SlideShare a Scribd company logo
Information Systems for Business and Beyond (2019)
Information Systems for
Business and Beyond (2019)
Information systems, their use in business, and the
larger impact they are having on our world.
DAVID BOURGEOIS
JOSEPH MORTATI, SHOUHONG WANG,
AND JAMES SMITH
Information Systems for Business and Beyond (2019) by David
Bourgeois is licensed
under a Creative Commons Attribution-NonCommercial 4.0
International License,
except where otherwise noted.
This book was initially developed in 2014 by Dr. David
Bourgeois as part of
the Open Textbook Challenge funded by the Saylor Foundation.
This 2019
edition is an update to that textbook.
This book was produced with Pressbooks
(https://pressbooks.com) and
rendered with Prince.
https://creativecommons.org/licenses/by-nc/4.0/
https://www.saylor.org/2011/10/open-textbook-challenge-
making-textbooks-available/
https://saylor.org/
Information Systems for
Business and Beyond
Updated edition: August 1, 2019
DAVID T. BOURGEOIS, PH.D.
JAMES L. SMITH, PH.D.
SHOUHONG WANG, PH.D.
JOSEPH MORTATI, MBA
Title Page | v
Copyright
Information Systems for Business and Beyond (2019) by David
Bourgeois is licensed
under a Creative Commons Attribution-NonCommercial 4.0
International License,
except where otherwise noted.
vi | Copyright
https://opentextbook.site/informationsystems2019
https://creativecommons.org/licenses/by-nc/4.0/
http://creativecommons.org/licenses/by/3.0/legalcode
Book Contributors
Information Systems for Business and Beyond was originally
developed in 2014 by David T. Bourgeois Ph.D.
Updates for the 2019 edition were graciously contributed by:
• James L. Smith Ph.D. (all chapters)
• Shouhong Wong, Ph.D. (chapters 4 and 8)
• Joseph Mortati, MBA (chapter 10)
Book Contributors | vii
Changes from Previous
Edition
Information Systems for Business and Beyond was written by
Dr.
David Bourgeois and originally published in 2014 as part of the
Open Textbook Challenge at the Saylor Foundation. Since then,
it
has been accessed thousands of time and used in many courses
worldwide. This 2019 update to the textbook brings it up to date
and adds many new topics. True to its open textbook roots,
many
of the updates have come from the community of instructors and
practitioners who are passionate about information systems. See
the page Book Contributors to see the primary contributors to
this
edition. A majority of the changes listed below were made by
Dr.
James Smith, who did a revision to this text in 2018.
Here is a summary of the changes made:
Overall
• New and updated images, especially those related to statistics,
in order to bring them up to date.
• References brought up to date.
• Added labs for every chapter.
• Added an index.
• Editing for consistency.
Chapter 1: What is an information system?
• Added video: Blum’s fibre optic TED Talk
viii | Changes from Previous Edition
Chapter 2: Hardware
• Removed text which discussed increasing dependency on
tablets and decreasing use of desktops
• Clarification of bit vs. byte, binary vs. digital. Added tables to
Understanding Binary sidebar
• Added Huang’s Law on graphics processor units
• Modified text regarding Moore’s Law to state that his law is
no
longer able to be maintained
Chapter 3: Software
• Added information about Ubuntu Linux
• Added Eclipse IDE
• Added information about Tableau
• Supply Chain Management: added an emphasis on use of
Information Systems up and down supply chain by Walmart to
gain competitive advantage
Chapter 4: Data and Databases
• Database schemas redesigned
• Data types added
• SQL examples include output
• NoSQL described
• Data Dictionary re-ordered to column name
• New section on “Why database technology?”
• Differentiation of data, information, and knowledge
• Section on Data models
• Changed illustrative example of database tables and
relationships.
Changes from Previous Edition | ix
• Updated section on Business Intelligence to focus on the rise
of analytics and data science. Includes a new “What is Data
Science?” sidebar.
Chapter 5: Networking and Communication
• History of ARPANET initial four nodes, etc.
• Metcalfe’s Law
Chapter 6: Information Systems Security
• Added information on blockchain and Bitcoin.
Chapter 8: Business Processes
• Introduce tools (DFD, BPMN, UML) of business process
modeling
• Introduce examples of DFD.
Chapter 10: Information Systems Development
• Java sample code
• Mismanaging Change side bar
• Added section on mobile development.
• Added sidebar on risks of end-user computing
x | Information Systems for Business and Beyond (2019)
Chapter 11: Globalization and the Digital Divide
• World 3.0 written by economist Pankaj Ghemawat; also his
TED talk video
Chapter 12: The Ethical and Legal Implications of
Information Systems
• Facebook and Cambridge Analytics data privacy
• General Data Protection Regulation section
Chapter 13: Trends in Information Systems
• Waze mapping app
• Drone video
• Drone blood delivery in Kenya video
• Added sidebar on Mary Meeker and her Internet Trends report
Changes from Previous Edition | xi
How you can help
This is an open textbook and relies on the support of its users to
stay relevant and available. Here’s how you can help:
1. Let us know you are using this textbook.
◦ If you are an instructor, please let us know you’ve adopted
this textbook by filling out the instructor survey.
◦ If you are not an instructor, please fill out the student
survey.
2. Let us know how to improve the textbook. If you have
suggestions, please let us know by filling out our feedback
form.
3. Finally, the domain, web hosting, security, backup and export
tools used by this textbook are not free. Please consider
supporting us financially through PayPal. Please note: this
donation goes directly to Imperial Digital LLC, the company
hosting and supporting this open textbook project. All
contribution are marked as donations towards this open
textbook project.
xii | How you can help
https://docs.google.com/forms/d/e/1FAIpQLSfF869qKL-
ddztjZKTLxdeqDslpuZRGlmV3ccdJAUEzUtxo8Q/viewform
https://docs.google.com/forms/d/e/1FAIpQLScdszjD9mXsCd8IB
bTraPJt8rgIJ_I2eIEJuJakqKmd31K5XQ/viewform
https://docs.google.com/forms/d/e/1FAIpQLScdszjD9mXsCd8IB
bTraPJt8rgIJ_I2eIEJuJakqKmd31K5XQ/viewform
https://docs.google.com/forms/d/e/1FAIpQLSfhClva6Vcu10_xx
FgLqWapKewr44NmoHsEy108alfomMg3bA/viewform
https://docs.google.com/forms/d/e/1FAIpQLSfhClva6Vcu10_xx
FgLqWapKewr44NmoHsEy108alfomMg3bA/viewform
https://www.paypal.com/cgi-bin/webscr?cmd=_s-
xclick&hosted_button_id=UBXGVAUNGK5U8&source=url
Introduction
Welcome to Information Systems for Business and
Beyond. In this book, you will be introduced to the
concept of information systems, their use in
business, and how information systems can be
used to gain competitive advantage.
Audience
This book is written as an introductory text, meant for those
with
little or no experience with computers or information systems.
While sometimes the descriptions can get a bit technical, every
effort has been made to convey the information essential to
