Professional Documents
Culture Documents
Unit 1 Computer Their Origin and Applications: Structure Page No
Unit 1 Computer Their Origin and Applications: Structure Page No
1.0 Introduction 06
1.1 Objectives 06
1.2 Origin of Computer 06
1.2.1 Abacus 06
1.2.2 Napier‟s Bones 07
1.2.3 Slide Rule 07
1.2.4 Pascal's Calculator 07
1.2.5 Leibniz‟s Multiplication and Dividing Machine 08
1.2.6 Difference Engine 08
1.2.7 The Analytical Engine 08
1.2.8 Mechanical and Electrical Calculator 08
1.2.9 Modern Electronic Calculator 08
1.3 Computer Generations 09
1.3.1 First Generation Computers (1940-1956) 09
1.3.2 Second Generation Computers (1956-1963) 10
1.3.3 Third Generation Computers (1964-1971) 10
1.3.4 Fourth Generation Computers (1971-present) 11
1.3.5 Fifth Generation Computers (present-beyond) 12
1.4 Computer System 13
1.4.1 How Computers Work ? 13
1.4.2 Operational Unit 14
1.4.3 System Unit 15
Perhaps Computer is the most powerful and versatile tool created by human beings. In
today‟s scenario, computer plays a major role in almost every aspect of life and
influences our lives in one way or the other. Today, you can hardly find any area which is
Computer is not influenced by computer. The word computer comes from the word “compute” which
an electronic means to calculate. Computer is also meant for calculation but it is much more than just a
device which
calculating machine. Computer is an electronic device which performs three basic tasks
performs three
basic tasks i.e. i.e., inputting, processing and outputting. A computer accepts the input through various
inputting, input devices. After receiving the input data, computer performs different operations
processing and
outputting required by the user on these input. Finally, computer generates the resultant of the
processed data as the output through various output devices. Hence, a computer is a data
processing device. This unit will provide details about computers, its origins and also
descriptions about computer‟s different components, their applications and some current
hardware platforms of computer.
Since, computer is vastly used for making calculations or controlling operations that are
expressible in numerical or logical terminology yet the development of computer started
from Abacus and its journey of development is still going on. This unit also focuses on
major development during different periods.
1.1 OBJECTIVES
Origin of computer could be rigorous efforts of men to count large numbers. This process
of counting of large numbers generated various systems of numeration like Babylonian
system of numeration, Greek system of numeration, Roman system of numeration and
Indian system of numeration. Out of these the Indian system of numeration has been
accepted universally. It is the basis of modern decimal system of numeration 0-9.
1.2.1 Abacus
Nearly 5,000 years ago, the “abacus” was developed in China in 3000 B.C. The word
abacus means calculating board. The “abacus” may be considered the first computer and
it has been used since ancient times by a number of civilizations for basic arithmetical
calculations. A modern form of abacus is given in Figure 1.1.
6
Computer their
Origin and Applications
The abacus is also called a counting frame, which is a calculating tool for performing
arithmetic operations. The Chinese abacus has a frame holding vertical wires, with seven
beads on each wire. A horizontal divider separates the top two beads from the bottom
five, sometimes referred to as the heaven and the earth beads. The arithmetic calculations
are performed by manipulating the beads by using the principle of positional weight of
beads on a rack. Abacus is used even today to teach small children how to count. A
skilled abacus operation can be as fast as a hand held calculator.
John Napier was a mathematician who became famous for his invention of logarithms.
The used of "logs" enabled him to reduce any multiplication problem. John Napier built a
mechanical device for the purpose of multiplication in 1617 A.D. The device was known
as Napier‟s bones. His "bones" are set of eleven rods side by side products and quotients
of large numbers can be obtained. The sticks were called "bones" because they were
made of bone of ivory.
English mathematician E. Gunter developed the slide rule. This machine could perform
operations like addition, subtraction, multiplication, and division. Although the slide rule
appeared in various forms during the seventeenth century, it consists of two movable
rulers placed side by side. Each ruler is marked off in such a way that the actual distances
from the beginning of the ruler are proportional to the logarithms of the numbers printed
on the ruler. By sliding the rulers, one can quickly multiply and divide.
Blaise Pascal was a French mathematician and one of the first modern scientists to
developed and build calculator. He developed a machine at the age of 19 that was capable
of adding and subtracting numbers. The machine was operated by dialing a series of
wheels, gears and cylinders.
7
Basics of Computer 1.2.5 Leibniz’s Multiplication and Dividing Machine
Hardware
Like Pascal, Gottfried Leibniz was a seventeenth century scientist who recognized the
value of building machines and built around 1673 a mechanical device that could do
mathematical calculations and save labor too.
The first step towards the creation of computers was made by an English mathematics
professor, Charles Babbage. Early on, he realized that all mathematical calculations can
be broken up into simple operations which are then constantly repeated, and that these
operations could be carried out by an automatic machine. In the 1820s Charles Babbage
started working on a „Difference Engine‟, but after ten years he abandoned it for the
„Analytical Engine‟ – the real predecessor of the Computer.
Babbage outlined the basic elements of a modern general purpose computer which was
based on the method of finite differences. It uses only arithmetical addition and removes
the need for multiplication and division which are more difficult to implement
mechanically. Charles Babbage is called the father of the computer.
The Analytical Engine marks the progression from the arithmetic calculation to general-
purpose computation. It was also developed by Charles Babbage. This machine was
based on the principle that, for certain formulas, the difference between certain values is
constant. The Analytical Engine has many essential features found in the modern digital
computer.
The Engine had a 'Store' (memory) where numbers and intermediate results could be
held, and a separate 'Mill' (processor) where the arithmetic processing was performed. It
had an internal stock of the four arithmetical functions and could perform direct
multiplication and division. It was also capable of functions like: conditional branching,
looping (iteration), microprogramming, parallel processing, latching, and polling etc. The
logical structure of the Analytical Engine was essentially the same as that which has
dominated computer design in the electronic era.
In the beginning of 19th century, the mechanical calculator was developed to perform all
sorts of mathematical calculations. Up to the 1960s, it was widely used. Later the rotating
part of mechanical calculator was replaced by electric motor. So it was called the
electrical calculator.
The electronic calculator used in 1960s was run with electron tubes, which was quite
bulky. Later it was replaced with transistors and as a result the size of calculators became
8
fairly small. The modern electronic calculator can compute all kinds of mathematical Computer their
Origin and Applications
computations and mathematical functions. It can also be used to store some data
permanently. Some calculators have in-built programs to perform some complicated
calculations. Modern electronic calculators contain a keyboard with buttons for digits and
arithmetical operations. These calculators can perform sophisticated arithmetic and
financial computations such as converting from polar to rectangular coordinates, taking
square roots, computing logarithms and trigonometric relationships.
Before ENIAC was finished, Von Neumann designed the Electronic Discrete Variable
Automatic Computer (EDVAC) with a memory to hold both a stored program as well as
data. This enabled much faster operation since the computer had rapid access to both data
and instructions. The other advantages of storing instruction were that computer could do
logical decision internally. Eckert and Mauchly later developed what was arguably the
first commercially successful computer, the Universal Automatic Computer (UNIVAC),
in 1952.
Solid-State components (transistors and diodes) and magnetic core storage formed the
Second
generation basis for the second generation of computers. Transistor is a device composed of
computers are semiconductor material that amplifies a signal or opens or closes a circuit. Invented in
characterized by Bell Labs, transistors have become the key ingredient of all digital circuits, including
the use of
transistors computers. Transistor replaced the bulky electric tubes in the first generation computer.
Transistors perform the same functions as a vacuum tube, except that electrons move
through solid materials instead of through a vacuum. Transistors were made of a semi-
conducting material and controlled the flow of electricity through the circuit. They also
allowed computers to become smaller and more powerful and faster at the same time.
They are also less expensive, required less electricity and emitted less heat than vacuum
tubes. Manufacturing cost was also very low.
It is in the second generation that the concept of Central Processing Unit (CPU), memory,
programming language and input and output units were developed. Second-generation
computers moved from cryptic binary machine language to symbolic, or assembly,
languages, which allowed programmers to specify instructions in words. These were also
the first computers that stored their instructions in their memory, which moved from a
magnetic drum to magnetic core technology. During the second generation many high
level programming languages were introduced, including FORTRAN (1956), ALGOL
(1958) and COBOL (1959).
Examples: PDP-8, IBM1400 series, IBM 1620, IBM 7090, CDC 3600
Third generation
computers are 1.3.3 Third Generation Computers: Integrated Circuits (1964-1971)
characterized by the
use of integrated
circuits (ICs) The third generation computers were introduced in 1964. Transistors were miniaturized
and placed on silicon chips, called semiconductors, which drastically increased the speed
and efficiency of computers. They used Integrated Circuits (ICs). The development of
10
ICs proved to be a milestone in the field of computer and electronics. These ICs are Computer their
Origin and Applications
popularly known as chips.
Silicon is the basic material used to make computer chips, transistors, silicon diodes and
other electronic circuits and switching devices because its atomic structure makes the
element an ideal semiconductor. Silicon is commonly doped, or mixed, with other
elements, such as boron, phosphorous and arsenic, to alter its conductive properties. A
typical chip is less than ¼-square inches and can contain millions of electronic
components (transistors). Computers consist of many chips placed on electronic boards
called printed circuit boards. There are different types of chips. For example, CPU chips
(also called microprocessors) contain an entire processing unit, whereas memory chips
contain blank memory.
A single IC, has many transistors, registers and capacitors built on a single thin slice of
silicon. Development in ICs ranges from small scale integration (SSI) to medium scale
integration (MSI). Multilayered printed circuits were developed and core memory was
replaced by faster, solid state memories. The IC technology was also known as
“microelectronics” technology, since large number of circuit could be integrated on a
single chip.
Computers of this generation were small in size, low cost, large memory and processing
speed is very high. Higher level language such as BASIC (Beginners All purpose
Symbolic Instruction Code) was developed during this period. Integrated solid-state
circuitry, improved secondary storage devices, and new input/output devices were the
most important advantages in this generation. The new circuitry increased the speed of
the computer. Arithmetic and logical operations were now being performed in
microseconds or even nanoseconds. The development of mini computers also took place
during this generation.
Examples: NCR 395, B6500, IBM 360,370
Fourth generation computers started around 1971 by using large scale of integration (LSI)
in the construction of computing elements. LSI circuits built on a single silicon chip
Fourth
called microprocessors. A microprocessor contains all the circuits required to perform generation
arithmetic, logic and control functions on a single chip. Because of microprocessors, the computers are
characterized by
fourth generation includes more data processing capacity than equivalent-sized third the use of
generation computers. Due to the development of microprocessor it is possible to place microprocessor
computer‟s central processing unit (CPU) on single chip. These computers are called
microcomputers. Later very large scale Integrated (VLSI) circuits replaced LSI circuits.
What in the first generation filled an entire room could now fit in the palm of the hand.
The Intel 4004chip, developed in 1971, located all the components of the computer -
from the central processing unit and memory to input/output controls - on a single chip.
The major innovations in this generation were the development of microelectronics and
the different areas in computer technology such as multiprocessing, multiprogramming,
time-sharing, operating speed, and virtual storage. During this period, high speed vector
processors changed the scenario of high performance computing. Mostly microcomputers 11
Basics of Computer and workstations were introduced for time shared mainframe computers. Thus the
Hardware
computer which was occupying a very large room in earlier days can now be placed on a
table. The personal computer is a Fourth Generation Computer. It is the period when
evolution of computer networks also took place.
Examples: Apple II, Alter 8800
Reliability Unreliable Less Reliable More Reliable More Reliable More Reliable
12
Check Your Progress 1 Computer their
Origin and Applications
Each computer consists of a series of devices that together operate as an integrated unit or
computer system. The processor is made up of the memory, arithmetic, logic and control
units. A large computer system will normally have one or more auxiliary units, where
input and output data are stored. A brief description of computer system is given here.
More detailed study about this will be covered in unit 2 in this block.
Input: This is the process of entering data and programs in to the computer system. Since
computer is an electronic machine like any other machine which takes as inputs raw data
and performs some processing giving out processed data, the input unit takes data from
user to the computer in an organized manner for processing. Information and programs
are entered into the computer through input devices such as the keyboard, disks, or
through other computers via network connections or modems connected to the internet.
Storage: The process of saving data and instructions permanently is known as storage.
Data has to be fed into the system before the actual processing starts. It is because the
processing speed of Central Processing Unit (CPU) is so fast that the data has to be
provided to CPU with the same speed. Therefore the data is first stored in the storage unit
for faster access and processing. This storage unit or the primary storage of the computer
system is designed to do the above functionality. It provides space for storing data and
instructions. The storage unit performs the following major functions:
(a) All data and instructions are stored here before and after processing.
(b) Intermediate results of processing are also stored here.
13
Basics of Computer
Hardware
Processing: The task of performing operations like arithmetic and logical operations is
called processing. The CPU or central processing unit takes data and instructions from
the storage unit and makes all sorts of calculations based on the instructions given and the
type of data provided. It is then sent back to the storage unit. The coprocessor or the
arithmetic-logic unit does arithmetic and logical operations. The RAM temporarily stores
information.
Output: This is the process of producing results from the data for getting useful
information. Output devices display information on the screen (monitor) or the printer
and sends information to other computers. They also display messages about what errors
may have occurred and brings up message or dialog box asking for more information to
be input. Again the output is also stored inside the computer for further processing.
In order to carry out the operations, the computer allocates the task among its various
operational units. These are 1) arithmetic logical unit, 2) control unit, and 3) central
processing unit.
The Arithmetic Logical Unit is an important component of the CPU, which carry the
14 actual execution of the instructions. After entering the data through the input device it is
stored in the primary storage unit. Then processing of the data and instruction are Computer their
Origin and Applications
performed by Arithmetic Logical Unit. The major operations performed by the ALU are
addition, subtraction, multiplication, division, logic and comparison. Data is transferred
to ALU from storage unit when required. After processing, the output is returned to the
storage unit for further processing or getting stored.
The next component of computer is the Control Unit, which acts like the supervisor
seeing that things are done in proper fashion. The control unit determines the sequence in
which computer programs and instructions are executed. Things like processing of
programs stored in the main memory, interpretation of the instructions and issuing of
signals for other units of the computer to execute them. It also acts as a switch board
operator when several users access the computer simultaneously. Thereby it coordinates
the activities of computer‟s peripheral equipment as they perform the input and output.
Therefore, it is the manager of all operations mentioned in the previous section.
The ALU and the CU of a computer system are jointly known as the central processing
unit. The term CPU relates to a specific chip or the processor. CPU may be considered as
The ALU and the
the brain of any computer system. It is just like brain that takes all major decisions, CU of a computer
makes all sorts of calculations and directs different parts of the computer functions by system are jointly
known as the
activating and controlling the operations. The fundamental operation of most CPU is to central processing
execute a series of instructions called as a program. The different chip manufacturers use unit (CPU)
different measuring standards to measure the processor‟s speed. It depends on the circuit
board that the chip is housed in, or the motherboard. The motherboard contains the
circuitry and connections that allow the various components to communicate with each
other.
Mathematician John Von Neumann conceived a computer architecture which forms the
Mathematician John core of nearly every computer system in use today. This architecture is known as Von
Von Neumann
conceived a Neumann architecture. It is a design model for the modern computers which has central
computer processing unit (CPU) and the concept of memory used for storing both data and
architecture which
forms the core of instructions. This model implements the stored program concept in which the data and
nearly every the instructions both are stored in the memory. All computers share the same basic
computer system in architecture which have memory, an I/O system, arithmetic logic unit (ALU) and control
use today
unit (CU).
16
1.4.5 Classification of Computers Computer their
Origin and Applications
Computers are available in different sizes, shapes, and weights. Due to these different
sizes and shapes, they perform different sort of jobs from one another. They can be
classified in different ways. All the computers are designed by qualified computer
architects who design these machines as per different requirements. A computer that is
used in a home differs in size and shape from the computer being used in a hospital.
Following sections are going to describe different classifications of computers. The term
“capacity” refers to the volume of work or the data processing capacity a computer can
handle. Their performance is judged by the:
The capacity of early generation computers were determined by their physical size- the
large the size, the greater the volume. In computer terms, size and speed of operation are
at present proportionate to each other. Generally, though, recent, technology is tending to
create smaller machines, making it possible to package equivalent speed and capacity in a
smaller format.
Microcomputers: The mass production of silicon chips since 1971 has made it possible
to put a “brain” into all sorts of machines. One such machine is the microcomputer. This
machine has taken fullest advantage of the use of large-scale integration on silicon chips.
The microprocessors literally contain a computer on a chip that can pass through the eye
of needle. Microcomputers memories are generally made of semiconductors fabricated on
silicon‟s chips. It is a digital computer system under the control of a stored program that
uses a microprocessor, a programmable read-only memory (ROM), and a random-access
memory (RAM). The ROM defines the instructions to be executed by the computer while
RAM is the functional equivalent of computer memory. Today microcomputers are called
as Personal Computers more commonly as PCs. These are small, relatively inexpensive
computers designed for personal use in home or offices.
Large Computers : These Computers are the ultimate in flexibility and speed. These
usually contain full control systems with minimal operator intervention. Large computer
systems range from single-processing configurations to nationwide computer based
networks involving general large computers. Large computers have internal operating
speeds measured in terms of nanoseconds, as a compared to smaller computers where
speed in terms of microseconds.
Mainframe computers are normally too expensive and out of reach from a salaried
person who wants this computer for his home. Mainframe is the second largest in
capability and size of computer family.
Supercomputers : The most expensive in price, biggest and fastest machines today are
the supercomputers that are used when billions or even trillions of calculations are
needed. Supercomputers are ultra fast computers designed to process huge amounts of
scientific data then display the underlying patterns that have been discovered. These
They are used for machines are essential for applications ranging from nuclear weapon to accurate weather
highly calculation- forecasting. Super Computers are used for highly calculation-intensive tasks such as
intensive tasks molecular modeling, climate research, weather forecasting, quantum physics, physical
such as molecular
simulations etc.
modeling, climate
research, weather
forecasting, Supercomputers are machines that have speed in the 100-million-instructions-per-second
quantum physics, range. Governments specially use this type of computer for their different calculations
physical
simulations etc. and heavy duty. Different industries also use this huge computer for designing their
products. It is also used for animation purpose. The PARAM supercomputer is one of the
supercomputer developed by India‟s Center for Development of Advanced
Computing(C-DAC) and promises processing speeds of up to 1 trillions instructions per
second. Since October 2010, the Tianhe-1A supercomputer is considered as the fastest
supercomputer in the world which is located in China. Some of the examples of
Supercomputer are: IBM Blue Gene/L, IBM Roadrunner, Cray Jaguar etc.
18
1.4.6 Classification by Technology Computer their
Origin and Applications
There are essentially two different types of computer processing. Each is made possible
by a different kind of circuitry, and each is suitable for different purposes.
Analog Computers: The name analog comes from the word “analogous”, meaning
similar. Analog signal is a continuous signal whose amplitude can take any value in a
continuous range. It can have infinite number of values. Analog computers deal with
quantities that are continuously variable. They give only approximate results. These types
of computer provide an analog or simulation of the object or system it represents. It is
especially useful for solving problems that involve relationships between variable
quantities in systems that change with time. The analog compute may express changing
relationships in output in the form of graphs. It is able to create such pictures because it
responds to changes in electrical voltages that match changes in variable quantities.
19
Basics of Computer Hybrid Computers: Although both analog and digital computers are extremely used
Hardware
and widely accepted in various industries, manufacturers have to attempt to design a
computer that combines the best features of both types. This special-purpose machine
called a hybrid computer which combines the measuring capabilities of the analog
computer and the logical and control capabilities of the digital computer. It offers an
efficient and economical method of working out special types of problems in science and
various areas of engineering. Some Hybrid machines contain special equipment to
convert analog voltages into digital voltages, and vice-versa.
Our world is full of integrated circuits (semiconductor devices with several transistors
built into one physical component). It is an electronic circuit which involves thousands or
millions of interconnected components like transistors, diodes and resistors. They are
usually called ICs. We can find several of them in computers. For example, most people
have probably heard about the microprocessor. The microprocessor is an integrated
circuit that processes all information in the computer .
The integrated circuit is nothing more than a very advanced electric circuit. An electric
circuit is made from different electrical components such as transistors, resistors,
capacitors and diodes, which are connected to each other in different ways. It is an
unbroken loop of conductive material that allows electrons to flow continuously. If a
circuit is “broken”, its conductive elements will no longer form a complete path and
continuous electron flow cannot occur. The transistor acts like a switch. It can turn
electricity on or off, or it can amplify current. It is used for example in computers to store
information.
The resistor limits the flow of electricity and gives us the possibility to control the
amount of current that is allowed to pass. For example resistors are used, among other
things, to control the volume in television sets or radios.
The capacitor collects electricity and releases it all in one quick burst. The diode stops
electricity under some conditions and allows it to pass only when these conditions
change. This is used in, for example, photocells where a light beam that is broken triggers
the diode to stop electricity from flowing through it.
The flashlight is an example of electric circuits. It contains electrical energy (dry cells) as
a source, a load (the bulb) which changes the electrical energy into light and a switch to
control the energy delivered to the load.
The transistor is the most important one for the development of modern computers.
Before the transistor, engineers had to use vacuum tubes. Just as the transistor, the
vacuum tube can switch electricity on or off, or amplify a current. So why was the
vacuum tube replaced by the transistor? There are several reasons.The vacuum tube looks
and behaves very much like a light bulb; it generates a lot of heat and has a tendency to
burn out. Also, compared to the transistor it is slow, big and bulky. When engineers tried
to build complex circuits using the vacuum tube, they quickly became aware of its
limitations. The first digital computer ENIAC, for example, was a huge monster that
weighed over thirty tons, and consumed 200 kilowatts of electrical power. It had around
18,000 vacuum tubes that constantly burned out, making it very unreliable. When the
transistor was invented in 1947 it was considered a revolution. Small, fast, reliable and
effective, it quickly replaced the vacuum tube.
21
Basics of Computer
Hardware 1.6 OPERATING SYSTEM
All computers need some sort of hardware platform to run the software; these platforms
are called Operating System (OS). Operating system is a program that acts as an interface
between user of computer and the computer hardware. The purpose of an operating
Operating
system is to provide an environment in which user can execute program in a convenient
system is a
program that and efficient manner. Operating system is an important part of almost every computer
acts as an system. It manages all resources of computer system. Operating system is installed in
interface
between user secondary memory, while it‟s some part are stored permanently in read only memory.
of computer Some part of the operating system resides in random access memory and the computer
and the
begins to execute this part of the system.
computer
hardware
The majority of modern home computers use some form of Microsoft's operating
systems. The original Microsoft operating system was called DOS (Disk Operating
System) though most computers use Windows. Windows comes in various versions
beginning with version 3.x then 95, 98, XP and currently Windows 7. A few computers
use IBM's O/S2. Apple's Mac use their own operating system beginning with OS 1
though most modern Macs use version 8.x or 9.x. Apple's latest version is OS 10.1.x.
Some computer professionals, Internet Service Providers (ISP) and mainframe computer
users use an operating system such as UNIX, Windows NT or 2000 or server based
operating systems. The operating system controls the input and output or directs the flow
of information to and from the CPU. Much of this is done automatically by the system. In
short, we can say that an Operating System is one of the most important components of
the computer software which is essential to operate a computer. When computer is
turned on, it first needs to load the operating system sometimes referred to a booting up.
It checks all its components and will usually display a message if there is a problem. It is
also known as Power on Self Test (POST). Loading the system is usually automatic.
Once the system is loaded, the user can start the application or program that he/she going
to use.
Banking : When there was no computer, every where manual system was followed
which was a very complicated and hard work but now with the arrival of computer, every
thing has become much more systematic and easy to use. Every bank is now using a
computerized system because it is very fast and user friendly. Personal Computer
banking lets us view our bank balance, request transfers between accounts and pay bills
electronically. Now-a-days, online banking is getting very popular which offers more
convenience and ease to the customers.
Traffic Light Control : In traffic light control, the computer is being employed to
orchestrate the traffic light. There are some programmed codes like turn off/on the red
light which control the traffic light and also to carry out other instructions.
22
Sports : Computers have revolutionized the sports industry. Computer is used to Computer their
Origin and Applications
maintain player records, track scores, create virtual playing field etc. The sports
equipment industry also relies heavily on computer-aided design (CAD).In sports,
computers are used in conjunction with video cameras. These are used to record the
motion of all the sports men. 3D programs are used to help the trainers see their
movements and could improve their styles of playing. Online games allow us to play with
other people regardless of their physical locations.
Schools and Colleges : There are many uses of computer in schools and colleges e.g.
every students details need to be stored so a computer program comes to help in.
Multimedia, animations, graphics and charts could be used to teach the students and
many boring topics can be made interesting using multimedia. Students could access
internet for online help and courses for more information. Computers are used in a
variety of ways in the educational field. Computers can be used in school management
such as budget, inventory, student records, communications, library circulation, and
library public access catalog.
Learning and Instruction : Computer applications can be used in education for learning
and for instruction. Instruction and learning can be divided into two major areas, teacher-
centered instruction and student-centered learning. Teacher-centered instruction
examined the computer as the object of instruction as well as a tool of instruction and the
management of instruction. With the advancement in the Technology and Internet,
Online Education, e-learning, m-learning are getting very popular which offers more
flexibility and convenience to the learners.
Student-centered learning views the computer as a tool for the student to use and create
access, retrieve, manipulate, and transmit information in order to solve a problem.
Understanding the concept of the computer as an information tool relies on accepting the
fact that the computer is a productivity tool for the student and the teacher alike.
Agriculture : Computer usage among agronomists and farmers has risen rapidly in the
recent times. With the flow of information becoming faster and easier, the agricultural
sector is also getting benefited from computer. Computer allows the farmer to collect
adequate information related to prices, latest farming techniques, weather conditions,
cultivation of crops, farm machineries etc. which enhances the decision making
capability of the farmers.
23
Basics of Computer Health Care Management and Hospital : Today almost every hospital is computerized
Hardware
and utilizing the benefits of computer. Many computer applications, such as patient
information system, monitoring and control system and diagnostic systems have been
used to enhance health care. Hospital Information System (HIS) allows to manage the
administrative, financial and clinical aspects of a Hospital more easily. It also allows easy
access to patient data from a centralized database which helps the doctor in retrieving the
history of all the patients. Computers are also being used in medical diagnosis and
surgery.
The computer can outperform human beings in speed, memory and accuracy but still the
computer has limitations. Following are the limitations of computer.
No Intelligence : Although computers are faster, more diligent, accurate and versatile
than human beings, it cannot replace them. Unlike human beings, computers do not have
any intelligence. Its performance is depends on instructions given to it. It cannot carry
any task at its own and can‟t take any decision on its own.
Self Care : Computer can not care for itself like a human. A computer is dependent still
to human beings for this purpose.
Emotionless : Computers are emotionless. They do not have emotion and feelings. A
computer can not feel about something like a human. A computer can not compete
human in respect of relations. Computers are simply machines which work as per the
instruction given to them.
Thinking : Computer can not think itself. The concept of artificial intelligence shows
that the computer can think. But still this concept is dependent on set of instructions
provided by the human beings.
Retrieval of Memory : Computer can retrieve data very fast but this technique is linear.
A human being's mind does not follow this rule. A human mind can think randomly
which a computer machine can not.
24
Computer their
1.9 SUMMARY Origin and Applications
1) Microcomputer is at the lowest end of the computer range in terms of speed and
storage capacity. Its CPU is a microprocessor. The first microcomputers were built
of 8-bit microprocessor chips. The most common application of personal
computers (PC) is in this category. The PC supports a number of input and output
devices. An improvement of 8-bit chip is 16-bit and 32-bit chips. Examples of
microcomputer are IBM PC, PC-AT.
Web link:
www.wikipedia.org
26
33
3456789585
9
947
74674
9
1!" #$%&'()*%+'$ 12
1!, -./0*%+102 13
1!1 4'56'$0$%2'789+:+%8;4'56)%0&<%=0+&>';0 13
1!1!, 4'56'$0$%2'789+:+%8;4'56)%0& 1?
1!1!1 4'56)%0&82898%8@&'*022'& 1?
