapyt)U$$If!vh#v#v:V l t0$55/ /  /  / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / / Bayt)U$$If!vh#v#v:V l t0$55/  / / /  Bayt)U$$If!vh#v#v:V l t0$55/ apytg$$$If!vh#v#v:V l t0$55/ aytg$$$If!vh#v#v:V l t0$55aytg$$$If!vh#v#v:V l t0$55aytg$$$If!vh#v#v:V l t0$55aytg$$$If!vh#v#v:V l t0$55aytg$$$If!vh#v#v:V l t0$55aytg$$$If!vh#v#v:V l t0$55/ aytg$$$If!vh#v#v:V l t0$55/ apytg$$$If!vh#v#v:V l t0$55/ aytg$$$If!vh#v#v:V l t0$55/ aytg$$$If!vh#v#v:V l t0$55/ apytg$$$If!vh#v#v:V l t0$55/ aytg$$$If!vh#v#v:V l t0$55aytg$$$If!vh#v#v:V l t0$55/ aytg$$$If!vh#v#v:V l t0$55/ apytg$$$If!vh#v#v:V l t0$55/ aytg$$$If!vh#v#v:V l t0$55/ / /  / Bapyt:$$If!vh#v#v:V l t0$55/ /  /  / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / /  Bayt:$$If!vh#v#v:V l t0$55/ / /  / Bapyt:$$If!vh#v#v:V l t0$55/ /  /  / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / /  Bayt:$$If!vh#v#v:V l t0$55/ / /  / Bapyt:$$If!vh#v#v:V l t0$55/ /  /  / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / /  Bayt:$$If!vh#v#v:V l t0$55/ / /  / Bapyt:$$If!vh#v#v:V l t0$55/ /  /  / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / / Bayt:$$If!vh#v#v:V l t0$55/  / / /  Bayt:$$If!vh#v#v:V l t0$55/ / /  / / Bapyt,3M$$If!vh#v#v:V l t0$55/ /  /  / Bayt,3M$$If!vh#v#v:V l t0$55/  / / / Bayt,3M$$If!vh#v#v:V l t0$55/  / / /  Bayt,3M$$If!vh#v0#v`:V l t0$505`/ pyt@r$$If!vh#v0#v`:V l t0$505`/ yt@r~$$If!vh#v0#v`:V l t0$505`yt@r~$$If!vh#v0#v`:V l t0$505`yt@r$$If!vh#v0#v`:V l t0$505`/ yt@r$$If!vh#v0#v`:V l t0$505`/ yt@r$$If!vh#v0#v`:V l t0$505`/ / yt@r$$If!vh#v0#v`:V l t0$505`/ pyt@r$$If!vh#v0#v`:V l t0$505`/ yt@r~$$If!vh#v0#v`:V l t0$505`yt@r~$$If!vh#v0#v`:V l t0$505`yt@r$$If!vh#v0#v`:V l t0$505`/ yt@r$$If!vh#v0#v`:V l t0$505`/ pyt@r$$If!vh#v0#v`:V l t0$505`/ yt@r~$$If!vh#v0#v`:V l t0$505`yt@r~$$If!vh#v0#v`:V l t0$505`yt@r~$$If!vh#v0#v`:V l t0$505`yt@r~$$If!vh#v0#v`:V l t0$505`yt@r~$$If!vh#v0#v`:V l t0$505`yt@r~$$If!vh#v0#v`:V l t0$505`yt@r~$$If!vh#v0#v`:V l t0$505`yt@r~$$If!vh#v0#v`:V l t0$505`yt@r$$If!vh#v0#v`:V l t0$505`/ apyt@r$$If!vh#v0#v`:V l t0$505`/ ayt@r$$If!vh#v0#v`:V l t0$505`/ ayt@r$$If!vh#v0#v`:V l t0$505`/ apyt@r$$If!vh#v0#v`:V l t0$505`/ ayt@r$$If!vh#v0#v`:V l t0$505`/ ayt@r$$If!vh#v0#v`:V l t0$505`/ apyt@r$$If!vh#v0#v`:V l t0$505`/ ayt@r$$If!vh#v0#v`:V l t0$505`ayt@r$$If!vh#v0#v`:V l t0$505`ayt@r$$If!vh#v0#v`:V l t0$505`ayt@r$$If!vh#v0#v`:V l t0$505`ayt@r$$If!vh#v#v:V l t0$55/ apytJ>$$If!vh#v#v:V l t0$55/ aytJ>$$If!vh#v#v:V l t0$55aytJ>$$If!vh#v#v:V l t0$55aytJ>$$If!vh#v#v:V l t0$55aytJ>$$If!vh#v#v:V l t0$55aytJ>$$If!vh#v#v:V l t0$55/ aytJ>$$If!vh#v#v:V l t0$55/ apytJ>$$If!vh#v#v:V l t0$55/ aytJ>$$If!vh#v#v:V l t0$55/ apytJ>$$If!vh#v#v:V l t0$55/ aytJ>$$If!vh#v#v:V l t0$55aytJ>$$If!vh#v#v:V l t0$55/ aytJ>$$If!vh#v#v:V l t0$55/ apytJ>$$If!vh#v#v:V l t0$55/ aytJ>$$If!vh#v#v:V l t0$55aytJ>$$If!vh#v#v:V l t0$55/ / /  / Bapyt$$If!vh#v#v:V l t0$55/ / /  / Bayt$$If!vh#v#v:V l t0$55/ / /  / Bapyt$$If!vh#v#v:V l t0$55/ /  /  / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / /  Bayt$$If!vh#v#v:V l t0$55/ / /  / Bapyt$$If!vh#v#v:V l t0$55/ /  /  / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / /  Bayt$$If!vh#v#v:V l t0$55/ / /  / Bapyt$$If!vh#v#v:V l t0$55/ /  /  / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / Bayt$$If!vh#v#v:V l t0$55/  / / / ayt(/$$If!vh#v#v:V l t0$55/  / / /  Bayt$$If!vh#v#v:V l t0$55/ / /  / Bapyt$$If!vh#v#v:V l t0$55/ /  /  / Bayt$$If!vh#v#v:V l t0$55/  / / /  Bayt$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4ytJ$$If!vh#v#v :V l4 t06,55 f4yt$$If!vh#v#v :V l4 t06,55 f4yt$$If!vh#v#v :V l4 t06,55 f4yt$$If!vh#v#v :V l4 t06,55 f4ytjh 666666666~~~vvvvvv6666>6666666666666666666666666666666666666666666666hH66666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ OJPJQJ_HmH nH sH tH L`L Normal$CJOJPJQJ_HaJmH sH tH 6@6 OV Heading 1@&aJ0P@P g) Heading 2$$@&a$5CJPJ\aJR@R r Heading 3$$@&5OJPJQJ\^JZ@Z OV Heading 5 <@& 56CJOJPJQJ\]aJ\@\  Heading 6$$@&6B*OJPJQJ]^Jph$?`^@^  Heading 8$$@&!B*CJOJPJQJ^JaJph@@@DA`D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List O Section Heading"N0P a$m$/56@B*CJ0KHOJPJQJ^JaJphb>@b Title,POm$)@B*CJ4KHOJPJQJ^JaJ4ph6]VoV  Title Char)@B*CJ4KHOJPJQJ^JaJ4ph6]Ro!R OVHeading 1 Char56CJ0OJPJQJ^JaJ0Ro1R g)Heading 2 Char5CJOJPJQJ\^JaJRoAR rHeading 3 Char5CJOJPJQJ\^JaJXoQX OVHeading 5 Char$56CJOJPJQJ\]^JaJ\oa\ Heading 6 Char'6B*CJOJPJQJ]^JaJph$?`VoqV Heading 8 Char!B*CJOJPJQJ^JaJph@@@6U`6 0 Hyperlink >*B*phH@H  Balloon TextCJOJQJ^JaJRoR 0Balloon Text CharCJOJPJQJ^JaJ^@^  List Paragraphd^CJOJPJQJ^JaJlol Default1$7$8$H$5B*CJOJPJQJ^J_HaJmH nHphsH tHVOV 0Section Main TextB*CJPJaJhph4^@4 0 Normal (Web)< A< p TOC Heading d@& 2@2 J{3pTOC 1 d! 4@4 "OVHeader !H$Fo!F !OV Header CharCJOJPJQJ^JaJ4 @24 $OV0Footer #H$FoAF #OV0 Footer CharCJOJPJQJ^JaJ2)`Q2 OV Page Number^J$oa$ 8em16]^or^ .Normal1'd-B*CJOJPJQJ^J_HmH phsH tH t t m Table Grid7:V(0 (dXOX *J 01-Level A)1$7$8$H$5CJ$OJPJQJ^JRoR )J01-Level A Char5CJ$OJPJQJ^JaJF@F ,J Footnote Text+CJOJPJQJToT +JFootnote Text CharCJOJPJQJ^JaJD&`D JFootnote ReferenceH*^JDZ@D /J Plain Text.CJOJ PJQJ aJNoN .JPlain Text CharCJOJ PJQJ ^JaJo J WP Defaults=0 8`0p@ P !$`'0*- CJOJPJQJ_HmH sH tH D@DupTOC 31d$ ^]mHnHuJ@J g)pTOC 22d$ ^CJOJQJ^JaJNa1N VPIntense Emphasis56B*\]phO*W`A* V`Strong5\BQB `apple-converted-spaceB'`aB NL0Comment ReferenceCJaJtOrt  Medium List 2 - Accent 417d^CJOJPJQJ^JaJtOt  Colorful List - Accent 128d^CJOJPJQJ^JaJ2o2 S\B0A3B*CJ^JaJphJOJ S\B0Pa1 :d1$B*OJPJQJ^JphtH @O@ r sublevel2;dd[$\$PJ(( rsubindex@O@ r sublevel3=dd[$\$PJ^o^ 3Normal1>d-B*CJOJPJQJ^J_HmH phsH tH <@< @0 Comment Text?CJaJRoR ?0Comment Text CharCJOJPJQJ^JaJ@j@@ B5eq0Comment SubjectA5\^o!