ࡱ> |~{y Nbjbj 1{{D} RRRffff4$f,(I~,b,d,d,d,d,d,d,$.1^,Rd '"Id d ,A,&&&d 8Rb,&d b,&&V+@:,`Ej!+(N,,0,, 1$1,1R,4 &}|k   ,,%   ,d d d d 1          :  Computer And Network Information Company Name Prepared by Nick Clements  Phone: 123-456-7890 Email@domainname.com Binder Table of Contents Last Updated: ____________ Binder Tab: Table of Contents Binder Tab: Tech Notes Fix-It List Priorities Fix-It Request List Notes Sheet Tech Notes / Event Logs Backup Log Binder Tab: Network Specifications Network Diagram Network Summary Shared Resources Exchange Specifications Server Software Specifications IP Address Allocation Router Configuration Firewall Configuration Binder Tab: Machine Specifications Machine Specs Binder Tab: Users / Products Product Info Users Internet Domain Registrations Binder Tab: Forms Forms Backup Procedure Backup Log Backup Labels Fix-It Request List Machine Spec Sheet Monthly Maintenance Checklist Password Policy Notes Sheet Users Sheet Fix-It Request List For: Priority Date Problem Comment/Completion Notes Fix-It Priorities Memo You determine the priority of each task. You may wish to assign different priorities to the items on this list. Note that this is a 4-point scale. Here are some guidelines for assigning priorities. Most desktop issues are priority 3 or 4.  SHAPE  Please use these criteria when assigning new tasks. Note that you will never assign a Priority One. Priority One tasks assign themselves when an emergency happens. Backup Record Company:Company Name  EMBED Microsoft Office Excel Worksheet  Note: Date is the date the backup begins Notes For: Date Notes Tech Network Summary Company: Company Name ________________________________________________________________________ ISP: Name: Tech Support Phone Number: Circuit ID or Account # Router IP Address: Router User / Password: Notes: Firewall IP Address: Firewall User /Password: Notes: LAN IP Address Range: WAN/Public Address Range: Notes: Desktop Configuration: -DNS 1 & 2: -Default Gateway: -WINS Server: Domain Controller: -Name: -IP Address: -Administrator Password Network Printers: -Name / Make / Model / IP Address / Physical Location -Name / Make / Model / IP Address / Physical Location -Name / Make / Model / IP Address / Physical Location Notes: Backup Software: -Brand -Version Notes: Shared Resources Company:_Company Name__ Date:_______________ Data Shares and Shared Printers* Description Server Physical Location Access Groups Permission Example Primary Public Folder Server1 d:\data Domain User Change Domain Admins Full Control *A Shared Printer is one that is physically attached to a computer (server or workstation) and shared on the domain/network. This is managed very much like a data share. This is different from a Network Printer, which is connected directly to the network. Generally speaking, users can print directly to Network Printers. If you have a large enough printer demand, you may manage a Network Printer through a server, in which case it appears to users as a Shared Printer. This is becoming less useful as printer memory and self-management