1!1!A B8$:)8:0'79+:+%8;4'56)%0&2 A"
1!A C)5.0&DE2%05 A1
1!A!, F+$8&EC)5.0&DE2%05 A1
1!A!1 F+$8&E4'(02 AG
1!A!A HD4##<I$+*'(0 AJ
1!G 4'$*06%'7#$2%&)*%+'$ A2
1!J K;050$%2'74@I8$(%=0+&&';0 A3
1!L D)558&E G,
1!2 H$2M0&2%'4=0*NO')&@&':&022 G,
1!3 P)&%=0&>08(+$:2 G1
Q R
S0=810(+2*)220(+$%=06&01+')2)$+%T%=8%%=0*'56)%0&2=810)$(0&:'$0%=&'):=8
;'$:=+2%'&E'701';)%+'$!U=001';)%+'$8&E=+2%'&E+2'7%0$(+1+(0(+$%'50*=8$+*8;8$(
0;0*%&'$+*0&8TM+%=0;0*%&'$+**'56)%0&22%8&%0(.0+$:(010;'60(+$20*'$(=8;7'7%=0
1"%=*0$%)&E!D+$*0%=0$0;0*%&'$+**'56)%0&2=810)$(0&:'$058/'&%&8$27'&58%+'$2+$
%0&52'78&*=+%0*%)&8;(02+:$T*'56'$0$%2)20(8$(%=0#478.&+*8%+'$%0*=$';':+02!
V'(0&$ *'56)%0&26&+58&+;E )200;0*%&'$+**'56'$0$%27'&6&'*022+$: 0;050$%<
6&+58&E505'&E8$(.'%=58:$0%+*<'6%+*8;*'56'$0$%2W8$(2';+(2%8%0(01+*0210&E
&0*0$%;EX7'&20*'$(8&E2%'&8:0!
U=+2)$+%8+52%'+(0$%+7E%=058/'&*'56'$0$%2'78(+:+%8;*'56)%0&8$(%'(02*&+.0%=0
7)$*%+'$260&7'&50( .E %=05!H2%=0)$+%6&':&02202TM0 M+;;(+2*)228.')%%=0
8&*=+%0*%)&8;.;)06&+$%'7(+:+%8;*'56)%0&2+(0$%+7E+$:%=058/'&*'56'$0$%28$(%=0+&
&';02!U=+2+27';;'M0(.E8$+$%&'()*%+'$%'(0*+58;< .+$8&E$)5.0&2E2%0528$(
6'6);8&;E)20(.+$8&E*'(02E2%052!S0%=0$5'10%')$(0&2%8$(%=0*'$*06%'78
58*=+$0+$2%&)*%+'$%=&'):=82+56;00Y856;0T7';;'M0(.E(02*&+6%+'$'77)$*%+'$+$:'7
4'$%&';I$+%8$(H&+%=50%+*8$(B':+*I$+%!U=0)$+%*'$*;)(02M+%=8.&+072)558&E'7
;08&$+$:')%*'502!
12
3456759
9
3
44
!"#$%&'$!(#%)$(!(&*)'&!+,%)*(%)-./"0/-"!%1
23&."'!&,!("405%#6%47%'"'!*% 0.&$&!0-6%47)!"#8
23 )'."#*!0'.!("#%-"% "06(6%47%'"'!0'.!("&#&'!"#6%''"6!&%'
23)'."#*!0'.!("-0'$)0$"% .&$&!0-6%47)!"#*8
23."*6#&/"!("."6&40-0'./&'0#,')4/"#*,*!"4*8
23."*6#&/"!("/&'0#,6%."*0'.!("&#)*"8
237"#%#4&'!"#')4/"#*,*!"46%'9"#*&%'*8
23.&*!&'$)&*(/"!:""':"&$(!".0'.)';:"&$(!".6%."*8
23."*6#&/"!("<=>>0'.?'&6%."8
23)'."#*!0'.!("%#40!% 406(&'"&'*!#)6!&%'80'.
23."*6#&/"!(")'6!&%'7"#%#4"./,=%'!#%-?'&!0'.#&!(4"!&6@A%$&6?'&!B
CDEEFGHIGJCDKLM
LLJ
.&$&!0-6%47)!"#&*0'"-"6!#%'&6."9&6"!(0!#"6"&9"*.0!0+7"#%#4*0#&!(4"!&60'.
-%$&60-%7"#0!&%'*0'.7#%.)6"*#"*)-!*066%#.&'$!%07#"."!"#4&'".7#%$#04B>!#"6"&9"*
.0!0!(#%)$(0'&'7)!."9&6"N)*)0--,O",/%0#.P0'..&*7-0,*!("#"*)-!*!%*%4"%)!7)!
."9&6"N)*)0--,4%'&!%#PB--.0!07#%6"**&'$&'0.&$&!0-6%47)!"#&*.%'"/,06"'!#0-
7#%6"**&'$)'&!+0-*%O'%:'0*7#%6"**%#B:%#O&'$4"4%#,&*)*".!%*!%#".0!00'.
&'*!#)6!&%'*B Q&$)#"1BR7#"*"'!*0/-%6O.&0$#04% 0.&$&!0-6%47)!"#&."'!&,&'$!("
O",6%47%'"'!*0'.!("&#&'!"#6%''"6!&%'B
DK
K
W
GJK
94S
F6ST3U97VH64S49
4H6S64U9
12
9955798
87947 3456789585
9
947
!"#$%&'()("&*$ +,"-.&#&/$-&"'(!"/$*'(&)-& )(0!(!
1(),-123(!*,'45!"-&6-$*##(!)7!(".8!+,".9,"+,"&!': $-25!"-&
6-$*##(!)7!(";567<(#("/-&(!$%"*$ +,"-28"(#-#+$!#(/%$-=*,"(!)
(!#"-,*"($!#28"*$!"-$#&!'*$$-'(!&"#"=*,"($!$%(!#"-,*"($!#28"(#*$ +-(#'$%&
5$!"-$7!(";57<.&!>-(" "(*?@$)(*7!(";>@7<&!'-)(#"-#257*$!"-$#"
=*,"($!$%(!#"-,*"($!#/'*$'(!)"(!#"-,*"($!&!')!-&"(!) (*-$A$+-&"($!#"$
/+-%$- '%$-=*,"(!)"&"(!#"-,*"($!2>@7(#-#+$!#(/%$-+-%$- (!)
&-(" "(*&!'$)(*$+-&"($!#2B=*,"($!$%&!(!#"-,*"($!(!0$0#&$#"&+&-"#;57.
>@7?C)(#"-#<$%"5672D!*.567(#!$E!&#" $#"0("&*$ +$!!"$%&
*$ +,"-##" 2
8!+,"'0(*#&-,#'"$-&'"(!#"-,*"($!#&!''&"&"$/+-$*##'&!'$,"+,"
'0(*#'(#+&"-#,"#$/"&(!'&%"-=*,"(!)"+-$)-& 2F/$&-'.:$,#&!'
G*&!!-&-=& +#$%(!+,"'0(*#.E-&#:$!("$-.6-(!"-&!'6$""-&-=& +#
$%$,"+,"'0(*#2: $-(#,#'&#&E$-(!)#"$-&)%$-" +$-&-(#"$-(!)"'&"&
&!'(!"- '(&"-#,"#)!-&"'',-(!)+-$)-& =*,"($!25$ +,"-#,#"E$(!'#
$% $-(#4+-(&-?#*$!'&-2+-(&- $-(#$%"!-%--'"$&#C>:(!
0-'&&!),&)28"(#&-&'HE-(" $-,#'"$#"$-/$""+-$)-& &!''&"&2
G(!*C>: (#0$&"(.*$ +,"-#&#$,#&#*$!'0$% $-A#*$!'&-
$-A"$+- &!!"#"$-"*$!"!"#2D&-'I(#(#"!$!A- $0&/#*$!'&-
#"$-&)'0(*E(*#"$-#0(-",&0-"(!)$!" &*(!25$ +,"-#&#$,#
$"-- $0&/#*$!'&- $-(#(5IAC9:#.:&)!"(*"&+#&!'-*!"1&#
I-(0#"$+- &!!""&/&*,+$%"'&"&$!"$D&-'I(#$-"$"-&!#%-'&"&%-$
$! &*(!"$&!$"-2
> $-+-&*"(*&'#*-(+"($!$%&'()("&*$ +,"-*&!/)(0!/'#*-(/(!)" &J$-
,!("#&!'"(-(!"-*$!!*"($!#%$-&#(++-#$!&*$ +,"-;65<28%$,$+!"
567*&/(!"$%$,-65.$,E(!$"(*"&"("*$!"&(!#&+-(!"'*(-*,("/$&-'$!E(*
&!, /-$%'0(*#&-+,))'(!2(#+-(!"'*(-*,("/$&-'(#$%"!*&'" $"-
/$&-'2>$"- &J$-*$ +$!!"#$%"*$ +,"-&-("-+,))'(!'(-*""$"(#
$"-/$&-'$-*$!!*"'"-$,)&/,!*$%E(-#2567.C>: &!'I0(*5&-'#&-
+,))'(!0&-($,##$"#$%" $"-/$&-'2I0(*#(D&-'I(#.1$++I-(0.
5IC9: I-(0.E(*&-&""&*'"$"567*&/(!".&-*$!!*"'"-$,)E(-
-(//$!#2 $"-/$&-'&#+-(!"'*(-*,("-E(*&$E#&"#*$ +$!!"#"$
*$ ,!(*&"E("&*$"-2567*&/(!"&#$$,##&+$E-#,++,!("E(*
+-$0('#+$E-"$&"*$ +$!!"#$%"*$ +,"-##" 29!"/&*!'$%" 5$ +,"-"&#"-&E
567*&/(!".$,*&!!$"(*&!, /-$%*$!!*"($!#$"#2##$"#&-,#'"$ '&"&&#(!+,"&!'
*$!!*"0&-($,#(!+,"H$,"+,"'0(*##,*&#/$&-'. $,#.+-(!"-.#*&!!-."$" +-%$- ##0-&
*$ +,"-2 $+-&"($!#$!"#'&"&
(!$-'-"$+-$',*"
'#(-'$,"+,"#$("&*"#
K9477L969 &#&+-$*##(!),!("%$-
"$#'&"&
&(!%,!*"($!$%&*$ +,"-(#"$+-$*##"(!+,"'&"&&**$-'(!)"$&#+*(%(*
+-$)-& "$+-$',*"'#(-'$,"+,"2(#(#"-&#$!E&*$ +,"-(#$%"!0(E'
&#&'&"&+-$*##(!)'0(*2M&-($,#*$ +$!!"#$%&*$ +,"-E$-*$-!""$ 12
3456759
9
! "!!##$!%&"
44 '()*+,-./.012!33!!4#$ !%&"$
!$1!3$5"$5 !"!%6! #""$
$334$5 153 !!%&"! #1
!3$!3!$34!7#4!4!3 !4 #43##8
#!%&"! #$3 #$393$4
,:;<()=./:(;0>+?@+'A+@AAB+C(=DE/A)+/.FA@+/GA+).'+*./.+.@+:;DE/+.;*+DA)<()=@+@AHA).I
"$!"$$! ! #
$"%
&"#2# 9$ ! #7%J##
#934 !"33$5"3K$3!4
##!$!$3$94#!!$#L5433M3
! #%N !5OP4#3!$ "993!53
""2"1"15#$51913$%
Q2RR1 !$"9 "#91%J""#4
5$ 1!4#"!#4!!$4 !4 $9
S9127#$!$%&"7 "!" 3!
# 499!$!27!9$!$%
Y44 k[
9469[
Z97556[U
T6UVWVXY44Z97556[U
VWVW\]^4[U4U9
Y6U64_9
5
`#3!$ 3!!9! 2"!"293$3#!ab
bccd%&"531! 2!" "71###3
!$%&" #3!!$ $ !$ 5R534 !"
!#bQbcc93$%&"293$e33#!a$#2!
153 2fd 9 #3!!$%
g91$!" 53151$#2
1532f%h!!" !53M!$#i22Rj22!$!
$K$51!K$ !191$!4"!"$!
!$#$335a51#d%h331" 35
!$#2f31%Q$543"5"!"!!5
51$# 51! 1%&"M!!5 3"51$5
151!%
&"$#"!$$7513#$#422$3937$"2
!3$513#$#27#!$%P!4""
5"!4!$2$3"995!$3%&5#"#52
"3#$#$51!$ "$5#42#939%h2!
12 !52"!""$%P331" 231
!"#$%"#"%&" 3456789585
9
%'"#"#%() %'%%*+*
947
"# + % #"%'"#%%#"( ,#%#""&
!%%"&#"-+""" "%%&&&
%%+"+"(.++""+'"+"/*
&0%+""%'*(1 *+""%%"&+
&"'%-%+""'&%%#%(/*
+"#"%#"*(2"*&*
+"+ "+"&"%-&!-%%#%"3
%+"(4#"5(1!+"*"&'+%#*(
g"&+"
/*/+"
0%/+"
6 J"
38
4hijklmnop8q9m94785
rn<7
7 869:94;9
<<=
2> 4!?
@>0&%#"&+#"!%%?
ABCDDDDDDABBCDDDDDEFABBBCFDDDDDDFABGCDDDDDDE
@!>) HIJ&"(((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((
@%> K&"LFMNOPQRRONRFSNQFPSMSTUQFOVFQWQPXYBLZFDDDDDEF[BRYBLPYF\SP]BLQF
"#%(
5> 1 %%%#"!"&&"%"^
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
1> 1 &##&%*%"#%&%#"^
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
_> H !"'?
@>`abFBRFUBcQFDDDDDDDFOVFY]QFPO\MXYQNE
@> " @>* @>!" @'>"(
@!>) #&%#"%"?
@>&%#!" @>! @>!"*#!"
@%>1 % " HIJ "! " "% %# &
%"^
@>H"J @>0"%de%J @>f" 12
3456759
9
3
44
!"#$!"%#&'('#$")'*+",!-'&#("./&0!$"121*!&")+'-+"/1!1"*!.",'1*'.-*"12&03(1"%$3&"4567"
89:;18<=8<>2?@AB9?C;>:>DE@F8G9HF=>I<J<C>F 89HF=>I9K91929? E<E9C>ILI>C>:8<
9KM?@N91M?@N92M?@N9?M?@AO;H<:>DEF8G9HF=>IPQ12I>LI><>9C<P@@@NQ@@N1@N2A
a9HF=>I<J<C>F BCE<8R>ES;C>:DT:><J<C>F<E9D>9HF=>I<PQ12U2PQ1U1PQ2UQP128GGI>LI><>9C:EVV>I>9C
REC;=8<>IREGG WH89CECE><:><LEC>C;>V8DCC;8C8GGTVC;>FH<>C;><8F><JF=TG<X2U1UPUQYAO;>F8S9ECH:>Z
;8[>I:E<CE9DC [8GH>TV89HF=>IE<:>C>IFE9>:=TC;=JC;><JF=TG<H<>:89:C;>LG8D><8CR;ED;C;>J
<JF=TG<UVITF@CT
Ib?AcE98IJ #$!"\$!1!.*]"^+/17"12&03("_"#*"*!.`1"\(#-!"$!\$!1!.*"_47"0/*")+!.")$'**!."#*"*+3/1#.,1`"
9HF=>I<J<C>F LG8D>ECI>LI><>9C1@@@AaGC;THS;R>H<>T9GJC;>:>DEF8G9HF=>I<J<C>FE9>[>IJ:8J
XId2YUTDC8G 8LLGED8CET9<=HCC;>I>8I>F89JTC;>I9HF=>I<J<C>F<LT<<E=G>AB9V8DCUR>D89;8[>
9HF=>I<J<C>F
XIdeY89:
;>f8:>DEF8G 9HF=>I<J<C>FREC;89J =8<>IA
9HF=>I<J<C>F
XId?QY8I><TF> a9HF=>I<J<C>FREC;=8<>IREGG;8[>I:E<CE9DC<JF=TG<UVITF@CTIb?AcE98IJ9HF=>I
TVC;>VI>WH>9CGJ <J<C>FXId2YUTDC8G9HF=>I<J<C>FXIdeY89:;>f8:>DEF8G9HF=>I<J<C>FXId?QY8I>
H<>:9HF=>I <TF>TVC;>VI>WH>9CGJH<>:9HF=>I<J<C>F<E9DTFLHC>I<DE>9D>AcE98IJ9HF=>I<J<C>F
<J<C>F<E9
DTFLHC>I<DE>9D> ;8<CRT:E<CE9DC<JF=TG<@g?hiDC8G;8<<>[>9:E<CE9DC<JF=TG<@U?U2U1UKUPUQUjh89:
k>f8:>DEF8G 9HF=>I <J<C>F ;8< <EfC>>9 :E<CE9DC <JF=TG< 98F>GJ
@U?U2U1UKUPUQUjUeUlUaUcUmUnUoUpAO;>9HF=>I<RIECC>9E98L8ICEDHG8I9HF=>I<J<C>FD89
=>CI89<VTIF>:CT89>WHE[8G>9C[8GH>E98:EVV>I>9C?9HF=>I<J@<C>FApTI>f8FLG>8
9HF=>I1pE9;>f8:>DEF8GE<>WHE[8G>9CCTQ1X1M?Q NpM?QYE9:>DEF8G9HF=>I
<J<C>FAa9:<EFEG8IGJ89HF=>I1@2E9TDC8GE<>WHE[8G>9CCT?lKX1Me2N@Me?N2Me@Y
E9:>DEF8G9HF=>I<J<C>FA
q36r4sts5
a<<C8C>:8=T[>UC;>=E98IJ9HF=>I<J<C>F ;8<=8<>289:C;>I>VTI>H<><T9GJCRT
:E<CE9DC<JF=TG<@89:?Aa9J9HF=>IE9=E98IJE<RIECC>9T9GJ=JH<E9SC;><>CRT
<JF=TG<AO;THS;ECH<><uH<CCRT<JF=TG<=HCEC;8<>9THS;>fLI><<E[>1LTR>I2CT
I>LI><>9C89J9HF=>IAa=E98IJ9HF=>I?@@?C;H<I>LI><>9C<C;>9HF=>I?M2N@M2N
@M2?N?M2@ABCE<>WHE[8G>9CCT9HF=>IlE9:>DEF8G9HF=>I<J<C>FAvEFEG8IGJ??@@?
89:?@@@?I>LI><>9C9HF=>I<2P89:?jI><L>DCE[>GJE9:>DEF8G9HF=>I<J<C>FAwG>8<>
9TC>C;8CC;>=8<>E9=E98IJ9HF=>I<J<C>FE<2A
a=E98IJ9HF=>ID89=>DT9[>IC>:CTEC<:>DEF8G>WHE[8G>9C=JVTIFE9SC;><HF TV
LTR>I<TV2TVC;T<>DT>VVEDE>9C<R;T<>[8GH>E<?A
pTI>f8FLG>x
X?@?@?Y2 d 2PN2?N2@ dX2?Y?@
K 2 @
X?@@@??Y2 d 21N2?N2b2dX1b1PY?@
X?@?@A@??Y2 d 2 N2 N2 N2 dX?@A1jPY?@
O;>DT9[>I<ET9VITF :>DEF8GCT=E98IJTICT89J TC;>I=8<>bI<J<C>F E<:T9>=J
<>L8I8CE9SC;>9HF=>IE9CT89E9C>S>IL8IC89:8VI8DCET9L8IC89:C;>9DT9[>ICE9S>8D;
L8IC<>L8I8C>GJApTI>f8FLG>C;>:>DEF8G9HF=>IK?AQejPD89=>DT9[>IC>:CT=E98IJ
>WHE[8G>9CU=JDT9[>ICE9SC;>E9C>S>I89:VI8DCET9L8IC<<>L8I8C>GJU8<VTGGTR<x
12
23456784749
8
836
!"# #$ !
#$"# !$ $
!$"# % $
%"# # !
#"# ! $
!"# $ !
&'()*(+#'),-.&'/()
0*(+#')-)))1'/(-)$.2*+
'()-.&')3)(43'(
3 '(+/*13'03'(.&')5!6!$ 7
5!$!$$!6#.
8-*'3-4)11(+#()10
3-).&'0')1),-'3-)0
11(+#.&')11--)))11'3-(-)$
)-))-'*.&'03'0*(5.9:;%6-(
-*(+)311<)=
84@A784
B57CD
68
E74CFG
HIJ*5!16!$/*1(+(I
H386746
KC74L
!1"# 9 !
9"# 1 $
1"# ! !
!"# $ !
MN'3(.O-5!16!$75!!$!6#
11
3456759
9
44 3649764
!"#$%$%$$&'"( )*+(,"-.+/(,*/0!
2 2 1 '$%
#$2% $1 %$$ $%&'
1'3'3'3' 11'343'3$121
5 .6#$%$%$$&'121
747649364
8!"#'92&$:"( )*+(,";+(!<*/0!
#'92&$: 1 ' 9 2
%%$% $$%$ %$%$
= !>,(.- (.?-+@+"+"? @+*/0!0<+"A2B0+"0+(!< )*+(,"C
#'92&$:1%%$% $$%$ %$%$
D?*A6#'92&$:1#%%$%$$%$%$%$&'
364974764
8!"#$%$%%$$%$%$$$$&'"+"A )*+(,"5 E(9 .+/(,F*/0!
C"(!"+@G!/"? ,(A"A+@+G+.("0+"6(.?@!*>G20+"A+A!>,(.-0<+"A-.+/(,
)*+(,"A
#$%$%%$$%$%$$$$&'1 %%$% $%%$ $%$% $$$$
' H I J
D?*A6#$%$%%$$%$%$$$$&'1#'HIJ&$:
K8L8KM36495
= ?( A (!,+!"?("-+@+"(,./>*"!A*A A+@(,A"?("?( "N-+A"+."(,*A(-
"?! E+A"A(-+!."((,@<0"N 0+(!<A+@(,A(-0+(!<-+@+"A/>*"!A",<
/(+>*,("*/0!A0*"(,A"?!-+A.!" ,/ "AG+G!/("+D? -+A"+."-+A.!"
)*("+"+A.(0 !>!A"-0<(@!*>G0+(!<-+@+"A#ON(A0+"A&J!E(/>,6"
!>!A""N-+GG!")*("+"+A*+)*,<"NA</0,A(! A*GG+.+"(-?.
0+(!<-+@+"#+"?!%!$&N+,,0 A*GG+.+""*+)*,<!>!A""? "NA</0,A;*"
0+"N+,,"A*GG+. +G ?(A"!>!A"/! "?("N)*("+"+AP"?A .(AA
/! "?( 0+"A(! !)*+!-6+"? 0+"A?( "*A-!>("-,<J! E(/>,+GN
?( "@+ *+)* .-AG!"?! -+A"+."+"/AN -(",(A"'0+"A=+"?"N0+"A
N .(?( .-A%%6%$6$%(-$$Q*"G"?+AN .(*A G+!A""?! "(AA+@*+)*
.-A""?! -+A"+.")*("+"+A(-,( "? G*!"? **A-P@!(,6(B0+"
0+(!<.- .(0 *A-"!>!A"' -+A"+.")*("+"+AD?*A@!*>G"N0+"A.(
!>!A"G*!-+A"+.")*("+"+A"?!*@?*+)* A</0,A%%6%$6$%R$$D?! 0+"A.(
0 *A-"!>!A"+@?"-+A"+.")*("+"+A0<*+)* A</0,A%%%6%%$6%$%6%$$6$%%6
$%$6$$%R$$$P"?!SN!-A6"(AA+@*+)* .-A"/-+A"+."+"/AN -("
12 ,(A"S0+".- A*.?"?("' T1/
!"#$ "%"$ &"&"""& 3456789585
9
"!'!()''*'+""'!,"!""
947
#!-*"$"+#'"''".$&'(/','
""!&$!#'012"$'"$*''&'"$ &'
"""$"!"#$ #(3#'""""
$ #$'&%% &4 "$5(6"#!"#$
$"$# (70$&""$"!,38099$&
"&""'"!*""$%#!$,2"$&+9""
"$:&$;<#=$ "# $$!"#$ # (
>?@?@A
BCCDE5869F
3"'"$' "54$$,GH'!"$"'
#! ' ""% "$ 'H(/'&2,"&I
! .$$'"' ;G JHK,!G J1G "&&"=(
)'&* +" ' H!$ $"'"' 38099"
""#(L*+,'"$"'"HK' ;" '"$
*"$ "$ '=,'++" +"M"$ $&""
'M!'"$(38099$ " ' +"!$' $ "!,'!,
"" #!
$"&#%# "'%#!$(38099 "$ &3"8"$$0$& "$'"
9"&"9"'"(9N "'"$$ &"" "!, '
OPQROSTUVWXQYZ[UYOU\]ZXV^_S]PVXOZ`X]URTaX[]ZUa]PX[ROaO[UTaVbXcUdVXOXVTeTZXS\UX[]`TWXSYUXf]aX
OPPXQaO[U\[OPXQYaQ]VTVX\UdVXOZXT\gRUXS\UX[]`TWXhRTaTXT\gRURXS\UX\VXO``T`Xf]aXQOa\U^bX/!G(5
!*"'38099$'(
ijkl>?mn
BCC9Foj7
7
;;;<;;<;;<<;;<;;<;< =1>?@
<;<<;;;;<;< 5!#"2@
;<<;;<;;<;<;;;;;<;< ?@A;@
B"(("("+(*(!"!'"'("(")(-"
*(!"%!"'%'()('(#"*-!'(")456
',.!'''(("'(*'("*#(;;;"'456 '
=+1+? "' @ <;;<+;;<<+;;<; "' ;<;< !(2#$,. ("("
;;;<;;<;;<<;;<;;<;<!"=1>?@,3((##$+(""'("("+(
*(!"!'"'("(")()*(!($!"'
!!(",C%2+(( 2$(!#$!(#!,
D#%#'! !#-"' !*#!(")"@;;
("("(",E$ "F(!"'(""*%$7'(#$+
)(+$,G2+'"! "! ##("
"#)"*,."("("("'"5HI #'(#$ !("
@;*(,
J-("("("(""'"!("2#2 !#-1"
!("%( #(!# $#,0"("(" $#$!(##$ ("2#2E+
6'+J-"'K(*F $#,6(")E $#("("('
$,6(")6' $#("("(!'*$ "#"(
5HI+%()"(&!(""'((")()"#1('-
("(",.(&!(""-''(")J- $# !#
("(""'"$#)"'"%("*F$'(")K(
*F $#,/"("(" $#$#("2#2"!"' $#,.
. "#"( "#"((!"(*#2##"#"' '("("("("-(",B
(!"(*# )"(&!("()'%('#)(%(#!
2##"# (!) 1",J-(")!) ("2#2-(")#)
"' '("(" "*("("("+%2$("("("-("1(
("(" -(")2#(&!(",
-("
LMN :O:P:QRSTUVWXQYR:8ZZTO:
.5HI( !#-B5 (!2(")(##(""(,/"("'#(+
5HI[('"((*#!75"#I"(\5I]+/(( ^ #)( I"(
\/I]"'D)(,.5HI (!(("'%( !""
12 !)$*\!("'%("*']%(
!"#$$ !$%&%% !'(!)'*+, 3456789585
9
-+$./0
947
38
412345576685
78659:;<7=4<
./,$$>
8<7<,-,!%%$$+$?'@
$AB$-,$%C$??,$-,?,?'D,./
+0
EF8<GH8<8IJ
8<7<0!%+$?%$$$%,!$--A
$!!$-,$A?$!$+$'
EF9579JK:7674<>
8<7<0!%A?-!-$%-%$,
+$,+-'
D,9579J8587,+-,$!,-,-$%-%$, D,9579J8587
L-!!-A?,+-'M+A%$%- ,+-,$
,!--?-'M-"-$!,,$++,+-'M! !,-,-$%
-%$,
-$L$,+--$!%$$L-,$,?$%MNO L-!
%!'M$!-$$,+-B%$$A !-A?,
"-$!,&P/+$+-%!-"$%!$,$ +-
+$'M$ $$% $,(-, -?-!-
L-!'Q,,!--,%"$,R!--S+$
,-,%AL-!%%L-!,!-'/$$
$L-!-S+$'D,$,%$?,-,/
-$ $ , -S+$0,!, $ ,$%% -"A? $% $
+$$A&$?T.P&U$AA?$%$.$$A@$%O?C?
T.@OCU' D,-+$
-,$$-
?T$.@OC
M,$%%-",$++A$-,!-$%-R!-S -,+U,-,
+$A$%+$?%,,+-'M$B? ,R!-
$$?$,!,-$A%%'M.P& -,R!--S -S+$
+$A$%L-!$!-%$$.P&$A'MC-
+$ -", - , -! +-% A? $ -+$'
C-+$+-,-S+$'D,-+$-,$$-
?T$.@OC-,+U,-,,R!--S+$'&$$!
+-,$B$!-T!-,$@MV+-U,$B,$%%
-- ,$ -+$ - !% +- ,$B $
!-'C,%MV+-!-+$-' 12
3456759
9
66749676!"!#$%&'( !!)*!++,"#%$#-!#-)
44 !./+$0)!+$"#!$.$./!!1&(2&'(#0#!./--$#,+".3#.0.0
/!!.$ 45(!./ . !6.0 #*+3!)6170*#819"#.45(."*
!./$*"*1
:6;<=>?66749676
@!!!#"#./ $45( .#0#!./ #*+!#!+$$#/.#0#1
4))*-*+!$#$.*) #0#A) B#, %#C*.+, */ /*#.0 45(
$"#!$.145(!-!.,$##0#*)!%+!0!./!*#0#2A)./)!