^ A5eq0Comment Subject Char5CJOJPJQJ\^JaJH@H g)pTOC 4Cdd^CJOJQJ^JaJH@H g)pTOC 5Ddd^pCJOJQJ^JaJH@H g)pTOC 6Edd^LCJOJQJ^JaJH@H g)pTOC 7Fdd^(CJOJQJ^JaJH@H g)pTOC 8Gdd^CJOJQJ^JaJH@H g)pTOC 9Hdd^CJOJQJ^JaJXoX P73 :VI44 Id!B*CJOJPJQJ^JaJphbob P70:VJ4 s44 Jd!B*CJOJPJQJ^JaJphbob 9@64:VK4 s44 Kd!B*CJOJPJQJ^JaJphXoX 9@65 :VL44 Ld!B*CJOJPJQJ^JaJphbob X48:VM4 s44 Md!B*CJOJPJQJ^JaJphbob *B*ph.X`!. Y<@Emphasis6]2o12 Y<0A9B*CJ^J aJphOA Y<hvrRoQR VY<0Endnote Text CharCJOJPJQJ^JaJ<+@b< UY<0 Endnote TextVCJaJ^or^ Y<Normal2Wd-B*CJOJPJQJ^J_HmH phsH tH   Y<def2 Y<st1\O\ ~lESE Report NameZdp5B*CJ$OJPJQJphHOH ~l Agency Title[5CJOJPJQJ<O< ~larial9\]CJOJPJQJLOL ~l BoardMembers]a$CJOJPJQJaJNON ~l Permission^a$6CJOJPJQJ]aJ`0@` OU List Bullet_ F\dx^hB*OJPJQJ^JhphoB tGuiding Principal Statement`$dxxa$#5CJOJPJQJ_HmH sH tH 2B2 bt0 Body TextaxLo!L at0Body Text CharCJOJPJQJ^JaJXo2X [Normal3c-B*CJOJPJQJ_HaJmH phsH tH boCb [21:Vd4 s44 dd!B*CJOJPJQJ^JaJphboSb [20:Ve4 s44 ed!B*CJOJPJQJ^JaJph^ob^ {Normal4fd-B*CJOJPJQJ^J_HmH phsH tH P`rP70Revisiong$CJOJPJQJ_HaJmH sH tH PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] v$' Z*_@szZ8OjN9w4r,j xSSSSSSSSSSSSSUW000000   hhjFFHHHH$$$$$$$$$$$$$'# sHQ/!q&*,-/02X6:d@BFIBMvSX\e%l{~YlTGս7<7OGdMLaeQ u m /Xd!["'2,25;|>@D2GI^K]MjPiTmW[a&ejortvwzt|}~}Lx:|@p ˟ &VxӮ a8M޸$*./1235689:;=>?ABHRTUWXZ\^bhjklnx~*2=EIJLMNPYckv #*-1:@DIMOPRSTUVXY[]] 4L #!Z!!""""U###8$u$$%M%%%"&s&&'n''$((()R)))*Z***M++,,-P-z--C.p..Z2<_Hq[ n~ɀހlmuv~w!fdIOo }hCTpEWL(I kFFXsvW '=LmIs;Lcv Xy>S[\ k      8   l } )jC sx]  [!! "t""##$$%%8&&&'$((,)*I***+3,,-..b/30F00-111223d45%5h55`66!707889~:g;;"<]<<==O>q>??@DM^MNVNNOmOOOPQWQQQRRxS+TTT^UU7VVaWWXXXVYZZZo[[d\\]m^^__`a~ab|bbYc*drdeeeeffg[gkg&hhiijj*llmm nqnn2oompp>qbqqKrrtuDvv`wwvxzWz{|d}}~~~wX|zKcԅч+2Dы>ތ2ێ{ϑ˓@Y4qt`ɞnʟʠ9-YX]]ڪUʮQ| Y_U޵@/ɸwڻ?ƽ~@. P޸      !"#%&'()+,-047<@CDEFGIJKLMNOPQSVY[]_`acdefgimopqrstuvwyz{|}      !"#$%&'()+,-./013456789:;<>?@ABCDFGHKOQRSTUVWXZ[\]^_`abdefghijlmnopqrstuwxyz{|}~     !"$%&'()+,./023456789;<=>?ABCEFGHJKLNQWZ^*FI  S o q   , H K [ w z   |+3&F'~''(:(S(((() )P))V*>+?W?}9~J~~~aÆ׆Hϩ*blз7]~ܸ[Ļü,a#Chؾ]ֿ,t %%%%%%%%%%%%%XXXXXXXXXXXXXXXXXXXXXXXXXXXX $&6NPWor+-0HJ '!!!!!!!!!!!!T # @H 0(  0(  B S  ? _Toc446890868 _Toc447790921 _Toc452472869 _Toc415747951 _Toc452472870 _Toc415747953 _Toc448958794 _Toc448958887 _Toc451262430 _Toc451262765 _Toc451859850 _Toc451262431 _Toc451262766 _Toc451859851 _Toc415747955 _Toc415747980 _Toc452472871 _Toc448958796 _Toc448958889 _Toc451262433 _Toc451262768 _Toc451859853 _Toc448958797 _Toc448958890 _Toc451262434 _Toc451262769 _Toc451859854 _Toc448958798 _Toc448958891 _Toc451262435 _Toc451262770 _Toc451859855 _Toc415747956 _Toc415747981 _Toc452472872 _Toc419475029 _Toc448958800 _Toc448958893 _Toc451262437 _Toc451262772 _Toc451859857 _Toc419475030 _Toc448958801 _Toc448958894 _Toc451262438 _Toc451262773 _Toc451859858 _Toc419475031 _Toc448958802 _Toc448958895 _Toc451262439 _Toc451262774 _Toc451859859 _Toc419475032 _Toc448958803 _Toc448958896 _Toc451262440 _Toc451262775 _Toc451859860 _Toc419475033 _Toc448958804 _Toc448958897 _Toc451262441 _Toc451262776 _Toc451859861 _Toc451262442 _Toc451262777 _Toc451859862 _Toc420935314 _Toc452472873 h.44sinio _Toc420935315 _Toc452472874 _Toc419044387 _Toc448958900 _Toc451262781 _Toc451859866 _Toc420912259 _Toc420935316 _Toc448958901 _Toc451262782 _Toc451859867 h.3znysh7 _Toc420912260 _Toc420935317 _Toc448958902 _Toc451262783 _Toc451859868 h.2et92p0 _Toc420912261 _Toc420935318 _Toc448958903 _Toc451262784 _Toc451859869h.tyjcwt _Toc420912262 _Toc420935319 _Toc448958904 _Toc451262785 _Toc451859870 _Toc420935320 _Toc452472875 h.4d34og8 _Toc420912265 _Toc420935321 _Toc448958906 _Toc451262787 _Toc451859872 _Toc420912264 _Toc420935322 _Toc448958907 _Toc451262788 _Toc451859873 h.2s8eyo1 h.17dp8vu _Toc420912266 _Toc420935323 _Toc448958908 _Toc451262789 _Toc451859874 h.3rdcrjn _Toc420912267 _Toc420935324 _Toc448958909 _Toc451262790 _Toc451859875 h.26in1rg _Toc420912268 _Toc420935325 _Toc448958910 _Toc451262791 _Toc451859876h.lnxbz9 _Toc420912269 _Toc420935326 _Toc448958911 _Toc451262792 _Toc451859877 h.35nkun2 _Toc420912270 _Toc420935327 _Toc448958912 _Toc451262793 _Toc451859878 _Toc420912271 _Toc420935328 _Toc452472876 _Toc420935329 _Toc452472877 _Toc418750957 _Toc418757675 _Toc418761718 _Toc419044398 _Toc420912273 _Toc420935330 _Toc448958915 _Toc451262796 _Toc451859881 _Toc420912274 _Toc420935331 _Toc448958916 _Toc451262797 _Toc451859882 h.4i7ojhp _Toc420912275 _Toc420935332 _Toc448958917 _Toc451262798 _Toc451859883 h.2xcytpi _Toc420912276 _Toc420935333 _Toc448958918 _Toc451262799 _Toc451859884 _Toc420935334 _Toc452472878 _Toc420912278 _Toc420935335 _Toc448958920 _Toc451262801 _Toc451859886h.qsh70q _Toc420912279 _Toc420935336 _Toc448958921 _Toc451262802 _Toc451859887 h.3as4poj _Toc420912280 _Toc420935337 _Toc448958922 _Toc451262803 _Toc451859888 h.1pxezwc _Toc420912281 _Toc420935338 _Toc448958923 _Toc451262804 _Toc451859889 _Toc420935339 _Toc452472879 _Toc420912283 _Toc420935340 _Toc448958925 _Toc451262806 _Toc451859891 h.147n2zr _Toc420912284 _Toc420935341 _Toc448958926 _Toc451262807 _Toc451859892 h.3o7alnk _Toc420912285 _Toc420935342 _Toc448958927 _Toc451262808 _Toc451859893 h.23ckvvd _Toc420912286 _Toc420935343 _Toc448958928 _Toc451262809 _Toc451859894 _Toc420935344 _Toc452472880 _Toc420912288 _Toc420935345 _Toc448958930 _Toc451262811 _Toc451859896 h.1hmsyys _Toc420912289 _Toc420935346 _Toc448958931 _Toc451262812 _Toc451859897 h.41mghml _Toc420912290 _Toc420935347 _Toc448958932 _Toc451262813 _Toc451859898 h.2grqrue _Toc420912291 _Toc420935348 _Toc448958933 _Toc451262814 _Toc451859899 _Toc420935349 _Toc4524728811    &&&Z*Z*Z******@.