Modul Internet Saint Johns School
Modul Internet Saint Johns School
A. Definition of Internet
Internet (short for interconnected-networking) is a series of computers connected in a series.
When the Internet (the letter 'I' big) is the common computer system, which connected globally
and using TCP / IP as the protocol of packet switching (packet switching communication
protocol). How to connect the circuit is called internetworking.
The protocol sets out the allowable data formats, error handling (error handling), message
traffic, and other communications standards. On internet standard protocol known as TCP / IP
(Transmission Control Protocol / Internet Protocol). This protocol has the ability to work on all
types of computers, without being influenced by the differences in hardware and operating
system used. A computer system is connected directly to the network has a domain name and
Introduction of Internet 2019
IP address (Internet Protocol) in numerical form with a specific format as an identifier. The
Internet also has gateways to networks and other protocol-based services.
In the early 1980s, ARPANET was split into two networks, the ARPANET and MILNET (a
military network), but both have a relationship so that communication between the network can
still be made. At the beginning of this interconnection network called the DARPA Internet, but
eventually called the Internet only. Later the Internet began to be used for academic interests by
linking several universities, each of UCLA, the University of California at Santa Barbara,
University of Utah, and Stanford Research Institute. This was followed by the opening of
Usenet and Bitnet service that allows Internet access through the means of personal computers
(PCs). Next, the standard protocol TCP / IP was introduced in 1982, followed by use of the
system DNS (Domain Name System) in 1984. In 1986 was born the National Science
Foundation Network (NSFNET), which connects researchers across the country with 5 super
computer center.
This network is then developed to connect a variety of other academic networks consisting of
university-research consortium and the consortium. NSFNET then began to replace the
ARPANET as the main research network in the U.S. until in March 1990 the ARPANET was
officially disbanded. At the NSFNET was built, many established international network and
connected to the NSFNET. Australia, Scandinavian countries, Britain, France, Germany,
Canada and Japan soon joined into this network. At first, the internet only offer text-based
services, including remote access, email / messaging, and discussion via newsgroups (Usenet).
Graphics-based services such as the World Wide Web (WWW) while it was still not there.
There is only the service called Gopher that in some ways similar to the web that we know
today, except the system works is still text based. Significant progress achieved in 1990 when
the World Wide Web was developed by CERN (Particle Physics Laboratory in Switzerland)
based on proposals made by Tim Berners-Lee. However, the first WWW browser newly born
two years later, in 1992 under the name “Viola”. Viola w
as launched by Pei Wei and distributed with CERN WWW. Of course, the first web browser is
still very simple, not sophisticated modern browsers we use today.
Other meaningful breakthrough occurred in 1993 when it was set up to run the InterNIC
domain registration services. Simultaneously, the White House (White House) began online on
the Internet and the United States government passed the National Information Infrastructure
Act. The use of commercial Internet began in 1994 spearheaded by the company's Pizza Hut,
and Internet Banking was first applied by First Virtual. A year later, CompuServe, America
Online, and Prodigy begin providing access to Internet services for the general public.
Meanwhile, in Indonesia we are only able to enjoy a commercial Internet service in around
1994. Previously, some colleges like the University of Indonesia have been first connected to
the Internet network through a gateway that connects the university with overseas networks.
To connect to the Internet network, the user must use a special service called ISP (Internet
Service Provider). The media commonly used is through the phone line (known as PPP, Point
to Point Protocol). Users utilize a computer equipped with a modem (modulator and
demodulator) to dial up to the ISP's server. Once connected to the ISP's server, the user's
computer is ready to use to access the Internet network. Phone lines via modem is not the only
way to connect to the internet service. Connections can also be done through a dedicated line
channels such as ISDN (Integrated Systems Digital Network) and ADSL (Asymetric Digital
Subscriber Line), or via satellite through a VSAT (Very Small Aperture Terminal).
Unfortunately, the alternative is relatively quite expensive for the size of individual customers.
