ࡱ> /A~|Y ?bjbj[[ |%9 \9 \H588XXXPTX]2..R...K\K\K\ċƋƋƋƋƋƋ$Ed-kXjK\kk88..)kJ 8..ċkċ"7(.EE` 9-0]=JyBK\YadgK\K\K\0K\K\K\]kkkkK\K\K\K\K\K\K\K\K\> : COMPUTER STUDIES PAPER ONE *NYR* 1. Identify programming language used in the following generations:- (i) First generations (ii) Second generation 2. Give importance of having the following in computer laboratory:- (i) Standard furniture in the laboratory (ii) Antiglare screen/monitor (iii) UPS 3. (a) Explain the following terms as used in booting:- (i) BIOS (ii) POST (b) Differentiate between:- (i) Backspace and delete keys on the keyboard (ii) Insert and type over mode 4. Explain the functions of the following central processing unit components (i) ALU (ii) Control unit (iii) Primary memory 5. (a) Differentiate between static RAM and Dynamic RAM (b) Distinguish between compilers and interpreters 6. (a) List two softcopy output devices (b) Distinguish between impact and non-impact printers citing one example in each 7. State two merits of using the following input devices: (i) Speech recognition (ii) Touch screen 8. Differentiate between freeware and open source as end-user license softwares. 9. (a) List four types of system software (b) Explain the following functions of the operating system :- (i) Job scheduling (ii) Interrupt handling 10. Explain the following disk management tools:- (i) Disk formatting (ii) Disk defragmentation 11. Differentiate between the following terms as applied in operating system:- (i) Multi-user (ii) Multi-tasking 12. Explain the following terms as applied in word processor (i) Text wrap (ii) Word wrap 13. (a) Distinguish between first line and hanging indentation (b) Differentiate between the following combinations of terms:- (i) Filtering and sorting (ii) Relative and absolute cell referencing 14. (a) Differentiate between the following combinations of terms:- (i) Filtering and sorting (ii) Relative and absolute cell referencing 15. Identify the elements of a function 16. A class teacher of form 3E in Nzambani secondary school requested a programmer to design a simple program that would help do the following:- (a) Enter the names of students and marks obtained in 8 subjects; maths, English, Kiswahili, Biology, Chemistry, Business Studies, History and Computer Studies. (b) After entering each subject mark the program should calculate for each student (c) Depending on the average mark obtained, the program should assign the grades as follows:- Between 80 and 100 = A Between 70 and 79 = B Between 60 and 69 = C Between 50 and 59 = D Below 50 = E (d) The program should display each students name, total marks and the average grade. Using a flow chart, show the design of the program 17. (a) Define the following terms in reference to the internet:- (i) Protocol (ii) Website (iii) Search engine (iv) Spam mail (b)List three examples of search engines (c) Identify the functions of the following devices in data communication:- (i) Modem (ii) Network interface card (iii) Brouter (d) Describe bounded and unbounded forms of communication giving two examples in each case (e) Outline four advantages of using fibre optic cables 18. (a) Define the following terms as used in data representation (i) Amplitude (ii) Frequency (iii) Nibble (iv) Byte (b) Perform the following 11111.11112 + 100001.10102 1111.001112 (c) Using twos complement subtract 73 from 115 and convert the answer to decimal notation (d) Identify the duties of the following ICT specialists (i)Software engineer (ii) System analyst (e) List two types of opportunities available in the field of computer hardware 19. (a) Describe the following computer files (i) Logical and physical files (ii) Master and backup files (b) Explain the following computational errors (i) Truncation (ii) Overflow (iii) Rounding errors (c) Define data integrity and state three ways of minimizing threats to data integrity (d) Define virtual reality and state three ways of minimizing threats to data integrity (e) Discus how computers are used in reservation systems 20. (a) Explain the main activity carried out in each of the following system development stages (i) Problem recognition (ii) Coding (iii) Implementation (b) Explain the following changeover methods:- (i) Direct (ii) Parallel (iii) Phased (c) Explain two advantages of modular programming (d) Explain how the use ICT may affect the society (e) Explain the four main areas of artificial intelligence *MAT* 1. Distinguish between white-collar crime and blue collar crimes 2. Lutomia and Naibei were arguing about computer criminal. They realized four types of criminals namely; thieves, burglars, terrorists, hackers and cracker. Briefly explain difference between hackers and crackers 3. State where the cell pointer on a worksheet moves when the following key combinations a) Crl + Home b) Shift + Tab (c) End followed by down arrow key (d) Shift + Enter 4. Explain the meaning of the following domains on a web address (a) .co.ke (b) .ac.uk (c) .or.ug 5. Study the flow chart below and write down the output from the table below is entered. Show your working. Nambwaya 5960Murono 6062Kisiangani 7946Makhanu 4184 6. (a) Distinguish between a primary key and index key as used in databases (b) Explain the relevance of foreign key in a database entity 7. Briefly explain how the operating system uses interrupt Request (IRQ) numbers to allocate computer resources 8. Name an input or output device used in the following tasks (a) Capturing still images (b) Printing detailed architectural designs (c) Playing flight and driving games (d) Capture data at ATM 9. Outline three distinctions between a super computer and microcomputer 10. Briefly explain four features of third computer generation 11. Define the following terms as used with the internet; (a) Surf (b) Compose (c) Cookie 12. State four reasons why you would advertise a typesetter to use MS Publisher in designing calendar other than MS Word 13. Briefly explain how electronic spreadsheet is used in What if analysis 14. The formula = $A4*C$3 was entered in cell D4. What will be the formula if it is copied to cell F10 15. Design a pseudo code for a program that will compute and display the are of a triangle whose base is not less than 10cm 16. Study the flow chart below and attempt questions that follow (a) Your working what will be output if the following was entered? Lutomia 65 50 46 77 76 Naibei 60 80 55 81 10 Nambwaya 80 15 40 82 60 Makhanu 50 35 70 40 43 Kisiangani 30 70 55 60 44 Murono 60 45 43 77 30 (b) Write a pseudo code equivalent for the above flowchart modifying it to compute result of 100 students. (c) Name any two control structures used in the flowchart above 17. (a) Explain three negative impact of ICT on Kenyan culture (b) Perform the following arithmetic operations 7658 + 16458 ABCH + D1416 71128 7678 A14616 BCD16 (c) Name at least two areas where the following processing modes are used Real time processing Distributed processing Batch processing Time sharing processing (d)Write the alternative name of the following types of software (a) Bespoke (b) Vendor-off-the-shelf software 18. (a) Explain RAD and structured approach as methods of system development (b) Hassan was designing in out screens for the new school database management system. Outline three factors she MUST consider during the designing (c)State four difference between Low-level and High-level languages to a programmer (d) Name any four public universities that offer computer courses at degree level 19. (a) Simplex, Half duplex and full duplex are modes o data communication. With examples of where used, explain each of these communication modes (b) Distinguish between wrap text and shrink to fit as used in Microsoft Excel data formatting (c) Safaricom has implemented broadband as their modem communication technique. Explain the meaning of broadband communication (d) Continuous use of computers has adverse health effects. State five ways of averting these effects 20. (a) Artificial intelligence is out to develop devices that emulate a human being in all aspects as applied in expert systems. Explain three components of expert systems (b) Distinguish between job replacement and job displacement (c) State four ways in which threats to data integrity may be minimized (d) Name two programming languages in each of the following: OOPe Procedural language 5GLs *KKE* 1. Distinguish between ROM and RAM. (2 mks) 2. (a) Convert the octal Number 11118 to its ten equivalent. (2 mks) (b) Convert 11.0112 to a decimal Number. (2 mks) 3. (a) Define the following terms with reference to computer crime. (i) Cracking. (1 mk) (ii) Hacking (1 mk) (b) State any two laws governing the information. (2 mks) 4. Distinguish between job scheduling and job sequencing. (2 mks) 5. List any four precautions that must be observed in a computer lab. (2 mks) 6. Mention four database models that you have learnt. (2 mks) 7. Differentiate between a computer operator and computer technician. (2 mks) 8. Define the term mail merge. (2 mks) 9. (a) What is the advantage of electronic spreadsheet over manual work. (2 mks) (b) What is cell replacing? (1 mk) 10. State two types of desktop publishing (DTP). (2 mks) 11. List three elements of networking. (3 mks) 12. Briefly explain any three application areas of ICT (Information and communication Technology). 13. List any two types of (a) Optical disk. (1 mk) (b) Magnetic disk (1 mk) 14. Distinguish between Disk formatting and disk partitioning. (2 mks) 15. (a) State and define any two types of computer processing file. (1 mk) Answer question 16 (Compulsory) and any other three questions in the spaces provided. 16. (a) Consider the module flow charts extracts below.  (i)  (ii) State the looping structure demonstrated in (b) State four examples of third generation languages. (c) Define the following terms as used in programming. (i) Assembler (iii) Translator (ii) Compiler (iv) Interpreter (d) Jokins retailers has two categories of customers processing category. A obtain 10%discount on all orders upto Kshs. 10,000. Otherwise the discount is 20% on entire order. Category B obtains 30% on all orders if the debt payment records is good otherwise the discount is 15%. Write a pseudo code for the order processing. (9 mks) 17. (a) Below are two tables structures of files in a database. Employee Employee Details Field Data type Field Date type Employee Name Text Employee No. Number Employee Number Auto Number Date employed Date / Time DOB Date/ Time Department Text Address Text Salary Currency (i) Which of the tables is likely to be the parent table? (1 mk) (ii) It is advisable to enforce referential integrity when creating a relationship. When creating a relationship, what do you understand by the term referential integrity? (2 mks) (iii) The field employee no in the employee details table is likely to be the primary key. What is a primary key? (2 mks) (iv) Which fields in both tables is not appropriate for creating a relationship? (1 mk) (v) What would make the relationship between the tables fail to work? (2 mks) (b) In database, the field properties specify finer details related to the fields and the table entries expected. State four field properties. (4 mks) (c) State three functions of a database. (3 mks) 18. (a)Consider the topologies demonstrated in the diagram below. A    B  C  (i) Identify the network topologies. (3 mks) A B . C .. (ii) In topology A, identify the network device that should be at the end points 1 and 2. (iii) Which of the above topologies is likely to be used in a wide area network? (1 mk) (iv) Highlight three disadvantages of topology B. (3 mks) (v) Identify the device labeled x in topology A. (1 mk) (b) State two main classes of network surface. (2 mks) (c) Briefly describe the following as used in networking. (i) Repeaters. (4 mks) (ii) Network hub (iii) Fibre optic cables (iv) Network Interface Card (NIC) 19. (a) Define feasibility study as used in system. (2 mks) (b) State four devices under direct control of the operating system. (2 mks) (c) Briefly describe the following terms of computational error. (5 mks) (i) Truncated (ii) Transposition (iii) Transcription (d) Explain three most commonly used coding schemes. (3 mks) (e) Distinguish between online and real time processing. (2 mks) (f) State one advantage and two disadvantages of command line interface. (3 mks) 20. (a) (i) Explain three communication services offered through internet. (3 mks) (ii) Describe the following terms. (2 mks) Links URL (b) The following is a spreadsheet relating to a farmer. A B C 1 Crop Amount 2 Maize 150 3 Bean 300 4 Cashew nuts 850 5 Cabbages 1036 (i) A function = IF (B2(200, Not viable, IF (B2 ( 300 Moderate, IF (B2( 1000, viable)))) Give the appropriate result returned in cell C2, C3, C4 and 5. (2 mks) (c) Text can easily be selected using a mouse in word processing. How do you select; (i) Multiple paragraphs? (2 mks) (d) (i) Distinguish between a widow and an orphan in word processing. (2 mks) (ii) Cut and copy commands. (e) Give one purpose of drop caps on a text paragraph. (2 mks) (f) Give two application of expert systems. (2 mks) *RCH* 1. (a) Define the terms Data Integrity. (1 mk) (b) Give two features of data integrity. (1 mk) 2. Describe how each of the following printers work. (3 mks) (a) Thermal . (b) Electrostatic printer ....... (c) Laser printer .. 3. Nina Secondary School wanted to buy some text books for Computer Studies. The following list show an example of a spreadsheet which was used to calculate the minimum, maximum and Total of the total price. ABCD1.BOOKUNIT PRICECOPIESTOTAL PRICE2.Computer Studies BK 1250703.Computers Studies BK 2275504.Computer Studies BK 3280605.Computer Studies BK 4320706.7.Minimum 8.Maximum9.TotalWrite down in each case the formula that can be used in:- (i) Cell D7 (ii) Cell D8 (iii) Cell D9 (b) Format all the numeric figures to US Dollar symbol and 2 decimal places. (1 mk) 4. State any two uses of personal computers in office. (2 mks) 5. State the difference between tracking and kerning as used in Page Maker. (2 mks) 6. (a) Differentiate between soft system and hard system. (2 mks) (b) List any four characteristics of a system. (2 mks) 7. Explain the meaning of the following terms as used with operating system. (a) Multitasking. (1 mk) (b) Single user. (1 mk) 8. Explain the uses of the following keys on the keyboard. (a) Backspace Key. ( mk) (b) Space Bar Key. ( mk) (c) F1 Key. ( mk) (d) Insert Key. ( mk) 9. (a) Explain any two types of transcription error. (2 mks) (b) Define the term Algorithm errors as used in object oriented programming. (1 mk) 11. (a) (i) What is meant by the term Upload as used in the internet?. (1 mk) (ii) Explain the term hypertext. (1 mk) (b) Give two examples of search engines you know. (1 mk) 12. (a) Name any three special purpose memories found either inside and outside the microprocessor. (b) Distinguish between an accumulator and an address register. (2 mks) 13. (a) Define the term mail merging as used in Word Processing Application Program. (1 mk) (b) List any two documents that are involved in mail merging. (2 mks) 14. Explain the three components of an expert system. (3 mks) 15. Define the term Robot as used in Expert system. (1 mk) 16. Kenya Tea Packers Company pays two different rates for all the tea grades of Tea delivered to her deports. The rates are as follows:- Grade A = Kshs. 20.00 per Kilograms and Grade B = Kshs. 10.00 per kilogram. (a) Write an algorithm and pseudo code for the above program. (5 mks) (b) Draw a flow chart for the above program. (5 mks) (c) A school has two sets A and B. Write a structure algorithm to read a set and the points awarded for winning each race in an athlete final terminated by C. Calculate and print the total points gained by each set appropriately labeled. (5 mks) 17. (a) Define the term field properties as used in Database program. (2 mks) (b) (i) What do you understand by the term normalization as used in Ms Access database? (1 mk) (ii) What is an input mask in a database? (1 mk) (c) (i) What is a query? (2 mks) (ii) Differentiate between an action query and select query? (2 mks) (d) (i) Differentiate between a Primary key and an Index key. (2 mks) (ii) What is the difference between a field name and a Caption? (2 mks) (iii) Differentiate between Columnar and Tabular form. (2 mks) 18. (a) (i) Give one advantage of a hub on a computer network. (1 mk) (ii) Define the VSAT technology. (1 mk) (iii) List any four examples of network operating systems. (4 mks) (iv) State any three advantages of coaxial cables in a computer network. (3 mks) (v) State any three devices used in data communications. (3 mks) (vi) Differentiate between a router and a brouter. (2 mks) (b) Define the term Protocol as used in networking. (1 mk) 19. (a) State the uses of the following MS-DOS commands. (i) CD. (1 mk) (ii) DIR/P/W (1 mk) (iii) Input devices are classified according to how they are used to enter data. Can you list five classifications based on this. (5 mks) (b) Name and explain four types of human computer interfaces. (4 mks) (i) Give any two control measures you would take avoid unauthorized access to data and information. (2 mks) (ii) Give two examples of anti-virus software you know. (2 mks) 20. (a) Perform the following conversions appropriately. (i) Convert 91B16 to Octal. (3 mks) (ii) 37610 to hexadecimal. (3 mks) Perform the following Binary arithmetic. (i) 1110.0111 + 1101001.011 (3 mks) (ii) 1001011.011 111.111 (3 mks) (c) Convert 298.12510 to hexadecimal equivalent. *KKE* 1. State two reasons why personal computes are so important to small businesses and entrepreneurs 2. State two characteristics for each of the following; First generation computers Second generation computers Third generation computers 3. Give a reason for each of the following hardware considerations when selecting a computer system Processor speed Warranty Upgradeability and compatibility Portability 4. (a) What is disk partitioning? (b) Give two reasons for partitioning a disk 5. Explain the following features as used in word processing. Word wraps Thesaurus 6. The first column in the table below contains the formula stored in cell C10 of a spreadsheet. Enter the formulae as they would appear when copies to cell F15 of the same spreadsheet FORMULA IN C10FORMULA IN F15=A5*B5=4*B$67. State three functions of a database management system 8. (a) Differentiate between signing-in and signing up in relation to the internet b) Distinguish between downloading and uploading 9. (a) Define the word expert system? (b) List the three components that make up an expert system 10. Using the two components, perform the following arithmetic operation in 8 bits 11. What is a procedural language? 12. List any four resources under the operation system control 13. State two advantages of the Winchester disk as compared to other forms of secondary storage media 14. a) List the two main type of DTP software b) Differentiate between the following terms as used in DTP Tracking Kerning 15. Explain the function of the following parts of the URL http:/www.kakamega.com 16. (a) Draw a flow chart for a program that can be used to get the sum of mark for 45 computer studies student then get the subject mean b) Define the following; i) Source program ii) Pseudo-code iii) Translators iv) Flowchart v) Algorithm 17. (a) Giving an example for each, differentiate between transcription and computational errors (b) Briefly describe the following elements of a computer file; (i) Character (ii) Field (iii) Records (c) Explain the functions of; Master files Back up files reference files (d) Differentiate between (i) Real-time processing mode and batch processing (ii) Distributed data processing mode and multiprocessing mode 18. a) State the function of; i) Web master ii) Database administrator iii) Computer operator iv) Computer technician b) Explain how computers have led to the following effects of employment: i) job replacement ii) Job displacement c) State one negative impact of computers in our society 19. (a) Describe any three physical LAN topologies (b) Define the following terms Protocol Server Gateway iv) Repeater v) Bandwidth (c) Give two advantages of networking (d) Explain the line of sight principle in wireless communication (e) Whats the work of the following in networking? (i) Crimping tool (ii) Network interface card iii) Network neighbouring icon 20. (a) Differentiate between private data and confidential data (b) Describe three types of computer virus (c) Explain the following terms as used in data security i ) Eavesdropping ii) Surveillance iii) Industrial espionage d) Differentiate between hacking and cracking e) State two laws that govern the protection of information *UGU* 1. Differentiate between Access Time and Seek Time (2mks) 2. List four activities that can be carried out using Windows OS during disk management (4mks) 3. Give four reasons why a firm may decide to computerize its operations (4mks) 4. List three functions of the Arithmetic and logic unit (3mks) 5. What is the major difference between a web page and a web site (2mks) 6. (i) Write down all the digits in base 4 number system (1mk) (ii) Calculate the sum of the second and the fourth digits (i) above (1mk) 7. What is the major difference between a webpage and a web site? (2mks) 8. Differentiate between physical and logical topologies (2mks) 9. Give the difference between tower and desktop system unit (2mks) 10. Differentiate between computational errors and transcription errors (2mks) 11. Using the place value method, convert 24710 into its binary equivalence (4mks) 12. Perform the following binary arithmetic and give your answers in decimal notation (14mks) 1010.101 + 11.011 13. (a) Differentiate between : (i) Primary key and foreign key (1mk) (ii) What is cell referencing (2mks) 14. Define the word blocking as defined in Ms-Word (1mk) 15. (i) What is a server? (1mk) (ii) Differentiate between peer to peer and client server (2mks) 16. Study the flow chart below and answer the questions that follow: (a) What would the following generate as output if the value of N at input was: (i) 6? (ii) 1? (b) Write a pseudo code that does the same thing as the flow chart above (15mks) (c) Text can be select using a mouse processing. How do you select (i) Multiple paragraph (ii) Vertical text (d) Distinguish between: (i) A widow and an orphan in word processing (ii) Cut and copy commands (e) Give one purpose of drop caps on a text paragraph (f) (i) What is an expert system? (ii) Give two applications of expert systems 17. A school keeps a spreadsheet of examination results in four subjects. Part of the spread sheet is as shown below:- ABCDEFGHName Class MathsScienceITEnglishAv. MarkPass/Fail1Allen 11A33241944302Dyos 11B41547031493Keg 11A82695752654Khan 11C44215085505Kolacz 11A73517351626Lenski 11B17414034337Peruza 11C8772646171 Which column has been used to sort the data? What formula has been entered in cell G2 to calculate the Allens average mark? could be done (iii) The IT results need to be sorted so that the highest mark is at the top. Describe how this sort (iv) The formula IF (G5>45, PASS, FAIL) is entered in cell H5. What output appears? (v) State the validation check that should be carried out on data entered in cells C2 to F8 to ensure values over 100 are not input (15mks) 18. (a) (i) Explain three communication services offered through internet (ii) Describe the following internet terms:- Links .. URL (b) The following is a spreadsheet relating to a farmer ABC1CropAmount 2Maize 1503Bean 3004Cashew nuts8505Cabbages 1036 (i) A function = IF(B2<200,Not Viable), IF(B2>300, Moderate), IF(B2>1000, Variable))). Give the appropriate result returned in cells C2, C3, C4, and C5 18. (c) Text can easily be selected using a mouse in word processing. How do you select (i) Multiple paragraph (ii) Vertical block of text (d) (i) Distinguish between widow and an orphan processing (ii) Cut and copy commands (e) Give one purpose of drop caps on a text paragraph (f) (i) What is an expert system? (ii) Give two applications of expert systems 19. (a) Explain the advantage of using twos complement over ones complement (b) Using twos complement, subtract 4 from 7 and give your answer in decimal notation (c) An organization is planning to develop a new information system to manage its operations. (i) Explain the following characteristics of a system Holistic thinking System entropy (ii) List four tools that could be used in designing the information system during the design stage (d) Explain any three threats to data and information (e) Explain the purpose of the following types of program documentation (i) User manual (ii) Reference guide 20. (a) Define feasibility study as used in system (b) State four devices under direct control of the operating system (c) Briefly describe the following types of computerized errors: (i) Truncated (ii) Transposition (iii) Transcription (d) Explain three most commonly used coding schemes (e) Distinguish between online and real time processing (f) State one advantage and two disadvantages of command line interface *MUM* 1. State two functions of the SHIFT key as used in a word processor. 2. (a) How do registers differ from buffers. (b) List four examples of registers. 3. Daniel has noticed the following problems in his computer; (i) It is taking a longer time to start up. (ii) It is often hanging (iii) Applications are taking long to load. State three possible causes of these problems and how they can be solved. 4. List three functions of an anti-virus software. 5. Differentiate between a virus and a logic bomb. 6. The cells K3 to K10 of a worksheet contain remarks on students performance such as very good, good, fair and fail depending on the average mark. Write a formula that can be used to count all students that have the remark very good. 7. The following information shows the income and expenditure for Beba yote matatu for five days. The income from Monday to Friday was Ksh.4,000, 9,000,15,000 and 20,000 respectively while expenditure for some period was Ksh.2000,3000, 7000, 5000 and 6000 respectively. (a) Draw a spreadsheet that would contain the information. Indicate the rows as 1 , 2, 3 and 4 and the column as A,B,C (b) State the expression that would be used to obtain: (i) Monday profit. (ii) Total income (iii) Highest expenditure. 