@.@.@.@.66666_@_@_@5D5D5D5D5D5DvKvKvKvKvKvKSSSSSS\\\\\\bbbbbbphphphsskzzzz{{{[}[}[}[}[}ʃʃʃʃʃʃyyyyyy((((VVVVVVV555555BBBBBBIIIIIIIIIoopppOOOPPPZZhhhhhXXXXXXqqqqqq     %%%%%%""""""******88EEEEEMMMMMMtStStStStStS/\/\/\/\/\/\NjNjƻ  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHcIJKLMNOPQRSTUVWXYZ[\]^_`abdefghijklmnopqrstuvwxyz{|}~   &&&********L.L.L.L.L.66666q@q@@RDRDRDRDRDRDKKKKKKSSSSSS]]]]]]bbbbbbhhhsskz{{{{{v}v}v}v}v}ʃy22222VVaaaaa5>>>>>BOOOOO**wwwwww}}}OggXq//555%TTZZZ"9"9">">">"******88'E'E-E-E-EMNNNNNtSSSSSS/\U\U\Z\Z\Z\WjWjƻ 6>~  im3X^$)?K1=% - . 3 !!!!!!""V#]###b$i$$$U%Y%%%c&j&&&c'l's1{1 II9LBLRLZL\L_LVNwTTqquu3344SSpp ~Y_  ] ]ee^r7s+ }22RR~UUFZLZVbҷ޷:H^cʹgtһܻx TTqquu3344SSpp33333333333333333333333333333333333   wTTqquu3344SSppn:k;;dF"ciZN?jI .8%zG :pw$j ^2\_H >@>"s 6p%t>: +>as4CRVkW n.LV`ܾ7S|7`ArxSt]pF`jτQf[>xvY[;u%Q,w XQi D̨<-#2T#>@>K$d S%:!kuw%:N&LJ} 'T5}.)45<Gu,dC~:->@>G-XE0<,~0b0ؾ 3nC>dRf>u?4,Zp?STm-?ꥪ SAH'BxV$8B=D:Cd1FjZ0G:KjXvU`KE?IPR2 ("Rv0yLR:E S|_fU`=RW\mW|WW4"1{XVTXX'hh;YjR{p|Zn;jLq[8F0Sq[\W(`d ]HQ87^3&LO^Ȯ,_^Jc~abk4c$h[dhgVTIi$c$i^5nNjz2I n,FotV|Sr@Rx,r>Xs()VuIN%xYJIxgexzv|xƁVHy|zr(Hzm0,i{prj{( 27|k7gH~6!~IG^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(8^8`OJPJQJ^J%^`OJPJQJ^Jo p^ `pOJPJQJ^J% @ ^ `@ OJPJQJ^J%x^x`OJPJQJ^JoH^H`OJPJQJ^J%^`OJPJQJ^J%^`OJPJQJ^JoP^`POJPJQJ^J%h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*% ^`OJQJo(^`OJ QJ ^J o(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o P^P`OJ QJ o(hh^h`CJOJQJo(88^8`CJOJ QJ o(o^`CJOJ QJ o(  ^ `CJOJ QJ o(  ^ `CJOJ QJ o(xx^x`CJOJ QJ o(HH^H`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o( ^`OJQJo(^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o( h^h`OJQJo(8^8`OJ QJ ^J o(o ^`OJ QJ o(  ^ `OJQJo( ^ `OJ QJ ^J o(o x^x`OJ QJ o( H^H`OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( [ ^[ `OJQJo(+^+`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o k^k`OJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(8^`8. ^` .p,^p`,.@ ^@ `.^`. !^` !.%^`%.+^`+.P1^P`1.8^8`o(.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^h`56CJOJPJQJ^J.8^8`.T^`T. p^ `p. @ ^ `@ .x^x`.H^H`.^`.4^`4.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(hh^h`CJOJQJo(88^8`CJOJ QJ o(o^`CJOJ QJ o(  ^ `CJOJ QJ o(  ^ `CJOJ QJ o(xx^x`CJOJ QJ o(HH^H`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(#h^`h56B*CJOJPJQJ^Jph.8^`856)p^p`.@  ^@ ` . ^` .,^`,.H^`H.^`.P^P`.