ࡱ> uwnopqrstM 93bjbj== &WWK,Zl$w$w$w8\w\wt 8yyyyy_Al8       $  d> _> @@yy;S $ @fyy  _v y,y s{TW$w (|  i 0  |31P3  2@@ Project EE/06/B/FPP-169000 Learning Materials for Information Technology Professionals (EUCIP-Mat) PROGRAMMING Number of study hours: 50 Short description of the course: Module expands upon programming methods (object oriented programming, structured programming). Student gets the review of different data structures (arrays, entries, linked lists etc) and the algorithms of their processing. Students also learn to differentiate different translation methods (compiling and interpreting). Module gives also brief introduction of main program constructions (such as iteration, conditional sentence etc) and review of program testing, documenting and managing. Target groups Module target groups are first of all vocational and high education students, who specialize on information technology, but it is also an interest of those who simply wish to pass the respective qualifying examination. Prerequisites Passing through the module does not presuppose from student any former knowledge from the field of information technology. Aim of the course - learning outcomes Student who has passed through the module: Can differentiate different programming methods, such as object oriented programming, top-down engineering, structure programming; Knows abstraction as the method used for solving tasks and development works; Understands specific needs of legacy system needed for software development; Understands the attributes of different data structures: entries, arrays and linked list; Understands relations between multiple widely known algorithms and above mentioned data structures; Knows basic types of programming languages (different generations, functional, procedural, object oriented); Understands the roll of syntax in programming language; Understands the differences between compiling and interpreting of programming language; Understands most important constructions of programming languages; Understands main functions of automatic testing tools; Knows and is able to use testing methodologies; Understands main functions of module, link and system testing; Knows and is able to use basic documenting requirements for software development and distribution (f.e. decision trees); Understands the conception of well structured program and the respective documentation. Content : B.3 PROGRAMMING Software Design Methods and Techniques B.3.1.1 Main features of different program design methods Software development is mostly teamwork nowadays and therefore this field is based on different rules and methods. Those rules and best practice is worked out foremost for making it easier for people, related to software development, to understand each other, but also for standardization of their work in order to make it understandable to everyone. Standardization enables to ensure software quality and reduce the time and money spent on software development. Software development can roughly be divided into following subordinate tasks: 1. Description and analysis of needs 2. Design of software product 3. Execution 4. Testing 5. Product release 6. Product management Description and analysis of needs Software creation begins usually with the description and analysis of needs. The more precise and correct the description and analysis of the needs are, the easier it is to accomplish all the other development phases thereafter. Main problem in this phase is different vision of the customer and software developer. We can often face the situation where customer does not know anything about programming and software design, but he does own clear vision of what he needs. Software developer in turn has no clear vision of customers working processes and tends to think about different software implementation possibilities and tools too early. Design of software Developer must think about different software implementation possibilities in phase of software design. Main task in this phase is to think about how to implement needed software product with as little money and time as possible. It is important to assure that the product in creation would correspond to the following requirements: reliability altering contingency comprehensibility reusability At this point the meaning of reliability is the fact that software must correspond to the needs of customer and how the software acts in situations not described by the customer. Software is considered as error-free if it satisfies the needs described by the customer. If software is functioning as expected also in situations not described by the customer, then the software product is considered as robust. Altering contingency is also very important in case of modern software solutions, because each existing software product can be a basis for some new product. Therefore it is very important to think of what is needed to do for reusing the software in creation in similar products. Altering contingency is also important if errors or nonconformances to the needs are found in software product. Need of the comprehensibility comes foremost from the fact, that software execution is done as teamwork and solution must be understandable for everyone related to software product implementation, testing and management, and also later, after the execution of the software. Software design phase is also the phase, where it is necessary to decide about the division of software solution (how many subroutines and which ones). It is very important to consider the reusability requirements, while dividing software into subroutines too huge subroutines might be too difficult to reuse and too small subroutines might cause unnecessarily high primary development costs. There are very few solutions nowadays that enable solid solutions. There are two approaches in dividing the software solution into subroutines: top-down and bottom-up. In case of top-down approach the inception task is divided into subordinate tasks, each one of which can in turn consist of subordinate tasks. Those subordinate tasks are also divided into subordinate tasks until the inception task consists of simple and clear subordinate tasks. Shortcoming of this approach is the fact, that it is useless to use it in case of huge solution, because inception task would then be divided into very many subordinate tasks and this might cause situations where one and the same problem is solved repeatedly (because multiple subordinate tasks require solving of similar problems). In addition to foregoing it is necessary that software designer starts to think quite early about concrete algorithms, which could be used for solving given problems. Bottom-up approach divides inception task into submodules, which are handled as black boxes. Thereafter it is necessary to describe each submodule, i.e. how should it function and between which modules the information has to be exchanged. This enables the dividing huge inception task into independent subordinate tasks, which can be developed separately It is easy to find reusable modules, that can be used for compiling a new solution from existing solutions, in case of bottom-up approach. This in turn hastens up and simplifies the implementation of new solution remarkably. Greatest problem of this solution is often the fact, that information exchange between modules and managing of data exchange is not precisely described. Often it is useful to divide inception task into submodules with the help of bottom-up approach and in turn to solve them for good with the help of top-down approach. Additional reading HYPERLINK ": http://en.wikipedia.org/wiki/Software_design" : http://en.wikipedia.org/wiki/Software_design Software development methods Structured programming can be seen as a subset or subdiscipline of procedural programming, one of the major programming paradigms. It is most famous for removing or reducing reliance on the GOTO statement. Several different structuring techniques or methodologies have been developed for writing structured programs. The most common are: Dijkstra's structured programming, where the logic of a program is a structure composed of similar sub-structures in a limited number of ways. This reduces understanding a program to understanding each structure on its own, and in relation to that containing it, a useful separation of concerns. A view derived from Dijkstra's which also advocates splitting programs into sub-sections with a single point of entry, but is strongly opposed to the concept of a single point of exit. Data Structured Programming, which is based on aligning data structures with program structures. This approach applied the fundamental structures proposed by Dijkstra, but as constructs that used the high-level structure of a program to be modeled on the underlying data structures being processed. Additional reading: Edsger Dijkstra, Notes on Structured Programming,  HYPERLINK "http://www.cs.utexas.edu/users/EWD/ewd02xx/EWD249.PDF" http://www.cs.utexas.edu/users/EWD/ewd02xx/EWD249.PDF Object-oriented programming (OOP) is a programming paradigm that uses "objects" and their interactions to design applications and computer programs. Programming techniques may include features such as encapsulation, modularity, polymorphism, and inheritance. Fundamental concepts of OOP are the following: Class Defines the abstract characteristics of a thing (object), including the thing's characteristics (its attributes, fields or properties) and the thing's behaviors (the things it can do, or methods, operations or features). One might say that a class is a blueprint or factory that describes the nature of something. For example, the class Dog would consist of traits shared by all dogs, such as breed and fur color (characteristics), and the ability to bark and sit (behaviors). Classes provide modularity and structure in an object-oriented computer program. A class should typically be recognizable to a non-programmer familiar with the problem domain, meaning that the characteristics of the class should make sense in context. Also, the code for a class should be relatively self-contained (generally using encapsulation). Collectively, the properties and methods defined by a class are called members. Object A pattern (exemplar) of a class. The class of Dog defines all possible dogs by listing the characteristics and behaviours they can have; the object Lassie is one particular dog, with particular versions of the characteristics. A Dog has fur; Lassie has brown-and-white fur. Instance One can have an instance of a class or a particular object. The instance is the actual object created at runtime. In programmer jargon, the Lassie object is an instance of the Dog class. The set of values of the attributes of a particular object is called its state. The object consists of state and the behaviour that's defined in the object's class. Method An object's abilities. In language, methods are verbs. Lassie, being a Dog, has the ability to bark. So bark() is one of Lassie's methods. She may have other methods as well, for example sit() or eat() or walk() or save_timmy(). Within the program, using a method usually affects only one particular object; all Dogs can bark, but you need only one particular dog to do the barking. Message passing The process by which an object sends data to another object or asks the other object to invoke a method, is called the Message passing Also known to some programming languages as interfacing. E.g. the object called Breeder may tell the Lassie object to sit by passing a 'sit' message which invokes Lassie's 'sit' method. The syntax varies between languages, for example: [Lassie sit] in Objective-C. In Java code-level message passing corresponds to "method calling". Some dynamic languages use double-dispatch or multi-dispatch to find and pass messages. Inheritance Subclasses are more specialized versions of a class, which inherit attributes and behaviors from their parent classes, and can introduce their own. For example, the class Dog might have sub-classes called Collie, Chihuahua, and GoldenRetriever. In this case, Lassie would be an instance of the Collie subclass. Suppose the Dog class defines a method called bark() and a property called furColor. Each of its sub-classes (Collie, Chihuahua, and GoldenRetriever) will inherit these members, meaning that the programmer only needs to write the code for them once. Each subclass can alter its inherited traits. For example, the Collie class might specify that the default furColor for a collie is brown-and-white. The Chihuahua subclass might specify that the bark() method produces a high pitch by default. Subclasses can also add new members. The Chihuahua subclass could add a method called tremble(). So an individual chihuahua instance would use a high-pitched bark() from the Chihuahua subclass, which in turn inherited the usual bark() from Dog. The chihuahua object would also have the tremble() method, but Lassie would not, because she is a Collie, not a Chihuahua. In fact, inheritance is an is-a relationship: Lassie is a Collie. A Collie is a Dog. Thus, Lassie inherits the methods of both Collies and Dogs. Multiple inheritance is inheritance from more than one ancestor class, neither of these ancestors being an ancestor of the other. For example, independent classes could define Dogs and Cats, and a Chimera object could be created from these two which inherits all the (multiple) behavior of cats and dogs. This is not always supported, as it can be hard both to implement and to use well. Encapsulation Encapsulation conceals the functional details of a class from objects that send messages to it. For example, the Dog class has a bark() method. The code for the bark() method defines exactly how a bark happens (e.g., by inhale() and then exhale(), at a particular pitch and volume). Timmy, Lassie's friend, however, does not need to know exactly how she barks. Encapsulation is achieved by specifying which classes may use the members of an object. The result is that each object exposes to any class a certain interface those members accessible to that class. The reason for encapsulation is to prevent clients of an interface from depending on those parts of the implementation that are likely to change in future, thereby allowing those changes to be made more easily, that is, without changes to clients. For example, an interface can ensure that puppies can only be added to an object of the class Dog by code in that class. Members are often specified as public, protected or private, determining whether they are available to all classes, sub-classes or only the defining class. Some languages go further: Java uses the default access modifier to restrict access also to classes in the same package, C# and VB.NET reserve some members to classes in the same assembly using keywords internal (C#) or Friend (VB.NET), and Eiffel and C++ allow one to specify which classes may access any member. Abstraction Abstraction is simplifying complex reality by modelling classes appropriate to the problem, and working at the most appropriate level of inheritance for a given aspect of the problem. For example, Lassie the Dog may be treated as a Dog much of the time, a Collie when necessary to access Collie-specific attributes or behaviors, and as an Animal (perhaps the parent class of Dog) when counting Timmy's pets. Abstraction is also achieved through Composition. For example, a class Car would be made up of an Engine, Gearbox, Steering objects, and many more components. To build the Car class, one does not need to know how the different components work internally, but only how to interface with them, i.e., send messages to them, receive messages from them, and perhaps make the different objects composing the class interact with each other. Polymorphism Polymorphism allows the programmer to treat derived class members just like their parent class' members. More precisely, Polymorphism in object-oriented programming is the ability of objects belonging to different data types to respond to method calls of methods of the same name, each one according to an appropriate type-specific behavior. One method, or an operator such as +, -, or *, can be abstractly applied in many different situations. If a Dog is commanded to speak(), this may elicit a bark(). However, if a Pig is commanded to speak(), this may elicit an oink(). They both inherit speak() from Animal, but their derived class methods override the methods of the parent class; this is Overriding Polymorphism. Overloading Polymorphism is the use of one method signature, or one operator such as +, to perform several different functions depending on the implementation. The + operator, for example, may be used to perform integer addition, float addition, list concatenation, or string concatenation. Any two subclasses of Number, such as Integer and Double, are expected to add together properly in an OOP language. The language must therefore overload the concatenation operator, +, to work this way. This helps improve code readability. How this is implemented varies from language to language, but most OOP languages support at least some level of overloading polymorphism. Many OOP languages also support Parametric Polymorphism, where code is written without mention of any specific type and thus can be used transparently with any number of new types. Pointers are an example of a simple polymorphic routine that can be used with many different types of objects.