ࡱ> 9 jbjbj DvhhBW,,f:f:f:f:f:z:z:z:8:t&;z:S;;(<<<6=6=6=QSSSSSSSSSSSSSWFZ:SSQf:6=6=6=6=6=SSf:f:<<4S@@@6=rf:<f:<QS@6=QS@@LhN<0YF[>|EM=SS0SUM[$?[ NN\[f:uP6=6=@6=6=6=6=6=SSSS@6=6=6=S6=6=6=6=[6=6=6=6=6=6=6=6=6=,X ,9: VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide Fourth Edition Copyright 2021 by Pearson Education, Inc. ISBN-10: 0-1358-9819-6 ISBN-13: 978-0-1358-9819-2 Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it. When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing. First Printing: March 2021 Corrections for July 13, 2023 Pg.Error First PrintingCorrection609In Chapter 4, first answer reads: 1. d. Explanation: Intel EVC Mode Nehalem (Level L2) includes the Intel Penryn feature set and exposes additional CPU features, including SSE4.2 and POPCOUNTShould read: 1. c. Explanation: Intel EVC Mode Nehalem (Level L2) includes the Intel Penryn feature set and exposes additional CPU features, including SSE4.2 and POPCOUNT Corrections for November 4, 2022 Pg.Error First PrintingCorrection90Question 4 reads: 4. Using NIOC, you reserved 1.0 Gbps for virtual machine system traffic on a distributed switch with eight 10 Gbps uplinks. If you reserve 512 Mbps for a network resource pool, what is the maximum reservation you can set in another network resource pool? a. 0.5 Gbps b. 1.0 Gbps c. 7.5 Gbps d. 79.6 GbpsQuestion 4, should read 4. Using NIOC, you reserved 1.0 Gbps for virtual machine system traffic on a distributed switch with eight 1.0 Gbps uplinks. If you reserve 512 Mbps for a network resource pool, what is the maximum reservation you can set in another network resource pool? a. 0.5 Gbps b. 1.0 Gbps c. 7.5 Gbps d. 79.6 Gbps  Corrections for February 10, 2022 Pg.Error First PrintingCorrection34Question 3 at the top of the page: 3. You are planning to implement a vSAN stretched cluster. Which of the following statements is true? a. You should not enable DRS in automatic mode. b. You should disable HA datastore heartbeats. c. If you set PFFT to 0, you may be able to use SMP-FT. d. If one of the fault domains is inaccessible, you cannot provision virtual machines.Should read: 3. You are planning to implement a vSAN stretched cluster. Which of the following statements is true? a. You should not enable DRS in automatic mode. b. You should enable HA datastore heartbeats. c. If you set PFFT to 0, you may be able to use SMP-FT. d. If one of the fault domains is inaccessible, you cannot provision virtual machines. Corrections for January 3, 2022 Pg.Error First