ࡱ> 35./012q` ?wbjbjqPqP 4d::o6 8ƣt:< zZܬͭϮL($ hf zͭͭzz4XXXzjXzXXav sxZ[+}"EJ0zT T DT CNXe q CCCCCCzzzzz          Answers to End of Chapter Questions  TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc152086333" Chapter 1  PAGEREF _Toc152086333 \h 2  HYPERLINK \l "_Toc152086334" Chapter 2  PAGEREF _Toc152086334 \h 4  HYPERLINK \l "_Toc152086335" Chapter 3  PAGEREF _Toc152086335 \h 6  HYPERLINK \l "_Toc152086336" Chapter 4  PAGEREF _Toc152086336 \h 8  HYPERLINK \l "_Toc152086337" Chapter 5  PAGEREF _Toc152086337 \h 10  HYPERLINK \l "_Toc152086338" Chapter 6  PAGEREF _Toc152086338 \h 12  HYPERLINK \l "_Toc152086339" Chapter 7  PAGEREF _Toc152086339 \h 14  HYPERLINK \l "_Toc152086340" Chapter 8  PAGEREF _Toc152086340 \h 16  HYPERLINK \l "_Toc152086341" Chapter 9  PAGEREF _Toc152086341 \h 18  Chapter 1 Question NumberAnswerLevel 1 Head Reference for AnswerDifficulty1C What is an Information System?M2DWhat are Data, Information and KnowledgeE3EWhat are Data, Information and KnowledgeM4CWhat are Data, Information and Knowledge What is EthicsE5DataWhat are Data, Information and KnowledgeE6InformationWhat are Data, Information and KnowledgeE7KnowledgeWhat are Data, Information and KnowledgeE8TrueWhat are Data, Information and KnowledgeE9FalseWhat are Data, Information and KnowledgeM10FalseWhat are Data, Information and Knowledge Life Long Knowledge CreationM11BWhat are Data, Information and KnowledgeM12AWhat are Data, Information and KnowledgeD13CWhat are Data, Information and KnowledgeD14B What is an Information System?M15A What is an Information System?D16C What is an Information System?E17IS For a Telecom Billing Operation Input: Name of customer, Mailing address, number of calls made, Types of calls made( International /Local) Process: A billing system which can take into account business requirements (like free local calls from 9.00pm to 7.00am and weekends) and usage of a customer to produce a bill Output: Customized bills for all customers, based on their usage which can be emailed as well as mailed to their addresses. What is an Information System?M18The two types of knowledge are Explicit knowledge and Tacit knowledge Explicit Knowledge: is readily available to us in the form of books, documents and web Example: Textbook in Accounting Tacit Knowledge: is knowledge gained through experience, practice and insight Example: To parallel park our car What are Data, Information and KnowledgeM19Knowledge Work: Work that involves the discovery, transformation, analysis, synthesis, and communication of data, information, and knowledge. Knowledge Worker: It is a worker who requires formal learning, the ability to acquire and apply practical and theoretical knowledge and a habit of continuous knowledge. I believe that I will be knowledge worker after I graduate as I am undergoing formal training and my work will involve application of practical as well as theoretical knowledge in the knowledge based industry. What are Data, Information and KnowledgeM20Input: Names of all employees, name of bank, bank account number, Salary Process: software Output: A automated system to transfer salary from companies account to account of employee This automated system will reduce human errors and redundancy of work in crediting salary into the employees account thus reducing expenditure to the company. What is an information systemM Chapter 2 Question NumberAnswerLevel 1 Head Reference for AnswerDifficulty1b. RAM HardwareM2a. cable modem HardwareE3b. operating system Software Gets the Job DoneM4TCP/IP The Internet and the WWWM5Clock HardwareM6LCD HardwareM7Spreadsheet Software Gets the Job DoneM8802.11 protocol Connecting Over NetworksM9False HardwareE10False The Internet and the WWWM11B HardwareD12D HardwareM13C HardwareM14E HardwareD15A HardwareM16Accepting and storing data and information Performing mathematical calculation Applying logic to make decisions Retrieving, displaying, and sending data and information Consistently repeating the above actions many times The Components of ITE17Hardware the electronic and mechanical components that you can see and touch Software the set of instructions that directs the hardware Networking allows knowledge workers to share resources including hardware, software and information, etc. The Components of ITM18Random Access Memory (RAM) is the primary memory that serves as a temporary storage area for data and instructions. In general, since the CPU first looks to RAM for the data and instructions it needs, and since accessing RAM is faster than accessing secondary storage (e.g., a hard drive), more RAM means more conveniently stored, quickly accessed data and instruction. This means that the computer (CPU) will seem faster to the user with more RAM to keep more data and instructions close at hand for the CPU HardwareD19Yes. Thumb Drives (a.k.a. USB keys) offer more storage and quicker data access in a smaller, more convenient package. Most PC makers have stopped including diskette drives as standard PC equipment. Relative to the USB keys, a floppy diskettes smaller storage, slower access, and decreasing support by PC makers all point to the demise of the once ubiquitous floppy disk. HardwareM20While no security is infallible, in general the smaller the network (in terms of geographic size) the more easily it can be secured. As network size increases it is difficult to include the network within a secure physical location. In addition, larger networks often require some use of public connection media which may be more easily accessed by unauthorized users than private communications media.Connecting Over NetworksD Chapter 3 Question NumberAnswerLevel 1 Head Reference for AnswerDifficulty 1B. synthesis Knowledge Work ActivitiesM2D. Data, Information, and KnowledgeDecisions, Decisions Making Decisions at the Individual LevelE3B. communication Knowledge Work ActivitiesM4D Investigate Problem SolvingE5Unorganized Knowledge Work ActivitiesM6CARROTSDecisions, Decisions Making Decisions at the Individual LevelM7completeDecisions, Decisions Making Decisions at the Individual LevelE8True Knowledge Work ActivitiesM9FalseDecisions, Decisions Making Decisions at the Individual Level lD10False Problem SolvingM11C Knowledge Work ActivitiesD12B Knowledge Work ActivitiesD13A Knowledge Work ActivitiesD14B Decisions, Decisions Making Decisions at the Individual LevelM15C Decisions, Decisions Making Decisions at the Individual LevelM16A Decisions, Decisions Making Decisions at the Individual LevelM17Investigate I want to buy a car so I go to Consumer Reports and other sites to find the best cars for the environment and to Edmunds.com and other sites to research prices Analyze I review the data Ive collected generating possible choices and develop the criteria I will use to make my choice Decide I pick the solar powered Ferrari. My second choice is a Honda Accord Hybrid Do