[2] Decoupling Decoupling allows for the separation of object interactions from classes and inheritance into distinct layers of abstraction. A common use of decoupling is to polymorphically decouple the encapsulation, which is the practice of using reusable code to prevent discrete code modules from interacting with each other. B.3.1.2 Procedures and functions In order to simplify the structure of the program, it is reasonable to divide greater programming task into smaller subordinate tasks. Solving of subordinate tasks is delegated to smaller consistent submodules procedures and functions. Such approach simplifies program debugging and managing. This method reduces programming works due to the reusability of submodules. Procedures and functions are different comparing to their using methods. Function is used by means of function reference, procedure is used by means of procedure sentence. Function always returns the value differentially from the procedure. Relation between submodule and module that calls submodules is organized with the help of module parameters. They are divided into two groups by types of parameter transmition: call by reference in case of which the values of parameters stored by calling module can be altered by called module. This call is technically realized the way, that calling module passes the addresses of referable parameters to the called module. call by value in case of which the actual values of the referable parameters are passed by the calling module to the called module. Values of parameters stored by calling module of stored for calling module can not be altered by called module in case of call by value. Example If we have the procedure myproc defined with two parameters and function myfunc defined with one parameter, then it is possible to activate them as follows: myproc (a, b); d = myfunc( e/f ); In case of first sentence the procedure myproc is accompliched, in case of second sentence the value of function myfunc is calculated and stored to the variable d. Procedures and functions are often also called as subroutines. Program which calls subordinate program, but is not itself a subroutine, is called main program. B.3.1.3 Abstraction as a technique for problem-solving and software design Abstraction has an important role in software development. Abstraction is considered as an approach, where all the irrelevant sides, which are irrelevant in context of solving given problem, are left aside during the analysis of some certain phenomena. Thinking of this, the abstraction in information technology is similar to abstraction in mathematics, where only those attributes of real words objects- phenomena are kept for defining mathematic terms (line, number, function etc), which are important for building up the respective mathematic theory. Example of this could be the number of abstract terms, which have meaning both in mathematics and programming languages. Depiction of number in computer depends on both the software and hardware, but it does not alter the meaning of the content of the term. Abstractions in programming languages can generally be divided into two groups: control abstraction; data abstraction. Control abstraction is considered as systematic use of submodules and commands of control flow (iteration, selection etc) in case of structure programming. Data abstraction is considered as adequate mirroring of real words data in data structures of programming language (vectors, entries etc). Control and data abstractions are compatibility in object oriented programming languages. B.3.1.4 Legacy systems Legacy system is considered as over-aged application program or hardware device, which has been in use in past and which is also used nowadays. Legacy systems are related with following possible problems: They often function on over-aged hardware and therefore it is expensive to keep them functioning; Absence of skills needed for system development and management in the enterprise (i.e. the engineers that have created the system have left the enterprise); Backward compatibility has to be taken care of in case of the implementation of new systems. B.3.2 Data structures and algorithms Data types and structures Variables Programming involves often the need of remembering some amount of data (intermediate results, happened events, input values, output values etc). Such values have to be kept in memory. Therefore one spot in memory is defined and used for storing data. This spot is called variable. As data, which is stored, can be very different, then the type of data, which will be stored in variable, is also named while defining variable (type of variable). Need after the variable type derives from the fact, that different data uses different amount of memory space in memory. For example, 8 bits i.e. one byte enables to remember 28=256 different states. 256 different states enable: to remember integers 0..255, integers with marks -128..127, one symbol with the help of ASCII code table etc. Number of binary system 111111112 can stand for integer 255 for example, but also -1. In order to understand how should this value be used, we must know the type of data. Well known variable types are: truth-value, integer without mark, integer with mark, real number (with decimal point), character, text etc. As different data uses memory space differently then different variable types also use different size in the memory. Truth-value uses least memory (two states correct/false) 1 bit and integer (2-8 bytes), real number variables demand already more memory and text demands at least 1 byte for one symbol. Variable types can be divided: mathematical variable types (integers, real numbers etc) and symbolical variable types (characters, texts, etc), values types (variables, which have concrete size and place) and pointer types. Additional reading: http://en.wikipedia.org/wiki/Variable#Computer_programming Arrays Array is the set of variables of the same type, which have the same name and which can be differentiated in between by index. Arrays simplify the process of data of the same type remarkably. Simplifying derives from the fact that it is easy to alter variable during the program execution and therefore it is easier to turn to the needed variable. Arrays can be one-dimensional (sequence, row), two-dimensional (table, matrix), three-dimensional (cubic) etc. Example (C#) int[] mass = new int[10]; mass[0]=1; mass[1]=1; for (int i = 2; i <= 9; i++) mass[i] = mass[i - 1] + mass[i - 2]; for (int i = 0; i <= 9; i++) Console.WriteLine(mass[i]); Mass  1 1 2 3 5 8 13 21 34  55This is an example where one-dimensional array mass is created, which has ten members. Two of which are valued with 1 and following are filled with the sum of previous two members.  Thereafter all the values are typed to the console window in a row (beginning from 0 member and ending with 9th member). Records (structures) Records are used for keeping different type of data that forms together into some sort of related set. For example, record human forms from following data: name (text), family name (text), gender (truth-value, 0- woman, 1 - man), weight (real number). Such data forms an integral whole for describing one person, but is of very different type if stands alone. Example (C#) struct person { public string name; public string family name; public bool gender; public float weight; } Such record can be used for creating new variable user and give the user a name, family name, gender and weight: person user; user.name = "Jaan"; user.family name = "Mets"; user.gender = 1; user.weight = 80.0; Linked lists and trees Lists are often used for data storing nowadays. Linked lists and arrays are similar since they both store collections of data. Linked lists have their own strengths and weaknesses, but they happen to be strong where arrays are weak. The array's features all follow from its strategy of allocating the memory for all its elements in one block of memory. In contrast, a linked list allocates space for each element separately in its own block of memory called a "linked list element" or "node". The list gets is overall structure by using pointers to connect all its nodes together like the links in a chain. Each node contains two fields: a "data" field to store whatever element type the list holds for its client, and a "next" field which is a pointer used to link one node to the next node. End of linked list is marked as 0-member. Linked list, where each member refers to the following, is called one-way list. Linked list, where each member refers both to the following and previous member, is called two-way list. Linked lis, where the first and last member is absent and each member refers to the following member, is called circular list. Length of linked list is the number of its members. First member is the head and all the others are tail. Stack is a linked list, where the finally added member is read out first ( LIFO Last In First Out). Queue is a linked list, where first member is read out first ( FIFO First In First Out). Additional reading: http://en.wikipedia.org/wiki/Linked_list Tree is the data structure, where data is located in shape of tree and it consists of nodes and edges, which connect nodes (references). Nodes that are connected to the top node with the edge are called children and top node is called a parent in that case. The first top node is called a root. Node that has no children is called a leaf.  Moving from the node to the parent and iteratively further we reach the root. All the ancestors are nodes that are situated between the node and root. Tree height is the longest from the leaf to the root. In case of sorted tree, the definition is given to the root and nodes connected directly to the root are called first level nodes (roots children). Nodes connected directly to the first level nodes are second level nodes etc. The order of children from left to the right is important. Additional reading HYPERLINK ": http://en.wikipedia.org/wiki/Tree_structure" : http://en.wikipedia.org/wiki/Tree_structure Binary tree is a tree, where each parent can have none, one or two children and the order of the children is important. Typical search and sort algorithms using the different data structures Binary search tree is a binary tree, which is ordered. Smaller quantity is always on the left side and greater quantity is always on the right side of the node.  Searching from such tree the searchable value is always compared with the root. If searchable value is equal to root value, then the value exists. If searchable value is not equal to root value, then further comparison is needed respectively in between nodes on left side and nodes on right side until the leaf is found. If searchable value is equal to the value of some node, then the element exists. If there is no equal value, then the element does not exist. Such searching type is many times faster than looking through the linked list or array. Additional reading:  HYPERLINK "http://en.wikipedia.org/wiki/Binary_search_tree" http://en.wikipedia.org/wiki/Binary_search_tree B-tree is a searching tree, where the number of children in each node is between (t-1) and (2t-1), where t is an arbitrary constant. Additional reading:  HYPERLINK "http://en.wikipedia.org/wiki/B-tree" http://en.wikipedia.org/wiki/B-tree B*-tree is B-tree, where fulfilment of nodes is kept around 2/3, by filling two child nodes by reallocating the keys and dividing them into three nodes. B.3.3 Programming languages B.3.3.1 Main types of programming languages A computer requires programs to function. Every program is written in certain programming language. A programming language is an artificial language that can be used to control the behaviour of a machine, particularly a computer. Programming languages differ from natural languages in that natural languages are only used for interaction between people, while programming languages also allow humans to communicate instructions to machines. Programming languages differ from most other forms of human expression in that they require a greater degree of precision and completeness. When using a natural language to communicate with other people, human authors and speakers can be ambiguous and make small errors, and still expect their intent to be understood. However figuratively speaking, computers "do exactly what they are told to do", and cannot "understand" what code the programmer intended to write. The combination of the language definition, the program, and the program's inputs must fully specify the external behaviour that occurs when the program is executed. Computer programs can be categorized by the programming language paradigm used to produce them. A programming paradigm is a fundamental style of programming. Two of the main paradigms are imperative and declarative. Imperative programming Imperative programming is a programming paradigm that describes computation as statements that change a program state. In much the same way as the imperative mood in natural languages expresses commands to take action, imperative programs are a sequence of commands for the computer to perform. Procedural programming is a common method of executing imperative programming, and the terms are often used as synonyms. Procedural programming can refer to a programming paradigm based upon the concept of the procedure call. Procedures, also known as routines, subroutines, methods, or functions simply contain a series of computational steps to be carried out. Any given procedure might be called at any point during a program's execution, including by other procedures or itself. Procedural programming is often a better choice than simple sequential or unstructured programming in many situations which involve moderate complexity or which require significant ease of maintainability. Possible benefits of procedural programming:: The ability to re-use the same code at different places in the program without copying it. An easier way to keep track of program flow