.%$#-!$.!3$* $"#!$.!./#*+145(!+$0)-"+-./ $"#%$#-
$"#!$. +6 !//$.2 -*+"+)!$.2/B$.2%.02)$-"+-. )1
$"#!$.!#"#%$#-/ $. #"#./ .*-3#23$ .0#!./ %+$!.0 "$.
.*-3#1
D$/#. "#$)$# .$A!/!, !B A$ /.%!3+ #./ A) -"#$B #
"#%$#-!.)$!-*)0#+B+1!#*$%$.)"&!)--$#,!./!B.0
-$# !. $. "#$)$#)$# $. !- E& )"1&!) --$#, ! %!
-)$./*)$#--$#,A))!.3*/ $ -"$#!#+,$#.#*)$.!.//!!!
!#%#C*.+,#%##/3, "#$)$#1F,!B.0%#C*.+,#%##/.#*)$.!./
/!!!B!+!3+. "#$)$#2A!),)+.#$/*)//*$--$#,#%#.)!#
-.-G/ !./ .) "#$)$#"#%$#-!.)-"#$B! +$14.$#-$/#.
).C*$%!B.0-$# !.$."#$)$#)$#$. !-E&)" #$"#%$#-
H)*$.$%.#*)$.."!#!+++!./.) "#%$#-!.)$% "#$)$#
-"#$B!+$1
I 7JK9L955M
NO &$$3!+#.!BP
Q!ORSTUVWXYZSXY[\]^V\X_YSV_Y[X[\[S_`Saaaaaaaa
QO45( QOb"#!$# QOb")$/cb"#!./ QBO&(
Q3OdeZV^\XYfSUYSXY[\]^V\X_YSXYg_hgZ[SZeZV^\X_YS_`S[ZgZ]Uhaaaaaai
QO-)#$j$"#!$. QO"#$0#!- QO)$.#$+0.!+
Q)O45(#"$.[XkhZS̀_]Saaaaai
QO 0.#!.0 )$.#$+ 0.!+ QO -)#$"#$0#!- C*.).0
QO!#-)c+$0)
Q/OlWZSWU]mnX]ZmSV_Y\]_hS^YX\SX[Saaaaaii
QO"#-!..2.$.j-$/%!3+ QO-!/$%'obD QO#!!3+
QOpqrSWU[S̀_hh_nXYfS\n_SsXYm[S_`S]ZfX[\Z][aaaaa
QO*#jB3+c)$.#$+ QO"#$0#!-)$*.#c%+!0 QO45(c&(
12
!"#$%%"&'&(%#'')%!"#%'* 3456789585
9
++++++++++++++++++++++++++++++++++
947
++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++,
-.!!(/"'("00!%''#''%""'1
++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++,
1 2" ! /'3 %!''0% ("")'('%""'"')'&0
')%*
++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++,
456 7899
:;
<!"#!"'(#%('# ' !%')'"'(0%')#( !'"*=
(0%')#!">?@AB)'AC# (D## "%'"# )"*E0
%')#"#"$0#0*<!$#)$"")"'0'#" ' /'&#(
'''0%*E%)#)$"(!$""("$%'("'$0
'%""($ !%')#*<!#("%$"!=F>CC(@%'(%'("")"
$*=F>CC" !%'(#"( '')' %!0$/ 3$'( (
%')#*@%'("#&"%'("")/(#"('&!C*<!#"'
'(#%('#/! !%'% (') ')%!"#%'*="#%'
%%&'&"%!A(%'(A%#(/$%3%%"*<!!3%')'"'
>?@ G>@A=2@ ( 0""*>@ %''"( %''(" !%#' '
"#%'"*=2@%#')" !''"*>?@0""/'3" )'
"'0'%#0"#%'"*
45H
I7JK:7LMNKO;M8:P:MQ:K77
R6S;94P9
TTU
2 V>?@AB)'AC#AD## V$>'%""0@
V%1WWXYYW
Z=%')#%%"/("# ('%"""V')0%')#'"A
)#'"(')0%*''(#%)0#"#*E#'"3['$
$0'%""0%%'(0'#""#%'"A"('"('%""'*
-Z=0#0%')"0'$#)$""#"( '"%)%!"#%'"
(0%')#"*\&)%!"#%'""($#]#$%'(*
1ZV V$ V%
12
3456759
9
79955
44
! " #
2$%&' !()*' "$%&'
+,-.//.0#' *%'1&%'#2034'&51&'"0#'60%'4'%78'79%'**0523'8'7!0%#:
$3%0&;323'8'7!0%#<'"5'52'%=#'">)#;2*?2@)'22'%*06)93!'2*5#
"'%25023'%*7>!0)**&"3*9&5"2&205>%8*5#*9'")"3%"@2'%*:$3'%'6C0%'?
>5>&>06*A!2**%'1&%'#20"0#')935&>'%""3%"2'%*2 B@1?!&22 B+2
* 5*&66"'52:D0<'4'%?23' 5''# 20 %'9%'*'52>0%' 235 @1 "3%"2'%*20
5"0%90%2')0<'%"*'5#&99'%"*')'22'%*5#*9'")"3%"2'%*?>#',-.//EF
!2"0#':
1G5"0#'<*#'4')09'#**25#%#60%23'"05**2'52'5"0#5;?%'9%'*'522055#
35#)5;062'A2'A9%'**'# 5>0*20623'<0%)#H*<%25;*7*2'>*:G5"0#'"05**2*
06%'9'%20%'06>0%'235=E?==="3%"2'%*"04'%5;I=*"%92*:/2*23'&54'%*)
'5"0#5;*"3'>'345;*9'")*;56"5"'60%/52'%5'25#>&)2)5;&)"0>9&25;
79955J
! " # '
2KA'"&20506>"35'5*2%&"205 540)4'*('2"3?L'"0#'?KA'"&2'5#M%2'N"8
"&!"7")'*:,55*2%&"205"7")'>7)*0540)4'09'%5#6'2"3"7")'*:
+$3'%'%'23%''<7*06#'*;55;23'"052%0)&52OD%#F<%'#"052%0)?PQ,5#
R "%0F9%0;%>"052%0):
1$3'2<02'"350)0;")2%'5#**''5 5>0#'%59%0"'**0%*20 >9%04'9'%60%>5"'
5")&#'9%04*050605F"39""3'>'>0%75#345;>&)29)'9%0"'**5;"0%'*05
23'*>'"39:
ST UVWXYWWYZ[\]^_
`
M ))>-2))5;?abcdefghìhjklmnkfmblk̀lop̀hqrmfgqfehg?@23K#:?P'%*05K#&"205:
s:tu%>5?velokcglfkwxb̀ỳabcdefghx?PD/:
z{|6}~
3229O"0>9&2'%:30<*2&66<0%8*:"0>
12
33
3 345678
845
D.%!(0#!%&<{-;%&
%!
5
2345634893
8
!"#$%&#''&()')*#+,-)."/0-'#-.'&)#.).# '#"!-#!#.%!1")!)
)"2-.%'!.&!%-'3/"%.#&!4+%!-!(#&-0!#.5
6(#
7%'4%*#!(#(0),.)%8%!()')0#0-.+)"9'!4%*#!(#.#%'):)&4!+%
!(#,.)%!()!.#;4)!#'!(#:&!%-%;-:)44).!'-:!(#,-"+/)&-0!#.()')
&-!.-4<%!=
7>?@(%&(&-!.-4'%!'#!%.#-#.)!%- %&4"%;%!'%!)"-!!
"#$%&#'5
A.-&#''%;-:")!)%'"-#%!(#).%!(0#!%&)"4-;%& %!1BC735!#.:-.0'
D.%!(0#!%&)"4-;%&-#.)!%-''&()')""%!%-/',!.)&!%-/0 4!%4%&)!%-)"
EFGFHFIJKLMNONLPQNLRIOELSTIUFVWLFHLXHNELYNVZXHNLZLVI[\XPNOL]XJ^F_NLZ&)4&4)!-.3()'
!(#&))&%!+!-"-4-;%&)4-#.)!%-')4'-/'&()'&-0).#!@-0,#.'/)":%"-!
@(%&(-:!(#!@-0,#.'%';.#)!#.5
`ab8c %!%')%0-.!)!&-0-#!-:)&-0!#.@(#.#)44!(#")!))"
%:-.0)!%-).#'!-.#"%!(#:-.0 IdLYFJZOeLEFUFPHL]VI[YFJZPFIJLIdLfgHLZJELhgHiLZJEL
.#!.%#$#"@(##$#.#&#'').+5j-0!#.'+'!#0' '#)$).%#!+-:"#$%&#':-.'!-.%;
`ab8c %'!.&!%-')"")!)56(#&-0!#.0#0-.+%'!(#4)&#@(#.#!(#&-0!#.(-4"'")!)
%!%') )".-;.)0'!()!).#% '#5j-0!#.0#0-.+.#:#.'!-!(#(+'%&)4"#$%&#'%)
%0-.!)! VI[\XPNOKLkdLIXOLVI[\XPNOgHLlmnLQZELPILVIJHPZJP^eLZVVNHHLPQNLQZOELEOFGNLPILONPOFNGNLNGNOeL
&-0-#!-:)
&-0!#.@(#.# %#&#-:")!)%!.#o%.#'/!(#-#.)!%-@%44,#$#.+'4-@5p!(#-!(#.()"/@(#!(#
)44!(#")!))" ")!)-.%:-.0)!%-%'*#!%0#0-.+!(#jAq&))&&#''%!0 &(0-.#o%&*4+5r.-0
%:-.0)!%-).# !(#!%0#!(#&-0!#.%'!.#"- !%4!(#!%0#%!%''(!"-@/!(#jAq%'&-'!)!4+
'!-.#"%!(#
:-.0-:,%).+ '%;!(#0#0-.+'+'!#056(#)&!-:#!#.%;")!)%!-)'!-.);#4-&)!%-%'&)44#")
"%;%!' 0#0-.+@.%!#-#.)!%-/)"!(#)&!-:.#!.%#$%;")!):.-0)'!-.);#4-&)!%-%'&)44#")
0#0-.+.#)"-#.)!%-5s)!))"%'!.&!%-').#0-$#"/!-)":.-0 0#0-.+/%
,&(#'-:@-."4#;!(56(#'#0#0-.+"#$%&#').#&)!#;-.%'#")&&-."%;!-)&&#''!%0#/
'!-.);#&))&%!+)"&-'!<#.<,%!-:'!-.);#5
t)'#"-!(#'#&.%!#.%)0#0-.+%',.-)"4+&)!#;-.%'#"%!-!@-!+#'u
A.%0).+-.0)%0#0-.+1)4'-&)44#"'#0%&-"&!-.0#0-.+35
v#&-").+-.)w%4%).+0#0-.+10);#!%&0#0-.+2p!%&)40#0-.+35
11
! "#$%&%# 345678
845
%#$%'#&%#
()*+4, -./ , 0122474344 *45443 3456714
6444 (154
67)74 4)8)418 96:*1 62 67)74
;715)78 545678 < = >?
4463@)78 545678 =%! ? A%!
B"#%#$CDEBCFE&GHIJKLMNIOOLJJNKPQLBJQIRRLMNJKSMITLN
OIUIOPKVBWPTWLMNOSJKNULMNXPKNSHNJKSMITLB %Y%%#%#
Z
[%IOOLJJNKPQLBJKSMITLNOIUIOPKVOSJK\XPKNJKSMITLB%#G$
CDEBCFEB>]^B<%YY#^BE? ^BE?
YB_`]CFEB
`a`& ?%%^%%##b
cd=%%%#CDEBCFE
cdE?%#>]^B<%YY#^BE?Y
cdFY%#_`]CFEB`a`
D_"%?e$_"e& %Y#'#G
% %%
%Y%%#B %!%^%%!fY% ?
%#%!g%Y%? %#BY
#Y%?Y
%#B^%!
f%!%B! #G%!$Y#%#& nonpqZrqrstuZ
!
GG#? $^#_"e% %%%#&B! _"e
%GY% %Y %#
_%Y%# % ?%%%h6+)1+4i63jh6+)1+4
k%]G%E%##Y% %Y%#!
%%%GY%!%!l'Y%k%]a%E%#
C]%#%#$CFE&B%#B%YF%B
a%%#% %!Y%!?%%C%D E%#
$CDE&B!% %%% %"#=%?B#Y%G%
%#m %Y%!BG#? %CDE%
%%_"eY%Y%?B%#
%#??%%#[ %%
%%G#?G#?
% %%?
%#BY#Y%?Y%#B^%!nonpqZrqrstuZ
!_"e%#$%!<?v&
%G
%#% %Y%#B!%#%?
%#B^%!545678 w147)74w8
_"e?B_
%#B%#G%%#%?GD%?%#
#%?!#% %B!% %Y%?
%GY%
12
3456759
9
44
>+$! 9?s
>(*.0, 47t
9
6946469
!"#$%&!$"'('$))*+$!),-./&%.!%".0+1(.01+!$2+"$.!+!3%".0+1(3(4$/(%%&/#+%
3$%56"+7(89:6:;:+!3<=>6?<=>("/@A(+)%.3$%/&%%"#(*(*.0,#$(0+0/#,'#$/#
$!/)&3(%*+$!*(*.0,+!3#$1#%7((3*(*.0,%&/#+%/+/#(*(*.0,@
B 3CDEFGDH
I-"(01.$!1"#0.&1#"#$%&!$"8,.&%#.&)3J(+J)(".K
LM3$--(0(!"$+"(J("'((!",7(%.-*(*.0,+!3!((3%.-"#(*(*.0,%,%"(*N
LM3$--(0(!"$+"(J("'((!4+0$.&%",7(%.-*(*.0$(%%&/#+%%(*$/.!3&/".08*+1!("$/
+!3=7"$/+)*(*.0,N
LM3(%/0$J("#(4+0$.&%%(/.!3+0,%".0+1(3(4$/(%%&/#+%O+03P3$%58-).77,3$%58
9:P<=>8:;:P<=>("/N+!3
LM3(%/0$J("#($*7.0"+!/(.-"#(*(*.0,#$(0+0/#,@
DQRSTUHEQSVDUDGFDH
>(*.0,$%+!$*7.0"+!"/.*7.!(!".-+/.*7&"(0'#(0(+))"#(3+"++!3$!-.0*+"$.!+0(
WXYZ[\]^_]X̀[]aYZb]Ya]c^_dZe]\^f^XW]ghYbc^_dX^Y_]Ya]ijW]d_\]kjWl]d_\]Z[XZ^[m[\]n`[_[m[Z]
!(/(%%+0,@
o#(0(+0("'.*+$!-&!/"$.!%.-"#(*(*.0,K
LMo.%".0(70.10+*%83+"++!3$!-.0*+"$.!$!"."#(/.*7&"(0@
LMo.%".0("#(0(%&)"%.-/.*7&"+"$.!@
I/.*7&"(0%,%"(*&%(%+4+0$(",.-3(4$/(%-.0%".0$!1"#($!%"0&/"$.!%+!33+"+@A#(!
,.&'+!"".(p(/&"(+/.*7&"(070.10+*8"#(70.10+*#+%".J($!*(*.0,@I!,$!7&"
3+"+ !((3(3 -.070./(%%$!1 J, "#+"70.10+* %#.&)3 +)%. J( $! *(*.0,@I))"#(
$!"(0*(3$+"(0(%&)"%+!3.&"7&"%-0.*"#(70.10+*+0(%".0(3$!"#(*(*.0,&!"$)"#(
*+/#$!($%"&0!(3.--@
o#(%".0+1(3(4$/(%.-+/.*7&"(0%,%"(*+0(0+!5(3+//.03$!1"."#(-.)).'$!1/0$"(0$+K
q@MS77556o#$%$%"#("$*(0(r&$0(3".)./+"(+!30("0$(4(%".0(33+"+-0.*"#(
%".0+1(&!$"$!0(%7.!%(".+70.10+*$!%"0&/"$.!@o#+"$%"#("$*($!"(04+)J("'((!
"#(0(+36'0$"(0(r&(%"+!3"#(+4+$)+J$)$",.-"#(3+"+@I-+%"+//(%%"$*($%+)'+,%
70(-(00(3@
12
674 8!"# $%" %&' 345678
845
(%&#)#*)%!%%"
+,6 47 - 6. 674 #!%&!%&/ %&#)#*
01#)%$!%&(1*)%!%%"2!(&(3
#
4" $/"#%%5)%!((1&%6"!%*
*%#(*""% #)%7
8-94 :;< 345678 => ?@764
9;A6; 884 6. 345678 ?@764
B CDEFGHHEDIHJ N2%((!&)"%&%1#
=47=9 K,?LM %%()%#%"%")%%*
545674 (#1%#()%#&"
?7578 K5=M N!"(%&%*$(1%
545678 )%#% %*O%%* %* !%
##5((%%&#)#*"&%#
)%$%&
N2%*##""%#(*$*)%#%
%)%&%""1#%#%%(* ""
$*POQ2POQ##"%#(*1
%*23! %*
6)(($#!&#/((
*)!%*
+
46=>78 K67 NS#"%*%*(*"!%$(6%&
@R978M T %&U ! )%&%5 " " %
545678 !%#(%&%#)#*
%*$(1%
N V/((*)!%*%*
!1%5#)(%5$(%"!()#6&55
(%&"!(#
2!%$/"#51# %3!((1&)7
NS#"%*%* # $##""%#(*$*POQW%!% !
%T1# ""$*POQ!%#%%)%#&U%!%%"
%*" !% # $##"!% !
%*X%"V"6"!())*"6%# #"%*%
"#)%
NS#"%*%&*!!%(%&%&#)#5(1#)%$"
"##Y&#"T#Z[\]]^_`abcb"def`_`abcbU/
$ "!%#)%)!%(&4""/""5%
#)%"!%%#)%"!%5%g%&%%&#)#*
%"!%"%&#!%#"&!#(*&%
Nh)#(%&"/#!!%&%%&"*(1%#'PiVjhY
# $" )#(%&"/#Y*!1%#)!!%$
)%&*"))(# !1% PiVjhY"*2#(&* 12
3456759
9
!"#$%"&"!'$"&'('
44 '$'$)#$% ' %$"#"#$# $$(#"#$#
*+(,'$"-&./'$!"#'$ 0
123"%$45&##$( #"#!"# "! "$# "#($% '$
!"#46'&&'#&" %((#"#($$(##!##0
-#"#&"!( &$"#54"/ 477985/'$"
# &$"!&#" (4('##&#"(# $$%"
9:;#&$#09"##% 5( &$"#"#
"#'$#'" "#$0< (6&$'!!#/
"#$9:;0-"#&$/9:;$"#0
, 4 $%"#&#"(#""!"#"$4
%""&'#!"#!'##&#" (09"# "'=0>
"?0> / ' "!"#0- "!
"# "'>=6@=0A'"! %#("5&"!
"#$&"$?"B&#"!"!"#0- "!
"#($% ' #$$4 #'#$"$ * .0
-""""### "/C('#B0BD
9 :## M"$#
XY N"# N"# N"#
E6FGHGIJ98647765
K"/' #/"#"#(L""!&## "#(0,&##"##
"#( " ""&'#0C('#B01"&# $!!#& "!
"## "!&5 &$5"&#"!"#( !""/ D
M5!5)&%
3(#
9
NN"#
N(+4OP#'"#
N(-&53", 0
Q#(5"/5&
E6FGHRIS94F646T59
795US
4T74
47684V9
5
,"#$% ("#L$"#("#D
12M"$'"#*"#N."#
12N("#
12W&"#
12
! "#$$% 345678
845
!&#'&"
$ ($"
($")*$!+
*," -$"
-!./
,'! *!"
-!
0./
123474 5678
67934 54:29 ;6<
=44: 9>: ;9=9;28 79:4?6@@
A!! &!#&!!#$
BC*$!$$ $!"#$"D$!
&!"! '",(E
BC
$!$$"!! F
!$F!
!*$G$#$!$$"HI-H0-
BC
$!$$"#$! D!$&
BC
$!! $$&$ $!$$"
J"!$!$$"
"! F
"
!#$#! /I$!!'$!
&$!$$"
G$#$!$$"KL/#" /$! /!
M&!'&!L$! "#F
"#$$"
N9=9;28
H OLP!)!!!+
,$$" OLP!
HI- OLQO!
- LPO$)$!+
R;;4 254
123474 56S 8 N9=9;28 T6 9;;4?254
0!!UF'!!" !##
/D!#$!&! #$!/!'$I!
G$#/! #$$",.H0- ),$./HL0!"
-$"+0!"!##! / I! /
F""POVJDF"!G!F! !## 12
3456759
9
12 !"#$$!%#&'()!%*)#$)$!%%!&(+#"
44 !&%#,+-$)./&$&#&!%+$%0)#!'%.#$#,&!*&
121345 61#'#2#1#,3%4&5(!70)(#&%*/$,!-)
!"#$%#, ( ##!* .'$$#( 0/88 )!*)!(
$)$##$!-)%#$+%.#!+((!$)&!!'#
94:;<=<>?447656759
@9A97?B9;9C65
97?B9;9CA j4 9
i7755@9 k9;46;l i7755 im4C795
594C j9Bm9;46; 96 np5l:6o
6 n6B57o
H(#$!&%+$! q$!&#$ 3&%!( 6! 2!# 2r 2
5(!# 1#$7
5'&#$5(!# 5'&#$ HI+&#d3&% D!&.!# 2 2s
!(
4"#$5(!# 4"#$ 3&%!( D!&.!# 2t
6/(7
D!))*!/#$()!%!-$$#&'#&-!(#!&-!(.#!+((!
%.#$E
FGHI+&#!#$$J!
FG1#$!3&%!($$
FGK LMNOMPQRSTUSVVMWW((! %.#$%% #& I+&$X& !)*!%J
#&-!(#!&!&#%.#$$&!&/#.%#&)(I+&$#&*)#$)#
#!%1#$!%%!&-&!)#&"%(#&%I+&$6+$)#&
&+(#$!%7!&!'(%#+(HI+&#"!$#&'#I+#+#/-!+$)
""#$#!&#,""#!&!-(!&)"#"J!(!&)$!&#$/#$J
*)$)%%&%!/$$%#&+&X-!+*!,#&'*#)I+&#
$$%.#$&%#&-!(#!&#!%)%%J)&%!%)
%%$&&!/$$%+&#"$%#&'!$#!&#&)I+&$)./&
.%0)#!$#&'&#&%#.#%+#(!-%I+#$)#&')$!%%
%!&)"+&#)%#%#(#!$%
FGK I+&#$$((!+$)YZ[\]^_`a^Zb]#!'&#c%/&'#&'
((!$#&#&I+&$0)%!&!).+&#I+!'%%)$&
/%#$%%%X&%J%#"&%#-!*##&'&%##.%
#%+#&'%
3%d*#)%
e6C<=f>ghB64;i7755@9A
12
!"#$%#&'$##"#()($&!'*#++*, 345678
845
($##$%!"#',)($!$&!'+-,($##$%!"#
)!#..&/#'$(,01($#'#,&!&+$%&2&!*2,$%$
%$&3.#$#425%1#01!!&!465)#!#"#!1((,!#
..&/#'$(, 01($#' 2#$%1$&%#3 $%&13% $%& $&3 .#$#+
73$#!#8!9:;<7 &$,.#(&!'$&3!"#+=,!$
&&!$&!'3$#&.$#(!#8)!!#&$(,#..&/#'$(,
$%'$#'.&#!+>%?#31&@+A%201$#("&1!#&$$&3B
;!C2&#$%!
DEFG74 HIJK LMNO65 PQQ4 345678
RMEQ
67MF4 DGNOM54NMS
:$#.&!!$&!#'.1$&,$'$%&13%$%.&&)
TUTVWXYZ[V\YX\]^_ZTW[V\`[_Z^Ù\[Z\WaT\VY]bcWTXd`\V[XVc[WXe\f[Tg\hijk\YX\[Z\WaT\]Tl[^\[W\
c`T`\f[gTg\]^_ZTW[V\m[`nkg\oa[`\[`\V^UUTl\^\pWqYr`W^WTs\YX\RENM78 74t744NME6N!$+
>&#$&!$%&'#!1$&#&1#$&#$%&#!1$#3&#r!1$#3
$$+?&73$#'!#*1% '3$#!#8 &$.*$%$2 $$&
&.&$!),%"#3'3$#u!.$2%'3$##(!%"$2!#&$
!#&$#&.(&#$#+
?&,($&#
?&,($&##&1#$*$%!1$#34<v5$$&.&$$%1')&2*2%#($% #&1#$*$%
!1$#34<v5
r!1$#34<??5$$&.&$$%1')&w+>%##(,&.#$#"(3#+ $$&.&$$%
<(2,%"$%&"&"$#$%$2((3$#"(3#+?&'3$# 1')&2*2%#(
'!#*$%'3$##(!'3$#u!.$#!#&$#&.&$22%#( $%r!1$#3
'3$#'#$%$%&!#&$#&.&$w+ 4<??5$$
&.&$$%
>%'(($('$!$#((!)#$*2%#%%""(1#$%&w&2+>% 1')&w
.#$,''&,%#.#11((,/.&!#$&')#$+=3&1.Ar)#$#
82),$*2%#%&.&$%&$&!$#'$'.1$&!#3
`VaT]T`g\oac`x\WaT\V^b^V[We\Yy\^\VY]bcWTXd`\]T]YXe\^Zl\`TVYZl^Xe\`WYX^_T\lTz[VT`\[`\
11((,/.&!#$&'),$+9'.1$&!1%=-94='&#-$!&!
9!&&'$#$&%351"&&3'$)#$$&'),$$%$
&.&$$%1')&w${*$%($$&$%(.%)$*!',$%&%&$&+
| }~4Q 6G7 76F74
2+ -$$2%$%&7G4&DMS4
5&#'&,''&,#$&$%!&,''&,)1$$%$%(&3&.#$,+
>&1 ?(
)5&#'&,''&,#'#(,1!&)1(8$&3+ >&1 ?(
5 9:r;<7#;!'$&3!"#+ >&1 ?(
12
3456759
9
!" "# $$%&"'(" )*+,-.&'!'!"'
44 #' /"0 1
2,#33##"%%##"%3!'3433'"3!%5
/"0 1
6+7!'##"%#!!"! "!$"8 5
/"0 1
25 *'"!'!4!!'89
:"'#"%;#'##"%7"03"%##"%
<<<<<<<<<<<<<<<<<==<<<<<<<<<==<<<<<
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
<<<<<<<<<<<<<<<<<<<<<==<<<<<<<<<==<
4>*'"!!%$ ##"%;'!"# 33$&!"83$3'!%3!
$"4'!!"85
<<<<<<<<<<<<<<<<<==<<<<<<<<<==<<<<<
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
<<<<<<<<<<<<<<<<<<<<<==<<<<<<<<<==<
3?8"$'8)$3'!%7"033!'#"'"!!%$ ##"%5
<<<<<<<<<<<<<<<<<==<<<<<<<<<==<<<<<
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
<<<<<<<<<<<<<<<<<<<<<==<<<<<<<<<==<
,#7"0@A0!'335
<<<<<<<<<<<<<<<<<==<<<<<<<<<==<<<<<
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
<<<<<<<<<<<<<<<<<<<<<==<<<<<<<<<==<
BCDCEF679G79HI46GJI9K
L>?3#$0!"M3$!7"%#3#$0!"3!'4!#'303!"
#8!'3##"%5
L>?#"3#$0!"0#'303!"##"%'!#'##"%;"$"'#"%
##"%5@#'303!"##"%'(,# 33##"%;,?.
430%$"! !##"%3433 ""'8"'!'85
L>2!!"$"8"#!'3"30""!%4%!):N5
L>?!"$"! #'##"%',-%.#"%;,-.5,-."!
##"''3'!'!$'4!"'!!!5/%3%4"5
L>/0,?.,-.##"'"0!#'##"% !3#$0!"5
L>/.'##"%!$"8"#!"A0'"4%!):N "3""%'80!
'!$"!'5
L>/$"'#"%;#'!"8'#'303!"7'3!!'40'!0'8'!8"!
3'"30'!5/!'!"'4'"% "#'#'##"%560#"'3+
0#"'3!34"$"!'4'"% "#5'!!4'"%'8'!&3
12 "$"!O'"!3"3!"5'!!"4'"%'8'!&3"$"!P'"!
345678
845
!" # $
%&1'
()*+,-.-,/01+23+-+,24.50*678+4*4261+/8+585-991+*:.6*88*;+/<+0*648+23+=10*8>+?24.50*6+ @
"@AA!"