understanding a topic while not getting overly focused in
detailed
terminology.
Chapter Outline
The text is organized around thirteen chapters divided into three
major parts, as follows:
• Part 1: What Is an Information System?
◦ Chapter 1: What Is an Information System? – This chapter
provides an overview of information systems, including
the history of how information systems got to where it is
today.
◦ Chapter 2: Hardware – This is a discussion of information
Introduction | 1
systems hardware and how it works. You will look at
different computer parts and learn how they interact.
◦ Chapter 3: Software – Without software, hardware is
useless. This chapter covers software and the role it plays
in an organization.
◦ Chapter 4: Data and Databases – This chapter explores
how organizations use information systems to turn data
into information that can then be used for competitive
advantage. Special attention is paid to the role of
databases.
◦ Chapter 5: Networking and Communication – Today’s
computers are expected to also be communication
devices. This chapter reviews the history of networking,
how the Internet works, and the use of networks in
organizations today.
◦ Chapter 6: Information Systems Security – This chapter
discusses the information security triad of confidentiality,
integrity, and availability. Different security technologies
are reviewed, and the chapter concludes with a primer on
personal information security.
• Part 2: Information Systems for Strategic Advantage
◦ Chapter 7: Does IT Matter? – This chapter examines the
impact that information systems have on an organization.
Can IT give a company a competitive advantage? This
chapter discusses the seminal works by Brynjolfsson, Carr,
and Porter as they relate to IT and competitive advantage.
◦ Chapter 8: Business Processes – Business processes are the
essence of what a business does, and information systems
play an important role in making them work. This chapter
will discuss business process management, business
process reengineering, and ERP systems.
◦ Chapter 9: The People in Information Systems – This
chapter will provide an overview of the different types of
people involved in information systems. This includes
2 | Information Systems for Business and Beyond (2019)
people who create information systems, those who
operate and administer information systems, those who
manage information systems, and those who use
information systems.
◦ Chapter 10: Information Systems Development – How are
information systems created? This chapter will review the
concept of programming, look at different methods of
software development, review website and mobile
application development, discuss end-user computing,
and look at the “build vs. buy” decision that many
companies face.
• Part 3: Information Systems beyond the Organization
◦ Chapter 11: Globalization and the Digital Divide – The rapid
rise of the Internet has made it easier than ever to do
business worldwide. This chapter will look at the impact
that the Internet is having on the globalization of business
and the issues that firms must face because of it. It will
also cover the concept of the digital divide and some of
the steps being taken to alleviate it.
◦ Chapter 12: The Ethical and Legal Implications of
Information Systems – The rapid changes in information
and communication technology in the past few decades
have brought a broad array of new capabilities and powers
to governments, organizations, and individuals alike. This
chapter will discuss the effects that these new capabilities
have had and the legal and regulatory changes that have
been put in place in response.
◦ Chapter 13: Future Trends in Information Systems – This
final chapter will present an overview of some of the new
technologies that are on the horizon. From wearable
technology to 3-D printing, this chapter will provide a look
forward to what the next few years will bring.
Introduction | 3
For the Student
Each chapter in this text begins with a list of the relevant
learning
objectives and ends with a chapter summary. Following the
summary is a list of study questions that highlight key topics in
the
chapter. In order to get the best learning experience, you would
be wise to begin by reading both the learning objectives and the
summary and then reviewing the questions at the end of the
chapter.
For the Instructor
Instructors: if you have adopted this book for your course,
would
you be so kind as to let us know in the instructor survey?
Learning objectives can be found at the beginning of each
chapter. Of course, all chapters are recommended for use in an
introductory information systems course. However, for courses
on
a shorter calendar or courses using additional textbooks, a
review
of the learning objectives will help determine which chapters
can be
omitted.
At the end of each chapter, there is a set of study questions and
exercises (except for chapter 1, which only offers study
questions).
The study questions can be assigned to help focus students’
reading
on the learning objectives. The exercises are meant to be a more
in-depth, experiential way for students to learn chapter topics.
It
is recommended that you review any exercise before assigning
it,
adding any detail needed (such as length, due date) to complete
the
assignment. Some chapters also includes lab assignments.
As an open textbook, support for supplemental materials relies
on the generosity of those who have created them and wish to
share them. Supplemental materials, including slides and
quizzes,
are located on the home page for this book. If you wish to
contribute
4 | Information Systems for Business and Beyond (2019)
https://docs.google.com/forms/d/e/1FAIpQLSfF869qKL-
ddztjZKTLxdeqDslpuZRGlmV3ccdJAUEzUtxo8Q/viewform
https://opentextbook.site/
materials that you have created, please fill out the instructor
survey
and communicate that fact.
Introduction | 5
https://docs.google.com/forms/d/e/1FAIpQLSfF869qKL-
ddztjZKTLxdeqDslpuZRGlmV3ccdJAUEzUtxo8Q/viewform
PART I: WHAT IS AN
INFORMATION SYSTEM?
Part I: What is an information
system? | 7
Chapter 1: What Is an
Information System?
Learning Objectives
Upon successful completion of this chapter, you will be
able to:
• define what an information system is by identifying
its major components;
• describe the basic history of information systems;
and
• describe the basic argument behind the article
“Does IT Matter?” by Nicholas Carr.
Introduction
Welcome to the world of information systems, a world that
seems to
change almost daily. Over the past few decades information
systems
have progressed to being virtually everywhere, even to the point
where you may not realize its existence in many of your daily
activities. Stop and consider how you interface with various
components in information systems every day through different
Chapter 1: What Is an Information
System? | 9
electronic devices. Smartphones, laptop, and personal
computers
connect us constantly to a variety of systems including
messaging,