than a collection of "GOTO" statements (which can turn a large, complicated program into spaghetti code). The ability to be strongly modular or structured. List of some popular procedural programming languages: Ada ALGOL BASIC C COBOL Fortran Pascal Perl PHP Python VBScript Object-oriented programming Object-oriented programming (OOP) is an imperative programming paradigm that uses "objects" and their interactions to design applications and computer programs. Programming techniques may include features such as encapsulation, modularity, polymorphism, and inheritance. It was not commonly used in mainstream software application development until the early 1990s. Many modern programming languages now support OOP. Object-oriented programming may be seen as a collection of cooperating objects, as opposed to a traditional view in which a program may be seen as a group of tasks to compute ("subroutines"). In OOP, each object is capable of receiving messages, processing data, and sending messages to other objects. Each object can be viewed as an independent little machine with a distinct role or responsibility. The actions or "operators" on the objects are closely associated with the object. For example, in object oriented programming, the data structures tend to carry their own operators around with them (or at least "inherit" them from a similar object or "class"). The traditional approach tends to view and consider data and behaviour separately. A non-comprehensive list of some languages with object-oriented features: Java C++ C# Python PHP SmallTalk Ruby Declarative programming A program is "declarative" if it describes what something is like, rather than how to create it. For example, HTML web pages are declarative because they describe what the page should contain, but not how to actually display the page on a computer screen. This is a different approach from imperative programming languages, which require the programmer to specify an algorithm to be run. Declarative programming languages can be declarative in a variety of ways. Logic programming languages, such as Prolog, are declarative in that the programmer states relationships and asks a question about those relationships without defining how to compute the answer. Functional programming languages, such as Haskell, are declarative in that functions relate their output to their input without defining a strict order to evaluate any operations. Data-oriented programming languages and query languages are declarative in that queries are not given in terms of how to find data but instead give criteria for the desired data (SQL and regular expressions are examples). B.3.3. The syntax programming languages The syntax of a programming language is the set of rules that a sequence of characters in a source code file must follow to be considered as a syntactically conforming program in that language. Syntax defines the structure of a language. In a natural language, the structure of words and sentences is defined by the syntax. In a programming language, the ways of composing directives, declarations and other programming constructs are defined by the syntax. B.3.3.3 Compilation and interpretation Before the computer is able to execute a program written in high language, it is necessary to translate it into a language understandable for the computer i.e. machine code. Such process is called translation and translator of translation program. Translators divide into two classes: compilators and interpretators. In case of compiling, the program in machine code (called compilator) translates the program written in some sort of a programming language into machine code. Thereafter the program in machine code is executed. Examples of compiled languages are such as C, Fortran, Pascal. In case of interpretation, the program in machine code (called interpretator) reads the program file into internal memory and starts to execute it from there row by row. Example of interpretators can be old BASIC-language. Interpretation of the program is 10-200 times slower than execution of compiled code. Debugging (removing of faults from the program) of interpreted program in turn easier than in case of compiled program. Basically, programs can be executed both by interpreting or compiling, no matter which language is used for writing it. . B.3.4 Elementary constructs Each program written in a procedural program consists usually of the statements. Those can be grouped: Declarations Arithmetic and logic operations Control commands Input-Output (I/O) commands A declaration specifies a variable's dimensions, identifier, type, and other aspects. It is used to announce the existence of a variable or function; this is important in many languages (such as C and Pascal), which require variables to be declared before use. A declaration is often used in order to be able to access functions or variables defined in different source files, or in a library. Here are some examples of declarations in EPL (EUCIP Programming Language): int example1; float example3; char example5; In this example we declare three variables character type of variable example5, integer type of variable example and real number type of variable example3. In a similar way one can declare arrays: int example6[100]; float example7[5]; char example8[10]; Arithmetic and logic operations are used for changing the state of program or values of data objects. Control commands define the rules of execution (execution of different program parts, omissions, recurrent execution etc). Input-output commands enable the program to communicate with input-output devices or other programs. B.3.4.1 Input/output instructions Input/output, or I/O, refers to the communication between an information processing system (such as a computer), and the outside world possibly a human, or another information processing system. Inputs are the signals or data received by the system, and outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform I/O" is to perform an input or output operation. I/O devices are used by a person (or other system) to communicate with a computer. For instance, keyboards and mice are considered input devices of a computer, while monitors and printers are considered output devices of a computer. Devices for communication between computers, such as modems and network cards, typically serve for both input and output. Higher-level operating system and programming facilities employ separate, more abstract I/O concepts. For example, most operating systems provide application programs with the concept of files. The C and C++ programming languages, and operating systems in the Unix family, traditionally abstract files and devices as streams, which can be read or written, or sometimes both. The C standard library provides functions for manipulating streams for input and output. EPL language has only two statements (functions) which are used as input-output commands: printf() and readf(). Function printf() is usable as follows: printf(Some text, variable1[,variable2...]) Paragraph of text Some text is written to output as text and to the values of variable 1 and variable 2 as the values of the variables in case of the example above. Output is called as standard output in case of given example (stdout standard output). This information flow is directed to the display in case of most programming languages, but most programs have also the possibility to redirect this information flow also to file, printer, other program etc. Function readf() is usable as follows: readf(variable1[,variable2...]) In case of present example the values from input flow are read to the variable 1, variable 2 etc. Input is called as standard input in case of given example (stdin standart input). Usually, this information flow consists of the values inserted from the keyboard, but often it is also possible to connect this flow also with some file, some other program etc. B.3.4.2 Control statements Control commands specify the rules of program execution (execution, skipping and repeated execution of different program parts). Basically there are three types of control commands: Unconditional jump Conditional sentences Repeats Unconditional jumps enable to jump around in code and change the queue of written code. Use of such control commands makes it much more difficult to understand the code and therefore this construction is often avoided. Multiple languages do not allow the use of unconditional jumps (inc EPL) nowadays. In case of conditional control commands the comparison operators are used for realizing the conditions:: == equality, result is true, if comparable values are equal != disparity, result is true, if comparable values are not equal >greater than, result is true, if the value on the left side of the operator is greater than the value on the right side of the operator =greater or equal, result is true, if the value on the left side of the operator is greater than the value on the right side of the operator and also if respective values are equal <=lesser than, result is true, if the value on the left side of the operator is lesser than the value on the right side of the operator and also if respective values are disparit Conditions can be combined in between by using the following logic operations: && yes, condition is true, if both conditions are true || or, condition is true, if one of the conditions is true For example, following condition: a>=b could be written: (a>b) || (a=b) Wellknown control command is for sure if. If sentence enables to execute different conditions depending on the result of the condition: if(condition) code, which is filled, if the result of the condition is true else code, which is filled, if the result of the condition is false else-clause can also be absent. Example of if-command: if(counter>0) printf(Counter is positive number); If variable named counter is greater than zero, the text Counter is positive number will output. Another example of if-command: if(counter>0) printf(Counter is positive number); else printf(Counter is non-positive number); If variable named counter is greater than zero, the text Counter is positive number will output., otherwise the text Counter is non-positive number will appear. Complicated versions of if-commands are case ja switch. Those control commands enable more differentiations according to the conditions, but as EPL language does not include those commands, then those commands are also not handled here. Repeats enable to execute some part of the code repeatedly according to the given conditions. Repeats are divided as follows: pre-controlled repeats and after-controlled repeats; repeats with static length and repeats variable length. while-repeat is a pre-controlled repeat. It means that the condition needed for continuing the repeat is controlled before its execution. while(condition) code, which is executed, if the condition is true For example: int a=0; int b=0; while(a<10) { a++; b+=a; } Repeat is executed until a is lesser than 10, whereby the value of variable a is added to the value of variable b during each execution of the repeat, so b=1+2+3+4+5+6+7+8+9+10=55. do-while-repeat is a after-controlled repeat. Repeat, this means that the condition needed for going on with the repeat is controlled after its execution. do code, which is executed until the condition is true while(condition) For example: int a=0; int b=0; do { a++; b+=a; } while(a<10) Repeat is executed until a is lesser than ten, whereby the value of variable a is added to the value of variable b during each execution of the repeat, so b=1+2+3+4+5+6+7+8+9+10=55. Now you might have got the impression, that there is no difference if to use the repeat with pre-control or after-control. Actually there is a difference code inside the after-controlled repeat is executed at least once, might happen that pre-controlled repeat is not executed even once. For example: int a=10; int b=0; while(a<10) { a++; b+=a; } Result is that a=10 and b=0, because the action inside the repeat was not executed. Condition was false from the beginning and it was controlled before the execution. int a=10; int b=0; do { a++; b+=a; } while(a<10) Result is that a=11 and b=11, because the action was executed once and after that the condition was controlled. for-repeat is pre-controlled and with static length. for(variable, condition, rules of changing variables) code, which is executed, if the condition is true for-repeat differs from the repeats described above foremost by the fact that altering the value of the variable related to the condition of continuing repeat is described inside the repeat. For example: int b; for(int a=0; i<10; i++) b+=a; Result is similar to do repeat. Value a of the variable is equalized to 0 in the beginning. Thereafter the condition of the repeat execution is controlled. If this is true, then the value of variable a is added to variable b and thereafter the value of variable a is altered according to the given rules (in given example a+++, i.e. the value of a is increased by one). Then the condition of continuing is controlled and if this is true, then the action inside the repeat is repeated etc. Result is that a=10 and b=0+1+2+3+4+5+6+7+8+9=45. B.3.4.3 Arithmetic and logical operations There are five arithmetic operations which we need mostly: Addition: mark + is used and it sums two values, f.e. c=a+b sums the value of a and b and makes the value of c equal to the result of the operation (c=3+2, therefore c=5). Subtraction: mark - is used and it substracts second value from the first, f.e. c=a-b subsrtacts the value of variable b from the value of variable a and makes the value of c equal to the result of the operation (c=3-2, therefore c=1). Multiplication: mark * is used and it multiplies two values, f.e. c=a*b multiplies the value of variables a and b and makes the value of variable c equal to the result of the operation (c=3*2, therefore c=6). Division: mark / is used and it divides one value with the other, f.e. c=a/b divides the value of variable a with the value of variable b and makes the value of variable c equal to the result of the operation (c=3/2, therefore c=1,5 or c=1, depends on language). End of division: mark % is used and it divides one value with the other, f.e. c=a%b divides value of variable a with the value of variable b and makes the value of variable c equal to the end of the division. (c=5%3 therefore c=2). EPL language does not have truth-value type of variable. Therefore all the logic operations are in control commands. Languages, which do have thruth-value type of variables, enable the use of logic operations, f.e. c= a && b, c=true if a and b are equal and c=false if a and b are not equal. Logic operations are handled more closely together with control commands. Queue of the operations is different in some of the programming languages and similar in the others: some languages start with multiplication and division operations and end with addition and subtraction operations. Operations are executed starting from the left to the right. Queue of the operations can be specified with braces (operations inside the braces are executed first). For example: c=a+a*b is different from c=(a+a)*b. Different programming languages enable the use of different arithmetic operators: For example: c += a adds the value of variable a to the value of variable c (i.e. c = a + c), a++ is the iteration of the variable i.e. increasing the value by one (i.e. a=a+1) etc. B.3.5 Testing Basic concepts of testing and debugging Need of testing in software development derives foremost from the fact, that people make mistakes. So, main task of testing phase is to ensure that created software solution is free of faults. Testing has to ensure