@ #A#A
%B #F
##CDE#
E
GHI6J84
!KL%E
34MNJ84
@
#F GHI6J84!KL%E34MNJ84 !OL%E !OL%E
PHMNJ84!QL%ER47NJ84!SL% S2TU
PHMNJ84
VB ##
!QL%E
R47NJ84
!SL%
RNJI4 WXYZ [6556\I8 ]4^ \N54_ `JJ74aHNH6\ N\^ 67NM4 bNcNbH8 H\ J84X
dN54 e`JJ74aHNH6\f d]5J47 6g h84
L!L% i
K!KL% iC&T
O!OL% iC&TjiC&T!%
Q!QL% iC&TjiC&TjiC&T
S!SL% iC&TjiC&TjiC&TjiC&T
R8c4 6g 3NH\ 345678
O
#Bkl"
O!l"O% lmn
O!lnO%o2DU ###
OO
s`3 s|3
rs`3
s`3 }s|3 ~}s|3
pHM]74 WXqZ rHgg474\ 8c4 6g 3NH\ 345678
s`3 esN\^65 `bb4 345678f
tuSl V!lvw %#
l"OS
V#l"O ## A
7N\^65 Nbb4
#
VS
#
A
6*3*68+02+x0*4.26-61y+4*4261z+{)/,)+4*-<8+0)-0+{)*<+0)*+8180*4+/8+8)50+;2{<z+0)*+
12
3456759
9
44 !!" #$%&'()*+,-.//012-3.*4+15,-.46*+12-7/.8-92-,-12-
7,5:,.3.46+5;19.,-9-/5.6:-1++15,-6<=2-412->?@,A4+.7,5:,.3B*1;-182-+
12-7,5:,.3*4+1,A81*54+;,5312-&'(.468.,,*-+12-35A1<C*3*/.,/0B*;12->?@
4--6+15+15,-12-;*4./,-+A/1+5;8./8A/.1*54+B*1+15,-+12-3*4&'(<D2A+B12->?@
8.4E512&F'G6.1.;,53&'(.46=&HDF6.1.*41512-&'(<
D2-,-.,-195*375,1.41107-+5;&'(+I
C1.1*8&'(%5,C&'()
G04.3*8&'(%5,G&'()
C1.1*8&'(+,-1.*4+15,-6*4;5,3.1*5454/0.+/54:.+12-759-,+A77/0*+54
92-,-.+.G04.3*8&'( /5+-+*1++15,-6*4;5,3.1*54*4.J-,0+25,11*3-%.;-9
3*//*+-8546+)-J-4125A:212-759-,+A77/0*+54<
G04.3*8&'(+.,-82-.7-,.46854+A3-/-++759-,92-,-.+C1.1*8&'(+.,-
85+1/*-,.46854+A3-35,-759-,<C1.1*8&'(+2.J-.2*:2-,+7--612.4 604.3*8
&'(+<
G04.3*8&'(*+82-.7-,.46+5*+A+-6;5,3.*43-35,0<C1.1*8&.3*+;.+1-,.46
+5*+A+-6*48.82-3-35,0<
G04.3*8&'( ,-KA*,-+12-6.1.15E-,-;,-+2-67-,*56*8.//0*45,6-,15,-1.*412-
6.1.92*/-C&'(65-+4514--615E-,-;,-+2-6<
L6MNOPQRS4T9U7755V9W
X512+1.1*8.46604.3*8&'(+A+->(YC1-8245/5:0<>(YC6-J*8-+854+A3-/-++
759-,<C1.1*8&'(+25/6*4;5,3.1*54*4.;/*7Z;/578*,8A*1854+*+1*4:5;1958,5++
85A7/-6*4J-,1-,+<H4.&'( 12-3-35,08-//3A+1E-.++58*.1-69*12.,-.6.469,*1-
;.8*/*10<C*[%\)1,.4+*+15,+.,-4--6-67-,3-35,08-//*4.+1.1*8&'(<G04.3*8&'(+
,-KA*,-6;-9-,1,.4+*+15,+7-,3-35,08-//<D2-;5//59*4:.,-853354/0A+-6&'(
82*7+I
]^_`]aT^44_
SUVbRH4.4FGY&'( .403-35,0.88-+++15,-+
c1\E01-+5;6.1.*415/.182-+<D2-/.182-+25/64-[1c1\E01-+5;*4;5,3.1*54B+512.1
*435+17,5:,.3+92*82.,-+-KA-41*.//0-[-8A1-6B12-6.1..,-.J.*/.E/-9*125A19.*1
+1.1-+<
d^SUV`dWT7e9T95^SUVb4TdfSUV`dWT7e9T95f4
e675SUVbR
D2-+-&'( 82*7+A+-12-+.3-8/58g,.1-.+12->?@A+-+<'+.,-+A/112-3-35,0
82*7+,-3.*4,-.60151,.4+;-,6.1.92-412->?@-[7-81+12-315E-EA+0<CG&'(
*+5;1-4A+-6.+3.+++15,.:-92-,-.+Ch&'( *+A+-6.+.2*:2-46:,.72*8+
3-35,0<
^4ijk9^SUVRD2-+-107-+5;&'( .//59 54-15.88-++195 3-35,0
/58.1*54++*3A/1.4-5A+/0<C53-1*3-+*1*+./+58.//-6J*6-5&'( %5,l&'()<
=&'(%=*4659&'()*+.+7-8*./J-,+*545;l&'(B92*82*+853354/0A+-6*4
12 ?>+,A44*4:=HmGY=C.46=HmGY=C.77/*8.1*54+<
92222!"#!$%&!#!'() 23456797
34
'%!*(!!+,,%,-.,/!$01' (()
,++!,*2%,,+!% )(&,(+%*
3425334672345677
189:;<=>?@AB9BCD@E0F'G5HI56J63(()-**-(
!/+.%++!) *%0F!)'()E0F'G
.,(+(!)*
K!L01'-((0F',!)&0M1$+&!
N0#M(*-OPK,!),0M1$%,
(0F'*.),!!0F'*O(+%!(!.)
,(!!(%89:;<=>?@AB9BCD@E0F'G*#(%,,+,(+
01'.+%,!/!%(*
0F'% +,!%,-.,,(+%.
%+E&%+G*
,0F' , &) (%,%* ,
+(!)0F'((%,%*
Q(+(( (+/.-./
'L"+((
K"+((
0F'.,,.(#O(%,%,!!RSTUV
WXYZXSRR[\0F'*P0F'-MP0F'MMP0F')LP0F'
]T[X^WXYZXSRRS_`[^0F'*#.(+!).E)G0F' ((L
+((a
1b(+!0F'&(L0F'-O21cdeee*
f3425f65g644h633427
1/0F',++((&!!)(()EP0F'G*1P0F'
((),+.,,&.!),*
0F',+%++!&),(+%(%,%+&!%
()+(0F' ,+*i./-,P0F'-
+&!%,%(j)(&) .+(P0F',+*
F,+(&.P0F' ,+-,(
,&,**-P0F'&,(0F'!)+&!
(*
P0F' !5HI56J63(()**((/
+..,*
&,,&.P0F'0F'P0F'(%,%
&!L(()-.0F'+((% (%,% +,*
.P0F',+-)%+,!/,,!!P0F'+((
P0F'&%*+,+(( P0F'((,!!&%
P0F'*
11
3456759
9
4946545
44
9 4!9 ]9466 n66!7g465 o45
678 6&'5_./-$&4&4)/1 p)@'$-@& k@&,$/-,'@@1 k@&,$/-,'@@1
6q8 6&'5_)#@14&4)/1 `)#_*)@'$-@& 8'+a `)$_2)++-(@&
r6q8 6&'5_)#@14&4)/1 `)#_*)@'$-@& k@&,$/-,'@@1 `)$_2)++-(@&
kr6q8 6&'5_)#@14&4)/1 `)#_*)@'$-@& k@&,$/-,'@@1 s+-#;sp@-;%$
kkr6q8 6&'5_)#@14&4)/1 `)#_*)@'$-@& k@&,$/-,'@@1 k@&,$/-,'@@1
4!679
"#$%&'()*&+&,$-)#.&%'*&+&&#*'/-)0+$12&+)3+&4-,)#50,$)/678+9:%&+&%-;%
+2&&5+&4-,)#50,$)/+$)/';&5&*-,&+<-9&9678+='/&&>2&#+-*&9?).&#&&5+)4&
-#&>2&#+-*& 4&5-' 3)/ +$)/';&97@+) +&4-,)#50,$)/ 4&4)/1 %'+ $%& 3)@@).-#;
@-4-$'$-)#+A
B=CD664
476EFGHIJKLMNOKPLQFRSQJITQUVFIHILQUFLWFPLNTUXYFKLISOPHQYFJYFMLPF
+033-,-&#$Z+-#,&4)+$)3$%&5'$'2/),&++-#;)/;'#-['$-)#+5&'@.-$%'@'/;&*)@04&
)35'$'9
\=C]9469A?&4-,)#50,$)/4&4)/1-+*)@'$-@&-##'$0/&9^0$$%&/&-+'@.'1+'
#&&5$)+$)/&5'$')#'2&/4'#&#$('+-+9
:%0+$%&/&-+'#&&5)3'55-$-)#'@4&4)/1Z$%'$-+-#&>2&#+-*&Z#)#_*)@'$-@&-##'$0/&'#5
%'+@'/;&,'2',-$198';#&$-,4'$&/-'@-+-#&>2&#+-*&'#5@)#;@'+$-#;Z+)-$-+'#-5&'@
,%)-,&3)/0+98';#&$-,4&4)/1-+'2&/4'#&#$#)#_*)@'$-@&Z$12&)34&4)/19 `)._'_
5'1+Z.&'/&#)$0+-#;3@)2215-+a9
74)5&/#,)420$&/0+&+$%&3)@@).-#;$.)$12&+)34';#&$-,4&4)/1A
<-=4!67b65c5Ad'/55-+a+'#5e@)2215-+a+9
<--=4!674
5A8';#&$-,5-+a+'/&$%&4)+$,)44)#3)/4)3+&,)#5'/1+$)/';&
(&,'0+&$%&12/)*-5&3'+$',,&++'#5%-;%+$)/';&,'2',-$-&+'$'/&'+)#'(@&,)+$9
f94!7g465A8';#&$-,5-+a5/-*&+,)#$'-#4&$'@5-+a+$%'$'/&,)'$&5)#()$%
+-5&+.-$%'#-/)#)>-5&/&,)/5-#;4'$&/-'@9?&*&/'@5-+a+'/&4)0#$&5$);&$%&/)#'
*&/$-,'@+%'3$.%-,%$12-,'@@1/)$'$&+$%&5-+a+'$+2&&5+)3h2ii$)j2ii/&*)@0$-)#+2&/
4-#0$&</24=9k@&,$/)4';#&$-,/&'5l./-$&%&'5+'/&2)+-$-)#&5(1',,&++'/4+(&$.&&#
$%&+@-;%$@1+&2'/'$&55-+a+$)/&'5'#5./-$&5'$')#,)#,&#$/-,Z,-/,0@'/$/',a+9m'$''/&
/&,)/5&5)#$/',a+-#$%&3)/4)3$-#14';#&$-[&5+2)$+$)3)/4$%&(-#'/15-;-$+)3
,)44)#,)420$&/,)5&+9:%)0+'#5+)3(1$&+,'#(&/&,)/5&5)#&',%$/',aZ'#5$%&/&
'/&+&*&/'@%0#5/&55'$'$/',a+)#&',%5-+a+0/3',&Z.%-,%2/)*-5&+(-@@-)#+)3+$)/';&
2)+-$-)#+3)/1)0/+)3$.'/&'#55'$'9
:%&/&'/&('+-,'@@19
5)34';#&$-,5-+a'//'#;&4&#$+Z)#&%'*-#;'/&4)*'(@&
5-+a,'/$/-5;&'#5)$%&/%'*-#;'3->&55-+a0#-$96&4)*'(@&5-+a5&*-,&+'/&2)20@'/
(&,'0+&$%&1'/&$/'#+2)/$'(@&'#5,'#(&0+&5'+(',a02,)2-&+)31)0/5'$'9
12
76 !"#$%&''("( 345678
845
!"#)*!"#$("!+"(""),'!-"(#"(
"!.(/00)1'" $(("2("++34054006),'("
-'"#7("$"-++'("),'$((#" (8!+9
-+((".-3':."3!" #("),'!-"(#
-3("'(" .')
," 000
,"
("
,"
;<74 =>?? @A 7BC 6 DC> EF4 6> 6G 7BC ;<74 =>?? @HA
4B67 6G DC>
,'!-"$"3-!'""(#I00("(""!.(/00("."")
J"5"( $)" ( +"(
#'(%-!&"((""#"((""+#'()
K7DL
C
7M4 @K
A
NOP""(5+("$)
NO,'"(+''$2'"56."+3(('
(.!"3&''(.!"(%'$2'"56$+-+(
("#("(("(""$#("()
NOPQQ ("."("%%(."3%(.+"%-+"%..+(
."(")
12
3456759
9
44
6675654
9699
6547
!"#$%&%'()*&+,%$%'(&%'(-(','.&/0,$%(+-1'2(*&+,%-(',',/,$%(+-134(+-1+-
0/52,%(6/&-,'71%(8/2,$%(+-1(&+9%:*$+7$$'-,$%0/,/&,$',&/,',%-+,3;'&(<
(+-1-,/=%,$%&*+,$&%'()*&+,%$%'(-:'77%--0%7$'2+-0 '2( (&+9+2= 0/,/&
7/2-,+,5,%'52+,7'>>%(4656?@AAB63#$%*$/>%52+,+-.+C%(3
!";'&((+-1+-'>-/12/*2'-
D43E,7'22/,F%&%0/9%(/&+2-%&,%(+2,/';GG
52+,3H/0%(+-1-$'9%'-+2=>%I>',,%&%3=3.>/IIJ(+-13
!"#/ +27&%'-%,$%-,/&'=%7'I'7+,J -%9%&'>$'&(<(+-1-6I>',,%&-8'&%0/52,%(
6-,'71%(89%&,+7'>>J:2/&0'>>J','(+-,'27%/.'2+27$3#$+-+-12/*2'-65
47/&D6
D479
64693
!"4-%,/.7/&&%-I/2(+2=,&'71-+2'>>-5&.'7%-/.'(+-1I'716+3%3,$%,&'71-*+,$
,$%-'0%(+'0%,%&/2,$%9'&+/5--5&.'7%-8+-7'>>%('7KD66-%%L+=5&%M3NM83
;%&%,$%7/27%I,/.7J>+2(%&+-9%&J+0I/&,'2,F%7'5-%(','-,/&%(/2,$%-'0%
7J>+2(%&7'2F%&%,&+%9%(057$.'-,%&,$'2+.+,*%&%(+-,&+F5,%('0/2=(+..%&%2,
7J>+2(%&-3
H5&.'7%U
O%'()*&+,%$%'(
6P2%I%&-5&.'7%8
H5&.'7%6VWN8
6Q654?6
D45@R9
D45BQ59
795
9647594DD
@BS
475T446?464D6547T6574DD47KD6
12
46 56 8 48 44 345678
845
!!"#$%&'&()*%+,+-./)0
123+2..-+14#5#'#$%+,#5'
.2.#'&##5'
2'.##.#'&
246.#'.#/
789:;<==>?@A=
BC.#,''%.65.)$%&2"1D.DD(46.
BCE5$%.)$%1.#5.)$%&/.)$+%.65.)#'#$%+,%0
F@AGH>I8JGKLMNJ7KOM=PI>@NHAQ?@G
RS54 T0U3V1%+')$%1.#$%&'&)W-."X3#'#$%+,#5'(/31W
'.##.#'&/131Y.#'&##5'/1X346#'.#VZ)$%&
''%.62X3[131Y[31W[1X32\/31]/1^W/YYY46.2]VW2_`+$#'#$%+,
$+%.62"1X3[31W(a"^VXb[3V1(2XWW2]46.a%+')V
RS54 cd e).f%--4.).#,''%.653V1%+')$%1.#$%&'&)*%+,\
-./bYY'.##.#'&/3\3Y.#'&##5'f)#1X346.5
$.'+4.#$#'.#V
ODP6Q
? @@&RL!$!$!(%($&"$!*(=!%(/
#!,# !"",+SN1TU0V"%,*#+,+
*(++&@!'WL@HBX0RL!$#(()*),%(#(!%(
12 /#!,#0W#+*(++&!'WL@HBX!,*!##
!""
#$
%! 345678
845
&$#'($$'
)'*$
"$
"$!+!$
#
#$" "! !"$ !
#""$$$!$
,-!
#""$!
"
#"
$$"
$
%"!"%!'$$!
#
#%""'$#$
' " !
#
12
3456759
9
44 79955
!"#$%4&5'
( )*+,- .#/,/!01!#23!3#$0 4$5! 6/-!
7( 4!$70!849(!:5/-2 70!-
;< 4$5! 6/-!
=(>+ ?@!,=A,-BC-C,?C!$-#$?!=1=,0
C@+ ?@!,=1! 4$5! 6/-!
A(>4C! 7-,= A,22!$!@=! 7!D!!@ E)*+ @A )*+ ,-
3 @52=5$!A - 7/@B C E)*+ ,- 3!3#$F
DC!$!- )*+,-1$#?$33!AA5$,@?C!
3 @52=5$,@?1$#=!-- 4$5! 6/-!
!(>GC!@ D! /#A -#2D $! 2$#3 2/#110 A,-BF C$A A,-B
#$HIJ)*+F,,--#$!A,@C!3 ,@3!3#$0 4$5! 6/-!
2(>4$=B-D,CC!-3!A,3!!$#@C!.$,#5--5$2=!-
$!B@#D@ - =0/,@A!$ 4$5! 6/-!
?( 4,3!$!:5,$!A#7$,@?C!@!!A!AA5@A!$)KG
C!A,-B@#D@ --!!B,3! 4$5! 6/-!
C( L==!--,3!,-C!-53#2-!!B,3! @A/!@=0,3! 4$5! 6/-!
M&6
&967N569O5
2( 4C!A,22!$!@01!-#23!3#$05@,- $!P
(>)L+
7(>)*+
=(>E)*+
A(>L//#2C! 7#.!
;( GC,=C#2C!2#//#D,@?3!3#$0/#-!-,=#@!@-DC!@C!=#315!$,-5$@!A#22Q
(>)L+
7(>)*+
=(>E)*+
A(>L//#2C! 7#.!
R( GC,=C#2C!2#//#D,@?3!3#$0=C,1-,-1$#?$33!AA5$,@?C!3 @52=5$,@?
1$#=!--Q
(>)L+
7(>)*+
=(>E)*+
A(>SSE)*+
T(L@SSE)*+=@7!!$-!A70!U1#-,@?,#P
(>5@/,?C
7(>V/$.,#/!) A,,#@
=(>+ ?@!,=2,!/A
A(>S/!=$,=HC$?!
12
1
345678
845
!""# $"%&'
"# ( )*%+,
,-"# .--# &'
/*!(& !( &# +0
1
!--&#!"(""##-&"#"-"&
+02+,23+,243+,2 443+,
*"(&"&(&&"/#
5
06
7 " &'-'&1-&896""&!"&2671&"&-"
"'27615"'&-"&!"2 796(#&-"&"
. -#
"" &# &'-'
:
4;-"&"&-
"#
' <#
( ="'2&"& #"
>>>>>>>>>>>>>>>>>??>>>>>>>>>??>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>??>>>>>>>>>??>>>>>>>
@ABA@ CDEFGH 34567E4
,-"&",- &'&""&&&" /&!-#
8!-6IJK
L"&""" "- &'!&&"(
,#&!"- &'&!& &"
0- &'&"/#
;-&/2 &&97#"&
"M" &
! &'&!"2"&-"( &'"" "&
= "
('- &'&#&&&&/"&&
$"2 &!&&2
#-&-&'&
9
)*%+,8)-%*&'+ ,#"#
6
N,+8N",+ #")*%+8)*%+"(
2
4"&(,-*&'
O
*P*%+,2*P*%+ *P*%+0
89 QRSTC3
)*%+,#!&&96%"8O
1%-&'&8)*&&"&
!& &" !&&#&&
4 &' &" " 1II K
=&
--";#U!/OII9
OOK--# &'&"2II2III !(%&- -&
;
."&&" &'&-"-"
,&" &'2&"""& (#(!"
-""&--&&-""'"-"&9
."&" &'2)*%
+,&"-"! &&&
=)*%+, &' "/&!&&" /"
("#&" (#&-&
."" &"("&#&-#
0&"&#&&
67N"""N" ""
12
3456759
9
!"#$%&$%'(&&$)%&%$#%*+%,- #.#!$/01203,&$%'(
44 #)#4#))#&5'(6%7#8%,- # &,6#!$09 )#($&%&%&%
4%$#%5")&,%&&,"#&%$$%)5*&,%$%&%'&%&#%$")03,")
6&,)#(#%):&)# ',%-%*&,%&&,&$%'("%)$&,$%);-$#&,%)%&%
'&%&#%$4'#&*0
<799
=4>>?@A
B6@CDEFGHIJKLM65N>4O9
HP4?4@5
QRS#!,&$%!'%"%'#&*0
QR&"$5#&6&$%!#',%"$&,% &,&,$&*"677$*)4#'0
QR74%56$7&,'7"&$+#&%56$%$',#4%&$%!020T2#',)#(&$
12UV)%&%0
I654P4?4@5
QRW!$%''%'7"%$)&&,%&6%7%!&#',%$))#(X5'%'%&#!%
)#$)%))$#446#$&74#!&,,%)&&,"'#6#'%$%&, %):&#!&,
$&%&#!")%)&, $%)#!&,%))$+%)&, &6#)%)%''&,"'#6#'
'&$Y0
QRZ6$7%&# '% &5")%&)5'%#&#%$%)*X"$7%&Y77$*0
XTY[LKM9IJK\IJK794]>^
X'7"%'&)#($'$)%5Y#%&,$"&#'%)#(&',!*03,$'% $'$)
X-$#&Y&,#$- )%&%' %-#&,%)#()$#4#&096&$&,#$'$)#!
$'% $%)&,)%&%%7%*%)#$)0
##&%56$)%&%%)6#-,#',%$ &&5',%!)03,$'% &$
"$7%&)%&%+#6$7%&#+%)6#6$7%#&%##!$'$)0
12
4 56 345678
845
!"!#$
% &'&#()&(&*$
+!!, !,"))-).$
/01 27344 5674 8 67 9:;<= >9:;74?7344@
A ,B&,(*CD-EFG ()CD-E).!)))!(('
)$H IJ CD-EK /CD-H'&1"!&).#,I (H'!,
I&'&H!!)() )'#L(&,!!"!"((
MNOPQRSTUSPSVWXYZO[
4 456
\ # !"!#$]2$^2(!"!&).!('L12_G%)
`,&'&()&(&*$
a(!!, !,")*)-).$
/b1 :c:;<53d :c:;< :c:;<
3
D\D()*:4 c46 :8:4 c4744 :8$]D\D
,L!, )(CD-EFG$`!"! b$e+%Jf$2+%J()^_+% !$
A !"!#)"()(H(& &#J)L'& &#g(& ))
)L'&))).$D\DL&',*HI&((CD-EFG L
()* , !. I&'&$K.("(!"&*D\D). ,
*CD-EFGJCD-ECD-EK$
A h" )*CD-EFGD\D-EFGI((,*(iJH ((($
jk,"&0^i$`(! *CDJilm2_n%oJ0^il0^km2_lb$fG%o$`(! *
D\DJilm$0fG%o$
:c:;<p `!)'&D\DJ, CD-E).$A L!(H)(!
(D\D-EJ() ),(#, qL)$
:c:;<
3p `H'& D\DJ, CD-EK ).$D\D-E]G L
" !( !(&#HJ)() )$
12
23456489
8
!"#$%%&""'()%*)&$'+,'-)'$.*
33
/30123452659978489968738:8543754;3
4
:5
33658<=373>4 6543=373>4 ?538@44 983>
6A3754
3 C D' STU)V ST)")$" XE&"*
654B &"E"$ &") *)(" &$%
"#FG (%)&* ST) ")
HIJKLMILNOPQRI V#& $W )%"V
%
?765=Y Z[\ F)" X)"DU[ %#
]^1Z[ _E ")E $. $) &)" HIbNIQRNLKIcdRdI
*(*"' &*$ V"\ &$%
U` %" ()"*" e) "&%&E
&$ *#& $" &$ %
a") " "V&
! "#' *& *)("
'
(*$))"
6f 1^k\kk F)" l U) )$ ) ") % x("*
gh:i X[ X$ ")E *)("*&&)" &$)%"V
6fgi
6f $ Ga\no ST) ")
STm&,(&.
*(*"'
gj $ *#.
STU+Ga\
) "'( STGa\n $* " %)
no- *& dLKI pqLrRKI #$$W
$ NstKuvIqwrtwI ST) ")
V"$W & )&* *&&$ %
STG &$ & $" *)($ *# ,
*"& )$ ") "`&V ) ((
)%aCa(' $$")&$" ST) ")
*&&)" ((*")&
$$$ %) "#
m&"&"
6y6f ST_E ")E ST~)" U x("*
gh: {Z[") *(*"' *)("*& Ga\nxX
6y6zg |^Z[ STU) "'( $ aCa}n Ga\nGa\no
6y6zg +aCa}no- ) aCa}no
j *& $ $W
)V" aCa}n$*
STG&$ & pV# qLrRKI NstKuvI
*"& )$ *#&)&*
)% aCa $" *)($")
(' "` &V )
$$")& $"
*&&)"$$$
:3>756 ]kZ[") STC' _E STa" *&&)" ST) ") XE&"*
3 ][ ")E **$ %
*(*"' $"' STm$ %)
STaW STn"( $E' *&$
$` $. &$
)" &$ "#$ ("' VW'
STm&V " )%"V *W(
,(&. ST( $. )(")&`
%) E ("*'
*(*"' %).
"(*&
.'
,(&.
11
33
345678
845
9"2'
=#
xz ="!*(%2+%&<
VC65
12
4 67 7674 345678
845
74 !"4 #
$%&'())*+,-,(.(/0+,1&23$))* 45 67,
8$%&'())*(,,)77'9'+*(.()+.))*45 67,
'$%'.:*))*(,-,'',,;+)(.
9+)*))* 45 67,
:$%4()+.:<8'=-(9+'7:+,=,*,)
+,+,,7<>0'',,+) 45 67,
$%&?;/@A(,7.0'',,+),')9:
(-)0.+'(::+,= 45 67,
-$%B.&?;/:'.8:.'.:<++.:-+.+7* 45 67,
0$%4(>7707-A)*C+'(*+,8+.(
(+0(,9,,+87'',,,9:<(+7)+.+)+D+.0
(7',-())*,*,) 45 67,
($%A0.+'9(,(+0('9'+*(.)0.+'
:+,=85,7<'',,+)(.)0.+':+,= 45 67,
E%A'((-77<+.0F
$%&?;/@A $ G+.':).*+),
E$%&?;/ 8$ /:.:<++.:-+.+7*
H$%&?;/G '$ /:.7*
I$ ?J?;/@A :$G+.'K: +.:-+.+7*.:(>+.0'9'+*59
ELMN
H?+--.+8<.(-77<+.0F
$ &?;/@AK&?;/.:&?;/G
OOOOOOOOOOOOOOOOOPPOOOOOOOOOPPOOOOOOO
OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
8$ ?J?;/@A>,5,?J?;/G
OOOOOOOOOOOOOOOOOPPOOOOOOOOOPPOOOOOOO
OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
I G(+,(>77959,-())*(+'(*QR)(0.7'7,,,-
,0):+()+0()=59))*(+'(*
OOOOOOOOOOOOOOOOOPPOOOOOOOOOPPOOOOOOO
OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
ST
U33VW
4(+,5.+8,+'77*57+.,(,00.+D+.K,0:>+',-:+--.*9,-
))*,*,),.:(+)9.'-())*(+'(*
4())*,*,)+,'0+D: '':+.0'',,+)K,0'9'+*.:',;
9;8+-,0
12
3456759
9
!!"#$"%&"'(
44
)*+!"!!"
)*,"!!"-
.$$!!'//!/!!" !!!"0'!"
!!"1-,!/!!" 2& 3! !!" 03.41-
.$/%5"6!!"#/5"7'5-8/!/0'!"1
9:9;<=>;?>@;AB=CD>E;9FG@:<D>HD>I;@>DG??HEH:I@J>DHIE:>H@>KBD>L:<=>MH9H@:A>EBFBEH@=N>OKGD>
6$!!"P&/$# 7'5PQ5$$
/5%$%'"-4%0"1!!" '!PQ
5$$"'!!"-R/&5/&"'6!%!!"
!$"!%20--PSQ26$''"21!%'-4%
2!!!6!6"%#/"'56
%%'#$-
."'6"%T'$!!T'$2-85
'5/%%'"0/'U2V1P$&-R6! &
6!'$2/%$#!-.'$2$5$" 7'5P
$%$66$WX"-,Y&/2
/6P '#$!6-8!'$2
"! $&5%!-4"6&!'66#'%
"!''$6&Z[Q3T4"-8$%"#!
$"65$'!6!/$!!'/%#//!/$!