increases. Network Printers Description PortType IP Address Access Groups Permission Example HP 4600 JetAdmin 192.168.1.10 N/A Print All Exchange Specifications Company:_Company Name___ Date:_______________ Organization Name: Administrative Groups: -First Administrative Group: Servers: - - Domain Name: Administrative Password: Active Directory Password: Notes: Server Software Summary Company:_Company Name____ Server Machine Name: Operating System: Backup Software: -Notes Defragmentation Software: -Notes Anti-Virus Software: -Notes Other: Description: --Notes: Other: Description: --Notes: Other: Description: --Notes: Other: Description: --Notes: Notes: IP Address Allocation Company:__Company Name__ Date:_______________ This is an overview of how IP Addresses are allocated in the organization. Network and Subnet: _______________ / _______________ IP Address RangeUsed For From To Network EquipmentServers Printers DHCP Range used by desktop machines These are allocated by the (Server)(Router)(Other:____________)RAS IPs (allocated by _____________)Hosts file contains:For Use by ______________________________ IPs: Hard-Coded IP Address Allocation Company:_Company Name___ Date:_______________ The Following Devices have a dedicated IP Address: Network and Subnet: _______________ / _______________ IP AddressUsed For  Router Configuration Company:_Company Name__ Date:_______________ Router:_______________________________ Serial Number:___________________ Firmware Version:________________ Username: ______________________ (case sensitive) Password: ______________________ (case sensitive) ISP:__________________________________ Contact:_________________________/______Ph:_________________________ Information needed for ISP Security:____________________________________ PPPOE or other username:____________________________________________ Password:_________________________________________________________ Telco Circuit Number:___________________ WAN gateway: ________________________/_______________255.555.255.________ Router WAN Address:__________________/________________255.255.255.________ Router LAN Address:__________________/_________________255.255.255.________ ISP-assigned DNS 1: ____________________ DNS 2: ______________________ Notes: Firewall Configuration Company:_Company Name__ Date:_______________ Firewall:_______________________________ Serial Number:___________________ Firmware Version:________________ Username: ______________________ (case sensitive) Password: ______________________ (case sensitive) Firewall Managed By:__________________________________ Contact:_________________________/______Ph:_________________________ Information needed to Contact Security:_________________________________ Firewall gateway: ____________________________/__________255.555.255.