reliability of software and products conformity to the description of needs. First its controlled, that the code of the program is correspondent to the specification of the language. This control is executed by the compilator. Passing through this control without any faults and alerts does not ensure that the program is tree of faults. If program does not give an expected result in case of given input data due to the mistakes in program logics and not due to the mistakes deriving from syntax, then such situation is called a failure. In case of black box testing only the external attributes of the software are explored and no attention is given to the internal processes. In case of white box testing only the structure and logics of the program are tested, without the control of inputs and outputs. In case of testing the relations, the cooperation between different modules is tested. This is very important in case if the program consists of modules, which are developed separately. Testing tools are controlled by using mutant testing: in such case new faults are added to the program in order to explore the effectivity of test procedures and scripts. Debugger is a tool for finding faults in program and finding faults in code with the help of this tool is called debugging. Different types of testing Role of the compilator is mostly to control the correspondence of written program code to the specification of the language. This controlled by using the tools of static analysis mostly and testing takes place without starting the program. As the correctness and security of software has become more and more important, then the producers have significantly enhanced the testing tools of the development tools (debuggers, tools of static analysis). Testing tool have turned to be more thorough. Testing tools of the development tools used nowadays enable to analyse the code of program very thoroughly (they also enable to discover possible exploits etc), but still the use of those tools does not assure the complete correctness. For ensuring the correctness it is necessary to use different tools of dynamic testing. As dynamic testing presupposes, that different input data is inserted to the programme, then testing robots are often used for such testing. Testing robots are the programs that insert different input data to the program and thereafter control the correspondence of the program to the expected result. For testing the correctness of the program in different situations, the testing robots are often written, which are overloading the program with the huge amount of input data. Purpose of such testing is to control the behaviour of the program in case of great overload and this kind of testing is calls stress testing. Static and dynamic test methodologies Static analysis is the technique of testing, if programs are not started and only the inception code is explorer. Dynamic analysis is used in case of there is a need to explore programs behaviour in different situations and output correspondence to the expected result is analysed. Prepared input values are usually used in case of dynamic analysis, because in such case the expected output is known. B.3.6 Documentation Documents for software development and delivery Software documentation or source code documentation is written text that accompanies computer software. It either explains how it operates or how to use it, and may mean different things to people in different roles. Types of documentation include: Architecture/Design - Overview of software. Includes relations to an environment and construction principles to be used in design of software components. Technical - Documentation of code, algorithms, interfaces, and APIs. End User - Manuals for the end-user, system administrators and support staff. Marketing - Product briefs and promotional collateral. Documenting software is often a laborious process. The main tools of code documentation are briefly described below. Structured English is the marriage of English language with the syntax of structured programming. Thus structured English aims at getting the benefits of both the programming logic and natural language. Program logic helps to attain precision while natural language helps in getting the convenience of spoken languages. Unlike decision tables and decision trees which show only branching logic, structured English contains complete step by step statements. Structured English consists of the following elements: Operation statements written as English phrases executed from the top down Conditional blocks indicated by keywords such as IF, THEN, and ELSE Repetition blocks indicated by keywords such as DO, WHILE, and UNTIL Use the following guidelines when writing Structured English: Statements should be clear and unambiguous Use one line per logical element All logic should be expressed in operational, conditional, and repetition blocks Logical blocks should be indented to show relationship Keywords should be capitalized Example of pseudo-code, written in structured english: IF (salary is LE 1000) Set income tax to zero ELSE Set income tax to 22% ENDIF Decision Tree is a diagram used to describe decision alternatives and chance events. Tree has a root node and each new node includes some decisions. Depending on the decision, it is possible to go until the leaves, where are the solutions (outputs). As an example, a simple decision making tree for problem go skying is drawn below. A comment is a programming language construct used to embed information in the source code of a computer program. In most cases, when the source code is processed by a compiler or interpreter, comments are ignored. Comments have a wide range of potential uses: from augmenting program code with basic descriptions, to generating external documentation. Comments are also used for integration with source code management systems and other kinds of external programming tools. The flexibility provided by comments often allows for a wide degree of variability and potentially non-useful information inside source code. To address this, many technical commentators and software analysts subscribe to any of several "philosophies" and guidelines regarding the proper use of comments. Some programming tools read structured information in comments and automatically generate documentation. Keeping documentation within source code comments is considered as one way to simplify the documentation process, as well as increase the chances that the documentation will be kept up to date with changes in the code.[16]Examples of documentation generators include the javadoc program, designed to be used with the Java programming language, Ddoc for the D programming language and doxygen, to be used with C++, C, Java, IDL and PHPDoc for PHP. C# and Visual Basic implement a similar feature called "XML Comments" which are read by IntelliSense from the compiled .NET assembly. A flowchart is a schematic representation of an algorithm or a process. As an example, a flowchart for computing average salary of 10 employees is presented here.  The Unified/Universal Modeling Language (UML) is a standardized visual specification language for object modeling. UML is a general-purpose modeling language that includes a graphical notation used to create an abstract model of a system, referred to as a UML model Well-structured and documented code The advantages of well-structured and documented coding include increased programmer productivity and less debugging. Well-structured code is easier to understand and change. It improves the maintainability of the code by making the code conform to coding standards, language proficiency, safety and portability, and raises the quality of documentation. Also, the information exchange between the members of the project team is easier to organize, if the. program documentation is precise, systematic and readable. The benefits of effective documentation for software engineers: learning a software system testing a software system working with a new software system solving problems when other developers are unable to answer questions looking for big-picture information about a software system maintaining a software system answering questions about a system for management or customers looking for in-depth information about a software system Unified modelling language (UML) UML was meant to be a unifying language enabling IT professionals to model computer applications. One reason UML has become a standard modeling language is that it is programming-language independent. Also, the UML notation set is a language and not a methodology. Since UML is not a methodology, it does not require any formal work products. Yet it does provide several types of diagrams that, when used within a given methodology, increase the ease of understanding an application under development. By placing standard UML diagrams in ones methodology's work products, programmer makes it easier for UML-proficient people to join his project and quickly become productive. The most useful, standard UML diagrams are: use case diagram, class diagram, sequence diagram, statechart diagram, activity diagram, component diagram, and deployment diagram. Use-case diagram  Figure: Use case diagram A use case illustrates a unit of functionality provided by the system. The main purpose of the use-case diagram is to help development teams visualize the functional requirements of a system, including the relationship of "actors" (human beings who will interact with the system) to essential processes, as well as the relationships among different use cases. Use-case diagrams generally show groups of use cases -- either all use cases for the complete system, or a breakout of a particular group of use cases with related functionality (e.g., all security administration-related use cases). To show a use case on a use-case diagram, you draw an oval in the middle of the diagram and put the name of the use case in the center of, or below, the oval. To draw an actor (indicating a system user) on a use-case diagram, you draw a stick person to the left or right of your diagram. Use simple lines to depict relationships between actors and use cases Class diagram The class diagram shows how the different entities (people, things, and data) relate to each other; in other words, it shows the static structures of the system. A class diagram can be used to display logical classes, which are typically the kinds of things the business people in an organization talk about - rock bands, CDs, radio play; or loans, home mortgages, car loans, and interest rates. Class diagrams can also be used to show implementation classes, which are the things that programmers typically deal with. An implementation class diagram will probably show some of the same classes as the logical classes diagram. Class diagram example of association between two classes Sequence diagram Sequence diagrams show a detailed flow for a specific use case or even just part of a specific use case. They are almost self explanatory; they show the calls between the different objects in their sequence and can show, at a detailed level, different calls to different objects. A sequence diagram has two dimensions: The vertical dimension shows the sequence of messages/calls in the time order that they occur; the horizontal dimension shows the object instances to which the messages are sent. Statechart diagram The statechart diagram models the different states that a class can be in and how that class transitions from state to state. It can be argued that every class has a state, but that every class shouldn't have a statechart diagram. Only classes with "interesting" states - that is, classes with three or more potential states during system activity - should be modelled. Activity diagram Activity diagrams show the procedural flow of control between two or more class objects while processing an activity. Activity diagrams can be used to model higher-level business process at the business unit level, or to model low-level internal class actions. In my experience, activity diagrams are best used to model higher-level processes, such as how the company is currently doing business, or how it would like to do business. This is because activity diagrams are "less technical" in appearance, compared to sequence diagrams, and business-minded people tend to understand them more quickly. Component diagram A component diagram provides a physical view of the system. Its purpose is to show the dependencies that the software has on the other software components (e.g., software libraries) in the system. The diagram can be shown at a very high level, with just the large-grain components, or it can be shown at the component package level. Deployment diagram The deployment diagram shows how a system will be physically deployed in the hardware environment. Its purpose is to show where the different components of the system will physically run and how they will communicate with each other. Since the diagram models the physical runtime, a system's production staff will make considerable use of this diagram. Maintenance Documenting changes in software Nowadays there is a need after maintenance of the software solution after the completion and installation of the software. Such need is conditioned from the fact that often it is not possible to foresee all the different situations that might come up during testing: code might consist of multiple solutions and functions; other solutions, related with the software, might change; legal acts that need to be followed by the software solution can hang etc. IEEE standard 1219 defines software maintenance as follows: The modification of a software product after delivery to correct faults, to improve performance or other attributes, or to adapt the product to a modified environment. This international standard describes the 6 software maintenance processes as: The implementation process contains software preparation and transition activities, such as the conception and creation of the maintenance plan, the preparation for handling problems identified during development, and the follow-up on product configuration management. The problem and modification analysis process, which is executed once the application has become the responsibility of the maintenance group. The maintenance programmer must analyze each request, confirm it (by reproducing the situation) and check its validity, investigate it and propose a solution, document the request and the solution proposal, and, finally, obtain all the required authorizations to apply the modifications. The process considering the implementation of the modification itself. The process acceptance of the modification, by checking it with the individual who submitted the request in order to make sure the modification provided a solution. The migration process (platform migration, for example) is exceptional, and is not part of daily maintenance tasks. If the software must be ported to another platform without any change in functionality, this process will be used and a maintenance project team is likely to be assigned to this task. Finally, the last maintenance process, also an event which does not occur on a daily basis, is the retirement of a piece of software. There are a number of processes, activities and practices that are unique to maintainers, for example: Transition: a controlled and coordinated sequence of activities during which a system is transferred progressively from the developer to the maintainer; Service Level Agreements (SLAs) and specialized (domain-specific) maintenance contracts negotiated by maintainers; Modification Request and Problem Report Help Desk: a problem-handling process used by maintainers