I contact Ferrari and ask them to make one since no such car is available to the general public. No luck so I buy the Honda Accord Hybrid. Problem SolvingD18Unstructured a problem characterized by high uncertainty and no well known method for solving the problem. Example: Choose a University or College to attend Semi-Structured A problem that is in-between the two extremes. Has some level of uncertainty in data and decision process. Example: Choose a major at the University or College you attend Structured A problem situation which has the luxury of complete and certain information available and a well-known method for solving the problem. Example: Complete Major-Required Course I and major-Required Course II in order before taking any electives. Decisions, Decisions Making Decisions at the Individual LevelM19Investigate Identify and research the two companies and the nature of both internships. Discover where you will be working and what you will be doing during your internship. Analyze organize and think about the data and information you found what does it mean? Which internship and/or which company appear to be the best fit with your immediate and future goals? Think about how what you will be doing in your internship may result in job offer at the end of the internship. Would you be willing to accept and work for this company? Develop criteria to help you choose between the two internships. Decide Select the best internship for you using the criteria that you generated in the Analyze step. Do Respond to the firm that offered you the internship you chose and send a note to the other firm thanking them and declining their internship offer. Move to new IADD cycle by investigating transportation to location of internshipetc. Problem SolvingD20Yes. In order to solve problems, knowledge workers must make decisions. Consider the following problems and the decisions which solve the problems: (1) Undecided major decide which major to major in (2) No transportation to and from school decide to walk, to ride the bus, or to buy a car and drive to and from school and (3) Need a local checking account so local merchants will cash your check decide which local bank offers the best deal on student checking and open an account there. Decisions, Decisions Making Decisions at the Individual Level and Problem SolvingD Chapter 4 Question NumberAnswerLevel 1 Head Reference for AnswerDifficulty1A Feedback Business as Open SystemsM2B Create processes to achieve goals Business as Open Systems3A Automate Applying IT to create more business valueM4Stakeholder Business as Open SystemsE5Transaction The Value ChainE6Complementary How Business organize to create valueM7Competitive Advantage The Value ChainE8TrueApplying IT to create more business valueM9FalseApplying IT to create more business valueM10FalseApplying IT to create more business valueM11CApplying IT to create more business valueM12BApplying IT to create more business valueE13AApplying IT to create more business valueE14DApplying IT to create more business value M15Functional: Ford Motors Product Line: Microsoft Geography: GE Matrix: University System How Business organize to create valueD16McDonalds Production of Hamburger Inbound Logistics: Raw Vegetables, meat, Cheese etc Operations: Preparation of Hamburger Outbound Logistics: Big Mac Marketing and Sales: Advertisements on Television, Discounts and promotional offers Services: Customer satisfaction surveys, Quality assurance The Value ChainM17Manufacture of Dell Computers Input Micro-Processors from Intel/AMD Knowledge Workers from Universities Capital from Investors and Creditors Operating system from Microsoft Technology from R&D teams Process Assembly line to manufacture Computers Output Laptops and Desktops Helpline services to aid customers Feedback from users and industry experts to help improve and innovate productsBusiness as Open SystemsM18It is essential to invest time and money in support activities of a company. For example by having active Human Resource (HR) policy and department can enhance employee output. Such activities add more business value to the organizationThe value ChainM19An Enterprise Resource Planning (ERP) system helps an organization to effectively manage and automate its primary and secondary activitiesThe value ChainM20Managers in Matrix Organizations can Organize team building activities Have inter team meeting to discuss the work they are currently handling Have knowledge sharing session to provide a unified knowledge baseHow Business organize to create valueM Chapter 5 Question NumberAnswerLevel 1 Head Reference for AnswerDifficulty1B MainframesThe Technology Infrastructure of an OrganizationE2B AtomicityInformation Systems that Support Business Activities E3C Simulation ModelingBusiness IntelligenceM4D PeriodicBeyond Databases: Using Other Methods to Store Data, Information, and Knowledge E5Embedded ProcessorsThe Technology Infrastructure of an OrganizationE6Database The Primary Data Storage for OrganizationsE7ForeignThe Primary Data Storage for OrganizationsE8Point of Sale (POS)Information Systems that Support Business Activities M9FalseThe Technology Infrastructure of an OrganizationE10FalseThe Technology Infrastructure of an OrganizationM11TrueThe Primary Data Storage for OrganizationsE12TrueInformation Systems that Support Business Activities E13CBeyond Databases: Using Other Methods to Store Data, Information, and Knowledge E14BBeyond Databases: Using Other Methods to Store Data, Information, and Knowledge E15DBeyond Databases: Using Other Methods to Store Data, Information, and Knowledge E16ABeyond Databases: Using Other Methods to Store Data, Information, and Knowledge E17The file management system has the following disadvantages over Database system Data Redundancy: Some information needs to be stored in more than one place leading to inconstancy and redundancy Data Dependence: As the files are designed for a particular system they may not be used by another application (System dependent) Data Inaccessibility: The data stored may not be accessible from other applications. Poor file management: The files are difficult to manage and change. It also has difficulties when multiple people are trying to modify the files at the same time.Databases: the Primary Data Storage for OrganizationsM18The different technologies are as follows: Middleware: is software that links applications that use dissimilar software and hardware platforms. A middleware application tracks and software modules and their status and then links them over network connection. Web Services: Processes data over from a sending application and then delivers the data over the network using standard data format called XML. Enterprise Resource Planning (ERP): In this approach the company runs all its applications from a single database. Each functional unit (like HR, R&D, and