________ Firewall WAN/untrusted Address:_______________/___________255.255.255._______ Firewall LAN/trusted Address:__________________/___________255.255.255._______ Summary of Settings and Terminology: ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ Open Ports: Service Port# From (Public IP) To (Private IP) Email 25 ________________ _____________ Email 110 ________________ _____________ HTTP 80 ________________ _____________ HTTPS 443 ________________ _____________ DNS 53 ________________ _____________ RDP 3389 ________________ _____________ Ping n/a ________________ _____________ PPTP 1723 ________________ _____________ RWW(https) 4125 ________________ _____________ Other_______ ____ ________________ _____________ Other_______ ____ ________________ _____________ Other_______ ____ ________________ _____________ Other_______ ____ ________________ _____________ Other_______ ____ ________________ _____________ Other_______ ____ ________________ _____________ Machine Specifications Computer Configuration Specifications Machine: _______________________________ Last Updated:_________________ User: ________________________________ Machine was New:_____________ Machine Description: Serial Number: CPU: /Slot Type: RAM: RAM slots: Operating Systems: TCP/IP Address: Hard Drive 0: Hard Drive 1: Hard Drive 2: NIC 1: NIC 2: Video Notes: Sound Notes: Other: Other: Notes: User Record Company:_Company Name _ UserUser NamePassword  Internet Domain Registration Information Organization:____________________________________________ Domain Name:___________________________________________ Last Updated:__________________ Registrar (e.g., Network Solutions): ___________________________ Admin Account Number / Username: __________________________ Password: ____________________________ Admin Contact: ___________________________________________ Admin Email: _____________________________________________ Admin NIC Handle: ________________________________________ Tech Contact: _____________________________________________ Tech Email: _______________________________________________ Tech NIC Handle: __________________________________________ Billing Contact: ____________________________________________ Billing Email: ______________________________________________ Billing NIC Handle: _________________________________________ Primary Domain Name Server: _________________________ _____________________ Secondary Domain Name Server: _______________________ _____________________ Notes: ________________________________________________________________________________ ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ Backup Procedures Backup Procedures for: ______________________ Morning Procedures The backup should be compeleted when you arrive in the morning. If the tape drive has an eject feature, the tape may be ejected. Remove tape from tape machine. Put in new tape Log: On the backup Log, note the tape number and related job information. Tape Rotation Tapes are not labeled Monday, Tuesday, Wednesday, etc. They are labeled by number. We begin the rotation with the lowest number and use the next-highest number each day. If you always keep 7-10 tapes in rotation, you will minimize the number of times each tape is used. This increases the probability that a backup will be successful. The tape you remove on Goes to And is returned