to prioritize, documents and route the requests they receive; Modification Request acceptance/rejection: modification request work over a certain size/effort/complexity may be rejected by maintainers and rerouted to a developer. Methods to attain quality in program maintenance Software maintenance is dividable into four categories: Adaptive: changes in software are related to changes in environment; Additional: changes in software are related to the changes due to new business needs; Corrective: correction of occurred faults; Preventive: preventing of the problems that might come up in the future. Software maintenance is mostly either adaptive or additional. Analysis of changes has to come before making the changes. Analysis has to originate from the following criteria: Modification type will the change modify essential faults or add new functionality. Modification coverage how huge is the change, how much resources are needed for making changes. Modification criticalness how big is the influence of changes on software stability and will the changes increase security risks, if there is any influence at all . Originating from the capacity and essence of changes, the changes can be divided as follows: Version: greater and more thorough change. Structure of the software has been changed due to the changes in functions. Release: change has added new functionalities. Patch: small change that solves some problems or corrects the fault. All changes in software attributes and functionalities have to be documented for sure. Making the changes might cause new faults and therefore it is very important to know the essence and history of changes. Software maintenance involves a great amount of changes and therefor the changes have to be managed. There are multiple tools and environments created for managing the changes. Programming examples Following examples on programming are based on EPL language. The EPL language is based on C language, being its simplified version. The program that everyone writes just to check they understand the very basics of what is going on in a new language is probably the program, saying a simple message to the output device. main( ) { printf( Congratulations! It works! ); } The first line is the standard start for all C (and EPL) programs - main(). After this comes the program's only instruction enclosed in curly brackets {}. The curly brackets mark the start and end of the list of instructions that make up the program - in this case just one instruction. Notice the semicolon marking the end of the instruction. Ther ending every EPL instruction with a semicolon is a good practice - it will save you a lot of trouble! Also notice that the semicolon marks the end of an instruction - it isn't a separator as is the custom in other languages. The next example demonstrates the use of variables main( ) { int n, nsquare; n = 5; nsquare = n * n; printf (n = , n); printf (nsquare = , nsquare); n = 7; nsquare = n * n; printf (n = , n); printf (nsquare = , nsquare); } The new aspects in previous example are: the declaration of two integer variables n and nsquare in the second line; the assigning the constant values to the variable n in the third and seventh line; The computing squared value of n and assigning the result tu the variable nsquare in the fourth and eighth lines; Printing the textual message and the current value of the variable in lines 5 6 and 9 10. Note, that the textual constants are enclosed in double quotes but the names of variables not. The following example introduces the use of readf-function and conditional statement. main( ) { int n; printf( Please insert the smallest positive integer: ); readf(n); if( n < 1 ) printf( The number must be positive! ); else { if (n > 1) printf(Inserted number is not the *smallest* positive integer!); else printf(You are right, thank you!); } } In the example above, the initialisation of the variable n is carried out using the readf-function in line 4. Note, that before using it, the prompt for user is output via printf-function in the previous line. The following conditional statements check the correctness of the input. The first of them (beginning at line 5) checks, is the input really positive. If not, the appropriate message at line 6 is output. In the case of positive input number the second conditional statement (beginning at line 8) checks, is n greater than one or not and outputs the adequate message. Note that the second if statement is the part of the first one and for the clarity of code is enclosed into curly brackets. Another potentially dangerous mistake can be made by placing the semicolon after the condition in if-statement: if( n < 1 ) ; printf( The number must be positive! ); Semicolon in the first line ends the if-statement (with empty statement) and the message in the second line will output anyway, independently of the value of n. The next example demonstrates the use of the for-cycle. The goal of the program is to write out the squares of 5 first positive integers. main( ) { int n, nsquare; for( n=1; n<=5; n=n+1) { nsquare = n * n; printf(n, nsquare = , n, nsqare); } } The for cycle makes n to start with the value 1, increments it by 1 after each iteration until it is less than or equal to 5. The body of the cycle (enclosed in curely brackets) is carried out five times- for different values of n. Notice, that more than one variable can be the arguments of the printf-function. As in the previous example, the potential mistakes can be made in this code. Placing the semicolon after the header of the for-cycle turns the cycle into empty one and only the values 6 and its square will be output: for( n=1; n<=5; n=n+1); { nsquare = n * n; printf(n, nsquare = , n, nsqare); } Another possible error is missing the pair of curely brackets: for( n=1; n<=5; n=n+1) nsquare = n * n; printf(n, nsquare = , n, nsqare); Only the assignment statement (nsquare = n * n) is carried out repetitively. The output will be n, nsquare = 6 25. The next example asks the user to input the salaries of 4 persons, store the input values in an array and finds the average salary main( ) { int i; float sal[4]; float sum, average; for( i=0; i<4; i=i+1) { printf(i); printf(Please input the salary); readf(sal[i]); } for( i=0, sum=0; i<4; i=i+1) { sum = sum + sal[i] } Average = sum / 4; printf(Average salary is , average ); } In the example above, the array sal consisting 4 real numbers is formed to save the values of salaries of 4 person. The for-cycle in lines 5 9 lets the user to input the values of salaries. Notice, that the indexes of the array begin with 0, therefore the initial value of the counter i is also set to 0 in the 5th line. The second for-cycle finds the sum of the salaries. At the beginning of the cycle two variables (i and sum) are initialized by 0. On every iteration, the value of sum is increased by next salary in the queue, stored in the array sal. The last steps in the program are calculating the average by dividing the sum by 4 and outputting the result. The example below demonstrates the working with strings or arrays of characters. The task of the program is to count the number of spaces in the string. main( ) { int n, account; char sentence[]=How are you?; char space = ; for( n=0, account=0; n<13; n=n+1) { if (sentence[n]=space) { account=account+1; } } printf(sentence); printf(Number of spaces is , account); } In the third row of this example stands the constant of string type. There are 13 symbols visible in the string, but actually the last symbol of the string is string terminating symbol (0-character). The string is autoinitialized. In the 10th row the string is print out as a single object. The goal of the program in last example is to find the minimal value of the integer array. main( ) { int minvalue, n; int numbers[] = {3, -2, 100, 100, 0, -4, -20, 15}; minvalue=numbers[0]; for( n=1; n<8; n=n+1) { minvalue=min(minvalue, numbers[n]); } printf(Minimal value is: , minvalue); } int min( a, b ) int a, b; { int minimal; if (a < b) minimal = a; else minimal = b; return minimal; } Again, the array is autoinitialized in third row. In the fourth row the minvalue is initialized with the first element of the array and in the following cycle it is compared with succeeding elements of the array. In case the current minvalue is greater than current element of an array, the minvalue is replaced by new value. The comparing of two values and finding the minimal of them is the task of the function min(). It has two integer arguments (a and b) and it returns also the integer value. Links to additional materials: Association for the Advancement of Artificial Intelligence,  HYPERLINK "http://www.aaai.org/AITopics/html/trees.html"www.aaai.org Free Encyclopedia,  HYPERLINK "http://www.wikipedia.org/"www.wikipedia.org Nick Parlante, Linked List Basics, in the Stanford CS Education Library.  HYPERLINK "http://cslibrary.stanford.edu/" http://cslibrary.stanford.edu/. Test questions Question 1 Software creation process in case of top-down method is started with: a) analyzing the details of programming task and its generalization. b) dividing the whole task into subordinary tasks. Question 2 Use of procedures and functions is helpful for: Enchasing programme readability. Structuring long program. Enchasing engineers working efficiency. Question 3 Data transmission from called procedure/function to the calling module is possible with a) address parameter. b) value parameter. c) both address and value parameter. Question 4 Array is: A huge and massive set of scalar variables. A set of variables with the same type and name, which are differentiated in between by the indexes. Index of a variable. Question 5 Record in programming language is: A whole set of variables with simpler structure. A row in data table. A set of structured data. Question 6 Binary search tree in programming is used for: Realization search algorithm. Demonstration of tree shaped data structure. Conversion of binary numbers. Question 7 Following programming languages form a part of procedural programming languages: Java C Fortran Question 8 Which one works faster: Complied program? Interpreted program? Difference is not remarkable. Question 9 Control commands are used for: Specifying the working order of programming commands. Skipping the parts of program. Repeating the parts of program. Question 10 Purpose of debugging is: To remove faults from the program. To make the program more steady in functioning. To interface the program with other programs. Question 11 Well structured documentation has to enable: Detailed review of program code. Studying possibilities for joined people. Information exchange between the people related with the product. Answers (correct and false) Question 1 False Correct Question 2 Correct Correct Correct Question 3 Correct False False Question 4 False Correct False Question 5 Correct False Correct Question 6 Correct False False Question 7 False Correct Correct Question 8 Correct False False Question 9 Correct Correct Correct Question 10 Correct Correct False Question 11 False Correct Correct Feedback for answering Question 1 False, Top-down method starts from general and moves towards details Correct! Question 2 Correct! Correct! Correct! Question 3 Correct! False! Information can be sent back only with the help of address parameters. False! Information can be sent back only with the help of address parameters. Question 4 False! Array is the set of variables with the same type and name, which can be differentiated by the indexes. Correct! False! Array is the set of variables with the same type and name, which can be differentiated by the indexes. Question 5 Correct! False. Rows of data tables are called as entries in context of databases, not in programming languages. Correct! Question 6 Correct! False. Binary tree is used for the realization of search algorithm. False. Binary tree is used for the realization of search algorithm. Question 7 False. Java is object oriented language Correct! Correct! Question 8 Correct! False! Compiled program works faster. False! Compiled program works faster. Question 9 Correct! Correct! Correct! Question 10 Correct! Correct! False! Purpose of debugging is to remove the faults from the program. Question 11 False! Program code does not have to be presented in documentation. Correct! Correct!  Dijkstra, E. W., A Discipline of Programming, Prentice-Hall Series in Automatic Computation, 1976, ISBN 0-13-215871-X  Donald Bell, UML basics: An introduction to the Unified Modeling Language. http://www.ibm.com/developerworks/rational/library/769.html   Is there enough snow? no Do not go Wheather conditions? yes good bad Do not go Have I suitable equipment? no Do not go yes START n = 1 sum = 0 READ sal sum = sum + sal IS n = 10? YES average = sum / 10 PRINT average END NO n = n + 1 Root Leaf Leaf Leaf Leaf Leaf Go! teacher studies examines tutor student Student Course enrolls 0..* 0..* fhWp8  ~ +M!!!!!!!!"1""n#x#y#&&&&ӺӱӥƚӕyjUmH sH 6]mH sH j0JiUmH sH mH sH 5\mH sH 0JhjUmH sH jUmH sH  5mH sH  ]mH sH CJOJQJ^JmH sH mH sH \aJmH sH 5\aJmH sH 6]mH sH  aJmH sH  aJmH sH /fght8c7 F $ & F+ ^`a$$h^ha$$ & F hh^h`a$ & F hh^h`$a$~ $$a$K0Q1183 D .   C ~  S+M$a$ $a$  hh^h & F hh^h`$ & F hh^h`a$$h^ha$$ & F+ ^`a$8DYkx;K }!!""n#$ & F ^` & F) ^`$a$ $R%}&@'E(u(}(,,#-.-..0W2e22479&99>>i?$a$ & F ^` & F ^`&'' '>'?'@'['\']'E(`(u(}(,,#-.-..0(0W2e29&9>>A BHHIJLL+MUUgVVVVkWlWW XX$ & F ^`a$s & F ^`s & F ^`s$a$  hh^h$a$RR-SS=TU*U,U@`n̩ͩuwdfRTެ߬%$a$ ^`^TY߬%3d"*J;nLò_`c-T}Ϳοr,rGYG\T./1<G jU5\mH sH  5mH sH  5OJQJOJQJ!B*CJOJQJ^JmH phMMMsH 5@\aJmH sH CJOJQJ^JmH sH  6mH sH mH sH @%&3<EQSZbde " (+-4<>JK$a$^K ,-;ENZ\ckmn!*-/6>@LM^$a$,_` -4LTV}dscڼ۾ $a$  hh^h$a$^Ϳο3r+,@ArKks & F ^`  hh^h $a$$a$ & F ^`kLGG\v & F$ ^` & F ^` & F ^` & F ^`ss & F* ^`s & F* ^`s & F* ^` 4T1 ?dd`s & F$ ^` & F$ ^`G$,- )ef.?rK)l    . / 4 <      6mH sH  aJmH sH  jCJUmHnHsH tH u5\mH sH 6]mH sH  ]mH sH !j0JiCJOJQJUmH sH CJOJQJ^JmH sH  5mH sH mH sH  jUB*aJmH phsH 9& &AeH)* & F* ^` & F 88^8`de-.?@qrr~fMYGtb & F, 88^8` & F6 ^` & F6 ^` & F6 ^`$a$ & F ^` & F hh^h` p$i6t=G$ & F ^`a$ & F ^` & F ^` & F hh^h` & F, 88^8` & F, 88^8`GM)*lv    % 6 > P oo` & F hh^h` & F" ^`$a$P e         P     * + 5 = y       o^` { & Fh^h { hh^h`o + IPRkmySTUZ]jk<= kWP_~  qs@  !! ! !5!T!!!!!!׼jl$6OJQJU]j6OJQJU]6OJQJ]5\aJmH sH  H*mH sH  6mH sH  5mH sH mH sH IBFHI yVW*PSUV { & Fh^ho`o o^` o^`jk1WOPZbqo3\^_)<>AT~ o^`oh`ho Qg ->@A 5!T! & F6 ^`o` o^`o!!!!!"""'"("r"s""""""""""##C$O$$%%%I&U&&&\'h'''h(u()))))***4*?*S*^*r*}*********+⿵ aJmH sH  5mH sH mH sH 5aJmH sH 5\aJmH sH OJQJj%6OJQJU]j7%6OJQJU]6OJQJ]j6OJQJU]0Jh6OJQJ]=T!!)""""""####$C$O$$$$%% & F1 ^`h^h & F6 ^` s 8^8s & F6 ^`%=%%%%%&.&I&U&&&&&&M'R'T' & F ^`$h^ha$ & F7 ^` & F ^`h^h$ & F' ^`a$ & F' ^`T'\'h'''''''((G(h(u(((())J)l) & F ^` & F2 ^` & F/ ^` & F5 ^`h^h & F ^`l)))* ***$*,*4*?*G*M*S*^*d*l*r*}** & F- ^` & F; ^` & F ^` & F3 ^`h^h & F ^`****************+ ++!+ & F( ^` & F ^` & F8 ^` & F0 ^`h^h & F- ^`+!+7+C+Z+}+++++,,--.%..../]/h/////J0K0L0_0z0000O1Q1R1118393j06B*U]aJph j&UmH sH j0JiOJQJUmH sH 6]mH sH j0JiUh aJmH sH 5aJmH sH mH sH  5mH sH (!+)+1+7+C+I+Q+Y+Z+r+}++++++++ & F ^` & F ^` & F6 ^`^ & F! ^`h^h & F ^`+,U,,,-'----..%...s...... & F ^` & F% ^` & F: ^` & F ^`h^h & F ^`.//7/]/h/q/z///////80A0J0K00z & F ^` & F ^` & F# ^` & F ^` & F ^`h^h0O1P1Q1111111111111111111111222$&dPa$z2 2#2$2.2/2324252;2<2B2J2K2T2U2g2h2k2s2t2x2y2222222$a$22222222222222222222222222233$a$3 333333$3%3*3+3,3-3.3/303132333435363738393$1h. A!"n#$%DyK yK v: http://en.wikipedia.org/wiki/Software_designyX;H,]ą'cDyK yK http://www.cs.utexas.edu/users/EWD/ewd02xx/EWD249.PDFyX;H,]ą'ci Dd- (T  0Ab kn4"QX  n kn4"QXPNG  IHDRXVtEXtSoftwareMicrosoft Office5qPLTE Xh~~}|{ܲǼ[tRNS@f pHYs@@bCc[ cmPPJCmp0712HsIDATx^] wEN@/Mymd {k8ri`I(wӚY0ll+_iϔ$Ai[~ͧ{^g|do=p2.