PrintingCorrection272Second paragraph reads: When a user performs an encryption task, such as creating an encrypted virtual machine, the following events occur: %%The vCenter Server requests a new key from the default KMS to use as the KEK. %% The vCenter Server stores the key ID and passes the key to the ESXi host. If the host is part of a cluster, vCenter Server sends the KEK to each host in the cluster. %% The key itself is not stored on the vCenter Server system. Only the key ID is known. %% The ESXi host generates internal keys (DEKs) for the virtual machine and its disks. It uses the KEKs to encrypt internal keys and keeps the internal keys in memory only (never on disk). Only encrypted data is stored on disk. %% The ESXi host uses the encrypted internal keys to encrypt the virtual machine. %% Any hosts that can access the encrypted key file and the KEK can perform operations on the encrypted virtual machine or disk.Should read: The specific steps and keys used during an encryption operation are dependent on provider type. For the Standard key provider: The ESXi host generates internal XTS-AES-256 keys to use as data encryption keys (DEKs), which it uses to encrypt virtual machines and virtual disks. vCenter Server requests AES-256 keys from the key server (KMS) to use as the key encryption key (KEK). vCenter Server stores only the KEK ID, not the key itself. ESXi uses the KEK to encrypt the internal keys. It stores the encrypted internal key on disk, but does not store the KEK on disk. If the host reboots, vCenter Server requests the KEK using the corresponding ID from the KMS and provides it to the host. For the vSphere Trust Authority trusted key provider: The trused cluster's vCenter Server detrmines if the default trusted key provider is accessible to the ESXi host and adds the trusted key provider to the virtual machine ConfigSpec. Whenenver an ESXi host creates a virtual machine, if an attestation token is not already available to the host, it requests one from the Attestation Service. The Key Provider Service validates the attestation token and creates a Key Encryption Key (KEK). It encrypts (wraps) the KEK using its primary key. It returns the KEK ciphertext and KEK plaintext to the trusted host. The ESXi host generates a Data Encryption Key (DEK), which it uses to encrypt virtual machines and virtual disks. The hosts uses the KEK to encrypt (wrap) the DEK. It stores the key ciphertext from the key provider alongside the encrypted data. 307Step 2, 3 and 4 should read as the