Finance) uses their own software but linked to a common database.The IS integration ProblemM19Both systems can be useful. A strength of FIS is that they are typically created with a focus on a particular department. Thus an FIS may include comprehensive data and tools for a specific department. However, a workflow management system can incorporate the data from a specific department and integrate it with the work and data of other departments that take part in the workflow. Thus, a WMS may be ultimately more useful to that organization as a whole.Information Systems that Support Business Activities D20Groupware can be of use for any organization by supporting communication between the members of the organization and by supporting group decision making. Groupware may be used by City and County governments to support meeting; to communicate information about important decisions both before and after decision making; and to even incorporate the view of the electorate through the use of voting systems.Beyond Databases: Using Other Methods to Store Data, Information, and Knowledge D Chapter 6 Question NumberAnswerLevel 1 Head Reference for AnswerDifficulty1B ElaborationThe Stages and Activities of System Development M2A InceptionThe Stages and Activities of System Development E3B Diamond FamilyIS Methodology M4D - Risk avoidance Managing the IS Project E5team compositionThe People Who Develop IS E6Unified Programming Language (UML)IS Methodology M7Integrated Development Environment (IDE). IT Tools for IS Development M8FalseThe Stages and Activities of System Development M9FalseIS Methodology E10TrueThe People Who Develop IS M11TrueIT Tools for IS DevelopmentE12AThe Big IS Development Questions E13DThe Big IS Development Questions E14CThe Big IS Development Questions E15BThe Big IS Development Questions E16The stages of the Life cycle are: 1. Pre Inception: the stage in which the organization promotes or inhibits ideas for on Information system. 2. Inception: In this stage the focus in on understanding the problem and planning the project. 3. Elaboration: The project team finalizes the requirement and designs the system architecture. 4. Construction: The development team builds the core functionalities of the system. 5. Transtion: The development team finalizes the system and puts it in change. It also trains the users of the system and the management. 6. Production: In this stage the organization continuously monitors, maintain and evaluate the system. 7. Retirement: In this stage the old system is retired and usually leads to the inception of a new system, The Stages and Activities of System Development M17Entity-Relationship Diagram (ERD) Logical Data Model Data Flow Diagram (DFD) Unified Modeling Language(UML)IS MethodologyE18In the evolutionary model developers first investigate, specify and implement a core functionality with minimum functionality. Then the developers evaluate the functionality and add enhancements or changes to it. Prototyping is used to build the system with the inputs from the customers. In such a development model the customer can make changes and enhancements to the requirements and these can be incorporated in the system easily The waterfall model is rigid in structure and is difficult to make changes in the previous stage once the development reaches the next stage of the lifecycle. Parallel process of wok cannot take place in the waterfall model.IS MethodologyM19Ideally, we would like to have an IS in place immediately (zero development time) and then use it forever (100% production) with no need for changes. Of course, we live in the real world so project managers must manage resources and risks while seeking to build an IS as quickly as possible and with the flexibility and quality to be useful in production for as long as possible.The Stages And Activities Of System Development.D20Managers should not only rely on financial analysis for their feasibility. Although by obtaining the ROI, NPV and IRR gives a good picture about the feasibility of the project using financial benefit there are other intangible factors which need to be considered. Project managers should also consider the strengths of the organization and the impact of the IS project on stakeholders. For example: Customer satisfaction is based on the speed at which customer is able make transactions of the company website. A satisfied customer may lead to increased business. The Big IS Development Questions M Chapter 7 Question NumberAnswerLevel 1 Head Reference for AnswerDifficulty1CE-Commerce: An Overview M2AThe E-Commerce Difference E3DThe E-Commerce Difference E4AE-Commerce Between Organizations E5e-commerceE-Commerce: An Overview E6E-commerce strategy The E-Commerce Difference E7InfomediaryThe E-Commerce Difference M8Supply ChainE-Commerce Between Organizations E9FalseE-Commerce Between Organizations M10TrueE-Commerce: An Overview M11FalseThe E-Commerce Difference 12TrueThe E-Commerce Difference E13BE-Commerce for Consumers E14DE-Commerce for Consumers E15CE-Commerce for Consumers E16AE-Commerce for Consumers E17A business model defines how a company will meet the needs of its customers while making a profit. Having a business model will enable them to focus on their customers and also make profits on a long term basis. E-Commerce for Consumers M18The 3 broad categories are Spot Buying Strategic Sourcing ExchangeE-Commerce Between Organizations M19Benefits Lower Prices Shopping 24/7 Greater Searchability Shorter Delivery times for digital Products Sharing of information with other consumers Improved customer service Limitations Delay in receiving physical products Slow downloads in areas where high speed internet is limited Security and privacy concerns Inability to touch, feel and see product Unavailability of micropayments for purchase of small cost products E-Commerce for Consumers M20E-commerce is affecting business in the following ways: Reducing barriers to entry Preventing any company from owning the market Enhancing collaboration/alliances Multiplying market niches Changing marketplace drivers e-commerce is also leading to Information density: Increasing the quality and the quantity of information to the customer. Mass Customization: The method in which customized products or services can be provided on demand Personalization of Marketing goods The E-Commerce DifferenceM Chapter 8 Question NumberAnswerLevel 1 Head Reference for AnswerDifficulty1D All of the aboveSecond-Generation E-Commerce Technologies: Providing InteractionE2A CookieSecond-Generation E-Commerce Technologies: Providing InteractionE3D WSDLFourth-Generation E-Commerce Technologies: Transforming ProcessesM4C Web ClientSecond-Generation E-Commerce Technologies: Providing InteractionM5FourthThe Stages of E-commerceE6Scripting LanguageSecond-Generation E-Commerce Technologies: Providing InteractionE7ResponseSecond-Generation