ٻdF]*^ 羶eVd-OsNsyu{朘@0{_SٻfHOd/֭kW@6!=o )}gHOd{Cz {?SѐO@ Ȱ(M2HOj*J$7 ˍ*J7͈rf̂ck"jzٻ0F(*=,f@n2-Q*JY7[(i,8vF*zT̺fЯZSTn#{{(EŬ=^15JEQ 1k/A3O?`#nM5?֜ᒁҾ>=x'RL!{4 {A U53f>fZ`Dy&5Cb&Z($=%fG0 V2݆ZfcݮS3gjOϷקY]׵όj {4 V2Vj6&uk8['s=x& 4Q(4"{4 V2益5ޕ73\3Q S[=OVYN:1wA mu= shBu f~t|3_gDӟ#{G Vљ WN2zښ6f٫+{bd(8ȶ@̼p;N͜@9)g.֙ӟ"{ȟ:|vTa lۧ:kۥŬcq15JEQ18wAjaLRQTZ/f@N2/-Q*JŬ)15JEQiu ;͠0F(*/fF0#-Q*JkĬ3Y15JEQiu;Ǡw0F(*!{(Ebyd˜uٻȠ0F(*=(f]DJvkAZncjZJ=?\bЫZST.!{(Eb6<3u-Q*JŬ15JEQ1kWS wS#2TWl܍ zS cjҽbFdo˜4"fmso3˜4"fmF0h(E1k g튢₳{kX?i$"{/5xJ{Ċo-B^.qa+Pz=[@={n"{ST@]Vٯ̼@Rlzw*Aq-h2AIENDB`DyK yK t: http://en.wikipedia.org/wiki/Tree_structureyX;H,]ą'cDd!#)(T  0Ab3CrXn n3CrXPNG  IHDRGXtEXtSoftwareMicrosoft Office5qPLTENb(֛ZtRNS@f pHYs@@bCc[ cmPPJCmp0712HsIDATx^ %5nvE|"] * /@EV%LJRU97Ϲ3=ɩ'w>]עh=0K챼cd~eJc^v#@IJ mw @W"і$y5 $ I`|8 dy d +8HSf4Qghc@F@_q s4Di^Dh~%1Nl OO! d6xe|88v" /7cG=6~_n[2^Xq~YI./,A{l8,G jiƏ2q9 K?/ˠƑU/,A{3\ii_ /166ݛ_z9~]ko)h:7EѶuDcShÿWxZ6IA(??Ŏh3h:>ˊ1'#,ubA>1Tؿi1MD'z&.Iv 13$r ٭فmGx5_`$0v拼@c'>ǰWM7=u|%1ycyVډ.rR=찄!E0vd2qV#d!iZȨh;xٶfjBX*}d.ŷhc0bhZ,m9a2V.⧯X;okgoE 375=bD9 ϧ,MOcfAoHƢ9څ1+8sT6UƢU8Eq=!jq\*%E^"S%rĔ%Q8Z" )*drTW|ڼ׳›@*5(ϛS]Z~82dVg]ui󘀘ôE gVV++^6`wFHyeqlA9(Z~ C%%IL+,|t8UKy;MTh<0k$+p6h~<](~VHaiBqܼq:YFU1\8E#9yaceghJƦ3F(I>DU0%ePSRe$eS!ה/V(AQbw;[D5 ʑkp@GD7+ܗFO3Ye1i6TrI@2&U@k.E=W+nj/D?/CO}QE vjM:)8 9즹 pzȪbGN䨯bՇ2qDʚ! S( myK*$xN~58ꅐUd_53{ 8W'L*͸dV1j5 [ClFR7G/p=Xl]Mzb=)=F\X2~Yڜkbr+H"v1>pD!4:ڔHaۜMz"_`7p7B1&"wG|#4%72`޴&"^hSnB1v`-HBXbWM&""X @B8/G! D61*n._%A:z!8iU3R5E%!#p.>VԤ9: RF@ dsܚr$!#pc7W$0W)1"BԒwLT:Go U)=!E i*]LԶv|m.9YaUc̠9Eb24\S"vwz;d0N@Wy2Hm'B)o&H|[8ʩHqs_&#emST1Hq.)%cL2H9mS sZ8C1&_Q&Gx& zu8#G_cH1gen4)?WAD:;"H%E q/S둚S#]jέ\)}Yq !wBQ*ɚ"y.YΚ7prKJzI͋H^EzN*o6喺S#4:Hz|Iی5=ȽD!4db@ی]]=l;6e~00v=lxSn7BC6-G8B!i w5B͹ /ޘ=F\ohSnBoߩ~xx"<ڔ`57F|#4ۜǽola# wnp5&WIG!0qcܚsChXa2ʭ=g=F 4Va퐜}sBc )=rG7Ga4oUc!O3ݾ1=Gh m|# q]u6h$++&_W #@`Iq,o͑JݦJ>dSl|ˡ3"b]/@'U1(Ȉo𒬘 /S8b*~m^-S h]1OqvTށ*gWLĔorUL+8qvT@@<SzGo WpTE슩R+b6f [ig Ew,9Vikm!aGw8YN*,#?6iMeOX8tc4礲ywrRa1Ԣۄ7xFshqFwݰ;xwR7H?8e͙|m^wfû`6}3p ۘ{h9~}3p$~ァolU-Beԧ:ǭq~3~*{fTׇh~( Me G2>b;~97%8kÊ{Xn"ί?eW4UZ8[ VE8TUG%1?E5KXQќԣTݷ30J=tJ澝՜,U)Ị:R <9+}[HA*>ン?UʇC23C%T+6| }э V4ʾ"# } S:y"(ptoUGрaĘWE#K{sքVvU|H!^vG߸v+f"aE S^mYBx5tUYJ*hGia~9n,h:$bDQQ~vUCF|=L5o~ϱ`$a8Z(fPJ~ITAu9=V֕wK:ڮ$ ;co{2olVKI$-MN ?bWh HnT=|ߺGGQEj00H•:hPeIMG^z6)̣򴘡!'B/``0ykbcMK^^C4{'Y$z.xyH@_$ &jq; B#t BwF 6BitzR$Fpa_M-GrwBF`>AIIFDYwVFt׈tWo&zR|<\HW/յN!˥|B῿yu iJy7YVmKTK[Mtp[bK!6[uvMM3Bl"GJ=5P9؅|5AL8ptUM,(BGF2|J; mepY|ĤJ6e10݄n;et=dcNHlp{iYzVի19KbmsGb?!#J(]_# ]2޿An_nvlvbx iQl"ﬖ}.2 1:c$$@esg{kbI)7=$dn ZUƸp΄Tw%^=ԇP˝<%D؎EJP02319 5;l̝+@(AA- eAo`՘;yӎL~Ά3WRiR7"D=Y uaqq}_y,%iޅDnG"SĥvCwYGBݴ.ԍy86A%jؗ J}t_SvGz$X`[) EVm@KLȒ].J"7a0-9ӎߥ,īe7x-.**q] I8$KNb m!%vu".uHyv>2%@-*Iw&k!*3d[pH@ ,*8 ='B~O׼Nyߊ讚dnlt\{$8"yKuw@旀jF4ETxqͬ 5c\R| '"oPseJc[)) I$ jwAz[R MsDŽ dmIENDB`Dd.i hhT  0ARiz(fT#5E0F=z(fT#5JFIFddDucky!Adobed5 *   #%'%#//33//@@@@@@@@@@@@@@@&&0##0+.'''.+550055@@?@@@@@@@@@@@@"0 @!"31A#5$4P2!1AQaq"2@rBRb#3 s0CS$4t50!1Qa AqP"2BRrb ) iw7N^ζ>gtVC|W TkNͺqإg^Ի[c]-q`S2\+ǚa{ Jݪ[˲1i*n돥_GiϞc\>եS gؕG szklk4 TŞݓ/˻yqIm13aPie)]te؉ԓKw;du*w504}=kdeZUz`).{ȴ7x[I:pln\9=s.@ y6kFr3LأęLcq6&(تH\ 5FȽEl3qkQƫ֣Q}8ߟr>DO|x*Jx+DOoߕLLLO}Fr*{/8či;2jɍ\I\Y"L|sO`,Sll<퐤f}ȖB kl# VYxc gv ʊcK2%a/AR$ɈwC(9!SdxF̢dU<\R2@R&c UH %3KE =TT [:CcXS\YE1Z`IG*>2Db >!UEjQY4Ŝ>fDEԍΐqpPGᑅPs#)\į$tƑEsy!I j/K~e5{]%wjx{q7F!ܺ):w3%5B*H_f ;;OKc` $ULEяcJw|bG_`Bp]DW,xj#+PyF5?f:1_X~%2N:5{\: L,|cE7d俸$Yʬ}4G>\&aH Rj9-\ 1(5sXKogj`ݻye.(?&nvY7ܢp& eq2 q#5k SXƲt=:Omu+dZmae5 Eu>F:s_Umzx_5YfPC&-+LLd써 f9d}?JU!_Jas53>0e H@@FyY]H)uT*UO!_?џ" Y5ỳUyANCw~XpW4̩/ʷ +է4{chR !o, -nٍ%mۖOjS4L u[QN1hstES\,৭|JளՖjBs iibw]TW%2HQshsi%l^ $B#f{?Ь_lAn=f3_ zy~5mI|59ϲ+܅bM 4yBNnV(̅=~k.F1wx6a ]0KMY-c$:ɮH8 zx֘ADҠdUUKZx:N Q2F6o.>2!#l}\W=wNIr> XQƚYy禿)M~S1ƾY~I2țN\(` +PlG1 cɗfǷ~|)' Ԭ93}ٟ(!O6d7cD Kdęz4  i bP{e3n !FBNWYc$䚻GV R hXpƬׅzأb2aýnS7H#o: 1#786ǀsy&yQ8UFH0Qx"Nֽ҃אIhOwcdrW' hdx_rW cxUNhqSٔ<~CQ ,FS1Q4Bj@6̊;9qhz4K?'~Tāt`Qи{|n -}-iE& _݀p-Žۧ7+_6qIΦ<[Z<mݣ@OMa#Tg6κfPs`>CMJP脃7Plk^Yhxjx~ n´ȥO 4a}A0,q4?ʏ7C-S؏ۑ,{CMH$Um{E+)v]#ZX6u]qlF aK~h 늚H?aQrԇ+T3ޗmSჇڑѣl 0k=K7/I&6Ǘ3~/2})hXHo @o)s8וab0 .afX8ULL~bjʿt:ʁe(sRAVwf'^$ V=j]PVbܔ}cԷckц"_捷ܦ0h R{nTf(e8@u=F5p591{'yD4sE.AQ<[fqsW]?VM8s'UB;1 , TpC$s٣C 2pE4ߦ0L ?)F9cD ќ9|SnQQhd*xQ@:P2J Y-벦V[`6׸gTtq"qle{>QJJEX1 JDûk֣+tPnO!('qvuHݧ5ϝ!@lp=-$MBޟ0 e}Z ZG&GGC)bAy;r> |+Uj4#ne.nn5n*jX8J정{Iuh@ѪIloۯʃ/QL "+i=VB4͊]\Ȅ}ivە#琾FTq+uu)[+CF䁩boW8W Q龎E6ەGq!|3b 6cLZ!N 6%LȄ'dߓpQddx(P}z]Ud|#pΟq;i٢Ȱ篅]$e|- d)[OQ#LCeq֧uEu },  zwJPě\Se½ȑSmrGyH[CϑZ3fx0<# gNm+AXAַux_ju[I}K٥";7{w嵐:["plnPn,jF>Mw=QyX"ɶ4ѷy S xxk SoȽ!X7%9_V45I! .I !%MmSkȨ+'[OI v2HTlIԐ+6Ppv'>"w{jF߈:#l C9,Iμ]"9,WP$znac+K56mNU"EٍhjЀ8`.ŤjUrbR@U[-~*̪M'=? B@*XUQ'*o X6+ֶ_}MG#RM}ڋ7<ԿM$6#!H7:B gk*^J8OB8 Allmrkuse tekstH*^JFg@BF HTML TypewriterOJQJCJPJ^JaJ8&@8 Footnote ReferenceH*6*@6 Endnote ReferenceH*2O2 Lpumrkuse tekstHOH Pealkiri nx$OJQJCJPJ^JaJTB@T Body Text#o$a$*$^]` mHsHaJ /@ Listp^J@O@ Pealdis qxx $CJ6^JaJ],O", Registerr $^JD^@2D Normal (Web) sOJQJmH sH ,@B, Header t 9r , @R, Footer u 9r >"@> Caption vB*ph6aJ]<Or< pbody wB*phOJQJ^Je@ HTML Preformatted7x 2( Px 4 #\'*.25@9OJQJCJ^JaJ.O. narrative y6@6 Footnote TextzCJaJ^0@^ List Bullet*{ & F$a$*$^]` mHsHaJ@O@ Balloon Text|OJQJCJ^JaJ.O. Tabeli sisu} $:O: Tabeli pis ~$a$ $5\,O, Paneeli sisu>V@> FollowedHyperlink >*B* phx9/y&<BINYuy #).7@JQZcktz9/    "#$&(*+,JKLMNOPQfhijuz}~()*+,-./0 1 2 3 &<BINYuy #).7@JQZcktz      !"#$%&'()*+,-./01239/fght8c7FD.   C ~  S + M 8DYkx;K}n R!}"@#E$u$}$((#).)**,W.e..035&55::i;I<= >DDEEFFwHxH)I+I(J8K9KAKKKKLLLLIMJMMNOPQ,Q>QQgRRRRkSlSS TTUU-UHURUWYZ[[\`]]]]^ ^)^N^k^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^x__`raaaaab#b-bbbbb c(c?cff(hhh&izj|j}j~jjjjjjjjjjjjWkvllnmommXnZnpqqqrrrrrEswwwwxxyy{{{|l|}6}7}n}s}z}}}}}}}}}}}}}z{deĂȂ҂ׂ؂uD89zlm<=Ӎ;Hi{$q<efy ۗLNvLMvxšÚ-.J˜*2b˞[@KSUuvؤ٤>@`n̥ͥuwdfRTިߨ%&3<EQSZbde " (+-4<>JK ,-;ENZ\ckmn!*-/6>@LM,_` -4LTV}dscڸۺͻλž3r+,@ArKkLGG\4T1 ?& &AeH)*de-.?@qr~fMYGtbp$i6t=GM)*lv%6>PeP* + 5 = y        B F H I    y   VW*PSUVjk1WOPZbq3\^_)<>AT~ Qg ->@A5T) C O    !!=!!!!!"."I"U""""""M#R#T#\#h#######($G$h$u$$$$%%J%l%%%& &&&$&,&4&?&G&M&S&^&d&l&r&}&&&&&&&&&&&&&&&&&' ''!')'1'7'C'I'Q'Y'Z'r'}''''''''(U((()'))))**%*.*s******++7+]+h+q+z+++++++8,A,J,K,,O-P-Q----------------------... .#.$.../.3.4.5.;.<.B.J.K.T.U.g.h.k.s.t.x.y.................................// //////$/%/*/+/,/-/.///0/1/2/3/4/5/6/7/:/000~00 0 0 00 0 00+ 0+ 0+ 0+ 0+ 0+ 0+ 0+ 0+ 0+ 0 + 0 + 0 + 0 + 0 0 0 0 0 0C 0C 0C 0C 0C  0 0+  0 00) 0) 0) 0) 00000000000 0 00 0 0 000000000000000000000000000000 0 0E0E0E0E0E4 0E4 0E0E0E0E0E0E0E0E0E0E0E0E 0 s0JMs0JMs0JMs0JM s0JM s0JMs0JMs0JMs0JM 0 0R0R0R0R 0R 0R 0R0R 0 0U 0UU0HU0HU0HU0HU0HU 0UU0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[0[ 0UU0_0_0_0_0_0_0_0_0_0_0_0_0_0_ 0UU0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c0(c 0U0om0om0om0om0om0om0om 00r 0rr0r0r0r0r0r0r0r0r0r0r0r0r0r0r& 0r& 0r& 0r0r0r 0r 0r 0r 0r 0r 0r 0r 0r 0r 0 r 0 r0r0r0r0r0r0r0r0r0r0r 0r 0r 0r 0r 0r 0r 0r0r0r0r0r0r0r 0rr0 0rr000000000000 009 09 09 09 00s0s0s0x0x0x0000x0x0x000000 000s000000000000000 00.0.. 0.. 0.. 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0. 00}0}0}0}0}0}0}0}0}0}0} 00 00000000 0000 00r0r 0 0,, 0,s0As0A* s0A* s0A* s0A* s0As0As0A0As0A 0A 0A 0As0A$ 0A$ 0A$ 0A$ 0A$ 0As0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A 0,000000* 0* 0* 0* 0* 0* 0 * 0 * 0 0 0,0000800000000800e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e 0 0r0~0~0~6 0~6 0~6 0~6 0~6 0~6 0~0~, 0~, 0~, 0~, 0~0~ 0r0 0 0 0 000 0 0 00" 0" 0" 00 0000000000o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0 {0 {0 {0 {0{0{00o0o0o0o0o0o0o0o0o0o0o0o0o0o00000o0o0o0000o0o0o0o0o0o0o00{0000o0o0o0o0000o0o0o000000o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o000o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0o0006 06 s056 s056 s05s06 0000001 01 01 0000000' 0' 0' 000 0 0 0007 07 07 000 0 0 0005 05 05 000/ 0/ 0/ 0002 02 02 000 0 0 003 03 00 0 0 00; 0; 0; 00- 0- 0- 00- 0- 0- 000 00 00 008 08 08 00 0 0 00( 0( 0( 00 0 0 00! 0! 0! 006 00 0 00 0 0 00 0 0 00 0 0 00: 0: 0: 00% 0% 0% 00 0 0 00 0 0 00 0 0 00# 0# 0# 00 0 0 00@z0@z0@z0 0@0@0@0@0 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000WWWYY\&ReoqшG !+9328;@BFKRY^d $i?PXbbb|nu7*%KkrGP T!%T'l)*!++.02239335679:<=>?ACDEGHIJLMNOPQSTUVWXZ[\]_`abcefghijk834"#>#lllppqqqq'r9/XXXXXXXX :0e0e     A 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||S"@ 9V8(     ! S ccC"`  c $ ? ! ~  6$?u  fB  s *D$?z  fB  s *D$?  x   0  ?7   ~   6 $?  ^ ~   6 $? } x   0  ? = fB   s *D$?e x  0 ?{ fB  s *D$?   x  0 ? hZ  ~  6$?   ~  6 $?G~  fB  s *D$?a fB  s *D$?a^  x  0  ?oZ  ~  6 $?    x  0  ?^"   '# S ccC"`  c $ ?'#f  s *$?hf  s *$?" r  s *  ?h  r  s * ?xo f  s *$?\ @  r  s * ?@   f   s *$? 3f ! s *$? r " s * ?\  r # s * ? r $ s * ?x4c f % s *$? Qr & s * ? Q f ' s *$? r ( s * ?\ c< f ) s *$?Y s"r * s * ?Y ! r + s * ?  r , s * ?X  ` - c $$? fB . s *D$?fB / s *D$?$ ? fB 0 s *D$? fB 1 s *D$?fB 2 s *D$?4OfB 3 s *D$?fB 4 s *D$?X fB 5 s *D$?`B 6B c $D$? `B 7 c $D$? fB 8 s *D$?   @  #t, f2 9 s *$?%!f2 : s *$?- T"f2 ; s *$?J"f2 < s *$?[$&f2 = s *$?$aO'f2 > s *$?@%'f2 ? s *$?x%u!'f2 @ s *$? )z O,f2 A s *$?)",fB BB s *D$?Z fB CB s *D$?Yh"$fB DB s *D$? &)fB E s *D$?2l0 fB FB s *D$?"$fB G s *D$?"$fB H s *D$?"$fB I s *D$?&) J B)[&  K B w*wt,  L B,*),  M Br%o'  N B% '  O B&#(  P HqqP x Q < ?   M  RS ccC"@f '~ S3 '~Z2 T S ?M' TB U C D?{{ TB V C D?{~ TB W C D?zb TB X C D? @f .  Y3 . Z2 Z S ?,% TB [ C D?&' TB \ C D?(}  TB ] C D?.( TB ^ C D?n @f (C _3 (CZ2 ` S ?&Z TB a C D?[\ TB b C D?]wC TB c C D?(]' TB d C D?h ` e c $?  v   f B f ? SNA  Z2 g S ?}  h B!h ?&  ! i B"i ?   " j B#j ?M  #Z2 k S ?s  TB lB C D?0L TB m C D?pl TB n C D? TB o C D?~6 j TB p C D?%  <T  h ! # cc m  q3 C"  !` r c $?mGTB s C D?MGMTB t C D?aGa u <$ ?[  $TB v C D?aGa: 1h w3 C" ` x c $?1 hTB y C D?  z <% ?1 %TB { C D?   TB | C D?M } <& ?Ie & ~ <' ?h '  <( ?hP (< C zj. e9/o)t`!!54 P? 8t(#4QJ #9 tR_ 4 4 idx1133 OLE_LINK1 OLE_LINK2 OLE_LINK3 OLE_LINK4 OLE_LINK5 OLE_LINK6N10088N100C3N100EEN10110N1012AN101487Krrrr.:/ 7Krrrrĥĥ> :/#-12nxz  "%%&&N&W&o+y+..L/[///$0301 1122244;;W?_?B@F@WDbDREaEFFyGGHHHHI'IZK`KKKKKKK+L1L5LALtLzLuQQ]]]]^^^^^^$^%^.^/^8^9^F^G^S^V^W^X^^^_^f^g^k^|^^^aaaabbbbbbbbbcccFgIgn}q}}}ȂтYdiwً̋BPqtfi5;BGW]v|afiq nt36<?";>EH!$-08;ABGH ƳʴʹŶȶ58fi (/W] (-5X_}&)-4?FQWflov|4;  6 9 > D z       #        ,27>GM '39>ENTv}[^_`il4:~BHU[Wf !RZUd*2dl.6*3K,N,V,_,z,|,,,,Q------------------------------.... ....$.&.'.*.+.-./.2.B.E.P.S.U.X.[.^.a.d.y.............................// /////:/   8CDLYjkvn Q!R!|"}"?#a$d$(0(**++S+W+>-K-//]1b111+2022233335555??&@,@\@b@DDGG+I/I(J,JJKKKKKNNQQ,Q0Q X X)X+X]]]]^^ ^^)^-^N^Q^k^}^aaaaaaaabbbbbbbbbcccdeqhwhhhqrww {{ ||~&9ňqtfiy~5<W^v|Ȟʞ̞ߞfmAPHNQ ţUY`bnt02TYߨ36<?EJUV\]"$êǪ"(*/067>C;>EHNS^_ef!$*,1289@Eî-1`c-047NOno²ҲϴдöĶMN:;`!BF &-AHelHO+;AFlp}A &)78?FQWflPS+ / 6 9 > D z               #       P Z  w z |    ,2lulo '39PT[^chrw 4:%7)0BHU[ 2 !RZhk  '.4px      x##%,%K,N,,,-Q-----------------... .".$.-./.2.5.:.<.A.B.I.K.S.U.f.h.j.k.r.t.w.y.................................// //////#/%/)/:/33333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333ht  ؂"K,Q-----------------. .".$.-./.3.5.:.<.I.K.S.U.f.h.r.t.w.y.................................// //////#/%/)/:/LilyC:\Documents and Settings\Lily Loidap\My Documents\EITS\Taotlused\LeonardoEUCIPmat\Projektidokud\valmiv materjal\B\ENG\ProgrammingB3OK.docLilynC:\Documents and Settings\Lily Loidap\Application Data\Microsoft\Word\AutoRecovery save of ProgrammingB3OK.asdLilynC:\Documents and Settings\Lily Loidap\Application Data\Microsoft\Word\AutoRecovery save of ProgrammingB3OK.asdLilynC:\Documents and Settings\Lily Loidap\Application Data\Microsoft\Word\AutoRecovery save of ProgrammingB3OK.asd;      !!""##$$%%&&''(())**++,,--..//00112233445566778899::;;hOJQJmH sH h^JB.3.^JB.3.2.^J...^J.... ^J .....  ^J ......  ^J....... ^J........ ^J.........h^J.^J..^J...^J.... ^J .....  ^J ......  ^J....... ^J........ ^J.........h^JB.3.7.h^JB.3.B*ph65^JB.3.6.^J...^J.... ^J .....  ^J ......  ^J....... ^J........ ^J.........OJQJ^J)^J.^J.p^J.@ ^J.^J.^J.^J.^J.P^J.^J)8^JB.3.6.^JB.3.6.^J... ^J....  ^J .....  ^J ...... x^J....... p^J........ ^J.........^J)^J)^J)^J)^J)h^JB.3.^JB.3.5.^J...^J.... ^J .....  ^J ......  ^J....... ^J........ ^J.........h^JB.3.B*ph65^JB.3.6.^J...^J.... ^J .....  ^J ......  ^J....... ^J........ ^J.........^J)h^JB.3.B*ph65^JB.3.7.^J...^J.... ^J .....  ^J ......  ^J....... ^J........ ^J.........OJQJ^J)^J)^J)^J)OJQJh^JB.3...p.@ .....P.^J)^J)^J)OJQJ^J)OJQJ^J)^J.^J.p^J.@ ^J.^J.^J.^J.^J.P^J.^J)OJQJ^J)^J)OJQJOJQJ^J)8OJQJ^J)OJQJ^J)^J)^J)^J)^J)^J)^J)^J.^J.p^J.@ ^J.^J.^J.^J.^J.P^J.^J)^J)OJQJ^J)^J);  !"#$%&'()*+,-./0123456789:;;WW8Num1WW8Num2WW8Num3WW8Num4WW8Num5WW8Num6WW8Num8WW8Num9WW8Num10WW8Num11WW8Num12WW8Num13WW8Num14WW8Num15WW8Num17WW8Num18WW8Num19WW8Num20WW8Num21WW8Num22WW8Num23WW8Num24WW8Num25WW8Num26WW8Num27WW8Num28WW8Num29WW8Num30WW8Num31WW8Num32WW8Num33WW8Num34WW8Num35WW8Num36WW8Num37WW8Num38WW8Num40WW8Num41WW8Num42WW8Num43WW8Num44WW8Num45WW8Num46WW8Num47WW8Num48WW8Num49WW8Num50WW8Num51WW8Num52WW8Num53WW8Num54WW8Num55WW8Num56WW8Num57WW8Num58WW8Num59WW8Num60WW8Num61;^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^:/@J,J,J,J,9/@UnknownGz Times New Roman5Symbol3& z Arial]&Arial Unicode MSMS Mincho?5 z Courier New;WingdingsO& k9?Lucida Sans Unicode5& zaTahoma"AheFFp+~܂}!20d0 J,0QKURSUSE TPNE NIMETUSLilyLilyOh+'0,  4 @ L Xdlt|KURSUSE TPNE NIMETUS9URSLilySE ily Normal.dotNLilyl.d6lyMicrosoft Word 9.0U@@@n=Oh@r{p+GRtL  ?I~$&WordMicrosoft Word  g`"System4f: &~ - @Times New Romanww @w4f:-g`& C (d1 (d(58?9:=@@BCDEGGGHHIIIJJKLLMMOR S TWXZZ]]^!__"`a"a$b$gce%f(f+h*h,j1k0l/m2n4n9o5p6p:q9q<t:t;t?tAuAv>}vFwAxBzE{L|F|U}I}L~Jv~QPsTNQSYTm^UZWY‹bÌ^hgčaĎ`ĎeőeőiǔiasȖmɘnʚqʚt[|˛s̜s˜v̝y̞v͠yΡ|͡U΢~=Ϥ~ϤХЦCѨҩҪMLӬԬԬԮծհְֲ״״شصe)ٶضڸ1۹ܻۼܼܽݽݾݾ޿޿íQŮűƱƲǰDzǴ]Ȳȴɶʵʷ˶̸ͺmκμо~ֆܕ=--E-ZVEEE|EPh"Z=h Pf--V-E fEE"f"|="f--f|Eƀ--=u Ef -3E uEV V | -E h |uP VEf- P==h-3 hP(V f-- } hf -" uVV= h =|--E u -=hV hEf uV --hV h= uV V--h- =fEV =h-3Ƈ fP|ާP f-ƙ fh f uXP=Eh =3=3- ufEVVh== E-1Eu =hf VhE VEhhf3|fhfZ|hZfZ|Zhf hZqI1-ZZ- |fffZ3u --h h-h-EV hfƙƙͱƱ|ͱ͙==E==E==E==E=E=E==E==E==f||hhf|Zƒ|| =Zh͒uᇀƇ||ƒE͒ƙƒƙ|  :  =hh겲uƿƧ͒hޙ  i$*MU  E U$ :C   =  *  Ud  =C$  22   =   $ E  di   :  =    =   O* :C  =-i*  OU  Ef f    d*  :O   =f  f i$*CU  ==  -    C    =( P| =       =͒" EZ    EhVVVVVVVVVVVVVVVVVVVVVVXEuހZEE--ZhE1--1EXuufEVbhVb,yzztyyzt䏢&'2 vS`g @Times New Romanww @w4f:-g`&.