following: Step 2. From the left pane, select Administration > Single Sign On > Configuration Step 3. Select the Identity Provider tab. Step 4. Select Active Directory as the type and click Join AD.21Paragraph above NOTE reads: If you plan to install vCenter Server for Windows and use AD identity sources, you should ensure that the Windows server is a member of the AD domain but is not a domain controller. Please ignore this sentence.39Fourth bullet reads: You plan to configure a Microsoft Custer Server (MSCS) clustering in a manner that spans physical hosts, such as virtual-to-virtual clusters and physicalto- virtual clusters. You should configure the data and quorum disks as RDMs rather than as virtual disk files.Should read: You plan to configure a Microsoft Cluster Server (MSCS) clustering in a manner that spans physical hosts, such as virtual-to-virtual clusters and physicalto- virtual clusters. You should configure the data and quorum disks as RDMs rather than as virtual disk files.116First paragraph, third sentence reads: If the MTU settings configured on the distributed switch match the trunk ranges on the physical switch, MTU Health Status is set to Normal.Should read: If the MTU settings configured on the distributed switch match the MTU settings on the physical switch, MTU Health Status is set to Normal. Corrections for September 6, 2021 PgError First PrintingCorrection610Chapter 5, Answer 3: 3. b. Explanation: The file named -flat.vmdk is the virtual machine data disk file. It is commonly called the flat file. ..vmdk is the virtual machine data disk file.Should read: 3. b. Explanation: The file named -flat.vmdk is the virtual machine's data disk file. It is commonly called the flat file. ..vmdk is the descriptor (metadata) file for the virtual disk. Corrections for July 22, 2021 PgError First PrintingCorrection329Ch 9, DIKTA Question 10 reads: <=>CDKLMYxy̺yncXMBBBB7c7hSmh0OJQJhSmhAy^OJQJhSmh@OJQJhSmhhN5OJQJhSmh1 OJQJhSmh !OJQJhSmh`*iOJQJhSmh`'OJQJhSmhcOJQJhSmhB5OJQJ\#hSmhB5CJOJQJ^JaJ#hSmhY35CJOJQJ^JaJ#hSmhn5CJOJQJ^JaJ#hSmhO5CJOJQJ^JaJhSmhn0Jz5OJQJ\=LMyd + / F Q $  $Ifa$gd  gdcaJ  p@@gdcaJ $ p@@a$gdA:o$a$n$a$n$a$gd !gdc$a$gd|     d       ! " # $ ) * + . / 5 Ծqqqh3jhcaJ56OJQJhcaJ56OJQJhSmhcaJ56OJQJhcaJOJQJhA:OJQJhSmh!OJQJhSmh OJQJhSmh`'OJQJhSmhySOJQJhSmhhN5OJQJhSmh0OJQJhSmh`*iOJQJhSmh%I[OJQJ,5 6 = E F P Q R U V c i j x y | ~    $ % ( ) * ˱˱򥝝vvh3jhA:56OJQJhA:56OJQJhSmhA:56OJQJhcaJOJQJh hcaJOJQJ\ *hcaJhcaJ6OJQJ\hcaJ6OJQJ\hcaJhcaJ6OJQJ\hcaJ56OJQJh hcaJ6OJQJ\h3jhcaJ56OJQJ.Q