on . . . Monday Offsite Thursday or later Tuesday Offsite Friday or later Wednesday Offsite Monday or later Thursday Offsite Tuesday or later Friday Offsite Wednesday or later End of Month For the lasat backup of each month, use the lowest-numbered available tape (if you used the tape in the last few days it is not available for this). When the last backup of the month is finished, label the tap End of Month __________ (fill in the month). Take this tape offsite permanently and never use it again. Each month you will have one end of month tape. The December tape is also End of Year. Be sure to put the administrator password on the End-of-Month tape as you will need it to restore in case of a disaster. These end-of-month tapes become your ultimate safety cushion in a disaster. They are also a snapshot of your business and may be handy for financial records, legal records, etc. Test Restore: At the beginning of each month, it is good practice to take your last backup tape and restore a few files to a temporary directory (you can delete them later). This keeps you familiar with the restore procedure and verifies that you have a working backup. Weekly Maintenance Checklist Date: ________________ Tech: _______ Date:_______ Client Info: __Company Name _____ Contact : _________________________________ Phone: _________________________________ A. Server 1: Check Logs, Settings NOTE: Record These actions in the Server Log! Check NT Logs: Application, Security, System, Directory, DNS, File Replication (copy extreme errors into Tech log with Event log #) Check Exchange Server Logs (C:\program files\exchsrvr\AUGUSTINE.log) Verify incoming, outgoing messages in the exchange SMTP queue (C:\Program Files\Exchsrvr\Mailroot\vsi 1) Check Web Site Logs (C:\winnt.sbs\system32\logfiles\*.*) Verify that Virus Scanner is working as scheduled - REED Symantec System Center (See Antivirus Note in Binder if Any) Check Disc Space on Server Free Spock C: = ______________ out of __________________Gb Augustine C: = _______________out of __________________Gb Reed C: = _______________out of __________________Gb D: = _______________out of __________________Gb Diskeeper Analysis on C: _____________ D:________________ Changes to settings (if any): __________________________ NOTE: Record these actions in the Server Log! B. Backup Check Backup Logs Verify Backup: Restore files from Backup Verify Backup: Restore mailbox from Backup Check Backup Procedure Memo and Follow Off Site Practices if Any C. Updates NOTE: Record these actions in the Server Log! If important patches or updates have been released, apply them to: Windows OS ISA Server Backup Server Exchange Server SQL Server Other: ___________________ Run HFNetCheck or Baseline security Analyzer and apply patches as suggested Run Windows Update Update Virus Signatures on Server Virus program Updates D. Other Bandwidth Test http://www.speakeasy.net/speedtest or http://www.cable-modem.net/features/internet_speed_test.html Download Upload * 1st = __________kb/s 1st = ___________kb/s * 2nd = __________kb/s 2nd = ___________kb/s UPS Logs and Tests Monthly Checks Misc. E. Troubleshooting, Fixes, Notes, and Recommendations Note any problems reported by client. Check the to do list and verify that all items have been addressed. If there are any recommendations for client based on this monthly maintenance, please list them here. __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ Password Policy Company: _Company Name _ Domain: _______________________________ Date:________________________ Your Policy Choices Recommendations Passwords Expire in: _____________________ days 35 Minimum Password Length: _______________ 5-8 Remember: _____________________________Passwords 12 Lockout after: ___________________________attempts 5 Attempts within: _________________________minutes 30 Lockout is for:___________________________ minutes 30 Sample Policy Text: We have adopted the following password security policy for our company. User passwords will expire every ____ days. You will get several warnings prior to when your password expires, and you will be required to change your password. All passwords are must be at least ______ characters long, and can include any letters, numbers, and the following characters: ~ ! @ # $ % ^ & ( ) - _ { } Please Note: Your Password is case sensitive. The system will remember your last: _____ passwords so you will not be able to immediately reuse the same passwords. Should you attempt to log on ____ times with the/an incorrect password, you will be locked out of the network for ____ minutes. Should you forget your password, you will need to contact the system administrator to gain access to the network. Priority 1: These items are of Critical Importance. Until this is fixed, a system is down and the company is losing money. E.g., server will not boot up. This is an emergency. Priority 2: High Priority Very Important. Until this is fixed, work is being interrupted or not flowing the way it should. Some equipment or sofware is unusable. Affects productivity. Priority 3: Medium Priority Important. A problem needs to be fixed but work can continue. Priority 4: Low Priority Annoying. These are things that should be fixed while doing other work or when everything else has been completed. "'(45CO\^_atuW z & I Y v ` t u |  󿺶{h!~W>*CJaJh!~WCJ aJ h!~W5CJaJh!~WCJaJh!~W5fHq h!~W56B*phh> h!~W5 h>5jh!~WUh/5CJ aJ h!~WCJaJh>5>*CJTaJTh!~W5>*CJTaJTh!~W5CJ aJ h!~W) "#$%&'(56789:;<=>?@ABCO]^$a$^`au ' 3 K V W z {  & F$a$$a$  % & I J X Y v w  1 A M  & FM Y Z [ \ ] ^ _ ` t u z { | &dP $&dPa$$a$ & F &dP  $a$   9DEG=}~þǶâDžǾ}xǾsxÅDžDžDžDžDžDž h>>* h!~W>*h!~WCJ aJ h!~W5CJaJjh!~WCJUaJjh!~WUj0n h!~WUVh!~W>*CJaJh>CJaJ h!~W5h!~Wh!~WCJaJjh!~WUj/h!~WUh!~WCJaJmHnHsH#jh!~WCJUaJmHnHsH- 456789DEFG &dP$a$ $&dPa$$a$ &dP=HIde}~$a$$a$ &dP$%<HZhi| &dP &dP$%<i|ahiz=x  %.:Uhi.7CHUku9RSemu~&,l{h!~Wh<5CJaJh/5CJaJh!~WCJaJh!~W>*CJaJh>>*CJaJ h!~W5h!~WCJaJh!~W5CJaJI)*`ahiz<=-X#$d%d&d'dNOPQ$a$$a$ &dPXYZ[\]^_`abcdefghijklmnopqr &dP$d&dNPrstuvw#$d%d&d'dNOPQ &dP &dP     %>STUhi &dP$a$i$a$ &dP     .HI^_qr$a$$a$ &dP&'.;<EFM &dPMNOPQRSTUk.9 $$G$Ifa$$a$$a$ &dP9:RSefg7Jkd$$If0$ !