Today, alternative channels for a more affordable Internet access is still being developed.
Among the alternatives available is via radio waves (radio modem), or through cable TV
channels that are currently emerging. Another alternative that is currently under review is by
laying the cable channel the flow of data on electricity (known as PLC, Power Line
Communication). In Indonesia, the technology is being tested by PLN in Jakarta, while in
developed countries is said to have started socialized. Later, the Internet was also developed for
wireless applications (no cable) with the use of cell phones.
Introduction of Internet 2019
This protocol is used for WAP (Wireless Application Protocol). WAP is the result of
cooperation between the industry to create an open standard (open standard) based on Internet
standards, and some protocols that are optimized for wireless environments. WAP works in text
mode with a speed of about 9.6 kbps.
Except WAP, also developed GPRS (General Packet Radio Service) as one of the
wireless communication standard. Compared with the protocol WAP, GPRS has advantages in
speed that can reach 115 kbps and a broader application support, including graphics and
multimedia applications.
Practice
Answer these questions below correctly!
date :
Name :
………………………….
Class: ………………………….
No. : ………………………….
A. Answer sheet
1. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
2. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
3. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
4. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
5. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
Introduction of Internet 2019
6. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
7. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
8. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
9. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
10. …………………………………………………………..………………………………………
…………………..…………………………………………………………..…………………
…………………………………………………………………………………………………
……………………………
Date : Date :
Introduction of Internet 2019
The Internet provides a variety of applications that can be used for various purposes. Each application
running on a particular protocol. The term "protocol" on the Internet refers to a set of rules that govern how
an application to communicate in a network. While the software application running on a protocol referred
to as client applications. In this section, we will meet in passing with the applications most frequently used
by Internet users.
A. Web Browser
As an alternative, the web browser Mozilla Firefox is a reliable and safe can be used as a
complement to existing browsers. Mozilla Firefox features include tabbed browsing, pop-up blocking,
integrated search facilities, live bookmarks and much more. Plug-in general such as Java, Macromedia
Flash, and Real Player is also supported. Mozilla Firefox is not installed directly. Mozilla Firefox can be
obtained by installing the firefox package.
WWW often referred to as "web" it is the most popular Internet applications. Technically, the web is
a system whereby the information in the form of text, images, sounds, etc. they are stored in an internet
webserver presented in the form of hypertext. Information on the web in text form is generally written in
HTML (Hypertext Markup Language). Other information presented in graphical form (in GIF, JPG,
PNG), sound (in AU format, WAV), and other multimedia objects (such as MIDI, Shockwave, Quicktime
Movie, 3D World).
Web can be accessed by a web client software which is popularly referred to as a browser. The
browser reads web pages stored on the webserver via a protocol called HTTP (Hypertext Transfer
Protocol). There are several browsers that are quite popular and widely used, such as Microsoft Internet
Explorer, Netscape Navigator, and Opera, Mozilla, but there are also some products that are less known
browsers and is only used in restricted environments.
Link makes it easy for web users move from one page to another, and "roam" from one server to
another server. This web page search activities commonly termed as browsing, there is also a call as
surfing (surfing).
Along with the development of Internet network throughout the world, then the number of websites
available have also increased. The web users may use a search engine (search engine). Search based on
search engines based on keywords (keywords) which will then be matched by the search engines with a
database (database) hers. Today, search engines are often used, among others, are Google
(www.google.com) and Yahoo (www.yahoo.com)..
C. Electronic Mail/E-mail/Messaging.
Email stands for electronic mail, is an application that allows Internet users to send each other
messages through the electronic address on the internet. Messages received will be accommodated in the
mailbox, then the owner of the mailbox at any time can check his contents, reply to the message, delete, or
edit and send email messages.
Email services are usually grouped into two bases, which is based email client and web-based email.
For users based email client, per-emailan activities carried out by using an email client software, such as
Introduction of Internet 2019
Eudora or Outlook Express. This software provides the functions of editing and reading email offline (not
connected to the internet). Understanding of E-mails will be explained in later chapters.