7$5/5%$0[%$./8'1&
#/6!/$!"!-
R/P&5/5/"'6%5/#"!'/
"!-.665\/6%6$%!'/"!/6
"6!!"$%-85$$%$64!"S"#
%'#$'&$!!]%$6!!""!-
^_` abcdefcgheijhkflfhmfecc
n7oj9l9p55q
W-*01r$0#1r$018/018/018/061r$
U-01
l64st5679u79v9s c79u4s9s
)*R6$%!!"#/$& )*8"!!" !$"
'!!"-+!"!!" /6#/$2%0!%1
6!P!$$%'" 6 '%!P
%'#%- 6!- R !/ $%
)*8!!" $"#" '" ! !!" #/
'-R '%! $&!!!"-
&/$"#"Z+w- )*R#$$""! 6&P
8Z+w!!/$"& !'$P !#$ /6/$
Z+w-8]6!!!"2' '2%P$%6$-
!$$#/6%- )* 8 !% 9
674z
)* R!65679u795/ {675_4$"6!
xy,R\/-4$" 6|z9
s}4~65o4u~_
6!6n6
5_
12
345678
845
!
"7#5$78 545678 $%&
4'6%&$78 545678
(''4 )#54
67$*4 '$+$'#8 ,6-.# 6/ 67$*4
"7#5$78 545678 0 122 34
4'6%&$78 545678 25 44 65
74 $.84 #%&#'$4449!!:7;:<; !4=
2244
4!
> ?4 225 @454 24
5 4A
=@!
h!fAg ,$+$'#8
h!fAg!f
fhA1h
fAgh
(''4 )#54
,$+$'#8 BC $''4D#54
7EFGHFIJKLMNLOOFPP=Q@!R45
2=2
=4Q@
5445!4
Q@@4@@!1Q@2
Q@@
2@422S422
422
22!544
@!R
@5S 54Q@2=4
2442
@222
24Q@4=
=!?42
=@2Q@4 @444
@242!TU2VWXYZ[\]^[W_Z!!
:5̀4
a#*b74 cd
4eb4%#$8 (''4 545678 12
3456759
9
44 !"#$%&&'(()*+,-+./,++*+010,.)/2+334
0,++,-)*+/410,),.)/3540,++,-)*+
1)+66.7+/,04890,+/3,-.:.):4,-,-
,.;6+,+<=>-9+89)).)<2>1+)+*+)9004)+
66.7+/,04+890,+/:+,-9,.-+;,-.9;-,-.,.;6+,+3
?;,+)+@)ABCD? .,-,46+0.)/,.;)*+3E4
),..),.)/;,+.6,+0)+@1))+.,04+
66.7+/,04,-/,+/6.+)3F-00:+;+;9.G2-:89,+0
*.9)+.,,.;3
C)H:.+,-)
I6JKLM4N9O77559P
Q7RS9T9J55K
=3<>U0<1>U0<>U0<)>F.9<>F.9<>F.9<;>U0 <->F.9
23<)>
V3<>
W3<1>
X3<)>
Y3=G<)>22G<>2VG<1>2WG<>
13Z0,+0//.4/,-,.)),.0,2+,-6:.;33U.7/60
CE?+[9\46\//.43EN9N][9\46\//.4/,-+./,+,.)+
+,+,0,*+,-6:.96604;3E^'"_`!ab%$'$#b<CD?>+
G*0,+0//.43
l9P 4J9P m9\46\6P n66NJl7Q4N65 o45
CE? C)G:.+,//.4 Z0,+0 p0,.+004 p0,.+004
CD? C)G04//.4 qG*0,+0 ?@ q,G6+10
rCD? C)G04//.4 qG*0,+0 p0,.+004 q,G6+10
prCD? C)G04//.4 qG*0,+0 p0,.+004 s+;sZ0+;-,
pprCD? C)G04//.4 qG*0,+0 p0,.+004 p0,.+004
c3 d65R74
476Pe=27X2Yc72XY7X=2e131=Yfg)
M796NJN56Pe<X=272XY>H<V3=W723X>e=YYcc14,H+-3
h3>iR64Nj4N7P6LF-,+/.89+.),6+,+,-.)H:.+,-)
*.6.6.,.@+00),-5R6kF-,+/.89+.),1.+;,-))),
<+332,.,+;6+,+,-)).),.>9).,-.)H:.+,-)+00),-
12 \4N7P63
48 54
47 54 !"# $"%%" 345678
845
&'($%)*%"+,-%.-%/%%!.%"0"-"$1..2"#2$"#-
345-%"+1$-%%1 $"%.0-"1$$%" $-0+1
%+6
34&%"%.-01$-6)
7++--896:*%"+,
;< 7=> 467 ? 8@?47 A7%#"+-6-%-1%+/+B2$+$--
%%"--1%+)C--1%+-/"++.%+"+"+%+6-)$"!
1%+6-"%-6%"#0 DEE)F 7= ?G?4? 6 467 H675@@8
IJKIJJ<L $--+--$.!$1M /%%!.."#$-+-)$
/-"1%+6"%.-N!.+6-0%#--- !, $O0%"#-,-
"#-61%"#)
P 4 6Q 6774R6?S 7= "%..-1%+-1%-60%+6))$%+6-2$$-%
%"$/%--1%+--+%..%8@?47L
T4= U6V7 W76S74 X
Y)4%Z%.-!+Z%.-1Z%.-# $Z%.-
[) Y\+B[\%B2\!B]\)
2)T^K_`3 +$".#,--Y[\+"])1\"+$65R ?= HT^<)a5&Ob
%$,0+%.%"%++---%#/+-)7",%%+-"%%#"+
0+%.-6+%"!%++--+.,"%00M%.,$-%0)
P?GS4
34c#$-"#+%0%+,)
34b%--+0,1"1%"-B2$+$-/,+$%0)
34&/%!.-61 $+0B--%!.1%+$/%.-%#)d)[d"+$-6-
-efJ 3g ?L
T^K_ H65RK?= 7467?;@4< 6R@ ?= 46@6S8)$-+%"+
2")C1..2-h74 64 ? 74? 58 54a5\&--%!.1%%%"
1.-2$+$%" !+$%"#)$-+%"-R4754 ?B"1%"B%"
1.-1%"%""#+-)
P?GS4
i4c#$-"#+%0%+,)
i4j.%!.,%"."#.1)
F7;@4 `R@ ?= 67 T^K_k HT^K74h7;@4<K P 4 54 ?4 4 ?
h74 6 ;4 474?lmnopqrsntnutpvwnxynzvtxntn{q|wyp|y}q|n}yqrxnyrnxzvn~qppn
-1%+)
12
3456759
9
445
44 !"#$%!&'('&#)*+),+%&$(#&'-."/&'%"#$'0$1#2+3)
4#"5$-'0-'%.'6%!-$%!-7)
89 *:;:<=>?@>@A;:?"''&$7"#$'!.6&"B#.77%#&'('&#"C&$"#"C
'%.'&&""#5")DEF!"#"$-.#5$"#7G1%#-1"..'#')H5'--C7'"#
IJIK;?:;:<=L;@?%'0#DEF'&#'""#'!%!''"7$'"10"#$7#.'#''%.
%"#1&#$%""#$. %#-'#6-"-$B5'%55$)M5'%55$"#'!"
.'#'"#$.$%-'!C"-$B."/"CB& %#1%$7#%"6'""#'!%!''"7$.'#'
"#$.$%#."/"$#'("$7$#5'&%"&$%%&#.0%#B$/")
M$6'--77&#"'-'!($$-$755$#'#&$"#"'"51&'"#&'("#$'!
%'#0$##$5$7#'&C01##'#"6".'#'#$($!'5"'##'#$7#
7'"#"#$'!%'##$($7#'&)
M$6'--(1($"$7N5$O'& "#$$0#'%#!"#($""0-'&&""
"(.B-5%5P%!##$#'-&$"#$7#55$""#5)
H5'--CQ'"#R ^65
'&&""#5C
S(%"6 T'!&'('&#C"-$B
4
7
Y
9
[T$B&$"#(0#"#$.
Z469[
Z46765
Z467X4
U6VWXYZ9[Y647Y[
V9\ U]^X_^^_`abcd
E)e)H%'Cf<:ghA;=?ihjkJ:;jAJl@CmEm(10-&'#$%)
E)H1.'"'%no)o'0'-'%Cf<:ghA;=@p@>@A;:@?Jjk?JgglLIJAL<j@Co*4Dqm$$/")
)r's''5'%CihjkJ:;jAJl@?<t?I<:ghA;=@CEO4)
M)u)H6'"#'6'v?wj?LjA=<khIAL<j?A<?I<:ghA;=@x?AK;L=?JgglLIJAL<j?A<?yJjzLj{vN'&5--'%C
N'&5--'%4%.'-5#.)
|}~6W
BBB)%)B/(.')$!
12
333 3456794
67567
7676
9
!" #$%&'()*%+'$ 1,
- ./01*%+213 1,
4 #$5)%.)%5)%612+*13 1,
7 89:%+3:;'&%< 1=
7- ;:&:>>1>;'&% 1=
74 ?1&+:>;'&% 1@
77 A$+21&3:>?1&+:>B)3CA?BD 1@
7 ?E:>>F'E5)%1&?G3%1E#$%1&H:*1C?F?#D;'&% 1@
#$5)%612+*13 =!
- I1G/':&( =!
4 J')31 =-
7 6+K+%+L+$KCM&:59+*DN:/>1% =4
N&:*O/:>> =4
2 P'G3%+*O =7
2 ;+*O612+*13 =
2- Q+K9%;1$3 =
24 N')*9?*&11$3 =
, ?')&*16:%:R$%&G612+*13 =2
,- 6+K+%:>F:E1&: =2
,4 ?*:$$1& =,
,7 .5%+*:>J:&OS1:(1&C.JSD =,
, J:K$1%+*#$OF9:&:*%1&S1:(1&CJ#FSD =1
,2 B:&TF'(1S1:(1& =1
,, J:K$1%+*?%&+51S1:(1& =1
1 .)%5)%612+*13 ==
1- FSNJ'$+%'& ==
14 QF6J'$+%'& =@
17 N9+$U+>EN&:$3+3%'&Q+V)+(F&G3%:>6+35>:GCNUNQF6D @!
1 QR6J'$+%'& @!
12 ;&'01*%+'$6+35>:G3 @!
1, ;&+$%1&3 @7
11 ;>'%%1&3 @1
1= ?51:O1&:$(J+*&'59'$13 @1
= ?)EE:&G @@
@ W$3X1&3%'F91*OY')&;&'K&133 -!!
-! U)&%91&S1:(+$K3 -!7
12
3456759
9
44
!"#$%&$'()*+*!(",-$#.'$/(+0*++$/"#$#(+")&1)20)3%*"$&+1+"$3+.!/3$"#)/+")
+")&$/.".(!0)3%*"$&+4 !"#(+*!("-$+#.55/(+0*+++)3$"#(!6.7)*"(!%*"8)*"%*"
/$'(0$+.!/"#$(&2*!0"()!+4!%*"8)*"%*"/$'(0$+0)!+"("*"$.3.9)&%.&")2.0)3%*"$&
+1+"$34:#$+$.&$.5+)0.55$/%$&(%#$&.5/$'(0$+4;("#)*" 8</$'(0$+,.*+$&0.!!)"
0)33*!(0."$-("#"#$0)3%*"$&4:#$1.&$&$=*(&$/")$!"$&/."..!/(!+"&*0"()!+(!.
0)3%*"$&+)"#.""#$0)3%*"$&0.!%&)0$++"#."/."..!/%&)'(/$"#$&$+*5"")"#$*+$&
"#&)*6#)*"%*"/$'(0$+4!0)3%*"$&,(!%*"+.&$"#$+(6!.5+.!//.".&$0$('$/71"#$
+1+"$3.!/)*"%*"+.&$"#$+(6!.5+.!//.".-#(0#.&$6$!$&."$/2&)3"#$+1+"$34
>(&+"-$-(55/(+0*++7&($251.7)*"(!%*"8)*"%*"/$'(0$+.!/"#$!3)'$)!")"#$2*!0"()!
.!/+"&*0"*&$)2(!%*".!/)*"%*"/$'(0$+4?!/2(!.551,-$-(55/(+0*++.7)*"&$0$!""&$!/+
(! (!%*"/$'(0$++*0# .+/(6(".50.3$&.,7.&0)/$ &$./$&,3.6!$"(0 (!@ 0#.&.0"$&
&$0)6!("()!.!/3.6!$"(0+"&(%$&$./$&+*0#.+?:A 3.0#(!$+.!/B5$0"&)!(0C)(!")2
D.5$EBC<DF4
G3HIJIK
?2"$&+"*/1(!6"#(+*!("1)*+#)*5/7$.75$")*!/$&+".!/L
MN"#$7.+(00)!0$%"+)2(!%*"8)*"%*"/$'(0$+O
MN2*!0"()!+)2(!%*"8)*"%*"/$'(0$+O
MN"1%$+)2(!%*"8)*"%*"/$'(0$+O
MN"1%$+)2C)&"+O
MN"1%$+)23)!(")&+,%&(!"$&+,+0.!!$&+.!/6&.%#(0+".75$"O.!/
MN!$-$&"$0#!)5)6($+(!0)3%*"$&#.&/-.&$4
PQQRSTIJIK
!%*"+ .&$ /.". :#$0)3%*"$&-(557$)2!)*+$(2("(+!)"0)33*!(0."(!6-("#"#$$U"$&!.5-)&5/4:#*+,
)& +(6!.5+
&$0$('$/ 71 "#$ .0)3%*"$&3*+"#.'$.+1+"$3")&$0$('$(!2)&3."()!2&)3"#$)*"+(/$-)&5/.!/3*+"
0)3%*"$& 7$.75$")0)33*!(0."$&$+*5"+")"#$$U"$&!.5-)&5/4:#*+,.0)3%*"$&0)!+(+"+)2
+1+"$34?! !%*" (!%*"8)*"%*"/$'(0$+4!%*".!/)*"%*"/$'(0$+0.!.5+)7$-&(""$!.+8</$'(0$+4
*!(" ".@$+ "#$
(!%*" .!/ !%*".!/)*"%*"/$'(0$+)2.0)3%*"$&+1+"$3 .&$"#$/$'(0$+"#."0)!!$0"1)*")
0)!'$&"+ ("(!")
7(!.&1 2)&3,+)
"#." (" 0.! 7$
0)3%*"$&4!%*"/$'(0$+5$"1)*")"&.!+2$&/."..!/*+$&0)33.!/(!")"#$0)3%*"$&
*!/$&+"))/ 71 +1+"$348</$'(0$+.&$*+$/")(!"$&.0"-("#"#$0)3%*"$&+1+"$34>)&$U.3%5$,1)*0.!
"#$0)3%*"$& "1%$(!/.".71*+(!6.@$17).&/,)&1)*0.!(!%*"/.".(!%(0"*&$2)&371*+(!6.+0.!!$&
(!0)3%*"$&+1+"$34
12
!"!# $! # 23456839
56456
$%&'(! #!)"(*+,-./012/*3-45165-71,89:;,-:99-
$( <$( <!! <<!!
"##(< "(%
= !!<("(<<!)"
($#("(%
&'(! #( >
?@ A")
?@ B
?@ C"D
?@ B
?@ E
?@ F )!
?@ G
?@ HIJIKI
?@ I$!H(
L # "(%M !#
$#)"($%&'(! #(
>
?@ B
?@ G
?@ G!
?@ ND
= !!!=J%M"!"
!(!!!=J(!!!%O'(! D#
(!(("(!"!!!!
<# "(%
= (!)#(#%=
$# ( )!((<
<!%
=#("(!)"##!!<$#( >
?@B!#(D")!%
?@L!$#((%
?@=#( $ P7*1QR3-ST+,-:07-U9/88;-T*1QR,V
M # #( D")#
( "(%H( "( #(
< %M "##(%%(!
11
3456759
9
!"#$%"&'(!"'"(!&#"#&&!'
44 &'$&'"')"$&#*
+ ,7-.9/905512
/43454678495
:; <!"'&#'=* >#?@
A; B""&#'=* >#?@
C; D&#'=* >#?@
E; F&>&#'=* >#?@
G; H"!%("#&#'=* >#?@
I; J&("#&#'=* >#?@
1; B"&"&#'=* >#?@
/43345,94K5L
M569K5
:; N'"!"#$ !&#'=O
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQ
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQ
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQ
A; N'"!"#$ !"#&#'=O
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQ
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQ
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQ
C; R$"$&#'"#&#'=*
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQ
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQ
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPQ
STU VW635/XY6Z
]?^&" D"")"(["#'!$"\'!&"
"#)
\"$&#
&#))'*]&&"$\"'= &!!"'*]?^
"$$#\ &""#)\"$&#"$$#\_'=
_'=# #&[$"'$[`"!('$*>$!!&"&"#'
&[$"'$[ "$&#!$*J"$"$)=""\*
`"!('$
STUT2/44999/9
a"# && "' "#) &&"[\ &
"$$#"&!*b&&"$2 " !"'
&*]#'"$)'"="'*]#'""
&""$&#*J&&"$ !$["&
12
! "#$%"&"'(&&))") 3456794
67567
&&'"() )&*)")"&#
+,6-
./51A8B
./5/.78T933U4T567
-8V7
T347
-W9
C8U83D24-7
9=9@9'=&'"(9')*%&&<&:)')
)&("&1" !XYH:'Z)&"&:<
)""&#*)')!)(&&))[??;
=?\])))<&'"('# 12
3456759
9
44
!"#$%%&'"$(!)&)$**+$%',%%-./$(,%"01&%(2$!1,"+&-$'&%,%&+2(/&!"&/$!3+.".$!"(
"#&'(41,"&/%0%"&456#&%&./&7
89:;<94
"$%"#&4(%"'(44(!$!1,"+&-$'&,%&+2(/&!"&/$!3+."..!+$!2(/4."$(!$!"("#&
'(41,"&/%0%"&456#$%$%"#&%".!+./+$!1,"+&-$'&."".'#&+"(.**'(41,"&/%56#&
=&0>(./+$%.1/$4./0+&-$'&2(/$!1,""$!3"&?">01/&%%$!3.%&"(2=&0%5@**"#&=&0%./&
!&."*04(,!"&+$!.=&0>(./+'(!!&'"&+"("#&'(41,"&/%0%"&45A&0>(./++&-$'&%'.!
>& '*.%%$2$&+ $!"( ")( "01&% BC4D
95E;<945 .!+ 5
764D
95
E;<9455F&!&/.*1,/1(%&=&0>(./+./&%".!+./+=&0>(./+%,%&+)$"#4(%"'(41,"&/
%0%"&456#&0./&'.**&+3&!&/.*1,/1(%&>&'.,%&"#."#.-&&!(,3#=&0%"(4.=&"#&4
,%&2,*2(/.!0"01&(2.11*$'."$(!56#&*.0(,"(2=&0>(./+$%G,%"*$=&"#&"/.+$"$(!.*
"01&)/$"&/(2"#&"01&HIJK6L5".*%('(!".$!%%(4&&?"/.'(44.!+=&0%.!+2,!'"$(!
=&0%5"'(!".$!%."(".*(2M2M"(M2N=&0%5L(,#.-&"(1/&%%.'(//&'"'(4>$!."$(!(2
=&0%"($!1,"+.".56#&'(41,"&/'.!/&'(3!$O&"#&&*&'"/$'.*%$3!.*%'(//&%1(!+$!3"("#&
'(//&'"=&0'(4>$!."$(!.!+1/('&%%$!3$%+(!&.''(/+$!3*05
6#&P%&/'.!&!"&/+.".$!"("#&'(41,"&/>01/&%%$!3.%&"(2=&0%(!"#&=&0>(./+5!.
=&0>(./+*&""&/%./&1/$!"&+(!"#&=&0%5 6#&2$/%"=&0>(./+).%+&-&*(1&+$!"#&M1"#
'&!",/0.!+).%!.4&+.%.HIJK6L=&0>(./+5 @Q(41,"&/=&0>(./+$!'*,+&%
'(!"/(*'$/',$"/0)#$'#'(!-&/"%"#&=&01/&%%&+>0"#&,%&/$!"(=&0'(+&%%("#.""#&
'(41,"&/'.!,!+&/%".!+$"5 R()S.S+.0%)$/&*&%%=&0>(./+%./&.*%(>&$!3,%&+)#$'#
$!'/&.%&,%&/2/&&+(456#&)$/&*&%%2&.",/&$%.'#$&-&+>0$!2/./&+%$3!.*%(/>0/.+$(
2/&T,&!'05
!3&!&/.*U.'(41,"&/=&0>(./+#.%2(**()$!3=&0%7
M5 VD
W4C67:;5X"$!'*,+&%*&""&/%.!+!,4>&/%5
Y5 C7469C:;5X6#&%&$!'*,+&'(44.U1&/$(+U%&4$'(*(!&"'5.!+
Z5
764D:;5X6#&%&'.!>&2,!'"$(!=&0%U'(!"/(*=&0%U.//()=&0%.!+Q.1%
*('==&0%&"'5
12 [6BX:;<94
!"#$" %!%& 3456794
67567
'()%*%+,-%*1./
'(-"0"*'0(1-%*222322./
'"(4$%%1-%*25262.27
8989:;<6
4$% -%"=%""- $!""$
-!"$ "7>%#%%*-%"=%"%$%#$
%!%%"#$#%%*%7+%"?$"%
@ABC@DDAE@BFGAHFDIAJKIFLAMKFAMNAOHFAJBFLPBAH@KIBAQROHAMKFAMLACMLFASJOOMKBTAUMLAVWX3
$% %#%%*3-%"70"$!$- %
%"%%=%"$7
YZ6[
89\];<6
>%%-!% #?=%" %%$?=%%""%*
QRLFAOH@OAMKFAE@KARC@^RKFAOMASFAOHFACMJBFPBAO@RDTA_A`MJBFALMDDBAMKA@ABC@DDAS@DDA@KIAH@BA
=$ #7a$$" !$!"
"? $%%"%!$-70"$-
-!=%$*%-%*$!=%%"%7>%%
!-$*$"#-$%*7
bc5
<d;<6
4$"$"%"?#%"" #7e$%!%*%*
# != &
;
f949g;<6
]4"%"4$$ !-!"$
"#$"7a%%%"%? !$"%
- $#%% %"%7
579g;<6
])#%"4$$ h !-!"$
"#$ "7>% -"#%%*-%"74-% " %*
"* %!"%*%!%* #7 12
3456759
9
95595 !"#$%&&'#()%) )&)%)'*#+
44 &,-,'#.%/.)).&#)*#&,&,0&,$%12&&%)0#&%&%&,"3,#)+%%#
#3)%/1
0-"&0#.%('"+"/#)#3)#)3-#.&" %)3%-, %).0-"&%)(#
3%0 $'0"/�#%#3)14!"-%#5"#&0(&,0"$.%"#&
-(# % 0&, "+%.16*(7%)-&#.%//%0"89:;<=>?@A=><B<CD@8><
-%1
EFEFGHI6J66K6LJMN4
O67PQ4RS
],%"
$'%.,#&.&7 T#3#&#U#)3VW=BXYAZ8:<;B[\>;#%.0-"&#)-"&(#.&,%&%//* )&,%)%*
)3#)%) #0%3 %)3%-,#.7#0#/%&&,*%')%* #0%3 *#&,%-).#/%)-%-1],
#3)#) &%$/& 0%'%/$"&.%-&"%&%+,%)*#&&) #3)%&"1 ^0&%$/& %
0-"&`# #)&)% %3)%/-/%.0)&+%0"% &,-#0%'-#)&#)3%))%(#3%&#)
T#3)a`Tb (#.+_&-.0-"&1],%"$'%.,#&.&7)3#) %)#3) #)
+#3)#)3
-"-7".,
% $"#/#)37
0-"&`# T#3) a`Tb+#3)#)3 -"-7 "., % $"#/#)37.%7
.%70.,%)#.%/ 0.,%)#.%/-%&7$& &.1],%%/"#)V3%-,#.%/2)+0%&#)^'&0
-%&7$&&.1 aVc^b+#3#&#U#)3+0%-1
d6JEFeN4
O675Q4RS
V%-,#. &%$/�&"#&+%&#&%)&,*,*%)&&,)%&"%/+/+%-)/#_
$f.&& 0%)#-"/%&&,.") &,# .)1g%.0 # &,0&*//_)*)
0%)"+%.&"+3%-,#. &%$/&7%)##).#$/'*//-.&1
EFEFEHQ47hR4SS
]%._$%//# %0(%$/$%//0")&)% &%&#)%'(#.7*,#.,.%)$&%&
0%)"%//'$'"#)3+#)312&#%/%-#)&#)3(#.12)%&%._$%//7&,$%//#-/%.)
&,&-%/)3*#&,$"&&) *,#.,.%)$//*#&,&,+#)31],%"#)-/%'#)3
(#3%01
12 d6JEFiQ47hR4SS
!"##$%#&'#" 3456794
67567
(')
*+*+,-./071
2(#$% #$#&$3 $#"$3 ('&'
#$###)4##$%## $#'#
$#&')56 &$"##3#$%#
7(#$%###$%"3'3 &'#)
2(#$%3 $#'$$$8#$%8"#
&$83'##8###$)
9:6;
*+<=./071
52(#$%">'?)13 $#'#&#
3#$ #$)
@ AB
1C/6;D;/:;
E
F
D9;73=G;6
H99I
JK L$$#($$#"#$#) 5M>
NK $$$ (3 &#) 5M>
2K ##'&$) 5M>
?K >###) 5M>
OK P$##$#) 5M>
QK R##($#) 5M>
SK # #$$#) 5M>
D9;733=TB/;794U
;705
V6
7/4
JK W#((%(X
YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY
YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY
YYYZZYYYYYYYYYYYYYYYYYYYYYZZYYYYYYYYY
NK W#(("###(X
YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY
YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY
YYYZZYYYYYYYYYYYYYYYYYYYYYZZYYYYYYYYY
12
3456759
9
!"#$!!%#!&%'%(!$'!#)
44 *******************************
*******************************
***++*********************++*********
2 !",#'$-!%$-"..#'!$/%##)
*******************************
*******************************
***++*********************++*********
012 345678479
:'$-;'$#%##.$!",$! #$% !<= #.$",$$!" >%
?%/'$#<@>/.#(/'$-;'$#%.'?/!#!$#$% !#<
0121ABC6DE3F5
GH'?/!'#/!.'- .'?I#!#''; ;'$<J'#$!!$"&'% $/%
%'!.$ KL="&!/'!&%# #$% !!?!%!%%&
.$%'$./.# $!" ( $/%#!'!/#'?!.<
J'##%&! #$% !%/'! '#/.",$#<J/%#"
$'!? .'?'" #$% !/#/%#<
G.'?/!$!&%-&'!KL=!'%"!&'HKM!'%#<J'##"
G.'?/!$! %$'$#! !?'! %#(%KGM//.'$'!#! ''!?<
&%-&'!KL=
!'%"!
&'HKM!'%#
N6D01OPC6DE3F
0121QBR97E97F5
=$#$% !#% !'%#S .$%!'$;'#.'#/.#$% !#&'$$&%
%"'!?$<= #%-##.$'!#"'%$.$'!? #$% !T%%!
;'!?$%#% /'!! #$% !&'# %,#'$-
U&#$#$% !#%"'!?#'!G=V$'!#(%-'!?'#%(%'!.!
W'#-$'!#%#(%?''!? %;.%#"'%%;./.!#<=$#$% !#
%.##'!!( %!$../!#<
12
3456794
67567
6
6
4
!"##"$ %"&3!"
'()*+,-./)/0(),/1,234)5*6+6)52.0*51)7+-*,2)856,4*159:0)8,4))*/(61*03)0,(06
1/775.6,4*15./)/5()*+;<,4*15./)/5()*+.5=01568/=5/7,:5*3*,>/>070)+,-5**,*0(
0(34)./)/)8/(6)/(./*.?5+>,/*.5()*+;
<,25,-)851,22,(6,4*15./)/5()*+.5=0156/*5.0614665.>57,:@
79A!9B
9
CD0E0)/71/25*/06/(5751)*,(01.5=015:8018)/?56=0.5,,*6)07738,),E*/386,*>,)89
.0E0)/77+>+*51,*.0(E02/E56=0//(5751)*,(0102/E565(6,*;D0E0)/71/25*/61/(.,
FGHIJKLMGHNGLOHPQLNRQSTRKLNRIUFVLOWTLSXRQYPSLZHKYPR[HIJLHQRJSKLWILKNTSSILHQQSZHRFSP[L
/-)5*)85+/*5*51,*.5.;
\2/E56*51,*.5.,(/.0E0)/71/25*/1/(>51*,335.-,*5.0)0(E9.575)5./(.=/*0,46)+356
,-63510/75--51)61/(>51*5/)5.>+460(E]8,),68,36,-):/*5;
D0E0)/71/25*/67,,?70?5,*.0(/*+1/25*/6>4)8/=564--0105()252,*+0()85-,*2,-
18036),6),*5)8,46/(.6,-02/E569*/)85*)8/(460(E38,),E*/3801-0726;
6
79A!9B
9
^,6).0E0)/71/25*/6/77,:465*6),18,,65)85*56,74)0,((55.5.-,*/301)4*5;^,6),-
)8,651/(1,((51).0*51)7+),/1,234)5*),)*/(6-5*./)/;C_<`3,*)06E5(5*/77+465.