8. Describe the following terms: (a) Software suite (b) Shareware (c) Groupware (d) Integrated software 9. (a) Subtract 01112 from 10012 (b) Using twos compliment subtract 7 from 40 and give the answer in decimal notation. 10. Distinguish between uploading and downloading. 11. Distinguish between peer-to-peer Networks and client-server networks. 12. List any two techniques used to implement information systems in various organizations. 13. Distinguish between a word and word-length as used in data representation. 14. Describe three types of maintenance that can be applied on information systems. 15. (a) Study the flowchart extracts below (b) State the looping structure demonstrated in (c) List any four methods of detecting and correcting programming bugs. (d) Draw a flowchart for a program that can be used to add any positive integers that can be keyed into the computer through the keyboard. The program should count the positive numbers entered and should be terminated when a zero is keyed in. 16. Below are two table structures of files in a database: TABLE 1 TABLE 2 Field Data type Field Data type Employee number Text Employee number Number Employee Name Auto number Data employed Date/time D.O.B Date/time Department Test Address Test Salary Currency (i) Which of the two tables is likely to be the parent table? *MUM* (ii) It is advisable to enforce referential integrity when creating a relationship. When creating a relationship, what do you understand by the term referential integrity? *MUM* (iii) The field employee No in Table 2 is likely to be the primary key. What is a primary key? iv) Which fields in both tables is most appropriate for creating a relationship? *MUM* (v) What will make the relationship between the tables fail to work? *MUM* (b) In databases, the field properties specify finer details related to the fields and the entries expected. State four field properties. *MUM* (c) State three functions of a database. *MUM* 17. (a) Explain three communication services offered through the internet. *MUM* (b) Describe the following internet terms. *MUM* (i) Browsing (ii) Web portal (iii) Home page (iv) Hyperlink (v) Uniform resource locator (c) The following spreadsheet is relating to a farmer. ABC1CropAmount2Maize1503Beans3004Cashew nuts8505cabbages1036 (i) A function = IF (B2< 200, Not viable, IF(B2>300,moderate, IF(B2> 1000, VIABLE))). Give the appropriate result returned in cells C2, C3, C4 and C5. (d) List any three functions of the control unit. 18. (a) List any three differences between an interpreter and a compiler. (b) State four characteristics of Random access memory. (c) Describe the following data security measures (i) Log files (ii) Fire walls (iii) Antispyware (iv) Audit trial 19. (a) What is a transmission media? (b) List two types of transmission media (c) Distinguish between a Hub and a switch. (d) With help of a well labeled diagram, describe the fibre optic cable (e) What are the functions of the following devices on a network? (i) Repeaters (ii) Network interface card (iii) Router (f) Distinguish between physical topology and logical topology as used in Networking *KSM* 1. Describe four electrical safety precaution rules that should be observed in a computer room. 2. Distinguish between a compiler and an interpreter. (2mks) 3. (a) Describe the term keys to storage system (1mk) (b) Games programs can be purchased from computer stores on CD-ROM. State two advantages of CD-ROMS over floppy disks (2mks) 4. State two outputs device that are found at the point of sales terminal (2mks) 5. Outline any four editing features of a word processor. (2mks) 6. Describe briefly how a laser printer works (2mks) 7. (a) Identify the main stage of program development (4mks) (b) Define the terms program documentation (1mk) (c) List program control structures giving examples (3mks) 8. Distinguish between high levels and low levels language giving one advantage and one disadvantages of each of them (2mks) 9. (a) Explain the difference between the following commands as used in MS-DOS (2mks) (i) Dir/p (ii) Dir/w (b) Write one command that can be used to format a diskette and copy system files to it (1mk) 10. Differentiate between real time processing and batch processing giving examples where each could be used. (2mks) 11. Differentiate between computer added design and computer aided manufacture (2mks) 12. What is a computer network? (1mk) 13. Describe three difference types of computer network (3mks) 14. State three symbolic data representation (3mks) 15. State two properties that an opening system display about a file (1mk) 16. (a) Distinguish between Algorithm and Pseudo code. (3mks) (b) A company has 5000 CDs, video and books in stock each items has a unique 5 digit code with the first identifying the type of item i.e. 1=CD 2=DVD 3= video 4=Book For example, for the code 15642 the 1 identifies that it is a CD, and for the code 30055 the 3 identifies these it is a video Write an algorithm, using pseudocode or otherwise, that -inputs the code for all 5000 items -validates the input code (12mks) 17. (a) List three differences in the computer training provided by colleges as opposed to those offered by the universities (3mks) (b) Describe three duties of each of the following computer specialists :- (6mks) (i) Database administrator (ii) System analyst (c) Information technology has bought about a lot of concern in peoples lives-social effects, list three arguments for and against information technology (3mks) (d.) Repetitive strain injury happens when one overuses the computer keyboard or mouse. Causing inflammation or injury on muscles or tendons .Describe three measures users can apply to prevent or reduce RSI (3mks) 18. A school computer laboratory is scheduled o undergo major renovations. The lab is schedule to receive new computer whose specifications are given below:- Pentium IV 2.8GHz processor 40GB HDD 31/2 FDD 256 MB RAM 568CD ROM 17 SVGA TFT monitor The computers are gong to be networked and will be able to browse the internet. (a) Explain what is meant by the terms:- (2mks) (i) FDD (ii) HDD (iii) SVGA (iv)TFT (b) The computer is to be networked, name one extra device that should be fitted on every computer to enable this to happen (1mk) (c) The computer is to receive internet facilities through the server on a dial; up system. Name and describe the function of a special device that needs to be connected to the server to complete the connection (1mk) (d) (i) The school has to apply he star topology to link up the computer. List two advantages of this type of topology (1mk) (ii) Name the central device used to connect the computers in this topology. (1mk) (e) List two other types of topologies that the school could have opted for (1mk) (f) List four advantages of using a network (2mks) (g) (i) Data transmission via the internet is done using a mode known as packet switching. Describe this data transmission mode (1mk) (ii) Name two other modes of data transmission (1mk) (h) (i) The schools LAN is done using UTR cable. List two disadvantages of using this type of cable. (1mk) (ii) List two advantages of using fibre cable in networking (1mk) (j) Data flows in the schools LAN in a duplex manner. Discuss two other type of data transmission in network giving examples (2mks) 19. (a) Differentiate between a database and a DBMS (1mk) (b) List four advantages of using database systems (2mks) (c) In a data base system, data integrity ensures the correctness and completeness of the data in the database. Differentiate the following types of integrity constraints:- (i) Validity integrity (1mk) (ii) Entity integrity (1mk) (iii) Referential integrity (1mk) (d) Briefly describe the three database models :- (3mks) (i) Hierarchical model (ii) Network model (iii) Relation model (e) Using diagrams describe the following three types of relationships (3mks) (i) One on- one (ii) One to- many (iii) many-to-many (f) File organisation refers to the arrangement of records on secondary storage. Briefly describe the following file organization methods:- (3mks) (i) Sequential (ii) Random /direct (iii) Serial 20. (a) State and describe any two areas of Artificial intelligence (2mks) (b) What is virtual reality? (1mk) (c) List three component of a virtual reality gear (3mks) (d) By giving an example define:- (i) A smart terminal (2mks) (ii) An embedded computer (2mks) (e) State three factors to consider when selecting a UPS (3mks) (f) Give two uses of computer in stock exchanges (2mks) *TZM* The computer processing cycle involves a four step process List them (2mks) 2. The CPU consists of control unit and arithmetic logic unit State the functions of the two units(2mks) 3. Name and explain the two types of primary memory. (3mks) 4. State the functions of the following keys in a computer key board Pause (1mk) (ii) Function keys (1mk) (i) Explain the importance of microphones combined with speech recognition device such as voice output. (2mks) (ii) State the main disadvantage of the above method of data input. (2mks) 5. The most popular type of electronic data storage currently is magnetic disk storage such as hard disk or Winchester disk. Give reason as to why they are popular (2mks) 6. Outline two advantages of hard disk over floppy disk. (2mks) 7. One stage of system development is system testing. Outline the advantages of this stage before implementation. (1mk) 8. (a) Convert 111.011 EMBED Equation.3 to a decimal notation. (2mks) State one advantage of using binary number system in computers. (1mk) 9. State one function of each of the following terms (3mks) Buffer....... ii) An accumulator iii) Cache memory............................................................................................................................... Explain any two factors that should be put into consideration during output design. (2mks) (i) Define the term graphic and give two examples (2mks) (ii) List any two sources of graphic that can be used in Microsoft word. (1mk) 12. State the functions of the following logical functions as used in excel If........ (1mk) Sum If ............. (1mk) Count If...... (1mk) Why would one prefer to use a form for data input rather than entering data directly into a table. (2mks) When using wizard to create a form, list four forms layout that you can use. (2mks) 13. Distinguish between the following terms as used in DTP (4mks) Tracking and kerning Stroke and fill 14. (a) Define the following terms Structured programming (1mk) Constants (1mk) Variable (1mk) (b) Distinguish between dummy data and real data as used in system testing (2mks) (c) Mr Lugeno borrowed a loan of 200,000 from Ndege chai cooperative society at a rate of 10%payable in 2 years flat rate. Draw a flow chart that can be used to develop a computer program that will keep track of monthly repayments (5mks) 15. (a) Define the following computer crimes Piracy (1mk) ii) Industrial espionage (1mk) (b) Explain two ways of protecting data and information against unauthorized access (4mks) (c) Explain two functions of network operating system. (4mks) (d) Differentiate between a repeater and a router as used in computer networking. (2mks) (e) List down three duties of a computer trainer (3mks) 16. (a) Explain any two types of human computer Interface. (4mks) (b) State four basic requirements of a standard computer laboratory (4mks) Out line three types of job opportunities that are available in the computing field (3mks) (d) (i) Differentiate between video conferencing and telecommuting as used in communicating system (2mks) (ii) Highlight two advantages of telecommuting (2mks) 17. (a) Distinguish between the following (i) Sequential and serial file organization methods. (2mks) (ii) Random and indexed sequential file organization methods (2mks) (b) Explain the following types of data processing modes Batch processing (2mks) ii) Real time processing (2mks) (c)Define the following terms Undo (1mk) ii) Redo (1mk) (d) State three breakthrough of Information Communication Technology (ICT) in health care (3mks) (e)List any two under graduate programs offered in public universities in Kenya (2mks) 18. (a) Draw a flowchart showing; The WHILE loop (2mks) The REPEATUNTIL loop (2mks) Differentiate between the following terms Information system and system (2mks) Hard system and soft system (2mks) (c) List the seven stages of System Development Cycle (SDLC) (7mks) PAPER TWO *NYR* QUESTION 1 M/s Ann Momanyi, an ICT consultant with Makueni Distributors is in the process of developing a Management Information System (MIS) for the Company. Currently, she is designing sales database using three tables namely: - customers, products and transactions. The details for each table are given below:- Customers Products Transactions Customer ID ProductID TransID CustomerName ProductDescription ClientName PostalAddress Packaging TransacDate Town UnitPrice Product Phone Stock Quantity Questions (a) Create a database named MIS and in it create three relations (b) Identify the most appropriate field as the primary key in each table (c) Establish relationships among the three tables and enforce the referential integrity (d) Create a form for each table. Save the forms as Customer Form, Product Form and Transaction Form (e) Use the respective forms to enter the following records in each table CUSTOMERS TABLE CustomerIDCustomer NamePostal AddressTownPhoneH001Andrew Mwove209Mutituni200870H002Erick Onsongo68Nyamira 248567H003Brenda Nyabuti100Bomet789678H004Lydiah Winzaa250Mwingi778009H005Jeff Ogero330Keroka 666790H006Maureen Makuthu550Kakeani 780906 PRODUCTS TABLE ProductIDProduct DescriptionPackagingUnit PriceStockAA001Cooking Oil20 kg Gal1600080AA003Rice 50Kg Bags450060AB004Detergents 5 Litres1100040AC006Fertilizer 50Kg bags470030AA007Mineral Water1.5 Litres 8200400TRANSACTION TABLE CustomerIDClientNameTansacDateProducts Quantity 1001Andrew Mwove06/04/2007Cooking oil6100226/04/2007Mineral water81003Erick Onsongo23/04/2007Detergents 101004 Maureen Makuthu14/04/2007Cooking oil12100502/05/2007Rice 4100608/05/2007Fertilizer 31007Erick Onsongo16/05/2007Detergents 25(f) Create a query that displays the customer Name, Product Description, Quantity, Unit price and a calculated field total payable by each customer. Save the query as MISQuery (g) Generate a report from MISQuery. Save the report as MISReport (h) Print the Customers, Products, Transaction tables design, MISQuery and MISReport QUESTION 2 Using DTP software design the publication based on the following instructions to appear as it is 1) Set the page to have portrait orientation and margins to be as follows; (a) Format the heading: BISELEX BUSINESS to bear the following features:- (b) Font type: Copperplate Gothic (c) Font size: 26 (d) Background color: grey (f) Alignment: centered 2) Format the heading New Arrivals for new generations to bear the following features:- (a) Font type : Monotype corsiva (b) Font size: 22 (c) Alignment: Centered (d) Border style: 6pt (e) Rotate it appropriately 3) Format the heading All Under One Roof to bear the following features:- (a) Underline style: words only (b) Font type: Arial Narrow (c) Font size: 20 (d) Alignment: centered (e) Rotate it appropriately 4) Format the text below the heading Motto : Customer Satisfaction to be in three columns and format it as follows:- 1st column i) Drop cap the first character to four lines ii) Line spacing 1.25pt 2nd column i) Underline the title Items with a broken line ii) Text weight: bold italics iii) Bullet the listed items appropriately 3rd column 5) Insert the rounded rectangle and format its heading to : (i) Underline : Double (ii) Font type: Arial Black 6) Format the text under the heading LOCATION as follows:- (i) Font type: Castellar (ii) Font size: 9pts 7) Insert the suitable picture as it appears in the publication 8) Insert the header to bear Your Name and the Footer to bear Your Index Number  *MAT* Question 1 (a) Wafula is a secretary for all clubs in the school. He has been told to create Club_DBMS id database management system (DBMS) to help the club maintain record on the clubs members. Relation nameFields Primary key Student Admission Number Admission numberFirst Name Last NameFormStream  Club_Details Club Number Club NumberClub NameDate established Membership Registration Number Registration NumberClub NumberAdmission NumberDate of registration Membership fee (a) Perform the following operations just like Wafula would: (i) Create a database Club_DBMS with the tables shown above. (12mks) (ii) Index on last name on the able student (2mks) (iii) Crate a lookup list for the following fields in class student (3mks)  Field Lookup listField Lookup list Form One  Class East Two North Three West Four South  (iv) Create One-Many relationship between the relations and enforce referential integrity (3mks) (b) Create use friendly screen inputs with the Add New Record, Find Record, Delete Record and Close Screen Input commands for each of the table, save them using respective tables name (12mks) (c) Using the input screens, enter the records below: (6mks) Admn. No.First NameLast NameForm Stream 3200Busaule Mwitani Two East 3811Mawi Martha One South 2844 NambwayaNancy Four East 2910Wafula Victor Four Central 3295Hassan Eunice Three East 2956Busolo Josephat ThreeNorth2977Makhanu Josephat Four South3216Mateshe Jackline Three West  Club Number Club NameDate established 97/MatMathematics 05/02/199702/Sci Science 08/04/200201/EnvEnvironment 01/09/200197/LanDebate 08/04/1997 Reg. NumberAdmn. No.Club No. Reg. DateMembership FeeMT/0013284497/Mat12/03/2007100SC/0189297702/Sci11/03/2007120MT/0975291097/Mat05/05/2007100DB/0111297797/Lan11/03/200790EN/1001381101/Env01/03/201080SC/0998321602/Sci09/10/2008120SC/1006284402/Sci12/03/2007120DB/0565329597/Lan10/05/200890 (c) Create a query for each record containing the product of membership fees $ multiplied by 79.8. Label this column Amount in shillings. The query should display: Last Name (in ascending order), First Name, Registration Number, Date of Registration, Amount in shillings. For all members whosel last name start with M or J and first name start with M save the query as Query M (8mks) (d) Create a query that Display Admission Number, Last name, first Name, Club Names and Registration date for form four students. Save query as Members (3mks) (e) Create a tabular report from Query-M that displays Last Name, First Name, Membership Number, Date of Registration, Membership Fees paid in shillings and display the total to the membership fees at the end of the report. Save the repo\rt as Membership Report (5mks) Admn. No.First NameLast NameForm Stream 3200Busaule Mwitani Two East 3811Mawi Martha One South 2844 NambwayaNancy Four East 2910Wafula Victor Four Central 3295Hassan Eunice Three East 2956Busolo Josephat ThreeNorth2977Makhanu Josephat Four South3216Mateshe Jackline Three West  (f) Create a tabular report from Members query, sort the records by first name and save it as Club Members. (4mks) (g) On each report, add your name, index number and page number in the format Page X of Y pages as footer (4mks) (h) Add Mary Seat of Wisdom Bulimbo Girls Sec. School and Report Name as Header on each report (2mks) (i) Print membership Report, Club Members, Query-M and Student table (4mks) Question two (a) Enter the following as it is onto worksheet and save it as the budget (7mks) ABCDEFGNo.Item descriptionQuantity boughtUnit priceAmountCommentsCost Rank12Kg Mumias Sugar 42102Sony 2HD floppy 3373Rapid spring file10564200pg A4 books98951 litre Quencher22566AIHAO Gelink pen15557Omega dustless chalk181058LG 2GB Flash Disk41055Total  (b) Rename worksheet 1 as Budget and Worksheet 2 as My Graph (3mks) (c) Insert two rows above labels in the budget 1 worksheet. Enter in the first row, a Word Art A sample Budget: Back to Business. (4mks) (d) Enter cell B2 and C2, VAT and 18% respectively (1mk) (e) Calculate ; (i) Using name referencing calculate the amount for each item (amount = quantity *price) (4mks) (ii) Total quantity, price and amount using formulae (3mks) (iii) Display Thank for shopping for amount above 500, Almost in a draw for amount between 250 and 499, otherwise Buy More (4mks) (f) Using column E, rank the items with the most costly ranked as the last (4mks) (g) Format all values on the worksheet to two decimal places aligned right of cell and in pounds () (3mks) (h) Copy the information on Budget1 worksheet to workshet3. Rename corksheet3 as copied(2mk (i) Save the workbook as Budget2 (1mk) (j) Change respective quantities of items on budget 1 worksheet (1mk) Sony 2HD floppy 18 200pg A4 books 12 (k) Using item name and taxes on Budget1 worksheet, create a line chart of item description and amount on worksheet My Graph (8mks) (l) Save the workbook as Final Budget and print the chart (2mks) *MUM* WORD PROCESSOR 1. (a) Type the following passage exactly as it appears into a word-processor, spell check and format it accordingly. Use typeface Times New Romans, font size 12. Format your document to fit exactly on one page. Save it as A: NET 1 (26marks) NETWORKS MODELS Networks can be organized into three basic models client/server, peer to peer and centralize computing. Client/Server and peer-to-peer are used with PC networks. While centralized computing models are used with mid-range and mainframe computers usually running a UNIX-based operating system. The peer-to-peer model is the simplest to implement and assemble. Client/server is the most popular configuration, because of its versatility and power drawing mainly from the vast variety and higher performance of specialized server hardware. Central computing networks The host is the core of the centralized computing model. Host computers typically run the UNIX operating system and can process multiple jobs simultaneously and in a very efficient manner. Jobs are initiated by the Terminal, which has no processing capability on its own and simply provides input/output for the host. The user logs into the host computer to process the users job; when the job is finished, the host computer sends the results of the job back to the terminal. The main advantage of centralized computing is that they are the highest performance networks today. Its major disadvantages are: They are costly They are dependent on custom written software They are more complicated than PC severs Client/Server Networks The client/server network is the workhorse of the network world and consists of at least one server with shared recourses and one or more clients which users do their work on. The server, often called the back end, stores and secures users files. It provides the single point of administration for network users, files, and applications. In a client/server network, the function of the server is to provide services, where as the function of the client is to provide the actual processing. Most client/server networks are built round a domain structure, where all servers within a given domain share a common administration scheme. Peer-to-peer Networks A peer-to-peer network is simply a group of computers that function as both servers and clients (share and access resources). In this type of network, a user works on a workstation and actually shares that workstations resources with other workstations. Disadvantages It may be slow Lack of a central security administration Decentralized administration might be a nightmare. (b) (i) Bold face and italicize all the occurrences of the words client/server (ii) Justify and set the left and right indents of the second paragraph at 1 inch. (ii) Save the document as A: NET 2 (6mks) (c) (i) Copy NET 1 passage to a new document (ii) Present the document into two columns with a line between the columns. Introduce a column break on the sub heading Client/Server Networks so that your second column begins exactly with that header. (iii) Save the new document as A:NET 3 (6mks) (d) (i) Introduce double space in the last paragraph of NET 2 (ii) Search and replace the word host with main in the whole passage. (iii) Save the document as A:NET 4 (6mks) (e) (i) Animate the title of the passage of document NI-T4 to have a blinking background. (ii) Convert the paper orientation to landscape and format your document to fit on one page. (iii) Save the passage as A: NET5 (5mks) (f) Print2. A stationery store keeps a record of all items sold in the store. The details are given in table 3 table 3 below. Item code Description Quantity Supplier 005 001 009 007 010 006 002 003 008 004HBI pencils (doz) Stapler Photocopy paper (reams) Staples (packets) 120 pages (ex. Books) Spring files Diskettes HB2 pencils (doz) Foolscaps (reams) Chalk 200 100 200 300 200 200 300 500 300 350Shah Shah Chania Vipingo Vipingo Shah Chania Shah Vipingo chania (a) Create a database structure containing the fields: Item code Description Quantity Supplier (b) Enter the records as shown in table 3 into your database and save it as Stat 1. (l2mks) (c) Modify Stat 1 to include the field for date received and save as Stat 2. (3mks) (d) Items with cods 001, 007, 009 and 010 were received on 10/05/200 1. Items with codes 002, 005, and 008 were received on 12/05/2001 and the rest were received on 15/05/2001. Enter this information on the date received field. (5mks) (e) Sort Stat 2 on item code field in descending order and save it as Stat3. (6mks) (f) Create a query to extract all items delivered by Shah on 15/05/200 1 and save as query 1. (g) Using Stat 1, generate a tabular report titled Stationery store items and containing the following fields in the order shown. Supplier Description Quantity Save the report as report 1 Print Stat1, Stat3, query 1 and report1 (8mks) *TNW* Q1. (a) Type the passage below as it appears using a word processing package and save it as A:\Bono1. (Settings: Font Arial, font size 12 for all text, margins; top 0.5, bottom 0.6, left 1, right 0.5, 1st Heading Size 20, 2nd & 3rd Size 14 ). 