ࡱ> prmno)` Ebbjbj :p{{Z2HHH8Dl:(/111111$h$dUUj//  `pC;H: L<#!,tfkx0<UUMXD2\:@Q3D4\:@Q Enterprise Information Security MET CS 695 Instructor Stuart Jacobs, MSc, CISSP Lecturer, Computer Science Department Metropolitan College Boston University Office hours: One hour prior to class by prior arrangement. Office Address: 808 Commonwealth Ave., Room 250. Boston, MA 02215. E-mail:  HYPERLINK "mailto:sjjacobs@bu.edu" sjjacobs@bu.edu Course Description The goal of this course is to prepare students to perform security related tasks and contribute to organizational security related activities. Formal and technical aspects of information, computer and network security are presented and explained along with examples of real world systems, thereby enabling the student to relate theoretical approaches and both procedural and technical control implementations to meet the security requirements of enterprises. The course provides an in-depth presentation of security issues in computer systems, networks, and applications. The concept of information security governance is presented and discussed. The basic concepts of security services, and the role played by encryption and hash algorithms are discussed along with issues and approaches for key management. Formal security models are explained and illustrated on operating system security aspects, more specifically memory protection, access control and authentication, file system security, backup and recovery management, intrusion and virus protection mechanisms. Application level security focuses on language level security and various security policies; conventional and public keys encryption, authentication, message digest and digital signatures. Internet and intranet topics include security in IP, routers, proxy servers, both packet filtering firewall and application-level gateway firewalls, Web servers, file and mail servers. Discussion of remote access issues, such as dial-up servers, modems, VPN gateways and clients are included. Prerequisites Knowledge of information technology fundamentals (computer hardware, operating systems, applications and networking) is required. Successful completion of CS 625, CS 535, or permission of the instructor is also required. Required Course Book Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance, Stuart Jacobs, IEEE Press Series on Information and Communication Networks Security, Wiley-IEEE Press; 2nd edition, ISBN-13: 978-1119101604 ISBN-10: 1119101603 Courseware This course uses Online Campus (Blackboard). Once the course starts all students must use the Online Campus Dashboard internal messages service. Both sections are expected to use Online campus: for reading assignments beyond text book assigned reading, Submitting homework assignments, Submitting lab exercises, Taking on-line quizzes, Participating in discussion threads, Taking the on-line final examination and practice final exam, and All course related email correspondence. Class Policies Attendance & Absences Students enrolled in section A1 are expected to attend all scheduled on-campus lectures Students enrolled in section EL are required to attend the four scheduled on-campus lectures (1/25, 2/22, 3/21, 4/25 and the final exam on 5/2) but are welcome to attend any other scheduled on-campus lectures in person or via Adobe Connect. Students in either section must notify the instructor in advance if unable to attend any on-campus lecture On-campus lectures will be held in one of the MET CS dept. computer Labs near the dept office in the Fuller Bldg. 808 Commonwealth Ave. 2nd floor Assignment, Lab Exercise and Discussion Completion & Late Work Homework assignments are mandatory, must be completed and submitted in a timely manner, and are required to be submitted via Online Campus for this course. For each day after the submission date a homework assignment is due will result in a penalty of 3 points. Homework assignments passed in that are over 5 days late will receive a grade of zero (0). If a student will be unable to submit an assignment by its due date, the student must contact the instructor in advance to avoid the late submission penalty. Lab exercises: are mandatory, must be completed and submitted in a timely manner, and are required to be submitted via Online Campus for this course. For each day after the submission date a lab exercise is due will result in a penalty of 3 points. Lab exercises passed in that are over 5 days late will receive a grade of zero (0). If a student will be unable to submit a Lab exercise by its due date, the student must contact the instructor in advance to avoid the late submission penalty. Student postings to discussion topic after the listed closing dates will not be counted when calculating a students discussion grades. Academic Conduct Code Cheating and plagiarism will not be tolerated in any Metropolitan College course. Such activities/behavior will result in no credit for the assignment or examination and may lead to disciplinary actions. Please take the time to review the Student Academic Conduct Code:  HYPERLINK "http://www.bu.edu/met/metropolitan_college_people/student/resources/conduct/code.html" http://www.bu.edu/met/metropolitan_college_people/student/resources/conduct/code.html. Such activities/behavior includes copying (even with modifications) of another