-,*)80634*3,65;Ca0*575661,((51)0,(1/(/76,>5465.-,*1,((51)0(E),/1,234)5*=0/
`745),,)8;
12
3456759
9
!"# $% # #"&'(")#
44 *+,-,./0*+12.345*4/-673./,8*37-0290/93:;<=>?3173-+43@,7-3A,@@,23B1C43B,/@0-387493B,/3
#")& #")'D#$#")%!"&$#EFGH$##'
IJKJLM74NN5
OP))")")Q# R") " #")Q# #")##Q##")#
$$Q"#'S#Q#"%%)"&EQ")# #T#E)!"#")&E)U(#E)
)R#"## "&"#%"&'VTQ%$)) W#Q$%#U ))'
S)))# )#"Q% )&%!")!$))")&'X)"%% "R)
))##R# )##Q"%% $%&Y$## R%$
)#'
Z6[IJ\L]^
674_M74NN
O)##Q$))"Q%)#))'"))#WQ#&Q$UW
) )#' ")")%)) $Q")&#Y")")%
%$U(#'
IJKJ̀^
674_a4bc79[N669Nd^ace
DXf "#))")&$QQ# ###Q)U)$W")
Q#") Q"#")'G! E"#" )")Q# R"$ #)#
QQ' g)"R"#") %%&$#)DXf$#R%#")$DXf#
$Q#"#"RT'DXf#)"#$%#"Q%"h#")QQ)
#)#h" #WW#")"##")!' DXf" ")#
g)"R"#")
%%&$#) R%#")$h#"))"ER) )"R"#TDXf#'
DXf$#
R%#")$
DXf#$
Q#"#"R
T
Z6[IJ\`]^
674_a4bc79[N669N
12
94
734997
4743 3456794
67567
!"#$%&'"()*&$#*+#&,!"%$%,"%- &)*&$#**#&,!"%$%,"-.-$#/$)$0-#--1#&%2
%"( "3&)*&$#*-45)#" 3,&0/#"$$)$&,"$%"-$)%-%"("##3-$,6#*#37%$1--#-
$)*,0!) / &)%"#78)%&) / !"#$%9#- $)# %"( "3 $)#" $*"-2$#- $)# / !"#$%&
%":,*/ $%,"%"$,&)*&$#*-4
';+$#&)",2,!.%-0-#36.6"(-:,*:-$#*1*,&#--%"!,:2*!#<,20/#-,:&)#=0#-4
>0/6#*- "3&)*&$#*-:,0"3,"$)#6,$$,/,:&)#&(-?0-022.&,"$%"%"!$)#&)#&( ';+
"0/6#*7-,*$"0/6#*7 "3 &&,0"$"0/6#*@ *#1*%"$#30-%"! !"#$%&'"(4A,1*%"$ $#&)",2,!.%-
!"#$%&'"(&,3#-78#"##3 2-#*1*%"$#*$)$&$-';+$,"#*4 0-#36.6"(-
:,*:-$#*
';+1*,<%3#- -#&0*#7)%!)B-1##3/#$),3,:-&""%"! "31*,&#--%"!%":,*/ $%,"4 1*,&#--%"!,:
2*!#<,20/#-,:
A)%-$#&)",2,!.%-0-#3:,*1*,&#--%"!2*!#<,20/#,:3$4'$-1##3-013$ %"10$:,* &)#=0#-
$)#6"(6#&0-#&)#=0#-&"6#3%*#&$2.:#3%"$,$)#%"10$3#<%&# -%$ 2-,#"-0*#-
&&0*&.,:3$ #"$*.4A)#/,-$&,//,"2.0-#3&)*&$#*-#$6.';+3#<%&#- *#
(",8" -CDEF:,"$8)%&)&,"-%-$-,:$)#"0/#*2-G$,H7"3:,0*-1#&%2&)*&$#*-4
IJ9
9
K6*&,3#*#3#*%- "#2#&$*,"%&3#<%)%&)%-0-#3$,*#31*%"$#36*&,3#-4F *&,3#-
*#1*#-#"$ 21)"0/#*%&3$ 8)%&)%- &,/6%"$%,",:<#*$%&22%"#-?6*-@$)$<*.%"
8%3$) "32#"!$)4'$%- :-$ "3#::#&$%<#8 .$,%"10$3$4KF *&,3#*#3#*0-#-
2-#*6#/$,*#3$)#-#*%#-,:$)%&( "3$)%"2%"#-8)%&)*#1*#-#"$$)#6*&,3#"0/6#*4
L6
MNJ9
L6
MINJ9
9
A)#6*&,3#%-DE3%!%$-2,"! "3%$)-:,0*/ %"3%<%-%,"-4A)#O%*-$$8,3%!%$-,: 6*
PQRSTUSVUSWSXYTYZSTPQ[XYU\]TYZSTWSPQXRTV^UYTUSVUSWSXYWTYZST_^X[`^PY[USUaWTPQRSTb`cdST
3%!%$-@$)#$)%*31*$*#1*#-#"$-$)#1*,30&$&,3#?:%<#3%!%$-@ "3$)#2-$3%!%$%- &)#&(
3%!%$4
94
7e75
9
K/ !"#$%&*#3#*%- )*38 *#3#<%)%&)%-0-#3$,*#3$)#%":,*/ $%,"#"&,3#3%"
$)#/ !"#$%&-$*%1#2,&$#3 $$)#6&(,: &*#3%$f3#6%$&*34K6"(&*3),23-3$
6,0$$)#,8"#*,:$)#&*376"( &&,0"$"0/6#* "3&,3#,:$)#6"(6*"&)78)#*#
$)# &&,0"$%-)#234
12
23456489
8
33
5
3655
3 5
35653
!"#$%&'()&*'+%*%",%*)"*%-.&%$/)%,"&)/+%*0"*1%&)"$,'$0"$2,'..%*%$&&2+%)-.
)3-+)45$&3%)%0"(3'$%),"&"')*%",%6%(&*-$'("662"$,&3%+-'$&-.)"6%')("66%,
76%(&*-$'(8-'$&-.9"6%:78;9<4
=3%*%"*%)%>%*"6-&3%*+'(1,%>'(%))/(3")0'(*-+3-$%)"$,)+%"1%*)4=3%)%3">%?%%$
,')(/))%,'$6%$#&3/$,%*&3%)%(&'-$;/&8/&@%>'(%))%(&'-$-.&3')/$'&4
AB CDEDFGHI
G
;$%-.&3%0-)&'0+-*&"$&-/&+/&,%>'(%)'$(-0+/&%*)2)&%0')'&))(*%%$(-00-$62
("66%,0-$'&-*45&')"$-/&+/&,%>'(%"$,,')+6"2)"66&3%+*-#*"0)"$,"++6'("&'-$)
J3'(3"*%*/$$'$#-$&3%(-0+/&%*)2)&%04K!-$'&-*')&3%>')/"6,')+6"2/$'&-.&3%
(-0+/&%*)2)&%045&,')+6"2)'0"#%)#%$%*"&%,.*-0&3%>',%--/&+/&45&,')+6"2)'0"#%)
J'&3-/&1%%+'$#"+%*0"$%$&*%(-*,4
Kq*"+3'(,')+6"2
LMNOPQRSTMUSVQWPXMSVMYPUZM[QM\]MPMVZOSZVM\]MU\^VMTPWWZUM_QS̀ZWVaMbQST^[OZMZWZYZc^VdMeR\VZM
')0",%/+-." +"&&%*$+*-,/(%)'0"#%)'$(-0+/&%*)2)&%047"(3,-&-$&3%)(*%%$'),%.'$%,")"
)%*'%)-.,-&)("66%, )%+"*"&%/$'&J3'(3("$?%",,*%))%,)%+"*"&%6249'$(%%"(3,-&-$&3%)(*%%$("$?%
_5rs4aMbQST^[OZM (-$&*-66%,)%+"*"&%62'&#'>%)#*%"&%*.6%f'?'6'&2'$,*"J'$#+'(&/*%)4=3%g/0?%*-.,-&)
%6%0%$&)<J3-)% +%*'$(3:,+'<')("66%,&3%*%)-6/&'-$-.&3%)(*%%$"$,*%+*%)%$&)&3%h/"6'&2-.&3%
+"&&%*$+*-,/(%)
'0"#%)'$(-0+/&%*
)2)&%0
(-0+/&%*)2)&%04
ABB
383i
j8584k
l
!-$'&-*),')+6"2J3"&')#-'$#-$'$2-/*(-0+/&%*4=3%2("$*/$"&>"*'-/)*%)-6/&'-$)4
5&')&3%+"*&-.(-0+/&%*J3'(36--1)6'1%"=m)%&4K.&%*&2+'$#&3%(3"*"(&%*).*-0&3%
1%2?-"*,nJ%("$)%%&3%0-$&3%0-$'&-*4
=3%0"'$(-0+-$%$&)-."op=0-$'&-*)"*%&3%%6%(&*-$#/$n&3%%6%(&*-$?%"0
(-$&*-66%,?2"$%6%(&*-0"#$%&'(.'%6,"$,+3-)+3-*(-"&%,,')+6"2)(*%%$4=3%)%-6,%*
0-$'&-*)"*%?/612"$,*%h/'*%"6-&-.)+"(%.-*'$)&"66"&'-$4
11
3456794
67567
6
9 4794
747
49!"4
99
#$%&'()$*+),-.+/0*(120*-3,)405+06)$+/0-5,00$786*,05+*$2+/00905+,)$701(
)$+)+/05)(3:+0,-5,00$;')3,05*-0986*,05++/00905+,)$701(-.5)330,-+00,*$25)*9-
1,0:-06+)5,01+01(12$0+*5<*096*$-*60+/0+:70;=813398*$2>1,8*$2>)9+120-+)+/0
5)330,5)*9-1701(51$703)-*+*)$061+1$83)*$+)$+/0-5,00$;
?@AB6
C7959CDAE
FGHIJKGLJHMNOPQNKGLKRSJPTQIKSLNKPUMPVIKGLKJTQWXYZ[I\K]^_IKSHQKLMRKOIQNKJMKNGI`USaK
*(120-*$()$*+),-;b$0c0,+05/$)9)28*$5)(3:+0,-5,00$-*-'d'e%f()$*+),-;
'/0-01,09*2/+c0*2/+()$*+),-1$61,0:-06*$913+)35)(3:+0,-;b5+*>0(1+,*g-+,:5+:,0
*-:-0678()-+)<+/0()60,$e%f()$*+),-1$6+090>*-*)$-0+-;#$+/*-+05/$)9)28.1
(1+,*g)<+/*$h<*9( +,1$-*-+),-i'd'j*-16606+)+/03)91,*k*$21$65)9),<*9+0,-;#+
0$/1$50-+/06*-3918+)(1l0*+9))l7,*2/+0,1$6-/1,30,;#+51$19-)3,)6:50(:5/70++0,
*(120-1$6/1>0m:*5l0,,0-3)$-0+*(0-;
:6D34QRS<?TU84N9O79
&""'&$+#%""%* $
%+% %(
12
99744747
9 3456794
67567
!"#!$!#%&%'($(()!(!#%'*(+(**(!,"!$$!-(..!/&0
2124
34,!(! *(&$%5,/$(-!#!$!)(11)'$%#67-,()
.7'$%#6)%'7'$%#618#!$!("!,'%#6.!/*!", #%*!,"!
,"!.!/*1
91:9;<9
3(%!!#,!5&!"!(!1=/(*(&$%5 ,!/&/'5/(.
*("",%* !".%5)%*'5%#!'(%(!!"'$%#6%*-,(1
>12473#%*(&$%5,!/&/(%5#!$!)%.(."!2?!!+2
($$(!*(""#!$!14,%%$!#%$$*% @A=!(!)'#%/,5%##&
, &%% (.%$)-,(#,%*).)%*'$/1
99744747
9B
C"#!$!#$% ("(#%(!),!(&!%%&#!"%!(!(( # (D14,
E(D!"#!&/ #(%/*(*(%.!%$(#, %*(.(+'5%/(.,
*(%#"!!#!!,!&&!(#!F*(%.!%$$5G14, %$$(D"!HAC
!(! (2I(#,)-,(#,(%$!,5$+$!(!"!!#!&/ 5 1
4,J%. (D$%*#%&!(! #%*(&$%5-!"/$$&%. (*'5 (*%%(1
8,5&(#%$!(!(D %2K(#,)9L(#,)9>(#, #1
99744747
9M
674
4,!$/(!!"%!(!% ,/'!"&(N$&(#,%&&%(.!( /"%#1
.%$,.%,/'!"&(N$ , ,%&( ,(%.1O!!* 4,
!(! #%*(&$%52L9I'5K?P&(N$1E!,(.,Q*!*$!"#!&/!(! .%,
#%*(&$%529PL'52L9I)!+2?LL'529LL&(N$1R+>9PL'59LIP!$/(! /'!"
&(N$,
!(!%%+%($%'$"!&#(%$&/&!1S,($T@4 &!+(*+%(%'($(5(!$/(! ,%&(
JTU !(!,%+%"(N*!$/(!1 ,(%.
99744747
9V49
T!&/!(!#%'*(+(**(!-!#%.!( !,'%(!",5&!" (.%$
-,(#,,5%##&14,%0
21 C%$!.O!(!
91 U(.(%$O!(!
W49V247
4,R$#!(# (.%$,%( '5 (.%$ !"+%5(."X/#5)%&$(/*!&,%
(%*!"'(. % %8Y!8ZZ*%%%((!( #%$$*%%%$!. (.%$1
C%$!. (.%$%$$!-X/(&!,%*$("!%(!,%#!(/!/$5#,%. /#,%
+!$%.)#/)#1
12
3456759
9
!"#$%&#%"'%'''"'
44 !""(($'%)(*+2,
-6./0123454
659
78469.96.846
:'"'"#""$!; <"##=>:"'$+:'
%??"'"&#!"+
@6.646A98693
""'""$#";"' BC B))#D"
+'%)(*+22E<!;#"#'%"'$??+F"'
;"#<"'G ,++(! #%; BC#B))<#+F"' '"
#"!"('%%'!E"' BC B))'!""<
"'#!$+
-6./0113454
659
@6.64696.846
:'#"<" &#"#(=>:"'$+:'#"
"'<" &#;<"'&##!"+:';#;;""$!('
=H I= H !'#!"JKLH IL'# H !'#!"JKMH IM#
H !' $JK#NMHIN(! M#H !' $J+:';"#!#(
<+
O P7QR9S9.55T
S4U3VW-465
,J X?#&(#"!?Y""'<" :(Z)
2J =>:<"(<<""$"'[=D<" :(Z)
\J ['"L<""D!$"';(;<;[LD<" :(Z)
*J ]=#>#B^:X^:D& :(Z)
_J H !'""(#<(+ :(Z)
`J H !'""(#; #!(!+ :(Z)
S4UU39P9485a
b56985
,J c'""';(";H !':"d
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeef
12 eeeffeeeeeeeeffeeeeeeeeeeeeeeeeeeeeee
!!"#$!%&' 3456794
67567
((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((()
((())(((((((())((((((((((((((((((((((
2 *$#&+!%#$&'
((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((()
((())(((((((())((((((((((((((((((((((
, #%##'
((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((()
((())(((((((())((((((((((((((((((((((
- !"!%#'./$!!&0#!&%#%#!&!%&1
((((((((((((((((((((((((((((((((((
(((((((((((((((((((((((((((((((((()
((())(((((((())((((((((((((((((((((((
234356747
7
8#!#&#&9#$#%!"$$$#1:###"0#!9$#!#&
$#!!"0!%&;!%%%&&!9!%%#!"$#!<!$#!!"&$1
:&0#!!&9$#!#&#=
67474>?
@4ABA>CDE5975747
734A4E5975747
7
F$%$#!#&&0#!!&9&#$;#!#$#!!"%!&;#
#&#!G&$$##"!G#!1
HF$%$#!#&&%!%I#%#!% &!"&$#%&&
$$#1J9&#<!#&$%!%##$$#$#!%#%#&1
KB9L97A4AL5747
7A47@
M9AL5
N
O&!&9&$$#!#c!"$&
P1K@9797
76747
7N:&$#!#&%$#!%#%#!1:;#G
&!!#$;#!#1:/$&#Q!&8#!#IQ+#!/8#!#
FGR8#!#1
S9T9CUV@
B6747
7N:!&$#!#!&&!!#W$;#!#1:!&$
9$#!#&$&!%# ; ;!%&$9%%#%#!&
&&1
12
3456759
9
44
6465 !"6#
$%&''()*)(++(+,%(-%((.&/&01+,&)022314-%05%01,6)1'&7(+&1017+,&0101
,%(+%&*(38,%(5%&)&5,()31,%(*&*()9:&0+;<-%((.*)01,()+*)3=65(.(,,()<
>6&.0,;*)01,26,5&113,*)01,/)&*%05+9?%(*)01,>6&.0,;38,%0+0'*&5,*)01,()0+
@();.3-&+0+,%(+*((=9?%(+(&)(*)&5,05&..;32+3.(,(13-9
ABC9D46E"6#?%0+0+31(38,%('3+,*3*6.&)*)01,()+6+(=83)
*()+31&.53'*6,01/+;+,('+9?%(+(*)01,()+&)()(.&,0@(.;5%(&*()
53'*&)(=,33,%(),(5%13.3/0(+&1=6+(0'*&5,,(5%13.3/;9
F1,%(G1HI+&1=G1JI+4=3,'&,)0K0'*&5,*)01,()+-()(/(1()&..;531+0=()(=,%(2(+,
,)&=(3882(,-((1(K*(1+(&1=@()+&,0.0,;4&1=61,0.,%(G11I+,%(;-()(2;8&),%(
'3+,53''3183)' 38*)01,()+6+(=-0,%*()+31&.53'*6,()+9L%&)&5,()+01,%0+
*)01,()&)(83)'(=2;,%(53'201&,03138=3,+9
69D46E"6#
$:3,<M&,)0K*)01,()5)(&,(+5%&)&5,()+2;+,)0701/*01+&/&01+,&1017+3&7(=)022319
N&5%*01'&7(+&=3,&1=53'201&,031+38=3,+83)'5%&)&5,()+&1=0..6+,)&,031+9?%(
'3@01/*3),03138,%(*)01,()0+5&..(=,%(*)01,%(&=9
/60123456789:;67
<654=47405
*&*>!,&"(?!@A#!&B
!@&"(!>.#!&>'
C!!++,! !@%*,&%"!!$%"%# %"$$!%&&$*
!@+>+" #!D&$%& #!"*&#+!"$&&,)"
!%"%+!("$ & !@%*,&$#'
>!"E!@A!"FF+&#"!"%+",,!,E**!@'
32G45;675&&,+),&#*!*,>"+$ %!"+",
#!'?!+&#!&)+&H$&&* "#"*%!$,"!*$'
+,"(+&+&+%%+%,"!*$E>&'*$
&!"++*",&>""("!)E%&#%@*#H%,*#""!&
"(*$'I!++) "!&!&(* " ##",%"$H!"!"(
!*#&&'J&#!&#"*%>,+ . !*,#%&H
.#!&>' %!"+",&*H $ & &$& "(#""%"#!,
$%!&'&#*"(+&#!&>&("$KL#,&#$!"MLL#,&
#$!'J&#!&+&"%++*#,#!&DH%& #! E"+
#,"!,"'
N!**+&#!&%!H%+&&(*!"E"%,"&!$&"(%"+"B
C"!"%"$+&#!)!*
O"+"+&#!
12 /60123P5G45;67
!"# $ 3456794
67567
$"%&$'('
&!"#)&!*)+ ),$"
%)*!)!!)"
-),.+,,&+)$/
))!$$!"
01212 34577
6
7-)')*!,$'!
)$"8)!"8 )
)*,*)"
9:66
01;<=34577
6
-)!.+)!).+!)"
>!,) !!.+,!?
!$)$$@"A')!)!$+ >!,
$$,,))!$&)!)?)) )
)!'+ $"
!!
-$*+B .+,!?
!
CDE- $)$$
@
CDA?F)-
%) !+$&))+ '*
$&)"G-,#)>*
$!).+$"
0121<H5
9I
694
J655K54
H5
9I
6
#L, )L,(L,+.)
**?*$*))">(L
)*&+ !!)L"
12
3456759
9
44
J#&)*&'
K!0$"& J%)+/
!+%'!0
6664
45
!"#$%&'(#&)*&'(')+,&-./&01.+2$)0.%1)+/.+#'.3&45)#%!#3!"#$%&'(6)7&.+8$.0%
(#&)*&'(4
679
99:
;<.3'!#6!+&.()+)3!$(%.3=%!=&0&3%'.3%')+(/$3&'!'(&+(!')+/.($(&/%!3!+7&'%(!$+/
(.,+)0(.+%!&0&3%'.3)0(.,+)0(4>%-)(!'.,.+)001.+7&+%&/81?".0&@&'0.+&'.+A2BBC)+/
)00!-(1!$%!'&3!'/7!.3&(!'(!$+/()+/#0)3&%6&"!+%!3!"#$%&'(C,&+&')001)()
-)7&D.0&4
6EFG967H796:679
99:
I!3!++&3%)".3'!#6!+&-&.+(&'%%6�$,!D.%.+%!%6&8)3*!D%6&3!"#$%&'(1(%&"4
>+%&,')%&/".3'!#6!+&(3)+8&D!$+/!+0)#%!#()+/(!"&/&(*%!#"!+.%!'(4I6&(&
".3'!#6!+&()'&$($)001)(")006!0&.+D'!+%!D%6&3!"#$%&'-6.36-6&+(#!*&+.+%!C
-.00'&3!'/1!$'7!.3&4
12
5 23456839
56456
862686658
! "#$%&'()**+,-$./*-%,-$./%)$0)12#+$/&,-$./$.03 4-2*56#+%*
7! 8"9/':#/-$;,-$./*-$%#<)#-#</*-,-$./*-3 4-2*56#+%*
=! 8:9.9<)-9>*+#%*-,-$./*-2%*%?92-/9.*-%3 4-2*56#+%*
@! A9+9-+#%*-,-$./*-%2%*#%$.0+*/9.*-/9,-$./3 4-2*56#+%*
B! C#%*-,-$./*-%#-*D*-&<)*#,3 4-2*56#+%*
8622683E6F4G563
! H)#/I9&92>*#.J&%,*#K*-%L
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM3
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN
MMMNNMMMMMMMMNNMMMMMMMMMMMMMMMMMMMMMM3
7! H)#/I9&92>*#.J&,-$./*-%LH)#/#-*/)*D#-$92%/&,*%9?,-$./*-%L
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN
MMMNNMMMMMMMMNNMMMMMMMMMMMMMMMMMMMMMMN
=! H)#/I9&92>*#.J&,+9//*-%LO;,+#$./)*$-<)#-#</*-$%/$<%3
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN
MMMNNMMMMMMMMNNMMMMMMMMMMMMMMMMMMMMMMN
@! H)#/I9&92>*#.J&#I9/'>#/-$;,-$./*-L
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN
MMMNNMMMMMMMMNNMMMMMMMMMMMMMMMMMMMMMMN
B! H)#/I9&92>*#.J&C#%*-P-$./*-%L
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMN
MMMNNMMMMMMMMNNMMMMMMMMMMMMMMMMMMMMMMN
QRSSTU
V.,2/592/,2/I*D$<*%#-*/)*I*D$<*%/)#/<9..*</&92/9&92-<9>,2/*-3V.,2/I*D$<*%+*/
&92$.,2/I#/##.I9/)*-$.?9->#/$9.$./9&92-<9>,2/*-#.I/)*&#+%9+*/&920$D*&92-
<9>,2/*-%,*<$#+$.%/-2</$9.%%9/)#/$/($++K.9(()#//9I9369-*;#>,+*W&92<#./&,*
$.I#/#J&2%$.0#K*&J9#-IW9-&92<#.$.,2/I#/#$.,$</2-*?9->J&2%$.0#%<#..*-3
XYZ[\]Z^[\]_Z\`YabZ^c[dc[Za]efg]hZafhdìjZ[\]Z_]hci[hZ^kZj^c_Zg^ldc[]_mhZg^ldc[`[f^YhNZ
no`ldi]hZ^kZ[\]h]Zp^ciaZq]Zj^c_Zg^ldc[]_mhZl^Yf/9-W()$<)I$%,+#&%#++9?/)*,-90-#>%
j^cm_]Z_cYYfYrbZ̀hZp]iiZ̀hZ[\]Zd_fY[]_bZp\fg\ZpfiiZd_fY[Z^c[Z̀Z\`_aZg^djZ^kZ[\]ZfYk^_l`[f^YNZ
s92-<*I#/#*./-&I*D$<*%#-*/)9%*I*D$<*%()$<)#2/9>#/$<#++&<#,/2-*I#/##.I$>#0*%
#/$/%%92-<*W-*<9-I$/$.%>#++<)$,%#.I,-9I2<*%$>#0*%$>>*I$#/*+&3 11
3456759
9
!"#$
44
%
&7'!9#9(55)
#4*+
,1-./01 ,2- 34561 ,7- 34561 ,8- ./01 ,9-34561
,:-./01 ,;- ./01
#4**+&94<5=
>569<5
?
1@ ABC0DE1FGH1651DIJ0GBC0DE4D44BEJDK1/GBLJ/M4DGJBGBDJDK1HJMC0D1/@.K1I
4/1061EDJNGF16C1HG45GB6D/0HDGJB6DJDK1HJMC0D1/6JDK4DGDOG55PBJOOK4DDJ
EJ@ABC0DE1FGH16D/4B6L1/E4D44BE061/HJMM4BE6GBDJDK1HJMC0D1/6I6D1M@
ABC0DE1FGH164/1061EDJGBD1/4HDOGDKDK1HJMC0D1/6I6D1M@ABC0D64/1E4D4J/
6GNB456/1H1GF1EQIDK1HJMC0D1/6I6D1M@
3J/1R4MC51SIJ0H4BDIC1GBE4D4QI06GBN4P1IQJ4/ESJ/IJ0H4BGBC0DE4D4GB
CGHD0/1LJ/MQI06GBN46H4BB1/@
2@ TUVWUVXYZ[\]Z^XY\^W_`aXVbZXcZ^U_VXdeXadUcX]dfWUVZcg^X]dMC0D4DGJB6@hR4MC516JL
VbZ^ZX`cZXadUcX]dfWUVZcg^Xfdi\VdcjXTUVWUVXYZ[\]Z^X`cZXVbd^ZXYZ[\]Z^Xkb\]bX
EG6C54IDK1/1605DJLGBC0DE4D4J/6GNB4564LD1/C/JH166GBNGD@lK1BE4D4G6NGF1B
DJDK1HJMC0D1/DJC/JH166DK1BDK1C/JH1661EE4D4SGBLJ/MJLDK1E16G/1E/1605DS
HJM16J0DJLDK16I6D1MDK/J0NKJ0DC0DE1FGH16@
7@ hR4MC516JLABC0DE1FGH164/1m
n1IQJ4/ESoJ061SpJI6DGHPSoGH/JCKJB1Sq4/HJE1/14E1/4BEr/4CKGH6D4Q51D@
hR4MC516JLJ0DC0DE1FGH164/1m
oJBGDJ/Ss/GBD1/Ss5JDD1/4BEtC14P1/
%
&7'!9#9(55u
#4*+
,1-34561 ,2-34561 ,7-34561 ,8-./01 ,9-34561 ,:-34561
,;-34561
#4**+&94<5=
>569<5
1@ vn1IQJ4/EG6JB1JLDK1MJ6DGMCJ/D4BDGBC0DE1FGH164BEG6061EDJGBC0DE4D4GBDJ
DK1HJMC0D1/6I6D1M@n1IQJ4/E6HJBD4GB51DD1/6SB0MQ1/6SL0BHDGJBP1I6S4//JOP1I6
4BE6JM16C1HG45P1I6JBGD@vw61/1BD1/6E4D4GBDJDK1HJMC0D1/QIC/166GBN461DJL
P1I6JBDK1P1IQJ4/E@
2@ vxJMC0D1/MJ061G64BGBC0DE1FGH1@ADG6061EDJCJGBDJBDK1GB6D/0HDGJB64BE
122 HJMM4BE64/1GBC0DQIH5GHPGBNJBDK1MQIGD@vMJ061K46DOJJ/DK/11Q0DDJB6
!"##"$ 3456794
67567
%&"'#(!)*+"$
,##"'#"-.(/(/"(
0$ %1"#"#"$+
(('!/"2/"!/"34/ "
!(!$
5$ %6'7" "(#" "#"('!