D. File Transfer
This facility allows Internet users to make deliveries (upload) or copy (download) a file between a
local computer with other computers connected in a network the Internet. Standard protocol used for this
purpose called the File Transfer Protocol (FTP).
FTP is generally used as a means of support for the benefit of the exchange and dissemination of a
file through the Internet. FTP is also used to make the process of uploading a web page to a webserver that
can be accessed by other Internet users. Technically, the FTP application is referred to as an FTP client,
and the popular use today include Cute FTP and WS_FTP, These applications are generally used for the
transaction is two-way FTP (active FTP). This mode allows the user to perform both the upload and
download process.
E. Remote Login
Remote login service is a program that provides functionality that enables an internet user to access
(login) to a terminal (remote host) in Internet network environment. By utilizing remote login, an Internet
user can operate a remote host without having to physically deal with the host in question. From there he
Introduction of Internet 2019
can do the maintenance (maintenance), run a program or even install new programs on a remote host. A
common protocol used for remote login is Telnet (Telecommunications Network). Telnet was developed as
a method that allows a terminal to access the resource belongs to the other terminal (including the hard disk
and the programs installed in it) by way of link building through existing communication channels, such as
a modem or network adapter.
UDP, User Datagram Protocol is a connectionless TCP. This means that a packet is sent over the
network and reach another computer without making a connection. So the way to the destination of
the packet can be lost because there is no direct connection between two hosts, so its not realibel
UDP, but UDP is faster than TCP because it does not require a direct connection.
SMTP, Simple Mail Transfer Protocol is used to send electronic mail (Email). One disadvantage of
this protocol is not doing the authentication for the client, so that someone can easily use the telnet
to port 25/tcp, and send emails to anyone, and can manipulate the data source address.
POP, Post Office Protocol. Lately POP3 is the most popular standards. POP is used to receive and
read email from a web page. A POP3 daemon listening on a 110/TCP do. One disadvantage of this
protocol is to send a username and password in Clear Text, so it can easily be taken with a packet
sniffer program.
OSPF (Open Shortest Path First) & RIP (Routing Information Protocol) is used to determine the
best method of routing.
BOOTP is used to boot (usually) a diskless workstation to read the boot information on the server.
Server defaults to listening on 67/UDP.
ARP & RARP: Address Resolution Protocol. I'll explain with an example: If you want to send data
to a host and you have a MAC-address (Media Access Control, Ethernet-address) you can perform
queries to the router to obtain its IP, it is handled by the ARP, if you have sautu IP from the host
and you want to get the MAC address is, you can use RARP (Reverse Address Resolution
Protocol).
Telnet (network terminal protocol) is used to log in remotely to a computer (usually on a UNIX
system-base). Telnet sends username and password in the form of the Clear Text via network, so
easy to take someone else with a Packet Sniffer. There is a protocol called SSH (Secured Shell) is
also used to log in remotely safer: where the data to be transmitted in encrypted, so the data
obtained packet sniffer becomes meaningless. Telnet and SSH is often used in UNIX environments.
Perform a telnet daemon listening on 23/TCP and perform SSH daemon listening on 22/tcp.
Exercise
1. What is the WWW, explain and write clearly!
2. Mention 4(four) kinds of browsers that are available now!
3. What is meant by E-mail, explain and write!
4. What is a Mailing List, explain and write?
5. What is FTP and what's the point, write down?
6. Write the functions of remote login?
7. Explain what is meant by UDP? Write!
8. Write down, what is IRC and what does it do?
Introduction of Internet 2019
Date :
Name : ………………………….
Class : ………………………….
No. : ………………………….