students work or letting your work to be copied. Your participation in interactions with the instructor and your classmates is encouraged, but the work you submit must be your own. Collaboration is not permitted. Class Meetings, Lectures, Assignments, Study Guide, Lab Exercises & Examinations Class Meetings The on-campus face-to-face class schedule for Spring 2016 MET CS695 A1/EL is: 1/25 (Monday) Class 12/1 (Monday) Class 22/8 (Monday) Class 32/16 (Tuesday)Class 42/22 (Monday)Class 52/29 (Monday)Class 63/14 (Monday)Class 73/21 (Monday)Class 83/28 (Monday)Class 94/4 (Monday)Class 104/11 (Monday)Class 114/20 (Wednesday)Class 124/25 (Monday)Class 135/2 (Monday)Final ExamDates in this color and italic identify sessions where the A1 and EL sections both meet on campus On-line Live sessions There will be a number of one hour on-line sessions, in addition to on-campus meetings identified above, which will be held on the following Thursday evenings: 1/21, 1/28, 2/4, 2/11, 2/18, 2/25, 3/3, 3/17, 3/24, 3/31, 4/7, 4/14, 4/21 and 4/28 at 7:00 PM ET. During these on-line sessions I will be having a question & answer period. Attendance is not required at these sessions but highly recommended. All on-line sessions will be recorded and archived. The archived recordings will be accessible from the Online Campus Dashboard under the heading Live Classroom (Question & Answer) Sessions. Assignments All homework assignments are identified within the Online campus Study Guide. File names for assignment documents should be: CS695-HW-.doc An example assignment document file name is: CS695-HW5-Jacobs.doc Student submissions which fail to follow this direction will have 5 points deducted! Student assignment submissions must be no more than 4 pages in length, be single spaced, use 12 point Times Roman type font and 1 margins on all sides. Student submissions which fail to follow this direction will have points deducted! Include the file name in the header and a page number in the footer of you assignment submission document. Student submissions which fail to follow this direction will have points deducted! Title cover pages are not required and should not be used; Assignment submission documents MUST be in Word 2003 or Word 2007 file formats that are NOT encoded in XML. If you cannot comply with this requirement, then you MUST contact me in advance; Quoted material and citations must follow the American Psychological Association (APA) format with a reference section at the end of a students submitted work. Students are required to comply with the directions contained within the document APA Criteria for Course.pdf whenever the work of others is used as part of a students assignment submission. Failure to do so will result in points being deducted for the assignment grade. Please refer to the  HYPERLINK "http://www.apastyle.org/" http://www.apastyle.org/ web site for guidance on following the APA style guide. Wikipedia is a useful starting point for finding information about a subject BUT NOT an acceptable direct reference source. One should only reference or quote from primary (source) documents. Study Guide Module 1 Study Guide and DeliverablesReadingsEngineering Information Security: Chapters 1 and 2. Systems Engineering Fundamentals, Defense Acquisition University Press, 2001, chapters 1 through 13 (SEFGuide 01-01.pdf). Students are not expected to read this document in detail, but are expected to become familiar with what the document covers so they become aware of the documents value and possible applicability in their professional activities.DiscussionsPlease complete the Introduction Discussion before you continue in the course. Discussion 1 postings due 2/8 at 6:00 AM (0600 hours) ETAssignmentsAssignment 1 is due 2/8 at 6:00 AM (0600 hours) ETAssessmentsQuiz 1 is due 2/8 at 6:00 AM (0600 hours) ETLab exercisesThere is no Lab Exercise for this moduleModule 2 Study Guide and DeliverablesReadingsEngineering Information Security: Chapters 3 and 4. Security Architecture for Open Systems Interconnection for CCITT Applications (ITU-T Recommendation X0800-91.pdf). Students are not expected to read this document in detail, but are expected to become familiar with what the document covers so they become aware of the document's value and possible applicability in their professional activities.DiscussionsDiscussion 2 postings due 2/29 at 6:00 AM (0600 hours) ETAssignmentsAssignment 2 due 2/29 at 6:00 AM (0600 hours) ETAssessmentsQuiz 2 due 2/29 at 6:00 AM (0600 hours) ETLab exercisesLab Exercise 1 - Lab 2 Windows Web Browser Security and Configuration due 2/29 at 6:00 AM (0600 hours) ETModule 3 Study Guide and DeliverablesReadingsEngineering Information Security: Chapters 5 and 6. DoD Trusted Computer System Valuation Criteria, sections 1.0 through 8.0 (DoD 5200-STD.pdf). Proposed NIST Standard for Role-Based Access Control, sections 1 through 6 (NIST Standard rbacSTD-ACM.pdf) Students are not expected to read these two documents in detail, but are expected to become aware of the documents value and possible applicability in their professional activities.DiscussionsDiscussion 3 postings due 3/14 at 6:00 AM (0600 hours) ETAssignmentsAssignment 3 due 3/14 at 6:00 AM (0600 hours) ETAssessmentsQuiz 3 due 3/14 at 6:00 AM (0600 hours) ETLab exercisesLab exercise 2 Lab 3 Windows Access Controls due 3/14 at 6:00 AM (0600 hours) ETModule 4 Study Guide and DeliverablesReadingsEngineering Information Security: Chapters 7 and 8.DiscussionsDiscussion 4 postings due 3/28 at 6:00 AM (0600 hours) ETAssignmentsAssignment 4 due 3/28 at 6:00 AM (0600 hours) ETAssessmentsQuiz 4 due 3/28 at 6:00 AM (0600 hours) ETLab exercisesLab exercise 3 Lab 4 Scanning and Enumeration using Windows due 3/28 at 6:00 AM (0600 hours) ETModule 5 Study Guide and DeliverablesReadingsEngineering Information Security: Chapters 9 and 10.DiscussionsDiscussion 5 postings due 4/11 at 6:00 AM (0600 hours) ETAssignmentsAssignment 5 due 4/11 at 6:00 AM (0600 hours) ETAssessmentsQuiz 5 due 4/11 at 6:00 AM (0600 hours) ETLab exercisesLab exercise 4 - Lab 5 Windows Network Traffic Analysis due 4/11 at 6:00 AM (0600 hours) ETModule 6 Study Guide and DeliverablesReadingsEngineering Information Security: Chapters 11 and 12.DiscussionsDiscussion 6 postings due 5/2 at 6:00 AM (0600 hours) ETAssignmentsAssignment 6 due 5/2 at 6:00 AM (0600 hours) ETAssessmentsQuiz 6 due 5/2 at 6:00 AM (0600 hours) ET Lab Exercises Lab exercises are identified within the Assignment description document for each course module. File names for lab exercise documents should be: CS695-LAB-.doc An example lab exercise document file name is: CS695-LAB4-Jacobs.doc Student submissions which fail to follow this direction will have 5 points deducted! Students should enter their lab exercise answers direct within each lab exercise document and then submit the completed document appropriately renamed as stated above; Lab exercise submission documents MUST be in Word 2003 or Word 2007 file formats that are NOT encoded in XML. Student Submission Due Dates CS695 Student Submission dates are as follows: Available DateSubmission DateLast Allowed Late Submission dateAssignment 11/192/82/13Assignment 21/192/293/5Assignment 31/193/143/19Assignment 41/193/284/2Assignment 51/194/114/15Assignment 61/195/2Late not allowedQuiz 11/192/8Late not allowedQuiz 21/192/29Late not allowedQuiz 31/193/14Late not allowedQuiz 41/193/28Late not allowedQuiz 51/194/11Late not allowedQuiz 61/195/2Late not allowedDiscussion 11/192/8Late not allowedDiscussion 21/192/29Late not allowedDiscussion 31/193/14Late not allowedDiscussion 41/193/28Late not allowedDiscussion 51/194/11Late not allowedDiscussion 61/195/2Late not allowedLab Exercise 11/192/82/13Lab Exercise 21/192/293/5Lab Exercise 31/193/143/19Lab Exercise 41/193/284/2Lab Exercise 51/194/114/15All submission deadlines are at 6:00 AM ET on the date due Discussion Threads Each course module includes a discussion topic that students are required to participate in. Student discussion postings will be graded as per the Discussion Grading Rubric under the Online Campus Syllabus and Course Information area. Examinations Students are required to take six on-line quizzes (one per module) while the course is running. Students will be allowed 60 minutes to complete each quiz. A student may take each of these quizzes starting when a quiz becomes available via Online Campus. Each quiz will close at 6 AM ET on the date the next Module starts and not be reopened except for unusual circumstances as decided by the instructor. If a student cannot complete a quiz during the week each quiz is available, the student must make prior arrangements with the instructor. On-campus and EL students are required to take a proctored final exam that will be held in class on Monday 5/2/2016 and last 3 hours. This exam is open book and open notes. If the final will be missed it will be the responsibility of the student to arrange with the professor a mutually agreeable schedule for completion of work. A practice final exam will be available on Online Campus which can be taken as many times as a student wishes. If any work is to be completed beyond the scheduled dates of this course the student must negotiate a Boston University "Contract for an Incomplete Grade" with the professor prior to the end of the class. Grading Criteria Students will have to do homework assignments to help you master the material. You will also have to read the textbooks and to be ready to discuss the issues related to the current class topics. Grades will be based on: home work assignments (25%) quizzes (25%) lab exercises (10%) discussion thread participation (10%) proctored final exam (30%) Grade ranges are as follows: 94 <= is an A 90 <= and < 94 is an A- 87 <= and < 90 is a B+ 84 <= and < 87 is a B 80 <= and < 84 is a B- 77 <= and < 80 is a C+ 74 <= and < 77 is a C 70 <= and < 74 is a C- 60 <= and < 70 is an F Course Learning Objectives Upon successful completion of this course students will be able to: Describe and correctly use the terminology and concepts associated with information security. Understand and be able to discuss the general concepts of information security governance. Understand and be able to discuss the importance of balancing the use of security policies, processes, technology and operations vs. costs to minimize organizational security risks. Develop detailed security requirements based on business needs, threat profiles, security policy obligations and asset vulnerabilities and exposure. Identify what type of protection different security services provide and which technical controls (e.g., symmetric/asymmetric