!$+73#"
"((!!$%6'7# "$
6'7"(#" "((! "/"7/""
(/#(!("/"("3$
%8"73((3(3(("'$+ 3"
(('3'!#!"$+(('!!$+&"
"/&3("73(("!"
((('!$8"(('!!$
9:
;<=6>?>=@>
A
?9>73B
C1D8" CED8" C0D8" C5DF( CGD 8" CHD 8"
?9>733BI:=>794J
>7K5
L6
7=4
1$ ,!M!")NOPQRSTUVWXPYZ[X "((\
"!!"/("'"!(
"$83('(3 "#"!"$
E$ %!"3( "((\"!
!"/("'"!("
"(#(#\(734( """"$8
3(" "#"!"$%"/!"
!"]"%,!C]%,D#"!!"$
123
456786
55 !"# !
8 5$
%
&'2( )*+,-./0+1-* 123
&'1( 23450+1657 12&
&'8 9:;57-<=> 12&
&'8'1 ?-,@7+A+1-* 12B
&'8'8 C57@+-;>-D;/+5,7 12B
&'8'E FA;+-; 12G
&'8'3 H5+3--@ 12I
&'8'& 9A3J5+=> 12I
&'E KA,.LA,5>-D;-*5*+7-<A=> 112
&'3 M-<+LA,5>-D;-*5*+7 113
&'3'1 N;;J10A+1-*M-<+LA,5 11&
&'3'8 O+1J1+:M-<+LA,5 11P
&'& C57@+-; 183
&'&'1 Q:>-D;/+5, 183
&'&'8 Q:C-0/D5*+ 18&
&'&'E R50:0J5S1* 18&
&'&'3 9A7@3A, 18&
&'P )*+5,*5+-*A=> 18&
&'P'1 C1AJT/;)*+5,*5+>-**50+1-* 18PU
&'P'8 S,-A.3A*.)*+5,*5+>-**50+1-* 18P
&'P'E =,-V:M5,65, 18B
&'B M/DDA,: 18I
&'G N*7L5,7+->W50@X-/,=,-Y,577 18I
&'I Z/,+W5,R5A.1*Y7 1E8
%[ !\!
N6
]5^ 8
_`17AY5*5,AJT;/,;-750-D;/+5,a/75.<-,.A:+-.A:A0+161+157
1*.1<<5,5*+A,5A71*0J/.1*Y5./0A+1-*a3/71*577aA.D1*17+,A+1-*A*.W5AJ+W'C/5+-1+771b5
A*.0A;A31J1+157a=>17/75</J<-,+W5/75,7'N=>0A*35 -;5,A+5..1,50+J:A*.DA:35
/75.<-,0-D;/+A+1-*AJaL-,.;,-05771*YaA*..A+A7+-,AY5;/,;-75'
C5;5*.1*Y-*+W571b5A*.;,-05771*Y0A;A01+:a=>7A,5-<DA*:+:;577/0WA7aA.57@+-;
0-D;/+5,aAJA;+-;+A3J5+=>aAWA*.W5J.=>c;AJD+-;'=5,7-*AJ0-D;/+5,70A*35
0-**50+5.+-+W50-D;/+5,*5+L-,@3:L1,5.-,L1,5J577D5.1A'd5*5,AJJ:a<-,/71*YA
=>a0-D;/+5,;,-<1015*0:17*-+0-D;/J7-,:' =>7A,5351*Y/75.<,-DA70W--JY-1*Y
0W1J.,5*+-A3/71*577;,-<5771-*AJ<-,.1<<5,5*+;/,;-757'N*-*T;,-<5771-*AJ/75,DA:
123 /75A=>+-J17+5*7-*Y7aLA+0W1*YD-6157a0,5A+1*Y7-D5.-0/D5*+A+1-*a5DA1J5+0'N
!"#$%&&'#&$$( 45789
89
)%)(&$)#$%($$(#)($&&)
$&*+'($'&&$,$##)$'$$*
+'&)$!"$$$$$&)-$#&$*
./0123456748
9$#)$'$('#%%$:
;<#&%$')#$'&$=
;<#$)'#$$&$=
;<%>'#?&$&$=
;<#&%$?#$$=
;<>$)$ $$&=
;<$$$?@&)$=#
;<#$##$$#&$&$*
A,$$'%&@ ',#%$%&&$&$
$*+')?% #$#$'?@)&$$#
&$#$&$,$ *B$$'$?$&' %$
&$&&$*
./C 5D7481E7
A)(%&&$$'&$**"$&&$#$
$($$'#$#)$$'##$$$$'*
F?,$'#$@#&$,%$#*+'&$#
#$$' #&&)&%$($)&%$(@#G*
H$$&$##$$#&>$ %
,)*I>$$&&%&?#&)(
)& !" %&$%$&>&$&&$$&'$&
) $&$?$'&$)(&G#&$-#*J$'$'
#,&$ $&')(&$ ', ?$# K &') #
#,$#$# &$?$&)#$)
&%$*+@?#$%$!"'#?&$($$,$',
@?#)%$$&)$*
")$
!"
LMN9
ML
7 $'$&'&
#$$'
O(?' $'@&')"$($$ $>&$ @??'$ P$
?%$''#?&$&'&( $&* &$*A$
## ,&$ &' &$$ #( %#)$(
123
456786
!" !#$%&'()* %+",!!%
55 "&!-!()"&!!*&+&'!&!%!* -.
&!+%&#/%* 0&&!()%%()1* ++*"!!!
!%!,%!,&++!%!'&!**%"2"&.1""&!!*1!%
-!345 * ,!!%0&*()1 "&!!"!!#6
&!%%""()-* %&"&0&"+-!()"
-+!%-!-()#
)&'!&() ++*-!%!%&+"!&+!%7*!-#5*!,
8&!%!-!- !%0--&&- -8&-!!%!!%!,
+*!%!*!-1%,"!%.!%&'!&!%*!-#
4!++*!%!- -!&'!& -!%!%&+&&!& !%
-!#9!%&&&!&"!&+'++*,&+""!%13451
:"2;&.;&01<&""1!#=%&'!&-!-*0*-
!%#>++*&'!&-!""!% 8&-!
?-+1 ,%-!+*,.- +!&-"&!,1'%&!,1&!&&
-!!&!1"-,+-!!%!%-+() #
(+*-@+&-!#6%+"++*"&"!!%!*
"&!"-.&'%&#) !+*)A; 0*
)+. " & !% --& 1&,%&% !, "!&!&'+%+!%
" ! ,%&% )AB "- +!&%&,%&%!,&!%-; +)
-& #=%!)&+"!%+!!9!+)&C19!+)
?! &D"9!+)&E!#(!&-%&&!%-!+"#
&!!&# )+.
"-" F,- +!&20&++#4"+2%!,18"2
&-'%!KI5:KJ !&"%?2!&&?#5 +!&2
I+ ., 1
-&++& *+ &-+-!- +!&2&',%&%&-0-""
"J ?!&# (!&- & & ?G3 -!&+ -&
>&'%!KI>:LJ -!"*9!+#
>++** &"!%""&'!&'#H?-+1&
* 9!+(!&-I=5J99912225:K1&!&"&!!%!!%&9!+
(!&-999"&!&&'!12225:K1>:K#6+.*+&!%
!&-&!!.!-&!!&#(,&++!&!%+.*+&
%!"0&0#=%"&"&!+*+!"!!%+."
,%&%&!%"!,%&%-&?!&!!&#)+."
-" & -'%!KI5:KJI+ .,1-&++&*+"J
>&'%!KI>:LJ#
9* ,!!.,!!%&'!&!%-!* ,.&'1++,
!%&-+!#=%* ,&++&"-"0&!!%",&!%!%-!
,&!%!%&"!&+M
1#N3&'%!)+&.-*-!10&++*()".!1
A#N7+!(!&1
E#N>!>+=1!%&,&++'&0* &&-!&!!%-!#9*
,!"!&+&'!&1
123 O#N7+!:",=1
!"#$%&! 45789
89
'&(%)#! *&%+,,#!-.)&,/0)!#1)&,)23.#&))!".-
45657899
:
;(&#<)&!) ="=>.#, !&1.%#(==)%)+,&#)!, !+=!
)<))%= )&1.%#"#.=)3)!,)1%&!3&1.%#>++>+)"!?0;@3
1 ".#&))!"3!"!#!"%&!)A)"!#-%)+!)%= ..&!)
(==#B%# 1&+# 1&%!&,&1.%!".&(#C!3=&!,"%#&!&,
(&#<)&!%)+&*="=D'AE !+F!+&()'G #=1&)&11&!H.#!"
-)1,&#(&#<)&!)F&#<)&!) #"!#-)!"%)#)-)1=&(#=-!
*&!!+&"=#&, I;'
A! = &!J &, !(&#<!"3 (&#<)&!) # )&11 #,##+ & ) !-
&1.%#K#1! =+& I;'A!!(&#<+(&#<)&!3)-)1 +1!)#&#
#<) !+&!#&)= )&,=%)#G=#1LMNOPQRQSMT) )&%)+,&#="=
.-1 !,#1&1.%##1!&# /0&!!+& !(&#< !+(&#<!"!
!)##1&+;(&#<)&!)=))%.#&#.#&))!" !+)&#".*)=!
! /03).-(=#).&.#&+!"1%)<!".*-
U5:V
W:X9
:W
899
:
/#&))&#YA!0&#/#&))&#?Z[2\C2@
1&#-Y]\$1ZZZC2
C #+)<Y22\$3
^;_[\$
C#\C2)<!&(! )""=#2G=).+&,=.#&))&#)"!#-1)%#+!
""=#21\C`B%)&1*&!-).#)&!+1#-C2)+ )
1"=#21C`)B%&11&!-).#)&!+ \$&#\"*-)=
1)%#1!)&,=+"+! &1.%#1\$)B%&12[]"*-)?$@
45656a8
989
)<&.&1.%#).&.%#-<!&(! ).#)&!&1.%#?/0@;)=!1)%"")3
)"!#-)1 !)2 !+,+&!=&.&, +)<(==!*%)+ ,J+
&&!&)&,1&+#! +)<&. &1.%#=)).#)#!) !+ <-*&#+)
\!#-!1 b&#-&,=/0)3 #&)&,F!+&()3IA'DE !+ HJ #%)+
)&.#!")-)1)<&.&1.%#) # *!1 !-+,,#!,),#&1#"
#&(#))&)1 ,,&+);+!")&,+)<&.&1.%# #
=1 -*%)+,&#+-&+-&1.%&!!+!#!&11%!&! )&,
&,,3)=&&; /0 .#&+)1&#).,&#=& ).;)& .&(#
&!)%1.&!&, /0 )!&#-="=G=# #1 !-*#!+)&,/0) # *!
A!+!1 #< !+ *#&+!%+!" C/3C0I3F.#&30&1.B;/0 )&!*
))1*+ ).#).,#B%#1!)3!)+&, .#%#*#!+
123
456786
55
;U
V98HIWL8M
9
L8M
88
-./0##.123405+4.7
>07.AB1()!!@'@+>
!"#$%X2()
HIJIHY
87
+4G504-T"##"7"54. 80#.35/.78640;24"#8.4G50 0P"/0DE"/EE#4.6/E
#/003C."38644"3F.C4E0 4;+4G504/.78640/3/.330/44.4E0"3403043 5./5
/.78640304D.$4E.6FED"050##;23F0305407#=4G504-T0C0#4.#540#E80
7.G"50/.78640 0P"/0=0Q6"880 D"4EF5.G58.#"4".3"3F#A#407:(-*?*A#407=3
4.6/E#/0034..80404E0/.78640;24"#F03055A0Q6"880 D"4E .CC"/0#6"4##6/E#
D.=0R/0504/=D0GG.D#0#=/.78640F70#3 .4E0#"7"5885"/4".3#=4E4
F03055A/3G063.3-T;,G504-T/35#.6#0E3D"4"3F0/.F3"4".33 P"465
$0AG.#C."3864.C 4;23= 4G504-T#>"/.#.C4D"3.D#=O"36R3 +8850 123
3456759
9
!"#$% &"'$&()*+(&(,"
44 -"&".(!"/.01+0).0"$%&.#
2634567849:;
8<
674:9=
63469=9
4849:;
;975597,(*>?!@1A.B@CD22E1#>2FGHI
J9<7 KFLE1M1FL&"01MNFL?,OOI??PD12QQOGH
4R6S7T2FLKN22P)OB/$/G??
,'U(&%"('%. "&+0B@CD22%.
! &0! &'.%.>"! &'%"(>#*(.-
"1#>FGH0@1A'!' .#@1A"'@((U
+(#@1A.V!(U#
,+!!'%&(.-!%+("&!*)@0,WX?+."O
'. !W)*#YU(!(- % Z%"U.
!.% %&""+"."')*#
$%%.(
. ' 45[ \]R^\]_`J;`a_a8b`2\;
. !
U%.%.&
"
!.%" G"U(. '. ! #/. ! "!'
-U +("''. #/((%. U-%""!.
%"U' ""!(#$%%.(. '. !U%.%.&"!.%"
. !
-U%"U'. ! #c.%'%""'
.'.!#*().@E*)@I0O 0,!WX!!"+.(-
!0-&"0O0*)@0O .#"''%"U. '
. ! #$%%"U. %&!("&(.-'. !#
112
967
86 2356789
967
!"#$%&%'%(')(
!')&%%*++%%%+#$
,-.(/'*(0/(-&#%!
,#'#%% *++%+%*1#$*$(+##2
1&(%&!34#++*+
*$*!,%#*%5%*&
'%!/'*%%%#*%*!3&
# %#*&! &# %%'#+
*%6&%%+!
566789:;9<394
-"'+)!")%!))",! !%"=
>?@ABC99DD79:*(-'EFGH*-I> +
JKLMKNOLPQLRQSSNRPLRQTUMPNVWKLUQXNVLKM '"#
">?@YCZ[9:*'\)!1!H*\1>)! )4 )'+))!
,!()"#
>?]^6D<4:*)!0_)()! ',EE)#
>?5]]4:`' _)!a_)(H`__>)!,!%`' )(#b+)!
!')!"!'",!%' )!a!,#
>?]]45:c_)!a_)()!,!%)E)!a#
-!! %>?CdZ[95:$)!,!%)E10$H1)' )>
)E
% #
()!
()'"'%
E)E
E>?eZ345:$)!E, % )!+))'2fg"'"
,!! ()G2fg !#-! !,!%)EG'3,G)')
+)i,)! ()!!,! )(.)#
()E
!',) h6974
*())!G!).+))!,! ,,,)E!)!'
))#$!) ,!)!EE)')%)#$)!!!)"'%
)E)E)%10#$)!'!a+!().)!'
112
!"#$$#%#&'$#"' 346789
78
"$&('%&()&%('!
!#$#%('"*+"!&#"','%
"$*#!#(''"'"'-./012
!((&2!3456,&-,. 127#!"#'%2
%''("#((%(('''''"
$*'!'#&
8*99&2 %('! !#$#2* !"#
$#&:''#&"#&%("(!$('%
(('%("5'!'%%('!
'"( *)("'%!((&'!'%
('''*#'%! !'-./1
'/;49<=*(('#&#!#$#*"''!
>?@87ABCDE?F7
8F
G7HIJ
868
@8799KL
LBMN87O>
97
-1P *Q' 9' '#("' %'#
'%#'
-$1P/'"(;'%("#$'
-1PR0';/0S'#&Q'*';'#"'
-1P,. '%!&
-1 5' !' % %(' ! *
'"('
TBM3
?
7G
?H7U79?
9
1 -1:%%##*''%("($
-1P ./6# -1 )V*'' -1/;46# -!1R'
-$1P:%%##*'&%'#("
-1P)$#/; -18$Q -17Q -!1 ##%
-1:'%'*(''%("
-1P5'&( -1W' -1;/0 -!1,;
112
3456759
9
!"#$$"!"%&'"($
44 ))))))))))))))))))))))))))))))))))
))))))))))))))))))))))))))))))))))
))))))))))))))))))))))))))))))))))*
2+(,-'('#$$"!$!(.#"/(' 0'"1$&(%"1(%$23!(%($-'('
))))))))))))))))))))))))))))))))))
))))))))))))))))))))))))))))))))))
))))))))))))))))))))))))))))))))))*
4"%""#($.("!5(!#%1(.'3"! 6(.".7(!1(.'(%"%($
.("!5(!#
))))))))))))))))))))))))))))))))))
))))))))))))))))))))))))))))))))))
))))))))))))))))))))))))))))))))))*
89: ;<=>?@AB<CD<EBE>;
F%3%($!,"G""H'-(!"#5(3"!#,!"1(.'(%"%($I(,-"3
-"!%5(3"($,!"1(.'(%"%(3,11%%(,(!/J%(."!(,
2((#'!(1"(!J.".(!&"1&(3G"%&(3!
K( (-G" 2G"% '!(5-".J," ,!" G!(3'!(2!.% #$$"!"%'!(2!..%2
-%232"!(2!.!"%(%253"($%!31(%,!"%%'!(2!..%2
-%232"((-G"'!(5-".K""1(.'3"!'!(2!.!"1(--"1G"-& /%(,%
0($,!"0($,!"%%"2!-1(.'(%"%($1(.'3"!&". F"($,!"
,1#!"11(.'3"!(#('"1$1/0($,!"1%5"5!(#-&1"2(!L"#
&".($,!"J''-1(%($,!"%#3-&($,!"
;M5;9
4
0&".($,!""($'!(2!.,1!"3"#(!3%"&".0&".($,!"
.%2"--"("!!"(3!1"($"1(.'3"!F1(%!(---"('"!(%($"
1(.'3"!N%".'(!%&". ($,!"!"O3!"(,(!/%&1(.'3"!&".
N'"!%20&".PN0Q
N'"!%2&".(%"($".(.'(!%&".($,!"R%('"!%2&".
1(..(%-&1--"#N0J&".($,!",11%%"!$1"5",""%3"!%#
1(.'3"!!#,!"F-(15!#2"5",""%''-1(%'!(2!.%#"
1(.'3"!!#,!"N'"!%2&"..3%(!#"!(('"!"1(.'3"!(3
('"!%2&".1(.'3"!($%(3"R N01(%!(-%#.%2"--"!#,!"
1(.'(%"%($1(.'3"!,"---(1(%!(-%'3%#(3'3J.".(!&%#$-"
F%("!,(!#N01%5"""%.%2"!($"&".F('.L"%#3-L"
G!(3/%#($!"(3!1"-/"FSN#"G1"JT".(!&JU"1 T1!(($%#(,J
UIFVJ6FIUVJN0SWXJN0SY"1!"(."($""H.'-"($%N'"!%2&".
112
!" #$%%#!&#$ 346789
78
!&#'()*&## &!!&#$%!!&#
+#1!,-.!"&)
/010234
565
7
8987
:%%#!&"!%&;& #&$&&$%&#!&
%!%%#)<"&%&;& &#$%&;& &# %&
%&!& %!-"#=#&$#&>##;>&$&&=#>#;
&#$ " $% !%%## &!)<" !&& &?&# :%%#!&
%%#)) ###?
%#;
37@56
478 -;&#%%
&&$=&
%&&
A#!""& #B %!%%#!&)A#%%#"" !!-=&$#
%$ !)C!" %$&#%$"#= !!#$#'(
!)C&&$ #%&! %$&""##
=#;)A;#&$" =## #" %&)
D %$&"="%$!&%%#;#&##;#(E)F"
""%!&%%#;%#$##=&#&-;!$#
&#(E""#=&;!#&-)
<"&& #$!!& >""&&;#
%&)D !!& &?)%.>)%G>) >)=)D&$>)%;>
)=>)& >) =) & #$=!!& )F#
%$&>F# %><#>F#EHE>I'$&>JKC %$&& B %
! %$&)F# %$&#?"#%&#;$ )
L5M87/0NOP5@
9937@56
478
112
3456759
9
44 4749
!"#"$%#%&'!%!#"('#)*
!++,#%#""))#)+#)#"!++&##"")#%&'
")%(,"**
-6./0124749
3#! )##("# !"#4!++"#,#%&'))
56,#"7
89:"%5"#"
89;"#%+##
895"##!"#
89<"+!"#
896),#"()#=>#")#!"#
89?,(!"#
/0@0AB66CD9
4
E#+#, E' "(")"# F! ,#*E#+# ,,#" "'#)
,#""'#) )##% #"")( ",#F*&' %# )G#4)(#4
)##% (,"#%'G#+#),#"'#)0<##"',#"#,%#%!++#
#"")(",# #"('#)*:+#!"#"#,#"%"##%,#
F*&' !"# ,#'#) "",,"#* H+##,#"##G#%"(")
%#)G#4
)(#4(,"#
%'G#+#
&# %(","'# F*;)# +#))F ,'!"#
),#"'#) "#7
89I")( %"$#
89;('#) "$",#
896+#F(+#"###$&#)#)"'
896+#F(+#"###$&#+"%%F
89;#"+( #
89HF(&F, #
112
!" #$%!!#&'( 346789
78
)*+,-,
)*.&/
)*+,+#/!
)*+,0!#/!
)*1,'
)*2!34
)*+, !
)*5,
)*+ /'!6
5"& 7'/& !%!!684
%8!%9:'!#&/!7!#'!44%!
/!!%!!6
;<9=>7?=789@+,-,% ,!#&%%,!%:!
+4AB+46-CD+.D //!%%''6
//!% !"%! /'!!!#8!%'!#&/6E7
#&/!%!%,A%46E //!%!%
,4/!&'!6 //!% !"%'
'"/%"%FF%&6
G
H
97GI;JI
K@L !!-CD+.D //!%/
0& /'!%7'!%/ //!%'/'6
M<NGI;JIO8
34
78@
)*+"3,4?
78!%!#3,%,%4&! ,6
)*-,8
78<79!%! ,P
96
)*Q!%R88
8S?>7?=<NF ,>7?=T
H"!6E'!%#3"7
>7?=K<9=
<
96
+'!%!#'!&'!!!#'!(
)*!-CD+.D!%3!&/%F,J86
)*.U
<?
4O<VO<
79497788
89,"7F!%! ,J86E
'!!!#4/"%6
)*'F"%F!%4%"!/!FJ?
O
8K787?
W784
OXK97?
89 ,"7F!%! ,J86
112
3456759
9
44
67699
!94
9"#9
$6 !
994%9
&
'()*+,-!4./0123/,*+,-$4
'(5/6
17837./0123/893::3/139-37;123/<:3=/3=>123>=**=?+/@=81+=/:&
'(5>7=<?./11=9</)ABCDB+/93.0E=/*7F=03;1783)ABCDB.1,=FF./0
89=F81./0893::3/1394
'(5>7=<?./11=938.+9:123399=9?+12=<1:,.//+/@123G=*<F3:>=9H.0:3,1=9:;
1783 !I9JK
.1,=FF./089=F81./0893::3/1394
'(5> 7=< ?./11= 938.+9399=9:;*=,.13H.0 :3,1=9:;./0 93,=G3993.0.H*3
+/>=9F.1+=/;17837LM5MNOPQRSTK.1,=FF./089=F81./0123/893::UVWUX4
112 67699
!94994%9
!"#$%$&'()'($*'+ 346789
78
,-').
/01
27 3794811
5 6'7$$'$'%(
1 7$$'$'%(+('$$(
8 !-+%*)+*$'$9('$(!-+%*)+' *$'$9(,+%
:;)+'*(
< '%-('!(!#$$'$'%-(','$$('$$$'$)$'
'$$(,+%:;)+'*(=
>497?79
87
@9$'$$'--,+!@9-#$"$@!@+'@99+-%''$
+-%$#'$-+$%=@9 $'$++-@ +A+-+,-) 9'($ )(') `9*'$+ '
'*$+"@9-!B(')CD#B(')A+#B(')E7#B(')F=@9 '+
$'$,+!%*@9-%+=(--#=&+(+A'$-+$%=@9 @9$'$
$'$-*GHIJKILMHJKLMINKOPGJMLQHIHRHJMOISTUMHIJKIVWIMVLUTMLIHJVJMXIYKOMJTOMHITJI '+,-'+!
,+!%*'
+** + )-+--"+*$'"$+9 '$ (%$"%'+@'$')+$ *$'+--%
'9*%$#$9+@ '9*$',-9'%$+( @9+$ 9+-%'"= +9+"#Z9+-#
)+@ '" $('% @*'*$',-9 '$Z+--')+$'$($A$=[% ('%9=
%+--" ')+$\KMHWQJIST]IJ^MI*$',-9 )+$'$'9*%$'+
+$-$(+) @9 )+)'$!"*$'*$-@=_'$*'+$%('$
*%$*')'+'$9+'$-+('$"$@"+(@9'$9+'=
`9*'$+ ''+ @9$'$'+,-'+!,+!%*'*$'+--
%+9+"#Z9+-#('%9='*$'+--"'+(+--@(-(
'$-'+,$'$(%"@9$'$=YKITJQHIVIaMJJMLIPLVNJTNMIJKIJVbMIaVNbIGPHIKSI
@'%$*$'+--$"%-+$-@=
>79
97>497?79
87
c'--') *'*$'$9$'$'@'%$D.
1=d-!'>8e
#-f
68
g89#$'9 $''f44799
8179#-!'
>497h
9#+(-!>497?79
87=@9_'$+$=
8=di7
4
7
>497?79
87*+"#-!?79
8744
78
78
178
17j'+-$+(@-(k#+(-!l70=
<=d>7
74?79
876
1*+"#-!9'$@9$'$*'
mn19
19o4
14p879
87
1-#+(-!l70=
q=d
;18?79
876
1>7
741
*+"#-!l70=@9_'$$'$
*$A'%B(')CD'"%$+'#+($+$'9*%$=
r=ds'" ' ' '9*%$+ t(9$+'$=u @9 _'$ ?79
81
77*+"(*-+@(=
v=d-!mw=
112
456786
55
94
#$,#0&0978778-
=>.#$,978778&)!2)D40&0$,*$,$')%+ #$$)!"#$
#$,#0&0$,A
4E72%$$)#-F$$, #&'34 &)!2)D ((4
&$$#!')%#)++,$,')%,)%&!"#$$, #&'3*-
=>1)!"#$$,&0$*)*40&0$,7872%$$)#-
=>F$$,!"#$$)#0)"(&$4!"#$(&'$,%&$-
=>.')%+ #$$)*+$,$&()$ 2)%$$,!"#$40&0)#G7H
<7
8I
J87KILKM978778
8799
$ 0)"()#$,()0#+,0,#)" $)##0)+$,&2$#
0)"($)$,)!#&(#$$)#- $0)"()#*'%%&4$%0$,
3)$,&)$0)#%"+)%0&(0-6)$,(%()4')%0#
%ENE%$&$'-
O((#! &0$$,0)"(*)#)$,&+,0,$"%0," &&(0
$,#$,)!#&&-F3((&,-3(&D$#)#-P)")$, *#$!)
121
3456759
9
!!!!"#$!%!&$$!"$!&!!#"&#"'
44 "(#$)%!#!#&""!!#'*"'"+"#$+""' "#$!$"+
$#!!,-#$.&%#$(#$ #&"!#/,012!"&+ $
"#2,012(',3."!$$+$ &#$"'"'$'!"$
#&$!!#, 4&$+"$+# "#"%#$$"#*("!
#""!#$"""#"!#$#$&,
5566786
9:;67<=7>67?#++#(""#
9:@)A6686
$#&"'!'#$""&
9:@)49B6
6>
9:C"($"DB6
6>
556676B6
9:;67<=7>67?#+,+#(""#
9:@)EF47$#&"'!'#$""&,
G65?H46476
I!)1&"!"##! "#&!+!"& !)! "'$$""#!#+#$
$&#"+,J"' !)&&"""+($#$&&#!" !)$" "!)!!'!
""## !)!%$"##*#&!%#$&""*#&!%","#(!#"#
$""K"#$" !)!+!"&!,I!)&&"!!+"#! "!!$"$
($!#(!"#$$+#"*$#! !)$" "#!*$+"+,L#
!#&$&#"#&"$!! !)&&",
J!#!#&& "##G65?M4!"$"*"# !)&&"#$
!)$" "!)!,L#!# !+ !)! *#&!$'#$!"*(,
2#$ "#$$"($""#"!N!"$""#)N)!# "
$#&"' !)!"(!"$#+"'.!" ",
999
6G65?H46476
9:@)HO9
P "'#969>M46>,@)Q666546RS99>5%
"' #NK)9
H46476,
9:C"'#!#"$%)T947 "')G65?H46476,
L#!##I!)1&"##((+U
1,:@)T4%"');6%"+79
7D57% "')VW,
2,:C "'#!#"$%) G65?H46476,3'I!) 1&"(#(
$!,
122
45789
89
>?