R V y  % `PCCCC   $IfgdcaJ$  $Ifa$gdkd$$IflF* 3F t06    44 lapyt `SSSSJJ  gdA: $ p@@a$gdA:kd$$IflF* 3F t06    44 lapyt     ' PCC   $IfgdJ9kdd$$IflF* 3F t06    44 lapytJ9$  $Ifa$gdJ9        ' * s t %&'*+36?BKNWXbcqrtGopqtu}⠠:hA:hA:B*CJOJQJ^JaJfHphq "hA:hA:CJOJQJ\]aJhA:OJPJQJ^JaJ hA:hA:OJPJQJ^JaJ hA:hA:OJPJQJ^JaJhA:hA:6OJQJ\aJh3jhA:56OJQJ0' &'3?KXqq} |$If^gdA: |$If^gdJ9   $IfgdA:d$7$8$H$IfgdA:ڼvvvvhhhhhhhhhZMh3j6OJQJ\aJh h3j6OJQJ\h3jh3j56OJQJhu56OJQJhSmh3j56OJQJhu56OJQJhA:hA:OJQJ\]aJ"hA:hA:CJOJQJ\]aJ:hA:hA:B*CJOJQJ^JaJfHphq $hA:hA:CJOJPJQJ^JaJ$hA:hA:CJOJPJQJ^JaJ`WN>>>$  $Ifa$gd3j  gd3j  gd kd$$IflF* 3F t06    44 lapytJ9{i`SSFFFFF   $Ifgd>S   $Ifgd=kd$$IflF* 3F t06    44 lapytfVa<=[\]{[^_hijvw ƵƨƘ~nnannnnannnhhM6OJQJ\aJh>ShhM6OJQJ\aJh3jOJQJ\]aJhhMOJQJ\]aJh h>S6OJQJ\aJhCL6OJQJ\aJ! *h"h>S6OJQJ\aJh>Sh>S6OJQJ\aJh3j6OJQJ\aJh>S6OJQJ\aJh h3j6OJQJ\aJ#iw ;s |$If^gdhM   $IfgdhM |$If^gd3j!;s/0ո~~~~~~~~~p```````h hu6OJQJ\aJh hu6OJQJ\h3jhu56OJQJhSmhu56OJQJhSmh3j56OJQJh h3j6OJQJ\aJh3jhhMOJQJ\]aJhhM6OJQJ\aJh>ShhMOJQJ\aJh>ShhM6OJQJ\aJhfVa6OJQJ\aJ `WWGGG$  $Ifa$gd3j  gd kdz$$IflF* 3F t06    44 lapytfVa/j`SSSSSSSS   $Ifgd kd,$$IflF* 3T t06    44 lapyt jn +,UV./ # $ % & ̼h huOJQJaJh huCJOJQJaJh huOJQJ]^JaJ"h huOJQJ\]^JaJh hu6OJQJ\aJ"h hu6OJQJ\^JaJ9 ,V/$ % | & F8$If^8gd | & F8$If^8gd h$If^hgd   $Ifgd % & * X !`SSFF9 $If^gdN $If^gd   $Ifgd kd$$IflF* 3T t06    44 lapyt & ) * + F X _ { !! !!!!!!!!(!-!.!3!4!6!7!y!!!!!"" " " """#"$"%"G"´h hSmOJQJ\h hSm6OJQJ\h huOJQJ\hNhuOJQJh huOJQJh hu5OJQJ\h hu6OJQJ\<!!!6!! "xkkkk   $Ifgd kd$$Ifl0* 3/ t0644 lapyt  " ""$"/#<#H$xkkkkk   $Ifgd kd*$$Ifl0* 3/ t0644 lapyt G"M"""#-#.#/#;#<#=#_#`#a#f###$F$G$H$I$L$M$t$u$$$%%%%%u%%%%%%%%%%%%%%%%%%%ȺhSmh]0OJQJhSmhJ5?5OJQJhSmhJ5?OJQJhSmhJ5?56OJQJhSmhu56OJQJh hSmOJQJ\h hu6OJQJ\h hSm6OJQJ\ *h hSm6OJQJ\3H$I$M$t$%%%`SSSSS   $Ifgd kd$$IflF* 3T t06    44 lapyt %%%%%`WM9 $ :$If]:a$gdfs  p@@gdJ5?  gd kdv$$IflF* 3T t06    44 lapyt %%%%%&&gSF= $Ifgd> $Ifgdfs $ :$If]:a$gdfskd($$IflF*20 3    4 layt}ER $ $Ifa$gdfs%%%%&&&#&,&E&L&M&U&&&&&&&&&&&&&&&&&&'J'P'Q''''''''''''꬞thSmh~56OJQJhSmh56OJQJhSmh 56OJQJhSmhf 56OJQJhSmhJ5?56OJQJhSmh:OJQJ *hSmh>OJQJhSmh>6OJQJ]hSmh>OJQJhSmhJ5?OJQJhSmhCOJQJ,&&'''''h^^J $ :$If]:a$gd\  p@@gdf kd$$IflF*20 3    4 layt}ER $Ifgdfs'''''''''''hPhQh|hhhhhhhhhhhhhhhiLiMixiiiiiiiiiiiijQjjjjjjƻӤhSmhhN5OJQJhSmhf 56OJQJhSmh?OJQJhSmh/ OJQJ *hSmh NEOJQJhSmh NEOJQJUhSmh=OJQJhSmha5OJQJhSmh%OJQJhSmhf 5OJQJhSmhf OJQJ2''''''|hgSF= $Ifgd NE $Ifgd< $ :$If]:a$gd@?kdX $$IflF*20 3    4 layt+ $ $Ifa$gd\10. You are configuring rules to mark