&~$C P'/(H]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^ϼij]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^ːeiiTXXX\\cggkoo]aaVZZ`dd˟bdd^bbZ^^X\\W[[Y]][__]aalpp̣aaa]]]WWWUUUXXX```iiioooܑ]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^]__aaa```[[[YYY___jjjrrrڙ}}}򲴴ꓗossX\\JNNZ^^TXXTXXbffx||Νvvv```YYY\\\[[[mmmoqqbffW[[TXXW[[Z^^VZZQUUVZZRVVNRRQUU[__txxߧpppPRRXZZW[[Z^^\``^bb^bb]aa]aaHLLNRRhllϕmmm[[[QQQ\\\ZZZWWWVVVWWWZZZ]]]```aaadddcccVVVZZZ^^^bbb[[[ZZZaaa\\\ddd]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^`bb```]]][[[YYYYYY]]]bbb___mmmlll[[[^^^[[[^^^SSS[[[\\\XXX[[[fjjX\\X\\Y]]bffY]]]aaW[[Y]][__dhhW[[SWWaaaaaaaaaaaaaaaaaaaaaaaa򸼼{]aaX\\W[[TXXQUUX\\UYYTXXVZZ\``^bb]aaZ^^\\\TTTUUUVVV___UUUjjjӕlll^^^^^^^^^\\\___[[[jjj秧jllVXXRVVRVVW[[]aa]aaX\\QUUVZZW[[X\\\``[__OSSTXXkooؒ[[[NNNUWWacc]aaZ^^W[[TXXSWWRVVRVV[___ccUYYSWW汱~~~ZZZUUU[[[XXXeeeeeeeeedddcccbbbaaaaaaXXXRRRWWW~~~```\\\aaaXXX___VVVVVV^^^VVV]]]]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^[]]XXXWWW[[[]]]ZZZYYY\\\```NNNSSS]]]SSS^^^\\\YYYVVVcccddd]]]XXXaeeSWWSWWRVV[__QUUZ^^Y]]\``TXX\``X\\Y]]\\\\\\\\\\\\\\\\\\\\\\\\协fjjHLLHLLUYY\``aeehll]aa^bb^bb\``Y]]W[[VZZW[[bbb^^^bbb^^^jjjZZZggg\\\OOOZZZdddeeebbb]]]VVV\\\ܟiiiLNNZ\\W[[X\\Z^^]aa^bb]aa\``fjj\``OSSVZZ`ddTXXOSS`dd䜜```RRR```jllUWWSWWSWWTXXUYYX\\Z^^\``W[[_cc[__JNNKOO{mmm[[[ZZZ___aaaZZZ]]]]]]]]]\\\\\\ZZZYYYXXXdddnnn^^^HHHkkkYYY]]]^^^\\\ddd[[[[[[eeeYYY^^^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^_aaXXXWWW___ccc___\\\^^^mmmgggTTTMMM{{{ZZZ[[[hhh```XXXVVV```___[[[UUU^bbW[[\``Y]]aeeTXX_ccQUU`ddMQQQUUY]]W[[````````````````````````ϚPRRTXX]aaaee^bbW[[TXXVZZVZZW[[W[[X\\Z^^[__[__\``]]]]]]aaaXXXfffUUU[[[氰```[[[^^^fffggg___[[[^^^kkkffffff񦨨WYYFHHcee[__[__Y\^VZZTWYSWWTWYUYYSVXW[[UXZY]]]`bVZZgjlfhhLLL`bbhhhPRRUYYX\\\_a_cc`ce^bb[^`Y]]_bdNRRTWYcggVY[OSSceeKMMaccbddUWWY[[cee[]]Z\\[Z\XZZZY[XZZ[Z\Z\\TSUUWWbacbddTSUaccXZZZZZRTTZZZbddZZZY[[eeeTVVZZZ]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^cggXZZVUW[]]a`bY[[WVXVXXTSUVXX^]_\^^\[]xzzTTTXZZbbbOQQfff\^^___[]]```\^^TXXTWY^bb[^`bffSVX^bbNQSlppTWYVZZcfhX\\\^^\^^^^^\^^^^^\^^^^^\^^圜RTT^bb_ccY\^PTTSVX]aa]`bTXX^acZ^^WZ\X\\]`b^bb[^`W[[[]][]]^^^NPPbbbTVV\\\\^^accY[[WYYZ\\XZZRTTUWW_aaSUUZZZ```RYXSZYU^]\cb]`bUXZUX[Z]_\_b]`b^ad\_acfiSVXZ]`ilnZ]`QTVgiiVZZ`bbVZZXZZ]aaX[]`ceY\_^acY\_QTV_beWZ\[^aY\^VY\Z]_WZ]LOQlorZ^^Z^^X_^X_^X_^X_^V_^X_^UXZTWYXX\Y\^]]a[^`[[_UXZTTXZ]_[[_SVX``dSVXrrv[__`bbVZZ\^^TXX]__W[[\^^Y]]\^^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^Z]_SVX\\`beg[[_PSUXX\]`bUUYadfUUYSVXaaeQTVZ\\Z^^XZZZ^^[]]UYY]__X\\[]]W[[SVX^ad[^`X[^Y\^X[^Z]_Z]`VY[X[^]`bWZ]Y\^Z^^Z^^\^^Z^^\^^Z^^\^^Z^^giiUYYY\^VY[VY\X[]Z]`[^`WZ]PSUUX[SVX]`cUXZPSVWZ\behTWYY]]X\\]__[__Y[[X\\^``bdd]aadkjKTSMTSX_^V]\Za`cgg^bbJNN^``^``؂PYXR[ZS]\V_^Z_bcfiVY\KNQWZ]`cfWZ]QTWJMP_beadgKNQJMP}[__X\\Z^^W[[UYY^bbQTWUX[ORUZ]`\_b[^aadgNQTZ]`Z]`Y\__be`cfPSVX[^}䌐X_^X_^V_^V_^V_^V_^U_^V_^RWZUX[X[^VY\QTWWZ]`cf`cf_bebeh_beVY\\_bQTWZ]`Y]]W[[X\\Z^^TXX[__W[[Z^^Y]]Z^^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^JOR[^a\_bY\_[^aVY\PSVVY\PSV[^aUX[Z]`cfiNQT^adX\\Z^^VZZZ^^Y]]UYY[__X\\Y]]W[[SVY^ad[^aX[^Y\_X[^Z]`Z]`VY\X[^]`cWZ]Y\^Z]_Z^^Z^^Z^^Z^^Z^^Z^^Z^^txx]aaX\\Y\_[^a[^aX[^X[^\_b]`c\_bcfidgjfil_be\_b_be_beRUWY\^X\\[__[__W[[X\\\``VZZ[baW`_KUTR[ZYbaQZYPYXU\[OVUSWW]aa\^^򙢡\edS\[R[ZQ[ZS\[QVYbeh^adY\_beh]`cVY\`cfSVYgjmadgRUXz}QUU]aaVZZY]]TXX^bbX[^[^aX[^[^aZ]`^adehkUX[Y\_X[^VY\\_badgUX[NQTX[]^bbX_^X_^V_^V_^V_^V_^U_^V_^Z_bWZ]_beehk]`c[^a\_bUX[WZ]Y\_Y\_QTWX[^VY\PSVehjX\\QUUZ^^Z^^TXX[__W[[Z^^Y]]Z^^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^V[^lor`cfSVYbehfilZ]`Z]`TWZWZ]VY\^adcfiSVYLORadfX\\Z^^VZZZ^^Y]]UYY[__X\\Y]]W[[SVY^ad[^aX[^Y\_X[^Z]`Z]`VY\X[^]`cWZ]Y\^Z]_Z^^Z^^Z^^Z^^Z^^Z^^Z^^􎒒Y]]TXX\``WZ]`cf_beWZ]WZ]\_b_beadgPSVVY\UX[WZ][^abeh\_bWZ\Y\^X\\[__[__W[[X\\\``^bbSWW[baQZYPZYXa`Xa`OXWOXWU\[QXW\``\``Y[[oxwFONYbaQZYPZYT]\V[^SVYY\__beRUXKNQilowz}Y\_DGJdgjdhhMQQdhhUYY\``SWW]aa]`cdgjadgY\_SVYUX[\_b\_bWZ]VY\RUXRUXWZ]Y\_VY\VY[RVVX_^X_^V_^V_^V_^V_^U_^V_^afiNQTMPS[^aY\_RUXUX[X[^UX[Z]`[^aTWZWZ]adg\_bRUWZ^^RVV\``Z^^TXX[__W[[Z^^Y]]Z^^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^Z_b^adSVYKNQTWZ\_bY\_VY\\_bY\_WZ]Z]`\_b[^aX[^VY[X\\Z^^VZZZ^^Y]]UYY[__X\\Y]]W[[SVY^ad[^aX[^Y\_X[^Z]`Z]`VY\X[^]`cWZ]Y\^Z]_Z^^Z^^Z^^Z^^Z^^Z^^Z^^`ddPTTSWW]aaUX[adg^adWZ][^a[^aVY\WZ]UX[[^aRUXX[^WZ]_beVY\Y\^Y\^X\\[__[__W[[X\\\``SWW[__[baT]\U_^V_^S\[QZYW`_^ed\cbVZZX\\_aa\edFON^gfQZYQ[ZXa`fknQTWVY\Y\_PSV쯲QUURVVfjjX\\^bbTXX[__VY\\_bX[^[^anqtiloSVYUX[VY\WZ]WZ]TWZRUXX[^]`c[^`ossZ^^X_^X_^V_^V_^V_^V_^U_^V_^TY\LORRUXdgj`cfKNQMPSgjm^adehkcfiZ]`UX[_bedgjSVX~]aaX\\\``Z^^TXX[__W[[Z^^Y]]Z^^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^OTWORU`cfhknVY\MPSUX[WZ][^aY\_Z]`VY\SVY\_badgZ]_X\\Z^^VZZZ^^Y]]UYY[__X\\Y]]W[[SVY^ad[^aX[^Y\_X[^Z]`Z]`VY\X[^]`cWZ]Y\^Z]_Z^^Z^^Z^^Z^^Z^^Z^^Z^^PTTY]]VZZ[__TWZ^adZ]`WZ]_beX[^NQTWZ]WZ]]`cUX[_beMPSWZ]SVY_bdY\^X\\[__[__W[[X\\\```dd^bb[baV_^T^]QZYQZYV_^Xa`W^]V]\MQQX\\ikkV_^PYX\edR[ZR\[ZcbafiX[^Z]`WZ]hknSWWW[[aee[__^bbVZZZ^^Y\_Z]`TWZwz}ª_beUX[X[^X[^_be_beVY\VY\Z]`VY[]aa_ccX_^X_^V_^V_^V_^V_^U_^V_^EJM}̸wz}ILOSVYQTWX[^SVYRUXORUQTW\_bVY[Z]_]aa\``Z^^Z^^TXX[__W[[Z^^Y]]Z^^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^NSVgjmcfi[^a`cfRUXX[^[^aVY\QTWUX[WZ]RUWedfX\\Z^^VZZZ^^Y]]UYY[__X\\Y]]W[[SVY^ad[^aX[^Y\_X[^Z]`Z]`VY\X[^]`cWZ]Y\^Z]_Z^^Z^^Z^^Z^^Z^^Z^^Z^^SWWcggX\\Z^^TWZ\_bWZ]Y\_adgUX[Z]`Ǹoru`cfPSVVY[Y\^X\\[__[__W[[X\\\``]aa_ccVZZ\cbR[ZPZYOXWU^]ZcbOXWJQPSZY]aaswwS\[W`_U^]T]\S]\W`_TY\Y\_VY\Y\_twzvy|[__X\\TXX\``]aaY]]Z^^^ad^adVY\dgjZ]`]`cSVYY\_`cfX[^WZ]Z]`TWYTXX]aaX_^X_^V_^V_^V_^V_^U_^V_^`ehjmpSVYWZ]]`cTWZ_bebehSVYWZ]Y\^TWYZ^^[__X\\Z^^TXX[__W[[Z^^Y]]Z^^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^񤧪^adNQTRUXZ]`Y\_UX[X[^WZ]QTWQTV]\^X\\Z^^VZZZ^^Y]]UYY[__X\\Y]]W[[SVY^ad[^aX[^Y\_X[^Z]`Z]`VY\X[^]`cWZ]Y\^Z]_Z^^Z^^Z^^Z^^Z^^Z^^Z^^Z^^cggTXXZ^^WZ]^adY\_Z]`^adTWZz}dgjTWZWZ\Y\^X\\[__[__W[[X\\\``Y]]UYYSWW[baS\[R\[R[ZYbaYbaIRQT[Zx~t{zOXWYbaOXWW`_T^]S\[W\_]`cTWZlornqtGJMY\_beh\_bVY\VY\X[^Y\_[^a^acZ]_[___ccTXXfjjaeeVZZJNN\``[__[__[__X[^[^aPSVRUXUX[cfiLORLORWZ]UX[Y\_`cf[^`RVV\``X_^X_^V_^V_^V_^V_^U_^V_^ux{ehkZ]`^ac]`bVZZW[[VZZZ^^TXX[__W[[Z^^Y]]Z^^]aaX\\X_^X_^V_^V_^V_^V_^U_^V_^svyX[^X[^^adVY\SVY`cf_beX[^\_aa`bX\\Z^^VZZZ^^Y]]UYY[__X\\Y]]W[[SVY^ad[^aX[^Y\_X[^Z]`Z]`VY\X[^]`cWZ]Y\^Z]_Z^^Z^^Z^^Z^^Z^^Z^^Z^^x||]aa^bbOSS[__Y\_adg\_b[^aZ]`UX[~adgWZ]X[]Y\^X\\[__[__W[[X\\\``fjjOSSW[[Za`ZcbWa`U^]YbaV_^KTSlsr}^gfDMLXa`PYXYcbU^][`cNQTQTW^addgjJMP^ad_beUX[QTWWZ]Z]`WZ]VY\Z]_WZ\\``UYY]aaW[[\``X\\W[[[__[__X\\Y]][^aZ]`X[^]`cX[^Z]`Z]`Z]`Z]`Z]`Z]`Z]`Z]_Z^^X\\X_^X_^V_^V_^V_^V_^U_^V_^Y]]RVVVZZZ^^TXX[__W[[Z^^Y]]Z^^{}}gkkOSSX_^X_^V_^V_^V_^V_^U_^V_^UX[hknQTWPSVZ]`WZ]Y\_`cfZ]_^]_TXXY]]W[[\``_ccLPP\``\``\``VZZ{]`cUX[[^aWZ]]`cPSV^adbehILO_beZ]`SVY^ac\_aY]]W[[W[[X\\\``^bb[__Y]]X\\RVVY]]TWZY\_RUXVY\\_bZ]`vy|QTWbehQTVZ]_X\\Y]]RVVX\\aeeMQQX\\Z^^VZZX_^YbaQ[ZV_^IRQR[ZMVUipoYbaQZYXa`R[ZXbaW`_[`cWZ]^ad`cfpsv[^aZ]`TWZY\_]`c]`cWZ]SVYUX[Z]_VY[]aa\``X\\Z^^\``X\\W[[[__[__X\\Y]][^aZ]`X[^]`cX[^Z]`Z]`Z]`Z]`Z]`Z]`Z]`Z]_RVV[__X_^X_^V_^V_^V_^V_^U_^V_^~_ccY]]Z^^Z^^TXX[__W[[Z^^Y]]Z^^_ccY]]X_^X_^V_^V_^V_^V_^U_^V_^nqtORUbehWZ]]`cbehZ]`X[^Z]`SVX\[]W[[\``Z^^Z^^]aaQUU`ddX\\TXXVZZZ]`WZ]Z]`UX[^adQTW[^a^adORUehk`cfX[^Z]_Y\^Y]]X\\UYYX\\]aaZ^^VZZ\``bffQUU[__UX[\_bWZ]X[^\_bUX[dgjQTW\_bY\^Y\^X\\Y]]VZZ^bb]aaRVVX\\Z^^VZZX_^Xa`MWVW`_PYX]fedmlOXW\edU^]V_^Wa`W`_SX[WZ]`cfSVYz}gjm_beORUTWZTWZTWZUX[WZ]Y\_Z]`Y\^WZ\]aabffNRR_cc\``X\\W[[[__[__X\\Y]][^aZ]`X[^]`cX[^Z]`Z]`Z]`Z]`Z]`Z]`Z]`Z]_PTT_ccX_^X_^V_^V_^V_^V_^U_^V_^TY\񞡤dgjY\_hkny|\``[__^bbZ^^TXX[__W[[Z^^Y]]Z^^TXXbffX_^X_^V_^V_^V_^V_^U_^V_^jorݘ\_b]`c[^a[^abehadgX[^WZ][^aVY[_^`Y]]]aa]aaX\\\``TXX]aaRVVSWWZ^^vzzԉUX[[^aZ]`SVY_beTWZWZ][^aTWZ`cf]`c]`cWZ\VY[Y]][__SWWW[[^bbUYYRVVX\\immRVV\``TWZ_be[^aX[^\_bRUXadgcfi]`cVY\[^`Y\^X\\Y]][__cggUYY[__X\\Z^^VZZX_^\edR\[bkj]fe\edYba\cbIRQ\edPYXYbaU_^S\[V[^UX[]`cQTWoru͕filZ]`adgbeh\_bY\^X[]\``bffEIIimm\``X\\W[[[__[__X\\Y]][^aZ]`X[^]`cX[^Z]`Z]`Z]`Z]`Z]`Z]`Z]`Z]_[__]aaX_^X_^V_^V_^V_^V_^U_^V_^TY\ehkz}psvZ]`UX[^adQTW^ad]`cVY\X[^WZ]WZ]_bdruwPTTUYY_ccZ^^TXX[__W[[Z^^Y]]Z^^NRR_ccX_^X_^V_^V_^V_^V_^U_^V_^JORadg|wz}RUXADGNQTX[^Y\_Y\_VY\TWZZ]`_be]`bonpX\\Y]]^bbW[[\``TXXW[[PTT[___ccX\\{jmpQTW^adY\_RUX_beWZ]SVY[^aUX[TWZY\_QTW]`cWZ\TWYY]]]aaQUUW[[_ccRVVX\\NRR`ddVZZZ^^TWZ`cf[^aVY\\_bVY\SVYbehVY\nqt^adFILUX[]`cUX[\_aZ]_Y]]Y]]\``cggMQQhllX\\Z^^VZZX_^R[ZHRQ[dcZcbT]\R[ZGNMX_^QUUW[[ceeU^]T]\JSR[dcS]\OXW_dgWZ]Y\_QTWcfi_beORUWZ]VY\UX[\_aZ]_Z^^[__IMM\``X\\W[[[__[__X\\Y]][^aZ]`X[^]`cX[^Z]`Z]`Z]`Z]`Z]`Z]`Z]`Z]_quuSWWX_^X_^V_^V_^V_^V_^U_^V_^X]`Z]`_be_beZ]`Z]`Z]`SVYZ]`behZ]`UX[]`cX[^ORUVY[vy{MQQQUU[__Z^^TXX[__W[[Z^^Y]]Z^^^bbVZZX_^X_^V_^V_^V_^V_^U_^V_^^cfTWZZ]``cf\_bVY\^adadgX[^WZ]TWZTWZY\_[^aY\_X[][__TXX\``X\\[__X\\Z^^UYY^bb_ccKOOOSSVY\QTW_beY\_SVY^adX[^SVY[^aVY\SVYILObehQTW^adVY[UXZW[[^bbPTTW[[]aaRVVlppSWWRVV[__VZZUX[^adY\_SVY[^a]`cVY\TWZUX[\_b^ad_beadg[^aVY\X[]\_aY]]Y]]Y]]^bbOSSX\\Z^^VZZX_^ZcbKUTT]\QZYQZY[dcZa`^ed`dd]aa`bb}QZYJSRXa`Q[ZOXWW\_VY\Z]`X[^TWZ]`ciloGJMMPSY\_SVYSVY]`bZ]_Z^^UYY_cc\``X\\W[[[__[__X\\Y]][^aZ]`X[^]`cX[^Z]`Z]`Z]`Z]`Z]`Z]`Z]`Z]_UYYX_^X_^V_^V_^V_^V_^U_^V_^V[^^ad]`cSVYORUY\__be[^aNQTWZ]RUXWZ]ehkY\_ORUadfX\\UYYW[[Z^^TXX[__W[[Z^^Y]]Z^^񊎎UYYX_^X_^V_^V_^V_^V_^U_^V_^[`cTWZ^adX[^Z]`WZ]behY\_Y\_Y\_WZ]^adcfiX[^RUX[^`immRVVZ^^Y]]X\\^bbcggZ^^Y]]\``VZZZ^^PSVTWZ_beY\_UX[\_bY\_UX[[^aWZ]]`cWZ]Z]`\_b^adWZ\X[]UYY^bbQUUX\\Z^^UYY{RVV\``VZZWZ]\_bWZ]SVYY\_`cf]`cX[^filZ]`\_badgWZ]RUXZ]`adf]`bY]][__UYYZ^^`ddX\\Z^^VZZX_^]feS]\U^]T]\V_^[dcY`_Y`_Z^^UYYTVVXa`PYXS\[PZYV_^NSVZ]`_bedgj_beWZ]WZ]gjmY\_UX[X[^behgjmadgZ]`X[]X[][__SWW\``X\\W[[[__[__X\\Y]][^aZ]`X[^]`cX[^Z]`Z]`Z]`Z]`Z]`Z]`Z]`Z]_rvvX_^X_^V_^V_^V_^V_^U_^V_^GLOVY\X[^SVYUX[VY\TWZTWZWZ]]`cUX[Y\_adgNQTQTW}^bbX\\Y]]Z^^TXX[__W[[Z^^Y]]Z^^`ddX_^X_^V_^V_^V_^V_^U_^V_^RWZQTW`cfUX[[^aPSVZ]`ORUZ]`Z]`Y\_adgbehSVY]`cW[[Y]]Z^^X\\\``_ccY]]VZZ[___ccbffTWZY\_^adZ]`WZ]Y\_X[^X[^^adTWZ`cfadgTWZ_beZ]`Y\^]`bRVV]aaSWWY]]W[[Z^^dhhVZZY]][^a[^aY\_UX[WZ]\_b]`c[^a_beZ]`UX[RUXRUXRUXVY\\_a]`bX\\^bbSWWY]]y}}X\\Z^^VZZX_^LUTLVUOXWT]\[dcW`_SZYX_^^bb\``Y[[dkjW^]QXWPYX^edZ`acfhUX[RUWWZ][^`UX[^acTWZ\_aZ]`PSUQTW\_a\_bSVXVZZ]aaVXX\``Z\\W[[]__[__Z\\Y]]]^`Z]_ZZ^__cX[]\\`Z]_\\`Z]_\\`Z]_\\`\]_{{{Z^^Z^^X_^X_^X_^X_^V_^X_^cfhehj\\`WZ\ddh]`bVVZZ]_YY]\_aTTXTWY^^bPSUmmq\``W[[]aaZ^^TXX[__W[[Z^^Y]]Z^^lppZ^^Z^^X_^X_^X_^X_^V_^X_^]`bUXZ``dQTVbbfTWYbbf[^`\\`Y\^XX\[^`\\`ORTrrv]aaZ\\Z^^[]]UYYUWWTXXZ\\]aa]__TXXY\^]`b\_bZ]_Y\_X[]X[^Z]_behORTY\_]`bGJMY\^UX[]`b_ccQUU^``UYY[]]TXX`bbw{{SUU^bb]`b\_a[^aX[]UX[VY[Y\_Z]_QTWbegZ]`SVXcfidgiUX[TWY]aaW[[ceeRVV\^^Z\\Z^^XZZZ^^\ed[edR[ZOXWV_^PYXQXWbihZ^^Z^^UWWrttHJJOQQcgg_cc\cb[abY`_W]^V]\W]^Y`_SYZ[baZ`aRYXRXYY`_Z`aUYY\^^KMM[]]^^^[]][[[dfffffRTTUUU[]]edfUTVUWW^]_\^^^]_\^^^]_\^^^]_^^^giiY[[PRRSUU[]]]__^```bb`bb^``\[]XZZYXZXZZ]\^\^^`_aVXXdcelnnWVXLNNbff\``W[[RVVgkk`ddW[[]aaTXX^bb]__Z\\UWWQSSUWW]__`bb^``XZZ[]]`_a`bba`b\^^YXZUWW^]_WYYbaceggTSUSUU䁃HHH`bbYYY\^^^^^WYY^^^cee```QSS]aaOVUNTUZa`]cdU\[RXYX_^QWXT[ZV\]W^]V\]SZYQWXRVVeggWYYQQQ]__^^^LNN؉DFF\``X_^V\]W^]Z`aZa`X^_T[Z\bc[baZ`aZa`Y_`Y`_Y_`[__PRRlnncccGIIxxx\\\\^^ZZZZ^^^gfR\[OXWU^]W`_S\[QXWPWVUYYfjjTVVoooWWWdffVZZT[ZU\[W^]Y`_X_^U\[RYXX_^W^]SZYRYXX_^]dcZa`SWWUWWWWW^^^^^^UUUWWW]]]WWWdddgggdddZZZeee^^^^^^^^^^^^^^^^^^^^^^^^ߋLLLUUUjjjaaaUUUZZZ]]]___bbbdddbbb^^^XXXUUUZZZ___[[[RRR]]][__RVVRVVY]]]aaLPPIMMY]]VZZ^bbzzzRRR```oooaaaSSSXXXcccbbb```]]]\\\[[[[[[[[[YYY```YYYKKK[[[hhhJJJ___cccaaaZZZUUUYYY^^^_aaaeeY`_NUTHONNUTX_^Za`SZY[baX_^U\[U\[W^]Y`_[ba^bbRTTYYYcccaaaXXXuuuqssX\\U\[U\[U\[V]\U\[RYXQXWW^]V]\U\[T[ZT[ZV]\X_^\``hjjWWWRRRyyy\\\^^^ZZZ\^^T]\S]\U^]V_^S\[QZYX_^ahgVZZaeeSUUqqqLNNVZZTXXSWWW[[\``]aaW[[QUUVZZUYYW[[Z^^Y]]UYYVZZZ^^z||hhheeeeee^^^[[[ccceee]]]\\\SSSWWW[[[]]]]]]]]]]]]]]]]]]]]]]]]ϊZZZPPP\\\ffffffaaa^^^ZZZXXXZZZaaaiiinnn```___WWW```aeeZ^^eiiaee`ddUYYZ^^gkk\``_ccrrrNNNSSSccchhhccc[[[[[[\\\]]]```cccfffhhhaaa```TTT[[[便^^^TTTRRRTTTYYYZZZXXXXXXY[[EIIbffmqq\``SWW_ccaeeTXXW[[UYYTXXX\\]aa]aaVZZOSS^``cccgggWWW\\\빻aee[__W[[[__cggeii]aaSWWW[[X\\X\\X\\Y]]Y]]Y]]Y]]QSSHHHkkk\\\^^^ZZZ\^^QZYU_^V_^U^]T]\QZYQXWV]\X\\_cc^``𶶶|||moo`ddVZZTXXY]]\``Y]]TXXTXXW[[\``Z^^KOODHHY]]xzznnnZZZXXX^^^ZZZ___```YYYXXXTTTbbbWWW````````````````````````眜cccXXXYYYQQQ]]]```cccdddccc___YYYVVVQQQ]]]}}}Y]]JNNW[[W[[Z^^Z^^`ddbffRVV[__Ȅ[[[WWWYYYRRR```aaaaaaaaa```]]][[[YYYTTT]]]yyy歭pppZZZNNNWWWbbbaaa[[[YYYbddVZZEIIMQQaeeZ^^SWWTXX[__]aaX\\SUURRRTTTYYYhhhșeiiGKKHLLVZZ]aa]aa^bb_cc_cc^bb\``Y]]UYYUWW]]]\\\^^^ZZZ\^^S\[S]\OXWQZY[dcU^]KRQKRQVZZ\``ikk뉋wyybddWYYXZZ]___aa^``jll`bbVXXRTTY[[z||kkk]]]\\\hhh```dddeeefffjjjfffkkkggg[[[[[[[[[[[[[[[[[[[[[[[[̖nnn^^^]]]ZZZWWWVVVVVVYYY]]]```wwwhllW[[`dd[__[__X\\[__[__RVV`ddąfffggg\\\ZZZXXXVVVWWWZZZ]]]___}}}񷷷kkk\\\ZZZXXXYYY]]]fhh_aadff呓|~~`bbPRRQSSY[[accdff^^^ttt鰲gii]__Y[[WYY]__[]]WYYVXXZ\\bddjllprr\\\^^^ZZZ\^^clkblkV_^R[ZXa`PYXT[ZlsrVZZ[__qssḺxzzdffVXXNPPIKK[]]~ػӱ໽Ұ\\\^^^ZZZ\^^FONOYXNWVPYXW`_]fe\\\^^^ZZZ\^^Xa`^hgYbaW`_S\[LUTsww\``^bbY]]RVVhll\\\^^^ZZZ\^^PYXQ[ZOXWXa`YbaLUTbffVZZY]]]aaZ^^KOOcgg]aaquu]]]dddeee\^^IRQWa`ZcbOXWW`_Yba}UYY]aa^bbY]]`ddTXX\``Z^^_ccVVV]]][[[QSSXa`ZdcW`_LUTS\[R[ZW[[UYY_ccaeeSWW`ddY]]Y]][__X\\^^^ccc___WYYZcbV`_V_^S\[[dcW`_X\\\``[__^bbSWWY]]VZZ]aa[__X\\[[[___^^^_aaOXWKUTS\[U^]W`_PYX]aaNRRY]]Y]][__W[[UYYbffPTTNRR[[[\\\ZZZbddW`_R\[[dcW`_R[ZPYXnrrFJJ[__W[[cgg[__X\\bffKOOUYYaaa^^^RRRVXXYbaQ[ZW`_PYXPYX[dcswwX\\[__aee\``X\\\``dhh܈|~RUWabd[\^[\^WXZXY[篴٠z{vwpojigfgehfhhnnssyz}ʸ엝ԈzoufjYZFF861.-)'#!}zy{ zsv x!"x''y78PRbfz}’ǣ־륡~xXTwvty"! ($&"$"#$'")%&$*(+*''!  #%wso!s46UX{|ʕݳǾuv>=wz)*#'"!"!! %!&#%""!"! """$#%!# w i3/vsJRb!n $~!$$#"& %" $!)%-08070605.2-0+.,-><<:97641/**%$ !"##$#&!#x%*sZaPW")l#*u+1%,!(%%&%!#"$+#,!z)4NZ_kmxpzrzpwkogjghjkgjqt{~z}jmPV9>*1%-'!*)1 )#/%*)"!&+/), !oijwHN07$)#'!(#  "#$6<}DR.9.:19-5+/&***-.7<16(-',/6?ELUU]em_ieogqOX)2")(&"##., 54]_䊉\a39!&!&&%&&'*."1"!:8TVgikqdjOXagS[?C%*%%"!&'-.429.528AGVZ[`UZ\bjqUc0>#$(.&+ }|6>Ye˴YS/+~$% ""!"$%$$&"! u~69MQUZ]bdhadQT:<$%""(&,#)$&"!#*+-/33CCTYYbVcZcOX8@$#) &% r'|PaPN%!|{%"#"!$$!  !#$$!$"'%))$%t)-JOagdjW]CJ49!"$& %##"!'(!&;CW\ZbRZJRAKF'/ !!   ""##6:6:<@ZahrWa?I(3'%%'!!$*HObjX`=F#,$" $#""!! !$%"%8Ebktv\[8: " q"'&%'0irLA*|.%3*+$$  #*4OYhsZc8@ %#($)!&" $ $ # # # # # #',$) $:AGOU]XaKU5@ ,05 "'$)#3;RZ_hR[+5!!+(2!* %("(&y{(1BEZ[qvfm(}#| ($* }%(~HJ~vG;!#( !!*)(+.7^igq6?6>6=6=6<6<6<9?3:083<7@4>0;08 "(-0%'#% !""$!      !((%" %%,+%$#";:PTdmYf;H$/'1%-#((-(-!",1"&"'"&"&"&"&"%"%%(*-'*#'"&!~C=WSwyIQ*++$0)#!jgnx3<t!!& $$-ep]gCJ#)%('& !#$"$ " " " " # " " "$ $&%&&"$'#&#$  &%),_i_jz }""! """""!!!!&(! $&&(*'5,:7RVAJP]myv}\_/.)')+16nsx$+v%~#(&0!,!,$&huXb;C!( !  !    !"!"#*+'#"%%~~.4PTeiehZ^MWdpfpEN&. % ###""!! !!#"$#%#"   !"#'!$!$'$+ . (|p%w.7=E-0*)%#!!{#'nst{}36#(0!("$+&ERep(+"#"$ "&*\d5A?KEPCMENKTIR>H?LFWQ_M[GBGFLW]iohnTZCI=C~#"(#$*IOfl^e*,#%!$%/?K`lLV,3%'&(! &(15?DOQ]YeMYDO,6&,). %+ $"!#"$%KJJNu&$"("2.jnv!&,$HOOT(,!!$%!" !$!%  ""/7IQW`bkNV2:$  %%"" #%)). !)0:-7)3EPnyw{ptX\8<%)$("&"'+$()-TXrvTV'* &+"#GQ`jW`+3),*,'*#(!%",&0DNU_U_:C (#&"$$(! "&!%(tw+*|''##! |eecd"%02#+'[cHN! ##'"' % %# !'8@OWT\LT+3")!"$!"! # #"%- )&0BMkw~jwLW',/0'(#$*+#$'($%&'&'/0ADtyOT&+ !'%#ISalGQ"*!$&&'!+4>S]blLU&.!(!&!$"( &!%.2xUP*&)%""$&eg`` p$",aiBH$' " ###%)1@HNVV^QY;C#*!"%$%""%)"'#!!%#+&.LUjt~kvBN&3 -%/!""$#$$& !"!# "V[gmZb-6#&+!&'0FRS`6A}**""%%')%($&!'1LVakR[4=&*,&)!$ ! !%%!pTWztv' /* !03swđxz~`^"&,#+5Zc8?'*!! !!#%"!!)!+EObl]fBK*2%!&#'%($&!" !!#&%" &/>GXahrnxEO)3-70:!+!"$&!! ! !!$#((#"..('"!''! S[uU_&0"##(*6VcXd.8!!$"'"($+"*#'9BW`ZcOT)&""$#!#%!%*#%wA;z%"46PUek@C-.|CDB@&'! !+9DNX-5!%("" !!"$! (0:BFPR\PY7?% %#'!$"! ""$$&%* s%1=IUXc]gZdV`>G!) !/4"!#"#!# ! ! " !'* *2R\cnKU%.$!&(AL_jXb2:  $ %)0$+19NV_dHD,( $#!")((-xQS`]$|/,MPptJN #sKLML ! )3DPEO$,#!$## #"!':BW_]eHP'."'$)"#'"&4?ER\iivcnJT+5#&!&$!%#&!"$ #%'(#%%' $% #&+0 {(Ycgr:D%%-# &#CLjtS]' !!"& &$"(/@D||JG*&$$&& o'#$!9G.4$#'+"&!!    !""""""""""""""""' !& {3?UcMZ( ((6CcqZc$+# !#&    " ILlnBE"'"%#  DE|z z !%}KZXd38#-)jh13!&#&"(aj-5$"*$+ &$DIbgX]16$( !!!!#'#&.>FX`ckRZ.6!%!! #!$"!!   ! !!"!"!"!"!"!"!"!"#"#(#'1P]dqFP#*$$"$%/DPgq;D'"#!$"",2PUQX07(& $"!whgHE '1A`nKU!!#.*jh/3 (#&!-5^f.6"*% (X`RYEL39 %$' %("'$AIW_hp]e>D#(#$("#%&($&!!#%!!!!!!!!!!!!!!!!!!!!!!!!$(!%" &!)3=U`nxBJ!%"'$"*U_T^7A#!""  !!'""*\eJS|("$#~;:% q ("$R``n&")!"0-yAHts"l+,'(1B^i%**$$""./hl/6!'$!(#'-HM%,&.=FZdS]EO" #(#'"% "#'/EObleoWa"*&""##%$" " ($)&"" &!!   $("%("'* wMX`n9F","'.7V_W`*2"! !!!""(&-6io_e%"$43#(q>F( !/@,7''.7X_+0"%#$ !).ek-4&# &!"';A3;MULU&! " %(#~FPblZcDL)1 $#"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  !"#!'%5=T\JS#-"* "%@Hhr@H%' !"#!# #INY_ !   !  #)+lr'|) %0)2;B#"!#"$!).ek-4&# &!!(NVPXNV5= %%)" " %&%T]gq[d5>'%&"(#"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  !"#!'!8@clEO!$,/$,jr_g#(""# " ! "!$AFQW %!"u>By* *5'/"(!$ "!#!).ek-4&" %!-5dl)0#(')!$&*~*2U^U^#,$&$%*#"!!  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!"#" &+3hpjs5>!#($(""9A_fNS!" ! ! "%8=KQ #(! !$"tjg%'s ),6.6$' " ").ek-4%" %!#+dmBJ #!#+ISnxS\+3#+$,&+#"!!   !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!"#'-!(&EMowYa#+!*/PVek',!!$ ##'4:GM"#(!$  #!&# #86v s"&% /9F$"( &*/ " $!!!!     !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!    !!!!""#().!&9?lsXa (&)F@H!(!&*!##($$,>F2:$$) #"% $"%"!"! PZlvJT($ $#####""!!!!!!!   !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  !!!!!!" %.3GNen"+##&#>Fks"&'#(#(!#'#KSX`$!)."%"&+!(#'!"~"$m% #&*BKCK'-$$(#$")$;C8@ &&+#&!#% ! #$ MW]hU`0:"% #!""""!!!!!!!!!   !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  !!!!!! !$#'"&*7=eoKU#)#(,$$,6>bjIP!')!& " $!&HP\d%#$'*!" %"#rlj' :@IQ9A'-## $#(#'$,EM>F# %#&  !#& (6@gqS^1;#"$!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"%&)"% $)KTeo(/!($@Hgo!&14"%*.$) $ $*DL_g$%!$(! "!&"$v~==(!QVMW%-$ "%)$)##DLX`9A ! ")-!/8akFP/9  "% ! !!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"! #"%"%! 8@t~MU $$*&2:pxDK#(!&"!"&&,CK\e# '$ %',!'"$+ %{ltt( `fNW!"  !%"'"!(0clW`%-!%&"# &3;PYgq'!#"&!$       !!