E-Commerce Technologies: Providing InteractionE8A(n) AppletSecond-Generation E-Commerce Technologies: Providing InteractionM9FalseFirst-Generation E-Commerce Technologies: Establishing a Web PresenceE10FalseSecond-Generation E-Commerce Technologies: Providing InteractionM11FalseSecond-Generation E-Commerce Technologies: Providing InteractionE12TrueFourth-Generation E-Commerce Technologies: Transforming ProcessesE13CThird-Generation E-Commerce Technologies: Supporting Transactions E14DFirst-Generation E-Commerce Technologies: Establishing a Web PresenceE15AThird-Generation E-Commerce Technologies: Supporting Transactions E17The 4 tier e-commerce infrastructure has the following components: Web Client: Enter the URL and you send an HTTP request to a Web serve Web Server: Receives request and decides on how to send response back to the client server. It request is static then sends back response but it the request is dynamic then the web server routes the request to the client and application server. Application Server: If needed the server performs queries on the data server to get the requested data. Data/File Server: Stores data that may be needed for the E-commerce transaction. Second-Generation E-Commerce Technologies: Providing InteractionM18XML (eXtensible Markup Language) uses tags to mark up content and/or data so that applications can recognize it. The goal of XML is to describe data. XML tags allow applications to understand the underlying meaning of data and then react appropriately. For example, an tag may signal to an on-line application that the incoming data represents an invoice for an ordered product and then the application can process the data accordingly. Fourth-Generation E-Commerce Technologies: Transforming ProcessesM19The features often looked for in an e-commerce website include: interactivity and security. These are critical for the effective usage of e-commerce. The fear of lost data and identity theft can make many nervous about using e-commerce.Fourth-Generation E-Commerce Technologies: Transforming ProcessesM20Students may mention technologies such as: AJAX Blogging RSS VOIPFourth-Generation E-Commerce Technologies: Transforming ProcessesD Chapter 9 Question NumberAnswerLevel 1 Head Reference for AnswerDifficulty1ACorporate and IT Governance E2Transfer (This choice does not exists)Enterprise Risk Management M3C Enterprise Risk Management D4DEnterprise Risk Management M5Near sourcingA Global Perspective E6Off shoringA Global Perspective M7Enterprise Risk ManagementEnterprise Risk Management M8Applicable riskEnterprise Risk Management M9FalseGlobal IS and Global IT M10FalseGlobal IS and Global IT E11TrueGlobal IS and Global IT E12TrueA Global Perspective M13BEnterprise Risk Management M14AEnterprise Risk Management M15CEnterprise Risk Management M16The congress passed the Sarbanes Oxley act in 2002 to restore public and investors trust in public accounting and reporting of publicly traded companies. After the Enron and World Com financial frauds the SOX held the CEO and the CFO liable and responsible for the financial statements produced by the company. The SOX required more documentation of process, decreased the time between reporting financial statements, and prohibited accounting firms from selling their non audit business to the companies.Enterprise Risk Management D17A global perspective is a world wide approach to business that seeks to create business value in an economic world that is largely flat, borderless and cyber connected. Example: GE off shoring its billing operations to India, thus saving money for itself and creating jobs and revenue in India.A Global Perspective E18Four challenges to IT Globalization are identified by Ives and Jarvenpaa on page 271 of text, they are: (1) the linkage of global IT to global business strategy; (2) Information Technology platforms; (3) International data sharing; and (4) cultural environment. Here is a possible answer if the student chooses (4) Cultural environment: The answer to this depends on your point of view. For example, you might believe that cultural environments are the most serious challenge to IT globalization. If so, then successfully competing on a global scale requires more than just native speaking IT professionals or knowledge workers. A truly global organization is aware of and embraces the diversity inherent in different cultures. An organization would be committed to education and training of its knowledge workers in cultural differences, languages, etc. Also, HR policies would rotate IT managers and IT employees through various locations to enable them to gain firsthand knowledge and experience of various cultures. Also, IT departments would be mindful of cultural environments when developing websites, global IS, etc.Global IS and Global ITD19Enterprise Information Security is defined on page 284 of the text as an ongoing, strategic business process of risk and threat assessment and management, which helps to ensure safe and continuous business operation and the availability, confidentiality, and integrity of an enterprises information resources wherever they might be located. Availability means that the business has access to whatever information resource it needs to create business value. Confidentiality addresses the need to keep safe certain types of sensitive information and to restrict access to this information to authorized users. Integrity as related to information means ensuring that the facts, events, knowledge, etc., captured and stored in information systems is accurate and complete (see CARROTS in Chapter 3). The threats and risks include unauthorized access, compromise, theft, loss, etc and a complete answer would address several of these. Recent examples of public and private organizational risk will include those from the text such as the Kaiser example on page 286, as well as examples from current headlines such as Homeland Security Admits Privacy Errors in Anti-Terror Effort. The integration and exposure of sensitive data is an increasing risk faced by modern organizations. While Kaiser received fines, the Department of Homeland Security faces the risks of loss of credibility, possible reduced effectiveness, and of litigation. (http://www.eweek.com/article2/0,1895,2077595,00.asp?kc=EWEWEMNL122506EP25A)Enterprise Information SecurityD20The PPT framework is:  People refers to the members of an organization and the roles that they play. Technology includes tools, methods and mechanisms to support organizational processes. Policy represents the documented rules for governance.Enterprise Information SecurityM     End of Chapter Answers  PAGE 1  $%<=>?[\]^ghiǸǥtiZiIZ>Zh_mHnHu j}h%?UmHnHujhrUmHnHuhrmHnHu2jhrh%?>*B*UmHnHphuhrmHnHuh9,hr0JmHnHu$jh9,hr0JUmHnHuhr5CJ OJQJ^JaJ &jhr5CJ OJQJU^JaJ #h\h/5CJ OJQJ^JaJ #h\h_5CJ OJQJ^JaJ $! m  T gd\ $ gd/w>w       ! " # ? @ λ谡k谡Z jqh%?UmHnHu2jhrh%?