network packets. Which of the following is not a valid option for qualifying packets? a. Destination IP address b. Source IP address c. Source and destination MAC addresses d. Destination port numberShould read: 10. You are configuring rules to mark network packets. Which of the following is not a valid option for qualifying packets? a. Destination IP address b. Source IP address c. Source and destination MAC addresses d. VM guest OS type This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet.     MACGLOBL.DOT  DATE \l 7/13/2023 TIME 12:55 PM Updated 11/04/2022 |hhhhhhxiiiii $Ifgd/ $Ifgd/ $Ifgd4 $Ifgd NE $Ifgd NE iiiijjjjjjunld___V_ ".gdSmgdSm $a$gdy  p@@kd $$IflF*20 3    4 layt+ jjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjڹxkhSm5CJOJQJaJhZp5CJOJQJaJh`'5CJOJQJaJhHG5CJOJQJaJhA:5CJOJQJaJhu5CJOJQJaJh-h-5CJOJQJaJhcaJmHnHujhC^KUhC^KhIXXjhIXXUhSmhSmOJQJhSmhhN5OJQJ)jjjjjjjjjjjjjjjjgdSmv$a$gd-jjjjhSmhSmOJQJhTB0@P0:p-= /!"#$%: Dp$$If!vh#v#v#vF:V l t06555Fpyt$$If!vh#v#v#vF:V l t06555Fpyt$$If!vh#v#v#vF:V l t06555FpytJ9$$If!vh#v#v#vF:V l t06555FpytJ9$$If!vh#v#v#vF:V l t06555FpytfVa$$If!vh#v#v#vF:V l t06555FpytfVa$$If!vh#v#v#vT:V l t06555Tpyt $$If!vh#v#v#vT:V l t06555Tpyt $$If!vh#v#v/:V l t0655/pyt $$If!vh#v#v/:V l t0655/pyt $$If!vh#v#v#vT:V l t06555Tpyt $$If!vh#v#v#vT:V l t06555Tpyt $$If!vh#v#v#v:V l0 35554yt}ER$$If!vh#v#v#v:V l0 35554yt}ER$$If!vh#v#v#v:V l0 35554yt+$$If!vh#v#v#v:V l0 35554yt+}x2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@66666 OJPJQJ_HmH nH sH tH N`N Normald CJOJPJQJ_HmH sH tH ZZ Rw Heading 1$<@&5CJ KH OJQJ\^JaJ BB  Heading 4$<@&56DA`D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List J/J FT d CJOJPJQJ_HmH sH tH / QQTd$d%d&d'dNOPQ#5CJOJPJQJ_HmH sH tH N/N HC d#5CJOJPJQJ_HmH sH tH 0U !0 Hyperlink>*B*@V 1@ FollowedHyperlink>*B* R/BR ITd` CJOJPJQJ_HmH sH tH f/Rf BL'  d^` CJOJPJQJ_HmH sH tH f/bf BX'  d^` CJOJPJQJ_HmH sH tH f/rf NL'  d^` CJOJPJQJ_HmH sH tH f/f NX'  d^` CJOJPJQJ_HmH sH tH ^/^ UC d^#6CJOJPJQJ_HmH sH tH Z/Z UL d^ CJOJPJQJ_HmH sH tH Z/Z UX d^ CJOJPJQJ_HmH sH tH N/N TN d#5CJOJPJQJ_HmH sH tH NoN TH d#6CJOJPJQJ_HmH sH tH T/T TS$da$#6CJOJPJQJ_HmH sH tH V/V TC @d#5CJOJPJQJ_HmH sH tH RoR TB @dx CJOJPJQJ_HmH sH tH R/R TX! @d CJOJPJQJ_HmH sH tH N/"N LH "d#6CJOJPJQJ_HmH sH tH V/2V C1#d]#>*CJOJPJQJ_HmH sH tH R/BR C2$d]#>*CJOJPJQJ_HmH sH tH V/RV CX%d]#>*CJOJPJQJ_HmH sH tH Z/bZ MN&d]^ CJOJPJQJ_HmH sH tH d/rd SH"'$``d]`^`a$#6CJOJPJQJ_HmH sH tH Z/Z SB(``d]`^` CJOJPJQJ_HmH sH tH Z/Z NO)``d]`^` CJOJPJQJ_HmH sH tH Z/Z TI*``d]`^` CJOJPJQJ_HmH sH tH Z/Z