banking, online retailing, and academic resources, just to name
a
few examples. Information systems are at the center of virtually
every organization, providing users with almost unlimited
resources.
Have you ever considered why businesses invest in technology?
Some purchase computer hardware and software because
everyone
else has computers. Some even invest in the same hardware and
software as their business friends even though different
technology
might be more appropriate for them. Finally, some businesses
do
sufficient research before deciding what best fits their needs. As
you read through this book be sure to evaluate the contents of
each
chapter based on how you might someday apply what you have
learned to strengthen the position of the business you work for,
or
maybe even your own business. Wise decisions can result in
stability
and growth for your future enterprise.
Information systems surround you almost every day. Wi-fi
networks on your university campus, database search services in
the learning resource center, and printers in computer labs are
good examples. Every time you go shopping you are interacting
with an information system that manages inventory and sales.
Even
driving to school or work results in an interaction with the
transportation information system, impacting traffic lights,
cameras, etc. Vending machines connect and communicate using
the Internet of Things (IoT). Your car’s computer system does
more
than just control the engine – acceleration, shifting, and braking
data is always recorded. And, of course, everyone’s smartphone
is
constantly connecting to available networks via Wi-fi, recording
your location and other data.
Can you think of some words to describe an information
system?
Words such as “computers,” “networks,” or “databases” might
pop
into your mind. The study of information systems encompasses
a
broad array of devices, software, and data systems. Defining an
10 | Information Systems for Business and Beyond (2019)
information system provides you with a solid start to this course
and the content you are about to encounter.
Defining Information Systems
Many programs in business require students to take a course in
information systems. Various authors have attempted to define
the
term in different ways. Read the following definitions, then see
if
you can detect some variances.
• “An information system (IS) can be defined technically as a
set
of interrelated components that collect, process, store, and
distribute information to support decision making and control
in an organization.” 1
• “Information systems are combinations of hardware, software,
and telecommunications networks that people build and use to
collect, create, and distribute useful data, typically in
organizational settings.”2
• “Information systems are interrelated components working
together to collect, process, store, and disseminate
information to support decision making, coordination, control,
analysis, and visualization in an organization.”3
As you can see these definitions focus on two different ways of
describing information systems: the components that make up
an
information system and the role those components play in an
organization. Each of these need to be examined.
1. [1]
2. [2]
3. [3]
Chapter 1: What Is an Information System? | 11
The Components of Information Systems
Information systems can be viewed as having five major
components: hardware, software, data, people, and processes.
The
first three are technology. These are probably what you thought
of when defining information systems. The last two
components,
people and processes, separate the idea of information systems
from more technical fields, such as computer science. In order
to
fully understand information systems, you will need to
understand
how all of these components work together to bring value to an
organization.
Technology
Technology can be thought of as the application of scientific
knowledge for practical purposes. From the invention of the
wheel
to the harnessing of electricity for artificial lighting, technology
has
become ubiquitous in daily life, to the degree that it is assumed
to always be available for use regardless of location. As
discussed
before, the first three components of information systems –
hardware, software, and data – all fall under the category of
technology. Each of these will be addressed in an individual
chapter.
At this point a simple introduction should help you in your
understanding.
Hardware
Hardware is the tangible, physical portion of an information
system
– the part you can touch. Computers, keyboards, disk drives,
and
flash drives are all examples of information systems hardware.
How
12 | Information Systems for Business and Beyond (2019)
these hardware components function and work together will be
covered in Chapter 2.
Software
Software comprises the set of instructions that tell the hardware
what to do. Software is not tangible – it cannot be touched.
Programmers create software by typing a series of instructions
telling the hardware what to do. Two main categories of
software
are: Operating Systems and Application software. Operating
Systems software provides the interface between the hardware
and
the Application software. Examples of operating systems for a
personal computer include Microsoft Windows and Ubuntu
Linux.
The mobile phone operating system market is dominated by
Google
Android and Apple iOS. Application software allows the user to
perform tasks such as creating documents, recording data in a
spreadsheet, or messaging a friend. Software will be explored
more
thoroughly in Chapter 3.
Data
The third technology component is data. You can think of data
as
a collection of facts. For example, your address (street, city
state,
postal code), your phone number, and your social networking
Chapter 1: What Is an Information System? | 13
account are all pieces of data. Like software, data is also
intangible,
unable to be seen in its native state. Pieces of unrelated data are
not very useful. But aggregated, indexed, and organized
together
into a database, data can become a powerful tool for businesses.
Organizations collect all kinds of data and use it to make
decisions
which can then be analyzed as to their effectiveness. The
analysis
of data is then used to improve the organization’s performance.
Chapter 4 will focus on data and databases, and how it is used
in
organizations.
Networking Communication
Besides the technology components (hardware, software, and
data)
which have long been considered the core technology of
information systems, it has been suggested that one other
component should be added: communication. An information
system can exist without the ability to communicate – the first
personal computers were stand-alone machines that did not
access
the Internet. However, in today’s hyper-connected world, it is
an
extremely rare computer that does not connect to another device
or to a enetwork. Technically, the networking communication
component is made up of hardware and software, but it is such a