>*B*UmHnHphuh_mHnHu jwh%?UmHnHujhrUmHnHuhrmHnHu$jh9,hr0JUmHnHu2jhrh%?>*B*UmHnHphuh9,hr0JmHnHuhrmHnHu"@ A B K L M g h i j k l m n o źӆņlź[ӆņ jeh%?UmHnHu2jhrh%?>*B*UmHnHphuhrmHnHuh_mHnHu jkh%?UmHnHujhrUmHnHuhrmHnHuh9,hr0JmHnHu$jh9,hr0JUmHnHu2jhrh%?>*B*UmHnHphu        % & ' ( 1 2 3 M N O Q R S T U V r s źӆņlź[ӆņ jYh%?UmHnHu2jhrh%?>*B*UmHnHphuhrmHnHuh_mHnHu j_h%?UmHnHujhrUmHnHuhrmHnHuh9,hr0JmHnHu$jh9,hr0JUmHnHu2jhrh%?>*B*UmHnHphu s t u ~  źӆņlź[ӆ jMh%?UmHnHu2jhrh%?>*B*UmHnHphuhrmHnHuh_mHnHu jSh%?UmHnHujhrUmHnHuhrmHnHuh9,hr0JmHnHu$jh9,hr0JUmHnHu2jhrh%?>*B*UmHnHphu  X Z [ ] { | }  }kZZL}kZZZ}kh|?CJOJQJ^JaJ h\hL5CJOJQJ^JaJ# *h|?h_CJOJQJ^JaJ h|?h_CJOJQJ^JaJ h\h/CJOJQJ^JaJ h\hhtCJOJQJ^JaJ h\h_CJOJQJ^JaJ#h\h_5CJOJQJ^JaJ h\h_#h\h/5CJ OJQJ^JaJ &jhr5CJ OJQJU^JaJ           # * L W $$Ifa$gdNmgd/gd\W X Z \ ] | ~ ^RIIIR $IfgdL5 $$Ifa$gdNmkd$$Ifl\(#(6\  t00*44 laP~  ^RIIR $IfgdL5 $$Ifa$gdNmkd[ $$Ifl\(#(6\  t00*44 laP ^RIIR $IfgdL5 $$Ifa$gdNmkd $$Ifl\(#(6\  t00*44 laP   ^RIIR $IfgdL5 $$Ifa$gdNmkd} $$Ifl\(#(6\  t00*44 laP    " S U ` a ( ) * , / 4 5 | } ~ ޿޿ޮޮ޿ޮޮޝތތޝތތޝޝ{{ hBh0hCJOJQJ^JaJ h\hmCJOJQJ^JaJ hBh_CJOJQJ^JaJ h\hL5CJOJQJ^JaJ h3h_CJOJQJ^JaJh|?CJOJQJ^JaJ h\h_CJOJQJ^JaJ h\h8CJOJQJ^JaJ0 " ' P R ^RIIR $IfgdL5 $$Ifa$gdNmkd $$Ifl\(#(6\  t00*44 laPR S U a ^RIIR $IfgdL5 $$Ifa$gdNmkd $$Ifl\(#(6\  t00*44 laP ^RIIR $IfgdL5 $$Ifa$gdNmkd0 $$Ifl\(#(6\  t00*44 laP ^RIIR $IfgdL5 $$Ifa$gdNmkd $$Ifl\(#(6\  t00*44 laP ) + ^RIIR $IfgdL5 $$Ifa$gdNmkdR $$Ifl\(#(6\  t00*44 laP+ , / 5 }  ^RIIR $IfgdL5 $$Ifa$gdNmkd $$Ifl\(#(6\  t00*44 laP ^RIIR $IfgdL5 $$Ifa$gdNmkdt$$Ifl\(#(6\  t00*44 laP 789;>?@A_`acfghi޼ͼͼޫ͚ͫޫ͚ͫޫ͚ͫވv#hBh_6CJOJQJ^JaJ#hBh;6CJOJQJ^JaJ h\h\CJOJQJ^JaJ h\hhtCJOJQJ^JaJ h\h0hCJOJQJ^JaJ h\h_CJOJQJ^JaJ hBh_CJOJQJ^JaJ hBh0hCJOJQJ^JaJ- ^RIIR $IfgdL5 $$Ifa$gdNmkd$$Ifl\(#(6\  t00*44 laP ^RIIR $IfgdL5 $$Ifa$gdNmkd$$Ifl\(#(6\  t00*44 laP8:^RIIIR $IfgdL5 $$Ifa$gdNmkd'$$Ifl\(#(6\  t00*44 laP:;>@A`b^RIIIR $IfgdL5 $$Ifa$gdNmkd$$Ifl\(#(6\  t00*44 laPbcfhi^RIIIR $IfgdL5 $$Ifa$gdNmkdI$$Ifl\(#(6\  t00*44 laPIJi^RIIIIII $IfgdL5 $$Ifa$gdNmkd$$Ifl\(#(6\  t00*44 laP#@ Jhijlno-<ܺܩveSeSeAe# *h\h/CJOJQJ^JaJ#hChW5CJOJQJ^JaJ h\hWCJOJQJ^JaJ h~h_CJOJQJ^JaJ h~hWCJOJQJ^JaJ h\h_CJOJQJ^JaJ h\h.?.@.I.J.K.t.u.v.x..............п΅ЮпᝌziXXz hW+"h9UCJOJQJ^JaJ hW+"hW+"CJOJQJ^JaJ# *h&eh)^CJOJQJ^JaJ hW+"h\CJOJQJ^JaJ hW+"h)^CJOJQJ^JaJ hhpCJOJQJ^JaJ hhkCJOJQJ^JaJ hh\CJOJQJ^JaJ hh'CJOJQJ^JaJhCJOJQJ^JaJ .9.:.;.=.J.K.u.w.Ikdq-$$Ifl\(#(6\  t00*44 laP $$Ifa$gd@ $Ifgd'w.x.z.....^RII@R $Ifgd. $Ifgd' $$Ifa$gd@kd.$$Ifl\(#(6\  t00*44 laP.......^RIIIR $Ifgd' $$Ifa$gd@kd.$$Ifl\(#(6\  t00*44 laP.......^RII@R $Ifgd. $Ifgd' $$Ifa$gd@kd$/$$Ifl\(#(6\  t00*44 laP..........//(/)/*/+/^/_/////////-0.01020]0^0_0`0c0d0000000111ͼ謁޼޼޼޼v h-ah\CJOJQJ^JaJ h-ah.CJOJQJ^JaJ# *h&eh.CJOJQJ^JaJ# *h&ehkCJOJQJ^JaJ hW+"h.CJOJQJ^JaJ hW+"h\CJOJQJ^JaJ hW+"hW+"CJOJQJ^JaJ hW+"hkCJOJQJ^JaJ,..///(/*/^RIIIR $Ifgd. $$Ifa$gd@kd/$$Ifl\(#(6\  t00*44 laP*/+/-/2/\/^/^RIIR $Ifgd' $$Ifa$gd@kdF0$$Ifl\(#(6\  t00*44 laP^/_/a/g///^RIIR $Ifgd' $$Ifa$gd@kd0$$Ifl\(#(6\  t00*44 laP//////^RIIR $Ifgd' $$Ifa$gd@kdh1$$Ifl\(#(6\  t00*44 laP//////^RI@R $Ifgd. $Ifgd' $$Ifa$gd@kd1$$Ifl\(#(6\  t00*44 laP///0+0-0^RI@R $Ifgd. $Ifgd' $$Ifa$gd@kd2$$Ifl\(#(6\  t00*44 laP-0.01030]0_0^RI@R $Ifgd. $Ifgd' $$Ifa$gd@kd3$$Ifl\(#(6\  t00*44 laP_0`0c0e000^RI@1  $IfgdW+" $Ifgd. $Ifgd' $$Ifa$gd@kd3$$Ifl\(#(6\  t00*44 laP000000001^RIIIIII $Ifgd' $$Ifa$gd@kd=4$$Ifl\(#(6\  t00*44 laP1111>1t111 2RIIIII $Ifgd'kd4$$Ifl\(#(6\  t00*44 laP $$Ifa$gd@1&1=1>1O1Q1t11111111112 22D2E2F2U2V2W2X2ɷrraPP h-ah.CJOJQJ^JaJ h-ah\CJOJQJ^JaJ#h-ahtw5CJOJQJ^JaJ h-ahtwCJOJQJ^JaJ h-ah`=eCJOJQJ^JaJ h-ah UCJOJQJ^JaJ#h-ah U5CJOJQJ^JaJ#h-ah.5CJOJQJ^JaJ#h-ahR5CJOJQJ^JaJ#h-ah`=e5CJOJQJ^JaJ 2E2F2V2X2Y2\2z22Ikd_5$$Ifl\(#(6\  t00*44 laP $$Ifa$gd@ $Ifgd'X2Y2\2y2z22222#3+3R3Y333333333444444455555ܹ˗tccRRRRR h-ah`=eCJOJQJ^JaJ h-ahtwCJOJQJ^JaJ h-ahJ CJOJQJ^JaJ#h-ah`N;5CJOJQJ^JaJ h-ah`N;CJOJQJ^JaJ h-ahC7CJOJQJ^JaJ#h-ahUa5CJOJQJ^JaJ h-ahUaCJOJQJ^JaJ h-ah.CJOJQJ^JaJ# *h&eh.CJOJQJ^JaJ 2222 3#3+3R3Y3n33333 $$Ifa$gd@ $Ifgd' 333444^RIIR $Ifgd' $$Ifa$gd@kd5$$Ifl\(#(6\  t00*44 laP445555^RIIR $Ifgd' $$Ifa$gd@kd6$$Ifl\(#(6\  t00*44 laP5555555w666666666666޻޻ޙ̇uncQ@ hOhNmCJOJQJ^JaJ#hOh\5CJOJQJ^JaJhOh\CJaJ hOh\# *h&eh\CJOJQJ^JaJ# *h&eh'CJOJQJ^JaJ h-ahJ CJOJQJ^JaJ h-ahtwCJOJQJ^JaJ h-ah=!CJOJQJ^JaJ# *h&eh.CJOJQJ^JaJ h-ah.CJOJQJ^JaJ h-ah`=eCJOJQJ^JaJ5555546w6^RI@@7 $Ifgdl $Ifgd=! $Ifgd' $$Ifa$gd@kd7$$Ifl\(#(6\  t00*44 laPw6666666IGB=gd\gd\kd7$$Ifl\(#(6\  t00*44 laP $$Ifa$gd@ $Ifgd'6666666RF $$Ifa$gdNmkd48$$Ifl\(#(6\  t00*44 laP $$Ifa$gdq66677374757778797F7G7|7}7~7777777777777888888+8,8\8]8͚͚͚͈wfwfw h h%CJOJQJ^JaJ h hHCCJOJQJ^JaJ# *h&ehHCCJOJQJ^JaJ hOhYCJOJQJ^JaJ hOh+(CJOJQJ^JaJ hOhCJOJQJ^JaJ hOhHCCJOJQJ^JaJ hOhOCJOJQJ^JaJ hOh\CJOJQJ^JaJ%6747677797G7|7I@ $Ifgdkd8$$Ifl\(#(6\  t00*44 laP $$Ifa$gdNm $Ifgd=.|7}7777777IkdV9$$Ifl\(#(6\  t00*44 laP $$Ifa$gdNm $Ifgd=.7777888^RI@IR $IfgdY $Ifgd=. $$Ifa$gdNmkd9$$Ifl\(#(6\  t00*44 laP888,8]8_8^RIIR $Ifgd=. $$Ifa$gdNmkdx:$$Ifl\(#(6\  t00*44 laP]8^8_8`8b8k8l88888888888999 9!9\9]9`9e9f9999999޻޻޻̻vvevTvTvv h:Hh:HCJOJQJ^JaJ h:Hh+(CJOJQJ^JaJ h:HhF/CJOJQJ^JaJ h h+(CJOJQJ^JaJ h hCJOJQJ^JaJ# *h&ehF/CJOJQJ^JaJ h hF/CJOJQJ^JaJ# *h&ehHCCJOJQJ^JaJ h hHCCJOJQJ^JaJ h h5%CJOJQJ^JaJ _8`8b8l888^RIIR $Ifgd=. $$Ifa$gdNmkd ;$$Ifl\(#(6\  t00*44 laP888888^RI@R $IfgdX $Ifgd=. $$Ifa$gdNmkd;$$Ifl\(#(6\  t00*44 laP888899 9^RI@IR $Ifgd $Ifgd=. $$Ifa$gdNmkd+<$$Ifl\(#(6\  t00*44 laP 9!9#9)9Z9\9^RIIR $Ifgd=. $$Ifa$gdNmkd<$$Ifl\(#(6\  t00*44 laP\9]9`9f999^RIIR $Ifgd=. $$Ifa$gdNmkdM=$$Ifl\(#(6\  t00*44 laP999999^RI@R $IfgdX $Ifgd=. $$Ifa$gdNmkd=$$Ifl\(#(6\  t00*44 laP9999 :::^RI@7R $IfgdX $Ifgd+( $Ifgd=. $$Ifa$gdNmkdo>$$Ifl\(#(6\  t00*44 laP99999 :::::i:j:::;;t;u;;;<*<:<I<<<=%======ttcc hGPhGPCJOJQJ^JaJ hGPh5%CJOJQJ^JaJ#hGPhY5CJOJQJ^JaJ hGPhYCJOJQJ^JaJ# *h&ehYCJOJQJ^JaJ h?ihYCJOJQJ^JaJ h:Hh+(CJOJQJ^JaJ h:HhF/CJOJQJ^JaJ# *h&ehF/CJOJQJ^JaJ ::::f:g:i:^RI@@R $IfgdX $Ifgd=. $$Ifa$gdNmkd?$$Ifl\(#(6\  t00*44 laPi:j:m:o::::^RI@@R $IfgdX $Ifgd=. $$Ifa$gdNmkd?$$Ifl\(#(6\  t00*44 laP::::;;;^RI@@R $IfgdX $Ifgd=. $$Ifa$gdNmkd"@$$Ifl\(#(6\  t00*44 laP;;;!;q;r;t;^RI@@R $IfgdX $Ifgd=. $$Ifa$gdNmkd@$$Ifl\(#(6\  t00*44 laPt;u;x;;:<<==^RIIIII $IfgdY $$Ifa$gdNmkdDA$$Ifl\(#(6\  t00*44 laP=====>>?I@@@ $Ifgd=.kdA$$Ifl\(#(6\  t00*44 laP $$Ifa$gdNm $IfgdX=>>%>*>2>>>>>??@%@'@+@`@z@{@|@}@~@@@LBMBBBBBBުއveTvTvTv heheCJOJQJ^JaJ hehb(CJOJQJ^JaJ hehYCJOJQJ^JaJ# *h&ehYCJOJQJ^JaJ hGPhCJOJQJ^JaJ hGPhCJOJQJ^JaJ hGPh5%CJOJQJ^JaJ#hGPhm^5CJOJQJ^JaJ hGPhYCJOJQJ^JaJ hGPhm^CJOJQJ^JaJ?