36mks WE MUST STRIVE FOR GREAT THINGS IN LIFE  one should leave legacy that speaks for years. Paul Hewson was in Nairobi recently. That wont mean much to you, until I explain that I was referring to Bono, the world famous lead singer of rock band U2 and campaigner against global poverty. Bono didnt really make much noise while in Kenya. He attended the (Nation Media( groups Pan Africa Media Conference, took H2o, talked to a couple of journalists and left. He didnt do the other things that visiting celebrities of his stature do when in Africa: adopt a cheetah or a baby hippo, start a school for orphans, shoot the breeze pointlessly with Emilio and Tinga, utter banalties about the girl child. Bono reserves his energy for other things. Popular Media Bono is not famous just for being a singer. For the past couple of decades he has been one of the most visible humanitarian activists, using his fame to enlist powerful allies from: Government Religious institutions Philanthropic groups Popular media and The business world. He has personally spearheaded the campaign for debt relief for the worlds poorest countries, and has been a vocal champion for Africa. Not everyone agrees with these efforts. Author Paul Theroux savaged Bono, Bob Geldof and other celebrity humanitarians, saying that creating the impression that Africa is fatally troubled and can be saved only by outside help not to mention celebrities and charity concerts is a destructive and misleading conceit. I happen to agree with that view and have propagated it in writing for many years. I dont think Africas salvation will come from outsiders,  and it certainly wont come from endless handouts and a crippling dependency culture. On Trivia What about you? How big is your life? Are you allowing your time on earth to be frittered away on trivia, or are you going to make a net positive impact on the planet? Are you doing something, anything bigger than yourself? Are you raising a child to be a better person than you are? Are running a business or conducting a profession that sets a standard in good practice? Or are you content to be a small person imprisoned in a small life? b) i. Copy the paragraph that begins with He has personally.. to page 2. (1mk) ii. Set the paragraph to hanging indent. (1mk) iii. Change the line spacing of the entire paragraph to double and convert it to landscape.(4mks) c). Insert your name and index number as the header left aligned. (1mk) d). Carry out word count on the document and write on the paper provided the number of: Words Characters (with spaces) Characters (no spaces) (3mks) e). Paginate the document using page x of y at the top center. (2mks) f). Save the entire document as A:\Bono2 (1mk) g). Print document A:\Bono2. (1mk) Q2. The information in the following two tables relates to a vehicle buying and selling business. Table 1: Seller details Seller NoSeller NameAddressTown8215Samcon23454Nakuru8242CMC654Eldoret8430DCM motors3554Nairobi8620Farmers Garage7645Kitale8845KCI8643Kisumu Table 2: Vehicle details Reg NoMakeTypePriceSeller NoKAJ 543QNissanMatatu1,200,0008242KAQ 952RMercedes Saloon4,000,0008242KAX 534SPeugeot Pickup960,4008620KAZ 454CMazdaSaloon550,0008215KBA 386AToyotaPickup750,0008620KBB 917AToyotaSaloon800,0008430KBE 875TIsuzuLorry1,800,6508430KBG 805GScaniaBus10,500,0008845KBJ 324DIsuzuBus9,200,0008845KZL 931ToyotaMatatu1,400,0008620 a). Create a database file named A:\Business. (2mks) b). Create the two tables above and save them using their respective names. Determine the appropriate primary keys. (10mks) c). Create a form based on each table. Insert form titles as seller details form and vehicle details form respectively. (5mks) d). Use the forms to enter the records in the two tables as shown above. 15mks) e). Create a query containing the following fields(Reg no, Make, price and Seller name). It. Should display only those vehicles whose prices are above 1000,000. Save as Sales1. (6mks) f). Remove the criteria set in sales1 query. Include a calculated field in the sales query to derive new prices if the current prices went up by 5%. Save as sales2. (5mks) g). Create a tabular report based on sales2 query. The report should show the total amount collected from selling the vehicles if they were sold at their new prices. Save as report. (4mks) h) Print the seller details table, vehicle details table and the report. (3mks) *KKC* QUESTION 1 (a) Type the following letter as it appears in a word processor. Use the mail merge feature to produce copies of the same letter to the persons whose details are given below:- (12 mks) MWANGAZA HIGH SCHOOL P.O. BOX 4800 ELDORET 8TH JULY, 2010 (NAMEe" (ADMNOe" (ADDRESS( (TOWN( Dear (Name( RE: 2009 KCSE RESULTS I AM Happy to inform you that NOKDEC Examinations are out. Kindly arrange to visit our school on ((Date to visit ( at 9.00 a.m. In order to know the details. Remember to carry your original K.C.P.E certificate and Examination register card bearing the index number. Yours truly, Headteacher Data source (List of candidates) NameAdm. No.AddressTownDate of visitMark Otieno8071P.O Box 24Sondu10/08/2010Kevin Kirui8089P.O. Box 172Kericho11/08/2010Benard Soi8065P.O. Box 84Bomet24/08/2010Required:- i) Save main document as Main Doc (1 mk) ii) Save data source as Data source (1 m) iii) Change addresses and reference font size to 14 points. (1 mk) iv) Underline the reference. ( mk) v) Merge the letter onto main document so as to produce copies for all the candidates and save it as Results 2009 (6 mks) vi) Print the letter, main Doc, Data source, Results 2009 (3 mks) b) Type the following text in a word processing software. (22 mks) INTRODUCTION TO COMPUTERS & OPERATING SYSTEMS. A computer is a machine or an electronic device that can solve problems by accepting data, performing certain operations on that data (processing) and presenting the results of those operations (information) Basic characteristics that distinguish a computer from other information processing devices:- (i) A computer is electronic That is, all its processing operations are carried out with electrical signal. (ii) A computer can store information for future reference. This is done on temporary basis with memory circuits and permanently with storage devices such as magnetic disks and tape. (iii) Computer is programmable unlike other devices built to perform a single function, a computer can be instructed or programmed to perform a variety of tasks. HOW A COMPUTER WORKS. Connecting the data (raw facts) into information (organized, usable form) is called data processing. Data get into system by means of an input device e.g. keyboard then the computer performs the necessary calculations or manipulations on the data and finally the organized information is displayed by an output device e.g. a monitor. FUNCTIONS PERFORMED BY A COMPUTER. Although computers have many applications, they can perform only three basic tasks (i) Arithmetic functions on numeric data (Adding, subtracting, multiplying and dividing). (ii) Test relationship between data items (by comparing values). (iii) Store and retrieve data. These skills are really no more than people can do, but the computer can accomplish the task more; - Faster - Accurately - Reliably Required:- (a) Align the title to the centre and underline it. (1 mk) Add boarder to the title. (2 mks) Replace all the Roman Numbers with bullets. (2 mks) (d) (i) Insert the footer Computer Assessment Test 2010. (1 mk) (ii) Insert the header Your Name and the Index No. (1 mk) (e) Set the spacing to exactly 1.5 (4 mks) f) Insert Word Art COMPUTER and set it to appear behind the text. (5 mks) (g) Search for words computer and replace all with PC. (2 mks) (h) Move paragraph with heading How a computer operates to the end of the document. (i) Set the front style of the document to Aerial black. (3 mks) (j) Save your work as computer literacy. (1 mk) (k) Print your document. (2 mks) 2. (a) Create a new workbook and name it as form 4 computer exams. (1 mk) NAMECLASSAdm No.CAT1CAT2CAT3TOTALAVERAGECLASS POSITIONREMARKSMaina JoanE7984807059Ken KorirW7896755572Benard K.E8092865975John SoiE7460807970Kipsang BettW7892767580Mitei E.E7800384825Mark J.W8490375129Koech BenW8184308675James W.E8082252720Abuya KenE8083302525Leonard B.W8047392425 (b) Enter the following data in sheet 1. (20 mks) (c) Rename the sheet as Term One Results. (1 mk) (d) Find: (i) Totals (2 mks) (ii) Average (2 mks) (e) Use IF function to award remarks as follow: - A student whose average is above or equals to 65 gets Excellent. - An average of 55 or above but less than 65 gets Average. - An average of less than 55 award Below Average. (f) (i) Award positions to students basing on the average score. (3 mks) (ii) On the last rows enter formulas to count students from both classes. (2 mks) (g) Sort the student list by class position in ascending order. (2 mks) (h) (i) Insert a bar graph to display the information below:- - The three CATS - Names - Title as TERM ONE COMPUTER RESULTS ii) Place the legend at the bottom of the graph. (1 mk) iii) Save the chart on a new sheet and name it graphical analysis. (1 mk) (i) Print: i) The filtered lower group. (1 mk) ii) The chart. (1 mk) iii) Term one results sheet. (1 mk) *UGU* 1. (a) Using a word processing package, type the passage below as it appears and save it as A:/STRESSDOC1 (27mks) A parent who appreciates by saying, Well done or Im proud of you can leave an indelible mark. There is much more to facing stress in life than the right diet and physical exercises. Indeed, it could be that the attitude on which your life is founded is the most vital part of the picture. Take charge of your life Keeping stress at bay involves treating yourself as someone with a right to life. That will involve a degree of assertiveness and confrontation. Those very words can conjure up images of a shoot-out at the OK Corral. It does not have to be that way. There is a world of difference between being assertive and being aggressive. Sadly, many who need to break out from being always submissive to the expectation and demands of others can only imagine that the alternative is to be aggressive. You are submissive when: you are not willing or not able to express your feelings, needs, values and personal concerns you let others invade personal space and trample on your rights. You are aggressive when: - you tend to stomp over other people - you inflict and impose your views and values on others, expressing your feelings at their expense. You are assertive when: you say what you want, without overwhelming or abusing other people you are clear about your own position and let other people know you can accept that others may have views different from your own and may wish to negotiate their position accordingly. Assertiveness involves much more than defending your rights. It equally concerns your being prepared to expect that your own needs be recognized and met. In particular, two key statements typify the maturity of character that lies behind assertive. These are the conviction that: I have the right to decide for myself whether or not I am responsible for finding a solution to someone elses problem and they have the same right when faced with mine. I have the right to deal with people without having to make them like me and they have the same right concerning me. Few people find that assertiveness comes easily. But the hard work involved in monitoring your personal style together with some training through a local evening class or appropriate reading pays dividends. This is because mastering assertiveness leads to: better and more honest communication giving others greater dignity and respect learning to relax and reduce anxiety getting more of your needs accepted closer interpersonal relationships taking responsibility of what happens in your life feeling better about yourself protection from being taken advantage of by others (b) (i) Spell check the passage (2mks) (ii) Indent the first line of the paragraph starting with Keeping stress at bay.. (2mks) By 1.2cm (or 0.47) (iii) Select the paragraph starting with Assertiveness involves much more.. and set the left and the right margins to 2cm (or 0.79) and fully justify. Save the changes as A:/STRESSDOC2. (6mks) (iv) Insert page numbering at the bottom center of each page (2mks) (c) (i) Retrieve A:/STRESSDOC1 and covert all the text from the paragraph starting with There is much more into two columns of the same width and height. (5mks) (ii) Change the line spacing for the entire paragraph starting with There is more to facing stress. to 1.5. (2mks) (iii) Save the changes as A:/STRESSDOC3 (1mk) (d) Print the documents; A:\STRESSDOC2 A:\STRESSDOC3 (3mks) 2. Use the information in the table below to design a database. Name the table as EmpT and store the database file as Company (20mks) NameDate of birth Sex ID No.Dept Salary paid (Kshs.)Peter20-07-71Male 1377841Accounts 3000James 30-5-78Male 1235542Sales 4000Gregory 30-06-79Male 1244745Account s5600Job14-04-77Male 2213540Marketing 4500Sarah 14-07-79Female 1124681Sales 3000Paul 12-04-80Male 1455367Accounts 3500Onyango 25-04-08Male 0147535Sales 7000Jessica 01-01-79Male 5664124Sales 3500 (a) Create a form named EmpF and add two more records using the form (5mks) (b) Create three reports to print the information below: (i) Employees listed by Department types (EmpR1) (6mks) (ii) Alphabetical listings of all employees (EmpR2) (iii) All employees in the sales department get a 2% commission on sales. Create a report to show the commission paid to all the sales people, if the basic salary for the sales people is Kshs.3000 (EmpR3) (8mks) (c) Create a query (EmpQ) to show who will be retiring at the end of the year, if the retirement age is 55. *KSM* 1. You are an accountant in affirm that provides mobile phone services. You wish to work out the pay details for a new employee and present a report. NAMEYEARS WORKEDBASIC PAYDEPARTMENTSALES (KSH)HOUR OF OVERTIMEMILEAGE (KM)Eric914000sales1600010120000Stephen2318000admin2500011130000Fred57000sales2200012112000John1718000marketing1200015134200Julius1816000sales1100022123000Daniel325000admin300001210200Martin1119000sales3500033132000Stanley1515000marketing1400014112000Evans1123000admin25000012000Gideon817000accounts140007154000 (a) Using the information above, design an appropriate spreadsheet and enter the given data, give it a suitable title and save it as A: Tel 1 (14mks) (b) (i)calculate the total sales and total mileage and labels them accordingly (4mks) (ii) Write on the paper provided the formula used for total mileage (1mk) (iii) Save the spreadsheet now as A: Tel 2 (1mk) (c) (i) The employees sales commission is calculated as 11% of the employees sales. Input this commission rat in cell C20 and label it appropriately. (3mks) (ii) Insert a new column labeled sales commission between sales and hours of overtime (iii) Create a formula to give the amount f sales commission by making reference to sales commission cell. (4mks) (iv) On the paper provided write the formula created. (1mk) (v) Copy the formula to get the sales commission for all the other employees and save the worksheet as A: Tel 3 (3mks) (d) (i)staff who work in admin and work overtime are given a bonus of shs.3600 but no overtime pay, while staff who work in other departments are paid overtime pay at a rate of shs.200 per hour. Create a new labeled overtime and use a function to fill the value into the column appropriately. (6mks) (ii) On the paper provided write the function you have used (2mks) (iii) Save the spreadsheet now as A: Tel 4(1mk) (e) (i) Create a column for the sales/mileage ratio and label it sales/mileage. Use a function to calculate the ratio and copy it down the column to fill the value for all employees. (ii) Use the IF function to put the remarks GOOD in a new labeled REMARK for only these employees whose sales/mileage ratio is greater than 2 (4mks) (iii) Save the spreadsheet now as A: Tel 5 (1mk) (iv) Print files Tel 1, .Tel 2, Tel 3, and Tel4and Tel 5 (2mks) 2. Compulynx is a company with numerous branches in east Africa. in order to monitor the performance of the branches and that of the cities in which the branches are located, a database to organize the information is required:- (a) Create a database file and name it company (2mks) (b) (i) create a table containing the following fields (4mks) Field nameField typeSTORE-NONumber/numericBRANCHText/characterCITYText/characterSTAFF-SIZENumber/numeric (ii) Make the field STORE-NO the primary key and save the tables as STORES. (2mks) (c) (i) Create a form from the STORE able and save it as STORE-FORM (5mks) (ii) Use the form to enter the records below (5mks) STORE-NO BRANCH CITY STAFF SIZE I Tudor Mombasa 15 2 Bongo Dar-es-salam 14 3 Sunset Nairobi 21 4 lake view Kampala 15 5 kingorani Mombasa 9 6 Beach town kisumu 16 7 ABC Nairobi 89 8 crane Ltd kampala 7 9 wheat land nakuru 12 10 ocean view Dar-es-salam 6 (d) (i) Modify the Store table to include and additional field with the heading SALES(SHS) (3mks) (ii) Enter the information below for each of the stores (2mks) STORES-NO SALES 789,300 685,400 376,958 355,420 457,800 682,458 541,000 235,420 352,415 433,443 (iii) In the STORES table, swap the fields CITY with BRANCH (2mks) (e) (i) Create a query from the STORE tales to display the field BRANCH,CITY,STAFF-SIZE and SALES(SHS) for stores whose sales are less than 400,00 (3mks) (ii) Sort the records in the query above in alphabetical order of BRANCH field and save it as POOR PERFORMERS (2mks) (f) (i) create a tabular report with landscape orientation from STORE tables to display the field in the following order STORE-NO BRANCH SALES (SHS) 4mks) (ii) Sort records in the report in alphabetic order of the BRANCH field (1mk) (iii) Compute the total sales and place it below the SALES (shs) column and change its font size to 13 (5mks) (iv)Place two straight lines cutting across the page, one above and one below the sales total (g) (i) Insert a header COMPULYNX PERFOEMANCE in the report having font size 19 and centre it across the page (3mks) (ii) Remove the report pagination and insert your name and index number in its place and save the report as PERFORMANCE (2mks) (h) Print STORES table, POOR PERFORMER query and performance report *KKE* 1 a) Create anew workbook and name it as form 2 computer exams (1mk) Nameclass Adm.No:CAT1 CAT2CAT3totalaverageClass positionRemark Maina johnE7984807059Ken KorirW7896755572Bernard KE8092865975John SoiE7460807970Kipsang BettW7892767580Mitei EE7800384825Mark JW8490375129Koech BenW8184308675James WE8082252720Abuya kenE8083302525LeonardW8047392425b) Enter the following data in sheet 1 (15mks) c) Rename the sheet as term one result (1mk) d) Find: i)totals ii) Average (2mks) e) Use the subtotals function to find the average of each class (5mks) f) Use the IF function to award marks as follows A student whose average is above or equal 65 is given excellent An average of 55 or above but less than 65 award average work An average less than 55 award work below average Award position to students basing on the average scored (3mks) ii) On the last rows, enter formulas to count students from both classes (2mks) g) Sort the student list by class position in ascending order (2mks) h) i)copy the entire worksheet onto sheet 2 and rename it lower group(2mks) ii)filter lower group sheet to display students from E class and whose average score is below 50 i) Draw a bar graph to display the following information (3mks) -the three cats -names -Title as TERM ONE COMPUTER RESULTS Place the legend at the bottom of the graph (1mk) ii) Save the chart on a new sheet and name it graphical analysis (1mk) j) Print The filtered lower group (1mk) The chart (1mk) iii) Term one results sheet (1mk) 2 a) Create a database called ELIMU (2mks) b) Create three tables EXAMINATION, DOS and BOARDING with the field as shown below c) Create a relationship between the three tables and enforce integrity (6mks) d) Enter the data items in the given three tables (15mks) EXAMINATIONS Admission numbermathematicsEnglishKiswahiliBiology14567902310458990202457080453899090204789905056789609066790780734787090823503890923156720 DOSAdmission numberS nameOther namesKCPE MarkYear of KCPE1PeterBarasa327200710JohnsonSuk25020012AlexOjwang34019983ChepkutoEsther25020084WekesaRaymond45020075AlexWamwana41020036JaneKilonzo40020007MathewKariuki45019998NasimiyuCatheen29020039KimathiJohn3002001BOARDINGAdmission numberuniformtoolTool name1No12JEMBE10Yes20JEMBE2No11PANGA3Yes1SLASHER4Yes111JEMBER5No15RAKE6Yes22BASIN7Yes11BROOMS8Yes90RAKE9yes23BUCKET e) Design query that would display the following fields as shown below and write down the formulae for getting the total score and criteria for extracting the records below (10marks) Admin Admission numberuniformS NameKCPE MarkmathsEnglishKiswahiliTOTAL SCORE 1Yeschepkuto25089909026910Yeswekesa450789901772YesJane40067907164 f) Design a report that would sort the following in ascending order of the following fields, total score, and KCPE score, name the admission number and the report should display all the fields. Save the report as administration (5mks) g) Print, administration and admin (2mks) *RCH* Question 1. Ms Access Database (a) Create a database file called VIDEOS and use it to enter the details that follow. (3 mks) (b) Create a table called Customer using the following structure. (4 mks) Field Name Data type Size Description Caption Customer ID Number 3 3 digit unique number Customer ID Last Name Text 25 Enter the Last Name Last Name First Name Text 15 Enter First Name First Name Address Text 50 Address Address Birth Date data/time Enter yyyy/mm/dd Date of birth Home Tel Text 14 Home Tel. Home Tel. Work Tel Text 14 Work Tel. Work Tel. Email Text 40 Email Address Email Address Gender Place Text 1 M or F Gender Work Place Text 40 Place of employment Place of employment (i) Make the Customer ID Field the primary key. (1 mk) (ii) Format the Last Name and First Name fields to convert characters to upper case by using >. (iii) Enter Yes in the required property of the Last Name, First Name and Gender fields. (1 mk) (iv) Format the Birth Date field yyyy.mm.dd to input the birth dates ,year, month abd day.(1 mk) (v) Use the input mask for the Home Telephone and work Telephone fields. The input mask should be (999) 999 999. (vi) Format the Gender field to convert the character to upper case using >. (1 mk) (vii) Enter the M or F for the Validation rule field of the gender Field. (1 mk) (viii) Enter the Only valid entries are M or F in the validation Text of the Gender Field.(1 mk) (ix) Enter Yes in the required property of the gender field. (1 mk) (x) Save the tables as Customer. (1 mk) Customer ID Last Name First Name Address Birth DateHome Tel.Work Tel.Email GenderWork place 201 JOHNSON MICHELE RUBY PARK, ST PHILIP 1969/02/15(245) 431- 2916 (246)_ 2196  HYPERLINK "mailto:Michele@bclub.com" Michele@bclub.com FBankers Night Club 202 CHANDLER TRYONE BANK HALL, ST. MICHAEL 1969/03/05(246) 431- 8971 (246) 422- 1119 MGE Electronics 203 BANFIELD SHIRLEY 71 LONG BAY DEVELOPMENT 1970/10/26(246) 5441  HYPERLINK "mailto:sheba@email.com" sheba@email.com  F 204 ISIDORE EYSTHER 4MT STANDFAST, ST. JAMES 1968/11/10(246) 433 9172(246) 422 1999 FQueen Elizabeth Hospital 205 CONNEL WINSTON CANE GARDEN, ST. THOMAS 1971/12/10(246) 433 9172(246) 417- 4177  HYPERLINK "mailto:connel@hotmail.com" connel@hotmail.com MTransport Board 206 KELLMAN ARLENE ST. PATRIICKS, CHRIST CHURCH 1974/06/10(246) 421 2031(246) 426 2979  HYPERLINK "mailto:rebapay@sunbeach.com" sypher@hotmail.com  FKMGP 207 PAYNE REBA FOSTER, HALL, ST. GEORGE 1967/01/03(246) 423- 6823(246) 423 9741  HYPERLINK "mailto:rebapay@sunbeach.com" rebapay@sunbeach.com  FCore Crystal Hotel 208 GRANT FREDERIC H GRAPEHALL, ST. LUCY 1962/09/09(246) 417 2280  M 209 SMITH IRENE ASHTON HALL, ST. PETER 1945/07/07(246) 433- 3302  HYPERLINK "mailto:storm@hotmail.com" storm@hotmail.com F 210 THOMAS WICKMAN N BOSCOBELLE, ST. ANDREW 1943/04/06(246) 429 2916(246) 422 1231 MJG Retirement home  211 CATWELL PAULINE BRAGGS HILL, ST. JOSEPH 1970/02/02(246) 433 87 91  HYPERLINK "mailto:catpur@yaho.com" catpur@yaho.com  FCaribbean Union 212 GREAVES LINDA TOHMPSON ROAD, ST. THOMAS 1970/09/10(246) 417 - 4177(246) 417- 4177  FShoppers Retail Storec) Enter the following data into the customer table. (10 mks) (d) Save the table as Customer. (e) Some new data become available and a few changes have to be made to existing table. These tasks are listed below. (i) Enter the new address for Shirley Banfields as 7 Bayfield Development. (1 mk) (ii) Delete record 12. (f) Index in ascending order the customer table on the last name and first name fields in the design view. The index is called Name. (5 mks) (g) Perform a select query and print the last name, first name, address, home and work telephone numbers for each customer. He would like the information printed with the last names in alphabetical order. Save the query as Customer List. (5 mks) (h) (i) Create a query to display all customers who live in St. Michael or St. Thomas. Save the query as Saint. (2 mks) (ii) Display all customers whose last names begin with B save it as B. (2 mks) (i) Create a Customer data entry form from the customer table. The title of the form should be Customer Data Entry Form (4 mks) (j) Print customer table, Customer List, Saint and B. (2 mks) Question 2. Spreadsheet Microsoft Excel You are employed as a sales clerk at JOY TO THE WORLD Mobile Shopping Center. Make a Spreadsheet, which keeps track of 2001 Xmas Orders. Enter the data below, using a format of $ and 2 decimal places for the Cost. ABCDE1CLIENT (ORDER 1ORDER 2ORDER 3COST2A-03939356745259.003M-53923918910241.004A-72525720035.005R-34177534818353.006M-91015835845589.907P-39498120847.258M-03231918612838.759M-33345623518562.00 (a) Type the following data in a spreadsheet program and save it as SHOPPING. (5 mks) (b) Calculate the NET ORDER (i.e. the total number of orders for each client). (3 mks) (c) Calculate the SUBTOTAL for each client. (3 mks) (d) Sale tax is 6%. Handling cost is $8.00. Write them in appropriate cells in the spreadsheet.