encryption, cryptographically secure hash algorithms, key management approaches) are necessary to provide needed security services. Perform risk management activities, such as: asset assessments, determine probable threats and risks that drive solution architectural alternatives, trade-off studies, modeling and design issues. Describe and discuss security issues within general operating systems, specific commercial operating systems and application software Discuss the considerations when selecting appropriate anti-malware technologies. Describe and discuss security issues within common used network protocols and the approaches for mitigating communications associated threats. Prepare service/product security architectures and designs that sufficiently comply with enterprise security requirements thereby reducing risks to acceptable cost levels. Plan operational security procedures, ensure that operations security activities comply with policy, along with conducting periodic security reviews and audits. Support product and service development, integration and procurement activities ensuring that selected components, when deployed, will comply with the organizations detailed security requirements. Course Outline Module 1 Lecture 1 Branches of security, Defining security by function, The Common Body of Knowledge (CBK) Security Domains, An example of security failures, Why every employee has a role in achieving information security, Introduction to security related terminology. Lecture 2 - What is Systems Engineering: Stating the Problem, Investigate Alternatives and Model the System, Integrate, Launch the system, Assess performance, Re-evaluate, Process Variations. Process Management: ISO 9000 Processes and Procedures, Capability Maturity Model (CMM). Organization Environments: Regulations/Legislation, Technology Evolution, Customers demands and expectations, Legal Liability, Competition, Terrorism or Cyber crime. Business/Organizational Types: Commercial enterprises, Residential, Governmental, Non-Governmental Organizations (NGOs), National Critical Infrastructure Module 2 Lecture 3 Role of Cryptography in Information Security, Application of Services, Human Authentication and the concept of Factors, Cryptography, Cryptanalysis and Key Management. Lecture 4 - Cryptographic Authentication, Authentication Systems: Kerberos Based Authentication, Public Key Infrastructures and human authentication. Module 3 Lecture 5 - Security policy development, security process management (governance) and associated standards, Security Policies, Risk management spanning assets, attack analysis and risk mitigation, Security requirements analysis and decomposition. Access control concepts, Security modeling and security related standards. Lecture 6 Traditional networking architectures, Types of networks (LANs, MANs, WANs), Network protocols, Data Link Layer complexity, The Insecurity of ARP, IP and the network Layer, Transport Protocols and protocol vulnerabilities and protocol internal security mechanisms Module 4 Lecture 7 Next generation networking concepts and related security mechanisms. Lecture 8 - Generic security Related Hardware: Processor States and Status, Memory Addressing, Registers and Architectures, Interruption of Processor Activity, Operating Systems (OSs), The Security Kernel and Rings of protection, Memory and Address Protection, Fences, Relocation, Base/Bound Registers, Segmentation, Paging Module 5 Lecture 9 Unix Type OS Security Capabilities. Solaris Security Capabilities and RBOC, Real-Time OS Security Capabilities, Microsoft Windows Security Capabilities. Applications software development security, malicious software (malware) and countermeasures. Lecture 10 - Layer 2 Network Security mechanisms (802.1q, 802.1x, 802.1i), Layer 3 Network Security mechanisms (IPsec, Firewalls, Intrusion Protection). Module 6 Lecture 11 - Layer 4 Network Security mechanisms (TLS, SSL, DTLS, SSH), Application Layer Network Security mechanisms (Email, XML, SAML/IdM, VoIP & SBCs), Application Framework Security mechanisms (CORBA, DCE, Java.NET). Lecture 12 - Security of Network Services (DNS, NTP, Active Directory), Penetration Testing, Network and Security management. NGOSS and eTOM. Lecture 13 Operational Security Compliance. Systems implementation, procurement and decommissioning. Non-required textbooks and references good for further study The following books are not required for this course. However you will find each to be valuable resources to anyone involved in the Information Security area. The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2nd edition, R.L. Krutz, and R. D. Vines, Wiley, 2004. ISBN: 0471413569 This book is very useful should you decide to sit for the CISSP examination to prepare you for the style and level of detail of questions in the six hour exam. Firewalls and Internet Security, Repelling the Wily Hacker, William R. Cheswick, and Steven M. Bellovin, Addison-Wesley, 1994 This book is a classic for its very detailed treatment for statefull firewalls and DMZs and is still relevant today. Practical UNIX & Internet Security, 2nd Edition, ,Simson Garfinkel and Gene Spafford: O'Reilly, 1996 This book is a classic for its very detailed treatment of general networking security and hardening of unix typs operating systems and is