`@{@}@~@@MB@kdfB$$Ifl\(#(6\  t00*44 laP $$Ifa$gdNm $IfgdX $Ifgd=.MBBBBBBD@7 $Ifgd=.kdB$$Ifl\(#(6\  t00*44 laP $$Ifa$gdNm $IfgdX $IfgdeBB#CDDnDoDpDqDrDsDtD}D~DDDDEE E Eﻩ|hWFW4# *h&ehrCJOJQJ^JaJ hhCJOJQJ^JaJ hhrCJOJQJ^JaJ& *h&ehh3i5CJOJQJ^JaJ#hhh3i5CJOJQJ^JaJ h<h<hh3i hhh3i *h<CJaJ# *h&eh\CJOJQJ^JaJ# *h&ehYCJOJQJ^JaJ h^9h^9CJOJQJ^JaJ h^9hG.CJOJQJ^JaJ h^9hYCJOJQJ^JaJDnDoDqDrDsD~D@>9gd<kdC$$Ifl\(#(6\  t00*44 laP $$Ifa$gdNm $IfgdX $Ifgd^9~DDDDDDDDMkdD$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%?gd<DDEE E E EEIkdD$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%?EJEKEMENEPEcE@kd;E$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%? $Ifgdr EMENEPEbEcErEsEtEuEvExEEEEEEEEEEEEEEEEEEE FFFFݙwfݙUUU h^cht^CJOJQJ^JaJ h^chVxCJOJQJ^JaJ h^cheTCJOJQJ^JaJ h^ch^cCJOJQJ^JaJ h^chrCJOJQJ^JaJ hh,rCJOJQJ^JaJ hhpDCJOJQJ^JaJ hht^CJOJQJ^JaJ# *h&ehrCJOJQJ^JaJ hhrCJOJQJ^JaJ!cErEsEuEvExE=kdE$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $$Ifa$gdt^ $Ifgdt^xEEEEEEEE@kd]F$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $IfgdpD $Ifgd%?EEEEEEE@kdF$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%? $IfgdeTE FFFFF=F@7 $IfgdpDkdG$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%? $Ifgdt^FFFFFF*F+F;F=F>FZF[F\F]F^F`FeFfFFFFFFFFʸʸʸܖ܅tctctRttA hMht^CJOJQJ^JaJ hMh,rCJOJQJ^JaJ hMhzCJOJQJ^JaJ hMhrCJOJQJ^JaJ h^ch,rCJOJQJ^JaJ h^chzCJOJQJ^JaJ h^chpDCJOJQJ^JaJ#h^chpDCJOJQJ\^JaJ#h^chzCJOJQJ\^JaJ h^chrCJOJQJ^JaJ# *h&ehrCJOJQJ^JaJ=F>FZF[F]F^F`FfF@kdH$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgdz $Ifgd%?fFFFFFFF@kdH$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%? $IfgdzFFFFFFFFFFFFFFFFFFFFGGG+G,GUGVGGGGGGGwwwwfU hih,rCJOJQJ^JaJ hihrCJOJQJ^JaJ h2{hrCJOJQJ^JaJ hMh,rCJOJQJ^JaJ hMhzCJOJQJ^JaJ hMhVxCJOJQJ^JaJ hMheTCJOJQJ^JaJ# *h&ehrCJOJQJ^JaJ hMht^CJOJQJ^JaJ hMhrCJOJQJ^JaJ FFFFFFF@kd2I$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%? $Ifgdt^FFFFFFFF@kdI$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%? $IfgdVxFGGGG(G)G+GRI@I $Ifgdh3i $Ifgd%?kdTJ$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%?+G,G/G1GRGSGUG^RI@IR $Ifgdh3i $Ifgd%? $$Ifa$gd%?kdJ$$Ifl\(#(6\  t00*44 laPUGVGYG[G|G}GG^RI@IR $Ifgdh3i $Ifgd%? $$Ifa$gd%?kdvK$$Ifl\(#(6\  t00*44 laPGGGGGGG^RI@IR $Ifgdh3i $Ifgd%? $$Ifa$gd%?kdL$$Ifl\(#(6\  t00*44 laPGGGG;HHHPI^RI@@@@ $Ifgdh$] $Ifgd%? $$Ifa$gd%?kdL$$Ifl\(#(6\  t00*44 laPGGGGG>HHHgHtHHHHHHH IPISI\I]IIIIJDJOJJJJJJJJKKKK1K2K̩ﻩޘކucucucu#hihICJOJQJ\^JaJ hihICJOJQJ^JaJ# *h&ehrCJOJQJ^JaJ hiheCJOJQJ^JaJ#hihR5CJOJQJ^JaJ hihRCJOJQJ^JaJ#hihh$]5CJOJQJ^JaJ hihrCJOJQJ^JaJ hihh$]CJOJQJ^JaJ&PIIAJJJJJJJ $$Ifa$gd%? $Ifgd%? $Ifgde $Ifgdh$]JJJKK2KQK^REEE8 & F $IfgdI & F $Ifgd[ $$Ifa$gd%?kd)M$$Ifl\(#(6\  t00*44 laP2KQKbKcKKL N NNwOyOOOOOOOOPEQRRRR)RܹʨucWP hH$:hPK *h&ehocCJaJ# *h&ehh3iCJOJQJ^JaJ hihiCJOJQJ^JaJ hVWhCJOJQJ^JaJ hVWhVWCJOJQJ^JaJ hVWhICJOJQJ^JaJ hihRCJOJQJ^JaJ# *h&ehICJOJQJ^JaJ hihICJOJQJ^JaJ#hihICJOJQJ\^JaJQK`KbKcKfKMM N NIkdM$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%? N NNOOO^RIIR $Ifgd%? $$Ifa$gd%?kdKN$$Ifl\(#(6\  t00*44 laPOOOQRRR^RIIIR $Ifgd%? $$Ifa$gd%?kdN$$Ifl\(#(6\  t00*44 laPRRR)R9R@RbRmR^\WKKKK $$Ifa$gd%?gdrkdmO$$Ifl\(#(6\  t00*44 laPmRnRpRrRRRR^RI@IR $IfgdRU $Ifgd%? $$Ifa$gd%?kdO$$Ifl\(#(6\  t00*44 laP)RnRpRqRrRRRRRRRRRRRRRRRRRRRܺܩܘ܇vevTvB# *h&ehPKCJOJQJ^JaJ hQ. h?0CJOJQJ^JaJ hQ. h}CJOJQJ^JaJ hQ. hPKCJOJQJ^JaJ hQ. hRUCJOJQJ^JaJ hH$:h?0CJOJQJ^JaJ hH$:h}CJOJQJ^JaJ hH$:hH$:CJOJQJ^JaJ hH$:hRUCJOJQJ^JaJ hH$:hPKCJOJQJ^JaJ#hH$:hPK5CJOJQJ^JaJRRRRRRR^RI@IR $Ifgd} $Ifgd%? $$Ifa$gd%?kdP$$Ifl\(#(6\  t00*44 laPRRRRRRR^RI@RR $Ifgd} $Ifgd%? $$Ifa$gd%?kd Q$$Ifl\(#(6\  t00*44 laPRRRRRRR^RI@IR $IfgdK $Ifgd%? $$Ifa$gd%?kdQ$$Ifl\(#(6\  t00*44 laPRRRRRRRRRSS S!S"S#S$S&S9S:S;SUSVSWSXSYS[SfSgSSSSSSSSSSSSSSSSSSSSSSSSSTT̻̻̻ޘޘ̻ޘޘ̻ޘޘ̻އ hQ. hRUCJOJQJ^JaJ hQ. h CJOJQJ^JaJ#hQ. hKCJOJQJ\^JaJ ha_hPKCJOJQJ^JaJ# *h&ehPKCJOJQJ^JaJ hQ. hPKCJOJQJ^JaJ hQ. hKCJOJQJ^JaJ5RRRS S!S#S^RI@IR $IfgdK $Ifgd%? $$Ifa$gd%?kdBR$$Ifl\(#(6\  t00*44 laP#S$S&S:S;SUSVSXS^RI@I@R $Ifgd%? $IfgdK $$Ifa$gd%?kdR$$Ifl\(#(6\  t00*44 laPXSYS[SgSSSS^RI@IR $Ifgd $Ifgd%? $$Ifa$gd%?kddS$$Ifl\(#(6\  t00*44 laPSSSSSSS^RI@IR $Ifgd $Ifgd%? $$Ifa$gd%?kdS$$Ifl\(#(6\  t00*44 laPSSSSSSS^RI@IR $Ifgd $Ifgd%? $$Ifa$gd%?kdT$$Ifl\(#(6\  t00*44 laPSSSSTT T^RI@IR $IfgdRU $Ifgd%? $$Ifa$gd%?kdU$$Ifl\(#(6\  t00*44 laPTT T T TTT-T/T0T3T7T8TRTSTTTUTVTYTZT[TtTuTvTwTxT{T|T}TTTTTTTTTTTTTTTTTTT̻ު̻ޙ̈wwẅwwẅwwẅww hQ. hc7CJOJQJ^JaJ h,RFhPKCJOJQJ^JaJ hQ. hRUCJOJQJ^JaJ hQ. h CJOJQJ^JaJ ha_hPKCJOJQJ^JaJ# *h&ehPKCJOJQJ^JaJ hQ. hPKCJOJQJ^JaJ hQ. h?0CJOJQJ^JaJ. T T TT-T.T/T^RI@IR $Ifgd $Ifgd%? $$Ifa$gd%?kdU$$Ifl\(#(6\  t00*44 laP/T0T3T8TRTSTUT^RI@IR $IfgdRU $Ifgd%? $$Ifa$gd%?kd9V$$Ifl\(#(6\  t00*44 laPUTVTYT[TtTuTwT^RI@IR $Ifgdc7 $Ifgd%? $$Ifa$gd%?kdV$$Ifl\(#(6\  t00*44 laPwTxT{T}TTTT^RI@IR $Ifgdc7 $Ifgd%? $$Ifa$gd%?kd[W$$Ifl\(#(6\  t00*44 laPTTTTTTT^RI@IR $Ifgdc7 $Ifgd%? $$Ifa$gd%?kdW$$Ifl\(#(6\  t00*44 laPTTTTTTT^RI@IR $Ifgdc7 $Ifgd%? $$Ifa$gd%?kd}X$$Ifl\(#(6\  t00*44 laPTTTTTTT2U3UBUDUUUUUUUUU̻weSBB޻1 hQ. hKCJOJQJ^JaJ hQ. hA(CJOJQJ^JaJ#hQ. hPKCJOJQJ\^JaJ#hQ. hCJOJQJ\^JaJ hQ. h\^CJOJQJ^JaJhCJOJQJ^JaJ&hQ. h\^5CJOJQJ\^JaJ hQ. h\^CJOJQJ^JaJ hO=vhPKCJOJQJ^JaJ# *h&ehPKCJOJQJ^JaJ hQ. hPKCJOJQJ^JaJ hQ. hc7CJOJQJ^JaJTTTDUUU^RD;2 $IfgdA( $Ifgd C $7$8$H$Ifgd\^ $$Ifa$gd%?kdY$$Ifl\(#(6\  t00*44 laPUUUUUUI@ $Ifgd%?kdY$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $IfgdA(UUUVV?V@VCVLVVVRW\WXXXXXX X޼vveTޫB# *h&ehVCCJOJQJ^JaJ hQ. hA(CJOJQJ^JaJ hQ. hO=vCJOJQJ^JaJ#hQ. hVC5CJOJQJ^JaJ hO=vhVCCJOJQJ^JaJ# *h&ehPKCJOJQJ^JaJ hQ. hVCCJOJQJ^JaJ hQ. hPKCJOJQJ^JaJ hQ. hRCJOJQJ^JaJ hQ. hKCJOJQJ^JaJ hQ. hc7CJOJQJ^JaJUUVVdGdRddddddd*e+e-e.e/e9e}e̻̻̻̻̻̻̻̻ݪxslZ#hJ3 h5CJOJQJ^JaJ hh *h< *h<CJOJQJ^JaJ# *h&eh:jCJOJQJ^JaJ h#h:jCJOJQJ^JaJ h:jh:jCJOJQJ^JaJ h#h#CJOJQJ^JaJ h#hW-"CJOJQJ^JaJ# *h&ehBCJOJQJ^JaJ h#hBCJOJQJ^JaJ#ddddddI@ $Ifgd%?kdf$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $IfgdW-"ddddde*e,e $$Ifa$gd%? $Ifgd[v & F$Ifgd:j,e-e.e9eIePere}e^YTHHHH $$Ifa$gd%?gd<gdkdf$$Ifl\(#(6\  t00*44 laP}e~eeeeee^RI@IR $Ifgdc $Ifgd%? $$Ifa$gd%?kd7g$$Ifl\(#(6\  t00*44 laP}e~eeeeeeeeeeeeeeeeeeeee f f f fffff-f.f/f0f1f۸ۣyy۸hhh۸WWW۸ h hdCJOJQJ^JaJ h hZkCJOJQJ^JaJ)h hB*CJOJQJ^JaJph)h hcB*CJOJQJ^JaJph)h h:dB*CJOJQJ^JaJph# *h&ehCJOJQJ^JaJ h hcCJOJQJ^JaJ h hCJOJQJ^JaJ& *h&eh5CJOJQJ^JaJ"eeeeeee^RI@IR $Ifgdc $Ifgd%? $$Ifa$gd%?kdg$$Ifl\(#(6\  t00*44 laPeeee f f f^RI@RR $IfgdZk $Ifgd%? $$Ifa$gd%?kdYh$$Ifl\(#(6\  t00*44 laP ffff-f.f0f^RI@IR $Ifgdd $Ifgd%? $$Ifa$gd%?kdh$$Ifl\(#(6\  t00*44 laP0f1f3fAfVfWfYf^RI@IR $Ifgd[5 $Ifgd%? $$Ifa$gd%?kd{i$$Ifl\(#(6\  t00*44 laP1f3f@fAfVfWfXfYfZfffffffffgg6g7gﻪygVgEgEg h.h CJOJQJ^JaJ hS*h CJOJQJ^JaJ# *h&eh CJOJQJ^JaJh CJOJQJ^JaJ h h CJOJQJ^JaJ# *h&ehdCJOJQJ^JaJ h hdCJOJQJ^JaJ# *h&ehCJOJQJ^JaJ h h[5CJOJQJ^JaJ h h%8 CJOJQJ^JaJ h hCJOJQJ^JaJYfZf\fhf}f~ff^RI@@R $Ifgd a $Ifgd%? $$Ifa$gd%?kd j$$Ifl\(#(6\  t00*44 laPffffff^RI@@ $Ifgd[v $Ifgd%? $$Ifa$gd%?kdj$$Ifl\(#(6\  t00*44 laPffffffRF=4 $Ifgd a $Ifgd%? $$Ifa$gd%?kd.k$$Ifl\(#(6\  t00*44 laP $$Ifa$gd[vffffffI=4 $Ifgd%? $$Ifa$gd%?kdk$$Ifl\(#(6\  t00*44 laP $$Ifa$gd a $Ifgd afgggggI= $$Ifa$gd%?kdPl$$Ifl\(#(6\  t00*44 laP $$Ifa$gd a $Ifgd agg3g4g6g7g:g?g@kdl$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd[5 $Ifgd%??gWgXgZg[g^gI= $$Ifa$gd%?kdrm$$Ifl\(#(6\  t00*44 laP $$Ifa$gd[v $Ifgd[v7gZg[g{g|gggggggiiiijj jj!j#j0kHkIkLkkkll m*m@mmmdn̻̻̩݆xjxYxYxYxY homh7%CJOJQJ^JaJh_CJOJQJ^JaJh7%CJOJQJ^JaJ homhjCJOJQJ^JaJ#hGulh.CJOJQJ\^JaJ#hGulhGulCJOJQJ\^JaJ hGulhGulCJOJQJ^JaJ hGulh.CJOJQJ^JaJ# *h&eh.CJOJQJ^JaJ h.h.CJOJQJ^JaJ"^gcgxgyg{g|ggg@kdn$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgdq $Ifgd%?gggggg=kdn$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $$Ifa$gd a $Ifgd agggggg4kd%o$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $$Ifa$gd a $Ifgd a $Ifgd%?gggggg $$Ifa$gd a $Ifgd a $Ifgd%? $$Ifa$gd%?ggghij^RII@ $Ifgd a $Ifgd%? $$Ifa$gd%?kdo$$Ifl\(#(6\  t00*44 laPjjjj jj0kRF== $Ifgd $$Ifa$gd%?kdGp$$Ifl\(#(6\  t00*44 laP $$Ifa$gd a0kEkFkHkIkLkl@7 $Ifgd7%kdp$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%? $Ifgd%8 dn}nnnnno oIoooooooooo)qqqss3t4tqtvuuuŴxjxjxjYjYj hDDhDDCJOJQJ^JaJhDDCJOJQJ^JaJhCJOJQJ^JaJh7CJOJQJ^JaJ# *h&ehjCJOJQJ^JaJhPCJOJQJ^JaJ homhjCJOJQJ^JaJhsDCJOJQJ^JaJh7%CJOJQJ^JaJ homh7%CJOJQJ^JaJhZ#CJOJQJ^JaJlooooou@7 $Ifgd%?kdiq$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $IfgdE^ $Ifgd7%uuuuuuuuvvwww w w wwwwww1w2w8w9wоyh`\`\`\`\XNHN h30Jjh30JUh3hMK;jhMK;U h\hCJOJQJ^JaJ h\hjCJOJQJ^JaJ)jrhkhjCJOJQJU^JaJhjCJOJQJ^JaJ hkhjCJOJQJ^JaJ# *h&ehjCJOJQJ^JaJ homhjCJOJQJ^JaJh7CJOJQJ^JaJ hDDhjCJOJQJ^JaJuuuuuuvQvvIkdq$$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%?vvwwwww wIDDBgdkd $$Ifl\(#(6\  t00*44 laP $$Ifa$gd%? $Ifgd%? w w wwwwww0w1ww?wgd 9w:w;w=w>w?w h\hCJOJQJ^JaJhMK;h3jh30JUhZ&\0JmHnHu21h:pm / =!"#$% }DyK _Toc152086333}DyK _Toc152086333}DyK _Toc152086334}DyK _Toc152086334}DyK _Toc152086335}DyK _Toc152086335}DyK _Toc152086336}DyK _Toc152086336}DyK _Toc152086337}DyK _Toc152086337}DyK _Toc152086338}DyK _Toc152086338}DyK _Toc152086339}DyK _Toc152086339}DyK _Toc152086340}DyK _Toc152086340}DyK _Toc152086341}DyK _Toc152086341$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vlf t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl6 t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh55D5\ 5#v#vD#v\ #v:Vl tx*655D5\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh555\ 5#v#v#v\ #v:Vl t0*6555\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aPSDd 1O^_0  # A2Rݲyb;VwRr`!Rݲyb;Vwn~|>9Rxm]yIӪ321(_AQiN[Tm1)N)@#,ւ@+%Z^MŤ(J2E3 _,#B!I?س]ZKs>~m<}~[{=z7յ?_s__a-.7=o>C7ԍk~QXq}/W8%nՖ _ťw?|h;ӎKaݗooU\~ sR I `$7*~O DšQM)W@yO 4&M@i"$W&D@+_34& D r'O>%.k['0`D4&,rN\~M@i"DyFSDHi"M4&DЃyW'H&D4;4[(W OIh"M4&DHi"@h+pSP^~OHi"M4&D@ib5Q?W@}O @i"M4&DHF0ռ~OHi"M4&D@i@4Qr~O @i"M4&DH`T +@?' .__wnxum ɵ=/<ym"~ۉq_qqʸؼc}lK)_Hiboyq߹g79.߲ɧ7ҽXظW=>{&ri"M]94$9'wΉ:DH#\zo1c?#X\{^㨑A/^D?Ml+p?Y3~#^ -`qی&-ODc1b|N@b4&y}ضn+ǢS=;]2'xLؼ|GH=\D#GN; -2j{h4&B] 3o7c3y'59lO1i"M_"]}o1_;n蛤4q9̳YbYv11a ǡ]1VHڿ8|eYu%&͹wh"M|SrZ،ˏpI?cߣerӏ|6KHi"aUm1*%0>IH>n/-xCXi"MDÎ{,ޭ{t ԟy'|؜zAk;Ni"MJ?%MpY{d'TcJi"M4L]>Qh"MƝOl3g@#N*ϭi"M&^>9 W<ѵoΈܢOjx_'aӏ*'94&^/L≠E9xM4q;|O -A?w|D8JM|Gm}l=*ϟsNQ\S[s%xdOϥzXɧDqWw4&Mͧ:|<]iC돉 ŜUH*rRC*OsD8TM}Cߙyo^Fpa#O9F4Ǹyu4qdO8f5'+MD`^S/\7}ӏ+1'GiH48 4_q(W`O? 'J>%M&z#_ }+i"M A|FW+DgM:/#/u|cFH{7/g^_<КvF0G9'~7gX\8Ma.cᄁ4qcÈ*a#ƣh"M&v⨺=/?M<./G^MDy8pr.^&6) ag|UDW>x&Ax+ćΈ4&\Xc]DM7>zn_'4QT&Įk61 Z?yҽJ?gS=3w§s'`MDu>b_W0"ʺ/_ǹ H{{^PMv^՗QH{_lCF\پ~W|ʮib|f݁szCw읿Bib4xGW{O]4&vKxNjbu&.i\8A\ʮ3E~H?cΙz;lhSF?#ɹMDuv|$sMDO CS4&veM:<ճhbG4Q+@?+g|Ǿn\O>%M9xxomo;=~w{u:=׮~;yDآ&Zg4^Ĭopc53Lw|6ki"M-i1yrhsټ14&K?y 9'ob1ny}ԛ.7kӴu9L:v#QI~OF J]}f'>;ӞixF|6sR>sY-M$ӕZr廗xeظ=khvmGy[eL&Įhb\=?SuyôxUrL,~澝>ڊ畏L&i=\~~g?fy'SKK+AS+^Rϝȿ)9>"1z~_?Ƭ4qwNkbli H{w^Ύ];{4pĶ7MĀ9W8y<2q=H{]7OwS:ӏF7|^hwI?Ӻ~V5c%Aib41yO䧆67M}DyTҞWh"M&n䨻G&Gݛl\4UMl+m ߁>%ov#{['M̵ š4qCϝcĻb^H;?#w4Oq.agQ?7yZwG^4h"M&yS[<>;G^{uWi"M&nZTG4~#s_yz o}y_[{oloc+=zM4^x HQc7g6uk7Sz+kϼq|s8s㈛DuMl+p* O/X1ǾkϭD?#qx~T~.ꧼĜr*p<Ϝ9yqLXi"M&y WQG4͇}sDw&U=W\}hx[ɹFc=Ѓޣ4qph^8BFM=EiR;@ M,X6uUHpWܲŮ1m sҍG4b\=#{㟞kF_8ܪ:7vr<$TS+hl#b#'i"Mї+z8p&VUOT<~qվa/ W.֩3G4Y{:}.^w*"W xcu^3r꼈3xy|h8&Ķ*`qi94tnVgnXܪ4&;}b%1v8n4G{sAιNM(6"Iv_8?vh"M\ ._o=(W+Е;E|_㫳48Սk~Oֹzxktb4&6/4>k|?#M]6;v_ T3b,=1>Lbi_4&#`zט؇b9Q)W~ϱ~akg+ݠi"M2bF}ρ9G;Ω!HUn\*C)Ƹo4/7c҅_4A?~Tz؃H;P(Wݟ]ؼq>辸^9<ʶ(ލT'~DCw)%ܔ28 b{74&DwNcdj&DūƪDH ǪyUQ?;~Zl7Mgl9:wɧ4qg}T[Œe^8D8q?gtj7[!:&!oˍ)f̼AÎm8H|=xǧz&68rEٜ/aviNWA~ߣy:O8eoSNwYʻ4qػ~֘3.7b4&ĭc;b |9qe0\#51FR}/c_wVߏu.SG)i"M\c:8vsgG{VWnI#McE{蝃c~XSb 4q\6Jc.#3oW _h"MKm+gq q/ttY!OI?W~1m1THib4K7xx{O<9~Ķs]c9J%D0D߁ Hi"D0v&D4? 2~@i"M4|4&D8>/۬srHyDHi"M5r*Hr\I?~OI?4qx#u!A;~Gl~?o^Myc^'MHi"M\ nFD=u/a^51~..52%Neif͛ԟ8yW`O~OZ,5+w,gEz[c'MH&V3bz2yY2>DHW;.78k_W]~yqrYgXgo|挣4&;}y]})P|zv6MQI:4&M ܜr'~+?I?nj;6OI;[ݯ1mMY=4&v{^xbtPfQmǡ@i"M\=n;u/d!M4+p3=M+pۉ,;c/^`Hi"ıp3n|Gh4&Dc7٠4&SJib4Q)W@ rY~Oz.Y&Dh>r84&.ً~=Hi>E0@+f+Au~O@#M4Q#~GHib?;a8W}4&v?~zn_i"M&6xCk!so~)ZAu4&DVc=uR=4&7Qh"MQ ǭ_~)~!Ig/_4&^"8c&Dr@M4*6u+Hǣr 7W ~-=Oɯ0&DW#DH|DHi"_7yrg^I?ay~q &D<σph"Meͭj.HivlëDH[x`fΉ~O9x뱃^UHi?DHA Li"M g4Wn O 枃߸.DH! ΩIƋl&D99U&D ĈCu&D8\0ROI?9tqDHA*=4&D9tqx߼&DtW<]xg+@?'P@i"EXF_*M4dro&Dtq"=4&r^P@Ps`']P4&DX;=.^@i"My:&Dcg*b'=WT.еvo)i"M_.9'6۞7Hi"G=ū/Hi"y|<]#i"M\Cs+`1U~– ?h"MH i!DF}@ &D.5bBhC <Џ!C37j&za.?M>cDHa1ɾbyFM4dzC{A* <=@i"M+p 賌8NbYgǫ[fY"M4&D@i"M(Wঔ+@?'SDHi"M4&D#W+@?'4&DHh"M4q(W6s'O>g&D@i"M4&Hx &D@i"M4&āhb\S)W~OOH&D4+h+p( (/_zi#k[kEJo?|͞7M+w2 3g2W>4&Bm? r{>t 1f=CwבOɧO|ΧD6|KP>kd ;w%ϊkGdɾ&qb.\ g>>^uwRfiFRsK N$߮~~miv84?yueoR}.ۼuD.=6m)2FlVYkuxYq5vx嵕2Ͼb3\ʘa[e˪zyߏqYdȱҨ}?oיcei\'+0K?c|R4V>'A9Vo義zA2bye^Oogf ,1eNϜ[朖PәzL5~Γʪ^oqݏzeԊ54~2_gΤ{]PY\i򝦉ӮO>M''zH} G]^[כ##kr.W,8v{=/5s\|^\W6>`ھn/^V,ˢ[u6嘉z 3sjy~29YM~~wu߬\ug.2n=mǬ6cR138&|CibЗ_Ѕ=>_}=.Z&WoX5oN3;V1OH*n] }owris @i"D4&@(Wq @i"D4&M +0'M4`\ 4&ß]6woo+8\Sr`w޹Q?'t4W>`Lg_8O|a7?o ?D3~im;ًoo"/_X3]1g~RB.|^)&.Qji|ʡ=\y<[ih"MI8 e-P9ړ;ǚu,.~ߗ(c\|_*uԕI:S_WQ:K]5`oJm(xwŤirK?WM|g]}Ni"Mi8_(Y#MN41sWgԭxes<^ݙv}?,wFΣ3i}IϫMݓf;i}xeLvM}'_c݋R|N!41wx&DXrR[1jK盥8uR2j'6A=~WĜ2)ۅ8km8kG9E_=y22-:O8k>gM/HibWO~F}<&ߕ~YrHr<_O}eNQul79I>gt5gұ݋l"95'(νi&đ+g\&;ǘ4ˬ̓؊ؒ<.aRn~<ϬY}_Eq'-I9VÓx,S?'3YynxvCf)sg݋\6^rlz~c&<;g>ƴ1 @?'lS.o&)隘˨ļθ~{,ekM|>4EϏH=kS7#4@\+@?h"M4F+p\h"M041 (/+?ɹ1O .r6~o~6o⧿3oگk_ҦÐ7Ŀ'moZ}bXSbłO-Z,Z, >X,|jX,bX,bXbSb33ؘ 2>e1|c2>e1|c1)>e1|c1dS|c1)cS|c1FƧo0X Oc S>ŧ1|Oc 2>ŧ1|Oc2>ŧ1|Oc2)>e1|Oc2?1cl؆O)c S>ŧ1|O)c S>ŧ1|O)cS>ŧ1|OcS)>ŧ1|Oc2)>ŧ1|Oc2)>ŧS|Oc2)>eS|Oç2)>]~~޳vg.XPa!ȵuU֢1ނO4kdPZR[S{j`eqcHz4ElqU|O޳; rs#-}tPi;k'C,et8 ȼm+.)>,jlvu*>ŧJK-6ZT+Oi{Y{4ftuS|s=;Su_2)>l&l&tka|OhJ_|Ot). `LwӰ+GLt|zL92|>1"(UQ/OʧjxkGCt|FzLOǧjxGEtd|L[TPtOuOl(%Q)2m{YE{)N:<'& Ī@9P ]Ltʵbw>Ϝ9\i@V=m >^nHO}% - [mw?>>ϴ5;p&;xQ3~|:p>5~kvH{QTPS|w@]-ER n5ԎKO鬰[&H]䶧>Z77W=f:m4V\HŧS~~C2ǧS[^9<>5~|:@>էߑ>iVt4OƧw\zO~k> &ÿ5w)>5pV>OPgNgǟ٣6O -moh驇wCzq T|OH #GJu$MT|:>8QTuMT|:>5ikӁn\ jO9eV)a!OZ_=WjR|'=QzV+u*>ŧsGkn^7IiԼѭ\*>t<rW/LpiߚܾwOggTԽǧ=S43mؿq Smw>v4R4&Oʧ^b1S򿬗ꉣ=zhR5OʧF{O^m񛱿[7w3^Ӂev Y}k OM ݚ{p|ziY}^OuF 3J )>5!kvL|L%i?TMh'S:1BЇOǧFF s_)>eSmy/ߕ.H'Kϧ'+>N܇O썷_GƷߺ9|Ͽr Gbׯ~;O§Ӡxs[nDWi\zU| 龄27%_;OiT4;o>ʡ9LӓP5Qs %\aO,OdKP * U}b5Ԓӽϴz[ ;+C6gi}a}jrÇy+ͧ[rMfߋe듐,y*F2ɖE}*O PVt廗6YW˪=W4WYպTϫC6gIVOBua |zs+Rkwy"θ2IB.S|:v>MjمVFTyšҡϩTz;g$S˨Z_jO܋}$n]ҟTKU5*ԜTv79U_uxϪ\[_z-u/iOBԽ$ˏOi5-5B/Q~V*^g4h@SoJ V2nh(ʽO= ߐz +i Ug=啵.9a?5>MqrӞ˩:>)|*.)>#VPZUgZHEeFծ IUNa2較OBZY9t|Oȧ<@SV-_fɔI))9eNSjbN6̗uJWڤrͶbk'!݅Jgө^~|OlW寅ZTšV܍-vomӆbgO˼2ob |:|2~ZqfgF|:뭞nl{3~6>tWa&bUxS|j>/ΚPgç2IOz }'vʼo>/_W Z3y_;G 3O5{t|'Ӈe2?>+]?& 5e*0bc>+;2 5eJ~{g)>?.~W)>Rڲ<&GyKQ)>%5.)Qّ |K5F§C/^U%ZJycRqd>7 2-JS|o>Bm͂<#S|o>:,^yiK-U>ڄ<>ՎiP5 ūnqT7ZΚ W[_>^^km_ m^x>La8|o<*:۫=Qui˿T-ؗ~%i2&[{^;xiQI_G̙|~vǧC}篨$ kv>$>}N4:ڜRtP|jǚ4ǾpߋJyB'ǧScw=pƫ;8N?.