(2 Calculate the TAX AND HANDLING charge foe each client. (5 mks) (Subtotal* sales tax) + handling cost. (f) Calculate the TOTAL CHARGE for each. (5 mks) (g) Format ALL results from the above calculations as $ and zero decimal places. (3 mks) (h) Show the lowest, highest and average figures for each order. (5 mks) (i) Center, underline the name of the company at the top of the spreadsheet. (2 mks) (j) Save the spreadsheet as ORDERS 1. (1 mk) (k) Change the sales tax to 7% handling charges to $9.50 and the cost for client ( M-910 to $45.78. (l) Delete the record of client ( P-394. (2 mks) (m) Sort the records so that the client numbers appear in descending order. (3 mks) (n) Save as ORDERS 2. (1 mk) (o) To the right of $9.95, enter the alternative handling charge as $11.95. (1 mk) (p) Using ORDERS 2 to analyze the sales of order 1 only, delete the columns for ORDERS2, ORDERS S3 and the NET ORDER. Recalculate the SUB-TOTAL for each client. (5 mks) (q) Using ORDERS 2. If a customer buys 319 items or less, the handling charge will be $ 9.95. If the order is 320 or more then the handling will be $ 11.95. Recalculate the TAX and the HANDLING charge for each customer where TAX AND HANDLING = (Subtotal* sales tax) + handling cost. Enter the new formula in the TAX AND HANDLING column. (3 mks) (r) Make a bar graph in a new sheet called COMPARISON which shows the total charge for each client. The graph should also reflect how much of this is tax and handling and show how much is subtotal. (2 mks) (s) Save it and print all the files. (2 mks) *TZM* QUESTION ONE (50 MARKS) A), using an appropriate word processing, type the following passage and save it in diskette as DATA SECURITY (l0marks) Data security and control External threats Fire, floods, earthquakes and other natural disasters. These are the potential threats hut are not the most common external problems, ii. Theft of equipment-theft of pc's laser printers and even memorychjps after a Break into a building are very common, iii. Espionage (intelligence)-information in the wrong hands can do a lot of damage. Example access to a payroll or accounting information is restricted so Such information should be shielded away from external and internal spies. Internal threats Internal threat would include Hacking Fraud Hardware failure Corruption of databases Viruses load and run without the user requesting them to run; and cause considerable damage e.g. i. Modifying other program ii. Hiding inside other programs with an aim of spreading to other mashine iii. Destroying data and programs. It is a computer code which usually designed to carry out two tasks: To replicate itself from one computer system to another. To locate itself within a computer system in such a way as to make it possible for it to amend or destroy programs and data files, by interfering with the normal processes of the operating, system. Questions i) Copy the original document (data security) to the next page (2marks) ii) Format the headings as follows: (6marks) Font size Font type underline bold Data security and control 14 Times new Roman Yes Yes External threats 14 Monotype corsiva None Yes Internal threats14Default Yes Noiii) Change the numbering to bullets; as follows: (2 marks) Headings bullet  External threats internal>   iv) Strike through the word internal threats (2marks) C). i) Insert the ANY clipart at the bottom center of the document. (3marks) ii).Create word art as indicated by the symbol. (2marks)  iii) Using auto shape, design a logo as indicated by the symbol. (2marks)  SECURITY D) Save the document as SECURITY (2marks) E)i. Copy the original document (data security) to the next page (2marks) ii. Drop cap the first letter of the document (D) to cover two lines (1mark) iii. Spell check the whole document. (2marks) iv. Double space and italics the first paragraph (3marks) v. Insert a header "computer threat" to appear in every page (2marks) vi. Number the pages using the format 1, 2, 3..... F) Save the document as COMPUTER THREAT (2marks) G) Print the document i. Data security (1mark) ii. Security (1mark) iii. Computer threat (1mark) QUESTION TWO (50 marks) The following is a worksheet extracted from business Join venders.. They have come together to do a business of selling computer accessories. NamesCostSalesGross profitExpenditureReservesNet profitRemarksBenson700350450Betwel40070050Kimwat200900200Amos3001000300Tembur100500100Korir40060040Towett60085055Maritim50035070Kerich20035045Bency500100040Danson600900170Kones900100020Koech100800130Additional Information. a) Gross profit = Sales-Cost b) Net profit = gross profit - (expenditure+ reserves) c) Reserves = 10% gross profit d) Remarks are: "very good vendor", "good vendor", "domain vendor"," burden vendor". "Quite vendor". REQUIREMENT (i) Create the workbook and enter the details, save as vendor.ex (15marks) (ii) a) Keep the title of the workbook to be JOIN VENDORS and format it to be bold, font size 14 and a align at 20 (4marks) b) Format the figures in sale column to 2 decimal places (2marks) c) Insert two rows between Tembur and Korir and enter the records below: (5marks) - Name Bii, cost 100, sales 500 and expenditure 10. - Name Mutai, cost 800, sales 2000 and expenditure 80. (iii) Use sum function to calculate gross profit for each member (3marks) (iv) Use product function to calculate reserves for each member (3marks) (v) Use "IF function" and net profit to analyses the vendors, taking the following remarks: (6marks) a) If net profit >=500, then "very good vendor" b) If net profit > 400, then " good vendor" c) If net profit <=300, then" domain vendor" (vi) a) Use names of the vendor and cost to insert a line graph, keep the title of the graph to be PRODUCTIVE ANALYSIS, format it and place it in a separate sheet. (5marks) b) Save the changes as productive analysis (2marks) c) Print the "Join vendor" and "productive analysis" including gridlines 4marks) QUESTION 3 (50 MARKS) 3. You have been asked by the school administration to design school advert to inform school members about form four farewell party. Your advert should look like the design below. Answers paper one *NYR* 1. Identify programming language used in the following generations:- *NYR* (i) First generations machine language (ii) Second generation assembly language 2. Give importance of having the following in computer laboratory:- *NYR* (i) Standard furniture in the laboratory To avoid poor posture during machine use this may lead to strain injury and limb fatigue (ii) Antiglare screen/monitor To avoid eye strain and fatigue caused by over bright cathode ray tube monitors (CRT) (iii) UPS Temporarily supply to the computer to allow the user to save the work (power backup) Stabilizes power (clean unstable power supplied from the main source to clean stable voltage) 3. (a) Explain the following terms as used in booting:- (i) BIOS:- its the basic input output system. its special firmware program that Post to take place (ii) POST:- Power on self test. It checks on existing drives, basic input/output devices and communicates in case of a problem. (b) Differentiate between:- (i) Backspace and delete keys on the keyboard Backspace and delete keys on the keyboard erases character from the right while delete keys key erases from the left of the cursor. (ii) Insert and type over mode Insert and type over mode- in the insert mode when the text is inserted between words or character it pushes the existing text away without replacing it while in the type over mode when text is type between words or characters the new text automatically replaces the existing text by de letting it. 4. Explain the functions of the following central processing unit components (i) ALU To carry out all the arithmetic and logical operations (i.e mathematic computations and comparison of values) (ii) Control unit Coordinating all processing activities in the CPU as well as input,storage and output operations. (iii) Primary memory Provides storage location for data and instructions accessed by the control unit 5. (a) Differentiate between static RAM and Dynamic RAM Static RAM is a very fast memory and holds its contents as long as there is power Dynamic RAM holds the contents for a short while even if when the power is on. (b) Distinguish between compilers and interpreters Compilers translates the entire source program into object code. Interpreters- translates the source code line by line 6. (a) List two softcopy output devices Speakers Monitors (b) Distinguish between impact and non-impact printers citing one example in each *NYR* Impact printers these printers print using striking mechanism i.e they strike the paper in order to form an imprint on it. e.g dot matrix, daisy wheel, drum, chain and golf ball Non impact printer :- they print using ink, thermal or laser mechanisms e.g laser, thermal,,ink jet, electrstatic 7. State two merits of using the following input devices: (i) Speech recognition NO keyboard is necessary Useful in instruction where hand/eyes are too busy handling documents Can be used in remote locations via the phone. (ii) Touch screen Faster in data entr. Can be used with non-computer literates. Its applicable to people with disabilities. 8. Differentiate between freeware and open source as end-user license softwares. Freeware- software whose source code hidden from the users. Modifications only made by the manufacturer Open source software whose source code is free made to the users. The users are encouraged to use ,modify and distribute the product. 9. (a) List four types of system software Operating Systems Firmware. Utility Software Networking Software. (b) Explain the following functions of the operating system:- *NYR* (i) Job scheduling:- the OS prepares, schedules, controls and monitors task submitted for execution, to unsure the most efficient processing. (ii) Interrupt handling:- the processor stops executing the current process to attend to a break from the normal sequential processing of instruction in program. 10. Explain the following disk management tools:- (i) Disk formatting It prepares a new disk for use by imprinting empty sectors and tracks on the surface of the disk so that the OS can recognize and make it accessible. (ii) Disk defragmentation Arranging scattered files or folders on folders on a storage media for easy access of files and folders. 11. Differentiate between the following terms as applied in operating system:- *NYR* (i) Multi-user OS allow more than one user to interactively use a computer. (ii) Multi-tasking- when the OS allows the CPU to executes more than one application program at the same time 12. Explain the following terms as applied in word processor *NYR* (i) Text wrap:- this feature allows a text to surround an object inserted (ii) Word wrap:- the cursor move automatically to the next line after reaching the end of the line. 13. (a) Distinguish between first line and hanging indentation *NYR* First line indent the first line is indent while other are left along the margin Hanging indent- the whole paragraph is indent except the first line (b) differentiate between auto complete and auto correct features. Auto complete feature displays a word when the user types the first few characters of the word While autocorrect feature automatically detects wrongly spelt or capitalized words and replaces them with the correct word 14. (a) Differentiate between the following combinations of terms:- *NYR* (i) Filtering and sorting:- Filtering:- This is displaying entities that meet a certain ser criteria Sorting:- This is arranging data in predefined order i.e ascending or descending (ii) Relative and absolute cell referencing Relative reference cell references keeps on changing automatically depending on their position in the worksheet. e.g when formula= B2 + C2 in cell D2 is copied to D3 it automatically changes to B2 + B3 Absolute reference the copied formula in different cells does not adjust references. Its identified by adding a dollar sign before the parts of cell that do not change. 15. Identify the elements of a function *NYR* Equal sign (=) function name and arguments 16. A class teacher of form 3E in Nzambani secondary school requested a programmer to design a ple program that would help do the following:- *NYR* (a) Enter the names of students and marks obtained in 8 subjects; maths, English, Kiswahili, Biology, Chemistry, Business Studies, History and Computer Studies. (b) After entering each subject mark the program should calculate for each student (c) Depending on the average mark obtained, the program should assign the grades as Between 80 and 100 = A Between 70 and 79 = B Between 60 and 69 = C Between 50 and 59 = D Below 50 = E (d) The program should display each students name, total marks and the average grade. Using low chart, show the design of the program 17. (a) Define the following terms in reference to the internet:- (i) Protocol:- set of rules that govern transmission of data or information over a net work (ii) Website:- its collection of related web pages where individual or organization documents are placed for easy access by external world by using their address. (iii) Search engine:- its a program that searches documents for specific keywords and returns a list of the documents where the keywords were found. (iv) Spam mail:- its; a feature in e-mail which inhibits receiving mails from unknown sources. (b)List three examples of search engines Google Yahoo Hotmail Gmail (c) Identify the functions of the following devices in data communication:- *NYR* (i) Modem:- its a special digital to analog interface card that changes data from digital to analog so as to be transmitted on telephone lines and on the receiving end the data is changed from analog to digital for computer to understand. (ii) Network interface card:- its a circuit board that fits inside an expansion slot of a workstation and acts as a physical between the computer and the transmission media. (iii) Brouter: collection of routers in network. (d) Describe bounded and unbounded forms of communication giving two examples in each case *NYR* Bounded media it is physical connection of communication devices mainly by use of cables e.g coaxial cables twisted pair , two wire cables and fibre optic cbale. (e) Outline four advantages of using fibre optic cables Low attention High bandwith Immune to electromagnetic interference Very secure because they are untappable. 18. (a) Define the following terms as used in data representation *NYR* (i) Amplitude:- the maximum value a wave can attain (ii) Frequency:- the number of cycles made by a wave in one second (iii) Nibble:- half abyte (4 bits) (iv) Byte:- a group of 8 bits (b) Perform the following 11111.11112 + 100001.10102 1111.001112 *NYR* 11111.1111 + 10001.1010 Answer 110001.1001 -1111.0011 Answer = 100010.010112 (c)Using twos complement subtract 73from 115 and convert the answer to decimal notation*NYR* 115 73 = 115 + (-73) Convert 115 to binary = 11100112 Convert 73 to binary = 10010012 Convert 73 to8-bits = 10010012 Convert the 8-bit above to ones complement = 10110110 Convert to two complement by adding 1 to ones complement above = 11001111012 Answer = 1100111012 (d) Identify the duties of the following ICT specialists *NYR* (i)Software engineer Developing system and application software. Developing user and technical documentation for a new software. Maintain and update the software to meet day to day requirements (ii) System analyst Design new and recommend change to existing one. Co-ordinate training for users of a new system. Repair system specifications Co-ordinate the implementation of the new system Prepare instruction manual (e) List two types of opportunities available in the field of computer hardware *NYR* Computer technicians Computer engineers 19. (a) Describe the following computer files (i) Logical and physical files Logical files:- Its viewed in terms of what data items it contains and detail of what processing operation may be performed. Physical files:- its viewed on how data is stored on a storage media. (ii) Master and backup files Master file contains relatively permanent record about particular items or entities and backup files Backup files- it holds copies of others existing files. (b) Explain the following computational errors (i) truncation:- it occurs as a result of having a real numbers that have long fractional part can not fit in the allocated memory space (ii) Overflow:- occurs as a result of having too long answer after calculation that can not fit in the allocated memory space (iii) Rounding errors:- Results from raising or lowering a digit in a real number to the required rounded number (c) Define data integrity and state three ways of minimizing threats to data integrity Data entry- its the accuracy and competences of data entered in a computer or received from an information system Ways of minimizing data threats are backing up data using devices that capture data directly from the source designing user interfaces that minimizes invalid data reality using error detection and application areas of virtual reality (d) Define virtual reality and state three ways of minimizing threats to data integrity Virtual reality a condition in which a person becomes psychologically immersed in artificial environment generated by a computer system. Areas of application Aircrafts Military training Simulation Design evaluation Education (e) Discus how computers are used in reservation systems Hotels booking booking of rooms online Airline booking clients can book for a seat online 20. (a) Explain the main activity carried out in each of the following system development stages (i) Problem recognition : identifying whether a problem exists. (ii) Coding: - writing a program using a programming language. (iii) Implementation: - file conversion, staff training and changeover strategies (b) Explain the following changeover methods:- * (i) Direct:- the old system is discarded and the new system starts immediately. (ii) Parallel:- both old and new systems are run parallel to each other for some time till the users have confident with the new system then the old system is phased out. (iii) Phased:-the new system is implemented in phases or stages. (c) Explain two advantages of modular programming Easy to debug Easy to develop Its flexible Easy to read and modify (d) Explain how the use ICT may affect the society Environment pollution due to poor dispose of computer parts Cultural effects Affecting users health Effects on employment Automated production (e) Explain the four main areas of artificial intelligence Expert systems- soft that stores then knowledge of human experts and then used as consultant in a particular filed. Natural language processor ability of a computer to understand human language and translate it to instruction upon which the computer can understand. Voice recognition-systems that allow voice input a microphone. Voice synthesis machine able to create human voice or talk. Computer vision computers to be able to process and interpret light waves like human being. Robotics its a computer controlled device that emulate beings in carrying o ut tasks. *KKC* 1. - ROM (read Only Memory) it is used to store programmed instruction and a data permanently or semi permanently. Data and instruction stored in Rom are those require to remain uncharged for long period of time RAM (Random Access Memory) its content can be read directly regardless of the sequence in which it is stored. Its contents is held temporarily and it content lost is lost once the computer is turned off. Place Value 83(512)82(64)81(8)80(1)Octal digit1111 2.a) Working out N10 =(1X83) + (1X82) +(1X81)+ (1X80) =512 + 64+8+1 N10 = 585 ( 11118 =58510 22.2-12-22-311.01121.00.250.25b) Solution Weight Binary digit value in bare 10 Integral part Fraction part (21X1) + (1X10) = 0.50 X0 = 0.000 2.000+ 1.000 0.25 X 1= 0.250 =3.00010 0.125X1= + 0.125 0.37510 3.00010+ 0.37510 =3.375 Thus 11.0112 = 3.37510 3. i) Cracking refers to the use of guesswork over and over again by a person until he/she finally discovers a weakness in the security policies or codes of a software. ii) Hacking is breaking codes and password to gain unauthorized entry to computer system data and information files. b) - Data not to be transferred to other coutities without the owners permission Data and information should be kept secure against loss and exposure. Data and information should be accurate and up to date Data informatuor be collected used and kept for specified lawful purposes 4. - Job scheduling can only handle one task at a time therefore, the operating system has to determine which task will be processed first and makes sure that the one that is currently being processed closely monitored to avoid wasting time in the processor. - Job sequence - the operating sys tem keeps a list of jobs or tasks currently being run and clocks them in and out of processor. 5. Avoid smoking or exposing computer to dust. Avoid carrying food and beverage to computer soon Avoid unnecessary movements because you Mary accidentally knock down peripheral devices. At all times following the current procedure for starting and shutting down the computer to avoid loss of data damage to computer programs. Do not open the metallic covers of computers or peripherals devices without permission and particularly when the computer power is still on. 6. a) Web page is the major page containing data i.e Text pictures clips etc while a website is a collection of web pages. b) - Flat file Network Hierarchical Relational 7. - Computer operator is a person who enters data in a computer and keeps upto date records of all information processing activities. - Computer technician is a person who troubleshoot computer hardware and software, assemble and upgrades computer components such as storage device and motherboards. 8. Mail Merge is the process of generating letter or documents by combining a main document. 9. a) advantage Utilizes the powerful like speed, accuracy tot enable the user quickly accomplish tasks. Offers a large storage space on computer storage device to save and retrieve document. The user produces neat work due to lack of pencil pen work. Have better document formatting capabilities. Inbuilt formula that enables the user to quickly manipulate data. b) Cell referencing identifies a cell or range of cells on the worksheet and show Ms cells where to look for the values or data needed to use in a formula. 10. Graphical based e.g adobe photoshop - Coreldraw - Havard graphic - Layout based. 11. - Data communications media Optic fiber Communication devices e.g hub routers Networking software e.g network operating system. 12 . - Financial system payroll, accounting and banking Retail system stock control, electronic point of sale. Reservation system Education system computer aided instruction, aided learning. E learning & computer simulation. 13 a) CDS, CD- ROM, CD RW,CD R DVD LS 120 SUPER DISK OPTICAL CARD OPTICAL TAPE b) Magnetic Disk, Floppy disks, Zip disks, Jaz disks 15. a) master file main file that contain permanent records of a particular entry. b) Sequential organization Index sequential organization. SECTION b (60MARKS) 16. a i) While do structure ii) Repeat until b) i) Assembler translate assembly source program into object code. ii)Complier translate entire source program into object code iii)Interpreter translates source program line by tine allowing the CPU to execute one line before translating the next. b) 1. Check the loop used The psendocode can use two looping structure a .If then else b. Case structure 2. Confirm that loops used can be able to give out the desired results. 3. See that the candidate has used appropriate amount and discount. 17. i) employee because it has employee information ii)To ensure all records entered in the related table exists in the primary table. iii)Is a unique identity of a record iv)Employee number v)The data is not similar b) 1. Input mark 2. validation rule 3.Required 4. Indexed c) 1. To enhance security of data 2. To share file between department 3. To reduce redundancy 4. To enable updating and deleting of data. 5. In faster searching of data. 18. a) i) A - free/hierarchical topology B -Ring topology C -Mesh topology ii) Point 1 and 2 Terminator iii) Mesh topology iv) - Modifying the topology - Troubleshooting is difficult - One device breakdown affects the whole system. v) Identify the device labeled X in topology A HUB. b) a. Network protocol b. Network Operating System c) i) Repeaters A device that receives signals from one send it to another segment. ii) Network hub A device that connects computer onto network. iii) Fiber optic cables transmission medium that transmits data by using light. iv) Network interface (NIC) - A device inside the system box for linking them onto transmission medium. 