still relevant today. Hacking Expose Network Security Secrets & Solutions, 2nd Edition, Joel Scambray, Stuart McClure, and George Kurtz, McGraw-Hill, 2001 This book provides an interesting look into those involved in malware and some of the techniques used for breaching targeted systems. Security Engineering; A Guide to Building Dependable Distributed Systems, Ross Anderson, Wiley, 2001 This book is an interesting collection of discussions on security engineering and associated challenges. Computer Related Risks, Peter G. Neumann, Addison-Wesley, 1995 This book is one of the definitive texts on the basic concepts of what constitutes risks, especially information security risks. Applied Cryptography, Bruce Schneier, 2nd Edition, Wiley & Sons, 1996 This book is an excellent source for details on most any encryption algorithm you are likely to encounter. Most any version, starting with the 2nd edition, will be invaluable. Computer Security, Dieter Gollmann, 2nd ed, John Wiley, 2006 This book provides depth coverage of computer security and is highly recommended. Network Security -- Private Communication in a Public World, Charlie Kaufman, Radia Perlman and Mike Speciner, 2nd Edition, Prentice-Hall, 2002, ISBN 0-13-046019-2 This book provides depth coverage of network security and is highly recommended.     Page  PAGE 7 of  NUMPAGES 10  +6OP  # $ % I ůthtU@U/U jhB*OJQJUph(hh5B*OJQJmHphsH%hhB*OJQJmHphsHhg_B*OJQJph hKh5B*OJQJphhKhB*OJQJphhB*OJQJphh 0hB*OJQJph+h#h5>*B*CJOJQJaJph#h#h5B* CJ\aJph+$'h#hodK5B* CJ\^JaJph+$'h#h$5B* CJ\^JaJph+$ +6 \ o : ~i~ <<^gd {<<gd { <<^gd { #<<^#gd {<<gd { <<^gd { #<<^#gd {n<<^`ngd { $PPa$gd { $PPa$gd {bDbI J K Z [ \ o { }   + 4 @ H M T V b d e o  - 8 شzzpzzzzzzzzzzzzzzzhlAB*^Jphhs)B*^JphhXPhs)B*^JphhXPhodKB*^Jph*h hodK5>*B*CJ\^JaJph%hhB*OJQJmHphsH hh0JOJQJmHsH jhB*OJQJUph,jh`hB*OJQJUph, o|~ i~Ydeno} ,._ü|xxxq h?~h?~hwh hhh h!BB0J h!BB0Jh!BBh!BB>*h!BB h!BB5\h#h5>*CJaJhlA hwhwh#hw5>*CJaJhN'B*^JphhXPhs)B*^Jphhs)B*^JphhXPhodKB*^Jph*_:V & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd { <<^gd { $<<gd {QV & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {TQV & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {T}QM & F<<Eƀڢ<)gd {<<gd {V & F <<Eƀڢ<^gd {_}XbcdhjnosV`h'%r$%&{|~ٰٺ٬ٰٺꙤ꺉 hDh6 hsHhw0JjhwUjhwUh Bhc"hc"5>*h hl\h?~h?~H* h?~h?~h8h|vhc"h*2I h!BB5hhwh#hw5>*CJaJh?~5QV & F T<<Eƀڢ<^gd {V & F T<<Eƀڢ<^gd {VQV & F T<<Eƀڢ<^gd {V & F T<<Eƀڢ<^gd {'&ZV & F <<Eƀڢ<^gd {M & F<<Eƀڢ<)gd {&QV & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {~Q7V & F <<Eƀڢ<^gd { <<^gd {<<gd { <<^gd {M & F<<Eƀڢ<)gd {pq1<=GIMQUW]`hilÿyj^h!BBB*OJQJphhL$h&B*OJQJph hL$h6B*OJQJph hL$h&6B*OJQJphh!BB6B*OJQJphh h/$h8h8 h/$h&h&hh&5>*he5>*CJaJh&5>*CJaJh#h&5>*CJaJhw hDh6 h6 #Q`hiw{xkd$$Ifl 0 064 la<ytzj> $$Ifa$gd {lnt}~ɺպɫՋraRFRhL$B*OJQJphhhL$B*OJQJph hIhI6B*OJQJphh!BB6B*OJQJphh{D~hIOJQJhhIB*OJQJph hF~h!BB>*B*OJQJphhhIB*OJQJphhIhL$B*OJQJphh!BBB*OJQJphhIB*OJQJphhIh!BBB*OJQJphhh&B*OJQJph{{ $$Ifa$gd {xkd$$Ifl 0 064 la<ytzj>{{ $$Ifa$gd {xkdh$$Ifl 0 064 la<ytzj>{{ $$Ifa$gd {xkd<$$Ifl 0 064 la<yt:e{{ $$Ifa$gd {xkd$$Ifl 0 064 la<yt:e   "%9ټ|m\MhIhL$B*OJQJph hIhL$6B*OJQJphhIh!BBB*OJQJph h!BBhL$6B*OJQJphh!BBhL$B*OJQJphh!BBh!BBB*OJQJph h8hL$6B*OJQJph h8h!BB6B*OJQJphh!BBB*OJQJphh{D~hL$OJQJhL$B*OJQJphhhL$B*OJQJph{{ $$Ifa$gd {xkd$$Ifl 0 064 la<ytzj> {{ $$Ifa$gd {xkd$$Ifl 0 064 la<ytzj>  !{{ $$Ifa$gd {xkd$$Ifl 0 064 la<ytzj>!"/8{{ $$Ifa$gd {xkd` $$Ifl 0 064 la<ytzj>89GP{{ $$Ifa$gd {xkd4 $$Ifl 0 064 la<ytzj>PQbk{{ $$Ifa$gd {xkd $$Ifl 0 064 la<yt79QW`lp±±peVJ9VJ hyCh&6B*OJQJphh!BBB*OJQJphhyCh&B*OJQJphh{D~hL$OJQJ h*2IhL$6B*OJQJphhL$6B*OJQJph hhL$6B*OJQJph hIh!BB6B*OJQJph hIhL$6B*OJQJphh!BB6B*OJQJph hF~h!BB>*B*OJQJphh!BBh!BBB*OJQJphhF~h!BBB*OJQJphklz{{ $$Ifa$gd {xkd $$Ifl 0 064 la<yt7{{ $$Ifa$gd {xkd $$Ifl 0 064 la<ytzj> vi <<^gd { X <<<^<gd {xkd $$Ifl 0 064 la<ytzj>  !!!!! !"!J!Q!!!!!S"T"p"s""S#V#k##$$Y$$$$%X%Y%i%&`&''V'W'ŽɵɽɱɦɞəɞɞɐɌh/ hL#\h/hL#\h8 h*2I>* h&5h&h&>*h { h= h= h= h|vhehF~hhlAh&hh&5>*hh15>*hyCh&B*OJQJphhyCh!BBB*OJQJph1 s"""MM & F<<Eƀڢ<gd { <<^gd {V & F <<Eƀڢ<^gd {""&#k##$VM & F<<Eƀڢ<gd { <<^gd {M & F<<Eƀڢ<gd {$j%%cM & F<<Eƀڢ<gd {M & F<<Eƀڢ<gd {%b&(cM & F<<Eƀڢ<gd {M & F<<Eƀڢ<gd {W'r's''(()(*(6(N(P(Q(R(j(k((() )d)p)q))))))))O*P****7+Թܲ஧~r~r~f~r~rW~hhF~CJOJQJaJhiCJOJQJaJhF~CJOJQJaJhhCJOJQJaJ"hhe5CJOJQJ\aJhA9he< he5>*h& hXPh/h`hL#\0JjXhL#\U hvhL#\jhL#\UhL#\hlAh/ h/h/ h/5>*h/h/5>*"(d)p)q))$@&Ifgd {l"$hPP^hgd {$PP^gd {M & F<<Eƀڢ<gd {))))8+eeP$If^`Pgd {l"$Ifgd {l"lkdI$$Ifl4D%t"$ t0t"44 la<f4yt 8+9+E+++mRRP$If^`Pgd {l"$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt 7+9+E+++++++,,(,+,H,V,,,,,,,,,U-W----<.=.K.e.i.......... ////ǺǺǭǺǺNjwhdCJOJQJaJhiOJQJ"hh5CJOJQJ\aJhhF~CJOJQJ\aJhiCJOJQJ\aJhF~CJOJQJ\aJhhCJOJQJ\aJhF~OJQJ"hhe5CJOJQJ\aJhheCJOJQJaJ-+++ ,mm$Ifgd {l"kdQ$$Ifl40D%z t0t"44 la<f4yt  ,,,G,mm$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt G,H,V,,mm$Ifgd {l"kdo$$Ifl40D%z t0t"44 la<f4yt ,,,l$@&Ifgd {l"kd$$Ifl40D%$z$ t0t"44 la<f4yt ,,,,>.eeP$If^`Pgd {l"$Ifgd {l"lkd$$Ifl4D%t"$ t0t"44 la<f4yt >.?.K..mm$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt ....mm$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt ....mm$Ifgd {l"kd2$$Ifl40D%z t0t"44 la<f4yt .. /t/mm$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt ///O/Q/T/X/u////////4050000V1W1e111111111112$2ƾƬmƾƬƾƬƾW*hhe5CJOJQJ\aJmH sH "hh5CJOJQJ\aJhhiCJOJQJ\aJhiCJOJQJ\aJhhCJOJQJ\aJ"hhe5CJOJQJ\aJhiOJQJhheCJOJQJaJhheCJOJQJ\aJhdCJOJQJaJhdhdCJOJQJaJ"t/u//l$@&Ifgd {l"kdP$$Ifl40D%$z$ t0t"44 la<f4yt ////60X1eeeP$If^`Pgd {l"$Ifgd {l"lkd$$Ifl4D%t"$ t0t"44 la<f4yt X1Y1e11mm$Ifgd {l"kdf$$Ifl40D%z t0t"44 la<f4yt 1111mm$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt 1112mm$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt 22$2w2mm$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt $2325282:2C2R2W2[2x2222222222233$303A3E3b3n3y3}33333333333 4;4񼭡t"h h {5CJOJQJ\aJh=3CJOJQJaJh heCJOJQJaJhiCJOJQJaJh h CJOJQJaJ"hhe5CJOJQJ\aJhiOJQJhdhdCJOJQJaJhdCJOJQJaJhheCJOJQJaJ)w2x22l$@&Ifgd {l"kd$$Ifl40D%$z$ t0t"44 la<f4yt 2222$Ifgd {l"lkd?