A. Answer Sheet
1. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
2. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
3. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
4. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
5. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
6. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
7. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
8. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
9. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
Introduction of Internet 2019
10. …………………………………………………………..………………………………………………
…………..…………………………………………………………..……………………………………
……………………………………………………………………………………………………………
Date : Date :
Introduction of Internet 2019
In the virtual world of the Internet as well as many invites the hands of criminals in the act,
either to seek material gain or simply to wreak mischief. This raises a typical phenomenon often
referred to cybercrime (crime in the cyber world).
Within the scope of cybercrime, we often see the term “hacker”. The use of this term in the
context of cybercrime is actually a misnomer. The term of hacker usually refers to someone who
had a great interest to study in detail the computer systems and how to improve capabilities. The
amount of interest owned by a hacker can push salts have the ability to control the system above the
average of most users. So, the hacker actually has a neutral connotation.
As for those who frequently perform acts of vandalism on the internet is typically referred to as
“crackers” (free translation: breaker). Arguably this is actually crackers are hackers who exploit its
ability to things that are negative. Cracking activity on the internet has a very broad scope,
ranging from hijacking other people's accounts, piracy website, probing, spreading the virus to
target disablement. This latter action is known as a DoS (Denial of Services). Compared to other
modes, including the denial of the most dangerous because not only do the theft or destruction of
data on systems owned by others, but also undermine and cripple a system.
One of the cracking activity of the best known is the hijacking of a website and then change
the page display face. This action is commonly known as “defacement”. The motive of this action
vary, ranging from just a fun test "miracle" his knowledge, business competition, until political
motives. Sometimes, there is also a cracker that does this simply to show the weaknesses of a system
administrator to manage it. Other destructive activities that could be categorized as cybercrime is the
spread of a virus (worm) over the internet.
Not all of cybercrime can immediately be categorized as a crime in a very real sense. There are
also types of crimes that fall into "gray areas". One is “probing or portscanning”. This is the name for
a kind of surveillance act against another person's system by gathering as much information from the
system under surveillance, including the operating system used, the ports are either open or closed,
and so on. If the analogy, this activity is similar to the thief who did a survey prior to the intended
target. At this point the perpetrator does not perform any action against the diintainya system, but the
data that he got would be very useful for the real action that may be destructive.
Also included into the "gray area" this is a crime associated with the domain name on the
internet. Many people who do some sort of activity "brokering" the domain name to buy a domain
that is similar to a trademark or the name of a particular company and then sell it at a high price to
the owner of the brand or the company concerned. This activity is termed as “cyber squatting”.
Another activity that is almost similar to known as “typo squatting”, which is making the domain
name "pun" of a domain that already popular.
The perpetrators of “typo squatting” hope to make profits from the visitors who strayed into the
site because of typo domain names designated in the browser. In addition to crimes that require
technical skills are adequate, there is also a crime that uses the Internet only as a means. Such crimes
are not worthy classified as cybercrime, but purely criminal. Example: Such crimes are carding, ie
theft of credit card numbers belonging to others for use in trade transactions on the Internet. Also the
use of internet media (webserver, mailing lists) to spread the pirated material. Delivery anonymous
email that contains a promotion (spamming) can also be included in the sample who use the internet
SAINT JOHNS SCHOOL
Introduction of Internet 2019
crime as a means. In some developed countries, the perpetrators of spamming (which is termed as a
spammer) can be prosecuted on charges of invasion of privacy.
Cyber Law is known as “Cyber-Law”, usually contains the regulations that must be adhered to by
Internet users in the country concerned, complete with the laws and penalties for the offenders.
Nevertheless, it is not easy to be ensnared by law cybercrime perpetrators. Unlike the Internet knows
no state boundaries, then the application of Cyberlaw is still constrained by jurisdictional boundaries.
In fact, an offender does not need to be in the jurisdiction of the countries concerned to perform the
action.
Most of us already know of course what is meant by e-mail, the functions of email and so forth
associated with the name email. Therefore, prior to further elaborate on the things that make your
blog or website, it's good to know what the mean by email and all matters relating to the Email.