19. Feasibility study is the process of going out of the filed to identify information that is related to an organization. b) 1. Main memory 2. Input/output devices 3. Processor 4. Secondary storage. c) i) Truncated Errors that results from having real numbers that have a long fractional part. ii) Transposition Errors that result from incorrect reading of source document. iii) Transcription errors that occur during data entry. d) 1. ASCII(American Standard Code for Information Interchange ) 2. EBCDIC (Extended Binary Coded Decimal Interchange Code) 3. BCD (Binary Coded Decimal) e) Online - data processed immediately it is received Real time the incoming data is processed as soon as it occurs. f) i) Advantages It is fast in processing commands as compared to GUI and means driven interface. Disadvantage. It is difficult to the users because they need to memorize command Single tasking and can not support more than one task. 20. a) i) - Chatting - E-mails - Video conferencing ii) Links A text or picture that when chicked causes other web pages to be opened. URL A special internet address made up of organization name and an extension explaining to type of organization and country. b) ABC1CropAmountNot Viable2Maize150Not Viable3Bean300Not Viable4Cashew Nuts850Moderate 5Cabbages1036Viable c) i) Triple click ii)Hold down ctrl as you drag the mouse pointer. d) i) A window is a rectangular feature where an application is running and bears close, minimize and restore button while orphan is body without heading. ii) Cut and copy command. Cut more or transfer text of file from the original location to another without leaving a copy . Copy duplication of text or files i.e a file retails its original location and appears in another location. e) - To emphasize the beginning letter enlarge on a paragraph. f) i)Expert system is a system developed and installed in an office using the intelligence of human being. ii) - Hospital - Education - Other scientific department. *MUM* 1. State two functions of the SHIFT key as used in a word processor. * - Activating from upper case to lower case and vice versa - Enable one to type extra characters on the key board like ?, !, & e.t.c. 2. a) How do registers differ from buffers. * They store more than one piece of data and they have a bigger memory capacity (b) List four examples of registers. * Program counter Stack pointer Instruction register Index register 3. Daniel has noticed the following problems in his computer; * (i) It is taking a longer time to start up. (ii) It is often hanging (iii) Applications are taking long to load. (iv)State three possible causes of these problems and how they can be solved. Virus attacks Processor over heating Small capacity of RAM 4. List three functions of an anti-virus software. Detecting viruses in a computer Cleaning computer viruses 5. Differentiate between a virus and a logic bomb. * A virus attacks both the hardware and software while a logic bomb attacks hardware at a specific time it has been programmed to. 6. The cells K3 to K10 of a worksheet contain remarks on students performance such as very good, good, fair and fail depending on the average mark. Write a formula that can be used to count all students that have the remark very good. Count if (KII, Very good) 7. The following information shows the income and expenditure for Beba yote matatu for five days. The income from Monday to Friday was Ksh.4,000, 9,000,15,000 and 20,000 respectively while expenditure for some period was Ksh.2000,3000, 7000, 5000 and 6000 respectively. (b) a) Draw a spreadsheet that would contain the information. Indicate the rows as 1 , 2, 3 and 4 and the column as A,B,C ABCDEFMONTUEWEDTHURFRI1Income4000900015000200002Expenditure 200030007000500060003 b) State the expression that would be used to obtain: (i) Monday profit. = B1 B2 (ii) Total income = Sum (B1 : F1) (iii) Highest expenditure. = Max (B2 : F2) 8. Describe the following terms: (a) Software suite :- A group of programmes that are sold together e.g. MS office which contains MS word, MS excel, MS access e.t.c. (b) Shareware:- Is copyrighted software that is distributed free of charge but requires users to make a monetary contribution in order to continue using it (c) Groupware:- Online software that allows several people to collaborate on the same project (d) Integrated software:- A software that combines features of different programs as a whole 9. (a) Subtract 01112 from 10012 10012 01112 0102 (b) Using twos compliment subtract 7 from 40 and give the answer in decimal notation. 10. Distinguish between uploading and downloading. * Uploading sending information from a local computer to a remote computer on the internet Downloading transferring information from a remote computer on the internet to a local computer 11. Distinguish between peer-to-peer Networks and client-server networks. * Peer to peer networks are equal in a network while client server networks contain a computer called a server that serves other computers called clients 12. List any two techniques used to implement information systems in various organizations. Direct Parallel Pilot Phased 13. Distinguish between a word and word-length as used in data representation. Word is a general term that can mean a single character or a group of characters while a word length is a measure of the NO. of bits in a word. 14. Describe three types of maintenance that can be applied on information systems. * Perfective maintenance Preventive maintenance Adaptive maintenance 15. (a) Study the flowchart extracts below * (b) State the looping structure demonstrated in * (c) List any four methods of detecting and correcting programming bugs. (d) Draw a flowchart for a program that can be used to add any positive integers that can be keyed into the computer through the keyboard. The program should count the positive numbers entered and should be terminated when a zero is keyed in. 15. a) Study the flowchart extracts below i) While .. Do ii) Repeat Until b) State the looping structure demonstrated in Debugging utilities Dry running Using test data Using translator programs c) List any four methods of detecting and correcting programming bugs. 16. Below are two table structures of files in a database: TABLE 1 TABLE 2 Field Data type Field Data type Employee number Text Employee number Number Employee Name Auto number Data employed Date/time D.O.B Date/time Department Test Address Test Salary Currency (i) Which of the two tables is likely to be the parent table? table 1 (ii) It is advisable to enforce referential integrity when creating a relationship. When creating a relationship, what do you understand by the term referential integrity? Is a feature that ensures that a record in a child table exists in a parent table (iii) The field employee No in Table 2 is likely to be the primary key. What is a primary key? Is a special index that uniquely identifies a record to avoid duplication of data iv) Which fields in both tables is most appropriate for creating a relationship? Employee number (v) What will make the relationship between the tables fail to work? Linking fields have different data types (b) In databases, the field properties specify finer details related to the fields and the entries expected. State four field properties. Caption Input mask Field size Required Validation rule Validation text (c) State three functions of a database. -Storing records Arranging records for easy retrieval Updating and modifying records 17. (a) Explain three communication services offered through the internet. Electronic mail Internet radio Voip (vice oner internet protocol) (b) Describe the following internet terms. (i) Browsing:- Moving around and between web pages (ii) Web portal:- Website that contains several features like searching, e mail, advertisements, e.t.c. (iii) Home page:-First page displayed when a browser is started (iv) Hyperlink :-Text or graph when clicked links one to another web page or links (v) Uniform resource locator:- An address of a web page (c) The following spreadsheet is relating to a farmer. ABCCROPAmount 1Maize150Not viable2Beans3003Cashew nuts850Moderate4Cabbages 1036Moderate  (i) A function = IF (B2< 200, Not viable, IF(B2>300,moderate, IF(B2> 1000, VIABLE))). Give the appropriate result returned in cells C2, C3, C4 and C5. (d) List any three functions of the control unit. Executing tasks Controlling all devices within the CPU Monitoring activities within the CPU 18. (a) List any three differences between an interpreter and a compiler. * Interpreter Compiler translates source program one statement at a time Translates the program each time it is run hence slower than compilingtranslates entire source code all at once translated object code requires more memory space compiled program can be stored in a storage media and run as required hence executes faster than interpreted programs (b) State four characteristics of Random access memory. is volatile contents are user defined one can perform both read and write operations has high access speed (c) Describe the following data security measures (i) Log files:- Special computer files that keep a record of computer users and actions they have done within that particular computer (ii) Fire walls:- Is software or hardware that filters information coming from the internet to your computer system (iii) Antispyware :- A soft ware that blocks spy ware programs from accessing your computer system to collect information (iv) Audit trial:- Careful study of an information system to determine weakness in order to collect them 19. (a) What is a transmission media? Channel that transmits data from one point to another. May be physical or non- physical (b) List two types of transmission media Physical e.g. coaxial cable, fibre optic e.t.c. Non physical e.g. radio waves, infrared e.t.c. (c) Distinguish between a Hub and a switch. * A hub broadcasts data packets to all computers in a network and the recipient computer receives the packet while the others discard it while a switch directs a data packet to its intended destination computer (d) With help of a well labeled diagram, describe the fibre optic cable * Core is the light transmission element at the centre of the optical fibre Buffer used to shield the core and cladding from damage Strengthening material- surrounds the buffer, prevents the fibre cable from being stretched Cladding Acts as a mirror by reflecting light back. (e) What are the functions of the following devices on a network? * (i) Repeaters :- They amplify or regenerate signals that have been affected by attenuation (ii) Network interface card :- Is an interface that links a computer to a communication channel (iii) Router :- Is a network device that connects different networks to enable communication (f) Distinguish between physical topology and logical topology as used in Networking Physical topology is the physical layout of computers in a network e.g. star, bus e.t.c. while logical topology is the way computers communicate on the network e.g. oken ring, Ethernet *KSM*          **PAPER TWO *NYR* The question tested the candidates ability to do the following in a database award full marks for a created database with three tables bearing all the fields (3x4=12mks) (b) Award 1mk for each idenitifed primary key fields in each table (1x3=3mks) Award 2mks for each established relationship between the three tables (2x3=6mks) Award 3mks for the records in each tacle (3x3=9mks) Award 1mk for each identified field in the querry i.e customer Name, Product Description, Quantity, Unit price and calculated field total payable by each customer and 1mk for saving with appropriate name.(1x6=6mks) Award 5mks for a clearly generated report (5mks) Award 1mk for the printed customers, products, transaction tables designs, querry and the report *MUM* 1. a) text typed as indicated (26 mks) b) Bolditacing (1 mk) Italics (2 mks) Justification (2 mks) c) i) Columns (6 mks) d) i) Double spacing (2 mks) ii) Searching and replacing (2 mks) iii) saving the document as A: NET 4 (2 mks) e) i) Animated title (2 mks) ii) Landscape orientation (3 mks) f) Printing NET 1, NET 3 and NETS (3 mks) 2. a) Availability of database with all fields (8 mks) b) Availability of all records (12 mks) c) Addition of data field (3 mks) d) Information entered as indicated (5 mks) e) Start 2 sorted in descending order (6 mks) f) Query indicating items delivered by Shah on 15/5/2001 (8 mks) g) Tabular report (4 mks) h) Print outs: start 1, start 3, query 1 and report 1 (4 mks) *TNW* Index No:____________________Index No:____________________ItemMax scorescoreMax scorescorePage SetupA. - database file created1Font-Arial1 - File saved as Business1Font size 12 for text1B. - Two tables created1Left margin 1"1/2 - 4 Correct fields for table 1 4Right margin 0.5"  - 5 Correct fields for table 15Top 0.5" C. Seller details formBottom 0.6"  - 4 fields @ 1/2 mk2Headings Vehicle details formH1 - At least 4 fields @ 1/2mk 2Bold1 Forms titlesCentered1 - Seller details form1/2Font size - 201 - Vehicle details form1/21st ParagraphD. Table 1Two columns1 - 5 correct records @ 1mk 5Word art1 Table 2Words complete1 - 10 correct records @ 1mk10Word art diagonal1E. QueryTwo symbols @ 1/2mk1 4 correct fields @ 1/2mk2Subscript1 - Correct criteria12nd Paragraph - 6 records @ 1/2mk3Complete text1Drop cap1F. - 10 correct values for new prices @ 1/2mk5In margin1Report3 lines drop1G. - 5 fields @ 1/2 mk2 1/2mks3rd paragraph - Correct total amount1H2 - saved as report 1/2Bold and size 142H. PrintingItalic1 - Seller details table14 bullets @ 1/22 - Vehicle details table1Italicized text1 - Report14th Paragraph TOTAL3 columns1 Clip art2Word art2Clip art/Word art psn15th paragraphH3Bold and size 142Italics1Drop cap13 lines drop1Bold text1Italicized text1B. i) Paragraph copied1 ii).Hanging indent1 iii).- Double space2 - Landscape2C. - Name1/2 - Index1/2D. Word count - Words(376+/- 2)1 - Characters(With spaces)21,660 +/- 21 - Characters(no spaces)1,800 +/- 21E. - Paginated doc x of y1 - Top1/2 - Center1/2F. Doc saved as Bono21G. Printing Bono21 TOTAL WE MUST STRIVE FOR GREAT THINGS IN LIFE  one should leave legacy that speaks for years. Paul Hewson was in Nairobi recently. That wont mean much to you, until I explain that I was referring to Bono, the world famous lead singer of rock band U2 and campaigner against global poverty. Bono didnt really make much noise while in Kenya. He attended the (Nation Media( groups Pan Africa Media Conference, took H2o, talked to a couple of journalists and left. H e didnt do the other things that visiting celebrities of his stature do when in Africa: adopt a cheetah or a baby hippo, start a school for orphans, shoot the breeze pointlessly with Emilio and Tinga, utter banalties about the girl child. Bono reserves his energy for other things. Popular Media Bono is not famous just for being a singer. For the past couple of decades he has been one of the most visible humanitarian activists, using his fame to enlist powerful allies from: Government Religious institutions Philanthropic groups Popular media and The business world. He has personally spearheaded the campaign for debt relief for the worlds poorest countries, and has been a vocal champion for Africa. Not everyone agrees with these efforts. Author Paul Theroux savaged Bono, Bob Geldof and other celebrity humanitarians, saying that creating the impression that Africa is fatally troubled and can be saved only by outside help not to mention celebrities and charity concerts is a destructive and misleading conceit. I happen to agree with that view and have propagated it in writing for many years. I dont think Africas salvation will come from outsiders, and it certainly wont come from endless handouts and a crippling dependency culture. On Trivia W hat about you? How big is your life? Are you allowing your time on earth to be frittered away on trivia, or are you going to make a net positive impact on the planet? Are you doing something, anything bigger than yourself? Are you raising a child to be a better person than you are? Are running a business or conducting a profession that sets a standard in good practice? Or are you content to be a small person imprisoned in a small life? He has personally spearheaded the campaign for debt relief for the worlds poorest countries, and has been a vocal champion for Africa. Not everyone agrees with these efforts. Author Paul Theroux savaged Bono, Bob Geldof and other celebrity humanitarians, saying that creating the impression that Africa is fatally troubled and can be saved only by outside help not to mention celebrities and charity concerts is a destructive and misleading conceit. *KKC* Question One. A. 1. (A) Complete typed letter 7mks Single error mk More than 6 errors 5mks Saving main document Using correct name 1mk Using any other name mk Saving data source list Using correct name 1mk Using any other name mk Changing the Font Size, address and reference to 14 pts Changing each address mk Changing reference mk iv) Underlying reference mk v) Merging Data source to the main document Each filed at the right position. mk Each filed at any other position. mk vi) Print the letters Each (1X3) 3mks B a) Aligning title to the centre mk underlining title b) Adding border to the title mk c) - Replacing all remain number with bullets - Not replacing one - mk - Not replacing more than 3 (0mks) d) i) Inserting the correct footer 2mks Any other footer 1mk ii) Inserting the correct header. 2mks Any other header 1mk e) - Line spacing of 1.5 -Line spacing other than Single f) Inserting word Art computer and not placing at the behind of text. 2 mks g) - Replacing computer with PC 2 mks - Replacing but not all words computer mk h) Moving whole paragraph to end of document. 2 mks i) Font style set to Aerial Black. 3mks j) Saving with correct name other than document N mk Using document N 0mk k) Printing the document currently 2mks Printing off page mk Question 2 Saving the workbook with correct name 1mk Using a different name Using default name book n no mark mk All data entered correctly 20 mks Every wrong entry mk More than 6 wrong entries -8mks Renaming the sheet to term one result Default name sheet, No mark i) Correct totals and formula 2mks ii) Correct averages and formula 2mks Manual calculation no mark Correct use of IF function to attain 3 conditions (1X3) 3mks i) Correct formula and ranking ii) Correct use of the count IF function (1X2)2mks Sorting list of class position in ascending order 2mks - Sorting list by classes position in descending order 1mk -No sorting, no mark h) i) Copying to new worksheet and renaming the new worksheet 2mks ii)Filtering the lower group Display students from E class Students with average less than 50 4mks Filter shows a all students from E class Filter shows all students with average less than 50 2mks i) i) The chart is A bar graph Show 3 cats Shows names of students Title is TERM ONE COMPUTER RESULTS 3mks Missing a point - mk ii) Legend placed at the bottom of chart. 1mk iii) Saving chart on a new sheet and renaming the sheet graphical analysis. ( X2) 1mk Saving chart as an object on the worksheet. mk Printing i)The lower group from E class 1mk ii)The chart 1mk iii)Term one results sheet 1mk     PAGE  PAGE   HYPERLINK "http://www.kcse-online.info" www.kcse-online.info PAGE  PAGE  PAGE  Statement Condition Yes No Statement True false Condition 1 2 START READ N PRINT. F STOP ART M = 1 F = 1 M = 1 F = 1 M = 1 F = 1 M = F X M M = N Y M = M + 1 Y X Y f i (,CFae 5:7859W[v|8<ĺIJĺĺIJĺIJĮĮĮĮĮĮĪĮĮĺĦĮIJIJĮĮĮĮIJĮĮĮIJhyEhUhMBzhlhV5hlhV56 hlhVhMBzhMBz5>*CJaJhMBz5>*CJaJhMBzhl5>*CJ(aJ$hMBzhMBz5>*CJ(aJ$A# H [ " H  Y `gd^ 0^`0gdUgd^$a$gdMBz$a$gd^  : O  ; [ #;YW+f78`gd^gd^8Et+Mj 2KF^gd^`gd^gd^EFRVos26OSnr!$:=tx !!" "H"I"^"c"""# ###$$&&&hOhlhV56hMBzhV5>*hlhVH*hMBzhlhV5 hlhVQFd^D'FdG0S 0^`0gdUgd^][BXu*? $Ifgd^gd^qhhh $Ifgd^kd$$IflF 5@= t06    44 la8yt!Q4qhhh $Ifgd^kd$$IflF 5@= t06    44 la8yt!Q4  qhhh $Ifgd^kd,$$IflF 5@= t06    44 la8yt!Q4   T !`!!!!!I"qlllllllllllgd^kd$$IflF 5@= t06    44 la8yt!Q4 I""""""]###7$R$$$!%h%%%%%%X&&&'M'^gd^ ^`gd^`gd^gd^&&P'Q'X'Y'h'j'o'q'v'w'|'~'''''))))O*T*,,-- ..[.^........ / /B/C///C0Q0V0d0~000012171J1i1u122L2R2i2q22222U3d3i3z3333333 hlhMBzhMBzhMBzhV5>*hVhlhVH* hlhVhlhV5NM'^'k'x'''' ((4((((5)))<***@+++,,i,,,V-- & Fgd^gd^ & Fgd^--J........//g////,0r001V1112C2y2223=3 & Fgd^gd^=333333.4f4m4n4p4q4r4t4u4v4x4y4z4{4|4}4~4444444$a$gd^gd^33333 4-4.4f4g4v4w444!7k7 9 9,9.999::;;A;B;;;;;;;;;;;;;;;;;;<<.<0<^<_<<<<<==6=ܲܡܡ hlhUhUhV jhlhUUmHnHu jhlhUUmHnHuhOhU jhlhVUmHnHu hlhVhlhV5hlhV56>*hlhV56944444435C5V5f5y55?666!7C7k77778c88,9-9.999`gd^gd^9:e:: ;A;;;;;;;;;;;;;;;;;;;;;;;;gd^`gd^;;;;;;;;;;;;;;;;;;;;;;;; <*<J<<=`gd^gd^6=7=i=k=x=y===>>>>??@@@-@K@N@]@a@n@o@q@r@@@AABB,B-BDBEBCC DD=DCD[DkDDDEElFmFnFGGGGGGHH'H*HI IJJJJK KNKTKKKKKKLLLhMBzhVhOhUhV5>* j>hlhV j<hlhV hlhVhlhV5N=F===>!>7>Q>u>>?_?o????;@@@(A8ARASAAAAAAAgd^`gd^AAYBBB-CCCC;DG?GKBBBBB $Ifgd^kd0$$Iflr 1(    t0644 la<yt!Q4?G@GCGKGLGMGNGKBBBBB $Ifgd^kd$$Iflr 1(    t0644 la<yt!Q4NGOGRGXGYGZG[GKBBBBB $Ifgd^kdx$$Iflr 1(    t0644 la<yt!Q4[G\GGGGGHKC::55gd^8^8gd^ & F gd^kd$$Iflr 1(    t0644 la<yt!Q4H^HHH8IIIIJ)JMJkJJJ'KyKKKQLLLEMMM,NNNN$O`gd^gd^L M MUMZMMMNNOO$O2O~RRRRSSfSkSSSLTXTMUQUUUUUYV\VVVWWWWWWWWW]XaXYYYYF[e[[[\\R\S\\\\\\\[]`]]] ^$^^^`h!Q4hV5hlhVmH sH hlhV5>*hMBzhV5>*hlhVH*hUhMBzhlhV5 hlhVH$OOO:PPP*QUQQQ>RRRSRSSS7TzTTTTSUUU(V & F gd^`gd^gd^(VKVVVV%WUWWWWWWWEXTXXXXXXYqYY & F$gd^ & F#gd^`gd^$a$gd^^gd^ & F!gd^gd^ h^`hgd^YYYYYZ[ZpZZZF[U[d[ $Ifgd^ & F%gd^gd^ & F$1$gd^ & F$gd^ d[e[l[m[{{ $Ifgd^{kd$$Ifl0  t0644 layt!Q4m[n[u[v[{{ $Ifgd^{kd@ $$Ifl0  t0644 layt!Q4v[w[[\S\\\!]N]]]^F^^^yyy1$gd^gd^{kd $$Ifl0  t0644 layt!Q4^^^ _l____``6`N``` aGaoaaaaabHbbbbch^hgd^ & F&gd^^gd^gd^`N`'d+dsdyddd,e/eeeffAfBfff+gxggghhhPhThhhiiPiUi9jdjkk^m_m`mfojooofpwpxppppssssOvbvvɿhUh!Q4hU5h!Q4hV5 jhlhUUmHnHuhVhlhVH*hUhV5>* hU5>*hlhVmH sH hlhVmH sH hlhV5 hlhVhlhVmHsH8cEckcccd]dddddde#eeeefBfffg+gNgxg hdh^hgdUdhgdU Xdh^XgdU & F"gd^gd^xgghhhGhhh@iii#jpjjjQkkll:lrlllm^mmm dh`gdUgd^dhgdUmmmmmmmmmmmmmmmmmmmmmmmmmmmmgd^mnn-nnnnno?o^ooooNpepfphpjplpnppprptpvpwpFf W$Ifgd!Q4 Wgd^ Wh^hgd^wpxp~ppppppppppppppppppppppppFfFf $ W$Ifa$gd!Q4 W$Ifgd!Q4pppppppppppqqqq q qqqqqq!q$q%qFfm W$Ifgd!Q4Ff$ W$Ifa$gd!Q4%q&q(q0q4q7q:q=q@qCqDqEqGqOqSqVqYq\q_qbqcqdqfqnqrqFfFf$ W$Ifa$gd!Q4 W$Ifgd!Q4FfBrquqxq{q~qqqqqqrr~rr* hU5>*hU hlhVhlhV5L{{{|G||||}V}}}+~~~'cҀ&\`gd^^gd^gd^Ձ^DjT7f!GX ^`gd^^gd^gd^`gd^PX^efkpz|:ORW"ns'-MSdiފŋ!'mrvyGH\`ʑϑ&*x|3:psƘ˘/ntx~lqjhUh!Q4hV5hlhV56 hlhVhlhV5hlhV5>*QXˈ#tډS3Rz‹ċ $Ifgd^gd^`gd^ċŋNj̋Ӌԋ^UUUU $Ifgd^kd'$$Ifl\H\ cE t0644 layt!Q4ԋՋ׋݋^UUUU $Ifgd^kd9($$Ifl\H\ cE t0644 layt!Q4^UUUU $Ifgd^kd($$Ifl\H\ cE t0644 layt!Q4^UUUU $Ifgd^kd)$$Ifl\H\ cE t0644 layt!Q4^UUUU $Ifgd^kd%*$$Ifl\H\ cE t0644 layt!Q4~Ό^ݍ ^YYYYYYYYYgd^kd*$$Ifl\H\ cE t0644 layt!Q4 7e֎'sǏHIO7]ݒZ;T 0^`0gd^`gd^gd^Tl͔)\)eP2j[ۙ`gd^^gd^ ^`gd^gd^_ě(kÜXj|ADEFO`gdU`gd^gd^jϝӝCF5X[z}[`<?rx*BUZ]߫|˭ah*hlhVEHjhlhVEHUhlhV\hlhV5\hUhV5>*hUhlhV5 hlhVhlhVmHsH@OOޠ?֡0dWߣEڤ Bڥ+E`~`gd^gd^~ڦ*FgѧKt-qrx٩B_۫4Yh^hgd^ & F3gd^ & F2gd^gd^+ZȰbı1P8۴ & F5gd^ & F4gd^ & F=gd^h`hgd^ & F:gd^ & F?gd^  & F<dgd^gd^*+,-bqȱױ15B\elp- [jϺ޺8Bɼͼۼ7JBWFQTZopΫΫΫΣΫΫΫΫΫΫΫΫΫΫΫΫΫΫΫΫΫΣΫΫΟΫΟhUhlhV\hlhV5\hlhVCJaJhlhV5CJ\aJ hlhVjhlhVEHUjm+hlhVEHUj@K hlhVEHUV># >6|Rƺ4Vɼ/Zҽ`gd^ & F<gd^h^hgd^ & F7gd^^gd^ & F6gd^gd^ҽ>wݾFo_<_=>i=$a$gd^ & F9gd^  & F>dgd^ & F;gd^^gd^ & F@gd^`gd^ & F8gd^gd^pcnEI>SiGK /xyzO_#FyhlhVmH sH hlhV56 hU>*h!Q4hV5hlhV>*hlhV5>*hlhV5hUhV5>*CJ aJ hlhVCJaJhlhV5CJ\aJhlhV5\ hlhV5:ge:$& #$/Ifb$gd!Q4$a$gd^ $^a$gd^`gd^gd^@,,,$& #$/Ifb$gd!Q4kdI-$$Iflrl ]!{YY?T t 6 0644 lae4yt!Q4,kd .$$Iflrl ]!{YY?T t 6 0644 lae4yt!Q4$& #$/Ifb$gd!Q4$& #$/Ifb$gd!Q4-1@,,,$& #$/Ifb$gd!Q4kd.$$Iflrl ]!{YY?T t 6 0644 lae4yt!Q417>?D,kd/$$Iflrl ]!{YY?T t 6 0644 lae4yt!Q4$& #$/Ifb$gd!Q4DRV]d$& #$/Ifb$gd!Q4dejuy@,,,$& #$/Ifb$gd!Q4kdU0$$Iflrl ]!{YY?T t 6 0644 lae4yt!Q4y,kd1$$Iflrl ]!{YY?T t 6 0644 lae4yt!Q4$& #$/Ifb$gd!Q4$& #$/Ifb$gd!Q4@88888$a$gd^kd1$$Iflrl ]!{YY?T t 6 0644 lae4yt!Q4 $Ifgd^$a$gd^   &)KBBB66 $$Ifa$gd!Q4 $Ifgd^kd2$$Iflr8 e%{I i?T t0644 layt!Q4)*06@EHKBBB66 $$Ifa$gd!Q4 $Ifgd^kd^3$$Iflr8 e%{I i?T t0644 layt!Q4HIO[djmKBBB66 $$Ifa$gd!Q4 $Ifgd^kd4$$Iflr8 e%{I i?T t0644 layt!Q4mntKBBB66 $$Ifa$gd!Q4 $Ifgd^kd4$$Iflr8 e%{I i?T t0644 layt!Q4KBBB66 $$Ifa$gd!Q4 $Ifgd^kd5$$Iflr8 e%{I i?T t0644 layt!Q4KB9999 $Ifgd^^gd^kd^6$$Iflr8 e%{I i?T t0644 layt!Q4 ".0Bkd7$$Iflr8 i U&Y3eT t0644 layt!Q4 $Ifgd^0167BPRI@@@@@ $Ifgd^kd7$$Ifl4r8 i U&`Y3eT t0644 layt!Q4RSXfq}I@@@@@ $Ifgd^kd8$$Ifl4r8 i U&3eT t0644 layt!Q4KBBBBBB $Ifgd^kdt9$$Iflr8 i U&Y3eT t0644 layt!Q4I@@@@@ $Ifgd^kd4:$$Ifl4r8 i U&`Y3eT t0644 layt!Q4I@@@@@ $Ifgd^kd:$$Ifl4r8 i U&3eT t0644 layt!Q4 I@@@@@ $Ifgd^kd;$$Ifl4r8 i U&3eT t0644 layt!Q4"yzKB=BB=gd^`gd^kd<$$Iflr8 i U&Y3eT t0644 layt!Q4z7Fgy/K]u# ^`gd^`gd^ hh^h`hgd^h^hgd^gd^$a$gd^#ijltBKctxyz}#MLS[ly.; cQX㰬hlhVOJQJhOhVh!Q4hV5hUhV5>* jhlhVUmHnHuhVhlhV5 hlhVhlhV56hlhV56H*?#Qit<So%wx{|}~gd^ ^`gd^`gd^gd^'} $Ifgd^gd^qhhhhhhh $Ifgd^kdX=$$IflF F 4 4 t06    44 la+yt!Q4offf $Ifgd^kd=$$Ifl4F F `4 `4 t06    44 la+yt!Q4offf $Ifgd^kdu>$$Ifl4F F 4 4 t06    44 la+yt!Q4offf $Ifgd^kd ?$$Ifl4F F 4 4 t06    44 la+yt!Q4offf $Ifgd^kd?$$Ifl4F F 4 4 t06    44 la+yt!Q4'offfff $Ifgd^kd4@$$Ifl4F F 4 4 t06    44 la+yt!Q4'()34offf $Ifgd^kd@$$Ifl4F F `4 `4 t06    44 la+yt!Q4456GHofff $Ifgd^kd^A$$Ifl4F F 4 4 t06    44 la+yt!Q4HIJVjkofffff $Ifgd^kdA$$Ifl4F F 4 4 t06    44 la+yt!Q4offf $Ifgd^kdB$$Ifl4F F `4 `4 t06    44 la+yt!Q4offf $Ifgd^kdC$$Ifl4F F 4 4 t06    44 la+yt!Q4offf $Ifgd^kdC$$Ifl4F F 4 4 t06    44 la+yt!Q4offf $Ifgd^kdGD$$Ifl4F F 4 4 t06    44 la+yt!Q4 Yojjjjjjaaaa $Ifgd^gd^kdD$$Ifl4F F 4 4 t06    44 la+yt!Q4 "@3 $Ifgd!Q4kdqE$$Ifl4r %+`  t0644 layt!Q4 $Ifgd^"#$+123@kd+F$$Ifl4r %`+  ` t0644 layt!Q4 $Ifgd^389:BC3kdF$$Ifl4r % +    t0644 layt!Q4 $Ifgd^ $Ifgd!Q4CDKLMS $Ifgd!Q4 $Ifgd^STU[\]I@3@@ $Ifgd!Q4 $Ifgd^kdG$$Ifl4r % +    t0644 layt!Q4]def*@;;;;gd^kdwH$$Ifl4r % +    t0644 layt!Q4 $Ifgd^ $Ifgd^gd^  &KBBBBB $Ifgd^kd;I$$Iflrh  &\+ t0644 layt!Q4&',2:?FKBBBBB $Ifgd^kdI$$Iflrh  &\+ t0644 layt!Q4FGMV]ciKBBBBB $Ifgd^kdJ$$Iflrh  &\+ t0644 layt!Q4ijowKBBBBB $Ifgd^kdQK$$Iflrh  &\+ t0644 layt!Q4KBBBBB $Ifgd^kdL$$Iflrh  &\+ t0644 layt!Q4KBBBBB $Ifgd^kdL$$Iflrh  &\+ t0644 layt!Q4KBBBBB $Ifgd^kdgM$$Iflrh  &\+ t0644 layt!Q4  KBBBBB $Ifgd^kdN$$Iflrh  &\+ t0644 layt!Q4 !"#0:LKFF=== $Ifgd^gd^kdN$$Iflrh  &\+ t0644 layt!Q4LMTalqhhh $Ifgd^kd}O$$IflF"  &   t06    44 layt!Q4lmu~qhhh $Ifgd^kdP$$IflF"  &   t06    44 layt!Q4qhhh $Ifgd^kdP$$IflF"  &   t06    44 layt!Q4qhhh $Ifgd^kd?Q$$IflF"  &   t06    44 layt!Q4qljaaaaa $Ifgd^gd^kdQ$$IflF"  &   t06    44 layt!Q4 "&KBBBBB $Ifgd^kdkR$$Iflrh $#%Y t0644 layt!Q4&'/4;FJKBBBBB $Ifgd^kdS$$Iflrh $#%Y t0644 layt!Q4JKSX_jnKBBBBB $Ifgd^kdS$$Iflrh $#%Y t0644 layt!Q4now|KBBBBB $Ifgd^kdT$$Iflrh $#%Y t0644 layt!Q4KBBBBB $Ifgd^kd3U$$Iflrh $#%Y t0644 layt!Q4KBBBBB $Ifgd^kdU$$Iflrh $#%Y t0644 layt!Q4KBBBBB $Ifgd^kdV$$Iflrh $#%Y t0644 layt!Q4 KBBBBB $Ifgd^kdIW$$Iflrh $#%Y t0644 layt!Q4 !W^KFFFFFFFgd^kdW$$Iflrh $#%Y t0644 layt!Q4^)xy $Ifgd^gd^ KBBBBB $Ifgd^kdX$$IflrhFi$YYY t0644 layt!Q4KBBBBB $Ifgd^kdQY$$IflrhFi$YYY t0644 layt!Q4 KBBBBB $Ifgd^kdY$$IflrhFi$YYY t0644 layt!Q4 "(1KBBBBB $Ifgd^kdZ$$IflrhFi$YYY t0644 layt!Q4127?GNTKBBBBB $Ifgd^kd=[$$IflrhFi$YYY t0644 layt!Q4TUZblrxKBBBBB $Ifgd^kd[$$IflrhFi$YYY t0644 layt!Q4xy~KBBBBB $Ifgd^kd\$$IflrhFi$YYY t0644 layt!Q4KBBBBB $Ifgd^kd)]$$IflrhFi$YYY t0644 layt!Q4%LKFF==^gd^gd^kd]$$IflrhFi$YYY t0644 layt!Q4+Y  $$Ifa$gd!Q4gd^`gd^ & $$Ifa$gd!Q4kdq^$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4-=HOXb $$Ifa$gd!Q4bcew& $Ifgd^kd._$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4wy}~ $Ifgd^ $$Ifa$gd!Q4& $Ifgd^kd_$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4 $Ifgd^ $$Ifa$gd!Q4& $Ifgd^kd`$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4 $Ifgd^ $$Ifa$gd!Q4& $Ifgd^kdea$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4 $Ifgd^ $$Ifa$gd!Q4& $Ifgd^kd"b$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4 $Ifgd^ $$Ifa$gd!Q4& $Ifgd^kdb$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4  $Ifgd^ $$Ifa$gd!Q4&& $Ifgd^kdc$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4&)-./0 $Ifgd^ $$Ifa$gd!Q4013E& $Ifgd^kdYd$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4EGLMNO $Ifgd^ $$Ifa$gd!Q4OPQX& $Ifgd^kde$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4XYZ[\] $Ifgd^]^&`gd^kde$$Ifl֞\ 5t"%:r ? t0H$44 layt!Q4JIC!O]t 0^`0gd^gdU ^`gd^`gd^gd^v HIJO'6}9@ &,4&(,.op4ʽhlhVH* jhlhV jhlhV jhlhVUmHnHuhlhVH*hlhVOJQJ^JhUhV5>*hlhVmH sH h!Q4hV5hlhV5 hlhVhlhV5>*5xv ``gd^gd^ $^a$gd^ $`a$gd^$a$gd^* ^=P  $Ifgd^gd^ $(,048<@^UUUUUUUU $Ifgd^kdf$$Ifl\ { q t0644 layt!Q4 @DHZbz '/4 $Ifgd^4;@HOPUPC ^`gd^gd^kd4g$$Ifl\ { q t0644 layt!Q4 $Ifgd^fcy#$%&,FGoq$a$gd^gd^`gd^ ^`gd^q4B/BV !"