$$Ifl4D%t"$ t0t"44 la<f4yt 222#3mm$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt #3$303a3mm$Ifgd {l"kdG$$Ifl40D%z t0t"44 la<f4yt a3b3n33mm$Ifgd {l"kd$$Ifl40D%z t0t"44 la<f4yt 333 4mm$Ifgd {l"kde$$Ifl40D%z t0t"44 la<f4yt  4 414j$$@&Ifgd7l6kd$$Ifl40D%$z$ t0t"44 la<f4yt 1424;4p4$Ifgd7l6lkd$$Ifl4D%t"$ t0t"44 la<f4yt7;4d4e4h4k4n4o4q4}444444445 55.5<5M5s5x5|5555555556 6&6)6F6R6c6f66666666777!889T9U9񼲮hh}5>* h5>*h&h&>*hih&hh&5>*hhlACJOJQJaJh {OJQJ"h h {5CJOJQJ\aJh {CJOJQJaJh h {CJOJQJaJ6p4q4}44mm$Ifgd7l6kd$$Ifl40D%z t0t"44 la<f4yt74444mm$Ifgd7l6kdo$$Ifl40D%z t0t"44 la<f4yt7445-5mm$Ifgd7l6kd$$Ifl40D%z t0t"44 la<f4yt7-5.5<55mm$Ifgd7l6kdU$$Ifl40D%z t0t"44 la<f4yt7555l$@&Ifgd7l6kd$$Ifl40D%$z$ t0t"44 la<f4yt75555$Ifgd7l6lkdI$$Ifl4D%t"$ t0t"44 la<f4yt756 6E6pp$Ifgd7l6|kd$$Ifl0D%z t0t"44 la<yt7E6F6R66pp$Ifgd7l6|kd $$Ifl0D%z t0t"44 la<yt76666pp$Ifgd7l6|kd $$Ifl0D%z t0t"44 la<yt76666i\ <<^gd { 6 <PP^<gd {l"|kd $$Ifl0D%z t0t"44 la<yt76)7Z7777"8cVVVV <<^gd {M & F<<Eƀڢ<gd {M & F<<Eƀڢ<gd {"8889U9cV <<^gd {M & F<<Eƀڢ<gd {M & F<<Eƀڢ<gd {U9s99999999999999999999999999999 : :::::::&:):-:.:渪yyqyyyyiyyyyhqOJQJhiOJQJh}hiOJQJmH sH h}hiOJQJhiOJQJmH sH hihiOJQJhih}5>*OJQJhih}OJQJhK OJQJmH sH hqOJQJmH sH h}h}OJQJh}h}OJQJmH sH h} h}h})U999999{{{$$Ifa$gd {l%$If^gd {l%V & F <<Eƀڢ<^gd {999999[H222$$Ifa$gd {l%$Ifgd {l%kdP!$$Ifl\ F t0644 la<yt}999999[H222$$Ifa$gd {l%$Ifgd {l%kd!$$Ifl\ F t0644 la<yt}99 ::::[H222$$Ifa$gd {l%$Ifgd {l%kd|"$$Ifl\ F t0644 la<yt}::):.:3:7:[H222$$Ifa$gd {l%$Ifgd {l%kd#$$Ifl\ F t0644 la<yt}.:2:3:6:8:B:E:I:J:N:O:S:U:_:b:f:g:j:::::::::::::::::;;;;2;6;7;:;Z;^;_;b;t;u;;;;;;;;;;;;;;;;;;;;<<<<<&<*<+<.<hiOJQJhiOJQJmH sH h}hiOJQJhqOJQJmH sH h}hiOJQJmH sH hqOJQJK7:8:E:J:O:T:[H222$$Ifa$gd {l%$Ifgd {l%kd#$$Ifl\ F t0644 la<yt}T:U:b:g:k:|:[H222$$Ifa$gd {l%$Ifgd {l%kd>$$$Ifl\ F t0644 la<yt}|:}:::::[H222$$Ifa$gd {l%$Ifgd {l%kd$$$Ifl\ F t0644 la<yt}::::::[H222$$Ifa$gd {l%$Ifgd {l%kdj%$$Ifl\ F t0644 la<yt}::::::[H222$$Ifa$gd {l%$Ifgd {l%kd&$$Ifl\ F t0644 la<yt}:::::;[H222$$Ifa$gd {l%$Ifgd {l%kd&$$Ifl\ F t0644 la<yt};;;;;*;[H222$$Ifa$gd {l%$Ifgd {l%kd,'$$Ifl\ F t0644 la<yt}*;+;2;7;;;L;[H222$$Ifa$gd {l%$Ifgd {l%kd'$$Ifl\ F t0644 la<yt}L;M;Z;_;c;t;[H222$$Ifa$gd {l%$Ifgd {l%kdX($$Ifl\ F t0644 la<yt}t;u;;;;;[H222$$Ifa$gd {l%$Ifgd {l%kd($$Ifl\ F t0644 la<yt};;;;;;[H222$$Ifa$gd {l%$Ifgd {l%kd)$$Ifl\ F t0644 la<yt};;;;;;[H222$$Ifa$gd {l%$Ifgd {l%kd*$$Ifl\ F t0644 la<yt};;;<<<[H222$$Ifa$gd {l%$Ifgd {l%kd*$$Ifl\ F t0644 la<yt}<<&<+</<@<[H222$$Ifa$gd {l%$Ifgd {l%kdF+$$Ifl\ F t0644 la<yt}@<A<P<U<Y<^<[H222$$Ifa$gd {l%$Ifgd {l%kd+$$Ifl\ F t0644 la<yt}.<A<M<P<T<U<X<Y<]<_<k<n<r<s<w<x<{<}<<<<<<<<<<<<<<<<<<<<<<<<<<==='===>$>B> ?׶ h~:h&hlAh&hh&5>*hK h}5B*phhF!5B*phhK hK 5B*phhqOJQJhqOJQJmH sH h}hqOJQJmH sH h}hqOJQJh}hiOJQJmH sH 4^<_<n<s<x<|<[H222$$Ifa$gd {l%$Ifgd {l%kdr,$$Ifl\ F t0644 la<yt}|<}<<<<<[H222$$Ifa$gd {l%$Ifgd {l%kd-$$Ifl\ F t0644 la<yt}<<<<<<[H222$$Ifa$gd {l%$Ifgd {l%kd-$$Ifl\ F t0644 la<yt}<<<<<<[H222$$Ifa$gd {l%$Ifgd {l%kd4.$$Ifl\ F t0644 la<yt}<<='=[NA <<^gd { PP^gd {kd.$$Ifl\ F t0644 la<yt}'=>$>B@DV & F <<Eƀڢ<^gd { <<^gd {V & F <<Eƀڢ<^gd { ?!?T@@@@@@@@@@@AABBBBBCCCCCCCCCCCDDDDD/D0D1D4DTD^DbDdDeDvDzD|D}DDDDDDDDDDhc" hhc"hw hhw hXPhw hXPh~:h~:h#hw5>*CJaJ hXPh& h~:hqh*2Ihq5h*2Ih&5 hq5 h~:hhh& h~:h&9B@@AQV & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {AABBCCQG:: <<^gd { $<<gdw+V & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {CCCQV & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {CCDQV & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {D4DQD_DCV & F <<Eƀڢ<^gd {$<<^gd {V & F <<Eƀڢ<^gd {_DwDDQV & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {DDDQV & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {DDDDDDDDDDDDDEEEEE1E[EcEdEuEE,F.FPFFFFFFFFFGGjGoGxGyGGGYHaHzH{HHH>I?IIIJJBJIJgJhJJJ'K,K0K}Kڿ hXPhs)hodK hXPhN'hN' hXPhodKhs)hXPhs)B*^Jphhs)B*^JphhXPhodKB*^Jphh#h#5>*CJaJhw hXPhw@DDDQV & F <<Eƀڢ<^gd {V & F <<Eƀڢ<^gd {DDE1EuEQH?<<gd {<<gd {V & F <<Eƀڢ< ^gd {V & F <<Eƀڢ<^gd {uEE.FcM & F <<Eƀڢ<gd {M & F <<Eƀڢ<gd {.FFyGcM & F <<Eƀڢ<gd {M & F <<Eƀڢ<gd {yG{H?IcM & F <<Eƀڢ<gd {M & F <<Eƀڢ<gd {?IIJcM & F <<Eƀڢ<gd {M & F <<Eƀڢ<gd {JJQKcM & F <<Eƀڢ< gd {M & F <<Eƀڢ< gd {}KKLLLLLLLLLLLLL MBMDMMMM,P5P?P@PAPOPPPPPPPPPPPPPdQQQQQQQQQQQQQQRRRǹչDzDzDz񲧲՝ççh hW)5\ hW)5\hXPhW)5\hW) hR5\ hXPhRhXPhR5\hMhRhXPhodK5\ hc 5\h#h#5>*CJaJ hXPhN'hN' hXPhodKhs)7QKKLLLM,P5PPcZZMMZM h<<^hgd {<<gd {M & F <<Eƀڢ< gd {M & F <<Eƀڢ< gd {PQQRSS8T|UUV!W*WXXX9YY[[\ ^^_`&<<^&`gd { $<<gd {<<gd { h<<^hgd {RRSS S!S6SiSSSSSSSSSSST7T8T@TATDTMTTTTTU|UUUUUUUUUUUUUUV(V*V7V8V?VVVVVVVVW!W*WɸɩឿhwGh h.ohW)hN' hXPh<:hW)h.o\ h<:5\hXPh<:5\hXPh.o5\ hc 5\ h.o5\h<:h h<:\ h<:\ h.o\h.oh.o\;*W2W4W7WWWWWXXXXXXXXXXXXXXXXX9YQYTYmYoYYYZFZfZhZvoh^hZh7hXPhodK5\ hXPhodK hlA6]hSrhodK5;]hXPhodK6]hl\hl\5>*CJaJ hXPhS_> h<:\ hS_>\hChC\ hC5\ h5\hXPh5\ he5\hXPhe5\hehN'hh<:hwG h<:5\hXPh<:5\#hZjZ[[%[d[[[[[[\>\^\`\b\\\1]c]]]]^ ^Q^n^p^r^^^^^__________F`H````````aWaYaaaaaگ h;HhChChChC5 h/$6]hXPh/$6] h,h/$h/$h/$h/$5 hodK6] hlA6]h7hXPhodK5\ hXPhodKhXPhodK6] hC6]:`abbbbbbbbbbBbCbDbEbPPgd { & F&<<^&`gd {aaaabbbbbbbbbbb$b%b+b,b-b.b2b3b=b>b@bAbBbCbDbEbŴŔh[h[0JOJQJmHnHuh 0h[0JOJQJ!jh 0h[0JOJQJUh 0h[OJQJh7jh7UhodKCJaJhC hPT6] hC6]hXPhC6]8 00P:pw/ =!"