څ1th|Wj.>0юS+0;u|T߅(|:> vۉjRR.L_ƹUح_v5ħS3 iϿV'fǧSSБ[v'mۯ/܂r)>jS?m jG/N9t^O'wL\zyC)> \QiλE ۖvU ] :{al>KobG/<2=WrO?:8fç`c/c&jh6xR=wXt$SwĒ2ۑמO=t'{$E5oqO"6*x)>oo:E .x[{I{t|:Hd _A/~m=NzױOo~xf=wOtu}Pt|uV>t7^9S1~ǧhfԱ/3§g)D f]ӱi)ɡ׬/vo{dOĢ@I=uԎI2ŧNRjicThqwnJ)>=&JRU&[Ȣ~ LHdSQǧөfOsQ0:ڝ=_kz*h}G;0ŧs_ۗq{SG|2S|OJ-TN?ދ_=3g0u Ot9) ]5TȷfvzOkS|޳ƙ#-O ˳.3z-ŧtW] w>zg*2ցw-վGӕ i8mf,zoxu0ӕjZk3*R %K&mΪ^~|{S|꩓&vg@ԁSvߋviqR|OǪ|\PhacJoUpWS|ۦ>tf5tx}in\ ”OBFS|abݸZ%[Ul{3OFO\ãcQ|O[ ~jcӵ@5; ZuKhW*4Eo;ur+cp)>w\x; ăfO DeYE8<烚)>VLW >x<V\&aðPBYEyZQ#OU5#OlTa˰L)>]48h`a>ϰOi76JƧ}[ҧlS|~ {T>>ŧ={vK{i BŧtdMdS|* KʨS|OuF1]Rb)>4(6ΐ(g =/ŏO)>eFS|:d)#e S|O)|O)çJ>eS|OS|OG^x,{>ŧ]Yz,S|O)>ŧȞ{Hx>w{~ZV *Mo^ _ic*v{/ÉO)>ŧeYFa 䘸/Pg"g!(z2ĭi(nožWvS|O˧ew?w{`zU+߽~>TT[rh@5>M44]{Dŧӹ4OMj TɗOY_?K>i|O)>V4ڛ5Z%?m|~ Vq|~Pim>ŧO\ʯOPe.O)>]q齾ژs)= V$:.ܼ{4xS|O͇4~LDUb~x삟/h4l[˗*ySS|Oi#>_^)>ŧmح@4.{!S;5>[ x_GS|Ov۩f~S|OEmG=z*1>ŧt)אΐ_vrS)SL>ŧ}|Ou3ӝ۾WP0;z)>5+ OiO> ^ƧT:xzS!T&xO*<ŧ ǎHS|:2 >ŧϼS.?[/S S.?[꤇S.?BS|O(>~1>ŧg&ǧ1zJ§.._7T_nr=0>ŧ^"ƏO&*&O)>D8ŧj2S|O5Qn}|OGD[S|=(D1|O6 ON7 SN1/§TR|OMO)>]׿q )>ŧ~>>ŧT_?ӧOAlY<(oVhmx)>5?3NSBnmwSL>ŧlfJm-u_>ŧ2ŧ57RMO)>E]ώ:O)JeSR;3S|:§IJ)2ŧR(I2.`l>2ŧMU=Tf§0ŧv_?7O)wCeRS~ _xKy$)>e=gS?4EK)>e9'T USU1)>ŧ׬j LO)D\u߹^ٻw8)>ŧU}iv,(|Oi $O)>U^m( =(>ŧt8=Wzd;Wϡ6LO)>~5]hyݷ^~>c7v(>ŧtQ@ -f0]S>ŧ1|OcS)>ŧ1|Oc2)>ŧ1|Oc2)>eS|Oc2)>eS|Oç2)>eS|ç2O)>eS|ç1O)c-)cS|ç1O)`G~?_[7~39Q,-S5w 8pk >eKi Leŷp&$v:_GpOl-w,5%&Y>W<aPa^ޟK{6χ,d CSJG~6jY6LMtd6TF'vϪWerl2eζ3v$f}q++ 𡼳qˋQfgU\C*XcEPf䃇J֧R>|[OJRcurMV4ZUUU:gRsu ]Hg*j}Um8M.v՟iT^;TൽUP;[ghOi=W\S\be*,YR*5'n(9VV\3L*I$&~ k9]`H7l6O ** /sOӮxi|ji ŧf]5J 5NM?si<&rWiMIT>'3ZՅO㑉e8=pUSw&9opbo§ɇ ?%R:O{oQ'Td`jv^>-όʙ*s"֊ )*OI&^-Z;wcmڅo˧%UJb!or2v -8%O';OIԪ-o>zfTtin`8$ZU!'OM*Ru@nVZI:$fJl|7lStwW[ngOV>z5[Eɯ,))WvjV{oIJXTXW{N䒾("Lxꚯ졪mX:Ө]`y!Wi[˪ UҌ^fya}u2efFT+b^w+N,|eS|c1)>eS|ç1)cSSç1Oc Sç1Oc 2>ŧl(o=_#v(Ow& |?qobհF0|ϾpoÿK T/YhOʁCU?mA^L?H_lI?SOeeՕMG TbjT]Ԍ/lXŲa'ɠT|&VR>OCuӐOSmL* {53|$QO[/$u[>MȢ]im$5fk'X}UJWҭ?XPsi,ذXRi&N,OiO+2*t⏓[]5yO5CO=IU6֦  'V4()xbQOk-9qWɧ6`"՜OSLԌiŒv^d(`OfvЃӑid'F- t>[4ꝬZ_9i;9m֨eؖOkıZ>Mp*bݖO \fi:U"|&O|m2VK͉|VPɓև5%H>~om=(=֒OSON-Ђ_x6I-2`bAU3: %o[,O-O&V/S|eI4RQ~4}[S -SW)etҪ.-QR%UZĎj;,TuQfu1XvM;)mSmLT{L2+ 2oA'.o%aϵLЪJK-OkMYtkTRhJXPR]a2X,a*]^{<*Onb)6ʧ*>MJg͊VEjn5)<>jd5&л1>SOc Sç1Oc 2>ŧ1Oc 2ؘbX,bXbSbbłO-Z,|(Uҏ$$IfP!vh5565\ 5#v#v6#v\ #v:Vl t0*5565\ 5aP@@@ W-"NormalCJ_HaJmH sH tH Z@Z / Heading 1$<@&5CJ KH OJQJ\^JaJ \\ / Heading 2$<@& 56CJOJQJ\]^JaJDA@D Default Paragraph FontRi@R  Table Normal4 l4a (k(No Listj@j _ Table Grid7:V04@4 /Header  !4 @4 /Footer  !.)@!. / Page Number&@&  CTOC 16U@A6  C Hyperlink >*B*ph2Q2 DD article_title?od$!mT #*LWXZ\]|~ "'PRSUa)+,/5}8:;>@A`bcfhiIJiklo - { [     O b ` ~ 8:;=DE^`acijsuvx|} #%&/12578ACDGIJSUVY[\eghkmnwyz}&Z[prsvpq  "/0JLMOs   3568@=?@CIJZ\]`bc}  SUVY[\O!5g$&'fhil !/"##/#1#2#5##%$%w%y%z%{%%%%%%%%%%%%%%& &9&:&;&=&J&K&u&w&x&z&&&&&&&&&&&&&&&&&&'''('*'+'-'2'\'^'_'a'g'''''''''''''''(+(-(.(1(3(](_(`(c(e(((((((((())))>)t))) *E*F*V*X*Y*\*z***** +#+++R+Y+n+++++++,,,,--------4.w............./4/6/7/9/G/|/}//////////00000,0]0_0`0b0l0000000000011 1!1#1)1Z1\1]1`1f11111111111 222222f2g2i2j2m2o222222233333!3q3r3t3u3x33:44555555667`8{8}8~88M::::::<n<o<q<r<s<~<<<<<<<<<== = = ==J=K=M=N=P=c=r=s=u=v=x============== >>>>>=>>>Z>[>]>^>`>f>>>>>>>>>>>>>>>>>>>>????(?)?+?,?/?1?R?S?U?V?Y?[?|?}???????????;@@@PAAABBBBBBBBBCC2CQC`CbCcCfCEE F F FFGGGGGIJJJJJ)J9J@JbJmJnJpJrJJJJJJJJJJJJJJJJJJJJJJJJK K!K#K$K&K:K;KUKVKXKYK[KgKKKKKKKKKKKKKKKKKKKLL L L LL-L.L/L0L3L8LRLSLULVLYL[LtLuLwLxL{L}LLLLLLLLLLLLLLLLLLDMMMMMMMMMNNw>$<=]h!ALhjkm'2NQRTt?o X%X%X%X%X%X%X%X%X%̕)028!8@0(  B S  ? _Toc152086333 _Toc152086334 _Toc152086335 _Toc152086336 _Toc152086337 _Toc152086338 _Toc152086339 _Toc152086340 _Toc152086341  |%.t<J R/]@o %.}<(JR8]@o!_`#a#b\:c|#dd4elf,g|hć#ijD#k4#l̐#m #n#od#p#qrstuvwxy,z{L|~}\~~\0077\\]]]]^^^^^^^^______aab)c)cnn@o      0077\\]]]]^^^^^^^^______aab.c.cnn@o  B*urn:schemas-microsoft-com:office:smarttagscountry-region8*urn:schemas-microsoft-com:office:smarttagsCity9*urn:schemas-microsoft-com:office:smarttagsplace8!*urn:schemas-microsoft-com:office:smarttagstime "D0217HourMinute!!ooo o o o o oooooo1o;o=o@ohLk2Rooo o o o o oooooo1o;o@ohLk2R *LWX[|'Pa)5}8?`gio  O b ~ 8D^hj{}%&78IJ[\mn}[vqHt=HJbc S[fl#5#w%{% &J&u&&&&&''2'\'g''''''(+(3(](e((((()>)t))F*\**** +++,,----...../4/=/F/G/}//0,0]0l000001)1Z1f1111122g2o2223!3r3x355`88::::;;o<}<<<<<==K=f>>>>?BcCE FGGIJpJJJJJJJJJ$K&KYK[KKKKKKKLMMM@NNNOPP PPPPPQ,RNR\RRRRS;SeSSSSST2T]TTTTT"UMUoUUUUV/VPVzVVVV!YhYYYT[n[\\\-].]9]C]P]r]]]3^@^^^_____ab0cLctmm,nUnnoooo o o o o ooooooo/o=o@ohLk2Rooo o o o o oooooo=o@o2 /? /Pmh&A_ q& 12d!%z(J< D^h>D<,CtyGMDN4;^Jz*)uU=z(J<,C;^Jep)uUmh1GMD2d!A_                                                                                                    \F$                          >y}+(o!J3 %8 "` [)^ gm^~E^I'DD# m Q. =!W+"W-"7%=<&A(q8(S*H+F/?0n0L5[5i5c7C7^9|9H$:MK;`N;<9@sBC CHCpDsD zD,RFkG:HKPKyKZMK%NA`bcfiJiklo    ` ~ 8:;=E^`acjsuvx} #&/1258ACDGJSUVY\eghknwyz}[prsvq "0JLMOs   3568@=?@CJZ\]`c}  SUVY\'fhil#/#1#2#5#$%w%y%z%%%%%%%%%%%%% &9&:&;&=&K&u&w&x&z&&&&&&&&&&&&&&&''('*'+'-'2'\'^'_'a'g'''''''''''''''(+(-(.(1(3(](_(`(c(e(((((())))F*V*X*Y*\*+++++,,,,------w.........../4/6/7/9/G/}//////////0000,0]0_0`0b0l000000000001 1!1#1)1Z1\1]1`1f1111111111122222g2i2j2m2o2222223333!3r3t3u3x355555`8{8}8~88M:::::<o<q<r<<<<<<<<<= = = ==K=M=N=P=c=s=u=v=x============>>>>>>[>]>^>`>f>>>>>>>>>>>>>>>>>????)?+?,?/?1?S?U?V?Y?[?}?????????BBBBBQC`CbCcCfCE F F FFGGGGGIJJJ)J9J@JbJmJnJpJrJJJJJJJJJJJJJJJJJJJJK!K#K$K&K;KVKXKYK[KgKKKKKKKKKKKKKKKKL L L LL.L/L0L3L8LSLULVLYL[LuLwLxL{L}LLLLLLLLLLLLLLLMMMMMN=N?N@NCNOPPP PQRR RR%R,RNRYRZR\RqRRRRRRSSSSSRSTSUSWSeSSSSSSSSSSS$T&T'T)T2TsTuTvTxTTTTTTTUUUU"UcUeUfUiUoUUUUUUUUVVVHVJVKVNVPVVVVVVVVVV!YbYdYeYhY)[k[m[n[q[^\\\\\\*],]-]9]I]P]r]}]~]]]]]]]]]]]]] ^ ^^^^.^0^1^3^A^W^Y^Z^\^h^~^^^^^^^^^^^^^^^_____4_6_7_:_?_X_Z_[_^_c_y_{_|_________________abbb b0cFcHcIcLcgggggmmmmmnooo@o@*J?oP@UnknownG: Times New Roman5Symbol3& : ArialQNewBaskerville-Roman?5 z Courier New;Wingdings"1hꬦꬦv^8v^8!4dnn2QHX ?_2AAnswers to Chapters 1,2,3,4,5,6,7,8,9 - End of Chapter QuestionsAditya, Dr. H., and Dr. P.jdevineD         Oh+'0 ,< LX x  DAnswers to Chapters 1,2,3,4,5,6,7,8,9 - End of Chapter QuestionsAditya, Dr. H., and Dr. P.Normaljdevine2Microsoft Office Word@F#@ND[+@ND[+v^՜.+,D՜.+,l( hp|  8n BAnswers to Chapters 1,2,3,4,5,6,7,8,9 - End of Chapter Questions TitleHH$< _PID_HLINKS_AdHocReviewCycleID_EmailSubject _AuthorEmail_AuthorEmailDisplayName_ReviewingToolsShownOnceA682T_Toc1520863418,T_Toc1520863408&T_Toc1520863398 T_Toc1520863388T_Toc1520863378T_Toc1520863368T_Toc1520863358T_Toc1520863348T_Toc152086333[AK,CH1-9 End of Chapter questions in one filemhuber9@charter.netMark W. Huber  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./012456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%'()*+,-4Root Entry FZ[+6Data 31Table WordDocument4dSummaryInformation(DocumentSummaryInformation8&CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q