`gd^ & F(gd^gd^4B !"& .024<>JLTVHLhjƿuuukukukuk j>hlhV j<hlhVhlhVH*hlhV5hlhV5OJQJ^JhlhVOJQJ^J hlhUhUhlhU56 hU56 hV56 jhlhUUmHnHu jhlhVUmHnHu hlhVhlhV56* !0m"z A m o         $?]&#$/Ifgd!Q4 & F)gd^`gd^^gd^gd^    # * TBBBB$?]&#$/Ifgd!Q4kdg$$Ifl\T@ T t 6?]0644 layt!Q4* + 0 4 8 @ TBBBB$?]&#$/Ifgd!Q4kdh$$Ifl\T@ T t 6?]0644 layt!Q4@ A F Q V ^ TBBBB$?]&#$/Ifgd!Q4kd E O T L;;;;;h$If^h`gd!Q4kd+r$$Iflr7 E?$VH t044 laMyt!Q4T U V   LG>5h^hgd^h`hgd^gd^kdr$$Iflr7 E?$VH t044 laMyt!Q4 !   f+Npq2@`gd^gd^h`hgd^h^hgd^ h^h`gd^@XZMN[\]ij $Ifgd^ ^`gd^gd^`gd^KBBBBB $Ifgd^kds$$Iflr>%"t<= t0#644 layt!Q4 KBBBBB $Ifgd^kd;t$$Iflr>%"t<= t0#644 layt!Q4 %17BKBBBBB $Ifgd^kdt$$Iflr>%"t<= t0#644 layt!Q4BCN~!xKBBBBBB`gd^kdu$$Iflr>%"t<= t0#644 layt!Q4jCNQV$*6f%GMN""###%'%r%x%3&7&~&&&&'q''''''((**++:,R,h./O66z:{:|::::;1;2;̻h!Q4hV5hlhV56 jhlhVUmHnHuhlhV6hlhV5OJQJ^JhU5OJQJ^JhUhlhV5 hlhVBx5eJ(`#$H9YZ^gd^gd^`gd^Z-V+\F      8!=!C!K!P! $Ifgd^ & FAgd^`gd^^gd^gd^P!U!Z!`!h!w!!!!!!!!!!!!!!!!!!!!!!!Ff%zFf*w $Ifgd^!!!!!!!!!!!!!!!!!!!!!!!!! " "FfFfFf } $Ifgd^ """"""""""'")"."1"4"7"8"9":";"<"D"F"K"N"Q"T"U"Ff Ff $Ifgd^U"V"W"X"Y"c"e"j"m"p"s"t"u"v"w"x""""""""""""FfFfFf $Ifgd^""""""""""""""""""""""""#E#P#gd^FfFf $Ifgd^P#m###$C$y$$%i%%%%%,&y&&&&&&'b'''(($a$gd^ $^a$gd^gd^(((***?+++++*,9,:,R,,,O-P-h.///00 & F/gd^gd^ $ & F1a$gd^ $ & F0a$gd^$a$gd^000"1E1x11112a222334\445E5|5555 ,^`,gd^`gd^gd^h^hgd^ & F/gd^5O6T6c6h6o6u66 $Ifgd^ 0^`0gd^6666668//// $Ifgd^kd$$Iflֈ  {N-&  t0644 layt!Q46666#kd͚$$Iflֈ  {N-&  t0644 layt!Q4 $$Ifa$gd!Q4 $Ifgd^6666666 $$Ifa$gd!Q4 $Ifgd^6666678//// $Ifgd^kd$$Iflֈ  {N-&  t0644 layt!Q47 777#kd=$$Iflֈ  {N-&  t0644 layt!Q4 $$Ifa$gd!Q4 $Ifgd^777$7,777<7 $$Ifa$gd!Q4 $Ifgd^<7=7D7M7U7]78//// $Ifgd^kd$$Iflֈ  {N-&  t0644 layt!Q4]7d7i7j7#kd$$Iflֈ  {N-&  t0644 layt!Q4 $$Ifa$gd!Q4 $Ifgd^j7p7y77777 $$Ifa$gd!Q4 $Ifgd^7777778//// $Ifgd^kde$$Iflֈ  {N-&  t0644 layt!Q47777#kd$$Iflֈ  {N-&  t0644 layt!Q4 $$Ifa$gd!Q4 $Ifgd^7777777 $$Ifa$gd!Q4 $Ifgd^777D8}8883333gd^kd՟$$Iflֈ  {N-&  t0644 layt!Q488b99:h:z:{:|:::;$;+;2;9;=;H;N;T;];f;o;t; $Ifgd^gd^2;<;=;R;T;e;f;s;I?J?FF(HuHJ KLLLLNNQQQ#R~_____S``Reeeef{fffffff𫠫{&jh!Q4hV5CJUaJ jh!Q4hV5CJUaJh!Q4hVCJaJh!Q4hV5CJaJhlhV5>*hlhV5OJQJ^JhUhV5>*hlhVmHsHhlhV5hU hlhVh!Q4hV5,t;u;z;|;% $Ifgd^kd$$Ifl֞E#\ ft % t0644 layt!Q4|;;;;;; $Ifgd^;;;;% $Ifgd^kd+$$Ifl֞E#\ ft % t0644 layt!Q4;;;;;; $Ifgd^;;;;% $Ifgd^kdɡ$$Ifl֞E#\ ft % t0644 layt!Q4;;;;;; $Ifgd^;;;;% $Ifgd^kdg$$Ifl֞E#\ ft % t0644 layt!Q4;;;<< < $Ifgd^ < <<<% $Ifgd^kd$$Ifl֞E#\ ft % t0644 layt!Q4<<#<)<,<3< $Ifgd^3<4<;<=<% $Ifgd^kd$$Ifl֞E#\ ft % t0644 layt!Q4=<C<I<O<R<X< $Ifgd^X<Y<`<c<% $Ifgd^kdA$$Ifl֞E#\ ft % t0644 layt!Q4c<i<o<u<x<< $Ifgd^<<<<% $Ifgd^kdߤ$$Ifl֞E#\ ft % t0644 layt!Q4<<<<<< $Ifgd^<<<<% $Ifgd^kd}$$Ifl֞E#\ ft % t0644 layt!Q4<<<<<< $Ifgd^<<<<% $Ifgd^kd$$Ifl֞E#\ ft % t0644 layt!Q4<<<<<< $Ifgd^<<`==% gd^kd$$Ifl֞E#\ ft % t0644 layt!Q4=>W>>>J??@D@@@ AAAVBBB CqCC:DDDEEEmEEFCFgd^CFFFFFFFckdW$$Ifl0  t 6! 0644 layt!Q4$! &#$/Ifgd!Q4gd^FFFFzhh$! &#$/Ifgd!Q4kd$$Ifl0  t 6! 0644 layt!Q4FFFFzhh$! &#$/Ifgd!Q4kds$$Ifl0  t 6! 0644 layt!Q4FFFFzhh$! &#$/Ifgd!Q4kd$$Ifl0  t 6! 0644 layt!Q4FGGGGGGGGdGGG(HuHzuuuuuuuuuuuugd^kd$$Ifl0  t 6! 0644 layt!Q4 uHHHJIII1JJJ KRKWKKLL"L*L2L:LBLJLRLZLbLjLkLLMlM & FBgd^gd^lMMNiNNNO{OOPnPPQAQQQQQQQQQQQQR RR $Ifgd^`gd^gd^R"R#R.R0R5R8R;R>R?R@RARBRCRMRORTRWRZR]R^R_R`RaRbRlRnRFfFfFf $Ifgd^nRsRvRyR|R}R~RRRRRRRRRRRRRRRRRRRRRRFfFf $Ifgd^RRRRRRRRRRRRRRRRRRRRRRRRRRRFfӿFfؼFfݹ $Ifgd^RSS SSSSSSSSS!S#S(S+S.S1S2S3S4S5S6S@SBSGSJSMSFfFf $Ifgd^MSPSQSRSSSTSUS]S_SdSgSjSmSnSoSpSqSrSSSSS TPTTTT & FCgd^gd^FfFf $Ifgd^TU7UvUUV]VVVW%W,WRWWWWWX0X1X\XXX9YqY $Ifgd^ & FFgd^ & FEgd^gd^ & FDgd^ & FCgd^qYYYYYYYYBkd$$Iflr t0644 layt!Q4 $Ifgd^YYYYYYYYBkdn$$Iflr t0644 layt!Q4 $Ifgd^YYYYYYYYBkd$$Iflr t0644 layt!Q4 $Ifgd^YYYYYYYYBkd$$Iflr t0644 layt!Q4 $Ifgd^YYYYYYYKBBBBB $Ifgd^kd$$Iflr t0644 layt!Q4YYYZZZ ZKBBBBB $Ifgd^kd$$Iflr t0644 layt!Q4 Z Z ZZZZZKBBBBB $Ifgd^kd/$$Iflr t0644 layt!Q4ZZZZ!Z#Z&ZKBBBBB $Ifgd^kd$$Iflr t0644 layt!Q4&Z'Z)Z,Z/Z2Z5ZKBBBBB $Ifgd^kdI$$Iflr t0644 layt!Q45Z6Z8Z;Z>ZAZDZKBBBBB $Ifgd^kd$$Iflr t0644 layt!Q4DZEZGZJZMZPZSZKBBBBB $Ifgd^kdc$$Iflr t0644 layt!Q4SZTZUZZZZZKF==== $Ifgd^gd^kd$$Iflr t0644 layt!Q4ZZZZZZZZBkd}$$Iflra  t0644 layt!Q4 $Ifgd^ZZ[[[[[KBBBBB $Ifgd^kd $$Iflra  t0644 layt!Q4[[[#['[+[0[KBBBBB $Ifgd^kd$$Iflra  t0644 layt!Q40[1[3[8[@[D[I[KBBBBB $Ifgd^kd$$$Iflra  t0644 layt!Q4I[J[L[U[\[`[e[KBBBBB $Ifgd^kd$$Iflra  t0644 layt!Q4e[f[h[o[w[{[[KBBBBB $Ifgd^kd>$$Iflra  t0644 layt!Q4[[[[[[[KBBBBB $Ifgd^kd$$Iflra  t0644 layt!Q4[[[[[[[KBBBBB $Ifgd^kdX$$Iflra  t0644 layt!Q4[[[[[[[KBBBBB $Ifgd^kd$$Iflra  t0644 layt!Q4[[[[[[[KBBBBB $Ifgd^kdr$$Iflra  t0644 layt!Q4[[[[[[\KBBBBB $Ifgd^kd$$Iflra  t0644 layt!Q4\\\\\\KBBBB $Ifgd^kd$$Iflra  t0644 layt!Q4\\"\*\/\9\[RRRR $Ifgd^kd$$Ifl\a  t0644 layt!Q49\:\<\?\B\H\[RRRR $Ifgd^kd$$Ifl\a  t0644 layt!Q4H\I\L\P\S\Y\[RRRR $Ifgd^kd1$$Ifl\a  t0644 layt!Q4Y\Z\\\_\b\h\[RRRR $Ifgd^kd$$Ifl\a  t0644 layt!Q4h\i\k\o\q\y\[RRRR $Ifgd^kdI$$Ifl\a  t0644 layt!Q4y\z\|\\\\[RRRR $Ifgd^kd$$Ifl\a  t0644 layt!Q4\\\\\\[RRRR $Ifgd^kda$$Ifl\a  t0644 layt!Q4\\\\\\[RRRR $Ifgd^kd$$Ifl\a  t0644 layt!Q4\\\\\\[RRRR $Ifgd^kdy$$Ifl\a  t0644 layt!Q4\\\\\\[RRRR $Ifgd^kd$$Ifl\a  t0644 layt!Q4\\\\\\[RRRR $Ifgd^kd$$Ifl\a  t0644 layt!Q4\\\]]]]]][VVMMMMM $Ifgd^gd^kd$$Ifl\a  t0644 layt!Q4]]]] $Ifgd^]]kd$$Iflִ$ H(#X8|88 t0#    44 layt!Q4]]]]]]]] ^ $Ifgd^ ^ ^kd}$$Iflִ$ H(#X8|88 t0#    44 layt!Q4 ^^^^^"^%^(^,^ $Ifgd^,^-^kdQ$$Iflִ$ H(#X8|88 t0#    44 layt!Q4-^0^4^;^?^B^D^G^K^ $Ifgd^K^L^kd)$$Iflִ$ H(#X8|88 t0#    44 layt!Q4L^N^R^W^[^^^a^c^g^ $Ifgd^g^h^kd$$Iflִ$ H(#X8|88 t0#    44 layt!Q4h^i^T_~______`R``` awaaabNbbbb\ccddd*B*phhlhVCJOJQJaJ(hlhV>*B*CJOJQJaJph%hlhVB*CJOJQJaJphhlhV5>*B*\ph hlhVhlhV5B*\phhlhVB*phhlhV5B*ph,|||||6}}}~c~lS$-D7$8$H$M ^a$gd^$-D7$8$H$M a$gd^$8-D7$8$H$M ^8a$gd^$h-D7$8$H$M `ha$gd^$h-D7$8$H$M ^`ha$gd^$ & F*d-D7$8$H$M a$gd^-D7$8$H$M gd^ c~~~~~~ $#hhd-D7$8$H$M ^gd^ & F,d-D7$8$H$M gd^ & F+d-D7$8$H$M gd^-D7$8$H$M gd^$-D7$8$H$M a$gd^#hUhijstnqz|ǂɂ͂ς҂Ղ '(,1ὰ hlhV"hlhV5>*CJOJQJaJhlhV5CJOJQJaJhU5CJOJQJaJ(hlhV>*B*CJOJQJaJphhlhVCJOJQJaJ%hlhVB*CJOJQJaJphhlhVB*ph5hitopq{|$-D7$8$H$IfM gd^-D7$8$H$M gd^d-D7$8$H$M ^gd^Ȃɂ΂ςӂs]]]]]]]]]$-D7$8$H$IfM gd^kdB$$IfT(*rF bIF FZ44 (a(T ӂԂՂ]kd$$IfT(6rF bIF FZ44 (a(T$-D7$8$H$IfM gd^    (-0]kd`$$IfT( rF bIF FZ44 (a(T$-D7$8$H$IfM gd^01saKKKK$-D7$8$H$IfM gd^-D7$8$H$M gd^kd$$IfT(3rF bIF FZ44 (a(Tƃσу҃s]$-D7$8$H$IfM gd^h$-D7$8$H$IfM ^hgd^ & F-d$-D7$8$H$IfM gd^Rkd~$$IfT( 0R 44 (aTŃƃ΃σЃԃՃ׃W]Ƅ'()ׅAIJLXij@dzdzǣDŽwwwDŽhlhVB*\phhlhV5B*\ph jhlhUUmHnHujIhlhVB*UphhlhV5B*ph hlhVhlhVB*phhlhVCJaJhlhVCJOJQJaJ%hlhVB*CJOJQJaJph-҃ӃԃՃփv & F.d$-D7$8$H$IfM gd^$-D7$8$H$IfM gd^Tkd$$IfT(4 0R` 44 (aTփ׃؃O')̅Յօׅj@ -D7$8$H$M ^@ `gd^$-D7$8$H$M a$gd^-D7$8$H$M gd^Tkd$$IfT(40R  44 (aT ׅJjX@A['/$-D7$8$H$IfM gd^gd^-D7$8$H$M gd^@Z[&'.067:;>@CHNORSVXZ_efijmorw{|‹ËƋNjʋ̋΋ӋڋۋދߋhlhVB*ph hlhVhlhV5>*B*\phX/07;?:$$$$-D7$8$H$IfM gd^kd $$IfT(*ִM g5! ]]8    44 (a(T?@DEFG$-D7$8$H$IfM gd^GHOSW:$$$$-D7$8$H$IfM gd^kd $$IfT(ִM g5! ]]8    44 (a(TWX[\]^$-D7$8$H$IfM gd^^_fjn:$$$$-D7$8$H$IfM gd^kdy!$$IfT( ִM g5! ]]8    44 (a(Tnostuv$-D7$8$H$IfM gd^vw|:$$$$-D7$8$H$IfM gd^kd2"$$IfT( ִM g5! ]]8    44 (a(T$-D7$8$H$IfM gd^:$$$$-D7$8$H$IfM gd^kd"$$IfT(ִM g5! ]]8    44 (a(T$-D7$8$H$IfM gd^:$$$$-D7$8$H$IfM gd^kd#$$IfT( ִM g5! ]]8    44 (a(T$-D7$8$H$IfM gd^ËNjˋ:$$$$-D7$8$H$IfM gd^kd]$$$IfT( ִM g5! ]]8    44 (a(Tˋ̋ϋЋыҋ$-D7$8$H$IfM gd^ҋӋۋߋ:$$$$-D7$8$H$IfM gd^kd%$$IfT( ִM g5! ]]8    44 (a(T$-D7$8$H$IfM gd^:$$$$-D7$8$H$IfM gd^kd%$$IfT( ִM g5! ]]8    44 (a(T   #$'),167:;?ACHMNQRUWZ_vw̌͌<=Vbcfg iuzȐɐ)*{|ΒhlhV5B*\phhlhV5hlhV5>*B*phhlhV>*B*ph hlhVhlhVB*phJ$-D7$8$H$IfM gd^ :$$$$-D7$8$H$IfM gd^kd&$$IfT(ִM g5! ]]8    44 (a(T$-D7$8$H$IfM gd^ $(:$$$$-D7$8$H$IfM gd^kdA'$$IfT( ִM g5! ]]8    44 (a(T()-./0$-D7$8$H$IfM gd^017;@:$$$$-D7$8$H$IfM gd^kd'$$IfT(ִM g5! ]]8    44 (a(T@ADEFG$-D7$8$H$IfM gd^GHNRV:$$$$-D7$8$H$IfM gd^kd($$IfT( ִM g5! ]]8    44 (a(TVW[\]^$-D7$8$H$IfM gd^^_w͌:(((-D7$8$H$M gd^kdl)$$IfT(=ִM g5! ]]8    44 (a(T͌=VWc؎0g^ɐ*Z|Β0-D7$8$H$M ^`0gd^-D7$8$H$M `gd^-D7$8$H$M gd^ΒBCab-.uv,QR`anrɸָ23߹ꏈ}}}r}}}}hlhV56>*hlhV56H* h956hlhV56&h9h95>*CJ$OJQJ^JaJ$&h9hV5>*CJ$OJQJ^JaJ$ hO5>*CJ$OJQJ^JaJ$hlhV5>*OJQJ^JhlhV9 hlhVhlhV5>*B*ph,2b=eΕ#"K & FGgd^ & FHgd^ & FIgd^gd^$a$gd^0-D7$8$H$M ^`0gd^ Wݘ.}tq@vj˞^gd^ & FMgd^`gd^ & FLgd^ & FKgd^ & FJgd^gd^˞=|(=R{d>HYnS8 p^p`gd^ & FPgd^ & FOgd^ & FNgd^gd^ & FMgd^8R kzѥ$wʦbç?רyBi; & FSgd^ & FRgd^^gd^ & FQgd^gd^; Y $:PfsIt nDzͲղ & FUgd^^gd^`gd^gd^ & FTgd^ղܲ4&&zHѶFԷ)xָ4 & FVgd^^gd^gd^ & FUgd^ V%Qһ#Sq 5Hx> & FYgd^ & FXgd^ & FWgd^`gd^gd^GH#*=?FGOPWX_`FGQR&(.079LMUWhlhV56>* j\hlhV56hlhV56H*h!Q4hV56H*h!Q4hV56h9hV56>* hlhVhlhV56hlhV56H*?> V9CmQu;&<FXd & F[gd^ & FZgd^`gd^gd^^gd^dv#s2.>~?Ph & F^gd^ & F]gd^`gd^ & F\gd^gd^ & F[gd^h~P'e*+t $n&#$/Ifgd!Q4h^hgd^ & F`gd^ & F_gd^gd^ & F^gd^  A////$n&#$/Ifgd!Q4kd%*$$Ifl+r  $8 t 6n044 layt!Q4 !/**gd^kd*$$Ifl+r  $8 t 6n044 layt!Q4$n&#$/Ifgd!Q4!"#$7b} $&`#$/Ifgd!Q4 gd^gd^, $&`#$/Ifgd!Q4kd+$$Ifl`ֈs KW t 6`0644 layt!Q4 $&`#$/Ifgd!Q4, $&`#$/Ifgd!Q4kd],$$Ifl`ֈs KW t 6`0644 layt!Q4 $&`#$/Ifgd!Q4,## gd^kd-$$Ifl`ֈs KW t 6`0644 layt!Q4!"#Dk)AXY|M'Z ^`gd^ 0^`0gd^ & Fagd^`gd^gd^ gd^Zr{ERScP~]^ & Fdgd^h^hgd^ & Fcgd^gd^^gd^ & Fbgd^WWdGHI#:d !+,=>BFGHMPR  9AGNOTYcejnw?e    01ڱڱ h@56 hlhVhlhV56>*H*hlhV56H* h956h!Q4hV56hlhV56>* hO56hlh@56hlhV56@*\]"FGim(It^gd^ & Ffgd^h^hgd^ & Fegd^gd^ N&:Ln6^z^gd^`gd^gd^  !3GZw?,"5Rd8ugd^`gd^MH1 $Ifgd^^gd^ & Fggd^`gd^gd^^UUUU $Ifgd^kd-$$Ifl\ <p t0644 layt!Q4^UUUU $Ifgd^kdm.$$Ifl\ <p t0644 layt!Q4^UUUU $Ifgd^kd/$$Ifl\ <p t0644 layt!Q4!%/^UUUU $Ifgd^kd/$$Ifl\ <p t0644 layt!Q4/02;@H^UUUU $Ifgd^kdY0$$Ifl\ <p t0644 layt!Q4HI\-J)i^YYYYYYYYYgd^kd0$$Ifl\ <p t0644 layt!Q4  n+y2b'=w & Fi 8^gd^ & Fhgd^^gd^`gd^gd^wnd+degikmoq $Ifgd^^gd^ 0^`0gd^ & Fkgd^gd^ & Fjgd^qrst% $Ifgd^kd1$$Ifl֞Hi !00 t0644 layt!Q4tx| $Ifgd^% $Ifgd^kdo2$$Ifl֞Hi !00 t0644 layt!Q4 $Ifgd^% $Ifgd^kd=3$$Ifl֞Hi !00 t0644 layt!Q4 $Ifgd^% $Ifgd^kd 4$$Ifl֞Hi !00 t0644 layt!Q4 $Ifgd^% gd^kd4$$Ifl֞Hi !00 t0644 layt!Q4xA K 7?HRE  & Flgd^ & Fkgd^^gd^`gd^gd^ ]F]t@  Rfr Ox ^`gd^^gd^ & Fngd^`gd^gd9 & Fmgd^gd^ 0x7O(8^gd@`gd^ & Fogd^gd^ ^`gd^8InVc?@BDF$V&`#$/Ifgd!Q4^gd^^gd9 & Fqgd^gd^ & Fpgd^FGHMUVTBBBB$V&`#$/Ifgd!Q4kd5$$Ifl\\ : o o p t 6`V0644 layt!Q4VWY_cnTBBBB$V&`#$/Ifgd!Q4kdK6$$Ifl\\ : o o p t 6`V0644 layt!Q4noqw{|TBBBB$V&`#$/Ifgd!Q4kd6$$Ifl\\ : o o p t 6`V0644 layt!Q4|}TBBBB$V&`#$/Ifgd!Q4kd7$$Ifl\\ : o o p t 6`V0644 layt!Q4TBBBB$V&`#$/Ifgd!Q4kd78$$Ifl\\ : o o p t 6`V0644 layt!Q4$ TOOOOOOOOgd^kd8$$Ifl\\ : o o p t 6`V0644 layt!Q4 $ u     d e r | } [kd9$$Ifl0& t 6Q0644 layt!Q4$Q&#$/Ifgd!Q4 & Frgd^gd^ }   ! S   Nkd:$$Ifl0& t 6Q0644 layt!Q4 & Ft$Q&#$/Ifgd!Q4 & Fs$Q&#$/Ifgd!Q4       8 g } hccRRRR & Fu p88^8gd^gd^kd:$$Ifl0& t 6Q0644 layt!Q4$Q&#$/Ifgd!Q4 }  D   Y01` ON}V6 & Fwdhgd@ & Fvdhgd@dhgd@ dh^gd@gd^6$a$gd^gd^ & Fxdhgd@dhgd@ST12hi >@^`uw   J ]     #!,!!ϾϾϾϾϾϾϾϭϾϣϏ~~~~~~~~~~~~!hlhVB*OJQJ^Jph'hlhV5B*OJQJ\^JphhlhV5>* jhlhVUmHnHu jhlh?9UmHnHu hlhVhlhV5hlhV56 jhlh@UmHnHu hO561$a$gd^$a$gd^     $a$gd^ !"#$%&'()*+,-./012$a$gd^23456789:;<=>?@ABCDEFGHIJKLMN$a$gd^NOPQRSUVWXYZ[\]^_`abcdefghijk$a$gd^klmnopqrstuvwxyz{|}~$a$gd^$a$gd^gd^$a$gd^gd^ M gd^gd^      M gd^ M gd^ !"#$%&'()*+,-./01345 M gd^56789:;<=>?@ABCDEFGHIJKLMNOPQ M gd^QRSTUVWXYZ[\]^_`abcdefghjklmn M gd^nopqrstuvwxyz{|}~ M gd^ M gd^ $ M a$gd^ M gd^$!U,]-JKi^gd^ & Fgd^ & Ftgd^gd^ M gd^ $ M a$gd^ij;<lm8m >?$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^ M gd^gd^^gd^?@^_`eouvZIII$$7$8$H$Ifa$gd^kdA;$$IfrH i$ R#f !< .4 a $7$8$H$Ifgd^$$7$8$H$Ifa$gd^vw1kd)<$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd=$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdM>$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^*.SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd5?$$If֞ H i$ R# ! H.4 a./0TVW$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^WXjlmSE44$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd@$$If֞ H i$ R# ! H.4 amno$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^SE44$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdA$$If֞ H i$ R# ! H.4 a $7$8$H$Ifgd^$$7$8$H$Ifa$gd^SE44$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdA$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^SEEE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdC$$If֞ H i$ R# ! H.4 a   $$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^    SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdD$$If֞ H i$ R# ! H.4 a   = ? @ $$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^@ A F H SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd?E$$If֞ H i$ R# ! H.4 aH I J \ ] ^  $7$8$H$Ifgd^$$7$8$H$Ifa$gd^^ _ h j SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd'F$$If֞ H i$ R# ! H.4 aj k l    $$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^    SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdUG$$If֞ H i$ R# ! H.4 a      $$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^      SEEE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd=H$$If֞ H i$ R# ! H.4 a      4kd%I$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^    !!! $7$8$H$Ifgd^$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^!!!!SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdJ$$If֞ H i$ R# ! H.4 a!! !,!-!.! $7$8$H$Ifgd^$$7$8$H$Ifa$gd^.!/!>!@!SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdK$$If֞ H i$ R# ! H.4 a@!A!B!b!e!f!$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^f!g!y!{!SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdL$$If֞ H i$ R# ! H.4 a{!|!}!!!! $7$8$H$Ifgd^$$7$8$H$Ifa$gd^!!!!""""""*#3#####C$S$X$[$%%&&&&&&('(3(4(a(b((())*ͼ͎ͬ͜ohlhV56OJQJ^JhlhVEHOJQJ^JhlhVH*OJQJ^J jhlhVOJQJ^J jhlhVOJQJ^J jhlhVUmHnHuhlhVOJQJ^J!hlhVB*OJQJ^Jph'hlhV5B*OJQJ\^Jph%!!!!SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdM$$If֞ H i$ R# ! H.4 a!!!!!!$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^!!!!SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdN$$If֞ H i$ R# ! H.4 a!!!!!!$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^!!!!!!SEEE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdO$$If֞ H i$ R# ! H.4 a!"""$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^"")"+"SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdP$$If֞ H i$ R# ! H.4 a+","-"."/"0"$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^0"1":"<"SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdQ$$If֞ H i$ R# ! H.4 a<"=">"n"p"q"$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^q"r"|"~"SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdR$$If֞ H i$ R# ! H.4 a~"""""" $7$8$H$Ifgd^$$7$8$H$Ifa$gd^""""SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdS$$If֞ H i$ R# ! H.4 a"""""""6kdT$$Ifֈ H iR# ! v4 a$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^"""""""$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^""""SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdU$$If֞ H i$ R# ! H.4 a""" ###$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^##"#$#SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdV$$If֞ H i$ R# ! H.4 a$#%#&#3#4#5# $7$8$H$Ifgd^$$7$8$H$Ifa$gd^5#6#=#?#SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdW$$If֞ H i$ R# ! H.4 a?#@#A#]#_#`#$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^`#a#q#s#SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd Y$$If֞ H i$ R# ! H.4 as#t#u####$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^####SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdY$$If֞ H i$ R# ! H.4 a######$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$7$8$H$Ifa$gd^######SEEE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdZ$$If֞ H i$ R# ! H.4 a#####1kd[$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^#####$$$$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$ $$SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd\$$If֞ H i$ R# ! H.4 a$$$$$$$Bkd]$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^$$$ $!$"$#$$$$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$%$;$=$SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd^$$If֞ H i$ R# ! H.4 a=$>$?$@$A$B$C$Bkd_$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^C$Q$R$S$T$U$V$W$$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^W$X$[$\$SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd`$$If֞ H i$ R# ! H.4 a\$]$^$_$`$a$b$Bkdb$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^b$s$u$v$w$x$y$z$$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^z${$$$SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdc$$If֞ H i$ R# ! H.4 a$$$$$$$Bkdc$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^$$$$$$$$$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$$$SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdd$$If֞ H i$ R# ! H.4 a$$$$$$$Bkde$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^$$$$$$$$$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^$$$$SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdf$$If֞ H i$ R# ! H.4 a$$$$$$$$Bkdg$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^$$$$$$$$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^$$$$SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdh$$If֞ H i$ R# ! H.4 a$$$$%%%Bkdi$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^%%%%%%% %$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^ %!%:%<%SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdj$$If֞ H i$ R# ! H.4 a<%=%>%?%@%A%B%Bkdk$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^B%V%X%Y%Z%[%\%]%$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^]%^%h%l%SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdl$$If֞ H i$ R# ! H.4 al%m%n%o%p%q%r%Bkdm$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^r%~%%%%%%%$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^%%%%SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdn$$If֞ H i$ R# ! H.4 a%%%%%%%Bkdo$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^%%%%%%%%$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^%%%%SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd{p$$If֞ H i$ R# ! H.4 a%%%%%%%Bkdqq$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^% & &&&&&&$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^&&.&0&SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdgr$$If֞ H i$ R# ! H.4 a0&1&2&3&4&5&6&Bkd]s$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^6&A&E&F&G&H&I&J&$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^J&K&Y&]&SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kdSt$$If֞ H i$ R# ! H.4 a]&^&_&`&a&b&c&BkdIu$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^c&{&}&~&&&&&$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^&&&&SE4$$7$8$H$Ifa$gd^ $7$8$H$Ifgd^kd?v$$If֞ H i$ R# ! H.4 a&&&&&&&Bkd5w$$If֞ H i$ R# ! H.4 a$$7$8$H$Ifa$gd^&&&&&&&&$$7$8$H$Ifa$gd^$$7$8$H$Ifa$gd^&&&&&((((SNFNNNNN$a$gd^gd^kd+x$$If֞ H i$ R# ! H.4 a(())u******,,-9-:-;-<-=------.^/_/ $& #$,D9Dgd^ & F(gd^gd^ $&#$,D9Dgd^**,------/_/01?1@144555 6&6'6{88u>v>x>y>{>|>~>>>>>>>>>>>>>ȹ⯧||x||xhMBz hMBz0JjhMBz0JUhaFjhaFUhlhV6 hlhVhlhV5hlhV5>*hlhVEHOJQJ^JhlhV56OJQJ^Jh?9OJQJ^JhlhVOJQJ^J jhlh?9UmHnHu*_/)1*101?1m1111b22222!3G3j333 4<4=4Y44 & Fzgd^h`hgd^ h^`hgd^ & Fygd^gd^ 0^`0gd^44444+5U5|555'6@6d666-7m77 8C8z8{88888)9 & F|gd^ & F{gd^ gd^gd^)9H9n9999:.:r:::;O;j;;;;#<L<<<<< & Fgd^gd^ & F{gd^^gd^h^hgd^ & F~gd^ & F{gd^ & F}gd^<<=!=U====/>L>u>w>x>z>{>}>~>>>>>h]hgdV &`#$gdV hh^h`hgdO & Fgd^ & Fgd^h^hgd^ hh^h`hgd^ & Fgd^>>>>>>>>>>>>>>>>>>>>> &`#$gd@ &`#$gdV $h]ha$gdYh]hgdV &`#$gd^h]hgdV>>>>>>>>>>>>>>>>>>>>>>>>>>>>>?????=?H?O?V?W?_?`?i?j?t???ÿxxxxh"U}hMBz5CJaJmH sH hpfhMBzhaFhThMBz6CJh@hMBz6CJ hMBz0JjhMBz0JUhk*hYhMBzhYhMBz6CJaJhV]ihY0J6CJaJhYhY6CJaJhY6CJaJjhY6CJUaJ->?????????? ?!?$?%?/?0?5?6?Z|ΥNOe'/^ 2fb @`+1or,$@7 @׌V @!y#I @fb^3Z  @ @`7B] @h& 50 @Fy#I @fb^3Z  @ @`7B] @h& 50 @Fy#I @fb^3Z  @ @`7B] @h& 50 @Fy#I @fb^3Z  @ @`7B] @h& 50 @Fy#I @fb^3Z  @ @`7B] @h& 50 @Fy#I @fb^3Z  @ @`7B] @h& 50 @Fy#I @fb^3Z  @ @`7B] @h& 50 @Fy#I @fb^3Z  @ @`7B] @h& 50 @Fy#I @fb^3Z  @ @`7B] @h& 50 @Fy#I @fb^3Z  @ @`7B] @h&5k\ 0:o51M 1Z @?2^b A@뀬 NLlʫqXX@[F3fَpi y"n'@b^s= @ @J 1Щ̄g, *ka*9%@b^MMm @`oJgxdZk !@t1/ʕXG$e偔a4u 0L^RY+g6%@dbd3\TSq.VYq ՚v J@ U!@@'eb^?e"奶wI8vyҝ7]x, ( EzWD8o"/-c#@`1oZ)FP̳ A@̋Pc @@o1YE+V՜XD@[A, z!ϯuqBkFKļf Ϟ=u&)&n y 5@&b^V @ @VQ=HeUVQ5B)b^k @!LWVs¬y b^:tZ yOY1/+ E1yyc'!;U ;$ yP.#@R=cd Yeub^)b^k @>ca7b^Zhb^1  0͘2]ω\2p:ݺN׭(:"@@b,"IkZthļȺ @@8CLn4]2{Y )R) y U kw.u^Eez\!7f}Nʘ;c{ y{ݬ ]@m '-k!fn( 5 dΝ Sӳפga4  P.W$@-  0TP[qkcd2\N-W Y pn#@@<1/^M}ۛ6FFL1/ @- Ů @`FW@ @ [@&sff`[`5Kb^s= @ @W @/ 7#b xT/V=nj* @@1/N-cǸ/׫cJjBL, M\7U ļ lz @& Vq%@ @`q1o(*en"@@1/B @ļj"@+ ~ӿo.. ^A'@ @< { c @` 1o2 ]~0=  @ B.]$+7=#&@fbf7] ,Md* @ FC6'['o쨳_W  @ZX%uk^?ˮwsV:yuA@e[F [-_ǀjԢF$@@+z-Pey< L}sDzQļ$@@\c^kb|~.M.6)i dYM?}6  G@hMoHzU2Fo-I @V'0]K|>PylY M%u˜-PDS @`y1o J5 N糵g^? >Kr%m1d:%@nuº:m /3 y3V͘  J3j7ZfC[b->7 @@Ovb_^" S@멭/)O;7K"t;Zy-TIż?8 D@żR9 @W \D`xs|[w)ޘ%ˑ2j.ļK" @_-'.;|׿jz$@@2XM2C+>J^meL[ @b0}.XÆ?/Ltbt%3` 5c.BU4AԎf @48:eF@  @`~1odyI/ٵ 0RC#M384pV 7- @`1oZ)rw AһW w @@[1  @ @ŌLz 2w @ļ*nQ݃^w9 @@ rMur7ۊ0^/ _c3$@Yx @gm @54>w / 囹ZC-'3XzVdȯ,e XI@[BkǘQvf'% UO!@FȖW.(}ļ>z!@@;i'&nP̛da&[y[$  (Ǜypӿv%`Tļn:"@@ܘ3N HϪ=Ǭ|ʧj3 dż!i᫦zݯ  . [+d=y,ϣgW 0 w5@Y~/پUë<[ @`61o/ y& a“يy-%@`31o. c@V>#Abz ů @}~=) ^='@`7B] @@;yG>x{e+ @ເHY_;FA0 V@k^ut׫n!@oy1  0\@##jGjIjb^*j P8ī)sVI} Yg"@bCEE,RH(82^O*! (A @Ç;z]Un[UɼXU@[EN֯(6' j Z^gp Aׇa~+rWeJN./"glf)qXUKj͋E 6-EM?.S)}QޛL`%1mT\s!@`Uy mA3!#P寮WɊ9v-~ 8ͳ8 Q`r{@{}DJc*'kFCi4 VpJ%c;]|'1@ix$"Nr<؝=j (pyvx]FO1Ϫ @Hw#M S{+2]N@¹w zU>y7y}h(VU~C!@ ӼP0}pg&pZ;{':8ļ$@`O39سfwHp^s$@L@+ssR ޳4W؁uiMsUw^DBVbV6Y d=F+L.p8Ecr-'@W)}das/{x  pG@̻^ d;AxW-ͽ8H" )a 0@ 7e󹗝O%Pg8% Ū 0@>`7x}؝AEP]XOG_fD@?ħ~bW)q9u8+֧ *Ť> * U{dmBmrwQ&ZT#.~yAE-(/jiZ+My{8˛x{3q?Yg1Y+gb yct1.'8S|+Ԋ) {`0B`-p{ vigkp Ts_FdP3ļP0 rwfA'0, %jޓ"쭻̌@`)s';\ͅ_ZTuq\|+:Ҟmfԏ瞋Ĭ |pga @ŌϏ'bO0 @@̳ }J_Ae`adGGӹ^kyk,#p7j3,!b -Z&UMπ* U lXSH\)fa(8c0Sb@o{Ti>*FH@bHwɌh5;i^Tb yt @J{\ ^/z+kREn1/nJ)$ " (uRv9Dc&a7al #rD7.b^f @ %=i{}R+8!Hkca/D b}C- ] =1kE ;fZaXxߘ:@c11 -IMyl݈;&RVsė5IoZ""1M KN 0c@¾L/q)/˰k{2# .A6|49AȺxVwʗί^6VOkYkc×>U b^Om} \ e+櫌|EunZʾm yقSݐ|KLC\`ҟ_ZL ٯ^1ε-/ -_b$@v$k_̈zv_o &ܤЦI`Y-_GR`X~9gu, zj*h.9/Kfļ,. K ebkYy)-VzuZ,]o~B'*n. mL)[ۑfżǽ)cЪ%> f1L7v =`qƙD@ۤЦI`-g/KetΗsi}r_efuS^`_]g- ybH܂s+yox3he}0hvˬwiļU0.R6e1xiO<|RQE:?4:FU4r!H_o) ŬQ n&#q|JKw*M\d&wޅd=B`xn_/b^%NY]Owq٬NW_YY.&Z@k-} .7_'x2~? Z_ &87K^[ ;q|KCb}D  :oDK[݊#gk(Z8bH黴TpMs֭/b((td-3KbzN֫[@k]Z`vxz,ͽ+_?RM-ק,*b*b4~*V:eV.וydC_2x`aļ10{ x띸K?m% nV+eď7b^-<9)[QcoI6b^9{)/#~pf( X5c&7o9]Oq^#_uk+-PLGث¨ļ"@ [@&醔'Qx_t);ڍ?eV\&e y L)xS-SnhϬMǡn9ğD fDqW͖@}@J-6υҞw]>WtR$tԬyKlSyS ,%pz=վ eJYe"+߲_< ~W = xu'v{OaO]PA;|wrDM >7CqzuIy-Th3eAZ<  ybH,)M%.mz1&7^.?Kh`=ļ"iM{N۴lsQ_+ wIz͏Po( xPێgݣˤ`X fCue}S@۳fM_A׍ZG8]ڽ @aϯ K}1ᄀC< $=+@kZw}* @L2.8ۧfJ_mǧu&p_f8sys( p@G^̺\0@ӓ  SqRrXo̘U0%-YV"O@g'+RBfF O@r5j@$Z!,J╨NRޣzKͻ$r25A-[bl1BmE@̛RI A$jN<9]&&-a @`:L8 }1ᄀl! mQf$@@0˼'DfJ2^Lq9paS#p"4 @B_MD @`eLcǯw7#iVeieXW@[fJi^+Y]W  3 j:M58YdY+gXWL2kcf1o12}C- @@@߽(4D@®S#d&@^c`! Q'$PK@ƫ%+ -uQxo| Hz]uW͋[##PWWZ#@8tPZIgyuG`7] 0TP~F@^ @ (A@뀬 #5ؑ&@^"Bo1+=E xKtgyXV/eKkb )p}c~if<BGLwVVy},  x Ք @඀wPyӔ@ $ xP.#@ $ ż=n @MIwonZ[;i+|%4%^ 4o. 4-a`5KK dOtqoI.^`#@^wrVQj@o  @`jӛ|K@̳6L/ M_B @P~7j@7 @`aIo951oϺ"2"4  (!TQj@g3 @`yil3A1oZR2R4AoP%cG@̳'|53bD0/ 0MX݇,?:F[ Hz[{Ɋy ֬Y @޴qbގU7|4~ @@S1)  ^M͈XzV @-fb^RT* @ٶ\ka @~m'|BoWWSS @ Hz qjZ[fE+.:!@ T_3k~9-WR"@<*I̛VF@7(! @\yTxR#@j8Ыibަ75 @\VȹgHf @JʹQcbF6b΍ @Mnv1oϺ5 @ y˖j 8ʫ% @L^wy;Wo xV  @ yh5<oF41P1/F @g yVNQv%7a @be4hTM @f1ojk ʫ  @b^C\M+(o9X[5;1vpEM 07y $@ 8ЫFnCb޺5"(HM @@?Vݓ>FF@ S !@3<+ @gf`yU55W9 @mmSꒉy%j!@ V^t׍ZG. @N$͗0d<Tż'@ @@W1+ 8 XC"@ xn-y  @z1ϲZQ7y +s~b޶7q @E|"7 1ZP1Ml-@oy{ݬ'Y @t60ӕż'@ @@o18 R @j :f-D2Ժ^]O @Alrb0 H/#M R@km @t0E0 @e]1oZ#hl66e3n @඀]mi,Ӕ@wxbYE%@ᙫţ馹11} i)L *S*Cw. .@碌 \'x Okg;8/E[duk @uļ&MTԡΕRgNRskz˛b @`:Wd,Ւ 1ZX @@gzt')DaT|:_)q?m/sS#@ yiN]eZED~:q4X:==HHz1o͢Gya(eb ]ŝ,Y5byi|^ytϻI @K1h -VCkTshhļQZUb([Z&@aļi1016+~G_w-SVRIoe @஀/b+8bTJlq@3Cϲ#@{ 8ۧbނ.yCmIUMHG @ "#浳rn+K ӓ.rn^n'@ W_3uxB%Qw @8ЛR7)x{b rc:m(r  @֮ᅴ@(U:%M1حY1 @be?Hy õ.束=!^SS8{ѱAklM4f`y Rc81(k"rXP|Y/1- @`mzk`cef%&=l|7l2 @ྀ[dxe1o&Y񭎗d\@̛󮍦rgA_bHp% 6)寉 MGdzNk]T. @6 ˗iނ%~}{ϰӼU"6[j'j:#1oy+5Q1o h'vZf*YzJ"@rbk.& E8xM} @|,?Y @VV @HfԄ׉y͐  @ [@̳:L) )L9y&@* 8Ы1/\I @OT( gzAwy(D\ 8лyS͠ x  @% Yp47e  E@¬Ws^[fӼ-l @"1-My @A0J妽-N @ເge @ ]b 1o68  @7C.*HZ @ y܌WV9 @_I_P_&mLVUZ9&@NBگz;'@^̫F!&@wy >o^bY_ZCO5 :?pyz&K(),cR @ @DkRCu9yD. @ @`ry4-M?_wqKc5($#ٓļBȷySql)/)T @1HGD94<)}ɱ+ {4uv>[y[ @Dx{=~mnmoļ//aļ4'W @a{}Uޓo9"q 77 oD1OFO @8 eyUj1/V=͆a @?Rpl| ,)]}>d&8F|rՈ80y^ @h(pvpp6--ZX"@!prquq=G^)UE xhsmJܤЦI >2㑳cDun)K݁}WF>ļMVIMfȊyY/]!k׺._%*}vce64C9,e/ @@#_ٯ^ƉF|4;0T?ܡ^b^ki0_θxF6H<0eUE< |K^Y^DV6 @@D۳}/':*6%N&(Rs.Lo/k-PtCz &MJ7igG_[5~z#֏(w2/P+:(_(b^M<ܭ}έ7oM ^(^ybѯ\^DO )$@Z ďy)kD?,uʖ_$)PWF̫uyAo:\Øh-F̻TzLb^Om}#p)4HX^ 7-#]Vy”I%KB1  @ 獵ՉS~\Jخ1o/Kݤ @~W;}G; #!@N Z<K̛k%- @g'_okq081DߺqyD|_-> p+Cu. ]<敹`<4H @-n*1/iҋl'-a @# w O @`iܷs_ļr;w @8.z+d(.歷ˊ߹>6S @gI @ @`)1or  @ļo]!'@ / 囹"E3d @@W6 @b֥Ψ.p|c(\wr @ {闛 =Yj$ݫ CŠ @ļNк!@ @`Ibޒ+lTlS%@X@۸,O[3#@F@sWE# @yT8  @Vj 31/L) VkjjtK#^]y{l  @H4y%v% @&&(! @(0AЌ& Y @+sļr @)ARůy.w@.Rk:OD ޶v@>cEt0H @yK- Y=-q0YEhSm]Fj |n!%_k*))1/Eik2^܎.6%z\v]ļs @ Gk)5J;ywb{" ]|L]#V$@M.w4SRjrMJ_39)^#O;.v|b^s h!Lp)λ[5եa{ֿ(BubZEu!O}JIZil8TM[ -frS<7 @IļI :ܘWlDgm4x.|o @@+z1/`Q i>π*%V0 @7ļox\"N뱂@J{;J5D7 @b^}\>!3՘E 9?P# @ PC@̫w!X쮊 @`jyQڜzm:+5ӧSVecvXCC1̔k;yxK 7rr^i֍  @@wݿ?Խ&^b5߾C 5[ c'|^v.FvxۓE٭SW̛L l6 Ls( O[MԻe-S%@1*FWZ4%4P @.b^fHxmդ @b^czo @;b=z( @`!1ob8s+ܜ @ ywN7d^vu2 pS&fnOLb^z]E8ME8 @ś=k2Neżʕ\-5_{cVD; @*yɾcϤgo9 @@c11$|3w @ |AJ{b^7WOoY1(ۼno[usLbޜuo͘ W9ž75jSj}$p4C)|8`3Nb,cżϖ15+F ?i# S6UN5b^ELMhڸ[s3 p*Ǽ#%Srਟ1o~#4=E9 @yX; N#o/że첶N:tH @<YhyQd1bJżKES YReڑLP# @@6㖯'=?J1[0$˭iqӼ/yo2!R @`~y $L[2]^P}H yV/>Oc}_- @ǼsBeS(}ml R̻\.h%?=f2knbh*ɖc4\b^-*0$wYڦE$Md ot݋N x^`  @`y1J_kx&(U!@ @@]Gzhb9[LgQ V! @z~NmJLt']^ZQ h$pl?Ԉ= lSIR+ż<Y @@S9N:|棣 ݽyA|ta|]MDHy)CR5wbVKqdf<z#  @ާwrw)yM l{@EVG!@r&iadmӼ+C rsQH @7{[5 >3Ѿrmb^V5]-?}=[U,~n @ ,1R$v,}C>eyykeuGm @Z KCŞA(5Qޯ7ŋKit @@+jy&Z;[O[$>pųs# @RT|4CWZZJ8]/fZJC$Ց8\1N{,8?Ҫ* @K+2W̫X~Mm4ɺ<=kqkV @6f˩u׍ZGj5:~8?5  @@MUqufS5B1dv.~z:y~e 0@f!u@1f?:,] @fMk~ļ/yy [L|į_s=*r9{p _m$@\>VqSͦFkۤW._G*|S1>X(&HܛUQHzVζU˹1d%rx ϔA @; n[b^;V-^UirӉh)x#5*tF&?io? bg¯1Oƫ4ELnXThgo&.{v;RD( @g_g4ﵖv'u=?|G9X,] @"G7/@yg`OYfv~W$f)q @n2ޯnKv(=7N\j&UQgTEyM @B[]ż#LJZXŬn$@ &-?ceN0p+>h{h%_yA6y=/oR?x"l{~ļ27w @[6.L` 9Lj-m1v @hgM I;Wr+z 6*9Gn6k ys.)dz N'e=F{95h;u2 PAJW@75fM>me=>uKPuxzaˀq,c$/=}~#T2 ZZRz5wI-~5(j^rEyD.HCjoML#ؘM¯)kIqnJ1/J%ƍCgg !0i̻9rv|&@p(z-b^ PC @1/׳:KØIO̻. @֥ C Ǽ3TZe&z/n'`Qļj1+\sX[B+ yo^oެwp-\inϊy\vR[fC tyevGb^ُȻb^57nżU*i @ؘ}}cN̛E̛fG,h""IfpMɇqļcbH]fX @@[Ff?6$9i뷠e1m- ACs @38)aQT Y5+`yM@żV+MR($@y'U*%B,[@&[1oz ,0W;Dx"|3aA;͋P1\י ΈATQ"@MeG;J.AJv\bwAI1h.Jא  @`_{GS~?