$ 44 lal$G$If$If $$G$Ifa$dkd/$$If0$ !$  44 lalpghijklmuvc]$IfJkd$$If0$ !$ 44 lalJkdb$$If0$ !$ 44 lal$G$Ifvwxyz{|cJkd$$If0$ !$ 44 lal$G$IfJkd`$$If0$ !$ 44 lal|}~]Jkd$$If0$ !$ 44 lal$If$G$IfJkd^$$If0$ !$ 44 lalcJkd$$If0$ !$ 44 lal$G$IfJkd\$$If0$ !$ 44 lalc]$IfJkd$$If0$ !$ 44 lal$G$IfJkdZ$$If0$ !$ 44 lal&cJkd$$If0$ !$ 44 lal$G$IfJkdX$$If0$ !$ 44 lal&'()*+,cJkd$$If0$ !$ 44 lal$G$IfJkdV$$If0$ !$ 44 lal,-BlmnocJkd$$If0$ !$ 44 lal$G$IfJkdT$$If0$ !$ 44 lalopqrstuvwxyzcaaaaaaaJkd$$If0$ !$ 44 lal$G$IfJkdR$$If0$ !$ 44 lal z{:;FQRST{{$G$IfdkdP$$If0$ !$  44 lalp $$G$Ifa$$a$$a$;QSTz{>?NZh !!!!|"}"""""""##'#;#'''Q(f(P)Q)])`)a)z)))*/*<*2+8+++,,\-x---0K0N0h!~W>*CJaJh!~W5CJaJ h!~W>* h!~W5h!~Wh>>*CJaJh!~WCJaJRTUVWXYZcJkd$$If0$ !$ 44 lal$G$IfJkd$$If0$ !$ 44 lalZ[\]^_`cJkd$$If0$ !$ 44 lal$G$IfJkd$$If0$ !$ 44 lal`abcdefcJkd$$If0$ !$ 44 lal$G$IfJkd$$If0$ !$ 44 lalfghijklcJkd} $$If0$ !$ 44 lal$G$IfJkd$$If0$ !$ 44 lallmnopqrcJkd{!$$If0$ !$ 44 lal$G$IfJkd $$If0$ !$ 44 lalrstuvwxcJkdy"$$If0$ !$ 44 lal$G$IfJkd!$$If0$ !$ 44 lalxyz{|}~cJkdw#$$If0$ !$ 44 lal$G$IfJkd"$$If0$ !$ 44 lal~cJkdu$$$If0$ !$ 44 lal$G$IfJkd#$$If0$ !$ 44 lalcJkds%$$If0$ !$ 44 lal$G$IfJkd$$$If0$ !$ 44 lal"Ex$a$$a$Jkd%$$If0$ !$ 44 lalxdcK L S T U V W X Y Z [ \ ] ^ _ &dP_ ` a b c d e f g h i j !Q!!!!"M"N"""$a$$a$ &dP""";#<#$$$$$$%C%n%%%%&J&}&&&'I'|'}'~'' &dP'''''( (P(Q(f(u(v(|((((((((((((( &dP$d&dNP $&dPa$$a$( ))")*)1)2)3)4)5)6)7)8)9):);)<)H)`)a)f)p)y)z)$If $$G$Ifa$$a$ &dPz){)|)})~)))=]kd&$$If1F E$[ [ c     44 la$G$If]kdq&$$IfF E$[ [ c     44 la)))))))]kdw'$$If1F E$[ [ c     44 la$G$If)))))))=]kd}($$If1F E$[ [ c     44 la$G$If]kd'$$If1F E$[ [ c     44 la)))))))]kd)$$If1F E$[ [ c     44 la$G$If)))))))=]kd*$$If1F E$[ [ c     44 la$G$If]kd)$$If1F E$[ [ c     44 la)))))))]kd*$$If1F E$[ [ c     44 la$G$If)))))))=]kd+$$If1F E$[ [ c     44 la$G$If]kd +$$If1F E$[ [ c     44 la)))))))]kd,$$If1F E$[ [ c     44 la$G$If)))))))=]kd-$$If1F E$[ [ c     44 la$G$If]kd,$$If1F E$[ [ c     44 la)))))))]kd-$$If1F E$[ [ c     44 la$G$If)))))))=]kd.$$If1F E$[ [ c     44 la$G$If]kd.$$If1F E$[ [ c     44 la)))))))]kd$/$$If1F E$[ [ c     44 la$G$If)))))))=;]kd*0$$If1F E$[ [ c     44 la$G$If]kd/$$If1F E$[ [ c     44 la)))))))/*0*h*****++1+2+m+n++++++#,$,`,a,$a$$a$a,,,,,,--[-\-]------R.00000000 0 0 000K0L0a0b0001_1`1n1o1223)3M3s3333333g5h55` & F ^`$a$N0a0`1n1y1|111222223 3*333N3W3t3|33333446677777888,8288889999:::}::::!;,;[;;;;B<p<h#MKCJaJha>ha>CJaJha>CJaJh!~W5B*CJaJph h#MK>* h>>*h#MKh!~W h!~W5h!~W5>*CJaJh!~WCJaJh!~W5CJaJ<55667777777777777777777782858a8b8$a$$a$b88888d999:K:}::::!;[;;;;<<A<B<^p^pgda> & Fgd#MK & F ^`^gda> & FB<p<q<{<|<<<<#=$=f=g=======>Q>d>>>>>>>>^ & F$^a$p<q<{<<<<<<"=$=8=f=g=>>>0?2?F?H?^?`?t?v???7GIGTG`G{GGGFIZIJK~LLLLHMgMN+NrNNNNN⬣└hxh!~Wh!~W5>*CJaJh!~W>*CJaJh>>*CJaJ h!~W5h!~WCJH*aJh#MK5CJaJh!~W5B*CJaJphh#MKCJaJh!~WCJaJh!~W5CJaJh!~WB*CJaJph1>?-?[?????????@@#G$G%G&G'G(G)G*G+G,G-G.G/G0G^ ^` & F0G1G2G3G4G5G6G7GGGHGIGJG}G~GGGGG*H+H\H]HHHHHII $&dPa$$a$I@IAIBICIDIEIFIZI[IIIJJJKK}L~LLL M;M!)M&PVZj{i69e}?X!| I 0AkLwD@~3Z8Qa'.偋ifeH׾w@:\rKXNF֜##fmsVHk)O*I3]uF3&ywWWDjS?Zqf^.~J$*Fz?