CA+``d]`^` CJOJPJQJ_HmH sH tH ^/^ EH,$d^a$&56CJOJPJQJ_HmH sH tH Z/Z ET- d^ CJOJPJQJ_HmH sH tH Z/Z EX. d^ CJOJPJQJ_HmH sH tH N/N FC /d#6CJOJPJQJ_HmH sH tH N/N FN 0d#5CJOJPJQJ_HmH sH tH L/L M01 1d CJOJPJQJ_HmH sH tH L/"L M02 2d CJOJPJQJ_HmH sH tH L/2L M03 3d CJOJPJQJ_HmH sH tH L/BL M04 4d CJOJPJQJ_HmH sH tH L/RL M05 5d CJOJPJQJ_HmH sH tH L/bL M06 6d CJOJPJQJ_HmH sH tH L/rL M07 7d CJOJPJQJ_HmH sH tH T/T PD8d&56CJOJPJQJ_HmH sH tH j/j ENL*9 @@@d^` CJOJPJQJ_HmH sH tH j/j ENX*: @@@d^` CJOJPJQJ_HmH sH tH N/N HA ;d#5CJOJPJQJ_HmH sH tH N/N HB <d#5CJOJPJQJ_HmH sH tH N/N HD =d#5CJOJPJQJ_HmH sH tH N/N HE >d#5CJOJPJQJ_HmH sH tH N/N HF ?d#5CJOJPJQJ_HmH sH tH N/N HG @d#5CJOJPJQJ_HmH sH tH h/h EL*A @@@d^` CJOJPJQJ_HmH sH tH `/"` LC1Bd]^#>*CJOJPJQJ_HmH sH tH \/2\ LC2Cd]^#>*CJOJPJQJ_HmH sH tH `/B` LCXDd]^#>*CJOJPJQJ_HmH sH tH R/RR TRE @dx CJOJPJQJ_HmH sH tH N/bN AU Fd#6CJOJPJQJ_HmH sH tH d/rd MH"G$d]^a$#6CJOJPJQJ_HmH sH tH L/L M08 Hd CJOJPJQJ_HmH sH tH \/\ CLTI``d]`^` CJOJPJQJ_HmH sH tH `/` FTNJ``d]`^`#6CJOJPJQJ_HmH sH tH P/P BTSUB Kd CJOJPJQJ_HmH sH tH V/V LXLd]#>*CJOJPJQJ_HmH sH tH \/\ NOXM``d]`^` CJOJPJQJ_HmH sH tH \/\ TIXN``d]`^` CJOJPJQJ_HmH sH tH \/\ CAXO``d]`^` CJOJPJQJ_HmH sH tH \/\ SBXP``d]`^` CJOJPJQJ_HmH sH tH N/N BT Qd#5CJOJPJQJ_HmH sH tH L/"L M09 Rd CJOJPJQJ_HmH sH tH L/2L M10 Sd CJOJPJQJ_HmH sH tH L/BL M11 Td CJOJPJQJ_HmH sH tH L/RL M12 Ud CJOJPJQJ_HmH sH tH L/bL M13 Vd CJOJPJQJ_HmH sH tH L/rL M14 Wd CJOJPJQJ_HmH sH tH L/L M15 Xd CJOJPJQJ_HmH sH tH f/f CSH"Y$d]^a$#6CJOJPJQJ_HmH sH tH X/X CHDZ@d^@#5CJOJPJQJ_HmH sH tH X/X CHE[@d^@#5CJOJPJQJ_HmH sH tH T/T CFT\@d^@ CJOJPJQJ_HmH sH tH h/h CBL'] `0p`d^p`` CJOJPJQJ_HmH sH tH h/h CBX'^ `0p`d^p`` CJOJPJQJ_HmH sH tH h/h CNL'_ `0p`d^p`` CJOJPJQJ_HmH sH tH h/h CNX'` `0p`d^p`` CJOJPJQJ_HmH sH tH X/X CTHa@d^@#5CJOJPJQJ_HmH sH tH `/"` CTCb @d^@#5CJOJPJQJ_HmH sH tH \/2\ CTBc @d^@ CJOJPJQJ_HmH sH tH \/B\ CTXd @d^@ CJOJPJQJ_HmH sH tH N/RN EDTN ed CJOJPJQJ_HmH sH tH L/bL ADD fd CJOJPJQJ_HmH sH tH P/rP PTTOC gd CJOJPJQJ_HmH sH tH P/P CTTOC hd CJOJPJQJ_HmH sH tH T/T TOCPART id CJOJPJQJ_HmH sH tH P/P TOCHB jd CJOJPJQJ_HmH sH tH P/P TOCHC kd CJOJPJQJ_HmH sH tH P/P TOCHD ld CJOJPJQJ_HmH sH tH R/R CRHC md#5CJOJPJQJ_HmH sH tH RoR CRHD nd#5CJOJPJQJ_HmH sH tH JoJ CR od CJOJPJQJ_HmH sH tH V/V CREDTI pd#5CJOJPJQJ_HmH sH tH R/R CREDNM qd CJOJPJQJ_HmH sH tH P/"P DED rd#6CJOJPJQJ_HmH sH tH  Q2 CLs"B" frttBZRB Plain Textud CJOJ QJ 4 @b4 Footer v !4r4 Header w !HH 1 Balloon TextxCJOJ QJ ^J aJH>H -Titley$da$5CJ$OJQJ\aJ(O( -ver12redjj u Table Grid7:V{0{f@f u List Paragraph|d^m$CJOJPJQJ^JaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vj\{cp/IDg6wZ0s=Dĵw %;r,qlEآyDQ"Q,=c8B,!gxMD&铁M./SAe^QשF½|SˌDإbj|E7C<bʼNpr8fnߧFrI.