A. Definition of Email
Email stands for Electronic Mail. Just like an ordinary letter, e-mail function to send a letter or
message to others. Differences between letters. The email is no longer need a paper as a
medium to write the message, the media in use is a form of digital data as it travels over the
Internet.
A lot of benefits of using email , one of the most prominent is super fast message delivery
process that only takes a few minutes or even a few seconds to arrive at their destination,
although the distance between the sender and the recipient of the message so far. Different cities,
provinces or even different countries though not an obstacle.
WebMail
Webmail is a website or a website that provides email facility.
Some Web sites that provide free email:
Google mail (gmail)
Yahoo mail
And other
Email Adress.
Email Address is the address that we can be when making an email on the website email
providers.
Example email address:
[email protected]
[email protected]
MailBox
Mailbox is the mailbox URLs in general, so if there are posts from other people, then the letter
will go into the mailbox or mailboxes.
CC or BCC
CC (Carbon Copy), BCC (Blind Copy) is the same with a copy. So if you want to send a letter to
more than one person, then the other input that address into the CC.
B. Email Client.
Email Client is a tool or software easier to manage email. With your email client software does
not log into the site but the email provider directly downloaded to your computer via the
software.
Examples of email client software:
Microsoft Outlook Express
Thunder bird
And other other
Webmail is an email service that uses a web browser (Internet Explorer, FireFox, Opera, etc.) as
its email client.
Advantages of webmail is that it can be opened on different computers directly without
having to re-service setting.
Disadvantages of webmail, there is always to use the domain provider ([email protected]),
so many ads that really is not needed is also displayed so that the process of reading your
email in addition to impaired ads, also becomes slower.
Email client is a email service that uses email client (Outlook Express, Fedora Eudora,
Thunderbird, etc.).
Advantages of the most major email client is the process of reading email faster because it is
not disturbed ad, eye relief (due to no advertising, email features more structured and
unambiguous), and privacy is guaranteed.
shortcomings, to open the email on different computers, should be setting back.
SMTP, POP, and IMAP are protocols TCP / IP is used for sending emails.
For those of you who want to manage your email using an email client like outlook express or
thunder bird, you can set your email to be forwarded to the email client.
SMTP (Simple Mail Transfer Protocol). This protocol is used for sending email using
email client (Outlook Express, Eudora, thunderbird), with the identity of port 25.
POP (Post Office Protocol) is more popularly known as POP3. This protocol is used by
email client applications to download email from mail server. The workings of this protocol
is to download emails and delete emails from the mail server. so the process of reading
email on the email client application is performed “offline”. The identity of this protocol is
port 110.
IMAP (Internet Message Access Protocol). This protocol similar to POP protocol (the same
protocol for downloading emails), an excess of this protocol compared with POP, IMAP
allows email remain in the mail server. The identity of the protocol port 143.
Yahoo! Messenger is one of the yahoo facilities are very popular in the world, with yahoo
messenger we can easily interact with others either through writing, sound (voice), and can also
directly use the webcam so they can see a person through a layer the monitor. To use this service
you must have a yahoo account! Or in other words, we must have an email on Yahoo!
Sign up to the Web or Blog search engine Yahoo! (Yahoo! Search Engine)
The search engine Yahoo! (Yahoo! Search Engine) is the second largest search engine in the
world after the search engine Google. For those of you who already have a website or blog you
want to register a website or blog into a search engine Yahoo! Then you need an account in
Yahoo!.
My blog access
Mybloglog.com is one of the family of Yahoo in terms of a community on the Internet, to
register to the site is required to use your yahoo account.
And many more facilities from yahoo that you can enjoy with the requirement to use yahoo
account.
E. Making email
There are several reasons why you should create an email (account) on yahoo!, Including:
Data storage capacity is large enough. Since Yahoo provides a large capacity, then you no longer
need to delete the emails that existed before. There have been many people who use.