~9^Muix'$l4R(>*:QlrEXTsA胑Πn]>̞! #*9g 0&$IM3_+1JXrZ 9j\vDDUe!zX>(qg0#]G!UN)i["fmV>2E=:5W5Եȿ6Sm @#52h-'݀ng`CoL/ďrQUKvN9;U`**IY4~lz`*z+37(2i_'0M;ݺ(Y1|/{a%WPIENDB`Dd;!8   @@"?| Ddw64 EZ  6A?" ?3X6b&!E @= ?3X6b&!E `f`H.FXLDJp xoG8ĭJN*(Rik /(E"zj*JdG*Rv_R';OHV7;V_@񈄝?JQ]<=꾦 3=d·D?}|wyկa|ŏy]yZxnf]<^l3z~}{xIEo| s󳻮?<]5̼ҿ[NXOS0 @#,s^%!{ZTϲco:s8=\?>\p}g=]hCKH+;vOug^o;];U'b|%//U_!jJ5U =߆;ߩtd&=(G+O2f)OO%6UUC?/!};/!}{/!}/!}K/!}+/!}k/ϡ ]6$;f[ ࿕؏ s jqO/!}?:qc]e1H?IOO3*_ | Wȿ_ 5_K0]搾/COOlg?$3_'?F?9O,ߟwFޗ¯ yx۫;_e3s s3xݠU"Iv "鯸Me9wzW6ߝS]ghCߛ?G7sH{_fo !؄#Ư9q2`4~ѽns[a~_ŶCjbY5x}vY>q$q搾_3}fny}:Iˮ39d/|{HCvpطe},^r/]wuV n>kzFg{ ⚧?<_Vn?=Jed!=V#<6?a{>?l?>:mԲzl`2elܪcٚ5Me6e٦<)09QDzXmLSƱlmc˔q,ےe[ؖ)e˶bV<09HDzY5m L~QƱlmcscږW'X˶퀹gNƱl{mc3JƱl:`J8 x-S6|A8n[]1N2el۸2d6i&=Ie&8eZ[KqG2el۴2cd6g<9eq,ۢe[-Xe˶-+3N[Ʊlmc[Uf c-ۺǶjDzmY-mK!Xm˶m+w1d˶kv=]e慌c-۾  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrtuvwxyz}Root Entry FtData s0WordDocument1ObjectPoolot_118582832 FooOle EPRINTKCompObjm  F!Microsoft Office Excel WorksheetBiff8Excel.Sheet.89q Oh+'0@HXh AdminAdminMicrosoft Excel@Ǖ@\!lG93 EMFKa \KhCF, EMF+@,,F\PEMF+"@ @ $@ 0@?!@ @     !" !" !  " !  " !  Rp Arial0?@ x@@xz0&'&,ښ0N@ (0N@ N0N@@j0Arial0 < &< !N@'&dv% % " !%   4  Td@3AEA@LTDateTdS3AEALTTapeTd3AEALTJob#% " !%   % " !%   J~  TLAEA%KLL% " !%   ~  TLAEA%LL% " !%     TLAEA%LL% " !%     TLAEA%LL% " !%   z  TLAEA%{LL% " !%     TLAEA%LL% " !%     TLAEA%LL% " !%   J  TLAEA%LL% " !%     TLAEA%LL% " !%     TLAEA%LL% " !%   B  TLAEA%LL% " !%   Bv  TLAEA%CLL% " !%   v  TLAEA%wLL% " !%     TLAEA%LL% " !%     TLAEA%LL% " !%   F  TLAEA%LL% " !%   J~  TLAEA!KLL% " !%   ~  TLAEA!LL% " !%     TLAEA!LL% " !%     TLAEA!LL% " !%   z  TLAEA!{LL% " !%     TLAEA!LL% " !%     TLAEA!LL% " !%   J  TLAEA!LL% " !%    >  TLAEA% LL% " !%   >r  TLAEA%?LL% " !%   r  TLAEA%sLL% " !%   Fz  TLAEA!GLL% " !%   Fz  TLAEA%GLL% " !%   F  TLAEA!LL% " !%   6j  TLAEA%7LL% " !%   j  TLAEA%kLL% " !%     TLAEA%LL% " !%     TLAEA%LL% " !%   :  TLAEA%LL% " !%   :n  TLAEA%;LL% " !%   n  TLAEA%oLL% " !%     TLAEA%LL% " !%      TLAEA%LL% " !%   Bv  TLAEA!CLL% " !%   v  TLAEA!wLL% " !%     TLAEA!LL% " !%     TLAEA!LL% " !%     TLAEA!LL% " !%      TLAEA!LL% " !%   6  T|I3AEAL\Operator!% " !%    >  TLAEA! LL% " !%   >r  TLAEA!?LL% " !%   r  TLAEA!sLL% " !%     TLAEA!LL% " !%     TLAEA!LL% " !%   B  TLAEA!LL% " !%     TLAEA!LL% " !%   :  TLAEA!LL% " !%   :n  TLAEA!;LL% " !%   n  TLAEA!oLL% " !%   6  T[3AEALtDescription / Notes   % " !%   6j  TLAEA!7LL% " !%   j  TLAEA!kLL% " !%     TLAEA!LL% " !%   % " !%   '%   &% 6% Ld!??% 6% Ld!??% l6l% Ldlol!??% 6% Ld!??% 6% Ld!??% 6% Ld!??% 6% Ld!??% 464% Ld474!??% h6h% Ldhkh!??% 6% Ld!??% 6% Ld!??% 6% Ld!??% 868% Ld8;8!??% l6l% Ldlol!??% 6% Ld!??% 6% Ld!??% 6% Ld !??% <6<% Ld<?<!??% p6p% Ldpsp!??% 6% Ld!??% 6% Ld!??%  6 % Ld  !??% @6@% Ld@C@!??% t6t% Ldtwt!??% 6% Ld!??% 6% Ld!??% 6% Ld!??% D6D% LdDGD!??% x6x% Ldx{x!??% 6% Ld!??% 6% Ld!??% 6% Ld!??% H6H% LdHKH!??% |6|% Ld||!??% 6% Ld!??% 6% Ld!??% 6% Ld!??% ( % " !%   % ( " F4(EMF+*@$??FEMF+@ ObjInfo OCXNAMEcontents Workbook  \pAdmin Ba=  =--"!<X@"1fArial1fArial1fArial1fArial1fArial1fArial"$"#,##0_);\("$"#,##0\)!"