core feature of today’s information systems that it has become
its
own category. Networking will be covered in Chapter 5.
People
14 | Information Systems for Business and Beyond (2019)
Jeff Bezos, Amazon CEO
When thinking about information
systems, it is easy to focus on the
technology components and forget to
look beyond these tools to fully
understand their integration into an
organization. A focus on the people
involved in information systems is the
next step. From the front-line user
support staff, to systems analysts, to
developers, all the way up to the chief
information officer (CIO), the people
involved with information systems are
an essential element. The people
component will be covered in Chapter 9.
Process
The last component of information systems is process. A
process
is a series of steps undertaken to achieve a desired outcome or
goal. Information systems are becoming more integrated with
organizational processes, bringing greater productivity and
better
control to those processes. But simply automating activities
using
technology is not enough – businesses looking to utilize
information systems must do more. The ultimate goal is to
improve
processes both internally and externally, enhancing interfaces
with
suppliers and customers. Technology buzzwords such as
“business
process re-engineering,” “business process management,” and
“enterprise resource planning” all have to do with the continued
improvement of these business procedures and the integration of
technology with them. Businesses hoping to gain a competitive
advantage over their competitors are highly focused on this
Chapter 1: What Is an Information System? | 15
IBM 704 Mainframe (Copyright:
Lawrence Livermore National
Laboratory)
component of information systems. The process element in
information systems will be discussed in Chapter 8.
The Role of Information Systems
You should now understand that information systems have a
number of vital components, some tangible, others intangible,
and
still others of a personnel nature. These components collect,
store,
organize, and distribute data throughout the organization. You
may
have even realized that one of the roles of information systems
is to take data and turn it into information, and then transform
that information into organizational knowledge. As technology
has
developed, this role has evolved into the backbone of the
organization, making information systems integral to virtually
every
business. The integration of information systems into
organizations
has progressed over the decades.
The Mainframe Era
From the late 1950s through the
1960s, computers were seen as
a way to more efficiently do
calculations. These first
business computers were
room-sized monsters, with
several machines linked
16 | Information Systems for Business and Beyond (2019)
http://commons.wikimedia.org/wiki/File%3AIbm704.gif
http://commons.wikimedia.org/wiki/File%3AIbm704.gif
http://commons.wikimedia.org/wiki/File%3AIbm704.gif
Registered trademark of International
Business Machines
together. The primary work was to organize and store large
volumes
of information that were tedious to manage by hand. Only large
businesses, universities, and government agencies could afford
them, and they took a crew of specialized personnel and
dedicated
facilities to provide information to organizations.
Time-sharing allowed dozens or even hundreds of users to
simultaneously access mainframe computers from locations in
the
same building or miles away. Typical functions included
scientific
calculations and accounting, all under the broader umbrella of
“data
processing.”
In the late 1960s,
Manufacturing Resources
Planning (MRP) systems were
introduced. This software,
running on a mainframe
computer, gave companies the
ability to manage the
manufacturing process, making it more efficient. From tracking
inventory to creating bills of materials to scheduling
production, the
MRP systems gave more businesses a reason to integrate
computing
into their processes. IBM became the dominant mainframe
company. Continued improvement in software and the
availability
of cheaper hardware eventually brought mainframe computers
(and
their little sibling, the minicomputer) into most large
businesses.
Today you probably think of Silicon Valley in northern
California
as the center of computing and technology. But in the days of
the
mainframe’s dominance corporations in the cities of
Minneapolis
and St. Paul produced most computers. The advent of the
personal
computer resulted in the “center of technology” eventually
moving
to Silicon Valley.
Chapter 1: What Is an Information System? | 17
IBM PC
The PC Revolution
In 1975, the first microcomputer was announced on the cover of
Popular Mechanics: the Altair 8800. Its immediate popularity
sparked the imagination of entrepreneurs everywhere, and there
were soon dozens of companies manufacturing these “personal
computers.” Though at first just a niche product for computer
hobbyists, improvements in usability and the availability of
practical
software led to growing sales. The most prominent of these
early
personal computer makers was a little company known as Apple
Computer, headed by Steve Jobs and Steve Wozniak, with the
hugely
successful “Apple II.” Not wanting to be left out of the
revolution,
in 1981 IBM teamed with Microsoft, then just a startup
company,
for their operating system software and hurriedly released their
own version of the personal computer simply called the “PC.”
Small
businesses finally had affordable computing that could provide
them with needed information systems. Popularity of the IBM
PC
gave legitimacy to the microcomputer and it was named
Time magazine’s “Man of the Year” for 1982.
Because of the IBM PC’s open
architecture, it was easy for
other companies to copy, or
“clone” it. During the 1980s,
many new computer
companies sprang up, offering
less expensive versions of the
PC. This drove prices down and
spurred innovation. Microsoft
developed the Windows
operating system, with version
3.1 in 1992 becoming the first
commercially successful release. Typical uses for the PC during
this
period included word processing, spreadsheets, and databases.
18 | Information Systems for Business and Beyond (2019)
Registered Trademark of SAP
These early PCs were standalone machines, not connected to a
network.
Client-Server
In the mid-1980s, businesses began to see the need to connect
their
computers as a way to collaborate and share resources. Known
as
“client-server,” this networking architecture allowed users to
log
in to the Local Area Network (LAN) from their PC (the
“client”) by
connecting to a …
��������� �����
���
��
��
�������
������ ���������
�
��
���
�� ��
�
�����������������������������������
���
���������
���� ������ ��
!������� ��������
��� ��
���"������"�� ���
�� #�
� �� ���# ��
#�
��
#�
��������!#��
# �
�� "�$
%
&'()*+,+-'.,-)/'0,+-12.-2),3-(435+-6-327-89,.,
5,:'7,-4+-0/2+,5-5283
;30.,'+43</=-23->?-'35->@-0'()*+,+-=2*3<-),2)/,-'.,-5,('3543<-'-
0,3+2.+94)-79'7-+9*7+-5283
'.<*(,37-43-'-5'3<,.2*+-8'=