{1fVԅ$21(t}kJV1/ ÚQL×07#]fVIhcMZ6/Hߏ bW`Gv Ts'BCt!LQ#JxݴyJ] C:= ċ(tRQ;^e1/-/A_Y)^6(p[_&N}njzb\->;nVb*.7p]M|MMM# ud9c47=iV7̪~㦓ødfÕ 5j z'^9J{rJЃ3Ax| FU9…i3Q/B)LʾRPx)04N O'> agYeHj*kblC=hPW!alfpX OAXl:XVZbr Zy4Sw3?WӊhPxzSq]y v BBBVVVY5 & G"%'jjj "%(+/18:Q ' i% ! "H$%%&'|hijj!#$&')*,-.02679$./6?Y @ @ 0(  B S  ?H0(  8< 6 : >Brv PZ\eimZds}'-04BDEGHJKMN[OS-0 B[33333333  B;ABDEGHJKMN[  B;ABBDEEGHJKMN$TdߺJBfϺQr`s?2gL|֥  ^`OJQJo(^`OJ QJ ^J o(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o P^P`OJ QJ o(h^`OJ QJ ^J o(hHoh^`OJ QJ ^J o(hHohp^p`OJ QJ o(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^J o(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^J o(hHohP^P`OJ QJ o(hH ^`OJQJo(^`OJ QJ ^J o(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o P^P`OJ QJ o(h^`OJQJo(hHh^`OJ QJ ^J o(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^J o(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^J o(hHohPP^P`OJ QJ o(hH^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.r`sL|dJBf$                                             !%  ,{Kh  gdd> S)]``RE 2gFc,{CU*{E+G2}ddK0U92_|Txa=AbiVTxa=ddQoXp<[Ab dd8VtU92Jzw P w{ wdd_|>iVG2}@ ~TTYa5d ) 1 A ,kCM@y$.A:_p/X !B| / f q !!"@#y%ZD&]&}(*R* T+ ,t,0Y$3Y3hN58y)=&Q>?J5?@?I@ NEtEzEHGcaJC^KILlL^3M}ERTEVIXX%I[x*]Ay^fVa2h`*i9iSmR]oZpOipdqous w\y~"H5J !N>S=7zBufs"C+]GaT5uA ] _<*pL ]0(*tBj,aFySG]Rw=ThQ?rz,:ES5R`%d\ GO en^hM'i-CLftu3jF~.OlNl<J9 ?-)4>-/8=]Lkc`'GH9hBD@L @4@@UnknownG.[x Times New Roman5Symbol3. .[x Arial7. [ @Verdana3.[x Times_ HelveticaNeueLTStd-MdArialcJansonTextLTStd-RomanCambria7..{$ CalibriO5 CourierCourier New?= .Cx Courier New5. .[`)TahomaC.,.{$ Calibri Light;WingdingsA$BCambria Math"1HhgTg8kk&kv881033 3qAP ?02! xxT{8 WG4 System:Applications:Microsoft Office 2001:Templates:My Templates:Global_May_2002.dot(c)We Want to Hear from YouEnd UserRoopali Satija      Oh+'0 $ D P \ ht|(c)We Want to Hear from You End UserGlobal_May_2002Roopali Satija107Microsoft Office Word@D|@х@VDㅾ@E[ ՜.+,D՜.+,h$ px  Pearson Education83 (c)We Want to Hear from You Title @HGrammarlyDocumentIdDd6438546393d3de6628661110b0c0f547835dd7be3df1d426aa821b7a3a454a4  !"#$%&'()*+,-./0123456789:;=>?@ABCEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqstuvwxy{|}~Root Entry FaZF[Data <1TableD[WordDocumentDvSummaryInformation(rDocumentSummaryInformation8zCompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q