#$% DyK sjjacobs@bu.eduyK Fmailto:sjjacobs@bu.eduyX;H,]ą'cDyK Vhttp://www.bu.edu/met/metropolitan_college_people/student/resources/conduct/code.htmlyK http://www.bu.edu/met/metropolitan_college_people/student/resources/conduct/code.htmlyX;H,]ą'c$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>$$If<!vh55?#v#v?:V l 065/ / / / 4a<yt:e$$If<!vh55?#v#v?:V l 065/ / / / 4a<yt:e$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>$$If<!vh55?#v#v?:V l 065/ / / / 4a<yt7$$If<!vh55?#v#v?:V l 065/ / / / 4a<yt7$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>$$If<!vh55?#v#v?:V l 065/ / / / 4a<ytzj>DyK http://www.apastyle.org/yK Jhttp://www.apastyle.org/yX;H,]ą'cw$$If<!vh5t"#vt":Vl4 tt",5t"/ $/  a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / $/ a<f4yt w$$If<!vh5t"#vt":Vl4 tt",5t"/ $/  a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / $/ a<f4yt w$$If<!vh5t"#vt":Vl4 tt",5t"/ $/  a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / $/ a<f4yt w$$If<!vh5t"#vt":Vl4 tt",5t"/ $/  a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / a<f4yt $$If<!vh55z#v#vz:Vl4 tt",55z/ / $/ a<f4yt i$$If<!vh5t"#vt":Vl4 tt",5t"/ $a<f4yt7q$$If<!vh55z#v#vz:Vl4 tt",55za<f4yt7q$$If<!vh55z#v#vz:Vl4 tt",55za<f4yt7q$$If<!vh55z#v#vz:Vl4 tt",55za<f4yt7q$$If<!vh55z#v#vz:Vl4 tt",55za<f4yt7$$If<!vh55z#v#vz:Vl4 tt",55z/ $a<f4yt7i$$If<!vh5t"#vt":Vl4 tt",5t"/ $a<f4yt7e$$If<!vh55z#v#vz:Vl tt"55za<yt7e$$If<!vh55z#v#vz:Vl tt"55za<yt7e$$If<!vh55z#v#vz:Vl tt"55za<yt7e$$If<!vh55z#v#vz:Vl tt"55za<yt7$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}$$If<!vh55F55#v#vF#v#v:Vl t655F55a<yt}T@T Normal1$7$8$H$ CJOJQJ_HaJmH sH tH @@@  Heading 1@& B*^JphH@H  Heading 2 dd@& B*^JphH@H  Heading 3 dd@& B*^JphDA@D Default Paragraph FontRi@R  Table Normal4 l4a (k@(No List \O\ XPDefault1$7$8$H$%B*CJ^J_HaJmH phsH tH J^@J  Normal (Web) dd B*^Jph:O: body dd B*^JphZO"Z /$Body 2Text Indent & F1$7$8$H$OJQJ4@24  0Header  !4 @B4  0Footer  !.)@Q.  0 Page Number6U@a6 v Hyperlink >*B*phHrH |v Balloon TextCJOJQJ^JaJn@n } Table Grid7:V0PJ`o` !BB$a-size-base a-color-base a-text-boldHoH !BBa-size-base a-color-baseEZp +6\o:~i~ _  T } V '&~Q`hiw  !"/89GPQbklzs&kjb d!p!q!!!!!8#9#E##### $$$G$H$V$$$$$$$>&?&K&&&&&&&&& 't'u'''''6(X)Y)e)))))))**$*w*x*******#+$+0+a+b+n++++ , ,1,;,p,},,,,---<----- .E.R.....)/Z////"0081U11111111111111111 22222)2.2327282E2J2O2T2U2b2g2k2|2}222222222222222222233333*3+32373;3L3M3Z3_3c3t3u333333333333333334444&4+4/4@4A4P4U4Y4^4_4n4s4x4|4}44444444444444445'56$6B8899::;;;;;<4<Q<_<w<<<<<<<=1=u==.>>y?{@?AABBQCCDDDE,H5HHIIJKK8L|MMN!O*OPPP9QQSST VVWXYZZZZZZBZCZFZ 000000000]0]0]0]0]0]0]0] 0] 0] 0] 0] 0] 0] 0]0] 0] 0l ] 0l ] 0l ] 0l ] 0] 0] 0] 0] 0]0000 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 @0 @0 @0 @0 @0 @0 0 0 0 0 0 0 00 00 0 0000 0 0 0 0 0 0000 0 0 00 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 0 0 00000 0 00 00 0 0 0 0 0 0 0 0 0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 00 00 0 0 0 0 0000 0 0 0 0 00 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 00000000000000000000000000000000@0@0@0@0@0@0 00 +6\o:~i~ _  T } V '&~Q`hiw  !"/89GPQbklzs&kjb d!p!q!!!!!8#9#E##### $$$G$H$V$$$$$$$>&?&K&&&&&&&&& 't'u'''''6(X)Y)e)))))))**$*w*x******#+$+a+b+++ , ,1,p,,,-----E...1111FZ 000000000]0]0]0]0]0]0]0] 0] 0] 0] 0] 0] 0] 0]0] 0] 0l ] 0l ] 0l ] 0l ] 0] 0] 0] 0] 0]ʑ00ʑ00ʑ00ʑ00ʑ00ʑ00 ʑ00 %00 ʑ00 %000 ʑ00 ʑ00 %00 ʑ00 %00 @0ʑ00 %00 @0ʑ00 %00 @0ʑ00 ʑ00 ʑ00 ʑ00 ʑ00 ȑ00} ʑ00 ʑ00} ȑ00z ʑ00| ʑ00z ʑ00w 00y 00w 00u 00y 00w 00u ʑ00y ʑ00w ʑ00u ʑ00v ʑ00u ʑ00t ʑ00Nʑ00L@0040Q040Q040Q040Q040Q040Q040Q040Q040Q040Q040Q040Q040Q040Q040Q @0 000 000000 @0 020 020020 @0 040 040 @0 060 060 @0 080 080 @0 0@0G @0 0:0 0:00:0 @0 0B0 0B0 @0 0D0 0D0 @0 0F0 0F0 @0 0H0 0H0 @0 0X06 @0 ʑ0B07 ʑ0B07ʑ0B070b0 @0 ʑ0D04 0j0 @0 ʑ0F01 0l0 @0 ʑ0H0. 0n0 @0 ʑ0J0+ 0p0 @0 0f0+ @0 ʑ0N0& 0r0 @0 0z0{0@0 0|0}$0@0 0~0\0@0 000@0 0|0}$ 000004000l000000000  0F0G(0H0I`0J0K0L0Mʑ0N0O 0 ʑ0P0Q@ 0  +6\o:~i~ _  T } V '&~Q`hiw  !"/89GPQbklzs&kjb d!p!q!!!!!8#9#E##### $$$G$H$V$$$$$$$>&?&K&&&&&&&&& 't'u'''''6(X)Y)e)))))))**$*w*x*******#+$+0+a+b+n++++ , ,1,2,;,p,q,},,,,,,---.-<-------. .E.F.R........)/Z////"0081U11111111111111111 22222)2.2327282E2J2O2T2U2b2g2k2|2}222222222222222222233333*3+32373;3L3M3Z3_3c3t3u333333333333333334444&4+4/4@4A4P4U4Y4^4_4n4s4x4|4}44444444444444445'56$6B8899::;;;;;<4<Q<_<w<<<<<<<=1=u==.>>y?{@?AABBQCCDDDE,H5HHIIJKK8L|MMN!O*OPPP9QQSST VVWXYZZZZZZBZCZFZ000000000\0\0\0\0\0\0\0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\0\ 0\ 0 \ 0 \ 0 \ 0 \ 0\ 0\ 0\ 0\ 0\0]0]0]0] 00] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0]0] 0]0] 0] 0]0]0]0] 0] 0] 0] 0 0 0]0]0]0] 0] 0] 0]0] 0] 0] 0]0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0]0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0]0]0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] @0] 0] 0]0] 0] 0]0]0]0]0] 0] 0]0] 0E0]0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0]0] 00] 0] 0 0] 0] 0]0]0]0 0] 0] 0] 0] 0]0] 0;] 0;] 0;] 0;] 0;] 0;] 0;] 0;] 0;]0]0 0< 0< 0< 0< 0< 0< 0< 0< 0< 0 < 0 < 0 <00<0<0<0<0<0<0<0<0<0<0<0<00<0<0<0<0<0<0<00<0<0<0<0<0<00<0<0@0@0@0@0@0@0 00 +6\o:~i~ _  T } V '&~Q`hiw  !"