Yahoo! ID and Email: fill in the name ID that you want. Example: jawdev. For the
dropdown menu to choose yahoo.co.id I suggest that later can be forwarded to the
POP and SMTP access, click the "check" to check the ID is still available for use or
not. Replace ID with a new name if the ID in the input could not be made.
Password: fill in with a password that you want, suggest that the password contains a
mix between letters with numbers. Example: @ ma1La1ng (remember, password is
sensitive to small and large letters).
Retype Password: fill again with a password that had been written. Example: @
ma1La1ng
Security Questions 1 and 2: select the questions provided. For example: what is the
name of your pet?
Your answer: fill in the answer that you will remember always. For example: elephant
Enter the code in the show: fill in the numbers that appear.
Click the "Create My Account".
7. To send email click on “Write” and to check email and click “check mail”
Congratulations, you already have an account in yahoo which later can be used for a variety of
facilities that is provided by Yahoo!
F. Attachment.
In electronic mail, attachment (attachment) is a file (file) is sent together with electronic mail (e-
mail or email). Different from regular mail attachments, email attachments can form any file, for
example: a picture (*. jpg), video (*. mpg), and songs (*. wav).
The existence of the e-mail attachment email would make the size bigger. ISP or webmail
services beyond the generally limit the maximum size of any email.
Attachment certain type, such as *. txt, *. WRD, and *. html, can be compressed in order for the
attachment size becomes small.
6. When finished click the Attach Files / attach the file to include file attachments in emails,
so the display appears Upload File dialog box as follows:
7. Select the location of your file in the Look in box, and select the file you want to attach,
then click “Open” button..
8. Wait a moment until the file upload process is complete
9. After the file upload process is complete, press “Send” button to send an e-mail with file
attachments.
10. Wait a moment until the message "Sent Massage", this indicates that your message has
been successfully sent.
11. If there is no need to e-mail account, do not forget to press “Sign Out” button.
months or more, and at the request of the user itself to Yahoo! Mail
Since Yahoo! Mail account is inactive, the consequences of all that stored in Yahoo! Mail will be
deleted and can’t be restored again, during the inactive all messages received will be returned to
the sender.
But the account is not 100% either disabled or not be used again. Email could still be reactivated
by pressing the "Turn Back the Yahoo! Mail". At the end of the email can be reused.
Student’s worksheet
Name : ………………………….
Class : ………………………….
No. : ………………………….
A. Multiple Choice
1 A B C D 14 A B C D
2 A B C D 15 A B C D
3 A B C D 16 A B C D
4 A B C D 17 A B C D
5 A B C D 18 A B C D
6 A B C D 19 A B C D
7 A B C D 20 A B C D
8 A B C D 21 A B C D
9 A B C D 22 A B C D
10 A B C D 23 A B C D
11 A B C D 24 A B C D
12 A B C D 25 A B C D
13 A B C D
B. Answer Sheet
1. …………………………………………………………..…………………………………
………………………..……………………………………………………………………
…………………………
2. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………
3. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………
4. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………
5. ……………………………………………………………..………………………………
…………………………..………………………..…………………………………………
…………………………
6. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………
7. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
…………………………
8. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
9. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
10. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
11. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
12. …………………………………………………………..…………………………………
………………………..………………………..……………………………………………
……………………….
13. …………………………………………………………..…………………………………
……………………………………………………….…………..…………………………
…………………………
C. Essay Answer
1. ………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………..…………………………
2. ………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………..………………………………………………………………………
………………………………………
3. ………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………
4. ………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………..…………………………
5. ………………………………………………………………………………………………
……………………………………………………………………………………………….
………………………………………………………………………………………………
………………………………………………………..………………………………………
…………………………………………………..
6. ………………………………………………………………………………………………
……………………………………………………………………………………………….
………………………………………………………………………………………………
………………………………………..
7. ………………………………………………………………………………………………
……………………………………………………………………………………………….
………………………………………………………………………………………………
………………………………………………………………………………………………
…………………………………………………….
Date : Date :