ABCDEFDGHIDJFEKDFELFMNOPQ
R
STUVWXYUZ[VYVUZ]V]Ŝ_̀VZXâT[VSYVSbUVXcVÛSaWS
UTYdV
̂ SbTUVeX_]Yb]VXbbâ ]̂fVXYVUZ]
bSWgaTVXcVhWX
̂
V̀ iYe]̂TÙVYVjU_SYUS[Vk]X
̂ dSlVmUaf]YUTVnXo]VagVU
XVpYfVUZSUVTXW]XY]
ZSfVn̂ UU]Y[VYVbZS_o[VUZ]VnX
̂ fTVqr̂ aWgVstuvwVXYVe
ŜXaTVgSe]W]YUTVSYfVnS__TVŜXaYf
bSWgaTlVqxVUZYoVUVnSTVSYVSbUVXcVeX_]Yb][wVT
SfVXY]VTUaf]YUlVqxV_]dUWSU]_̀Vc]Ŝ]fVcX
̂ VW`
_c][wVTSfVSYXUZ]̂yVqxVUZXadZUVn]Vn]̂]VZSeYdVSVz
zzV
̂ S__̀VXYVbSWgaTwlV{X|]YTVXc
TUaf]YUTVW]UVUZ]VaYe]̂TÙVĝ]Tf]YUVUZSUVfS̀ VUXV
f]WSYfVUZSUVZ]VUSo]VSbUXYVUXV
̂ ]gafSU]Vr̂ aWg
SYfVUXVpYfVSYfVgaYTZVUZ]Vg]̂g]ÛSUX
̂ TlV}
̂UYdVgX_UbS_VTUSU]W]YUTVYVbZS_oVTVSVbXWW
XY
ĝSbUb]VXYVjW]̂bSYVbX__]d]VbSWgaT]TVSYf[V~afdYdV
ĉXWVUZ]Vga�_bV
̂ ]SbUXYVUXVUZ]VhWX
̂ V̀ ]e]YU[
WXTUVjW]̂bSYTVbXYTf]̂VUZ]Vn̂ UYdVUXV�]VSYVSbU
VXcVYX
̂ WS_Vĉ]]VTg]]bZVfâYdVUZ]VYSUXYS_
bX__]bUe]V
̂ UaS_VXcVSVĝ]Tf]YUS_V]_]bUXYlVmXVZX
nVffVUVbXW]VUXVgSTTVUZSUVWSỲVhWX
̂ V̀ TUaf]YUT
c]_UVebUWT]fVSYfVÛSaWSUT]fV�̀VYYXbaXaTVSYfV
]̂STS�_]Vd̂ S�U�
��������� �����
���
��
��
�������
������ ���������
�
��
���
�� ��
�
�����������������������������������
���
���������
���� ������ ��
!������� ��������
��� ��
���"������"�� ���
�� #�
� �� ���# ��
#�
��
#�
��������!#��
# �
�� ��$
%&'()*+,-./0,+*1(/*0',*-023-/4*510)*',6/(*-
027/(+2,2/+*617/*8//0*('9:/.*8)*;(',/+,+*,62+*)/1(
'7/(*<61,*+//&*=2:/*+&1==*,620>+*,'*'-,+2./(+?*+-
96*1+*@1=='<//0*9'+,-&/+?*.2020>*61==*A''.*10.
+'&8(/('+4*B62+*0/<*<1)*'A*='':20>*1,*,620>+*2+*+;(/1.20>
*(1;2.=)*20*,6/*CD?*,''?*<2,6*>('<20>
+,-
./0,*./&10.+*A'(*810+*'0*<'(.+?*2./1+?*+;/1:/(+*10.?*'09/*1>
120?*+'&8(/('+4*E,-./0,+*'0
8',6*+2./+*'A*,6/*F,=10,29*1(/*./&10.20>*,61,*,6/2(*91&;-
+/+*8/*,-(0/.*20,'*G+1A/*+;19/+H*<6/(/*1
+-
8+/,*'A*2./1+*10.*2./0,2,2/+*<2==*0',*8/*961==/0>/.4*I61,*'0
*/1(,6*2+*>'20>*'0J
K1(,*'A*,6/*10+</(*910*8/*A'-0.*20*9-=,-
(1=*+62A,+*,61,*617/*9610>/.*,6/*&/1020>+*'A*&10)*<'(.+
10.*9'09/;,+*-+/.*'0*91&;-
+?*&1:20>*2,*61(.*A'(*;/';=/*'L*91&;-+*,'*-0./(+,10.*<61,*,6/
;(',/+,/(+*1(/*+1)20>4*M0/*'A*-
+*[email protected]+=1&O*(/9/0,=)*;-
8=2+6/.*10*/++1)*,2,=/.*GP'09/;,*9(//;Q
K+)96'='>)R+*/S;10.20>*9'09/;,+*'A*61(&*10.*;1,6'='>)4H*51
0)*9'09/;,+*1(/*G9(//;20>H*T*,6/)
1(/*8/20>*G./U0/.*.'<0H*+'*,61,*,6/)*1(/*1;;=2/.*;('&2+9-'-
+=)*,'*&2=./(*10.*=/++*'8V/9,2'018=/
/7/0,+4
B1:/*8-==)20>4*I6/0*(/+/1(96*'0*8-
==)20>*8/>10*20*,6/*WXYZ+?*10*19,*61.*,'*&//,*A'-
(*9(2,/(21*,'
9'-
0,Q*2,*61.*,'*8/*10*19,*'A*1>>(/++2'0*.2(/9,/.*8)*'0/*'(*&'(/*
962=.(/0*1>120+,*10',6/(*962=.[*,6/
19,*61.*,'*8/*20,/0,2'01=[*2,*61.*,'*8/*;1(,*'A*1*(/;/1,/.*;1,,/(
0[*10.*2,*61.*,'*'99-(*20*,6/*9'0,/S,
'A*1*;'</(*2&81=109/4*-
,*'7/(*,6/*A'=='<20>*./91./+?*,6/*9'09/;,*'A*8-
==)20>*61+*/S;10./.*20
,<'*.2(/9,2'0+4
],*61+*9(/;,*'-
,<1(.*'(*G6'(2̂'0,1==)H*,'*/09'&;1++*0/<*A'(&+*'A*8-
==)20>?*+-96*1+*1&'0>*1.-=,+
20*,6/*<'(:;=19/*'(*721*+'921=*&/.214*5'(/*;('8=/&1,29?*,6'-
>6?*2+*,6/*9(//;20>*.'<0<1(.*'(
G7/(,291==)H+'*,61,*,6/*81(*61+*8//0*='</(/.*10.*&'(/*&20'(*
/7/0,+*0'<*9'-0,*1+*8-==)20>4*_'(
/S1&;=/?*,6/*9(2,/(21*'A*20,/0,2'01=2,)*10.*(/;/,2,2'0*1(/*'A,/
0*.(';;/.4*I61,*&1,,/(+*&'+,*2+*,6/
+-
8V/9,27/*;/(9/;,2'0*'A*,6/*729,2&4*]A*1*;/(+'0*̀abcadaef,61,*
6/*'(*+6/*61+*8//0*&1./*,'*+-L/(*20
10)*<1)?*8)*1*+20>=/*19,2'0?*,6/*729,2&*910*91==*2,*8-
==)20>4*F+*,6/*./U02,2'0*'A*8-==)20>*9(//;+
.'<0<1(.*A'(*(/+/1(96/(+?*2,*1=+'*9(//;+*.'<0<1(.*20*+96''=*+
)+,/&+?*&'+,*'A*<6296*0'<*/0A'(9/
+,(29,*10,2g8-
==)20>*;'=292/+4*B62+*&1)*/S;=120*<6)*%&'()*+,-
./0,+?*(12+/.*+209/*/=/&/0,1()
+96''=*<2,6*/S;10+27/*0',2'0+*'A*8-==)20>*10.*+-
8V/9,27/*0',2'0+*'A*729,2&6''.?*9'-=.*;/(9/27/
,6/*<'(.+*GB(-&;*hZWiH*1+*10*19,*'A*8-
==)20>?*20,2&2.1,2'0?*;/(61;+*/7/0*72'=/09/?*(/>1(.=/++*'A
,6/*20,/0,2'0+*'A*,6/*<(2,/(4
F*+/9'0.*:/)*9'09/;,*,61,*61+*9(/;,*.'<0<1(.*2+*,(1-
&14*5/.2920/*10.*;+)9621,()*'09/*(/+/(7/.
,61,*<'(.*A'(*;6)+291=*.1&1>/*,'*'(>10+*10.*,2++-/+?*+-
96*1+*1*,(1-&1,29*8(120*20V-()4*-,*8)*,6/
WXjZ+?*/7/0,+*,61,*91-+/.*/S,(/&/*,/(('(?*+-
96*1+*(1;/*'(*<2,0/++20>*1,('92,2/+*20*<1(?*</(/
(/9'>02+/.*1+*91-
+20>*='0>g=1+,20>*/L/9,+*:0'<0*1+*;'+,g,(1-
&1,29*+,(/++*.2+'(./(*NKBEkO4
B6/*'(2>201=*9(2,/(21*A'(*KBEk*(/3-2(/.*,61,*1*,(1-
&1,29*/7/0,*G<'-=.*/7':/*+2>02U910,*+)&;,'&+
'A*.2+,(/++*20*1=&'+,*/7/()'0/H*10.*<'-=.*8/*G'-
,+2./*,6/*(10>/*'A*-+-1=*6-&10*/S;/(2/09/H4*-,
20*(/9/0,*,(1-
&1*+96'=1(+62;*,6/+/*+,(20>/0,*9(2,/(21*1(/*>'0/[*=2:/*8-
==)20>?*,(1-&1*2+*0'<
1++/++/.*+-8V/9,27/=)4*]0*'0/*(/9/0,*./U02,2'0*-
+/.*8)*1*CE*l'7/(0&/0,*1>/09)?*,(1-&1*(/A/(+*,'
10),620>*,61,*2+*G/S;/(2/09/.*8)*10*20.272.-
1=*1+*;6)+291==)*'(*/&',2'01==)*61(&A-=*'(
,6(/1,/020>*10.*,61,*61+*=1+,20>*1.7/(+/*/L/9,+*'0*,6/*20.27
2.-1=R+*A-09,2'020>*10.*;6)+291=?
+'921=?*/&',2'01=?*'(*+;2(2,-1=*</==g8/20>4H*_'(*%&'()*+,-
./0,+*(12+/.*<2,620*1*;+)96',6/(1;/-,29
9-=,-
(/*,61,*/&;=')+*,62+*='<*,6(/+6'=.?*</*9100',*8=1&/*,6/&*A'(
*=18/==20>*,6/2(*(/19,2'0+*,'
GB(-&;*hZWiH*1+*1*;/(+'01=*10.*9'==/9,27/*,(1-
&14*GI/*1(/*20*;120?H*+12.*'0/*'A*,6/*+,-./0,+4
F*,62(.*:/)*91&;-+*9'09/;,*,61,*61+*9(/;,*.'<0<1(.*2+*;(/V-
.29/4*F+*'7/(,*;(/V-.29/*61+*./9=20/.
;(/92;2,'-+=)?*,6/*,/(&*61+*9(/;,*'-
,<1(.*10.*.'<0<1(.4*_'(*/S1&;=/?*,6/*9'09/;,*'A*G&'./(0
(192+&H*<1+*./7/=';/.*,'*(/A/(*,'*;/';=/*<6'*&1)*+6'<*0'*'7/(,
*;(/V-.29/?*8-,*<6'*/0.'(+/
��������� �����
���
��
��
�������
������ ���������
�
��
���
�� ��
�
�����������������������������������
���
���������
���� ������ ��
!������� ��������
��� ��
���"������"�� ���
�� #�
� �� ���# ��
#�
��
#�
��������!#��
# �
�� $�%
&'()*+,&'-).)'/-,.01.,2)30.,45,1--'*)1.56,7).0,&859:6)*5;,-:*0,1-
,'&&'-)/3,.05,:-5,'<,81*)1(
&85<585/*5-,)/,*'((535,162)--)'/-
=,>'85,85*5/.(+;,.05,*'/*5&.,'<,?)2&()*).,&859:6)*[email protec
ted],01-,45*'25
&'&:(18,1<.58,5A&58)25/.-,-0'756,.01.,).,.1B5-,2'-.,&5'&(5,-
()30.(+,('/358,.',1--'*)1.5,&)*.:85-,'<
C(1*B,&5'&(5,DE-=,F0).5,&5'&(5G,7).0,3''6,7'86-,DE-
=,416,7'86-G=
H-,7).0,4:((+)/3;,&859:6)*5,)-
,/'7,)/,.05,5+5,'<,.05,450'(658=,I<,1,&58-
'/,JKKLM,.01.,1,7'86;,<1*)1(
5A&85--)'/,'8,5E5/,1,-:4.(5,01/6,2'E525/.,21B5-
,.052,:/*'2<'8.14(5,)/,1,71+,85(1.56,.',1
&8'.5*.56,)65/.).+;,.05/,1/,1*.,'<,&859:6)*5,01-
,'**:8856=,N'8,O2'8+,-.:65/.-,-.55&56,)/,.81)/)/3
14':.,&859:6)*5,1/6,)/*(:-)'/;,.0585,)-,/',/556,.',B/'7,.05,)/.5/.)'/-
,'<,.05,2)6/)30.,*01(B58=
P05,7'86,?P8:2&@,1*.)E1.5-,1--'*)1.)'/-,.',81*)-2,)/,.05)8,2)/6-
=,P0585<'85;,1/+'/5,70',78).5-
0)-,/125,01-,*'22)..56,1/,1*.,'<,81*)-2;,&5801&-
,5E5/,.81:21.)Q)/3,81*)1(,E)'(5/*5=
R'/*5&.,*855&,6'5-,/'.,01&&5/,.',SLL,&-+*0'('3)*1(,.582-
,T,).,01&&5/-,&8)218)(+,.',.0'-5,.01.,185
:-5<:(,)/,701.,-'*)'('3)-.-
,01E5,*1((56,1,?*:(.:85,'<,E)*.)20''[email protected]=
I/,-:*0,*:(.:85-,.0585,185,.7',21)/,-':8*5-,'<,-'*)1(,&85-
.)35U,45)/3,1,E)*.)2,'8,-.1/6)/3,:&,<'8
E)*.)2-=,C:.,E)*.)20''6,*:(.:85-,6'/V.,525835,)/,.05,2'-.,81*)-
.,'8,-5A)-.,5/E)8'/25/.-,T,.05+
.5/6,.',525835,)/,)/-.).:.)'/-
,.01.,185,1(8516+,0)30(+,531().18)1/,D-:*0,1-
,O2'8+,1/6,W1(5G,1/6,)/
70)*0,.0585,185,1:.0'8).)5-,D-:*0,1-,651/-,1/6,*'((535,&85-
)65/.-G,.01.,*1/,45,5/.851.56,.',-.5&,)/
'/,.05,-)65,'<,.05,E)*.)2-=,I/,-:*0,-5..)/3-,&'().)*1(,&'.5/*+,)-
,)/*851-56,4+,12&()<+)/3,.05