/89GPQbklzs&kjb d!p!q!!!!!8#9#E##### $$$G$H$V$$$$$$$>&?&K&&&&&&&&& 't'u'''''6(X)Y)e)))))))**$*w*x*******#+$+0+a+b+n++++ , ,1,2,;,p,q,},,,,,,---.-<-------. .E.F.R........)/Z////"0081U11111111111111111 22222)2.2327282E2J2O2T2U2b2g2k2|2}222222222222222222233333*3+32373;3L3M3Z3_3c3t3u333333333333333334444&4+4/4@4A4P4U4Y4^4_4n4s4x4|4}44444444444444445'56$6B8899::;;;;;<4<Q<_<w<<<<<<<=1=u==.>>y?{@?AABBQCCDDDE,H5HHIIJKK8L|MMN!O*OPPP9QQSST VVWXYZZZZZZZZZZBZCZFZ000000000\0\0\0\0\0\0\0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\0\ 0\ 0 \ 0 \ 0 \ 0 \ 0\ 0\ 0\ 0\ 0\0\0\0\0\ 0\0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\0\ 0\0\ 0\ 0\0\0\0\ 0\ 0\ 0\ 0\ 0\ 0\0\0\0\ 0\ 0\ 0\0\ 0\ 0\ 0\0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\0\0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\, 0\0\ 0\ 0\0\0\0\0\ 0\ 0\0\ 00\0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ 0\ @0\ 0\ 0\ 0\ @0\ @0\ 0\ 0\ 0\ @0\ @0\ 0\ 0\ 0\ @0\ @0\ 0\ 0\ 0\ @0\ 0\0\ 0\0\ 0\ 0\ 0\ 0\ 0\0\0\0\ 0\ 0\ 0\ 0\ 0\0\ 0<\ 0<\ 0<\ 0<\ 0<\ 0<\ 0<\ 0<\ 0<\0\0 01= 01= 01= 01= 01= 01= 01= 01= 01= 0 1= 0 1= 0 1=01=01=01=01=01=01=01=01=01=01=01=01=01=001=01=01=01=01=01=01=01=01=01=01=01=01=01=01=01=01=0@0ȑ00$@0ȑ00$@0ȑ00$@0ȑ00$@0@0ȑ008$ 1114I _l9W'7+/$2;4U9.:.< ?D}KR*WhZaEb256;ACHOSX\fmvT&Q !8Pk "$%()8++ ,G,,,>....t//X1112w222#3a33 414p444-5555E6666"8U9999:7:T:|::::;*;L;t;;;;<@<^<|<<<<'=B@ACCD_DDDDuE.FyG?IJQKP`Eb3789:<=>?@BDEFGIJKLMNPQRTUVWYZ[]^_`abcdeghijklnopqrstuwxyz{|}~Db4$JZ%{) Q j EZXXX +.4!8@0(  B S  ?EZ&4]\[\t\4\t]+**t*4++-turtr4sru4===D====D=ZZckv!!$$''**2,2,--a:a:h:FZ      bju!!$$''**:,:,--g:r:r:FZ  :*urn:schemas-microsoft-com:office:smarttagsStreet;*urn:schemas-microsoft-com:office:smarttagsaddress9*urn:schemas-microsoft-com:office:smarttagsplace8*urn:schemas-microsoft-com:office:smarttagsCity=*urn:schemas-microsoft-com:office:smarttags PlaceName=*urn:schemas-microsoft-com:office:smarttags PlaceType hF EH #KZhr<"D"((***#*11k2o2t2{2222222222222222333"3)3;3?3D3K3c3g3l3s33333333333334 444/43484?4OO0R5ReSmS+T1T2T;TETMTTTEUMUXXjYoYYYZZZZZZZZZZZZCZFZ [WWZZZZZZZZZZZZ$ZCZFZ333 +6  } Q   "sd!q!!!9#E###$$H$V$$$?&K&&&&&& '''Y)e)))))*$*****++2,;,q,},,,,-.-<---. .F.R.....//81U111111112222-2.22232I2J2N2O2f2g2j2k2222222222222222233336373:3;3^3_3b3c33333333333334444*4+4.4/4T4U4X4Y4]4_4r4s4w4x4{4}4444444444444444445'56$6::;4<Q<1=DD,H5HIIKK|MM!O*OZZZZZZZZZZZZ$Z.Z2ZCZFZZZZZZZZZZZZZCZFZZTrSE r"${頵-"pQ5`s$rm $ n1H|H:9p(IC}ڞS@-"& " #kg+:rv7-ٓ]N9(~nB7BH .O:V8Zk][>X~^h_$#!gp(h@ 7u>fEyD^v ^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^Jh^`OJQJo(hHh^`B*OJQJo(phhHhpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhhh^h`B*OJQJo(ph^J^J^J^J^J^J^J^J8^`B*OJQJo(phhH8^`OJQJ^Jo(hHo8  ^ `OJQJo(hH8\ \ ^\ `OJQJo(hH8,,^,`OJQJ^Jo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJ^Jo(hHo8ll^l`OJQJo(hHhhh^h`B*OJQJo(ph^J^J^J^J^J^J^J^Jhhh^h`B*OJQJo(ph^J^J^J^J^J^J^J^Jhhh^h`B*OJQJo(ph^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^J^Jh ^`hH.h ^`hH.h  L ^ `LhH.h \ \ ^\ `hH.h ,,^,`hH.h L^`LhH.h ^`hH.h ^`hH.h lLl^l`LhH.^J^J^J^J^J^J^J^J^Jh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhh^h`OJQJo(hH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHhpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhhh^h`B*OJQJo(ph^J^J^J^J^J^J^J^Jhhh^h`B*OJQJo(ph^J^J^J^J^J^J^J^Jhhh^h`B*OJQJo(ph^J^J^J^J^J^J^J^J8^`B*OJQJo(phhH8^`OJQJ^Jo(hHo8pp^p`OJQJo(hH8@ @ ^@ `OJQJo(hH8^`OJQJ^Jo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJ^Jo(hHo8PP^P`OJQJo(hHhhh^h`B*OJQJo(ph^J^J^J^J^J^J^J^J^`o()8TT^T`B*OJQJo(phhH $ L$ ^$ `LhH.   ^ `hH. ^`hH. L^`LhH. dd^d`hH. 44^4`hH. L^`LhH.頵"p5r"rSv7-~nBkg+@-":9 "k][ 7uX~^h_.O$1H:Vm B#!gN9yD^vC}=                       Ы=        ЫЫЫ                 ^G                ЫЫЫ=        Ы@YH=        ?X]H"U]H?X ilwK i!7w=3= rm fS Op i 6 c 9Y:" {[w1F!+"`T$Q%N'W)*G$*+$/1I2!356@O7<:4; ,<zj>AlA>B!BBEAD(EWGvHHtI*2IKTKodK L XM{MOP@OQYR#JSL#\l\x`T4a:e;e[e fVfiI[mn.onrtU&vvvw>ya{K|}g}?~{D~F~BQfVyC{smIR` 0a*bm ;"}a!fir<[c"|v[e76 ev^!B{vs)Ll-w+KCPT)k3dIn| wG7&8KK! 61/GZ5^Z.J;bOR-Acx B1p$~:DSrqLFaIL$/$K{Q??Jd`n#r@ =hJ?<MEXP=](/Qg_\6YC;Q`hiw  !"/89GPQbklzq!!!!8#9#E#### $$$G$H$V$$$$$$>&?&K&&&&&&&&& 't'u''''X)Y)e)))))))**$*w*x*******#+$+0+a+b+n++++ , ,1,2,;,p,q,},,,,,,---.-<-------. .E.F.R......1111111111111111 22222)2.2327282E2J2O2T2U2b2g2k2|2}222222222222222222233333*3+32373;3L3M3Z3_3c3t3u333333333333333334444&4+4/4@4A4P4U4Y4^4_4n4s4x4|4}4444444444444444FZ@;;,;?;D%EZ@UnknownstuGz Times New Roman5Symbol3& z Arial7&  Verdana5& zaTahomaW BatangArial Unicode MS;Wingdings?5 z Courier New"hĢ<ޢ<ܢ<!q L.q L.!xxdYY 2q?bm2Final Exam Detailsrantonucstut                     Oh+'0   @ L X dpxFinal Exam Details rantonuc Normal.dotstu6Microsoft Office Word@,@h-dC;@ @;@C;q L՜.+,D՜.+,@ hp|  .Y' Final Exam Details Title 8@ _PID_HLINKSAG@http://www.apastyle.org/Z Vhttp://www.bu.edu/met/metropolitan_college_people/student/resources/conduct/code.htmlZu_mailto:sjjacobs@bu.eduZ  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\^_`abcdfghijklqRoot Entry F ݅C;sData `/1TableWordDocument:pSummaryInformation(]DocumentSummaryInformation8eCompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q