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o ^^^`OJ QJ o( . ^. `OJQJo( ^ `OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(n^n`OJ QJ ^J o(o >^>`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o P^P`OJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(hh^h`CJOJQJo(88^8`CJOJ QJ o(o^`CJOJ QJ o(  ^ `CJOJ QJ o(  ^ `CJOJ QJ o(xx^x`CJOJ QJ o(HH^H`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(8^`8. ^` .p,^p`,.@ ^@ `.^`. !^` !.%^`%.+^`+.P1^P`1.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%h^h`.8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.8^`8OJPJQJ^Jo(. ^` .p,^p`,.@ ^@ `.^`. !^` !.%^`%.+^`+.P1^P`1.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h)8^`8.p^p`.@  ^@ ` . ^` .,^`,.H^`H.^`.P^P`.^`>*OJPJQJ^J%x^`x>*OJPJQJ^J%p^p`>*OJPJQJ^J%@ X ^@ `X >*OJPJQJ^J%(^`(>*OJPJQJ^J%81^`81>*OJPJQJ^J%9^`9>*OJPJQJ^J%B^`B>*OJPJQJ^J%PJ^P`J>*OJPJQJ^J% h^h`56CJ)8^8`)T^`T. p^ `p. @ ^ `@ .x^x`.H^H`.^`.4^`4.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(8^8`56)p^p`.@  ^@ ` . ^` .x^`x.^`.^`.P^P`. l^ `l.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h)8^`8.p^p`.@  ^@ ` . ^` .,^`,.H^`H.^`.P^P`.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h)8^`8.p^p`.@  ^@ ` . ^` .,^`,.H^`H.^`.P^P`.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^h`56CJOJPJQJ^J. 8^8`OJQJo(T^`T. p^ `p. @ ^ `@ .x^x`.H^H`.^`.4^`4.8^`8>*OJPJQJ^J% ^` >*OJPJQJ^J%px^p`x>*OJPJQJ^J%@ ^@ `>*OJPJQJ^J%^`>*OJPJQJ^J%X ^`X >*OJPJQJ^J%%^`%>*OJPJQJ^J%+^`+>*OJPJQJ^J%P81^P`81>*OJPJQJ^J%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^h`.8^8`56)T^`T. p^ `p. @ ^ `@ .x^x`.H^H`.^`.4^`4.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(8^`8OJPJQJ^Jo(. ^` .p,^p`,.@ ^@ `.^`. !^` !.%^`%.+^`+.P1^P`1.^`o()^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`>*OJPJQJ^J%x^`x>*OJPJQJ^J%p^p`>*OJPJQJ^J%@ X ^@ `X >*OJPJQJ^J%(^`(>*OJPJQJ^J%81^`81>*OJPJQJ^J%9^`9>*OJPJQJ^J%B^`B>*OJPJQJ^J%PJ^P`J>*OJPJQJ^J%^`>*OJPJQJ^J%x^`x>*OJPJQJ^J%p^p`>*OJPJQJ^J%@ X ^@ `X >*OJPJQJ^J%(^`(>*OJPJQJ^J%81^`81>*OJPJQJ^J%9^`9>*OJPJQJ^J%B^`B>*OJPJQJ^J%PJ^P`J>*OJPJQJ^J%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`)^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`>*OJPJQJ^J%x^`x>*OJPJQJ^J%p^p`>*OJPJQJ^J%@ X ^@ `X >*OJPJQJ^J%(^`(>*OJPJQJ^J%81^`81>*OJPJQJ^J%9^`9>*OJPJQJ^J%B^`B>*OJPJQJ^J%PJ^P`J>*OJPJQJ^J%h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%h^h`CJOJQJo( ^`OJ QJ o(o p^p`OJ QJ o( @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o P^P`OJ QJ o(h^`h.8^`8.p^p`.@  ^@ ` . ^` .,^`,.H^`H.^`.P^P`.