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  "  !)[ehq+3!(.%*%,RZbj%-"' "&$+$,GPNW! (%$)#(!%,"V^j!"hnJT$!& $# $!(DLdm;D$)%) ),$.6`idmCK"%)'*"%!!$&)   !!!!!!!" !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! "  !"#".8bl@I$ & %*2dm9C z$*$&!% '7?NW9C ' $%*)1%->Em(" hoGP!'"'""!%!'>FXaFP%!&+# !! % '-5NXcmKS!("#&%' !""&#&     !!!!!" !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!   $&#$ !! %,'Q[eo4<$%)$("'$+WaNX(!"$"JRV_#-& # %!&#CK`h08"&.}t*'#"flCK"!##(%19^f]f(1 z(0"'#&!$#&!)WalvHQ")!!$ %     !!!"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"!!!!  %))*! )/ x.8nx9Cu*/ &GjvAN | *&(.%,W_DM%lo_c{ " '6?IK@B!"&+#$.2=T_JT ) #!$ #!-8R_=H $'!"#"!!#$"!!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"AKhuER ""%0O^Q`(4!!"'NXXg*7!""z]dFN'cbOS!#")AJ?A(*"&,!1;PZU_*2   "% ",ZgCN|"%!""!!!#$"!!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!$-6ivWd +!!(9FWfBN#& %(2]i>M"'!"&&Zb28&[ZBF"$#*MV9;$)$'MV\d?G$ " !'coPZ~"&!""!!!##!!!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!%(%IUYf9E($#%0VcVb"!')HTWe%4'##)#)AGW^BGdg&*& ZY26!$+_h?A"$&.08emRY"$' ""!'al]g!)"'"""!!!##!!!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"#$&#&)3YfUb#")$""KV\g&/((4fuBQ$*! &$U[Y_{JJ02$#]\-1~$$!")fo:<!#*#,"GOah:? *,"""!" " (NXak9A!'##!! !""!!!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ##%&!'Wcan%!) &"8AV`=I+=Meu+9!&1! '")V]TZ),WX/2$%\[%)v%% "!(gp24$+(09]eAG$)%&"(,(-!& #''/8YcNW'$##!! !""!!!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! %%"!CN[hD.3JNBF'/"#$98f "$+luBD#'#,O[Wa*2"&!!&#}!lyi"$("19YcIT'"!    !!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ##!$ (@Kan*5!)!$%&29vؕ('# #&&)QVTZ5;%* OS=D$. "#BAk 'oxFH"",!"NM%)v!!!&lu@B}KTbl09$! %&!%0bocrBR]nft$! ALjw,9 ($!  !!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  %(%*"'/;Dv#,!"%!$+&!! RUMP45"%!!KS)3(ZY+/|%%!#$+hq9; OWT^!)&+" %18~/:kx;Hd6Eeq&)"2=\kIW#,!&! !!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $ &$*6>eo# #!"(+ !-#$!,/ij?A!""%"HP*%_^-1~$$ ")0bk576:PX=G" (,!$!" &!)OY[f'3*AMGQ%+.%%!#")DSfu&0#( "  !!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!  # #(28FO#," # "*$+0SVcd22#"#$ $LU'""]\59%%)0V_-/QUT[(1"#$'%( 2:gpFP$,58ACKIN&) "#"#4Ckz(2%* "  !!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! &#!%,1T\S]5="'! !%($ &#%@FjoCD'&&"%([c$-&XWCF()%,KR#(`dY`%"$!%((,7=Zc19 JSu}%!!'.;ao)3&-!%! !!!!!!!!!!!!!!!"##############"!!!!!!!!!!!!!!!!!! ! ! ! ! ! !  !!( %!%*V^dn/7%()!%.5MShn%& (%'#(+hp*4(SUVZs&& &);D$"' %#,2qx5<% "".Wf.:.4 #&*#/9cm/9!#( ##%"&"""""""""""""""""$"!%########        """"""""""!!!!     ##!%+"*mv3;%&,(-!(0"-{KUqx9?"$&%'-v)5*wblmq|)($";;*5!&"!"I#,"#"%!#""############### "$$"!"######### # (#+#+ (# ########!!!!!!     "&$)$EMdl)1"%,"'$  #3>OZBK$#&!)1p|/<&nbo$'&%,*" "&&))OST[(,$&&-=dq,5'*!!&$FPS]5>"(+ "###############""#& (&# ######## &&.,4,4&.& ########!!!!!!!!      !$$$!*,6dnOX&$)!$!"'|#,^hS]%$' ".6eq3@ # plww#!&"|%))::`d@G"&$ '!&\hAJ !$%*$-5`jMW!!%)"################"#'#+"*$########"'&.+3+3&.'"########!!!!!!!!      !#!&{6@ep[e4>"!%" # %&.KTkuJT#!!$!#! 9AS^0=  $0|l'%)$*&fg!,!((#!IJfi/5!$""'!)EObk19$ !]e_i,5###"################"#'#+"*$#########% ("*"* (%#########!!!!!!!!!!!!!! "!!!6BYfmz4?&# !$%!#LTnvOX*3#+!'""%&+IQ?J'3"=H r&$+%FB00 $/#&&'%LMad#)&(#&#'%.dmLT!&"GOajGQ%- !%"###############""#& (&# ##########""""#########"!!!!!!!!!!!!!!! $$6@lygu9F}"!"" %+2^fem'/{& "%17Zb-7)$Xb56 & ! +##$%$BCVY#-. #$'!JS^h4YdgtDQ z$ !! $)GORZ5=!!#6=go!+# &jsXY(%*$*"%$%#""#""8:MO 23 $#!)#*"(5>isMW !&#'JRmw=G'(- "###############"$"!%########!!"##"!!#######"! !!!!!!!""####"%(,1emmx9E{! ').%%#%,`h@H x")-3"'!#"8?nv$!#(u} j-'"#"!!&" JKLO12+-%%"%"( %KUU_&  %}U_eo'#")  "& (% #######################################"!   !!!! !  "%$"BGkr_g2< #)0 ##$"#"$ #  &.fo=E% & %#"$*%AIYa/7!($' ^m($" !!!&! NPQT,-'(#" "$ %%9C\fGP##($(AI\fAJ$,%$""$%%$#######################################"!   !!!" "($*!@G[c\d6>"&$*"#& " "%#,Wa08!&  %$%*2JRHP"*%().0y./{ " " $!TWY\$%"#!  !"""""(!)R\eo&-")."(/IQdm8A!)%##"!$ (#######################################"   !!!"##$+$ (;Chp[c:B""'%)'* " ##&#'#("(&)EO&."& #!!& ' =EX`2: $$$|^]OP!" ""#$Y\`c !##"!! %4=[e9A!& %19dmT^".%  #""!)#######################################"  !!"#$)%+%,%~%JRy`i7@# &&+ $&$' #($$!'&(9D+3!$#& !'!)#QZbj"*%)mw|"|#&###" &[_cg " %%#! !# ""?IYc (',""ENeqBO#$%&#######################################" !!"#!& &!)1MVktw7@&'+),%("#$,!%*4?$"! +.:IQ49 !!$%!*:D]gIR&!)+3119#-""""!%W]^c"!!" " %'%$! !#%)"&/OZeo6>%* "! "3BgwCM(0 % ( %#######################################"  !"#!(/7CKXaYc8B|!"'"% *38ClyрMV#) #$)#/JR7<#$ #% )NXT_+5&$c_:D&0!"$!$S[Y`$'"$ ##%&&$"%'$"*&0kuNV"%"#($whuZe6A%%!' &"#!!!""###################"#"#"#"#"#"#"" !"#$%>F_gaiCK$, "$)##++#$"F"%*(.!"'1p}FT#+!&!"""#################""!"!"!"  #"&"($($'$$%$!(.#+GQgqYb+3#"("%( $,0:`mN[$1]iEO%(!" ! $AJ4?#!;@ad=?#('!sJQ{"&*?LDR!#'#&!"#%&PXGO*2$!'"?LdqNX'#"' "'"!!#"###############!!!!!!!!!!!$%,/! }#+KUeoWa3< $!$!"$'9AepKX;H)\hGP"&!"#!!#AJ2@! W[__)'!Xc** !"&%5CN\  "+$#, !#$&*2RZGO#'-!' bmq{9B # % $!  !""##############"!!!!!!!!# ""! "CJ_genT]08!"!&!$!)-(+ EJ`h^h/:$1y]gIQ#!"!#@I4A!%!'goLM-."xDE !$&%##0?MVd&3$ "% !#$%#MUai%($#?JWa1424w/:_c{"&%$,3CR`BO$"% !"#%%4EY`]dIP*1#&* ""%+ zNTglJO(. (!&_gHO !%+0IN6?%'&-co8C$(+!#ncn49!  &(BOS`'/%'" !"#$%"EM_h5>&& #%/[hwJW&#(!!"##" "##############"   !!!"$"'#)%&&.9AS[ckV]9@$*!$# $!|(HPfmOT"(. ('/Y`>C!+.8=QU7<!%+1>es#0!+0s.4{]az% !,9P]4=#$!   !###'/HQPY7A *&!$ 5Ao}jx9C&.#"""""!!"##############"   !!!" !&"(#!)9AOWltqyV^%, % %#' $" $  &&/PZenHO#($"'&,-4NT05!!"'7:PR68%*4?S`FT*#($&lootx!!$''%2)FS=G'-!"!,(  !"##")2:ir\f)3!)!! ?Lr`l)&#"!!!"""##############"!  !!!"#%")%&4<\d~8@")%"'#("$(! $$=Dq{epKT-4#"# (-.3EJ&* !#-0JI31!!25KTs$1!,HJQT$#&& $&6CWbRZ26%#''!!$" # ($,CLpzak!)!)/)1}7Civdp",(0!&! #########$%&&$!"%"%!#"'"'07X`emLT,4 #!&$  "&)-!&" %"'KRPZ6@'$!& !&LQ+0 !NOSR><:Ko|LX-0 #"*1&######## !"#$$$(  %"'! #, ##'"%!!"#UZ.3! ""qrOM./^bgn&!!'=?OOp*(((!'% %?J`hZ_:< !!!"#&'+$!&!7?QYQZ%$,$)%O\kx.8#(, %-5*$#######!#%&&$!  &&,"( !(.6NUV]U[ekHN$*$%*%) #!$ $#"#(/.5LShoV]&-%! # #! !%kr;A #('((ut@@24cjCK%$8:ba q%# ,% #BJYaV\'/!)$%$)%*"!!  &2:wPZ,4"!' 0:fp`j-7" !+######## # ("*'! ",:DU^gpemS[CJ&,"(" #"%!&)$(#!&$,FNX`W^8?!#&"!$"$!!# %%%jrJ'3'%#"#*!&!!"$ $08DMT^\fNX ( z %-0  %(&+!(*3:DGQ#+ %&&knky&8v-*/6HH{!#(%!!$"(0BL`hcmQX3;"% # !"}&.W_T[)(&("('MYV_%$%$$$$$%$/HQdonvclOV?G6?+5'!#& (&    #!05MTbj^gBL(2$#+$* !  ! %&!$59IM;A"$#%)*6@}"!-sil@H e( #$/*$ &*48@I_fr{ae;?""" $%&( #7;cghl;?&')+"%#'FJimY]-1 &&} 3FfnbjDL*2&!%$#"!! #!&$(#-(up=9+*7>HK#!-+''.0x8C(#-! )%%!(&'##$#'5;OUY]RVWYTVLP@D15%) !)*?CVYW]?B"#&&IM^aW]8@BLR[[dZcT^OZMZTaR`FT1>$.' #!!$!$ #""&%*"*/=DYa_gU]8@%##(##""!!! !!!&'$%$!+%OGh_92*)37")6')&  %#'!$#$#$! #"!#"!!&*2=FQZ]fZbMU5=$ "(#(#""!!!  #%")-$%!!41`[>;&$!!')!%JUaj#.*% 3;|k&)&&" #!"%%!!##$.3AITXccjcjdf`e]a=E7=ks؈]d#&(%*$'%"#!&!$!+ *!z #$'%("#&%+$+$,+4;EOY[fZeU_%-& %%*!&"!!!!  !'!#&+ $(*IJaa! $& %' +BM!$"(%.+de.1z} "#$ ! ##& "( %"!# ' '!$&  }&)  !!"#"!$,-%'$!*%-',$'"#!!  &)$'#,3#9B^hoydoFR'3~#  !!!  !%$!$!&7<_cX[ %!($!)1-&$rXX32x+($# #%($$) $"!#'-  ! $$'  #$ #!!"" #$)!&"'(-(.07QYaiRZ:C$.#"($,',"&##"!!  "!&")0IPbi6; $%###!(!w11y}{20%#'' $& #!!$!$ "#"$!$"%$'%)%+"!"%$ %!'%$$" ""&"'!'#!$"#!#% |%,")#*DKW^X_fm?F.5#!!($+  $"%(%(! #%  "# %"!9BV_PX# #") # .-__n%' #$ ('"!&%!!+)%( ! $"' %!!% #($)""#*.6YaV^CKW^^eBH.4!##" !!"!#%!#    )+"$%GO^f>F (.! (#""! jlbeoz!! $""$(! )' !&#""""""""""""""!$! "#%%($'#( &'=FQYGOGOJQOVMT9?% ""!!!      "$"$#&#% 9AfnLU!" #! %q{47'&%$ "4<@H/;%~ t#!&($#"""""#"###"#"#!)!& ;Ealeq\hhslvW_/6$!#("'!!!!!      "$'#&!"136=YaV]2:##,.$%ufmmn+*" %)AJfqqdtN_6A5>34&%21!""!   !"""!! ! {" % !(0ep̿'o)1 %"!!!!!!!!   !"%(#'! %(+-4X`]f6>"!*-2/-+|,*Y[li-+ &&')#(7@n{s~IO78(' !)*!('!&&!&'!)*!)*!)(!'!(*4'1"),(+!# *[g:Fz ( #(+(+ #!!!!"!"!!   !!!"!!$$! {49X`Ya9B$"-.#",)53 xhca{w"{$" w*0y^k)3{X_uydghkȁjvhwjuhtjshrjshujvhwjvhwjvhujshsitMW'0&+"'(/ ~,6V`fpT^>F$)  $'+$( """#"#""!  !!!!" %"!#%&06U[^f;C" %"211.j($ktqqr/1x+'2+**SYisFLCI=>23747:;A7B9@7@9>7>9?7@9A7C9B7C9B7@9?7?OZS^Q\AK(0!!',$)"!(3;RZt|JRCJ29$#!&####"""!!!!!!""#%#)%"*29AryZc8A&" )$* $!"~l0.u}y67}+ +") (%>=UWcbDC& *#2'#0",' & $ # " ! !!!"##$%$$"&*1>FU]cm-5#($,"",.))POYV(' %'! $38Z]qtdeIF%%*!2),"&#! #$#!%!",?JWdR_>K(3#-&#$ # "#DNfrWeKY\kAM>G4;', (#/+  "% (!)+2 (;DJSRZXa=F&."$(x32{z9=m$ %""';@[`qtPN:5% # &$$#!" #!$!!)$,=DQX_ffmlqmqSWOTPTOVV\`giqpxAI'.#)" (*$%-*()"'xFL[[55r,*-,! '2DS]k^kQ]BL/8&$!'#!#"%#&!($(%&$ )*AB]_ehUXBUZ\bQXCJ*/ $%$%#'$-(0    "((  %""62SQ~GF"""!'" %4@KXVd\jQ_@L.9",%#!$%"#,2AIQYZaY[KL==,,!+(&&## #!&"' &#!""%%''''%&"#"!#"!!tECln7:}!"'/8BYeR_JWFSDQ?L5B-8"" %  !&""(")!*4BIeeb^gca`HG44,, !!! !""!*&4466"x,/kpϵmr=@&*!$!.6HS^icoVbITPXI+7!}|!'&)'*&'('#"!}&$xUS쏔LOcq$#+),)%!#$ $$,083<.7-6-6,4+3+3*1,/4051@=A@678:/5}!)%.#+%-/**opDGŵ^_('yp'!!!  !!  $(,&+"(# ! _11hgٳ壠݌f^<8! $"!! )%,$)"("*%# )'yrm#v:?`c|Ǧ⸷⋔xiv[gIS6?,3*0}}|{xvuv|}xvy*&97IFTQecyyơ䝣̊mlmlmllkkljljmjlqoliidc_dc{zĤ&'- 2 v`g -g`- ! -' 2 R `g K- 2 j`g -(2 `gProject EE/06/B/FPP='2,,==22==== 2  `g-!2  `g169000 r322222 2 O `g 4n2 8B`gLearning Materials for Information Technology Professionals (EUCIP8,2'222S2,'2'2'!22'H2228,,22222,='2,''222' =HC!= 2 8`g-"2 8 `gMat)S3 2 8`g 5- 2  `g -@Times New Romanww @w4f:- 2  `g 62 z; `gPROGRAMMING<HOMHI^^'IM 2 ze `g 72 b`g1.2 2 b8`g .K22 b`gNumber of study hours: 50H8R8-,2"'!882828,&!22 2 b`g .6g`'-2 `g2.2 2 8`g .K-;2  `gShort description of the course:882,!8,',,8!282"!8+,28,'," 2 `g . 2 `g .Kg`'-t2 HF`gModule expands upon programming methods (object oriented programming, Y222,D,32,22'D2223D2!31!,NN31DN,222(D!22,,D2!,2,3D2!32!,NN21g`'2 `gstruc'!2,y2 EI`gtured programming). Student gets the review of different data structures 2!,2;2!31",NN22!;822,2;1,';2,;!,3,H;2!;2!!,",2;2,,;(!2,2!,(g`'&2 . `g(arrays, entries, !,!".0',2!,'w2 . H`glinked lists etc) and the algorithms of their processing. Students also 22,3'',,!,223,,12!2N'2!2,!2!3,,''31822,2','3g`'2 T`glearn to differentiate different translation methods (compiling and interpreting). ,,!22222!!,!,2,,22!!,",22!,2',222N,222'2!,2N2212,2222,!2!,31!g`'2   `gModule gi\Y222,81p2  ?C`gves also brief introduction of main program constructions (such as 2,'9,'282!-!82!222,2282!8N,282!22!,N8,22'!3,22'8!'2,28,(g`'2 T`giteration, conditional sentence etc) and review of program testing, documenting and ,!,22,22222,',2,2,,,-!,22!,2,H2!2!22!,N,'2122,2N-221,23g`'2  `gmanaging. N,2-121 2 >`g ..g`'-2 m `g3.2 2 m 8`g .K 2 m `gTarget groups C2,2,!2,288' 2 m `g .6g`'-U2 1`gModule target groups are first of all vocational Y222,%,"1,&1!222(%,",%!!'%2!&,%22,,22,&2 J `gand high ,22%213%+2 `geducation students, w,22-,22%'22,2'%H2 N`gho u232 S U`gspecialize on information technology, but it is also an interest of those who simply '2,,,-,222!2!N,22,,22223022','2,22,!,'2!22',I22'N2052 `gwish to pass the respective H'222,''2,!,'2-,2,/2 `gqualifying examination. 22,#/31,3,N2,22 2 `g .--2 ; `g4.2 2 ; 8`g .K-2 9  `gPrerequisites<-,-,88'!,' 2 9 `g .Kg`'-A2 $`gPassing through the module does not 8,''21D2!2212D2,DO222,D22,'D22D2 ` `gpresuppose2!,'2222',12 ! `g from student any former 0D!!2ND'22,2D,31D!2!N,!g`'82 `gknowledge from the field of in222H,22,!!2N2,!,32!2+2 L`gformation technology.!2!N,22,,222330 2  `g ..g`'-2 `g5.2 2 8`g .K&2 `gAim of the course HR2"!8,,28,(, 2 `g-.!&2 `g learning outcomes,3-88228!,2R,' 2  `g .7g`'-J2 *`gStudent who has passed through the module:822,2H222,'2,'',22!22123,N222, 2  `g .-2 x`g1)2! 2 x`g )Cy2 xI`gCan differentiate different programming methods, such as object oriented C,2=2!!,!,2,,=2!",",2=2!21",NN21=N,322'='2,2=,'=22,,=2!,2,2g`'#2 `gprogramming, top2!22!,NN2122 2 `g-)!G2  (`gdown engineering, structure programming;23H2,213,,!31'!2,3!,2"21",NN21 2  `g ) 2 `g ) 2 `g )-g`'2 ^`g2)2! 2 ^`g )C)2 ^`gKnows abstraction asH22H'6,2'!-,226,'X2 ^3`g the method used for solving tasks and development 62,6N,22262',36!2"6'22216,'2'7,2262,3,32N,2g`'2 `gworks; rH2!2' 2 B`g )-g`'2 D`g3)2! 2 D`g )C2 DM`gUnderstands specific needs of legacy system needed for software development; H22,!',22''2-,!,2--2'2!,2,.0)0',N2-,3,2!2!'2!I,!,3,2,23N,2 2 D`g )-g`'2 `g4)2! 2 `g )C2 T`gUnderstands the attributes of different data structures: entries, arrays and linked H22,!',22'2,,!22-'2!2!!,",22,,'!3,3!,',2!,',!"./(,2222,1g`'2 *`glist; r' 2 *`g ),g`'2 `g5)2! 2 `g )C42 `gUnderstands relations betwe H22,!',22'-",,22'-2,H,P2 .`gen multiple widely known algorithms and above ,2-N22,-H2,1-222H2-,13!2N'-,22-,222-g`'42 `gmentioned data structures; N,222,22,,'!2,2"-' 2 R`g )-g`'2 `g6)2! 2 `g )C2 O`gKnows basic types of programming languages (different generations, functional, H22H'2,',02,'2!2!31",NN21,312-2,'!2!!,!,21,3,!,22'!22,22,g`'72 `gprocedural, object oriented);2!2,,22",22,,2!,2,2! 2 `g )-g`'2 h`g7)2! 2 h`g )C^2 h7`gUnderstands the roll of syntax in programming language;H22,!',22'2,!22!(03,322!22!,NN21-212-2, 2 h `g )l 2 hy `g )-g`'2 `g8)2! 2 `g )C#2 `gUnderstands the H22,!',22'h2,hV2 V2`gdifferences between compiling and interpreting of 2!"-!,2,,'h3,H,,2i,2N221h,22h2,!2!,32h2!g`'+2 N`gprogramming language;2!22!,NN21,312-1, 2 N`g ).g`'2 `g9)2! 2 `g )Cn2 B`gUnderstands most important constructions of programming languages;H22,!',22'N2'N22!,2,22'!2,22'2!2!32!,NN21,313-1,' 2 `g ).g`'2 4`g10)u22! 2 4`g )^2 47`gUnderstands main functions of automatic testing tools; H22,!',22'N,2!23,22'2!,22N,,,'2122' 2 4 `g )-g`'2 `g11)u22! 2 `g )R2 /`gKnows and is able to use testing methodologies;H22H',22',2,22',,'21N,222221,' 2  `g )-g`'2 `g12)u22! 2 `g )2  `gUnderstands mH22,!',22'NU2 s1`gain functions of module, link and system testing; ,2!23,22'2!N222,22,22'0(,N,'31 2 `g )-g`'2 `g13)u22! 2 `g )s2 E`gKnows and is able to use basic documenting requirements for software H22H'@,22@'A,2,@3@2',@2,'-@22,2N,231A!,22",N,2'@!2"@'2"H,!-g`'X2 3`gdevelopment and distribution (f.e. decision trees);2,2,22N,2,222'!2322!!,2,,'22!-,'! 2  `g ).g`'2 s`g14)u22! 2 s`g )y2 sI`gUnderstands the conception of well structured program and the respective H22,!',22'73,7,23,,32272!7H,7'!3,2!,372!31!,O7,2372,8!,'3,,2-g`'2  `gdocumentatio22,2N,2,22 9`gn. u2 2 `g )-g`'-gg``ff__ee^^dd]]cc\\bb[[aaZZ``YY__XX ^ ^W W  ] ]V V  \ \U U  [ [T T  Z ZS S YYRRXXQQWWPPVVOOUUNN՜.+,D՜.+, hp  wEITS/~0 %KURSUSE TPNE NIMETUS'Software Design Methods and Techniques? B.3.1.1 Main features of different program design methods & Description and analysis of needs Design of software! Software development methods% B.3.1.2 Procedures and functionsP B.3.1.3 Abstraction as a technique for problem-solving and software design  B.3.1.4 Legacy systems&B.3.2 Data structures and algorithms  Data types and structures  Variables Arrays Records (structures) Linked lists and treesK Typical search and sort algorithms using the different data structuresB.3.3 Programming languages1 B.3.3.1 Main types of programming languages . B.3.3. The syntax programming languages, B.3.3.3 Compilation and interpretation B.3.4 Elementary constructs& B.3.4.1 Input/output instructions B.3.4.2 Control statements / B.3.4.3 Arithmetic and logical operations B.3.5 Testing, Basic concepts of testing and debugging Different types of testing + Static and dynamic test methodologies B.3.6 Documentation 5 Documents for software development and delivery ( Well-structured and documented code& Unified modelling language (UML) Maintenance$ Documenting changes in software6 Methods to attain quality in program maintenance Programming examples Title Headings$ 8@ _PID_HLINKSAD0<=http://cslibrary.stanford.edu/Jhttp://www.wikipedia.org/O-http://www.aaai.org/AITopics/html/trees.htmljl $http://en.wikipedia.org/wiki/B-treeP 0http://en.wikipedia.org/wiki/Binary_search_treev.: http://en.wikipedia.org/wiki/Tree_structure]_6http://www.cs.utexas.edu/users/EWD/ewd02xx/EWD249.PDF`/: http://en.wikipedia.org/wiki/Software_design  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdeghijklmvRoot Entry FS{xData mI1Table3WordDocument&SummaryInformation(\DocumentSummaryInformation8fCompObjjObjectPoolS{S{  FMicrosoft Word Document MSWordDocWord.Document.89q