/:2458,'<,E)*.)2-
,1/6,.05,653855,'<,.05)8,E)*.)2)Q1.)'/=,R'/*5&.,*855&,-58E5-
,1-,1,805.'8)*1(
751&'/,'<,E)*.)20''6,*:(.:85=
X/*5,+':,:/658-.1/6,.0)-,*12&:-,6+/12)*;,+':,*1/,2'85,51-
)(+,:/658-.1/6,.05,21/+,/57
*'/*5&.-,.01.,01E5,5258356,<8'2,:/)E58-).+,*12&:-5-,)/,.05,(1-
.,<57,+518-=
I<,1((,'<,-'*)5.+;,)/*(:6)/3,.05,*12&:-;,)-
,8)<5,7).0,4:((+)/3,1/6,&859:6)*5;,1/6,)<,&5'&(5,185,51-)(+
.81:21.)-56;,.05/,).,)-,'4E)':-
(+,1,3''6,1/6,0:21/5,.0)/3,.',&8'E)65,252458-,'<,2183)/1()-56
38':&-,7).0,-1<5,-&1*5-,70585,/'4'6+,7)((,-1+,.0)/3-
,.01.,2)30.,21B5,.052,<55(,2'85
2183)/1()-56=,Y'25,-.:65/.-,71/.,.05)8,5/.)85,*12&:-,.',45*'25,1,-
1<5,-&1*5;,5E5/,)<,.01.,251/-
.01.,/'/Z&8'385--)E5,'8,/'/Z1&&8'E56,)651-;,&8'<5--'8-,1/6,-
&51B58-,185,41//56,'8,65/)56,1
&(1.<'82,'/,.05,38':/6-,.01.,.05)8,7'86-,185,*'/-)65856,01.5,-
&55*0=,H6E'*1.5-,'<,?/'
&(1.<'82)/[email protected],7)((,-'25.)25-,-0':.,6'7/,-&51B58-
,.05+,6)-1&&8'E5,'<;,65/+)/3,5E58+'/5,)/,.05
1:6)5/*5,.05,*01/*5,.',()-.5/,.',1,-
&51B58,.05+,01E5,*'25,.',0518=
P05,+518/)/3,<'8,-1<5.+,)/,1,61/358':-,7'8(6,1(-',5A&(1)/-
,.05,38'7)/3,6521/6-,.01.,-.:65/.-
21B5,<'8,.8)3358,718/)/3-;,70)*0,185,718/)/3-,&8'<5--'8-
,185,5A&5*.56,.',3)E5,14':.,1/+,*':8-5
8516)/3-,.01.,2)30.,1*.)E1.5,252'8)5-,'<,.81:21,)/,1/+,'<,.05,-
.:65/.-=
H/6,).V-,/'.,'/(+,852)/658-,'<,81&5,.01.,185,.8)3358)/3[,-.:65/.-,-
'25.)25-,6521/6,.8)3358
718/)/3-,<'8,/'E5(-,.01.,&'8.81+,81*)-2;,*(1--)-2,'8,*'('/)1()-
2=,I.,)-,5E58+'/5V-,*'((5*.)E5,6:.+,.'
&8'.5*.,E:(/5814(5,-.:65/.-,<8'2,5A&58)5/*)/3,/531.)E5,52'.)'/-
,)/,.05,*(1--8''2=,P0'-5,70'
71/.,.',('758,.05,418,<'8,65/).)'/-
,'<,4:((+)/3;,.81:21,1/6,&859:6)*5,0'&5,.01.,.05,5A&1/-)'/,'<
.05-5,*'/*5&.-,7)((,&8'.5*.,E:(/5814(5,&5'&(5,1/6,81)-
5,.05,&:4()*V-,-5/-).)E).+,.',0182=
]5385..14(+;,.05,':.*'25-,185,()B5(+,.',45,(5--,8'-
+=,̂)(:.)/3,*'/*5&.-,'<,0182,-75((-,.05,81/B-,'<
&5'&(5,70',185,5/*':81356,.',-55,.052-5(E5-,1-
,018256;,E:(/5814(5,1/6,)/,/556,'<,&8'.5*.)'/;
70)*0,21+,*1/*5(,':.,1/+,45/5.-,31)/56,4+,856:*)/3,)/-5/-
).)E5,4501E)':8=
��������� �����
���
��
��
�������
������ ���������
�
��
���
�� ��
�
�����������������������������������
���
���������
���� ������ ��
!������� ��������
��� ��
���"������"�� ���
�� #�
� �� ���# ��
#�
��
#�
��������!#��
# �
�� $�%
&'()*+(,-.-/0-.(1*023'31*+4(5-.(6-780.9(3:'+4;+/<(73.7+1)'(74+-
)+(0/+.)0)0+'=(6-780.9(/+'740:+/
>23310.9(+?+7)'@(0.(A*07*(1+312+(73B+()3('++()*+B'+2;+'()
*43C9*()*+(2+.'(3D(-(.+A(73.7+1)(-./
/+E.+()*+B'+2;+'(0.(0)'()+4B'=
F)C/+.)'(A*3(-4+()-C9*)()3(0.)+414+)('B-22(34(-
B:09C3C'(+G1+40+.7+'(3.(7-B1C'<('C7*(-'('++0.9
>H4CB1([email protected]<(-'(0.')-.7+'(3D(:C22M0.9<()4-CB-
(34(14+NC/07+<(4-)*+4()*-.(-'()*+(34/0.-4M(D+4B+.)
3D(/0?+40.9(1+312+(A0)*(/0?+40.9(;0+A'<(73B+()3('++()*+B'
+2;+'(-'(-9940+;+/(-./(D4-902+(;07)0B'=
H*+04(;C2.+4-:020)M(/+E.+'()*+B(-./(90;+'()*+B(-(B34-2(12-
)D34B(D43B(A*07*()3(/+B-./
143)+7)03.(-./('-D+)M=(&)()*+('-B+()0B+<()*+M()M1+7-
')()*+04(3113.+.)'(-'(:C220+'<()4-CB-)0'+4'
-./(-994+''34'=
H*0'(132-40'+/(0B-9+(3D(;C2.+4-
:2+(;07)0B'(.++/0.9(143)+7)03.(D43B(;020E+/(1+41+)4-
)34'(0'(*-4/2M
-(143B0'0.9(:-'0'(D34(-(B-)C4+(-./(4+'1+7)DC2(+G7*-
.9+(3D(;0+A'(3.(7-B1C'=(5)('*C)'(/3A.(D4++
'1++7*(-./()*+(B-48+)12-7+(3D(0/+-'=(&./(0)(0'(.3)(+;+.(*+-
2)*M(D34()*+(')C/+.)'(A*3(-4+()*+
3:N+7)'(3D(73.7+4.=
OD(73C4'+(M3C.9(1+312+(.++/()3(:+(143)+7)+/(D43B('3B+(80
./'(3D(*-4B<(:C)(3;+4143)+7)03.(0'
*-4BDC2<()33<(D34(0)(7-C'+'(D4-9020)M(-
./(*0./+4'()*+(/+;+231B+.)(3D(4+'020+.7+=
&'(P-'0B(H-
2+:(130.)+/(3C)(0.(*0'(:338(QRSTUVWXTYZ<BC'72+'(.++/(4+
'0')-.7+()3(/+;+231<(:3.+'
.++/(')4+''(-./('*378()3(')4+.9)*+.(-
./()*+(943A0.9(0BBC.+('M')+B(.++/'()3(:+(+G13'+/()3
1-)*39+.'(0.(34/+4()3(DC.7)03.=(F0B02-
42M<(*+(.3)+/<(7*02/4+.(-4+(:M(.-)C4+(-.)0[D4-
902+(()*+M(9+)
')43.9+4(A*+.()*+M(2+-4.()3(4+73;+4(D43B('+):-78'<(D-
02C4+'(-./(7*-22+.9+'()3()*+04(7*+40'*+/
0/+-'=
&(C.0;+4'0)M()*-)()40+'()3(143)+7)(')C/+.)'(D43B(A34/'<(0/+-
'<(-./(94-])0()*-)()*+M(E./(C.12+-'-.)
34(+;+.(/0'9C')0.9(0'(/30.9()*+B(.3(D-
;34'=(5)(0'('+))0.9()*+B(C1(D34(94+-)+4('C?+40.9(-./(D-02C4+
A*+.()*+M(2+-;+()*+(C.0;+4'0)M(-./(+.)+4()*+(A34812-
7+=(H4-907-22M<()*+(;+4M(')C/+.)'(A*3(B3')
.++/()*+(')4+.9)*()3(D-7+(2-)+4(/0'740B0.-)03.(-
4+()*+(3.+'(4+./+4+/(A+-8+')(:M(;07)0B*33/
7C2)C4+(3.(7-B1C'=
H*+(C.4+')(3.(C.0;+4'0)M(7-B1C'+'(*-'(.3)(NC')(:++.(7-
C'+/(:M(74++10.9(73.7+1)'=(̂2-78(-./
_C'20B(')C/+.)'<(0.(1-4)07C2-4<(BC')(+./C4+(09.34-
.)(̀C+')03.'(-./(3)*+4(0./09.0)0+'()*-)(3)*+4
')C/+.)'(4-4+2M(D-7+=(a0;+4'0)M(0'(/0]7C2)<(-
./(B34+(BC')(:+(/3.+()3(B-8+(-22(D++2(A+273B+(3.
7-B1C'=(̂C)(C.0;+4'0)0+'('*3C2/(:+(7-4+DC2(.3)(+.73C4-
9+(;07)0B*33/(7C2)C4+<(23310.9(+?+7)'(-./
94+-)+4(D4-9020)M
O.+(')+1()*-)(B09*)(4+;+4'+(73.7+1)(74++1(0'()3(+G1-
./(.3)03.'(3D(/0;+4'0)M()3(0.72C/+(;0+A130.)
/0;+4'0)M<(+'1+70-22M(1320)07-2(/0;+4'0)M=(̂+)A++.(KbbJ(-
./(IJKJ<(&B+407-.(C.0;+4'0)M(D-7C2)0+'
A+.)(D43B(2+-.0.9(2+D)()3(:+0.9(-
2B3')(+.)04+2M(3.()*+(2+D)<(+'1+70-22M(0.()*+(*CB-.0)0+'(-
./('370-2
'70+.7+'=(̂C)(0D(')C/+.)'(-4+(.3)(+G13'+/()3(73.'+4;-)0;+(0/+-
'<()*+M(-4+(B34+(208+2M()3(E./()*+B
)4-CB-
)0'0.9(A*+.()*+M(+.73C.)+4()*+B(3C)'0/+(3D(7322+9+=
c2)0B-)+2M<(0)(0'()*+(')C/+.)'()*+B'+2;+'(A*3(A022(*-
;+()3(')-./(C1(-./(4+N+7)(;07)0B*33/(7C2)C4+
-./(0)'(74++10.9(73.7+1)'=(O.+(A-M()3(/3()*0'(0'()3(+B:4-
7+()*+()+4B(>/[email protected]()*+(A-M(+-420+4
-7)0;0')'(4+72-0B+/()*+()+4B(>̀[email protected]=
F)C/+.)'(-
)(+;+4M(C.0;+4'0)M('*3C2/(1C'*()*+04(')C/+.)(93;+4.B+.)'()3(
*32/(-(;3)+(3.(A*+)*+4
)*+(')C/+.)'(A-.)(-(>'[email protected](C.0;+4'0)M()*-
)(43C)0.+2M(:-.'('1+-8+4'<(A-4.'(')C/+.)'(-:3C)(.3;+2'<
-./(1C.0'*+'(')C/+.)'(-./(143D+''34'(D34('1++7*(-7)'<(34(-(>/-
.9+43C'@(C.0;+4'0)M()*-)()-8+'(.3
��������� �����
���
��
��
�������
������ ���������
�
��
���
�� ��
�
�����������������������������������
���
���������
���� ������ ��
!������� ��������
��� ��
���"������"�� ���
�� #�
� �� ���# ��
#�
��
#�
��������!#��
# �
�� $�$
%&'(%)&*)(+*&',&)-
&%)%&./'0&%)1+*2)'3(*%.+')&*)4*+/%5)%('67'+%5)60/)-
/'6%)84-&9):-2-&'/)'3,'(&-*0%
%.,9)6%)%:60/'+)*+)&9+'6&%)*1);-*:'0,'<=
>9')/'?6&'%)&96&)4*.:/)%.++*.0/)%.,9),62(.%);*&'%)4*.:/)9':(
)%&./'0&%)%'')&96&)&**)2.,9
%61'&@)-%5).:&-
26&':@5)2*+')/60A'+*.%)&960)[email protected]&9-0A)4+-
&&'0)-0),96:7=
BCDEFGEDHIEJKFHJLHEMFGCNHCOHPGQHRJSGFQCMLH
TJDKHEDKHUNCOQLLCNHCOHVMLJDQLLHQFGJWLHEF
HXQYHZCN[
DJ]QNLJF̂ H_FQNDH_WGCC̀ HCOHaMLJDQLLbHXJW[HIEL̀
EcHJLHUNCOQLLCNHEFHFGQH_WGCC̀ HCOHdL
̂ WGC̀ CSJ
WÈH_WJQDWQLe
TQ̀ VCMNDQbHPCH̀ QENDHcCNQHEVCMFHWCDWQUFHW
NQQUeHÙQELQH]JLJFHIQFQNCKCfgWEKQc b̂ CNS
>*(-,%
h'0%*+%9-(
i(-0-*0
j&./'0&%
,*22'0&
Extinction: Rebel or Else
Paragraph One: [Background information: story? facts?
Question? A general statement about the big issue of the
article?]
Paragraph Two:[More background information about issue, but
more specific]
Paragraph Three: [formally introduce the author, the article,
where it was published, it’s purpose/thesis]
Paragraph Four +: [Summarize the article.]
Paragraph: [Critique Question One: Author succeed in
purpose?]
Paragraph: [Critique Question Two: Agree or disagree and
why]