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(8^`8>*OJPJQJ^J% ^` >*OJPJQJ^J%px^p`x>*OJPJQJ^J%@ ^@ `>*OJPJQJ^J%^`>*OJPJQJ^J%X ^`X >*OJPJQJ^J%%^`%>*OJPJQJ^J%+^`+>*OJPJQJ^J%P81^P`81>*OJPJQJ^J%h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`>*OJPJQJ^J%x^`x>*OJPJQJ^J%p^p`>*OJPJQJ^J%@ X ^@ `X >*OJPJQJ^J%(^`(>*OJPJQJ^J%81^`81>*OJPJQJ^J%9^`9>*OJPJQJ^J%B^`B>*OJPJQJ^J%PJ^P`J>*OJPJQJ^J%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%^`>*OJPJQJ^J%x^`x>*OJPJQJ^J%^`>*OJPJQJ^J%pX ^p`X >*OJPJQJ^J%@ (^@ `(>*OJPJQJ^J%81^`81>*OJPJQJ^J%9^`9>*OJPJQJ^J%B^`B>*OJPJQJ^J%J^`J>*OJPJQJ^J%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`h>*%8^`8>*%p^p`>*%@  ^@ ` >*% ^` >*%x^`x>*%H^`H>*%^`>*%P^P`>*%^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o( hh^h`OJQJo(88^8`.^`.  ^ `.  ^ `.xx^x`.HH^H`.^`.^`.^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(nU`KFoZp?nC>[d5}.)Q87^mWLO^H $8B`d ]XX;dAq>h;Yf>u?i :k~0HzC_a:rj{ +yLR7|{2u4<-#_/%;d1F SA`AjLq[>XsYx,r~IPQfI u%"s p|ZS%Gu,S 'hgV`B;:N&kWF"c'B n|xG-GDm-?_fU%xpF_74K$0Sq[JIxTIi("R7gH~CRVSt=RWE0O4x5:E S>jr9,;0G:Kexzi"1{X,_^WWq18kuw%w$j >as0,i{N?)Vuc~ab%t,w VHyc$i%zG nNjG5OHr(H! KGmZGLONNvsMOjRMOjR RP Q `,a}Q&LSl7U K(HmUUx(QtXhupJXHmU$wMYZ Q$0Z9]rI_ `lf]Nr`jRcbjR6n djRId!<} Ga u 8 JF x %6>[0;eS.Y}KYo2:t'5oMqW\^{hg$NfuuKSdKM ~Gc !!.5!"%"q+"{"'#>#i#|#;$@%oY%=e%&LP&}&hL'l'$'f(~S(N)q) )|)*n* +z++7+W;+P+W+,-5,8,-,-c-e-2].`.(/-e/1s/pv/>01a-2 ?2E2N2uk23y33J{3D 4 F4s4"5#=5M557E8(8,9U9p9+;:p;z;Y<f<f=8=E=X>F}>L?Q?9@r+@S1@b2@I@;AAAOASWA?BS\Bc]BCMCwC D)VEIFmFX~FodGH4HMWnWzX1Y3YPY9 Z82ZC8Z?QZlZ|Z*[_d[u[,3\e\i|\67][]E+_g_0`. `h3`.7`r`a!aD$ab.bc8c^}c!d; dy.d#eEeQeZ'f g0g. hEhY'bJ>3?Ej F?>\~lnOC +W-^Q24=gy\8f/xN%9:Q&S 2kGfSO@`U$<-CJa.X`e"JrKyMFf8aGK[:emB#3k5fixN v!89\tD"7-J]rF62a&0b+_(45.KMb.NC{Mi +HAdTivOUbK *GMfj& 4E-663 Bf:VT/~xz@4@8@p @UnknownG*Ax Times New Roman5Symbol3. *Cx Arial7.@Calibri5. .[`)Tahoma9Perpetua7& [ @Verdana7@CambriaG=  jMS Mincho-3 fg95  @ ConsolaskWarnock Pro SmBdWarnock Pro SmBd?= *Cx Courier New;WingdingsA$BCambria Math#1hGZGGZG@FB}-C~0!p8x0NHP  $Pj! xxE@E KDigital Literacy and Computer Science (DLCS) Curriculum Framework June 2016ESE Sandra Paonen                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m Oh+'0  < H T `lt|LDigital Literacy and Computer Science (DLCS) Curriculum Framework June 2016ESENormalSandra Paone2Microsoft Office Word@@h9@RtXjG@RtXjGB}՜.+,D՜.+,< hp   Microsoft- LDigital Literacy and Computer Science (DLCS) Curriculum Framework June 2016 Title X&6jv  _PID_HLINKS metadate_dlc_DocIdItemGuidContentTypeId_vti_RoutingExistingProperties_dlc_DocIdPersistId _dlc_DocId _dlc_DocIdUrlAg3{Hhttp://compnetworking.about.com/od/traceipaddresses/qt/ip-blacklist.htmu(xThttp://www.mass.gov/berkshireda/crime-awareness-and-prevention/sexting/sexting.htmlWu1http://whatis.techtarget.com/definition/operator9-r