$"#,##0_);[Red]\("$"#,##0\)""$"#,##0.00_);\("$"#,##0.00\)'""$"#,##0.00_);[Red]\("$"#,##0.00\)7*2_("$"* #,##0_);_("$"* \(#,##0\);_("$"* "-"_);_(@_).))_(* #,##0_);_(* \(#,##0\);_(* "-"_);_(@_)?,:_("$"* #,##0.00_);_("$"* \(#,##0.00\);_("$"* "-"??_);_(@_)6+1_(* #,##0.00_);_(* \(#,##0.00\);_(* "-"??_);_(@_)                + ) , *   @ @ "0@ @ "8@ @ "8@ @ `mSheet1">DateTapeJob#Description / NotesOperator   cc   dMbP?_*+%MnMicrosoft Office Document Imag/d,,Letterwidm"d,,??U} } m} $} m} m} m                                                                           Dlb>@ @                                      7 SummaryInformation( DocumentSummaryInformation81Table2SummaryInformation( ՜.+,0 PXd lt|  Sheet1  WorksheetsOh+'0T     (4<DL ComputerAdmin Normal.dotmAdminist߳q OeG\!sE pL:zZEǔ1m|osǜZy+i+clϊey̓r8&X'q>+M2Oe|V,ce+makG+M2Oe|V,[ݲ\zd۸e+clm(MF,[QekEM[<66gيX.\dۢe+clm˖(-GZ<˶ٶnيX.zdۖe+cl[mۖ(mGZ<˶ٶoيX.~`[Mdhwp<xx K׼Л2|@g8 qS߲$$If!vh#v$ #v:V  5$ 5/ / / / alp}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al$$If!vh#v$ #v:V  5$ 5/ / / / alp}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al}$$If!vh#v$ #v:V 5$ 5/ / / / al$$If!vh#v[ #vc :V 5[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / a$$If!vh#v[ #vc :V 15[ 5c / / / / arator2Microsoft Office Word@@=@83@839 F:՜.+,0 hp   Epiphany|"]D  Computer TitleDocumentSummaryInformation8(CompObjr^! 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH D`D Normal*$CJ_HaJmH sH tHDA D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List :o: WW8Num1z0OJPJQJ^J6o6 WW8Num1z1 OJQJ^J2o2 WW8Num1z2OJQJ2o!2 WW8Num1z3OJQJ:o1: WW8Num3z0OJPJQJ^J:oA: WW8Num3z1OJPJQJ^J2oQ2 WW8Num3z2OJQJ2oa2 WW8Num3z3OJQJ6oq6 WW8Num3z4 OJQJ^JDA`D Default Paragraph Font6U6 Hyperlink >*B*phNON Heading x$CJOJPJQJ^JaJ6B@6 Body Text x(/@( List^JH"@H Caption xx $6CJ]^JaJ.O. Index $^J<O< Table Contents $FOF Table Heading $ $a$5\PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] |F|F N0p<N(/4Iim^ M XriM9gv|&,ozTZ`flrx~x_ "'(z))))))))))))))a,05b8B<>0GI?@ABCDEFGHJKLMNOPQRSTUVWXYZ[\]^_`abcdefghjklnopq F_:8@(  j ! C DDC"?Z  S  ?!x  0$?!* 6 3 F!t _1296306487 _1296306652 _1296306709 _1296307112 _1296307174FFOOOOOOOOOOOOOOOO  (2222F     \'--2222F    >*urn:schemas-microsoft-com:office:smarttags PersonName= *urn:schemas-microsoft-com:office:smarttags PlaceType= *urn:schemas-microsoft-com:office:smarttags PlaceName9*urn:schemas-microsoft-com:office:smarttagsplace pqh     ht %5.>k|H!X!y((++11122 2 22 66DEEFFaunq ,.BD57rt 35>@|~ *,A C O!Q!"";"="t"v"((**//50>00077????AADDDEEEEEFWFZFFFFF333333333333333333333333333333333333333333333333333333(4O\htu   .:7CuQ!]!///0000,0202040401112|22222222!3,30303Z3344444"5#5#566T?`?~DF(4htu  .:7CuQ!]!00T?`?DF^`) ^`OJQJ^J ^`OJQJ^Jpp^p`OJQJ@ @ ^@ `OJQJ ^`OJQJ^Jo^`OJQJ^`OJQJ ^`OJQJ^JoPP^P`OJQJP^`P@@^@`0^`0``^``^`^`^``^``00^0`WW8Num2WW8Num3a>#MK!~W/>x<DD@ttttF@UnknownG*Ax Times New Roman5Symbol3. *Cx Arial?= *Cx Courier New;WingdingsO.  k9Lucida Sans Unicode5. .[`)TahomaA$BCambria MathBAh''&9 F:"| c<$!24]DF2QHP?#MK!xx ComputerAdmin Administrator     F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q