More Related Content

Similar to Information Systems for Business and Beyond (2019) .docx

Chapter 7 Does IT Matter from Information Systems for Busine.docx
Chapter 7 Does IT Matter from Information Systems for Busine.docxChapter 7 Does IT Matter from Information Systems for Busine.docx
Chapter 7 Does IT Matter from Information Systems for Busine.docx
robertad6
 
Big Data idea implementation in organizations: potential, roadblocks
Big Data idea implementation in organizations: potential, roadblocksBig Data idea implementation in organizations: potential, roadblocks
Big Data idea implementation in organizations: potential, roadblocks
IRJET Journal
 
IRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its Challenges
IRJET Journal
 
Implementation of Sentimental Analysis of Social Media for Stock Prediction ...
Implementation of Sentimental Analysis of Social Media for Stock  Prediction ...Implementation of Sentimental Analysis of Social Media for Stock  Prediction ...
Implementation of Sentimental Analysis of Social Media for Stock Prediction ...
IRJET Journal
 
MBA 5401, Management Information Systems 1 Course Lea.docx
 MBA 5401, Management Information Systems 1 Course Lea.docx MBA 5401, Management Information Systems 1 Course Lea.docx
MBA 5401, Management Information Systems 1 Course Lea.docx
aryan532920
 
Information Systems for Business and Beyond David
Information Systems for Business and Beyond David Information Systems for Business and Beyond David
Information Systems for Business and Beyond David
KiyokoSlagleis
 
Information Systems for Business and Beyond David .docx
Information Systems for Business and Beyond David .docxInformation Systems for Business and Beyond David .docx
Information Systems for Business and Beyond David .docx
carliotwaycave
 
Information Systems for Business and Beyond David .docx
Information Systems for Business and Beyond David .docxInformation Systems for Business and Beyond David .docx
Information Systems for Business and Beyond David .docx
annettsparrow
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
IBM India Smarter Computing
 
A Global Data Infrastructure for Data Sharing Between Businesses
A Global Data Infrastructure for Data Sharing Between BusinessesA Global Data Infrastructure for Data Sharing Between Businesses
A Global Data Infrastructure for Data Sharing Between Businesses
NTT Software Innovation Center
 
Social Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; Revolution
Peter Coffee
 
What if Web 2.0 Really Does Change Everything?
What if Web 2.0 Really Does Change Everything?What if Web 2.0 Really Does Change Everything?
What if Web 2.0 Really Does Change Everything?
lisbk
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)MShuibMJ
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)MShuibMJ
 
Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)
Daniel Chun
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
IRJET Journal
 
It Trends 2008 (Tin180 Com)
It Trends   2008 (Tin180 Com)It Trends   2008 (Tin180 Com)
It Trends 2008 (Tin180 Com)
Tin180 VietNam
 