http://www.merriam-webster.com/{+o'http://www.speedguide.net/glossary.phpTl5http://www.catb.org/jargon/html/meaning-of-hack.htmlEihttp://www.webopedia.com/'nfGhttp://www.digitalstrategy.govt.nz/Media-Centre/Glossary-of-Key-Terms/s*chttp://itlaw.wikia.com/MG`http://techterms.com/(|]http://idea.ed.gov/!7Zhttps://www.wikipedia.org/YW%http://www.computingatschool.org.uk/7rT'http://en.wikipedia.org/wiki/AlgorithmA*Q.http://en.wikipedia.org/wiki/Computer_program\HN=http://en.wikipedia.org/wiki/High-level_programming_language2PK0http://itlaw.wikia.com/wiki/Digital_informationq H.http://en.wikipedia.org/wiki/Boolean_datatypezE2http://en.wikipedia.org/wiki/Programming_languageX;B.http://en.wikipedia.org/wiki/Computer_science4~?Uhttp://www.collegeboard.com/prod_downloads/computerscience/Learning_CSPrinciples.pdf{y<|https://secure-media.collegeboard.org/digitalServices/pdf/ap/ap-computer-science-principles-course-and-exam-description.pdfY9%http://www.computingatschool.org.uk/6-http://www.iste.org/standards/iste-standardsF3"http://www.ala.org/aasl/standardsO0?http://csta.acm.org/Curriculum/sub/CurrFiles/CSTA_K-12_CSS.pdfG-%http://www.masscue.org/pages/MassCUE'*UC:\Users\Amne\AppData\Local\Microsoft\Windows\INetCache\IE\YWHV5ETE\masscan.edc.org\ Jul 18 2016(675f4903-2c04-42b4-ac63-0db28f5740c9,0x010100524261BFE874874F899C38CF9C771BFF1DESE-231-25675lhttps://sharepoint.doemass.org/ese/webteam/cps/_layouts/DocIdRedir.aspx?ID=DESE-231-25675, DESE-231-25675  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`bcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F CkjGData a1TableiWordDocumentSummaryInformation(DocumentSummaryInformation8MsoDataStore @@kjGBkjGHZXSIWHNVQ==2@@kjGPBkjGItem  %Properties}VQVECI25J==2  @@kjGwBkjGItem  PropertiesOTEE2ZUK3X4UOO==2@@kjGBkjGItem eProperties6AMZD2UCYJITQ==2@@kjGBkjGItem <Properties@UCompObjFr This value indicates the number of saves or revisions. The application is responsible for updating this value after each revision.   !"#$%&'()*+,-./012345789:;=>?ABCDEG DocumentLibraryFormDropOffZoneRoutingFormDocumentLibraryForm Document ID GeneratorSynchronous100011000Microsoft.Office.DocumentManagement, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71e9bce111e9429cMicrosoft.Office.DocumentManagement.Internal.DocIdHandlerDocument ID GeneratorSynchronous100021001Microsoft.Office.DocumentManagement, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71e9bce111e9429cMicrosoft.Office.DocumentManagement.Internal.DocIdHandlerDocument ID GeneratorSynchronous100041002Microsoft.Office.DocumentManagement, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71e9bce111e9429cMicrosoft.Office.DocumentManagement.Internal.DocIdHandlerDocument ID GeneratorSynchronous100061003Microsoft.Office.DocumentManagement, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71e9bce111e9429cMicrosoft.Office.DocumentManagement.Internal.DocIdHandler   F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q