>WO 5ZEX"shżS;#ڋInR~k@ EA#)l޿LS w߬ʺD @@88#y}syW ؉yV.X㙌 [k;e[|T?Ơ_ @Z"ߛdӿZjgB\w٠#r%e}+W k xs+ @@֯GmƪƷ:$ʰB\zbw?$/gqg$Ykp &+;=-<[-wpm]}m4ora|U;Hy ;uJ Uܶ5p<ڎL @p\r1ZESZlG̻$ wAZ/u.q͈xR_:ߎ=9#@+ d<# 杤5",1| ' Hҷb_2efQc'@ļ }71ov1/ kS17ʜYȺXr1# q؋WSSRzl襯i3e I1/et:N̻o}b^N=ox{vż1z%@bt D̛d X̋\ȔGj4y @b\?}gZ{6%K7+#O>;`5쫏 @ļJ,UF{dF=_9b ̂fZA{{=|3#i!XvqNsj'wYZ @Fw6it4ͦeԯ}ts(  @y$a&Xi6_yK7Q1/o ļb:7 @b^ vm(n-yPQ.!%ZsϾ/ ż2 A2$70jEbE^[ [7E<\q (PSr{9T.f,1 @P12rۼOeSbێ+liļ>k&t/o $7ZǢfe˨է' @@*1~)_JK}|ҋE3@2VxQ ԊyT yݨuDoLTn2n7_# ũEHļD(I!T9ļY*e 7]MWyא |hY  0ަJ/=}ǿ\Ho*vY^z^=S`<5 @@LĽMwS/Y*{h F @d <"IϞբ7DNҭ\P #; Clo3Wxs<ϫeJ,V_Ї.?`]ҼI9 @Pݯ@¡zm7%=1"`@OWanV0*!@S yuQ9%3b^݅lkpEib @@ 66(x2)X UxWׯ @g[mlRB#/\pU<{d=ٔ7?詳իaOX} @ll\/yluA/8)y5s9 WƦQm yJٍj @`?5?NP@1)*j> @`Wʁ%l l&/3UX  @)A·3L|ک 57 @J;4sżq39&}](  @Y?c2{qY|ykzdژ- ?hxcu-Oo~\Ty @u`c81G4/f]\o['3'@NvIy}%*t?BGyHb?KMaM,rB+ x߇3 NG[ϋxaz @Kg.7\?7Ű<5MN-~k}1ᄀ @fyDϙΒ|6/'yD(a+bt_  @t0 @ļ^'Oܛ  @S ؛/@G @`YdCj(j @aļ00Y @ļb:7xoq @) Y F@o"" @@1 F  @*  @Vy*b< @ 8ʋ[yS b) @.\0L0z @, \=c'@! Wuo͏X}ybH @" ȷmLb,2N @$ yIL.#=80 @b^̺ @@\F{Ee*ŬQ#R @PUB CKQrM,/1a4 @ļ`1 @IK[A'qz&@#3PŘctļz'@ 0@%5$Ce @* YS xfʲ4DNPAqq1/H!  @LUjyclx @=B@k??P_A @r[}yL @hb^ @XUшy H.!iu0  @b^ ߹ @@7Qr1 @>cżf @) Y3 x<`j+ -YŠykd$D @lnVk-} @tr쾀j P,`3VLF1Z xv  @l-7o팜 @_<˂ @$Ol&1H PC⡂LE @l^b3x @uэWCQ @p7{1ż+h x= @5mԬVmд: @b{7{ @'ZvlW눭^Nӕ\̛dL @31 @ @Fļ5,M o @bB @Ơqqy3V͘  @f}A-yuR+TK]m @ 8ʛbޤ3X  @*(1/H!  @uļ:Z(@o  @-7oLS @ ])j+ż)d @ 8]31F;#I,"(oBLC[fD @[|njx1  @ļh<`m @엖\!bޒe5) @_3_!/& xIJr! @ເ +C[fSs @nbn_|ZGnx=p-yJb@ @x|{Nżڌ%X0 @ R"4WC 5] @6QWubJ4ޯ8 @O[|M @ļlks͝8b+D[) K{; 1o*?^, @ļXus&@lB$. @(ᦊ"Wn |}_K-S7 @ 8[OH[&g) @ ,I+ * p"`,I]x!@6ڧb>6S @pVy+zV @QVk@۪&K @Gy /1o⚚=k 𷀣ց[͗ @ļ lzOг @[#>y˔D @|B۰/| ׭/_YļKl xE @vD;1o*# @ yT2 @}j6S1oқ8 @vܤb&6Y  @v9y;W  @6pOż}jmD @e>7622M̭VQ!@^ym9y&Z  @^'v#R @e͝+z @3 xw{jUW R3 ͐  @3߼b}b7. @-iD < @ 8w @'6kI.Ў@MZ$@%  @fNٰ7e ܬ5 @bX @+(ry˕Ԅ/ ㍯AyjbD @! sZ֪ @-|=eΟo @QMਕ:.1+΂ 8 ^ #@^|*z% Y<qm T[ R3l- m]~UAL!=)4jb(y @_fYHmrIM3C* A @d;B @ xْS4rسf8=<eyL xF'1oތ(śoyS,_1yW `˱CQkٕ|pen971o˲_q! p) ]D@̳<x-QsOTwѯHqVTi۠żihKl,Qaxv/Wb^ׇ!C:5dՇ!U' ی4 yBpn'X| Ob1!:%Vjp#Iob/=gn!l-%L@UX` bE4^G뻒2EP'h&K̛@Z36VjX 0&gsO;p4jx_{=,V~ֹ͐ZE' qBƥzIle!ySC(A8jesnnLpwGϽ_< @C54XB@[&!+M*y6Io҂6 u@޳ 1oϺuWI+ @ y/|AE=K- @_q3yEnX lzDVfqy4 xt3~XZ )k-UbV6^{(룞7 Yj^{S\W* ʹonZ @/kZļȺQ@۱L`fO"\=cI@ƛZ3Ưz[)v}zoܟqM}p2 1oJGHkחoI/d 4ۿ!?< @@[kպg /@  @@xqjHSk3) 7'+T޸lѳEM2– @}ᄀļ27w]6 @+V5ܜļp%1Vq%@Mߤ1)ŬQ);֬Y @ܸ!.(A#9}jmfz5{7_ׇg%-[7{믆 d3^H×hyKdffqXU@[A_BPcc$1z- J!u2dż-lH8)!@Aļ 0Xus&@u[f&W3#^^q˗ L'8wpO<˃HIo ]nWTGjx!jɍd=Tżyje ޺>3g8+d|—hy޴LmYڼ#{ yMy5N UR\GbxQG!? qja$֧UA)J u@TKr]%ۑJ!@`;ۮMX̛bƻzcϧJbhD@ƛP[Sۺ&S@ҋY"@" R)$ p7" (@o-? % $v!`~fK{pZJRz C"FFx8ͳ ]#@|zbjO?W1o~Yw&@hސVqg CIo%,!k Z[kNiޚu5$ j: 0V窗><ˀu2JXN׮,W-&$mQf\C!k, @`"obꫀg=^$ӗ @ ߰!bPIb^fB,/O._'(]_[P@[Dd`1l1/  HzK`vU6ǯ2@MaGIoǪ3롇CYZHz-TISZ  x})yVּ7yT yuIkIjy~Z3 y3V͘ +Mx<ۣ y*b<$l27 @+xWB{h1/ty @2 &ϒXR@[&c͙ {~+ ŭr\O; ;Wy˗ @@W*9ļ9d x.御 @`_߫]YpyVZC]¬Nb^'h)͞ګwJ-k`yVs6q1o..n6O[f4߻2Ot;6Nm{':NXI5ͻZ+\b@`qIoWNUN E^"Gm1L"fB&-H8_~Ɋ.$@W3#$ U 'HzKgt P( W ܶDM=I  @ $W@7?e.鍫L-@0nx7ܺH!M@?pkb. /8@  T`C9Ys8f)`Xq|JZId1/ru@,X0-ߵv/,sۖbޖe7iaPes$TMs u@Οt7_E;#Izױ7x効g L˱dp  @_|+Ӧbަ7I&]*M?瑄Jl ļvZ&H!-$ MIw'3x^Q81/\I /cs6wY]KښZY@۹N C@Rao>dhC| <~E7l>9Z/0g补~J[LoHre |;nbn7Ο[<{9ƦFk4p@V58%N-y#O ;u[`@@#o[y8F\%pSiM@ Sc9e_F#tvfm[z% 捒/]j^ˤw2gVFFǷa×^J4YļY*e& >x$S{Yr:Ԯr_!bvNKX 6?P(mj.U "- 0 ļ nHzczҜ63޴s7b]A %W}n,JGe-S@̳bļF%@ীQQ~|FU1])-_bE@̛RI`)Ior2˘v.,}sh xa57ļn'@PrlgY(RPk BS.E}~kI.܎Ckj yΰ ,"jci \.ţ[ؔV.da:' TIʏZ^L- M]>'@5)ǰUVg]Փ] 3gS ֨Y u@ la-t0NjdFuO_,I I`ټ_ye*'.qo~6+hbFW^@N_k4j-&ګo|8%S}M 4eHnxKbo6L@-1vZ q6r:J xhsx yׯ3{yeׂ<㫔pş UMo bj| 2[-1%~LD4*<2Dx}Ӯ4biwAs-8ͳ, @64Oz2(k忎^; @ӼZ#@@BL t*]uByuI_2a@]TewWJtp\w @]?v]w 07Ol,P*hocvv9 @@#x E;w|6 @^ş;Ώ{lduSARvXk)p7u yw *S;[^< 4=븹Gߨ sN)~Msw7g},#`]qV׈9 PYg*j?pUisyx,!P;;/]s'@Li^ 0@-/kT<{S*8ͳ םףCfjܯ5Gv3/c'@ Ӽp%1  VV{/l IļI g @[1{WK- ]'@-|  S@̳8 @w5$ yT.$@eT8 bU@|j#&SM* H.!@01o  @@x}F(EEEP6FA=0E֩ @@ o bCļe+Y'@3y3T  L#fc.ew^  @bA< PKlx, .f~` @`+1or,RdT) @xb^ <΅^:LWV{ެ Vsp\~U/_髥xn$@b^ Um @ @'ZɿǰcL;m yn!@) @,1K؛w?s瞘ºA|6/H! q 1ĝ #;>8H 8͋^!#@@]6ϻ>z#S'%VтӼnE yu=Fc^̩M<#\fژ&ʝیnaXU@[EǼsCӼI(Hn~|gŁ*aW1oa% s3ۃ~k|(y @ @։Pqʕ-xW ]i^ * ԍs!WM-V-ĢN; P& 敹S L)Ǫ IOZ(n:* @g= @`/fz7U,yA5G dx @ྀwP L@қ`kD @ী6-l-ί^e-z^sSwc{Xo{uk'1oy˔D @`zgm:>=y}Ft'@nbn7_ @ټ lz @& Vq%@ @`q1o @ yU|  @X\@[G @nbn7_ @/ @ [͗ @ļ lz @& Vq%@ @`q1o @ yU|  @X\@[G @nbn7_ @/ @ [͗ @ļ lz @& Vq%@ @`q1o @ ?Rlg-O*IENDB`n>]GI궙 :ǧPNG  IHDR4sRGB pHYs+7+7EIDATx^k60ve"H\IL#qy&H|QjX< bkI6B| @ @ @fL$!@ @ @- s @ @ @@[2mh @ @ @@Z @ @ @dj @ @ @̵>@ @ @m \!@ @ @k} @ @n=DC @ @2 @ @% sV{ @ @d @ @hK@溭  @ @\ @ @ Жu[! @ @ @ @ @-C4 @ @ s @ @ @@[2mh @ @ @@Z @ @ @@oZ\?DN @ @>>Ϛ @ @JKúL1JKs5m"\X,T]!Gac ӧ]yhQCjXh#Q%#-ROȏ*-V:]e{ǨjVms+ #O;Kˏgzؙ}d%]I '-Yi|&ihSܬeZ/0ʣ+x]^/!  @.'s-]rFw4oezwؕrFjXZa*җGg0Q2ף;r;L6W;Vvig -gX*wLI~)tɋ⣢\D*T%WYQ?{?`gy٬CTU><}۷L>"<5-F W̵+ oyT¨2176CLb.b^=Q4l%ũtKWq]aW3&7ssUZ^p|-fVu|ofA1  @W{6 PE@ B \O5w9ˏa0u8|L痓er }ݯ'  @}qJfu H  @@a8vxWyi\k0 dl @*\WQP @q4;!pLb533nFԑ.~R;Ȩa-L @2FCW/!Jl!jv*kyW*7GG+5`9G Eϣ )Xkv*tsck I_ތdtT`Alq9֣}*g]0 @(Gð\+Q@F7ozW:@LI09x^*H o^  @+~ +w|[!s=Q1v@Sp9ol uz-Ǐx!1㮨[ή޸p*FGo:Hs?A @ F=]C+%q& ?( m @ϛ-CɳMePH㲝>`H'tozuYXGMɣQ変\cQmV9|mnh AlXhVP;,oY/ׯ_:k{ wP9!@8(04qJ$ei2H*XleN2q%i3?-ϟ?gv2ҖR&a{?ܴ▆֦^]WW>fˉ+b)*! ڬJ9bGqfv] l%ĵrףbNc Ld udz* @3ӁU(2M&4$NhA[RLi)pA91qXR6xSMc2כ8C`4Ә3#3{$Ք @@{o +o߾e߬,iOk4\w]ngVaYeFLag>xvf yv11ڍX8 @xWzt](&F+N,ÙaF7Y3G2mpn;;B†YFA*'kWP4q:Oqx%?{ zfҗNgPkը-6ΙY WP̓\-sn[)U Л۷{mѠ!.-5g ^;Ró-ɔr?rXNL`zB,gS&^%pp;ԫz @Go'C Pij9"oZUB UD @ (sDM*mYoV @#O1 V9u  @#;NՔ $C$@ p@똳o8I` 'mWe5U @q\o7Y2q=U @ 8 * xTSQ @^hbȊ}HQ @ @+uBܬE ПBkS5"@!yz:"[ں)9Sa @hM FZk! @Af~Pc3{O. @g53\)+WjV @ ПumFM d|mކ  @ @^:\J/-ZWU>}jSC @\v JVٟQҘ],J @-aԲ0jOIi\tj Q[Ty @>T]+ @} Mb?IՀ @c߾|,?oP?[BǏ΅/,  @@8̲Ğ:^93i^xxHq#ׯ_ꙫ'@ KcC ;W*Ag !wՎ.Wü]&@x^:b#@{7gyW wH]i"и7ejGxCNhE`4RVFzs @2W}ՎL @. s}{~v2{eU  @6dlQ @g Y%@ @@=zJ"@+ffWi @ pJ'@@^3ノU @\/ s}- @QO>I NX @ @~?~?["`T1s0[_!{/ޒ8}ՂD_ @ Й[2צ  @4.j_  @zכ" @[2ףyҁ @\ ԚB @@o\ALPT @ @@@뜷b :UxUIh @N2"S @ zDm @F=ds% @`U "2ፁh]dBYb/Qe @~ś?#ǕGחr xl`õ1aAMPv׸|ΕsMDN@ op+V!@Xxh0#GZ]#!J`t<:̾Xٽ5._ppcm]isH(A @O\T @iqgǩ| @dob$@ PY@2 @&2:sQ#@7 l(fu'@"u @~Us, @e?}[: ,IƂ|je @ @^~3V'0wCnx^Z2F* @g (s}6  f{-3;o~C+# @^{m ͭ$U\C EaJmi @CkA7 d"sN @kdqQ- @>}}cՙ@UTT @@:J!@)mKt٬*Ex[P @ @M@溷U @ @<]@-(~ @ @&I:Ls[ -b ʂ @x@?po! @ @ @@'۪'@W߿z*F @ ޼Y Ӊ @ tb @R/_;z׊v& Ї@١l>Ԣ3{xYcx1\*( @?gGQ9Ո @ @i rQ  @ @xWz4N𙸺J#"0_ @3\O}FP&h\ӧOi]S5XI@溧T @@]eÐ6EE$ [}b  @ p@?ᰬ-C4.५Hx @(xWڰ^b- Ь#6 @ W]:'@$2צ{P{  @+\Wg @ @ @KgMeT) P,˗ϟ?nE @hGvEB @ @6[H~( ЁkQ @ ` 7 |QO p@m @;~g5 @doo @U @ @~X  @ @ \w*HC}O>* @ @2;,Nsxïw&xCN @dkS5"@@Mfaazsy  @|'@4'TU /FM/3L8[iO}~jF pG @?6MՈ pNTԘ @ pK3M'e.A @?OaU( @xi= @rCWͩ2 @&^n-ETP[߿7-'@8$̵{C @ap9 @l 4smvװx@,|♱c|61M%P @c^~l{ 5 ]v m rw'@!qb&@Lw- @" sVO\/ s}- 5݀&߻& @/~yP}('h Шk @ @f}R / s~ @)̵OʴEE @ @ ̵'@ @ xKFg @hM@溵~RM] |q* @d`%@dXB%@ @M \7!@ @ @\ @ @ И1׍5p @caO>+ @ p `xT#I @ @߾|ǏZ|Yъ* @{pP kjt1z q,&Kׯ/wEea @ <~uȤ߰\x bMw] u'@([|%  @^.O  @ @ ПumF D2JGE @ @E2ElV"@@an̵|wB @ @E2A  P~: @ @dwqY @ @N> @ @ @`r @"Oi)q @zߖ ӳE<Kvw pu]J @" s' ӧ@G:ꫯly_Ij @5ZD<x@H|d: @hF@溙 @c! %L @ޛvn+tNp<Xx@B'lЄB$@<\ཙ7  pl>B:DqE @=ߧ6h""@x{3׾+z.k\  pk{V  @oxoM @vl&CӢ @E2ElV"@ZI s! @n[  ОKkm\"n؜`@ ,gh  0ć5[5[[^  @hW@ݶ]{%o= ؏zjMu!@ sB+m T-$Tv ƞGWS7ÕmWC:6Z,L f7wu'@PͥR6S2O$omv̺g&ci![<0KWd647)Zl9N%dF5-\,gR:tp=8sb>t -~p?:lY @3Y.rGr`a6$-搷rrF\2h#TP85,8 Y?N:A9Ca&qip7cc4'i)O9Lk=z0l*vմQr9ِ_<> ?ؗvu  @Yu=% oPyƜDJ<ʹ\h[i430s<ʆ37_SNΈrFd0%t}bes7mv ؛A>e܄M@m- @\ͫF7'p%Eg;[tP4Aͯ*9ạAw47N컫'nz,.0'9 `}C{K %NjDzCq2pl&zk!l7ciH/ˋG`pҒzfe(i0e-nE=T,VޤJ0Zy2:G>?_p+̦hLp^?freyn(\UNslF#tM%+rFŒOm9#K t"vT:뫸7FA.urRo+3G,s7If iԊJ準]K~s2כD @7^)d=br0 )(OfL)rieg_B 3J ,Mkڴ͡sL]%9/[IKiT\`:|fO:5-s@)@]/g ;fll8"Czzd0Z"3œ_zP $1QbuboT۵\wЈCN؏ ~bknfi[-d:|!p )0,?8/jrbX)-s4{  @ 2׳c.$@̵rl]a dH󰧌[zgL?*K딫2[Y??5aoHc`ډc*.̎%J @Y=dcp5|hd(Z.޲O32[yxZmkŷ6͢j\7L/E]tQ&w3xZe樸t;t Ӵp$)s=;N6\􇦖"t>|0ݐ]:o-Üe>3Pq7*|W)\%J"mg T;+nN2ņC--\98XyKq:sim]lFN%Z97ew(x-Ozܟvݜ}5ZE L==RShןs+Ӵݜr:θި͑W+s$ 0gF889%pR ިld+_~=R-m}YlqMw楁 [8xZlt۸4aAv냀Oz}7W7wix3l̊+|iʲC4WH]Nߒ^voq?J(6aǛM?+Kc9̕0s+:T eNF$nr:IKCk qw/~\M|@ŃyűQbf* me -%RØ3Li+۷87 xeeޖ+=Dˍߒ>.J!,%S)XZgSƴnӻxaҎ\,=uuk7ѕ{2L-*||`l*>1PG*GN-{F3X ե2LT[psl cz*dx:"- X33kLh%BG7  ТK[e12qe|(s+rʛUӘ7㙮aɼ*;hԭ]Y'yZMv?WCQ@lUV$>BN"+#O@3N+6q,`236O3I?шTI5`XN?^ڒs>RA`+)eGԈk3z F$nB*gnn8>SV2{[bt9 :.+0:,Stt'-9j^S,lgsםfzvgX)]L1$Č$w쎛9!@' l*mQGzu_ b~g&$\ֺt~<"3/8:!n:M7qXC}榪 P~{}t'  @ו?3?F7FQ&qZa+ؽqٻp0CBkx9rvЈa Eb ؂2Sx1+(92:;qVl~ +av_wKURx4fؿ b5 zVs}2 d 43n%b 8gzf ~z KU3(-mpT,K` dصݥٕ[f.<{ \7fQ""1.ӌp~9Ud PC1W+mP`<GO   @@ 7^ggρ89v%T1ױFm٥w1hkܻ,3=,\>"gϒc !ʄ0T suÎ߯’ir7 5Ku+ Ǖ-} DӯU67 @@|Vƹfmv @O^B3^# 8vtgY#F/K-1ا@3ܺg[X>ԊXp;= NJ0nwE&0^YЄqhW)zzw_ӭft 9yŰ?$ ӽ{xKd|^o_~J8Ԇ=}. p@8^.gC-dW 7& .01]Aff*3Ԭt lFOANq2kA߫ʨ.5ҽ£μ)kW9h^q$tHٮw=P @KCN4;lObX BqU@8>:2vx3UeMcC{u{Ow{e,dWCm`eC`%wL kF_~<2IߪP :=\?Jz3\s'@w ̛{yV^KڋiyL4^;[vͲ9ZRVئ@foٔly[Gl ,}zs' ”#n[or @J:\46 Z,ji b{ys'6 +2M5`$Mʹu'X  @` .m=ԝ& @|Z_Нل'!84!.sP޽I[C @jS  PG:J!z⃉'/=24*\-0{ 4AOHba P Ax_4 邘BEW>ZwqɛG˙<X%Pql.P%@'bfSOp#6*>c/0lJ]UVm6X8K@,Y$o#3.L`baLtF|f3d  @mjⲩNs*f?A!g`z$ݜ6fӺ7['@ CwP=pTm?Vuk-"uo{}1)$z~)Wȗ-;KOՃ.f/Eek˓nUt]n#guxQJ""@>^7_I^;K]Ղ.&el$oS$ soZ`%mK/Dg5yu< ,Hʻ)*) K 8N\id \?D\K`=mȝ' ( C֣Ou\~kUgL#`{:T3[~qmܖ P,0:Gdn8Y @Fdia\'tm1e["@ڟ8%+t/`kMY{Y]볅ߜPN#uhgnl_JsXywPn[ٸ=J`mw&nyF  KU @ \ʫp5^,rzDf "BnZ6?U`hdOmNq @@Y/ Q7) HT?C]RAZK۳-1p"k08?~8vZb1FB$WŦ4F:? {tm4.>Gz/'tFrkEuriɱuci9%xxs_Sdq`[Z}T^rR5Vh'uw>KLln<\ 3vZFV@dzSίn\ٚZuJ+g\մˉEc4s!UNrzBN9{ڥ *tok1**X\Z\w ceԬe~ޯnq[/gC΃r[ᱴ]tZ4nk +h׮T 8rN fl˙-{0 Ҧ]X,3s=k.f@<S"O_GX)`:-r9\*'gݩos'.Gyf񅋹*SH -sd Mgo3`C i$PZC$@뉞^C8$msQk6s:"\δpa:|^7/mg\lTNj}glpfس-ws^23כD1.f.|{. )7KZf! @Fi˜~j!W^Yj,3ٵV>G;촞 MSY /.|v0M8r7YK|1e۾x @S}X*[}f PCy}ᑀ]nXxEҫ~oH~t s/=7*+<]: `$V_ P,b:+ @$g܏x{R?y?L+>2I-*,ZQuvSQTe5uVҎ; ?+YJ9ӏLB4Kiw>s?vm:t7cË b*mV--Ia *'4-َr[^yO'Ic)ho9C+n.vqd>{$'*_zO˙^Β+fF2fQ5ma7NKn?L),~ϒolI-$bss#˜&㉒LAfΛOt[5''43H"^m6ȇeNFvLtMf63kQUc[jD;R`ٺm6]cu7,IJy_#ui˼N%I9ۦiovtk V;;+#GaK®֨z 16a<U:M|rY]GKKʎevs&Z~i旳6-g_ ϒ+fFٔku͢ikTϟ?}diK'J۹:X\Hp7F2s2Ž/&+&7y^{Dv^[\Zp4Wz=RVX̤o橧&j%Q!U9U]HMs"}@7XN:xϡ#@yjtQ׷WuynimK!o8It1ǁ{;scK'&,99i/Pz53F3T8#qz2q͙ wi[sDXrx'0إڍdf3יƲ@~zt , v]\O;2ף'Kgd+bvYT5c4W>3}T9^uFQ0Çẳǖ̷F,eo6N(s%̬4's]N]qW*aLf?=uHd(;ݛKneBٳvFZig/Z篕&6TlL:{lʍ t!\] g؁\cQI@27 {7~y}YOS9YaCkVyo9QH9a?L>'s`a]İ'AN^~Gzî5]𦑤GEMCMA9gG뮪Jk eCcazZ.[AηjIHB[+m$\^\܄@739Ëp)þ77ӿ]yMaϟ?o>{8~j4zQ0"s]L7{pb3Vݥ꽁]\/ZTlC6<Цht~ *o߾)G_n"8lY 4ၣw1fٳx[V L1cFCw\#p|hU*ks}1x#LA ô_%vve ZZ>{n:zI+oW*g> |disi9@ʉA&)NxL%\ e},Z.M0s;3b:Z!@@6UK+8jMps ̜(h]gau8JF2~QN%>J-CeKI?^9=`! *74ڹٵZChAZhbI$x @ӯ۶99b/߇k̢o6'R-n73 Ch񿭃Uc Uf4GIHR+ 2v:]yw~1jx"(󺋒 [ ?K[ѵ~&LݣOI{ \XUgM+A''_rM?ݻS)Th">wmY-o~b1!&lsn%sN]wᓓ**Jl !@@a Gt..YM;t-{_DtmٳʦҚ@ΘCZk7dzivwF 0of M[} H@v @X `R$>xWT;#lqNYJv:\2h @P`68; /S[r,sK6ړ@kOWzBpR~t (aӫ#d|K s)mg֜K({IֱhD`4vkf*3!L?ggym]h52GdYTK^  @=ԣ |g5zek J[ 5@Yk @ P_`v-退aЕ>7;-{\~>-5H@"h!@ @#?՜!t=mfgV_` \74#@Sf@~jmMw 8O됤.m6}viw! 'Yf:@U5#w[%@hF`sQӌq4ft0z8z~@ %Ϥw6PַMH;.k* \-0;$ nW7+jͦv2ׯ;U\91 p]ϲђP~w\O@o򪽵x5pPaugh#ڍz̀c#JnBd \7D$@羟Vc @Z`%E6p ̎/ٛnSŷ^b'@ @@Ŵl^ug?^`*{djJgʾ(>!@ PI`}ⅲY+G31F)lݟ?#_Y!RuB Ьg,!LCz\/ lC2ϰUZ TMsׯ_So%6C}w {ٳx[VE O7y/{7 n!zl1ɽW801LIQ|*{{S  ?xqH? %0OsJ R4X3ԥe"\L]p,ޖoXza[a_ꖶcg }B-n\@  @% q-.VrseSᕈ.=UlmZOf-$ so @@}ՏO p7 <^`=m=UxiҬfSքo]]T^ @NƋ[)[I]h]?4͙?| @ )0;Uȩ߸[)$G و/չI[ak*xsJz}  @ @@M ,ǽ6z%GwNv+Y'<:gv  Ѝ7u" @/q #DyIVsi} i* t.v"&pµ @: KkC:U~N:aok)-( bǽQ uj7߿8R~쮿{($u~v#1X~uo1z!捪O*bUS .8~tHoVmH~6g%N#̇V/u{NA H44CN6N4k1$ 5])*3y)ڥ6m(ܝCߔ +i: AПw {w  P]uFi´ aҩF%2ll{[q,`O.&srs t+?긙rEAB;z:۷o2oll:7$J0gY%0 @eQdߖxl=d:)YA:h_`f !Z-BrpbWCY>6-MأggWd} y K֥P )s̵AmDG@96ڴ*!\WW aFUmtS ]M9tWin_w$~p4yeZ6g N;_L^0}sҘ؝6K,gq:efQ=.E%a2}N9S{1 ޣ ެףGEO)S8\=ЍԑmOzRzu]B؛ݓ?-mosJʞq<2aLCtT\/M3Jv:sa5csّKpdz2 U/,u {* pDʭc&h|]Hx-0=lT9m=efǮb~Pt0sf(=W9aBB:c?M9(<(ّKP0|(* `dIYq6'\ZZxi͡YQ)- L+8x )XeMii"IX2UN[bE۴먻.{=n<ޣ:ܝ-S~׈7gݰpQj5%s[X͕.=׿ǃ|w*EX1yeĴ`?~([qbo 8l$}h2W_xԗ#NJsF+%FO/vſwyR:bX".] o}Xͫكpd׊qIrIӐV/ۄ6yM+?;n?hf 5z߫mB%@{[hb0[yJ&@`u*=Wf/VwN}3*:Mĵwӹd4rB^pxl!iҏQszej 8֒l2+G]X׾뇒pə\?s F!Gw!&oF Uu* X lQQECSwΖ 'J99-w=ѕJ,S+NYxN {zmțWven?z뿲 %xvDL|պٵʞV6[ψd;^lۉ\$S''+S͛`A(~c޼ jӂ6Nh+s+KDSvX_in(sS9eKKNGEeZ9ѕfUs=̬liRݗ2K=*IgLEm93cm;lMK*h=3zTf9mfu ﻎɮv>jtZ,uvDL|QhZMcs˩>zx}s`M8t afoz&qE,~:L.oke!T2Ia{_yDɶDH@."]ߠG",Au$N P]' ZyW\C7qWí_6LWR{VH>f= x5[l:2+Rq3CeXQ.~*ߋ ܫ:um$B& s}}{.AOJwk7؞N &siۮs|wVF;yUQQ |c0gPjYtdwΕlr|:1lQqݜy$Rj{Z/ק9d~!s]ܾV~z SucVcnE|"fzOXlXJmMkW9Rp^ xWiI22Uδ/Gۢn~% jdž687.'؍.3KF^rb{?x-@Y:ކ}vtnZ+q:~d9$vx(!]g.d+c~)Ѯx^v .læYIA]gcw^\\Wm_uE^z!8XO8e%F24hxx?%XZ%Z]n̵#5-rVn\oNb  @{Mx]:ԍ9/Cg(] @0Jv n7ѝaz(˿M vi#^4wo7Q.Ysug l3Qxj:pvupmxK K. 䊃T2±v4.<οZpĸ pƆdPU&(?b:ϯ2oq fdV3T0=ݱgS9OCt+?*!޹ſ,.'~JOn[WrFZ f64307sbRSx`u\˜’URp@ckw 9at ]ūq/S/,8ͭ8 8=d+)vͿ[ &~SCx 9RN,sXjm NCZ#X:{2ۨ%vQz,uῒ\8犱"'^|tigVkY9b  ЎIK6|4H26]]*0JX#QeV?sbaOs/M A`q] Iz /au-Z}ߖ-\ǏYkX멷oٓɿ_X_Y Ө̵ņGҊq-', __qTਜd{lF5Mq%p_+ xQ$]ӭwῒ/shmȉG#n.KP/1 z*+Z ̶ޡ~}*ƙ,K6 wݻ?^lN:03NMI<; 1qHsbqN*KiLؚyǢ{GC9:HR_=$ݿr9~-tq/Bİ.\:r9  @e'Y„V-,]9U/&ʗê$ןg 9EMⳇUms߱]-5JǼjLRv>n,9-mŜc9^qﻘØof?"w-?&{s>VJ.̻9z_ģգi|-K +2׺TFcu5 އ{oB +Pyfr|Xq=W>-mŜJr xΊ#l~4Gb29t|<4oOdW+w<]w-shmȉGG Rq%[|ޱʺ9_! @!I=T蓼_\}EhW/X ý~eF_^kM?Ǻysch7sb:^/9fXf7xa0W=y5Eh^3KB$4Af~a(ߐe3'T;B9Īy̪D5MSNZk؝f?/T,-?jd*0G)3}\*mWH+d؛fJ}5JY~] s}6i{3ԴNÈ'eo9o u#S٣CSţ\|mYʩV,ZN\9Y}x$RΨ6[-CEwZ-w9RUWd/^-,sY2EV6X-4VU6No sS5MsHY(0\gRXruq)m6O7zSN]ɞ[j=S44SrʙNӎviQY 2[Jv>[Bڻ?H\7l3,E\gW{ӟwz̙==4U8- 5s,!iT37}Ao.xvh8ʝư3NQ{K.|EÞC`9})eL0ޚYΒ3vgOZ9+ \:-jTsX,3<)g9}eNEf_*'n1S6PuפD?JU’ag<>\g0 ,>imcuyj-7wIsa] o/GIsµqrF\B7_qmeF9o~ƊF-huAOYeLh=촗>>9d7Q$3h=͠ΝTTT0Μ\wK6(PpyY9<ą%W% Ah9f~z+ +bׄ-> \7U" P!9SFRuB^%UNe.h]D␨L0we!%pU~{LX߿9aQqaO-L*TtMkeϫW^y[bCxŸG0lcӖjmb?iP>ވ5(=`xpґ'E% Rg `ؽ  @Fj|FRםo.v[Vņ3>|w%g잩^?ôlJ{xG7V\dthu=u?:p\?r4 ħ8p`(1V< *8r~c' 6ppCV"]8vJ9J}pt/G7WJlth-xҏYot $@v H]8-ǫ$RG >,mݱV_6{2m@|= \ԚB\8axF=及[-g,G4 `Z`]Ӯ88Mpr0C;NEsb9Sx;Vb6K)wRoQ78R`|p|wmKݦ>Y \x?^d ?>10轝I  @/*9֚ n \zKvtLKO [G\w)1C*8i)pLbJ|6s$3.cilW֊\_l+hT`z9!e7mTAX @# ZNsoo[~7Kkw7{tC<>?a[l2{;]Ԗ'6Xϟ?~K??n8bV溚xӂ1q<W rFӎ_4^+ ! F%O#=鸜XJrZ˭˴9<\?MjKp -k6V puZ뽌k{_~6M|o:M?_MwVUwm6~V{S{8sot9z0y> %@ \Wᔹ˸4:&/Nl96\~5k1[~] Bň-2Wo-sa̞4(5hxHnGfgyۜmin0'UlwWW @U\W 2.N*3\ON7)*'YNf|lZA v]WyJ&V 4rxYzTcu#qMi5  p@aBp>]tO\l6C* 밤p>Vf׽f +Oעo*-tPHOy{ kPh]EYx*eird֍@ؑK]tIQdXJԮ-Z!@@+okCz4mHk S7 _@z̵IjL^cy6?1C97VEŘIo IÇ[LQM/S>3%>7mX3jX%xESX.=Hvl6ԽN[L~ZR溩 X|r 1:VҥCӍ-8xu.0\glB&јًgCr^g {F80nEUfdo~vʉk ޳HdY ix2;: ^@^- @1QmY\4sv.vUFUqbGk s{oԒg B'@@W%>6>~&~1ߏ4Lj׊{C Ke @F_hL''G_h;m|w;s7jzHz~CK*7ֿ3Z+oӼ5n׷:M 8G[~xf q,<$oU_ Ј=k#M# v@c@Q +cz6W廇塞7} @b;?w>CUt) se.MF ^wpll 1[w @2* !K  @Yٯ"P&n<,2כ":0=z_2 6yHE @!f yHC W \goK`6y4uz_ΗǾԆ @TA;djMS%o~Po鳍B!t @ % s%  @J:2aSf׈] @D<ם4;!svVK!2H02|-F# @v½U# @R)=8~1+}is @8G@W @8!Kb [Z#@ @O-?'@' |1$K?~?{U02,9O3Xׯ|qTO\^COl1;FfHī!)AσKGdY u?T LLK 2 @>}2Ǚ7/ޝݎ^י#@K#:HϽ}K{,Ob5I`zW!e5.F47V|=vTZ(yv+CcK挭3,m^. @`@xNU7w1 oxZH`t`rgNFB#=p9:3!JCѮo1nh^.rP @q2׵l$£l\7p Hx%PQ@" p@3V=]*aiah9}J9t6F  Й@8‡*%Z2h/Yeo&q1/$KՔ~yxUe_*K@ U, .ggO uhQ$fG  ХFyAC-%\_Id_Ъdu Jn+j(L3GfnhXZVLƬ_8볍ohA@J+\Wa.Jsm5d+Ud0*7 fF ]\9waTqaiŜ1L77[_ y_6/*l!U+dd*2u]5:6O.m + s} @4s҈኶N鍕2b8.{fR 4ͣ9=rfH A_sIGz7 Ъ<9ɵV+t[\ b # jyZT>[lH1e\g Y EԂ*fӸ̑ixx\Fm1s=0R<[Ngz5K oXz+|4;_`ڹ?R s ls.8\J=]@tb @\$ތQ^ʀ3׳d/C܈`E# s]- L6 :y[ xq~Pc \CaaFAbgsO @ZXi,P1nA/1F*W \A@溇V<Q:hiB< sih B@準rA֦Ӳ@A0C zqliU. @%ÏXVyv8z   & @@K<~! sf$ @ @7,g}g \l\%?\Wmv^-?TOp!/P@FU%lN @-=*_9 py(6'g6d;hDU @졡 @h'_Uf26 @ @54K=C' ˗7xBϟ?~H[ ~:4^# Љ_5|AH+@{*#.$SO!w>c>x)J @adϟoJoðiG}: Ђ@x{428,*_=&W(§^^ '=EZV)i{zJ'3?/6CN \B$PE`^bO+oS'q QN9i收YHl9IrrmPZmMIwӐj^NOfQ}ifii 3Ys?RRnwyt67ME's/~y)cJ§4s=:uX={wɽ.k*5*2U;(DV#_ڢr \<(m&zJz*z&!)''+)8$l<9̶4s+ 2eiHKKԗf6PrHƖJal]Y-9M5f32 vͦ@E}7AQ.:h3P1dh')s]5L|dlϳ  @@TJ!p5rؕi=Er^ɧ(..ܺ_cUw fFPi·o2 -v?NQ8 @@V9/JX}ER <Ήo9 @@;X"NfB15+捼kmg ڇSU: $Pk^㤡4NǏciGJ Ͼ1 bQxX%2vDȻڍӲR9˸H+{łVqwجݰ3/W'\JM<׷0 ̔W7V`84BdZ+ЅM/biGJyW?5A>v=|vG޵wsW75 tv9se\x݂aîtxTO}`  PMbazu(bWI2Y뙯Ͷo$ZA<0]PZrxMFqU۪ҩcŧ~U+2YΕPBW2ͶŁtQ#2GK ._^(O.';G/ީcÃ#89 ~Ol٧/ejW$lvY/*kbʪdeu,z.o#'h\%:uǍjHMы31w@hNk8oR)'3&bK_Lfk8n6]m4\EZ1]+I>{<0[HM#0({p,J`Y`<Fug̘)w1[H}"mҬ4-9r23 iv{pʗiKO-2Ltf57Jͷނ (ɬ].YYBRl͝eW~9g4RCfשr3[HB ްJ/IVwQ^U}gh  0/HϸQ`ϟ?$B_?(\vGK/g*0WSzRe>DWӨ2K7N1VG-4⨴MX7ˉͤUl9uNB9!e.@Vvϕ2ksgɬRόU3֙J1&7Gw."Y낎!sfG;Pv&.  ̔W-+ ̚{&ڹk x@Y._ƃ|Hs\ΚEZg Z:<ŵ^y^ߞ$nsu @>>M\r _E*pmS:~<`z?Pp6 uÆr^w'WzoT+ ؅6j]mmyj4}1h/(ts]%~x5]{~Pc 2:Ǎ274eÆ|ԫ@[U|81Ǘ&ts\%j1,'UjyŹkbdV9}<9ʜh~]9~t:.h.>YfTnJɱ;ΔT:A;^LU5^$ sn2 PA`zf^_zv, 8ŰGst,jB+ळWs_N`א²%8A'*jU )p|KƋsL7don'@INUH`4!] Cx@  @Z%f )QamwUhB`:[#|AØ-Uf/]r,M`=_JQ%Ēgc޴失 9Y*gOˆ%w٦ϑ=-!^%۷oX2OoA @WNzƬ@}HPLxC8r9 @?c #|A.V\e)s-/v9]a\Fƅ39Ǽʎ ~RyXfAHտlɑ4#bUĆ>CUA`C q99-?vc49 a/0xҰ낆3Uf;L` S^Þ5ՅW LO.:đ%wb8շZ,*\WaXibE^E"_> Ղ-0:O3׳9قW̖rüm'󕮂L(rRGrir,$ ^pw2U+01E$`X[Mr1;;_/gVrü(\ Sɗ-Q \  @.]\+ KԒRuF8UaTg.s-f0Sn:?K^CY \j#)ZU1 B*y* dz-, $?kF=(W+֚6b*'6}ˏ[ @uMue̶E sڦWqzXp[=392|~&gT-߿ **U$dÊf*F i=g %C:' @^֒R1UBTSyUKX2swJJ&mΣ=THa*vEc3fjN䂨f3w˯ @@@mv)ZU1uF8UaTg.s->8\a3i7:~]*/ͤ<͟P9-Fdk)ZUʑ¨ 8le^%@T{3s*̎)zXQExu%Y* !p橼*^%@@̮^+]1k 9  @G  @^d{mY"@g; Ii!%8k=㼴z`7қ%~ @@kXb|/6^PtnpQY+x5i}pQ֫ Bl~*uy6x\:b#@@'+IP9Nj @dk5H2?8;}ozʚִXJ>v \{aW pzzsg b*=*4eX殙ab{)  ˄,yNN|ZbX io߾cZd~P2j, @aKj^hesvmüKZS*6UH[JPHzQuŐҰs4գC@ZH2:X+J8I6뷙  @#ސuo!a̵Im['0?X @quz%8ҍA\q}ݰuR p@4 Hᗟ<|of>^%@~z  gg W{VY c4qtNH;il2!TT,9bc(>[Xv sen_#@{lI>#WT6 @d4xmUVˊ('G9|zs]LgEg\2ep&@@C+8 `YI[jP3 ^&0=A{ `AWa<}17$es2.9sn*/͆.  X "]3] ']\k\C}/%*9:gNꥷh,UJa @`@w0^?CS:MxؕA#gZ*R@fRK1gW6't3V%_Ւ- ,ΘwWYe @>F)Wױe͚3u*UPZRs&q"bEu-ɧ#s|@)|<֕ ~e Զ{gWV zc);=~ү+cev9x6̳j_)*}2'ſTHY~udz>43")kj_fJ bٹ3GI Ӯr(  @Y*Ya|Շ Òq0K!\W !PW@溮sK~n=# 2z%f~ipÅQ%82R:VNTC $ o/V =y+z*@*"sA#^/ 7;C\^`5ٰٿ-~^xcz2zD༜u#^@ʀp!td@LmstZt_¯_ xheϳUr}ʝfRKӮMY*3xXQ+Ok4 @jf 9NS. Yhl7w2'{]]  \|ni2m7F~z*2o]ye~WϜ H @>xKq}5 6Õgw_ƫ\|%L`]OiA(Y279fF`3O\Oc<_n_`}o_ @LLŖ.dGUiC7 ߳L+S8-*6. s}{4u# !,,& 8 p$|d![8K@溊zSe,dN8z2-jݸu tYxlK6DKCީ- A`p[/F[Ye @Hc(eI/=X7[;! sf$8#g"N7 ~J'@ @@q6!w \Nh;Cm8;:'TniYe @ P,লe;hU3oxEUMa9y4=IeLWB&@#0  @bm@Y`CʕR9yYWj" @,xs<x_ x7q֞ͼO1 @/ s]ThVpٴu]d3ݬ @ @UG"s}{ AIoRqi_~{nŔN @+ so۪N 2ӜuV'C:F8A^ @ @dϒU.nXJ:=VRiRi:T*On @ @?Mk$s]LgLutM>S;iQhgQ @ @ \?^n/#0!dzy4m's°  @ @= @w^!difcb{}V A @t! sE3/X cL:j$c/bN @n-d4nجM(?k知]hE۶bhc>KNaP{?R? 0/0W. VBMyJ&Ц)f]18Jp \\SJN:`KȧS|1<ӻXՖ.e :SW 'Tp N=ȍ\߈o(Xb(qeEb4m @ @=Z%@R\:< %ƻ  @NrMdY@e,E`,)Őwb\]Z"@5Ċز CZn f7 F9"LJ|_,L/ s^F :`UYBfiw  @6\ oY\n`W4P:Nl=3zstX1sV뼠,EZu쫛_  @2ח?z/$/e|ׯ_cCV-Êa[[ @c<U\ՔgL/Yg8$M0Y3DI\" 0ȹ^=]Ou?|{xTJ#FB8p͑9Ş4Pf@Mc}(  @儋⎠ɱoO*Hxx|dKw /l ]tjk,dn+bQQeN@O)P)-%Mr;txM^IGtNW-;+ϥSQk*-46Uw Zm펠rfo*9]irz)Qڱ8Xt˓\7SGQ9C]~!q̐Ҹau׋:H g~/ ڴ<oڮSZg{>CμI/ergJĿWiŗ)PTs|qxWF81ať FEhC @@*w$3RR!cqV9Vvoff^d{mz\oY!냍RWb5C3_iav 9?XRwvDJVT/I3RO}WK>7\W準drO^׊\9) sv~m?+3̐Qqd(8La9ӌpUqr=I8g⤺ B-ꡳU 0%dkIV,'jTDQl $u^[zM iE\o;[0wlcwY:}~} pu-_ZgnggHdި{4j׊gʮS<RϠ:V|O XPl0E [YB9e޽gBdj[h+r.8U/6z2zէsd6l̮2,F* s]dkITN\ݕ ٯs+1;9/*N YIcbF1^;^VB,``J_ueCwaf~j}g=v򾗗}\ىA\Bv9#2+vWoWN؛醖J8Kͫͪ !d7,@- s]dkITN=~|Rxb>9g+)sf[bUNCyPy%xS方% Vάu&Ů+sMHSJwvf9lAt($󅝸4db }mG 8򔅩% 0vgQZgk3suav(t2!p @NO準rxhbLi뗴ky\y+ }}l 8ͭ#s]KR9 **h׷oӶ8 @2Rq"@ d /欥~%@x@/}a!! JැB*ӑϟ?1ǿoC ;ُ+F;f+ @kV.ȯ L1Ϟ*. @1IXG`uv vL{N? @' ZWR@fU)\!>}tŖl d?N \Foxtk$~ @I7 @k݃ @(^SeOV4" sKK @4)M&EP кu-$> @ @M@m-܃O @ 7y @2zca( @7O=JU\  @`S@z @ @\R|$@ \՛ @{L߷G,ӧW  @;djM @}5X]1  @2on}u'@ @T!f 9] @;T @ @%\b!@\?J @O0[M pM  @Y<= @i2ק* @ @dجD @ \u  @277 @ @!s4P[ RҿdC& s}  @]|'@>3XJX @@2]6J @t Ћ@>JU\ҶA' \ht&`Tu @ @@26 МpFYG@ @@yM{j[n1B ۭpJhG@溝 4+ۗ/_ N`/L,O^?#`9l-_Kx$ S]ūR.JgգF_eW>Kv 8&[Xa^_ūU@זU/ @ @ddÑ2AgS  -s]SQ 4#9{d5: z8xixfՏK]UVo?@E"`*TTD@% jΎn>QK_05Fo~5x{  @dd+b*^" s~p5339YZL1s4w} 9V  @2U5߾}^EaE @@2io5\\,DdwqY @c늍;늼"@.dl֮*Q;[e @21E/~IC& @ \Z]l!1E/K꩚ @ @\"!@6dlQ @ @ @BjN @?G 0Øke"@sVM @NW˖aeK \4 @ @- s}  @ @ @`>/K @ @%az{IeUhM@溵 @1\7 @~e4 @ @nqF @ @W \U @ @ \78B#@ @ @+d_*M @ @dn @ @ @2ׯlv&@ @ @@2 7 @ @ JW6J @ @ @aGh @ @x+]  @ @ аuÍ#4 @ @R@ͮ @ @hX@ @ @^) sfWi @ @4, sp @ @~e4 @ @nqF @ @W ˗WV\  @ @`Cϟ?~.2'2Fk @K~IC& @ p?߿WAd @ @hK@溭  K_ҬH @(ׯ_7nަ  @@@HPO yQztO>ſLoC缺=TTZ\%F޶UND|G;^ @$ιo#32'2Fk @Kd_ЪI~B?Uf7k jV2sʉ5M! KGHؘO,my4q?z!7,Iu=D溮 @oW Е@oNVYɘ L_|JrP'vAM3^ӑl \mt뺞J#@dn_#@@?q]~*&;Bj;ɞ9β-Nw \mo뺞J#@~Q껶jGI[4G~?~Ȭ{X߿Pڮgˏo=3H ]Z?!@qӰo~. `v*E%8Q`:+l,yW6ΟF9=uɝ˪7!: =wʩ9@&H݌jͫfl sIkxg]z&@ \՗6 i#5[ZY$a^~6say0FlXf~")Udʺ 0%RSi зuvDms82u=F} \ݾjGNFyiu'S13>nT @d뺞J#@wԎșˊT >i} @ \w֠C#~q6*S'%@XbK0[HͪRM`﫵1m=9 t wWew07Mɋ26G{`%lnJ#@d;kP!@@2ף{]"rev}֧+>tMi֜@2Z[8gڐZC@NXu=F} \ݾjGNo7ؿ~E!'sFR<9`|6rKgQ~ǏXRK>zEhak?)c+[3 ђb{S/\ 0=;aw:g]x?^U[%@ +N3Z2{$C>0mNP a @xs:a=I-\ b @v0,J @O~ZF`v륏4FEE  pLJ77 @\U oQcU%1ev &Zpn@ sVVG&{}Hk @ @2w6 K+껸,L @ \?DN^'W_T]x"E3% s}r  @ *bvYe @o~s;#0e0ӨU!U70/zjp ;u '@~nۉ/SWG̵^D @`G{,K,hM@溵 @Q  pX" @ @U2WI)K=r̪#R @(.b' }- @ @d/% s]KrnG @SdOU8N\P-0-xEG @5dkj*N{JX\ZFo-6 @ @2g + @ @ \4 @ @- s}  @?}tVm @ \׳T І@\_ @JdKԬC @ @ \gd @ @(.Q p/9 @+ۗ/_  @@ϟ? Ȉ?.5\2,oMZ|WW:IXCkD  @Wc{mY"@@W}}z%tLlаJ'y @M'8笃V'@^d{mY"@ @ @Sdr&@0)g1}EL @d \gSYI9-r35 @ 2 xSǷ  @ @` s; @[Qx@xɴ]i+a @g \?DO @ @dkS5"@ @@tLo›.uJW1zX7 @ @ @-C4 @hG v/ckS5"@Z2׵$C' L_U>qcnC@ @ @=2*i}[ @SkMivZWe @`v_@6VCJ`4Z_e  @ @nRE @ @ Љu'  @ @F@溛T @ @t" sIC @ @)UW8jN @@}Ӫt%?~*RKn.ܕQw5e_h٦kaiT ύҿ>zQ T0 @<T~[hɰӦ 7ai㭠`vO> \Y=N \ڲE:poa @d \ k꼆o^AJ @{djN.˜\eUt#0( s]SQ pG⼿UE`zJ"@ @@2M7 @ 䏤}su9 @, \ H-cnc&@ @cdT%@$>9n @t sA#^'޾*yu @D@%  @a!IK @dY*'+skz1* @>KV @@L" @\# s} @@@HJK=s43Y @X9 @gϟgԳ6?^[ @ @C2ׇL9{rX1^Zʊ 857@#@}\юjA°#\s堍UfO/ri\ѳ.G@=mۻq( DH\DijؑΠ _$xKH8W꫅ _g%~ @P|Y  @x׈.(?;^~JQuM*hM' 3NwʧhBs c=n*Z @$ͩ @5a9hѥ>f.'5Rd?J}n#vfnmjȕqW^\wtx38Xn}pTrEϹ pM&0  paa ^rDr]/͸ YvR uy5zBrt|7mre_3rr޸,^cIKw3Z @$O @+>HԔdhrkEr]  Lz+}O @@vhluf,R1jlCJf@  w̑ @T\j:tFVVf :OYRu`P.cQTn~,ݚk8H#`>BU О亽95"&0y6|:օ^-S]x:jUsaˀtO幵P\&A @;4ף?~d xʧ\-DhX@r]5e62ܳ+SDx_G;[ wS8>[MN&,>%q 9Y piO  puCsqGUKkE/t H9BU ИP!@Lt>LJ X" @ H p=L  @ @- @9.=G|h\ @*$H!@ n%#U#Nݺƻ[s5da~sSj@ @Ko%@E ]8{v9v}<_wna J~Ы~qE5Nء񈉶C$@$׍M @MߙW6缅:/.5vNJ~ZE^uaDt߿jƕO?I/^T H+&^`niˀ̮N1qΑGzJlr]nf\2si{9@_t 1Xpm5"C @`J@r}Ľ!>BU И亱 54(u9}GbE О9\MhLM @ KޅQ# @xS 0#P~6-]Tg p;  @g ,y%@Mݨtޱ^CS稶.ϡKs٫-~ жhxMqT Y,VmhP ڕKFP&܍^R"]l7^x3з^O(/bަ5'FQr  L)w`F@ @$wec$@k .vKiT;(l ӓ`/^nA!+m'F&w pVנx4}cz @V[M @FE?R(Y>3M f{7n(TA.>V В亥4hM`kpe縓Ecvk>IDATl<8)\YhI௖c, @%Ò*HTVhX @3=+ @w\mƍ!0U$d4,-\S'.zIX=; @$<]'@~+`]wcy~Y:Ef44 @ вpHc4eC-:F @V$׭̤q @@+SuBS=[V @ @@g @ۓrHƣe,` \ @F3HG7f,{r!'u]!@Y.E4(wl \Sׯ_LNJ}8#_h) px辂Qח7x58m- @3)pćYڰQِ6$"@N"2eAթ]t¨h[@r\I`C+J <=aGdWW @83_ p3 ?~.Za3H\t+:@lU~zGNg\mF(0 B{Sу71 @Z``~ , @ $7dC$@ [@^$7 @ρ @Ho0ɆH~4x:LUo !>͢wxesGvص @Cy5NJ|]|PlG HRLHE 0Sxy+j\K@r}[hJ`4ر(VM2fHS @ @ N. @@SkKlxfHA @f؄., >X @`L m8\:u'9+Nud @ 8[- @$W5}&@k r%9ʯ|L  @ pq'P  @S]El۷(--3 #@ @, v3 @Fմytgʈk?ziˮ @hE󳕱E1^[X \z82֕gEO҉TWt}o'Y@ޣu ]S[^MQN]~`k o_ ^^goM` P\A @J)_tW(d܋Z[Ne^GWZNY$ף/夝lҫ; ?$`>///Fn4# nf*  <5S!v @Ϡ @;Nk4+[Ze]N:%oJY5)-''.9k- c /;+: J pH]m @N~ɸ\{xfN#c{pcΨ 0zԺ͂zwR  @@KfX ЬŠ r#͘Z}=YK ;YeחO%@֞T!oYh@@r$RW(l/ڕ1׻(W|6*>ZУGY( ]V׫\x-{߲$\1FA˕ n֯n_3Ϧ k??~\>z'׽y G11X-ǏyWتڮE\\>|*&Kkl\s]̝&׳fG Z`401ju'Nlɭu"@ H;wzN{ Ha]S eܻpn.Ůs  L23q9xS P% bj׳eSl^!@SϟP0EǔˏlvbO?mKGT%~ 2ѽfw?v3@,ͦ]~}[y @E$8&@m;R .SKÛ$X6{MT,Va/us<OxVvi~qOoZX pBN']"@=R2#RHo_ixj0x~/  @ p9L  @(7HS2+#5ܕ)KH_P @P ݷqSk p (x$\H r_~}||>(m+݅&F˗8+n]q u4Z?ׯ|C ))d;p y @)z6}$%'tpzNG> 1.1{n؍n+m  p%ޢrE_I}-TV>h\1+{wgRigwԖgXN>W2Q ж5:4"(^tp#@7Ƣk{ImL! @ ړ3õ  @vh=."hE_@7m#u =<Ӷ0ornS絻c1 p@wcu=f  @ $7tC&@ы]{mlBD?ߊ8zt#gtewGQ#u(®s  @m.H{oH\e9^OL#pϖL 0qz<|J} $@ @"". @"Kٜxqt@S4Lg @x PH#Z~~NCcwWyw#ҽʆZݭ|vME @;Ͼ @.uh6\bۉVbY(ؿ^)u5 @$x0zzI#뮹-v^|7v{?FD @>i3Z#%@S D<ׯcQf_ی˗/w9sڛwqu=. ׯa;?-xDᝤq9+ @L H Yϟ:n{X9.EgxK5̖w_^_^^R7OD @I,{0U`i-ڬ'ap[`M҆vZR]_;YWIJ2 @VXs) P%]X]. VEֽu &tӷaWuB RnvPǂ˷iA $r%Ɲ` @QG™m^kC @ B@hN!@Rl9r-H___ruv2EŃܱكuY(T Ijwy!qn`*  @\ @`@M%pVjmzk>xH7 @8S8@J 5Rf+Y?B̧%r~?*Ĭ$ @{ H9FMeݪ֣gvY[g ѫ+lY 6uR*aZ_+~ԭ`0 @N,yX'>LKzqjmyPo( @" ޢ\4+B`#d(^tpSzf2#^ji y{d;`cN @-AOluܢ0zF`њ^DP"<AH @ڽA'PP浖[F/:z[ҭcw{z snu< @M HV"@ʴ:UxV2(^tcr]ޫAFBaR[A9 @ u.!$2wJ9Tzf{\rn|s$nL>EgͰR6 @ڮE ̦K9|:.֢eԋ>є+׽8*?C88nB~,*!r' @+$+МBk sMâמ~Mt,}Wj ;-ӎv'~TW]pQ~-*R  @W-GW?~||k_<X;ׯ{կ8#{wŸ?zr$ zMǧ;=iv{yy]~oZ{˽}$WJ.;|& q#} < @ PPAPi}Jw1δw~9fiycv<15Uؽ{ouzM~VϾ u+:%@ @+Z LmNJ 9~^۳{(o )r޹3 @O_LDvIENDB`nrePq{ PNG  IHDR-3 9sRGB pHYs.#.#x?vr\IDATx^&d3qlKĩ`zKPH_ @( @#1 @--? @! @!G @: @ @: @P @P @s @#@ @@b @ [@[\ @C @z Cz @u9@ @@ouHoq @ 1 @--? @ 7xJϿkC @,b$@ 0:d @Sl @PL @X^@|  @tR"  @ CO @N@2]JDӄ=E%w M @z [\ @C @z Cz @u9@ @@ouHoq @ 1 @--? @! @!G @: @ @: @P @P @s @#@ @@b @ [@[\ @C @z Cz @u9@ @@ouHoq @ 1 @--? @! @!G @: @ @: @P @P @s @#@ @@b @ [@[\ @C @z Cz @u9@ @@ouHoq @ 1 @--? @믿( @A?|4uAV @. ~J)E@ꐅkh @`Y6g7oz9^8~Vk}'NII-R?'}t'_m'~\__^z{o Clt(X9ϣzU"8@TiS#| uHZ4/@?W9wA$6^08.b+r4 ZZ]kgG(uH#&;o'@`"uD ĵ:x_-ʵTCIgp/odv @PǙ]z!Y{\ j .2oǏN']Z ܤ mV @@X¦N C6Ma @ .GuT  @-![  @V.on * 8a @, < @* 8a @,:$L-aR%P'L=K-K@2W>NI@  @!WBN``LP: PQ"0V@2_ @@3lJ`nu @!+f՘ @-;?#@ :dŬXT{&ְvP{QhHe) vJG+ae$D$V=9!vu, "x"Ҕm 6x)3[XR@dZ  0kmgq|'@%๬:d `D?&PL [&,P73t! b p(zA+ $7[IfñC6L! @,p}( @iS#0 @ CM @1*:d$KdU,U95F:9\%__y5`.\EU,V"@ 0:d @ͮ%:dɴԲnL/Z#@ C6K @ -cIC"n1k11}IdNqNQ%jP -r V@6uWrp% @@o''O2qrF @`QuȢ5, 'TMam'.LB x'tʂW|M:d SR5h @" C"e 鬍#),#e{E8~$!+𞦓3>C8]9^=O!&nl54hFa @:ӸoX@T.ʂC Bpan TPTO  @c_eP*9qc.M @Plr&@L":$:dN  @Pl~(QĬP @s &uHZy/'Ie!XHJP2 e_uȾ7r @!{륂#@}3ge=kʹ @`?~97!- @ CbI`)Q[wuȺ5,%D8\e6pF:d˴t8)4p@l;iu x(vf @!%C( @\J[8CSم @ʤb&!aS'Pj . @@+G+ـC&M*.J2#8&tqdYh#љc_\|4XV3E6[gm!$") uHӬUYIu"@-T8sn ί~8%q@*ۃl$fuHu9T̙˅;GÆR$~ڍG!֯exDx=& x?$Uv 8D7/Z]>saX&'q?$d]Gw8빇ebQTˎ,#p.˰,0' d}ꐐ S8sɾ/qFbn-O\O!-I@,u8G 693^ꐐ!>}!?T?F@]:d?gc^}]{A/?^k9MY{<PmvYi &X $.t'@2YGDgk?}?p_ޟ xǿjltY]tNDuH"D!WV&Ү$.]'q @SW岊@qJ_ \Wҿ/bM_OI\/3Kq9vuɈN~qSlCҏJDxwM:d¤\Tpfaoq !+g7ml4H[C"ekAo"-ND@R7'/v}Ŗ_@re{uHL:d`ξ_4|׬NeGV+9kF -z#Uf'c1=:C: W"{r6\K&#%ek-|\ܾȺ @`Z  p׾S CJGR0+TR+9սJӳm8XU (j7:$dS֩t#PM O @/"%X @ W,% !!BHȴZk(j (-K x.qn.Xoi-_)jv|O}i72|>J`\0+3ԏsUxĞX'@W~ea:E yD%m @{)eF67YE@z |\ns' CQL(E @<Y7Hd ClDd~,?;N_ĭQ @訧iɑꐑ~!/"XIGÕ怱ĆEIn̟  @H9ʡ( v/|=,SH鬅nCS[pF)2QBE'[;N@2]J6 y(E6!I%n,976:däу[Y_^ @`cBgDȡCBmucd9`hXU'Uk1ub 1 qa6vƉ2~~zz2NIE }H y'@p"]S3(hzB)R;P&(Bt/&m$@!ݞ]gNP,IӮ9)Ea @`'>EKr;ͩuƪY'Gb݌51 @M?OgL zYϥ@f#8H .eY(M @`iy'npl2; ,BN̖ PE`%*HuH{1 @`2!GE&9PM..5ɨF  @@ÓR^I@ zn~1&\=$4R p8t(IY )MrlH 6 +q+ͫcQDDϳ{'ȉ2'$0STj2:j<1}ԸK*Bcꐁt=g⻳֙aFBoi-~9Ը@e @@ki5Si/oY ~R)Y֘FAYw >gQ8 P _r8W@΃;IW" ~#| 8 B CBodsE @K nreW&WU F#M>d._LHZ6sE*nTa҈`Le,7>yg8qr`8fٸ yt&JfH4Kc߶kUSY!V6kqXV !lyJ$y}^=0Iۅig۵rWu;+;adl'DL{)7۷S`v 'CPTҜ"dNuMpw&ꐊs63/Q=B)tz 3l=^/#RDM:y z)a翬N)nK~tshQ罸  i,DPLZCjIng}2^ @Hzܐw OqTT @ӏ&!Qs"A̕-r#@`5}_픷7zƽ-\U_:$jW>n~ @eawʯx{}MQ2QN!uW \ J3e#ؾ//}Sp0Vk ؊J  0@uI~OŞԓZ2yZ=}]Vix8);&:$6,)u| ?,)9pP‚,^io6MZlF&x_&Zu:6Ċ!) @ zu.{459 SY mѻ:j6OVO>γ{{Vl+} A }=LX";|{ U;a)7)C}z΋Čd-DLdйl2j 3N릁Nd)#C A :$d 9BA @k 8{Y+Fؿk?e{  @~Hgv<_;: ; Vvӿs }g]uILgjݩCQoQxʷ[gIv|0Dj5XV|}YN~zS^6d7mB@bk98!Ώq&OrsKSgg ,^gbkORgeLs-:$JO+(@ap{ 8>=޶uȶ1p x.+JO!Qz'Nѳ/$1_>6"@k xg|V:& @b%㑋%p\VȜz.+dtٽ74^tix6op9Ll虁ɋ%)=pqZnE)mS:nӶs&_f5^rYH \'/\%UL:$dN'g J#z"'@ {>+zݪ/=l[&^&8ȒU+ŨF]8 p!Ylҷ\hx?dtZjg A @K !W,nD8]#R" p ъ,G\! 5CTpzZ R3PL8p6=XR|q$es cPq!qs'r RaVϝR/o:a "$>z!l @Su5G: H\gS̟#&[W˱ PV$4lHU;VuHmQ @7v^:]%םbMmuHmQ @WGWgNLks5OȺqR6R@2eZExb!ڰ!YpZ0sReg숍'k'l(&Äj:tm:!%'gO h-i-}!%ڐ ?!*hr!?{ta.'iI>qf}IKoI4+{.=$)Ԝ$}tJtǦ~.Yo<7~t;[B:-=ceO;MW-@>f-bu}~JF Ѿ`SOsJSϱCfb @@ $l?_vc1och3uH#@ͪC%P/o# 0ۼyB>-!)!@`6pCfc?u9j:pK5﷪C/YC]}:$PJ@1+:lQ/7$ܴ=:bHuH4}y[yC5wIu?$DZI+^ji/^T/CqGs.c!c {OH+E qVpRN!H9ZHe! vQ4YuȄI)}eX| Nr]P!