IRJET- Youtube Data Sensitivity and Analysis using Hadoop Framework
IRJET-  	  Youtube Data Sensitivity and Analysis using Hadoop FrameworkIRJET-  	  Youtube Data Sensitivity and Analysis using Hadoop Framework
IRJET- Youtube Data Sensitivity and Analysis using Hadoop Framework
IRJET Journal
 
Implementation of application for huge data file transfer
Implementation of application for huge data file transferImplementation of application for huge data file transfer
Implementation of application for huge data file transfer
ijwmn
 
Governance of Data Sharing in Agri-Food - towards common guidelines
Governance of Data Sharing in Agri-Food - towards common guidelinesGovernance of Data Sharing in Agri-Food - towards common guidelines
Governance of Data Sharing in Agri-Food - towards common guidelines
Sjaak Wolfert
 

Similar to Information Systems for Business and Beyond (2019) .docx (20)

Chapter 7 Does IT Matter from Information Systems for Busine.docx
Chapter 7 Does IT Matter from Information Systems for Busine.docxChapter 7 Does IT Matter from Information Systems for Busine.docx
Chapter 7 Does IT Matter from Information Systems for Busine.docx
 
Big Data idea implementation in organizations: potential, roadblocks
Big Data idea implementation in organizations: potential, roadblocksBig Data idea implementation in organizations: potential, roadblocks
Big Data idea implementation in organizations: potential, roadblocks
 
IRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its Challenges
 
Implementation of Sentimental Analysis of Social Media for Stock Prediction ...
Implementation of Sentimental Analysis of Social Media for Stock  Prediction ...Implementation of Sentimental Analysis of Social Media for Stock  Prediction ...
Implementation of Sentimental Analysis of Social Media for Stock Prediction ...
 
MBA 5401, Management Information Systems 1 Course Lea.docx
 MBA 5401, Management Information Systems 1 Course Lea.docx MBA 5401, Management Information Systems 1 Course Lea.docx
MBA 5401, Management Information Systems 1 Course Lea.docx
 
Information Systems for Business and Beyond David
Information Systems for Business and Beyond David Information Systems for Business and Beyond David
Information Systems for Business and Beyond David
 
Information Systems for Business and Beyond David .docx
Information Systems for Business and Beyond David .docxInformation Systems for Business and Beyond David .docx
Information Systems for Business and Beyond David .docx
 
Information Systems for Business and Beyond David .docx
Information Systems for Business and Beyond David .docxInformation Systems for Business and Beyond David .docx
Information Systems for Business and Beyond David .docx
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
 
A Global Data Infrastructure for Data Sharing Between Businesses
A Global Data Infrastructure for Data Sharing Between BusinessesA Global Data Infrastructure for Data Sharing Between Businesses
A Global Data Infrastructure for Data Sharing Between Businesses
 
Social Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; Revolution
 
What if Web 2.0 Really Does Change Everything?
What if Web 2.0 Really Does Change Everything?What if Web 2.0 Really Does Change Everything?
What if Web 2.0 Really Does Change Everything?
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
 
Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)Why Web 2.0 Matters (1)
Why Web 2.0 Matters (1)
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
 
It Trends 2008 (Tin180 Com)
It Trends   2008 (Tin180 Com)It Trends   2008 (Tin180 Com)
It Trends 2008 (Tin180 Com)
 
IRJET- Youtube Data Sensitivity and Analysis using Hadoop Framework
IRJET-  	  Youtube Data Sensitivity and Analysis using Hadoop FrameworkIRJET-  	  Youtube Data Sensitivity and Analysis using Hadoop Framework
IRJET- Youtube Data Sensitivity and Analysis using Hadoop Framework
 
Implementation of application for huge data file transfer
Implementation of application for huge data file transferImplementation of application for huge data file transfer
Implementation of application for huge data file transfer
 
Governance of Data Sharing in Agri-Food - towards common guidelines
Governance of Data Sharing in Agri-Food - towards common guidelinesGovernance of Data Sharing in Agri-Food - towards common guidelines
Governance of Data Sharing in Agri-Food - towards common guidelines
 

More from annettsparrow

Initial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docxInitial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docx
annettsparrow
 
initial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docxinitial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docx
annettsparrow
 
Initial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docxInitial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docx
annettsparrow
 
Initial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docxInitial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docx
annettsparrow
 
Initial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docxInitial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docx
annettsparrow
 
Initial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docxInitial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docx
annettsparrow
 
Initial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docxInitial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docx
annettsparrow
 
Initial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docxInitial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docx
annettsparrow
 
Initial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docxInitial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docx
annettsparrow
 
Initial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docxInitial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docx
annettsparrow
 
Initial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docxInitial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docx
annettsparrow
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 
Inital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docxInital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docx
annettsparrow
 
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docxInfornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
annettsparrow
 
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docxINFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
annettsparrow
 
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docxINFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
annettsparrow
 
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
Informative Presentation Delivery OutlineI.  HeaderSpeec.docxInformative Presentation Delivery OutlineI.  HeaderSpeec.docx
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
annettsparrow
 
Informed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docxInformed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docx
annettsparrow
 
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docxINFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
annettsparrow
 
Information Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docxInformation Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docx
annettsparrow
 

More from annettsparrow (20)

Initial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docxInitial Post  (250 words)Read and interpret the short story .docx
Initial Post  (250 words)Read and interpret the short story .docx
 
initial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docxinitial post one paragraph intext citation and reference Require.docx
initial post one paragraph intext citation and reference Require.docx
 
Initial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docxInitial Post InstructionsTriggers are ethnocentric responses to .docx
Initial Post InstructionsTriggers are ethnocentric responses to .docx
 
Initial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docxInitial Post InstructionsFor the initial post,consider thr.docx
Initial Post InstructionsFor the initial post,consider thr.docx
 
Initial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docxInitial Post InstructionsFor the initial post, choose and ad.docx
Initial Post InstructionsFor the initial post, choose and ad.docx
 
Initial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docxInitial Post InstructionsDiscuss the differences and similaritie.docx
Initial Post InstructionsDiscuss the differences and similaritie.docx
 
Initial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docxInitial Post InstructionsAs we jump into the world of Alge.docx
Initial Post InstructionsAs we jump into the world of Alge.docx
 
Initial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docxInitial Post InstructionsFor the initial post, respond to one .docx
Initial Post InstructionsFor the initial post, respond to one .docx
 
Initial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docxInitial Post InstructionsAgenda setting can be a difficult t.docx
Initial Post InstructionsAgenda setting can be a difficult t.docx
 
Initial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docxInitial Post Identify all the components of a cell. Describe the fu.docx
Initial Post Identify all the components of a cell. Describe the fu.docx
 
Initial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docxInitial Discussion Board Post Compare and contrast life for col.docx
Initial Discussion Board Post Compare and contrast life for col.docx
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Inital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docxInital post please respond for the above post question one page with.docx
Inital post please respond for the above post question one page with.docx
 
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docxInfornnation Technologyin Hunnan ResourceAnEmpirical .docx
Infornnation Technologyin Hunnan ResourceAnEmpirical .docx
 
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docxINFORMED CONSENT LETTER  Page 1 of 2 SELF CONSENT .docx
INFORMED CONSENT LETTER Page 1 of 2 SELF CONSENT .docx
 
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docxINFORMATIONGOVERNANCEFounded in 1807, John W.docx
INFORMATIONGOVERNANCEFounded in 1807, John W.docx
 
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
Informative Presentation Delivery OutlineI.  HeaderSpeec.docxInformative Presentation Delivery OutlineI.  HeaderSpeec.docx
Informative Presentation Delivery OutlineI. HeaderSpeec.docx
 
Informed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docxInformed Consent FormBy the due date assigned, submit the Inform.docx
Informed Consent FormBy the due date assigned, submit the Inform.docx
 
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docxINFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
INFORMATION THAT SHOULD GO INTO PROCESS RECORDING FOR MICRO WORK.docx
 
Information Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docxInformation Technology Capstone ProjectIn this course, learners .docx
Information Technology Capstone ProjectIn this course, learners .docx
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 

Information Systems for Business and Beyond (2019) .docx