#@@Sv-6߁35!QsݹyzSsG乻%;=X*{KrRUZ\s{g#ೋfϪ9y'3 C]/F:|N|g,q>O_'o__w,cpz;M;!C w:GWoJZscNH(Bj6mRm <Y4E`jEY#+ȕ PS@[CjN/mm#&#g"΄ANqPJ`x\rkM @L@8?!IꐝoQΫU 8:)oYG_88zSb P&)s)"SA68I6D!GRHp'$ʖ| C N^HXV@lj l7jD)L0^, 15E:Ĕ $I,c!0Z GbCbI~"(EmISᝐA)E6!]"d8 4pz݌VvPucA讈jd#k"侪xPVpްrv@3,j!fKo\HZH++h*ViO %@:$E6y`SdQp3dRꐥi0k ܿCY{/׵"!3gGl 8:7"%!K DPDʖX TzFXI@R6@uHL@M^SS[ |,蛄 FP,R",H6$@`3fp]c 0:d@cHc`Zq,EHn>$~OuȞy7n+E!h mi& XA@BMo;p 2XO@^N@)Qy5!ex (EH "$PJ`mu5:yJ"" (a-5ޓ&1وꐘyf(E6Ȇ'qu|9-2)Y`N@ :^䨶0oM;/-Y:G:Ĝ @`%G5LD!;!-uM"& |"ͧ?*B :d{ X}af@o (Bnjꐐi4";d[`HI4!!:%p!'E}~J=U:H@(YB%4 dmdC$@P@br @2nȜ6|, Y!@`Yj^O*K:Ĭ @ Q)H ssHo?WDʢX xkyaEZ)N@VtpʭsUrs]%tƬi>u|9W\ ys#2 Czz?wEk" + :/-d:=~v=ʖc!cNl2"lqy> Cϑ Hpn*e&P~ 0:dL]t+[8Vka Z@:}'@RĴA@2C@ꐙ#6 "pv$VP]c#o9cǮwCdJd l2;P&CvɴqV3Zۦ!H@\uH܉THn(Bn/>Ο CJ;vLtǬ3!M@H\ԏKXpSmQ"%IC@)bTPT' C6Ia _k*TPT\)GIP> E) S CN8Qv\}&$m!XE@RQ#814"d:fH_{֐&9!sA 8ziĠV#O$@`nu~>V)>diWz-:$jM@]7F?CɅH/F `.~L /DY?y??ɳ&<PL 0L@)2~!'GhPL h-i-}EH|i2"C'T2aRDhYx{*BLXA@Bay'Sf@]+B@,,Y8SᱹXQ+BFM!$0 %+TnνΝ :d,}<?>< @`uY6F (EQڐ"d̈!exh-i-<}E@|] :d/"kB2_NDDꐕklPҲ"d%jP-!-TIJeҬY&3 ė͐1PH TםL\Ѳ-!dv @٪R$<9EH <S(EHC~7ǵ"P Fۦ EHW @ U@*e; (E܆JGϠG CFԟ'('ki]#Fyj$yTLe°b/J)~HOm} 3ߊ9"*vPq%@R+wBg$ @:>Yw65v/!f-͘1|-DozKCff&PO,$X2_p? @0o}+!Ⱥ @@!b'@-oYofPP"" +=*(E* 6]R9 @: .I*Oً}!}BJvBVn!!P6#@@H VEH Um @: -&;ARSkh$iYd,EH6U٥On]O-,Y8F@$ϔϖ"価 M@ҍZG8+jQ(٦k u:d<(Ega :dlk3*ւZLS#b?^mi!uEHg[")T$Bٌ Cfˈx _TP\ـ CMD@)rhE&99"*S}t+[ @`:d  $ygz\~v:i؈ C&N &7/!D6 @<yr!\x]t{ (('#s)q,$}t2~pTmv=oDz<)s vcD2x!EG^"?] 5Cʠ#@@OY_' {N*} @:^ P`RDph!LzK"'_qzsGK#WTXbzAL%*!@-Jo"3n޲eSk`)@)r8ӻ=Q :d ,ENsJ[SC0h'ige Xb6-tL!3eC,'ptWd#3V/3ZZ\4^*E~*dm @`ou7)MAK q&n6PltC]3$52\ @buH1  @L@b~)`w.Pمٻ66Pl|C'@=Jr{ۛiD@uH  @@puH ~^~2ŃR[L-:=#@'Eϗt"sQT(k WA @: Y!篋+9b'@@euHeP @`7_KP6=Gs JwEdmD-![ݠ  #pWY7C^}~ @`MuȚy5*8 X+KAi C@)XKBYh&iFa? 1Hu7F&JP>m9 C6MaȽktYΜtcd挋!ݨuD`-'R$T.Cj!祈gZ# @@:$FJu*Ej^,!KOR)b @`OuȞy7<2uzVs1WkϢN.: 0"yEhq ,9N!J1j9t?P@2_E`x*E.2˜ Ck LR"O @:& W`"uc/qV{]dtu= @ ER$=!iN"@r3!RҲ"D"@`SuȦ7lJ%!Kՠ p!„Exʡ)N?b!G{F+;v @4iR!tX(EL  @:+ 0V n;sN$PY`G+Ss!JsD'g'&M$ @@@RfRAwEM> @@@bj @`GEy)KvL@@uH 9 !R3Z9sH@2Q2B !/eʪ fP̜ @>O(}"Wb5QL$@@{N~fu!uB锳Z[9z]hԏE{ CN 8aZ6v4vxMW(Pٓs \<3sfK (B"KMh!@`]uȺ52Y5m}rmu!u=F#\}Ӱ-*Bڥ3ZlL1!i-} C x.k uO҅Hg @!1  0"g"=EꐝoDpi"My5N:L 0|O EH">uA&MmP LQ]R"MA@2C@Q ώ.A "dglJIr$  C&N,wzFkY4\_,Ehvnԁ:NNkp;𭾓'HxDPDɔ8 B@"Ji$ C&OGhHd 9!sETl'pt'ăNȴ!!!$H8V+E&N ! b @`kEH؅Ω #N_RVNF&o<2FrFF%@"(ъʑ*8+jnu66P&PL R @`u66PfP̔x@XZ@tz )!SZPЪF!P,^#@`>E|9R XN@\J hE/U.ˁ(E.l@'O'.%:*B$\-)EʇhL@2YBCE{1,rgލuHm pKwBnK<'"%@: pnzpݽ>[FsV IN A@2C@ (E#t-iD}u}Ñ-<.=pimd>MK]@)|p !XEOU{4]fiYJܽik4n׸Fo܈j^,ņH QMhZ1 W`.VM 2UHfT"䎞}7Pě)'F5}£. 6O˼*&4)EIŭ@!켷:$^O"MEl<f'}'Sݻ"$l̊dtϮHSz [rsCM*g)KdzG'7O@Ks~)9o%5<}251~~ x+?zWRSN[@oVx#gcC֯ ]0n'F3CvBĠMOSV$[~0Ńy-eʍ}hU\A.R.h.!`6i?SV偿+_JlY ڸ@ .h.(Es&6k2 B-8?9NA 8AyRF0svb擞/uH҆ۨC%{ꁒPrV/bk=-)B*givs(!Ƹ!Ruǻw#wvhdM@ Nߴ+rEqi[ nk*]J/"ص3N;~G+yy~l:!qz}8Zt͟NMv^:J \μ,?baι$=_YiHrIf!l[e}n[Ūcf`G@y^̱ON>f#~H ;c| ?qѻ"V~9m!m\;Z|Yc:-Hd|$;{s}D#!e?}^~~Ƽ"dLFR$RJ@C&$QyWxIy8ѱ<~d'nN+:0EHka~χ(hX#UMYo6`UHHŷdffo>1nvdwGOă`Ӭe9WwW1 M CF,LWGYKG{e{M4fmɰ.v$V mRk,`rٿ:l)2 j͇mYQ@RSS:4%@0G&E(y{*~HieXJHeĽRMw@!Sηa_%Q0ӭl-1+ p!1EPYvޜf{!lL NJ'is,e-Vr~H(.AYZ! q5]O\m3\֊Ϫ~`7Z:OM|^!f:$^".[=Z@!=uS`Rx &ʭ=~hۅ5,Ʋ礋pg*˪¨VbDn3lj;Ьʹɔ; idb'g]'*!p.1C (Esmys.NA 0Rq%EVP&`v&X„P͐I򧀯5'_@2DH@?EH?k=5ءqm$<ꐶ[w: !&b;"pn̒%jPd (BA@):KɴꐅЬ[ o(BnuvȐ fRK{O$a<"NZP!M8xUeGFcsƧJ=JLcbd6Z%@ "$NDzWcZwK-^#Q7s ĺ6<ִ!du]2m[)*^nmuPt'!(BI@z +[\| Cv/Bf (BVϰ] <4 wc:dy@lj "6VPEc S@3o&@"]8*E\Z0٫ɝXVʗh +ꮠW}+fu1Yce]+_%@ g"K(1+b"@QTWbJj8&PL ,)B}8)E&ye0̾A, ^;gQA5;!&ְYM5ZOyQ=-Cz(* 8a%/ '5 <pݯܲ/uH|  ,8P<(YP!%2zT0ogU"fָPlwFQ4JmS?dCwoGΗ|K"(PمuARi0 -E\l*y<8[CJLEO qK2o'lg;euX)B' D,E\)JP:}!}B)0I)dBJVY""dd43"O3f Ĕ%iqCҜms-c-Pٓ=J{#jʨ:$VDK@CQ8*EHoONN矎d!/\)SGBS2UKu͐:#p*󘲦;GmPOK$=畾 CN+EEHmY7K!R&`{ 8o@oodC$$IbC< IN XF՚*Y[@v~@`EH RĽ֫ط:#H8^WmE R$ ,-Y:G`-EZ4(EL; Ce?NefGrq=fQQ)b14E,/Y>H "$RJ^i|!@ව: @`E,?pE"i$5f^"d$pRLCfN ,:+BNCYr 4 )Y3y^zF̊2'߬]eH^4Bpu`_#yp_') u!CC(^֗F'+xk,~")7JF>籦uύsZ▉~Z`sLK.CJwY}z UsU71v)7S{.Sz,|Y]rOC/ܮ_?>n/ϖ[c54}L` Zpf4^ner6Y<"ݼ uH 93kL+65#0@:$۲]<~;wq~xE7 ?CR`M)%)U}'PLa$phd~?589ˇ+Q/G3 ]q)Rz!=Ӭm wm Cfw|uȣg]iyY}Py㿜 Y/_ WLmB( p$Pdau$:g֊/?T#\}Og5%ցi@e:$PCUN5˱K*љ\}<;|)ц +BRRi..+w e^F~62s^N ʚ:+nelYN ß؎;RJtϟ(L,ۤWßB{xYCUuH%v[WpܼVT|+(a; ]0ofM@ q $x9 CR&F2aRCJ<[n'ws)!M2R @!~ԛys7Ղ:d|~W䚽jkǚ`j?/~d^ xPĝ7t?{ȫQ8Y]u9Ek nY`uDAF 5Q%sVshSb7@UJւ֎*R*3R?/~;~ ! @@h2#eA7wGR'R2D?XjK^ʊS 8L`!Y\6$~ԼQY roG MR2u;XM*9z\䫄4u)c+cLU"\ @@1i$(@KyhD?x5vV'1wH.n Cnڽ@ՏR!r GT7DI "$@H 94P s ˺66C ea,\Vdmf_L,g _,x0^ou?tyN]7UfE$ }CRlA +/vEzґneK X9N6feoۗ`}(CgpOgӷ\Gg֑ŬKs}Y%PttkSҍZG7CXwfO0C@@i}ypAﹻ$!fg >wlP6.S! b]W#Y5;;z%@`šdlvr{/8[i 33/ +r@ħZϙ5r%ֲnf=͕! L~Bc5<5{w.c]vW!@q$vSRc!˧xVstV)"T[j'#^b׎cދ!tv%prˢ΂]nEΓ?kZjSWy8&!9-N,ptcz␃ 0 P$0I)[T1"6;(P@3Zn&{ϔU X#(EnG3nQQ{5tXV^Nb/o9ՎC!CuCfrn:ac٠5{9ԅںy̺)Yh YOE2[C [{Z6T^MQQT'Р:r.!A#7,"OCUHG=|L~Ta,`7K/)W>V"x?.P21 :Cmp3O."Q̟S;ի㙧IQz~֙*6Z8ҥ(F2?v(vRnDc?REH qC٧IdIL(x:Y)+eig)s}{}] /9دׅ>mlcTZVk!7ď(=&^y4q HW},\sp&ܘ89CecJ:esZܩC!sTTd 8eqm1`YStH)g/J-~됔;7k\xws#br! pꓲ:DƜ1 ~ٶęOuHę 5uH7eIgodL'0>z{Y-_mu )sr=V6n^+0CM{F( ,Rƣ[Al gFk _$@e"]; U 9l-ģcpv?$X<,a%@%1/ @xD\i2^*7~r_  @怲d @`Ce!&\'p~t'%=!=A +:$VDKBm @!!!$HRg J @a36 FiC>՟ϯ%^Wz9i$z%@֏>,VѧLֹMeֈ_,` n/VCneYg ֲv84M 0DD3qNJW]uH]歩COA~ Q~xzԩ9m'UÞb"k)}`S@,a7Uѓun΍z.K@JY``I<%&4MwN?OӗruZʾ#-MpycӬ>kaC¥[,e` + 7h>=~_+RٯGS;yQ-nsY_η%TV:d>JGX VWquH] ;(aPbY}ekg^PKwuH@d8¡C%W,a&!og&}e7\LX%NonB'LIH+\ @ :d$V.|O\VT~8Mo^Jf`QĨ XX๬#=:J~ʑ0nߛ:nQ$ z})M>xLU~GKK%S mc}I,;j @`ˋ/%A[&"U,#@!!j fA+?j_Dv.s7J<~#"~Hέ$~ ;GQK@gq| H@!ena{1f_;Q cwzcUh2sY ',3'zGZhXKh=xsp>G'e2y/%Ghz$nuH]H_m_D[8j @L`q%p&THp)@lk>'@ @]y%:qꐞURTa \~<^ W,e?/#,K.;%~ڝ.[Q@RSS @@Ci#?_M9:*q4P4, PY@Rt!gX2yG#pB\y @BuH4 W5|0N~k}^A]a׋}l_Gڬ Rs @ Cʗ7~d!:d  @J>Xi?k%i%] @  @: C: @?!& @!G @: @ @: @P @P @s @#@ @@b @w[Nꐝm @*7Y?FHh*_5m_K i,W"@ 0!3gGl @PW"@ 0:d숍 @5jT @fP̜ @XS@f^ @ꐙ#6 @k C̫Q @Y@2svF @`MuȚy5* @3 CfΎ @)Y3FE @`fu @5!kը @,9;b#@ :dͼ @!3gGl @PW"@ 0:d숍 @5jT @fP̜ @XS@f^ @ꐙ#6 @k C̫Q @Y@2svF @`MuȚy5* @3 CfΎ @){ɒrIENDB`n!;d!SPNG  IHDResRGB pHYs99&%IDATx^$;n%N|HToKFdk[2#Kz'%}^g x`DQ[ ,\_D"@ D"|| D"@ DlD"@ D %D"@ D6x"@ D"@K`CR "@ D"@< D"@ D%{! D"@ D }"@ D"ĐT"@ D">@ D"@x l^bHA D"@`G D"@ D6x/1$ D"@ D"@ D"@^j"@ D"@ D"@ /A K I5 D"@ lD"@ D {*_~1IᅴY-iGm'"Ò,'5 "@ D"PB`/KLj~S/=Gйyӯ4Ǐx?J2 e"%^#4x|#>;&ͧ. ܴ0,)+ѧ &WMXFG'D"@ D4oY4?- 3/-Czz7!ǀMM2%Nj ^o#bhtlMI@ D"@;9%ED+="񝾯C?HQ^z']CR#.D1df@dGpfgWO5h,j%«> D"@ '#0%ŤUMKR+r&߬Ke<7tJ5C/KZl~sRo&^^MsrXWo`E D"@ x7tߥtYr?Jݠ~S`nBHV'T2+0EPƢ~Q. =ld"@ D"J4x iHH:O$m\щAe&͡t}/Vg@y~^ /#D"@ D4xq#/@Ǩ.<ɀ.HZ/d0U'i{iF~F7$9ԥn-͘#G<209 D"@ @`MTGv/ƒ%] J?~Sy<4fb̂!gIk</}lD"@ DlB`Y%"ep&2Jˀɨݒ6 /eQf6o^:2i D"@ ^`⢨]yje{42YV6pHdL><4ME4ZM?z7D"@ Dk%ҤH+pOA`*o 4{SYLɴ&G!Z<߷lBlX5$ D"@ /F` QZٓ:y Z?DNo[7SȐ=7+?oWoae "@ D"@_Bk%qQ%sM=[b(_vh2oŮ·U7м5}Azfofk~Wdԑ"@ D|tr#+?K`<ܑcE ' ?gL-&EfƦ7w!dOݒҷa tR#}W }X*2޼' D"@x4k<Zl&j+uˀ7I6VZb >ZN01kݔ"@ D"A`K4D"@ D"e[+"@ D"@@/lz#= D"@ DPjE D"@E ^/b'D"@ DC C D"@ ED"@ DC`wa( D"@ D6x"@ D"p(l5 "D"@ D"1"@ D"@E ޡXD"@ D^"Fz"@ D"@;0"@ D"Ћ^HO D"@86xb"@ D"@z`׋ D"@ "PP,"@ D"@@/lz#= D"@ DPjE D"@E ^/b'D"@ DC C D"@ ED"@ DC`wa( D"@ D6x"@ D"p(l5 "D"@ D"1"@ D"@E ޡXD"@ D^"Fz"@ D"@;0"@ D"Ћ^HO D"@86xb"@ D"@z`׋ D"@ "PP,"@ D"@@/lz#= D"@ DPjE D"@E ^/b'D"@ DC C D"@ ED"@ DC`wa( D"@ D{2ׯ_?GzQ> ?,/M&~bh!ħck=@ƊoOkj7!C9H.{D}0.^GA[t\eT%"@@j}}hjNBzO;bTW>%^Ғ ׋w0|` CYozxM?#7ӧ&J# pK`s4& cp&pbE@iXX2uP$'x?~+=,,;8Y6P&uB$_NXYқigP~:hPVw +UFYd]ʋk,]'}Dv%n'LʓP} "T%.'kfbx]ذu6ȍdD"htL D"@;`NR+"@ D"@>*"@ DYbͲE)$"@ D"@n p~"@ D"@"-l D"@ w#n p~"@ D"@"-l D"@ w#n p~"@ D"@"-l D"@ w#n p~"@ D"@"-l D"@ w#n p~"@ D"@"-l D矢JS9"@xlgHMQegTuf^|8R9x 6$Z` a|"7^igbu1J*FzdWHD"086OBDo(iqoeY;EP5KǧuoiLi- %]ukrɣ0-׿eX3Vf>0MlD x)yVNBT+m7a,zN|g rҜ=ԫ .US'>xavJӛOR3?6aK%Y }V:)뗦1b@b ppASyТ̧9` ""@؎ 입OF`~wrbUWɞTU`LjjL"4b խ_Ϗ1 )}uo Fxó[4J8x(R| "M_5&&^b\2!D<3MbwᏒ*w-jK\Wx 4Yo? ۘ ZxEF# 352O ~%qȄ"@G 6zŗZėn"w>$\F`Ԙ|TPׯYYx7JVԒ$A(fz0SN.9J=񴊗z +Z^u*N%b4~> hx|#c&jW2[kUGOЈs izK H@ D/-u<&2ZV![v y+V%LP&dۏ,2{&Ypo$ȿXI`#UЬޝtS*HI$yi2I*DCM#AT<&&8  D| ^B \;*f>'Y5 `u^iuan{$>{/7}$">\t#թ?.-4[W`FX `F_l0 DL"hn '0Ok>B|y_U <Ϙ2 ZrOldM2| y@ "t\?⦂rB%R8(@Bʒlu>c6]If#pΕO ?+ˎóf51fxMhh%¤"m*dsQ"D"A`{/b xq lRZ*Kuv䭏EukluRrk>f.;Fi.Y'Pj{{uOR|ɼU& Sb2@[F6`;B< D46xi5͖Ԧ< P^Ԛbw jwz[J#Se;Y%RV5mX>MZR#^$LwG!D `WKt/WR_:o-Qߴ:~FFR͝"@6xID-ӛjn]5c}qijh]+JTgDfjS=ʗ^5kآEIwv+4M >%}n:M2C%te!jo|#gFqBX_f,шuz:ߴLP"@A`o*͘Sc{˚8}iptY1Byq^z52{f}s~ZoPK]e#cvI|ozwY,f >ƂQ qݾRuZlgdP}W`ol 1("@Wx=Cci{yvLjY_9~Y+(\S|4}䉦YX3A,.K`VRUI8C~) (OϷhޏMC0FPJԩ0S XL6pJxg~`,"@!g!O!`#ٓ}T!{bS:>nc /R"~H5]sȟJn4 W`غuӪ (Ef@/j?^axUR`&U\ 7o<Êl1umW9s  D|WZRwWS*6=q%RSJ;iV!O *ukM'P)뭅$IRgoFK6VJ;%oaDrHJi>."/B(ul[p_3 D+'j\6x )%ǃTR^ J)k5_kw?Г>M-M%k_Kd/Lh]1> ŅPzIs~$7_3ݑny3灾+]J'Yfg.ּw3L&5!y"@@ ^Zx1i.O(3bIjb )'tOb;Aǃ$~ސfLmL&N+俺52>o@=\ХQE֨d}fit{%= D>d%WI%` |EQk;,?̞UoCM}qER?H0Lz@^%?iY@8{G򠔠uA&(O: gBI+nNgV(hB̼YJ 5Ѫ -hy V"X\A ;J9"@297U6K'{4=12'}Cѧ{!KakIX91GFڈ5)$٤Hd3l S7+aO̽cٽS鋑_˺\Ɇ5&VZ;3E +9u9MYi)u#E['`+Ҍ!ЕIƦ("@&8 cz >y5>'ٝ4<$B#~͜]ȉD J`DBL1YCy>I׏?.$X*0/A:C.$M}[c/P\^'٠:"pzG c7BB)сEkߜkIjL/ =c@#*5LpKK>IrM#T֯!S6-/)^$NB`kG6#u^21 7NdrQT@4 fHKRg Mb}iɡ$Uֈ%MlPҡqW=A-Ѯie5!6']r߯0DG$wCMa3K<㡉{|jY'*>`-tI} 9vHN.i_Mf%@cOKNŲZ%1Ek 6x}d5Y~f=E8ek2~mFԮTئn[ -*Vt^XCR&*% ,ԟ6+U~)pjKn~ &.#qO dhٱ=3~d+J"G6(sI(i7v 7$ +-jo&w#:dF:ptUW-^?$C9&@/D'D`M/J{{dUB>!PS_LIy˙p\sW2Wnt5Yc_ߊ `h PbMVL)@_4}tM ^e7^r[I-lBIJUM80XCg/@k")6/ VMt62a~[jFH Z6vT"tƺ .gZ"U)M &=͔X1i.}> Wi+Wԡm&d:nsHk< *z'lZVX1Lw%"#C=9{-|2)ej| fF>D_/3h)WJITZJYQ"NOGQEljd6* uY,-.4.zE ,pq˙5 'Dl9EhO/qN3*9Z0UBk٢gpitZp!πFZJ_䳓Fhdd%AØ (Hl#`aܚ&b߲0G3.AMyICYF#7LDX4+)8TX Y*i3iN%Waıp'Jz6xXVm7ƻ5ؗeM@|ibRrh~!~-Dc #UXoJlץs7k &C9[4j--QMG5YXīԣ_TYHi JP fs Ciu)Y{d_Ő ^,w*E}ѱPr֨;i!@ ߦ0qBq3˺Y:&UO z_*lql*(5PI)~(§+"ɳa g* $=۽ &KFjM"f.c+Ռ,M FtL zߥuW1UIؔM4bl* ^^*Qa.Kؚ ^zCB\(*kߑ1Pa%Y!2~ՁM*d J;0Co/%n6xʒ|HՒ22]6[e,3TTЫGey3["|$Uʂ4jU$c5k ńD@jUf2v_9ej/ЧW6cZ>5[SwBc5ak'`%sZv'ak"2/i z4RglVtӎ*H d|v9]Kg S%`(=+Yjw\(knaT1bSAָOKҫx X-//zUmoH??VI_T 1T6OOKP:Z#B+ɒah^p(U弄~EM-_'L}VcŁ >"-PP F1j pHv!+iLhT|`J#T<U c)TKhdw" 8m|1^YI<%E,b48ɬ(5ِ)޼[#[3+W~vjjӝI\_c6& 9tr0Ir,r9X_s,)eLO"P,TM0#%3Dy44#YRLYT+@c' u%? r';@JhfW2d/Y[kIS^Kc"|c@q!G#Oek[]Qlbc[ gٕ짚B-LfVv[j&|⭠i R]v6xjJ}-d,yӊmҧMy4*6nCF~LYfAG#Fr^캨cTi+k.%TKͥ%7*{l6$Q԰M/FmPrYg>ocYe3CVJR}6F>uHk>fcnSIDe$1i ŬٯgdmV" ěw)K*.'*?~xQ$+Eu DnK #>[߆ DA%U`U2^R5mqTc)E̢=HRدėFI<o& KY!,5D$^fRW\օUDY|"bK. Y$AȊC#?zS h|RXi뗌pl CȠ?!u>=#eI$T52DD0)L䐶-`~ɸ|@ gv?[]":/vpi`2u${t``%9av/*G7C^e+3Ꮥۣ*b7%12^vO4Joml`1 e%z..Bz %N:uƿ=eDҘƩ d # $~d"m(+x1<"&<-w9KV*ru-twFS֙+   ɚRJ-iXu@ٹķ4Fk*Pk@'@qcI(D;,M)b5i*ái))z@&TJ\t(BrRakȺ_9JlRy\#PfWh]WI/VbKIRKKZpCA11.&|͡? !z hJM>Cl"* Mݘ[J]e7!$ܲ2_pNK!@e)MRxpղU-Y<0cj@."#)H$! TjY53`FvHAv_HAQHb@iI5TBz[ s +*lDYuJ<Ƿ|"bЅ]k nI}xOSjOo&ddVz:[7 u: X8RO11D6J,0(}1lݳu'd.y?{0\+4a6a:n֥g`7ֱ{/DVT3HYt0D(ڨfvl5չT_H֊'OlYlXug hԅFb/_skSʧ^}ލ}hhW) (+PKNX -1g`&mdYU4_gEd{@ ]52F,( dި[Y29Z"[/ e)wȠwO*Q%mhδ ޙVE  S.`*- [fi0tkJ!Oe7-R?ݱ'L/ ,muTkђ{ȒeBœZlrBǺ3hz*!ɴl]R)PXLb #t.EZJr&|_cX{t—<~HL*DF*Ol\˘]N&;v$pbM,C6k6;ϖ <@,+kXB)-ht-5cQS6UXzKe!\BɈzqI!ٲTálk6x0ޘEɔR@]GBJ EM%%uv]rD<(jB}Ee>rdHKc6Lg0*](1r 11mbzB*ٴhXy1 $DZ0n-V qٳ9ATfISŐ\1sedc9Q6xt+(gՕvuW %KqpTswbHSd%5h{2]Dp]XJK w \*kХ jY@t3r b, F,t$kliG k:.4RWb߸a)O٨o{CzDgP䁎oV v?d20 $?\YMikR ;otMcSH1gF|;k,j/Ul6 \ˊ Z<ɭ_2M6K7Y'Op4QW媤Fr.4|3JUH4¦reGTF!u7PX<[iu+qpXjeZ[JzeŴ"- t֗Y@>E[6FƝ%o JԱ* 4xZ~I!{#%,yZ3*݋{XӼD0 Ҋ+"j]r"Os=+\jJ J.[֠*q>5/G4^l4Y[kZP+rʌFYm4EThb8.@/.%:ݸ4nM>R8 DY')IaլJ͏iqQʖ\bT";$̽&!߆/ 8d QW2r6jᚁ&ݔs3BmH:SIB%'4D>)|iJ>LɌ $~:߬/dU;Vc"=zTWhM'<ǙgSBg3ė/ɯxOT`H-|˳ΔZʡpeS25Dvƛ3f4URl#fO t%+wHSA6yG[ yeQ@=o6jt~UcQ/jW)ls]/]PGMԳbD W?>DXr9oqɊ:D0E`"Ҽ8Y-зf-kٰ5X,[^l,W;^Ӭιk:c9 6x]p]IJ?:Wu_KlT_Hi-)jf^YGe_!& ." jD#Sj-]Jz \p̴!%]3k/S3Q&]pIQ;(Gf>X)3oQRȔn, 0!r>2Flt%{ O{ozl5Yexɱ0XOd&-}Ҁ sLjRYPK=-m@́϶Y-%FcA f6#I U83 ~t n6k$$x7uˬOL]ZuezSYb:^e ϼx!+^G m?P"erI4bU婧0{n͈afϞ|G-QB^]ɲm=(x2EKLU=c*v!|H߅.$Kike~y.g>^'xS~i1CSW3a;J&+dF x ¿G`?tȌ(Aء W=phGfU:{ʣg֙52PTz.';W(8ȧY[ 1ED5OAK.y+RQ:KI[Gcl䉳Nt:BPbe6d5 ]X~%!}6YN,!)㓃%i(\||Rc2_iK3l&!)|{6y9csohYMݴ>GɈd̶zB $f1̒euز,6@5 +{ޘnkfM,T[-3 &A9*l!͞=&#&zql|y9ռx1 U.PCN\.%ޒ8GE&!c^R}&lo``/WgSDgY ZڮdAKw&Tk?c+dͳwASOZdV-s3_bK(e-WFJNG@-VG"UeP ~CjkZ:.+Q0*{7]Ɵ=n\$W5݉!-CX*u K(>Fɴ+V_lT9V{ gRBPɈlЕd0d0F4em-WW2*A0 L$Se#31ߨ@[̞Vt#^eЁД|R5$X`eAk5$jfa"cV =MnV+14*DZlo~"g>J^ۊE 9@$oM^Z4$4} 3x}C̪ׄ. SG"4KJK~,Jy?M`'O3gV<>J5k>fVTR?PC!kL Flj;Hۦ%OoCĦIӺGY0C MS3xy';o& 44 aÔ| уXK6^MD:ѧ?f|yՀI4$`hGz oF$h'j{ob׉FĻMgc)ȓ!TJD|@Qq2p H\"p6DY/:Rɟ "#}tGJ}SiG/`D{~ u[ZQP_3bNj/W.(N`n_˺&(`UEiMEl) \w**%͂Zߟ(IĠpYN^Mz0Υm4ox_z-q6<_\B;$ ONKRpJ_Ǒ2OZd㨞^$#¤?NJSuڈ$zliJdW JbP4| Z5qW8")<& &Mi21IgItYeMSJ`oz_PEI̯z]&Jx6g޾:u$ErфXٿ_w" `!OZKt&uzG,\^ԼYiJЕv~r(RꙦBímvٲJ7xdSTo6q$CO#K4GIAB\TV_ rIt.MZɴ!1kE &jV3o RjO/r>+?cME #`*=LEX_K- z<\rԦ{WS ֧K0*\V`%|lն^^7 /71-Yzp6׸hJrI]^&%/B L $l 7TFHX2UIl*n$\:(3J\,y4(n&clgkOs^ g"0Z:SJuM,Wp,ՋO(j (/hA5i[%6L6m"-br @)hSݩi`^q3LTzN^Jex!RZy\g>5eTDS &0-vcpiOy%D_-D7Nr}&dӑFFDQ-#0<%4> Yӛ1 ln7*!dŨ*us[-ds${=l<8!37e~Zk< VfF?Le?_Aށ2^Z?$MG%aT^~₃NËFː.+~8l4'@mǴ`YWoKQkAA)FDf+ %tdIc3QH:b6 Rb%ΐ*|8ޔGdǟxuXz.27zyҖ?0Fu ԬA({njFfרF:$xy"_]|uzXPK"/%(b/|P~=u-EZf4~% F S8$^ZVb *YV[W0먥!-]S"Pi.#VQM"R kָ&'ҧHll6]ۑnD ys  "u @|]bjl#E̖YEFivVB-"VǬR ~V6ys@lIi XXYK d"dv`c\cHb>2`\"vK-[$7iiM2hdic_2kKxYfo,X%?ƑC-U.k*#^݋e )Ǐ5¾bT7Z5{.Х,gKgKler+juװL*0hTB=޸iFbn6Itezw$Q:LT%*rPO-L d=\׎B(HdWRS& a$lE҂q_SiRMP6r:ͤp*PJY6߿]S1URizFMϊTɺ hMM})X7M\6 ]ȿ lohR(dQ䘓Z }-DeJFe= g9غF|ؾ3%(J&;"UVTǘX\*HąF=zL?#1e%Jq@HLiB,r0׃d,mSƻ$dr֣X#u[fGY.uWd T34~VvmY$V(E04%w*85-A.MI,Xgw5|`0res ~W Ii^ WVqSj h$/.XT}6 <[S6eϚ,ul))x`:yaѮeЀW$[(5l#!d^l*E)1MDVuluZJܲ]Nodq9/벸U\Nd.,su\Y57XL$p2o07(eϵ:Lf\/cΗ)u66xl%)Icl8eXUY>éBȄT(T S?e ,V𥆩Q5M0c}1!-ɲB#3/LK(4:,Z]"%x+%\ѝ^].ٲqTȔΑ\]y].?FԸar+d)'{"\[4iJC)ޣLj_GYG)ݕjZ2u#!pq8VSMWznuxM\u(.fY?2/ /e9~KD@&Xtл{ӬrБO{&Ɨ4]yI0cViO14M|qJ)yl tF_J1aqáw{]^ফgmZY*@/ɡ]6*2{VDYM؈Fxzq}f-K^Mr̳Q "p|eH6}fpG݈On>/e4^<R:cp,Z~I'aQDJ_n7^/jVЊgK!(50*zf^ø)V|elaL%kʬl岬( C4|lx` vł:%<} 2QI M FzV^63]A#JۼgCWJ4U:KtYĤ8óU="<|<8٦\黾NeUkR2f0ciOIT_bf4%iI/cZJu+W0jeWPSʣTX@*3]_QDRkʈ1>g=$k evl@?mGXPΊz53þ[ KCLeYl7K<@ .gX2r$aRB`Lq\1Is;v(Af?}`8܈l+@J񞰗9 D"@AǏ}9j>Q,ꎵׯ_*O"3=1iI0K~#D"@ .?2#8>Q 4Z Q2"@ DW4ut:p?^ :#D"@@2ɓK;eG6i;$I==&9G"@ D <gwffj.6s""@ DLH`"*= ޳4Kjs؞cF"@ D܋7c5`ozW/AMPk"@ D<6xǚl Oo}Pc3I[4L4 Ɉ D"@@ iM$[,i]I}%D"@ G+߳Nz,Wz ܽ͜?ӥKr"@ DC ;y sx7cUcӱXowZd[8k~mi* "@ DE`ZaM#4nmhf3j۝"@ D cc{:0+LkfjB D"0-_ك~/'$&?l "@ Dl@^ @q8 D"@؇p]oNL$2cq""@ Dnkč i̱%XYDuRjd,'X9se)  D"@E })X>.lxJj~mA"@ DCx16^BRXQ7 je~l{ _()@Aa!nSHWwk7\i@i>!nqMf{B7҂" KͳȖ'&/XfHobV4M l,fָl3@wgڧTM5wl5%S=b !tW=yw59 D`-ky-qI(_s?h XJdGIFgIeB L}cGXw.75oX;M7E7K~pzCN@ E1fߑ|Eg'2"@ze˾Wolh.tc.PG<<|6.&ɻMqȟx6ĊD`90SL30.zv]B;QL6}7yHt\#stk"7"@ !C_G__3( kL̎]#U&nrUOEedB (ҿ<;o;r,řp4B^/hځS9TP$ UrJo Ur D]ElW!;x Y |dkwl[rOA}e^[O X?=Iu8L" QvI}9"@`?æMv>t:DBV4NVRJznoܤx2j=&+pmlr;3.  G`k!z.PpM\յJK0ջk/[ƊHZu7n.kLLbkslC-+$AlKD5f*?a|敕8w'Cyw2ebL)%T00 yJ0$ 1{Y1j[PD!~%epݠξSB(9Ǖ\\~ór*/aʌ['qZu|BJ\&Y"@!"'-OzO|-uE8͘Ne#U. ShpZX{ _9?dDv}Yv) DX[m; ^ "A +M~I-po7,/ș,G@nٔE\pD72$D| yXY]݁Or|?-}j'[ H(i8& $8ěD`8QOkdA X, >ERo@%U=K??Sj$] ~n ]#@P?xv,50). D 5B&٧VĎ ϔ.^ Fͭ7zmV #Б+M_a95H "t}*oliWMooJnfaԷ=qr6K |esf@#,%B [Ztm~7tI?u3CjQ˙(N|(r::@f_僧"=`lKu k$,D"pd.zl]/fyL׌ޝ~>-yg-7ׁƎL#0'aD ,%6o.4J-օؒ C B)O:CuF(˻ ށBa%M6lA#LR"Xq-wol2@qHG[og|FPJu/x ÷ג'DDp{hDk鋑'!9m#n)9jSl,ɯ2@ 76g8bߝ8T6]IM%N\ާ/L g"pW>3b.5v7ʴu*w2":|]MZ#\ ҤO& l*E#w弘Ko RH6D"G ^>ƄxTN֒nb{AEay7 ^@$;*viߊnƮٗut:?ꐎw+dN  Nb&xw飼MJkwc*+a!:!v(iD<,Zq'#]HV29!!DI~,+VQO$NooJ>_x,}BO~#x,Ai^Ȳ~S 6f⍉QoBǏv"D'p43?L?0F 2dY/ @H{nf%:JR`+g`7;z"= DOֿ/4x%`o]0-i`(8+ SP UpARIIF Cl`T|"R M߫5VdPApz2yGԯbfDh l%V" HdZ%RJd%2J6_LLUYₓ=vz ^"A}A4xzO4(dz6ezgaPZmpP:mcF.4M&DS >K/](p``Ԫ_v;tyeP)" 2Ţ|`a=nn..׌4 9ja$_ nǘDl2Lz:=,"@E`S4=ѧ?F?1˒#\!j-e}GU,qïuOndKUHOAwTIN4B)-~]zU |>݅(?g.v6V;_h M;ltٺ RákA/l>ĻJ&FWFS"X`y.K-^|\J5zy49,A'xE USdd$`[Ә2) ,ig؇"<tw1K]ߕa`6gf $J}9 ]_<H#M4L^y}~?û<ɺε*5[%$8\$r##`AwTcE Tg"p$KI/\q4"cȉ,* >X%Gy<,N;Db D-7 ҿF8TVvݞ CJ"@ 0tm:Uuy 5vR&7<i\F!g /"oyʼOL6{ cJ>FB79 rKs5)_vEsFy[vPV%sھVguo =ռ',G]6aq\Ue~e=\x-d32GfIf{|1ZW]49w!e!S7U(].wDf a $)P-C,  ,[.W2LnW܎}tK=$W"#;FwIb 4xK\Gnb{ӧ2ClGI)c~|%y~0Iv!A'ɪPRfK %EidzkxrS$4qO /A`Gg>;<*4RHe sV6padX<ʋ;) B ߗa5h_9\1;'}v| _Shz+i AIROȒ|oc[㽎vyC;tk!OL=2ء^x/xu$kxVZ|mBoHwV6Znwq '^DҜwN ^&~ʭ3R=5bg2T ; -=az )C}a +d Nt{9u K5'q IDRvC`EHq=r^b$>ʞGb!D#@B$?&'xE9wPvx#)ӟܶŝ%I^-M[: G]Io@GgJ7-#ջ9gq9=4,n"˘9ͨcЮNtؒN3o B/yJcD`2%W@ziYB u5IO.cx2o< 3M&Er:tGzpקG{'G׍ Qp>G {۱;5/s*g 8k8צH)<#ȁ3'{٫dD}=Y5.uH ޳1pZdejT{Y(PsdWגб OP*,Y!Pi̚*[crdD.S}JNv0o.ciI R@r'AA9q_kl-&IJΰMj&3>wlz:k2 %dNʂbFLrqZ@>% @^I"75{Ke1 iއtF_o%_sZe?@bt9{hSgۿ0L>!_h8okx&ܶX3}6x4zPO7x^5^iBt8K2:.1\f;ܸox˻K\8yG*qeOٓm3 9?/^k$t7Pr?ke@K/U;h,9Fw|;xK /vM%r:=AxI =X;"_읜n!e9U$ػ -~ybϜ?ӫ\cw9>nsq'9oldg+"~#yBd w+g| D9xF+5: o*d39noR|7Kr9 ޱs(Er2C)?/~m~zdSTi6xzh%sI; iN]P 2飴 %s/[UʰuvqGǾ۪׋Rkw4KK5LTn_0o{d- 9J?PEĮ9zwq5V0*FBs ZC =\7WvgrfNϳ'CU>]/;e|'/#wHꧽ9A uNM' 9,R:\7ӕaʞ6gGFM/H-=' nGvx-&+[#;C7"0=,{%10&cȟ9JNo^*} :xOAW"Pippg,/^z7 cl vHFI" 3psL<xFBtVcmfZ-L0{>LT} y~zw8K-5s"&x}5wկܖYBVģǣ>9"m@G0{3wuF  "E`$CMOGaG6&#}|GHMׂ(={G^CFB0\?9M$U (K!N3%"5WE+881fvFnpwR;rKZY&Ƥ ;Ɛw }Bޡ>[.}Sg526J>,̱țEStDK}^6gVJ 핊nU7uI΋P::eu/g[aR|['*n2xVbFi_RMu^֫22;_J,-J&{BDGHd(~{`gڳxFNq-'x\cF"no޺^D?fKzՃH enߥ[D!)\)&&.|qv]F7mXW9x `B/LCYTsq+oYB? pB9"g"Xq<nj2N53 Lk7~OI7xU~:I>.Pw G){&=X|'I^($+䐔ps*)?WE} +**GE! Jy˾B/"G:+mJvQ&D)K]#| )Fr~=5(VIK>ܕD"7~-M*h]"9Dk>Io)di\ulNG"!sEs=6-ā7?ZMQrԦ+^jz[rUkQ_3ų@7x&`sg ^6W}H,|F2$[ "q)_ZV[rT@I\LMnR"T|÷v%b*s f2<$l" J\T'c/^:!4'! ^DH暁5.^# g!}?.=V)K>]liFi4Q1s ;s@ZMd& [z^/[<:otQgz-FsSȬS4'ՙII~}2&xjpsb<[<.{`Y#Fhr#gwHMN#O;d2<|p}FIп^ #L zW%g]Dd!Z5ߐJ *bn?BcQg8' &55RPmڹ,*i@#efŌMbM]A8YY%^X52qo$ABл;F^4M$3?͑*$$LD4{HEh5#Khxb~irbNOQ;[łkмĸσ<)#uƭ; ASvćG)&>a%>f0=G @]Pt9Cv#BkfڮHLA`2 yZk[wM{pp˥5f@'d٣6d ƚ|EXz5Nl rq{MgJkٛol%2Cj`7I57Xh2ӼxM'.cQC yFKztM`aIRq:Uת0" M|Q SڨْZ^znƬ+́:ԙ^Cl .̍t\b9PGq=*MVorhjWb[ \fњc7xϭ~֐- 'xԗglQoax6:OjÍX W`ٻe2A.Dk-L Dzf3'\]O:'7h$W. iPA`K/B׏ &כW{kYzK5iӼzC2ѱ`j̒sC TM<@{7G1.N;=AI SG3x2ɬ# sbeAz{'W_ؒv \#r=eȘ$[; (Au2pJ#ǕH0i(:IB3'Q"!0ms^*{1NP`zeOi>,ҩ3V V̆L)ap&inqC8q8 6xG(ae7_gw3Vkg7:&ڪ]b^oh*P ئnX<rVkJ`Q V[ɱIױBeh{2{)-t6hzo&mG* #>N8X: Wʳ%V7 T~WJZY <<-N8*Qn_:?̾4E/9pܷISw3$3w7x:wAaZM+:'4yRZ:Z'VB>n+7A{+Q{oW/wZzZ<r;$ɞ۞Uv՜A@9kR&rɳ~UДv O [y M^9 vOZ3 ^I&aSvu"͞Wt\d5g\&Y-DCtDF8. {8ȼ3gKׯ_2नwewL`h}RpKgܿ;WɶOR*z'/2p^S Ąd#|cJYQ3PH2)/VgLڥ]]'^l ?5wBm<-vZ#ײ]8Q@Z"<כsOAieNsp/^]0>n3ͤa$MzS\I 8l̙VpmU1_;*lg~X!GLvWUz}g,ozPͪPӫK U\"sv!0ނhx79&Bf;_'ɕBg^A%J+DO$Â=n-i\oQǒr+7x[#n2±zQ\%33M6\ǪdkɲL$+&4"S2BôyYhOvye oIe-dZAj#ͩlW0iUW$[`W&>٤.ͷUs9x%bs?r-A]8X857<4xxO^ZhӠH&Kϣ2GvЅ>e=* Tgޚ9~k#;܂ ;4~~rbSꝣXn*a~ ʞO ub.@5!}#[Y[(#34R1Y 8􂩷Pz/8kʹ@ólu}#gw#'ĻOm0m6IdZpP$|H"L uNto{|Y,noV CB" OX NW*Eqt/9P5lK\W0? _ ί.4cI&+!ٚ2 G{;m$"< uu5g.feG& n3]W+5L4PM#|_%md{g݋"VZȂhcrM0D)U)D&mNW" mbOa>V3kݢi7E5i@'c"\٫4xvO2se~,WM}2s`ا9˾ zLT&m>Ckת@ ^1<ĔeBuXɁ:7cuJ_ yv $cSpPp8JgEDLhtF@<~Ҵ[-3ӻiMon3?D0F6Ȅd%[0g=d%}~뽣UhD/Q%(>2Gqzӈ P6H?~oε ]eFG? # Sk\\ >֬BK;# T`} YH >("qJ`RJ)&DlP(%3ɘ`?htj2{9͢7un#wak cP0] k 5w:ܽ'曍ݍ5r9Ksq8k $ޠZ}ƂhUx%Y@}Y}4PWi.&g0-/ QY>џUkqV^eBjG%_ ٤W) o8:kƬsHWi3"у,yJ]4Xt3-eoFdH> d7nJ_xFbdwNCo"7Ÿ$ov7xI%,Ndݵq;v*Ae+d̓;/niDG/Rw[.cFnl % k:}ਤ1*r,5xX૥#lf/u!M?=\f! p.A'l 1]Fּlច!rPc}k s̓4bsH_RVD7z{oazҸY#6F%bxqcʫr+<}ɦZ${H;/;8fspW)5x4[x(2>T `ʢ/jl"}8VM4{p)͞J;1cLI1wڨ*]܈[^@Y߭l~*Y/:/:X7!o.KtYӅJH ]$RiDZ %FL63^KT.1-A)%V]a. `ϗi.F6KٳU3y`"iSEZo\΃y1W_3v6k.4Enon4#/  )y'oUS̝mX٫,p]=[qp:D* ;|;@wr0SFݞVES<)Vb98mHR|gM",'g9z9't݄,PY"hrB# v 5 ɒ=GmGi\Bf_oD ˖suq,fgWqz<|eѮ VZuhy}7OM;u ޾'+n֖aw4O4e'xҩi*":=q~=D'Hf"Ght"2FUZtgh 0}T` YIvJYt5iVfHy ^8ҟ ٟZ+*g+? {lskzh#ދO/1&oNLY߫T^Sg.M݀ 3R|; w{G3d,m;gW&%歳ڃ@=,ƓFiU44d7M/d[s[7x%G[q/i"f2RyYj'07P(4 ,S5#]7)v@ X-d/ڊRs#=qۢmJrI KfD\brld %+i)蹖Lt04 q1]n3fW">2FԎe7R%ߩ{.6tX46ˋ2LS*ڗL &D[e>Nb~n4RxIk%TI,{iž%2&es6xq CW"𗮓ˈ3 'MZk nm Q^T{I؋~4n]6SZ(z%me[։2yLj o$Ӥ DPցHjq]|nV"TRדZϐM&fñM&MO#{e3> 1];?K#܌Vz&{#aZH9ܕp됙=~tU. <ξ]( 1Q C8=odƀQFQylZ6V6JĠM/LH0Sئs۴Z.%!U˖cW]W{Wc*,15prc6kQ Û ug)q֫ڼkqu]in47 +=鰦k8WD4miu)@QW;|*׭2 r{GxML=5B{l)pڥJŴjʲf]JTОYGXG8gAS٠HA^8M Y&&E5i;#>eRB /5/p&ڈ{ ޕ{6r7xR-/|Y)L\&g (@\k]k1.T:ӽӋ,hc ^Ɵy&H`%[Ehfر0ӵ]#"oFƱQⳓ}ɳ>Y5,%2+qC)OX3 X`*uUZWW,o%e{_}7*'n ]V.'x8 /.D,L$~% R;Z7ѭZn@H'o ҈ MؓoJ#M6@Ο/ o,{Jcٗ l _Iae/Unz4 pG|4 ׊nop]ؗ(o9g\ *囲=El uY~̛&* ɞd1u$Ke4]eX^]CN#G!54SwLsJ43QgHxY)4B9FBS4.@S_˱̬qcAZLJ5> Rf!EZG"^8͚,{6*qӝ??<$Ho5ƶko,huL"8I: qxsEpX"s(؈5\Ө0̲~- Yd2 EʕMYҘ2B$z . );ܥBlQ4x׸ߘиԷ79T|iDi:4bVHԋR2zh4';).J}[iz<xUg{+O볏^#/u>w[yjS?S:̂o"'xgG˲CBoVn<bT_ ar/ 4{Z)5Y`3q$C3eM Xd*4 62讷c1LX >f^x GhBw/ +YQLp RBFl"uS[ _UG} E)қIf#F_(6{*ok$"Lor0y16&Cܫ4ӲgA,dWdf'>|TcrYR k/u;{w CE3 NCF}e&5Ln_;*1x˜oS6:#MM-MSN8lGF1UeĦy@8WXfoө왖uR6r.^Zm$:eIw r;$'OA~/ ˝^u4z8KF2+bsvR_QFLf)qYqc&@ Qbg+fw=]j{4tNo2YR^`;({D]]F'[pu3h/u/є0EOZdU^oՖ~7x0d|t=W"/ΔeMՄ";64zN`YrW4ni9i\+Rϊ|#uh I :=m9bi=BB E˽.< ߵO?.x_twqKe+d\-AcĦRMM{c 7Uɻ@}lԣ<鯰sn1oCf:dSLa+3FÖZ[,Bv>X`.e4.H聁A+"jxId}jz8Y,8z蕭)/41kvJ1]}nP,#FgV<לt-g"7n9'|XD3/(Ź/n)[>c{Ǥw l9>['"iJ| Nq.%XdOtq!\\R]+LcĀHW)E~_ 1jg+5mD^޹l# ='~ۚ͞E 0\ ut^n_}g| 'jLk ~v]l5̰ZKQr-2hinEM4 ?%~Mq>М&X ݔV9]F+V.]0sOtEK|K#M6ps F~aE/X#KX vBlWC lBnJ?E [iV%mb z R"7^ vք,J[(%w`LYKflE}]u=u aV#Vߴ7C Zm+dJ*O_gdX5o&gۃ", |\LLuKE-1A1X2B̴O&ֳnE)jHrB,;0[#Kg./S}q~jg_je5RP]FH(K}K6]mn9<ִen<1s7l!KruwcțV{OW3Ϧ`ǥ]ƻ;}p̵Faޱ72yKY,z*<6W6hVK&S?uWd>p]6Yٲou=zxA6]of,ƎNPpL]!KVOFf>,,udwL#swCl-cowQ4%X4 z}!ED hFևi_nU Ր/ΘJri7@DLnz:dP\&ͧڼ}KmɾV]鄠JgVlpT c@( ebopW ݣ{d_˱8ʹIvvw /\+-;ϟZjRStDޢ|~} X_j} k;jfݑ.$|0aCd{pka^sˬ z w\,z3}A&*z~UʕƦ%@ g3(y'K4rBBY#g~R;\Nh4B""oqcv +>"uO˳|cw ;I 6x!` UpٲA 5Q]E+ >OcQ& ڢ gVEZ{t7^Uy;kݚ2OX9i.?AB r>ІnÏ0YDEȔ]pd LJSga+L|=}x`cU"v!Qӆm3f:ǃ$]Vx?ldd;}v^CӠO-{ n\/HD&bۅo]w^]R+g/!0H{m j{hήWD0JtzM@y_wCkS0+ Z\c$4wvCj %35G4N,I+ܖTe0DE2BZ /\˳ے;)#w7x Sx ג>q+Q]ڍKյ>v4~mȖO:^WK@KlE#\ eu=f%lʨfFoY]XAMosf.2׳vǙćlS^KF6XjIWXo|qX{&+D˞zɛ7.0 U3@{0$.; 4ۼz= 4uA/3W/*4}8a'IE (jD2Aq v9$bQ )Rոjkf=of(l-t(.')33L_hDP(gA^6x< +{v73U!ָ`Y57xYױ$F4g6x%O4eVۑ<|}a7/ξ6*& Jk|QV8^w-R;]Pg#XF!ZlQ2R{JMxoFn)mB})BjVK*lt̨#w WWg_*mܚl/)uA/ckл'9z9ђcb6'!4O#;$ϰ Hzlnʾ 00"{Ddc4%7+nBcL5S] s@+ܫɳ $6xU?Rѓ]*([[˹OiɻKs^joѕ6"[uv*uV ,F}du̓z6VSú ˓pIe+(QYJaoN[y4ͪn^YZν|-bd'7I /}L)ꪢ^ZfLeÎr0X ՉקG(ASWȼbmW7]l'G:1ˀ` 6{y&޳%5uu#s4p!ۗxٰ]& 9+wfaV"K~?gG8cJ~Jj3[X%&i@tI?#B(%#%DϘ7:$147)[)."hUaזS6zg>A*}wFLVouC䷺hܐ^*_P%E#= BR;iH5! $GA@&cK2 ڧ-. a8mKbm 0,.eYY ꪬ,gFx1j;^s wFXB]@UGIY]CPZxv='t_Ↄjâ^?@A_&FORv&J5.ڴv<7-asٺ,MМ֫,1!X|{aMdI^7IBW\=5uKS=8QEM,kE ;dȴbWYjw]>W|#h j܂!L3|yƧHYtdޅC r\ eD,06vըg-~k9 慜/θAⓚY˙Ě(f3 - .FGBjz{y u Wu`\ CVoVڕ6Ucݝ"=ݪUQ ֈAXxoky6ݸ(uXX-;N68#JAY鱖g?p~jBBߒZR_xCto|gҭz};+L<"V x]vỳD̒urщe&/'ANL)+V\ 2_jN&õU(f. -k,oXF˵n2_3;=M O#&?7e5,YDmp{7o|S;q"z7 &= FL4$wT3 | we1ߪ-'+[LC5AUGt?Antuy{,nAwx*"ED%,n 6eѹxIbonG\P?\q`T}MJ#Mq:C}BZ5o v-=@gkuzY`h[j0Ws 3+me@t>$vAx^ :^+x`wqmZ.+[.R)Akw>r:*2J6u`q=P(heqcCPNM'Nx V.DZ#|X*iXM::hݭQc M0  ? ޼ᖋ]a/i}[!Q:?e"}`o\6@ HPZ+Cbh A>Wi7zRZ8Czx#m1 WY{yHgpi >|Y޾zgH$:k{S9_ʀ~dMgյ9#YQ.1qָ9KBw07x]WH<_y.^NӲ $KNhldsJ\Dͽ9)CKU{M_omZAg 򦯋z ى&4t!YEۀ5L˭V߱P*ȽBľzyJKh[]<'4xb$lOl[zS(9o> C-bc@~kn]^7C2!5WcޜW Zw۔A=ugdhθLLM%kgPkߠ6BqE L2>O3]`J f!uX]<;\z0>\GYm^h@e|o;/"+tb]<]s X@ k=c~{Ɔǝ!ө25>;Qv]lHQ,gqg{)#8Б!OYb1%h.>`/kteLJϔpT}!\_yjSbz73}y:'x[}M;<茂FVҽwj$? J/-b*E*deg'(Huk=ɼR}sY oҷVѦyWMrfkEFZI-I.gIqh >O=Ϫ G">pkK?^j%pЊR?^a61OpdZ5,{g yϻb.YZHet4=$L.9Q %}NLD%"o~BM,UH 04+$`ly}-0[6#UձQD$249&(;tYJO.f*ogNŤWak*]^f.HS:R@EJ\t4bGkPsrϒoo Wfi=A2dL\Rf˚+<d}gkcɆ -*m1cg5YYkiKKq$[cűXH_';PdzK-d~gr[wC6xY7x+@Qh._^GXz<Ȩ Qlbz٢ζvcdlfL*d̋Шf6Ձ,o 4ƕ"!0'x#IgFa#͡`D<%R,e[}vI5ujMlѽ"Z})SVl/pd9Ƹa1``fvc[,2$3uƮU`1eRo\Wi;"@3 vG~ HJO0V;tL!"8B9g NxM>vi:X|ʒpj'a.\K1>9)uCQ҉Id4.ö6m[@I9\Qwh 7vgr٭5/A`.9%*`XdRKX&#.]liMo{O,{ZRPePE⦍=[byar9MkNώ@ioQ铮_`ɞ1P>~0o[lm%5lG l9%cKZR{ĸڵ zҦ)MkTl35H(rljT|歂z#HnP fI28)oք)'ׂwW-%VwyڥFB84l+\|,vxa (6xU,G®{-3VGwS *bfR!dKkngh о]F274TuRܚ~o;0^kgPM&gyD>K5փ~Vx-OYCzC\%#7: Ukjaە=1މtoj# Nc}ze]K{rӫL<nXN$#z̏ݚY~M?j8o]UJS 7Ḳ00[Ʈr3a8&)!ViжICgoԭF6 v齂4sG(b7_?,:<.L=,?s__ƋdŒ5]: GV;e:/O)u/޵!p0],a ~90EhW+YWS6ԊJ5ނ"!z k=W9Fجի62ހ~o7O`[Z}KjڂiI#ގ@?~\`KS3Ux|iMM&JÖ@it.j!mD/Sp(8۱oQgZ[ p%D .g%ڛ`库<iAEh6rc Otz]w 7=pV?3UZPA{S&[QN]5>񦫜 G Y{[dwX{>rQdXhb^~rB`W!Jsl:, QŜD┎ڼO1kָ:{$E1**%)tGUm.mn+0럢X/F =lB}tx%TUge MN2'Z9'}0&IO{"7!3&2W}W.}* kyϪwA*}X2 rH0\zNrdx KB3M` \]G  ;]y|5@!R2pfa-"r7,L jdX.avAIYn ѵ҅uiM# 8Fmw 'x] G Œ"ÇZc$Lp[5?싪Ə_ȕod}.x,"Bɱ|^B??/<vIGY>H>)Yōxx&/hۧ |+׸SL9@ 6x6Vh94_T wA `S/g4laoțz"B; e:.Dw TR*.y)q2]%'WYr 6[cR(9x &24ƚxP"ЇBLpI57d0AO8>+X}cXz$[ίp׀3lE641@/6^LM LIzI}?dS9(`m=zd@rٍOSc?xL{)GBfOóB F MZ5c{KO^`ge$iYu⨫OFπtusؑG~MFyG|`j|,)WXA86ˁ=x9@ x.8\WW!x $|+r&= jI8:t>9֙>ɧd>@ay>"am|SYuG=F@[eCC)9ivrKD1_!~-gwwȳZR^wa-ANE3FHdU4FTzXJ]nzEU}Evsx/ӵ2ݳ _P ުT]Wj*p`I-؀\>갠iSj0 BI6ظ{KcSXTlr!rWD/O-M/hGVY u!<`Cll^5|4tX:\F@sc8ЇъOR䜼ڷDd&p 6MFMю$dtU~mbs-aeK"D0NoN2=+F$O=Qz:O3xsRB`io7x@i\ ]Ңx.Yݟ^(tx"̖;Kb~_߹LE!h}\D t˺`u`A)"%GKOv`pw^I9X*4h5_EO:ϭԖ1^Ĭk"4x=Aիز[$ C l*CfQm=Sl.njP':/n](08E6ɣ/GPdf#ctO/5ܫɳoyXQ_@ ubcO)|"dW̗a~Hq4xOscKx?hFx9B4+1BW8l26Ѕ-²CxtK.M7Qfegy Ʌ2Ӊt4MKBZnQދ@h7VR7ٞI/c3K XaJO4{guTX:s=>%<*8͵nl͍lZO`[y e8Cړ׎cmw`?*b[dKɻ~Nkc-, v麚V*L0 lƬa4>. #Y""Ĕ'8]Amئ79Q4&* X\/ t$(Z7Bv\rwX0"ۙ4*"&qh;'w埤D\ÒXHhq`k"2Z$?m%~~CZɲ_3xD!Ƹ,樏8™!ϑ ճKXßͫcɌQMFnoV)KfK(K=}N>j7;'w]ԿlDſ2b8ێŚeؖT$fpvy%䛸e92K* 3%O&Gpxnj:-I%+Bߩ.Bwz'O)nK{ܿn;[!\!okcRdo$MKso@/RhwJ>0Ӄ&"k`AEίMeE^6sވRCN.9^W"?&Xx$-慔p^eOqfW>-@̾,~eh4[ ץZ]AkE2Y2˼Á%*[|;mq{Y{Ԉ%ǵkQ %]Z7YӅs5Zr==;N"L)XI;?o]PCc/~v8-3 bq׺LN-[×;3 Iv^pX'x B8|A:Z* >z8I!K5S&~W-jLgx@j X?+p5#8|F#5]#ɤ O(Y5}lO[A@Nn H1=֌٩u d$O35\D} g9! |2\{XyyZdK'+.*dMR'fBh;A ' s}Ӑz՝/R.TVh) +Eiϲ>fJp_ָgzC:?Gs3:l>m{A1>ʒ!K<DfTiM%b< ^(Bv_p%bX'/0VV#r;%ie@ f.y?@!nd@CWCh҉B+GX $J5hEИhm6^`1גY"?Fl ^d|iV_&DIͱF5۪ȧ'x_2yaX6Lּ/ Or~&~C ]7{MqoN?}_ y#-yl>{t˦uZYq&|4p@sRuf$ƙ&Oj.YԐu^ n|ϚkqwTq,KP1p[ژlEY&pk@ /h΁+IV6. gAJ=n\bPZ$ڟqzSL '۪ 36EiTW:79L, &g`-z/)zr-Or#"]#R=F?w]) Gw=QsojW":}"{Vp@_4A$jLĭ6{{flX }),nq^DZ> m׃܅Qċ=o; _ s1;yHv?]կK)B 8B'1kO &  Rd>Ј!0gJ,B5|y-UNTBs[d>p{W_ڔܺX|E+ْo~ %7.xQ--5a+׫gHbK^ewH^{x'RaҠb$QM00"M `Msa{z||[[+|\WbD6'k~+y|HJT4 ]b\/tڄNVgHO$ MB qBC9 w`IyWξ3Qޤ@MoY+V-{ׯzr\ ޽Nvv}o×e]3lZҊ1Ny*_[;18rEsI&YB#,)ss)@ Ǟof>T_m?VD^V7^(74KqqKE7f,A'VMĺ yo{ZIT:'Ũ&7A`q6sND`󿠐\Ǐ_px'(KbK-&.b"Z˓܈no+,-%e09/xdDJm,r bjgnŀAl,8/1Sjއ6ScϽ̾3gX"p KV9'F[lt`WƞǫKjwtށsoT6i ~%VY9~$ eai7p !lbk2mCd7"X旐Hsuhs0糪7iۚ b ox^AAoM|P;y"d7`+ 4+9^{ p%tkg?oR 6x$ d%^R?'cC 7,.> 6Akq:i/LZA[aƥ{C~m`m,Kρ'x4Ifs?{UD"/to\MN82]/4xwK}0^xBo ^7H2q4ƣ^dYSY )Y6{qp6x݃!RW֣XuYgyM|S-ޘl5\TU"Ά"#%@ۄK v -rBPZ`իXl-6;?jсTww3sogK^4lMO5֟놄_7v?3:wy-`{{G( X!=RUJ,U3tFIWI+ f·яeAHdE`{Sg@{"|*Nhn0W>>lgSj-Bv 9wk*i } Wjw6y7:qm 飺b䟷W&;6vk vKڼle4"X пU<gdl'?Vlρ:\ Lu`ceK|oDe8|+&^"ޟc%4z`xr9k4MlOb._ &$G>FI2ij6x%"rF1Ԏ386o6$߾dC%aJ%uAS\L+Y&'+wbg,axXKZ´G,L% 3]Rg;:voĥlSy$ljYu'.ARnGR#0fCZ_.7jfSoyك?9iZ+v(&q(%s V%5}˄Ƙ_(70{%( 3@S8~!7o)Ivjh=eD` 3 ^dAS 4L<؋4@3̀pub:npFȧ-4I_iM IrDHkGuxb/c..;ܫɳ ꉁ}M!A`FT ;k"iCMQ‡sc(%L/PxzRz$i^%yĚG[ ONi/6|r&L 0~3ђo !]&WJ</73)V1 HsRgbR9V{H쑹&IDAT׷ [V1R0_HKnK~a'{ҮROC4D` lV&c7jBu2~@ZngAxxvc g#T=~Kcy͞0/ԔpKG(1P("0hΠyT܈:ST< 437j}ԥۆ )pEbO/sbu=I; ]!Rl99L&5.st WdOf*x 'K8%$x3H$HL2"q&w֥cX@$e !xڊُ?[_ұGixaqfC%NW$' B\"+ *LWf﮴x7ohvh#w2>x"f'|.}:MS <.tW"p1GTG s!n}rpScx,&I w)幅ZӻGXЖ&͘ WYLyr) LpɤW|DSbwow ڛ= htf7GK؈C]EOה y ]r^"@nD ލק^xw);oNnf٩ǨrO|N w!hޅ|s޿4)H@iЗNЮt"[ zQ"tI^tSR~"@kwވyL$W"f _ߊ wEb"0@(9^ΜDÉ ?؈F-P:klV}7Y"@!+1n sJ" n|dvow*!"@ D}{MFfڼtz4|B D`93raP#aDzR3y2ô 苓ޯNrr D"E`iD7xY0,6]Nl1IB8"@ A wlMMߏ>2y6vxim%! D]ʯ dqI"0/(lJدn+8"@ZXs! !+"0@j&&_ο~UjXwF"@ u!<XcSO!;,n&$]́/UpU>T"@ :pF"@$5J0L'x(ow/ D"pKjӔzd{;:\@_=.w]p"@!;^ 6xǚW58s"@  Bd9ͫtOO E$+"@G EqzfR??͞t^r&D"ǜgX7e8"?edE D"0)H?oL"DL6}+o-"D"\xsk FB`[rI8ȴ"@xleOjC Z}%Y]ܣ1"@ E ֡lD,IRwQÉ Daa.9x_Kǀ"@ D<gJDFo[`b֗[/@Y9و+T'笰;FR+5PeT=cCKvԏzAU2lP $ԙ/M[ W0Lt+Dfibӄ4h@`(?U{S J@CYbS ixvRg!b$[1KsOR PIrV(1 xb잵@)t E~RJ̳"f^uv\JǾ~GRG@]X˦\cJ%zlSp&k` cǐ{,N⩲U+u5~l6xpɪiV&]bo4 *ɶ:_KK,em(Ki7 n{eǫm`&P7aAӄmW*R-x%kaLX>fD\@6z)K&Vp˺V"7j&d'Fy׎DSȌzhƈIYI"+XԿy:<4AߚIp 4 k "J`لzA㗊^MUKpK~aR DK vk#qVY*fk&[4RLMɴFfz3{=:?ZR f]7Xbx2C%r}HÓhl}9t?3J[91dYbG\ݚ]`ɁMҞm"e(#Ű+P#_:kFK,6x'kS4K:|8gL`dm~-AF鯛g(&2$@.LVeOx dn'2'fKד4(X/#˯KX6~ZŬeWD~ < &+k[^GLl)3غqLRbw0+U:{i'c _aHi+On3 d5v|glaN dc$j)e9ցe%_|#}IJ\@`Р'i ^p4~{%!^oiSTnf#[FIa.ɳ I7be!dVϪ۝Ӆ|