19@98A
8
B&CD-2)&**"'&8-40)(-6&)()-25,"#$+"44(2&#(&44*/(,&*&- */&*8-40)(9
B7CE"11(,6"4(/&8(9F16"4((G*(#"-9
B3C!"#$,(62&')(*(2/(41#*/(6"4(#*-#*-2("3-*"'0-0#4-3&*"-#9
B,CH5#*()2(#*-2(3& 7(0#(,*-*&$(017&3$I01#-61(2#-&46"4(#9
29:8J
<
B&CKL-03& 0#(3-))&,4"(*--4MMMM &#& &4*(2&*"8(*-,"#$)&&'()(*
6-2,"#$2(4&*(,*&#$#9
B7CKD-2,&*&3-)12(##"- 5-03& NOPQRRRRRSSQNTUVUTWS
B3CKRRRRSQNTUVUTWQXPVYOQNOQTZQ[POTZ[PQ\Z]YNTP[^OQQOWOTP]Q_UVPOQTZQ`aQP`[VUP[QOT̀TPSQ
H5#*()b(#*-2(
B,CKRRRRSSQUOQ̀Q\Z]]`acQNOPcQ_Z[QcUOdQ\XP\dUaeS
39 f/&*"#& g1(2&*"'#5#*()h
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRS
i9 f/&*"#0*"4"*5#-6*+&2(hj"#*#-)(0*"4"*5#-6*+&2(0#(,"&kl9
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRS
m9 f/5H5#*()b(#*-2("#0#(,hnG14&"/-+5-0+"440#(*/(H5#*()b(#*-2(9
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRS 123
456786
55
!"#$!"%&' ("!)*$&'#+,"*(- #&&$.&%&#/$")0.1(.1#-)-'$"23'-).1(-45#&'
$&'2-(&635789%&#/$")1#-)4-(&0.1(.."4%#1("#+214&#+2"4%&'#&$(8:&#/$")1#-
;1#1<4&1!-=&0.1(.(";&'#$.&&$1'&#('&&8>.&%&#/$")&;1'"!&$)'";1%#$"
9%&#/$")1#-
)4-(&0.1(.."4%#
$.&?&'#"-4@"!)*$&'*#&'#8A $.&%&#/$"),"*(- 21%#&;&'-4#!-441!-=&#(-44&%-#
1("#+214&#+2"4%&'# 1("#8>.&#&("#!-,-4#"<&2"*%" $.&$""4<-'#-%1 $.&!&*#"2("!)*$&'
&$(8 -))41(-$1" #"2$0-'&#*(.-#B1('"#"2$C"'%+B1('"#"2$DE(&4&$(8("#-'&!"'&*#&'F
2'1&%4,("!)-'&$"$&E$F<-#&%("!!-%#8
:&#/$")1#$.&<-(/='"*%-'&-" "*'("!)*$&'#('&&8C&(- (*#$"!1G&"*'%&#/$")
1 #&;&'-40-,#8C&(- -%%<-(/='"*%)1($*'&+<-(/='"*%("4"'&$(8" -%&#/$")8
("#" -%&#/$")-'&#!-44='-).1(-41!-=�.1(.'&)'&#&$#;-'1"*#1$&!#2"*%" -
%&#/$")#*(.-#!,("!)*$&'+'&(,(4&<1+!,%"(*!&$#&$(8C&(- -4#"'&-!&-
1(" <,'1=.$F(41(/1=" 1$8
78998:;<=>?8@A
89BCDEFGH8A98
:;I;J79K5F89L89
M!1'!+! "*(!)!3#M!1'!+!!+!)
!*"!')&((&"!+!#M!1'!+! "
*(!+(!%!*"%!%&!(!(#N!O,(!1'!+!
"(!+*(&'!'(%)#N(!+"!'"
3+!&&'*#N&*(!+(!%!*%)!3#P (( M!1'!+!
!+!)
) !)!(!1'!+!#N% !Q!R)(,'(1#
P**&!% !0!R*(!R)&&%!)!"" !*"!'
)!+!#M!1'!+!*(&'!!*()%! !Q, )
+&%*# &
((&"
!+!
78998:;ST>79K5F89L89 123
456786
!"#$"!"$%&'(!"!$)"'!&*"!+,-"$!./0
55 1!"233 456
789
3 :
;<
66
=
66
73> 66?
10@$A"B
66"#$"!"$%&'(!"!C(D233 E7
36C(D$A"
3387
36$FCG$A"(DHIJ K73>60
20LG"!;
5: 6MC(D$)"("$$A"N6 5
5: 6M
:
HIJA"F&0
#$A"I66F&C$'"$A"#.GG!"))$A"'!&)"!*"!0
O0#$A";
F&C$'"$A"'!$F"!$A$))"GF$A"'!&)"!*"!!("$
"$)01A"'!$F"!FG"($)3P3P0
Q0(D$)"("$$A"4:566
5: 6M
6
856 5666A"DF&
G$R$$A"'!&)"!*"!'$"!$F")"GRA""$$'$"!
$A"(("$R!DS$A))'""G''"!!"T0
U0/(DEV$()"$A"HIJ K73>6G( F&0
W0/(DEV$()"$A"233 E7
36G( F&0
X7> Y8Z[? ;
5: KM K73>
R((("!!"G"$()F$'$"!"$R!D)G #$"!"$46
8\ ]$A)
!)"0
=8\ ^
;
>66_]
[8 BX̀566
STa,b")D$'))$!"!"!)$R!"G'!!)0
SFTac"("F )$A"G"($)'"RA"!"(($A"(")!")$!"G ("))R"
)'"(()$!$$A"'$"!$)*"$)'""G($0
STab!"$"$GG(d'"$!"$R"$AG)$"$$
#$"!"$0
123 SGTae!G('"$$$A"#$"!"$C""G$A*"$#f.0
45789
89
!"#$%&'("()*'+,$(-./..'+,!*+$!"0,*'+,$(!1$*'($#!
2345673789:;39383;<4=58>3?8=46@3;3AB3?CD3B:B93E7
F.$%'!#/'%%'0,$!G#'&$0H('0%$0#'0I$(!'0"+J'%&K#$(!
LMM!"0"($"-./..'+,!-0,'-!N%$0K!N/'0!$#/M,$!G#'&
OC P>68?;3?Q8=2=76B=52R834SP>68643;<<34378835?<=R7;=7;3?Q8=2S
TC P>686438>3;<<34378538>=;?<=46BB3??7@8>37834738SUV2967538>=;?C
WX YZ44[\]
^234?=769B=52R834_`?6@373469a2R42=?3B=52R834bR?3;<=4;6:8=;6:6B8A83?7
;<<343786436?7B9R;7@3;RB68=7bER?73??b6;57?8468=767;>3698>Cc=da6a;6:?_`
>6?E3B=53A8692648=<8>39<3=<6234?=7Ce78>?R78d3>6A3<=BR?3;=78>3246B8B69
6?23B8?=<6_`CP3>6A3;?BR??3;6E=R8A64=R?8:23?=<234?=769B=52R834?RB>6?
f3?Q8=2 `=52R834bg628=2bP=4Qh868=7bc38E==Qbi6E938_` 38BCP3>6A369?=
;?BR??3;6E=R88>3B=7<@R468=7=<8>3?3B=52R834?C`=7<@R468=7?E6?B699:8>3
83B>7B69?23B<B68=7?j;3869?6E=R86B=52R834C^?d3Q7=d>64;d643?3??378692648
=<6B=52R834Cf<<34378>64;d643B=52=7378??RB>6?5=78=4?b`_kbl=R?3bm3:
E=64;38BC643B=5E73;8=@38>348=<=456_`CP3>6A3?8R;3;6E=R8?=53=<8>3
>64;d643 B=52=7378? ?RB> 6? B=52R834 B6?3?b B378469 24=B3??7@ R78`_kb
5=8>34E=64;bA;3=B64;78>?R78C^2648<4=5>64;d643B=52=7378??=<8d643?69?=
A34:52=486788==2346836B=52R834Ch=<8d643296:?56n=44=9376B=52R834CP8>=R8
?=<8d643B=52R834?=<7=R?3Ch=<8d643B67E3E4=6;9:B96??<3;6?h:?835?=<8d643b
^229B68=7?=<8d64367;k8983?Ce78>?R78d3>6A35679:<=BR?3;=7^229B68=7
?=<8d64367;k898:?=<8d643Cf3?Q8=2?8>3296B3=76B=52R834?B4337d>B>>=9;?
B=7?b56@3?b<93?b<=9;34?38BCd3>6A369?=E43<9:5378=73; 6E=R8l:`=52R834b
l:f=BR5378?bD3B:B93o767;i6?QE64=78>3;3?Q8=2=<6B=52R834Cp7699:8>?R78
24=A;3?Q7=d93;@367;;3869?6E=R8e783473867;;<<343788:23?=<e7834738B=773B8=7?C
Wq [rYst\Yuvwtx]vZ\7\vy\tYY
z8{]979|98
}~
1Cu98
8
6i4R3 Ei4R3 Bp69?3 ;i4R3 3i4R3
48{z{88
2C 6 g@>8237 E^99=<8>3?3 B234687@?:?835
123
456786
2 !"#$%!&"'()""#!&!"$%!&" *+($+(&"
55 !"#&"'(%#,&(" ()#"&" *"$!"%,--,
$(.(("("&$+"&$(/($"/0&(""$'(&" $%!&(#/
*!$"()/)"!&!"%)+"
126
3
4"5!$%!&"/6!!%!&"/7"05/80#""$"("",!"
9 :#+&)+0+#!!"5!$%!&""!"#$%!&"0&+"%(
$+$"(($*+($+"!"0+(+"(!0(#(,"&":#!!(!0#"
".($"*+($+$0"&",*+""0,+"&" *+"""5!(!0#"
".($"'+0"(;")(."#$($0"!""+"":#+"(
#5(<"%5"+"%(""%"$++"
=7>57
=
5 ?5
$"@ABCDEFGHIDJFKL-M913N
N"%,@9OP44Q21222NR<%"%,
R4(5@S93OPR44TU933!%V
UN+"0+#%"+"%(%!$%!"+"$%!&" ,"%
'$0" +""$%!"'(#5*,"%0/%(0
"$',!($#$%!&" %($!$"/%(%"%,+" $%!""
$"$"+"%+"0N+"0#!.("$"$ "."#
+"".($"
W%"%X $%!"%+"0"@
(V :8Y*""$
((V :OW#
(((V4-(+""
(.V'W#
.VZWPR""
[8\ ]
3
>66^_
1 1` a5b6
TVc8&" T0Vd#" T$V8&" TVd#"
M a7bb 7= [ 4b5=\
T0Vc4(5 T0Ve(! T$VW,"%Q""TVRf4Wf
2 g!"(),"%(";%!#","%*"'$("$"0"*""
&" +*"$%!&"g!"(),"%(%&(" !""
$%!&"gW$#%)"##+"+*"$%!"$%!&"
*"##(#$#(!&&!&/%"%,(#"'!(%(<"&(#(<"
123 .(&5("&$"#(5"'hg".($"/N"%,/Z"$
!"#$%&&#'#%'( 346789
78
%)(*%(((" '"&)($!")'#*+"&")($*)
#( +*) %($% ( ",!" * #%-+%($+
"($' (*(- & "%#'%./ (' ("'**&&
#($%/ (#$%#'##($(*%
#$%#"")
01%#23
452%6
457)7 $% (
4578%#(
457)9($% (
45:"%#
; 2%'*'(*"&($& "%#'(*($(*
#%("2%<=>?@A?BCD@ED@<=@>?D<=>?@F=GCE<?>HD@DID<?G@JKB?D@<=@LM@?L>BK?>@
2% !")'#%'"&*+1 "(*N
'2%"#(&#'#
O' 2%6 & #3
1 8")(P8Q
+"R
68
S89+%& "& RTT799
8U79+"")
(P497V
9+(*&("")P497W79
872%6
X Y(& Z7
T
7
P497W79
87#$+"")W79
874T
78
78
U78U7[(*"*\+(*&("")]7^
2 Y(& P7
7TW79
876
U#$+"")& %"(% #((
& _`U9
U9aT
UTb879
87
U+(*&("")]7^
Y(&
cU8W79
876
UP7
7TU
#$+"")]7^+2%6
& #N'd(*ef"($'(+(*&(& "%#'
; g$ ( & "%#'h*%(O& 2% 6 W79
8U
77#$ *#*
i 8")_j
`7Tbk
868
S8799lm
1V87no
97
[\5: [!\: ["\O' [*\O'
XoU
U`7p
b
[!\56 ""q( [!\9"d(*(" ["\7 )#
27 )##" ('"%#'&"&&*"(+*+ "&
!")$'(*('"%#'" (d "("'%- '*)#(
*() "(**!")$'(*#"'+!")$'(*" "d&(
'"%#'*)#& &($&"&"% ((' 121
456786
! "#$%&'
55 ()*+,$&
()*+"-
().-+-/0
()1%#0%&
23 14$&%&+!%--56&%&&5%!&-- -
%!!%/7$- -&5%!%!$/3"&-- - %
6"8965&%!&:-!5%/ 4&#;/<%=&$-%//-3"&-
&- - %&% !%/7$- -36%$&%- -<
4--% =$:&%57$!--% /31 &%//+!
&5%>%%!-&$&%<5-%=/!9!&-%=/6&;%!"?
- -6&3
6 "%/7@$- -</$/%&!%=/%- -
&&:-$&:!&96A;3"%/7$ &&:-$&:!!&5%
=&6A3B*!&C&!&!%/7$&- -3
DEF GHIJKI IKLMNOPQ
A3R3%<STUVWXYZ[\W]^_UY]X_`90A0$=/-%;
abc7de6f
()$'gg$$&3-&3-<
()44434#$!%3&5<
()4443--!%/+3-<
()$'gg!$3%/:&3!g-/g!1g4%&g+3/<
()$'gg4443-4%&3-g-%g12g*&=%&!3
123
Software Evolution
UNIT 1 SOFTWARE EVOLUTION
1.0 Introduction 5
1.1 Objectives 6
1.2 What is Software ? 6
1.3 Software Evolution 7
1.3.1 Evolution of Software Architecture 8
1.3.1.1 Mainframe Architecture 8
1.3.1.2 File Sharing Architecture 8
1.3.1.3 Client / Server Architecture 9
1.3.1.4 Cloud Computing 12
1.3.2 Evolution of Software Design Paradigm 13
1.3.2.1 Non-structured Design Paradigm 13
1.3.2.2 Structured and Modular Design Paradigm 14
1.3.2.3 Object Oriented Design Paradigm 15
1.3.2.4 Component Based Paradigm 16
1.3.2.5 Service Oriented Paradigm 17
1.3.3 Evolution of Programming Languages 17
1.3.3.1 Procedural Language 18
1.3.3.2 Object Oriented Language 19
1.3.4 Evolution of Software Licensing 22
1.3.4.1 Introduction to Software Licensing 22
1.3.4.2 Types of Software Licensing 22
1.4 Types of Software 24
1.4.1 System Software 25
1.4.2 Programming Software 27
1.4.3 Application Software 28
1.5 Utility Software 30
1.6 Perverse Software 35
1.6.1 Ways to Counter Perverse Software 37
1.7 Open Source Software 38
1.8 Summary 40
1.9 Answers to Check Your Progress 41
1.10 Further Readings 45
1.0 INTRODUCTION
You all must have come across computers being used at many different places –
post offices, hospitals, book stores, grocery stores, universities, banks, publishing 5
Basics of Computer houses, etc. You have also studied about computers and their applications in the
Software
previous block. But, have you ever wondered how the similar looking machines
can behave so differently? What is it that makes them extremely useful machines
for varied and unlimited purposes, unlike any other machine available to us? For
example we can use a crane only to move loads – its usage is quite limited, but a
computer can be used to create a document, do calculations, give presentations,
book movie tickets, play movies, music or games and accomplish much more.
What makes computer the versatile machines that they are?
It is the software that enables a computer to perform all the useful and desired
functions. Different types of software help a computer to be used for multiple and
varied purposes, in totally different areas of work. We will study about the
software aspect of computers in detail in this unit.
1.2 OBJECTIVES
A computer system consists of two parts – hardware and software. The first part,
computer hardware, refers to all the visible components of the computer system:
keyboard, monitor, hard disc, printer, scanner, processing unit, memory, electrical
connections, etc. It does all of the physical work a computer is known for. The
second part is a set of simple and step-by-step sequence of instructions that tell
the hardware what to do and how to do it. This organized set of instructions
written in a defined order and to accomplish a specific task is called computer
software or computer program. Hence, a computer software provides
intelligence to the hardware, which otherwise is just a collection of circuits and
pieces of plastic and metal.
A computer programmer writes the software that gives a computer the ability to
solve any business or scientific problem.
A Computer System
You will study about types of software and its evolution in the following sections.
As you know that in a computer system both hardware and software complement
each other – one is of hardly any use without the other. Hence, since the very
beginning of computer history, software evolution has been closely tied to the
advances made in hardware. As hardware became faster, cheaper and with better
capacity of storage, software became more complex and sophisticated.
Over the decades computers have been used in new areas and to solve new
problems. With changing needs and improved hardware, the software has evolved
in its various aspects. The software architecture, its design paradigms,
programming languages, its usage, costing and licensing have all changed and
evolved over the years.
The software architecture has always moved in unison with the hardware
advancement.
Till a few decades back, all computing was controlled through the central
mainframes server. Multiple users could connect to the central host through
unintelligent terminals which captured the keystrokes, sent the information to the
host and displayed the text output. All the processing was done by the
applications residing on the main central server. Only large transaction-oriented
applications were developed during that time. Business tasks such as accounts
receivable, accounts payable, general ledger, credit account management and
payroll that were repetitive and could be run as batch jobs were automated.
In these centralized computing models, the host provided both the data storage
and processing power for the client systems. There was no support for graphical
user interface or access to multiple databases from geographically dispersed sites.
User User
Terminal 1 Central Host Terminal 2
(Application and
Database on Mainframe
Machine)
User
Terminal 3
Workstation 1
(Application Logic)
Shared
Resource 1
(Database)
Workstation 2 Centralized
(Application Logic) File Server
Shared
Resource 2
(Printer)
Workstation 3
(Application Logic)
As the capacity and power of personal computers improved, the need to share the
processing demands between the host server and the client workstation increased.
This need for greater computing control and more computing value led to the
evolution of client/server technology.
Clients and servers may reside in the same machine or they typically reside in
separate pieces of hardware and communicate over a computer network. A server
machine is a host that runs one or more server programs which share their
resource with clients. A client does not share any of its resources, but requests a
server function or service. The server program fulfills the client request. Clients
initiate a communication session with the server.
The client/ server system may be two-tiered, three-tiered or n-tiered.
The application or business logic in client server applications may reside on the
server (fat server – thin client) or on the client (fat client – thin server). Since,
9
Basics of Computer clients and server interact over the network, increases in the number of users often
Software
lead to network congestion. Also, maintenance of the application becomes
difficult with more users. This lack of scalability (Ability of a system to support
increased demands of work, usage or service levels almost instantly, without any
change and with no significant drop in cost effectiveness or quality of service)
and flexibility gave rise to 3-tiered and n-tiered architectures.
Request
Server Client
(Database) (User
Interface)
Response
Request
Client
Database Application (User
Server Server Interface)
Response
10
N-tiered architecture: The 3-tier architecture can be extended to N-tiers when Software Evolution
the middle tier provides connections to various types of services, integrating and
coupling them to the client, and to each other. Partitioning the application logic
among various hosts can also create an N-tiered system. Encapsulation of
distributed functionality in such a manner provides significant advantages such as
reusability, and thus reliability (Ability of a computer program to perform its
intended functions and operations for the specified period of time, in the specified
system’s environment, without experiencing any failure).
Request
Client
Database Application Application
(Browser)
Server Server 2 Server 1
Response
The advantage of web based applications is that they do not have to be tailored to
run on specific platforms. But since the web applications cannot perform client-
side processing, they limit the user experience by turning the client computers
into “dumb” terminals. Web mails, online transactions are examples of web
applications.
HTTP
Request
Client
Application Web
(Browser)
Server Server
HTTP
Response
11
Basics of Computer 1.3.1.4 Cloud Computing
Software
Here is some background for the evolution of these services. As the new software
vendors tried to establish themselves in the market, they created solution
differentiators which provide unique value to the consumers. An example is
Salesforce.com, which from the inception offered a hosted Customer Relationship
Management (CRM) solution, while its established competitors (Siebel, SAP,
PeopleSoft etc) had their traditional (also called On Premise, meaning at the
customer site in its dedicated environment) CRM solution. Another reason is that
software vendors started targeting a niche customer segment called Small &
Medium Business (SMB). SMB customers are relatively new in business, so need
to establish the core IT systems in place and also have lesser financial strength, as
a result are more open towards cloud-based solution.
Lower upfront cost to get started, lower time-to-market (as it takes less time to
get a customer going on a cloud solution), allows the company to focus on the
core business and not worry about hiring and constantly training its staff on
the new technology etc.
On the flip side for a Cloud-based solution, certain segment of customers such
as large Banks and Financial institutions, Insurance companies may have
security constraints in letting their data reside outside its premises (in their
own data centers).
As the software evolved in its complexity, architecture and use, and as the
programming languages got better, styles of software programming also changed
and improved.
One of the longest standing goals of software design is reusability which leads to
increased reliability, accelerated development and easy maintenance. Over the
years, software languages and software design paradigms which have evolved, all
encourage compartmentalization of functionality to achieve this goal. Similar
functionality is grouped together into small, independent and reusable units.
These units can be used in any application for the purpose for which they were
originally intended.
The first step towards compartmentalization was moving from line by line non
structured program design to procedure-oriented program design.
INTEGER i
i=12
1 GOTO 10
2 CONTINUE
i=i-1
IF (i = 0) GOTO 99
10 PRINT*, "Line 10"
GOTO 2
99 CONTINUE
The above fragment of code simulates a loop using GOTO statement for transfer
of control. Note that the lines are labeled/ numbered so that they can be used with
GOTO. The program executes the statements sequentially. The code simulates a
loop to decrease the value of variable i by 1 till it reaches zero.
The initial value of i is 12. Until the value of i reaches zero, it continues to print
the text “Line 10”.
Procedures and functions which were for similar purpose were grouped together
to get a module. A big software application consisted of multiple modules, each
performing a particular task.
14
Structural design allowed modules to be reused in the form of code libraries. Software Evolution
Step 1
Path 1 Path 2
Test
Condition
Step 2 Step 3
Step 4
Procedure
As shown in Figure 1.10, same procedure is invoked from step 3 and step 4. There
is also a selection of path to be followed. The two paths would be either steps
1,2,4 or steps 1,3.
The sample pseudo code for the above flow could be:
The next leap forward towards compartmentalization and reusability was arrival
of object oriented-design that introduced the concept of an object as an atomic
unit of functionality.
15
Basics of Computer Object oriented design is built on the premise that programming problems can be
Software
modeled in terms of the objects in the problem domain. In this design, any object
of interest in the real world is an object in the program code. This helps to
effectively model the real world and interactions of items within it. As the objects
in the real world interact with each other, similarly, the objects in the program
interact through their interfaces or messages which are very well defined and
contained in the objects. An object exposes the interface that can be called on by
other objects that need the object’s functionality. Because an object is a self-
contained entity and because its interface is well-defined it is highly reusable
across many applications.
For example, school and student are objects in real world. They would be
considered as objects in object oriented design also and they would interact with
each other through messages.
Interacts through
Properties messages Properties
Methods Methods
Returns Address
In the Figure 1.11 each object has its own properties and methods which
constitute the interface of the object.
As the applications grew complex, code became more modular and reusable. The
applications were being broken up into pieces that were distributed across many
machines. Breaking applications into multiple parts and distributing them across
multiple platforms presented a new set of reusability problems.
Components exist at different sizes varying from single objects inside a library to
whole applications. In most cases, however, components are larger entities and
contain several objects.
As the software architecture moved from mainframes to Internet based and design
paradigms evolved from non-structured to service oriented, Programming
languages evolved to support the architecture and the design paradigms. As
design became more and more compartmentalized so that the application could be
distributed onto multiple machines, and individual components could be reused,
more and more programming languages were designed to make support these
ideas. For example COBOL is one language that evolved from procedural to
object oriented.
17
Basics of Computer 1.3.3.1 Procedural Language
Software
For trucks, the information will be similar, but slightly different. We need:
Color
Engine Size
Transmission Type
Cab Size
Towing Capacity
Make
Var Color
Var EngineSize
Var Transmission Type
Var Make
MainProg()
Begin
If requested for car
Call CarProcedure()
If requested for Truck
Call TruckProcedure()
End
CarProcedure()
18 Begin
Software Evolution
TruckProcedure()
Begin
/*Declare the Local variables*/
Var CabSize
Var TowingCapacity
If we need to add form to process information for bus, then we need to change the
MainProg() and add code for Bus Form. But if there is a change in the processing
of all the vehicles, then we need to make changes to all the forms. If we need add
any make specific information for cars, then we need to create multiple forms,
one for each make. Also, we need to be careful about any changes to the global
variables as all the forms are accessing them.
Before we consider above example in object oriented, let us understand few terms
and concepts associated with object oriented programming. There are three main
concepts that any language needs to support to be an object oriented language.
19
Basics of Computer Polymorphism: Polymorphism is the characteristic of being able to assign a
Software
different meaning specifically, to allow an entity such as a variable, a function, or
an object to have more than one form. It is the ability to process objects
differently depending on their data types and to redefine methods for derived
classes.
Following are the few terms that will help you understand object oriented
programming:
A class is a set of functions that work together to accomplish a task. It can
contain or manipulate data, but it usually does so according to a pattern
rather than a specific implementation. An instance of a class is considered an
object.
An object receives all of the characteristics of a class, including all of its
default data and any actions that can be performed by its functions. The
object is for use with specific data or to accomplish particular tasks. To
make a distinction between classes and objects, it might help to think of a
class as the ability to do something and the object as the execution of that
ability in a distinct setting.
A method simply refers to a function that is encased in a class.
A parameter is a variable that is passed into a function that instructs it how
to act or gives it information to process. Parameters are also sometimes
called arguments.
A property is a default set of data stored in a class. A class can have multiple
properties and the properties can be changed dynamically through the
methods of the class.
Smalltalk, C++, Java, C# are some of the examples of object oriented languages.
Now let us see how we create classes and use them for the automobile parts
inventory management system example.
Class Vehicle
{/*Data*/
Var Color
Var EngineSize
Var TransmissionType
Var Make
/*Methods for each data*/
Color()
{
Store and update color;
}
EngineSize()
{
20 Store and update EngineSize;
} Software Evolution
TransmissionType()
{
Store and update TransmissionType;
}
Make()
{
Store and update Make;
}
}
Class Car Inherits Vehicle
{/*Data*/
Var NumberOfDoors
/*Methods*/
NumberOfDoors()
{
Store and update NumberOfDoors;
}
}
/*Methods*/
CabSize ()
{
Store and update CabSize;
}
TowingCapacity ()
{
Store and update TowingCapacity;
}
}
Now in this case, if we need to add form to process information for bus, then we
just add one more class Bus() which is again inherited form the Vehicle class.
And if we need add any make specific information for cars, then again we can add
make specific classes which can be inherited from the Class Car() We need not
worry about mistakenly modifying any global variables. If there is change in
processing of all the vehicles, then instead of making changes at all the places, we
just modify the Vehicle() class.
21
Basics of Computer 1.3.4 Evolution of Software Licensing
Software
Software licensing has kept pace with the evolution of software solutions offered
by the vendor or the solution provider community.
Until early 1970’s, sharing of software was the accepted norm. Hardware came
bundled with software products which could be freely redistributed and the access
to source code allowed its improvement and modification.
In late 1960’s, the situation changed after the software cost increased and
manufacturers started to unbundle the software and hardware. A growing amount
of software was now developed for sale. In late 1970’s and early 1980’s
companies began imposing restrictions on programmers through copyright. They
achieved financial gains by selling rights of use of software rather than giving the
source code. This led to introduction of software licensing which governed the
usage and redistribution of software. During this time most of the companies
developed proprietary software that was actually the property of the company,
came without the source code and the users basically bought the right to use it in
the way specified under the license agreement.
In early 1980’s the seeds for free and open software were sown as a deviation
from the proprietary software. The open source software comes with source code
and a license that allows modification and free redistribution.
We will study in the following section, about different types of licenses that
evolved with software over the period of time.
The licensing type generally depends on whether the software is open source
software, is meant for individual use or enterprise wide commercial use:
Individual License: allows you to install the software only on a single stand
alone machine. It may be a perpetual license or Subscription based. Perpetual
license allows you to install and use the software indefinitely. Subscription based
license allows you to use the license for the specified time, after which you may
renew the subscription or remove the software.
Open Source License: It grants you the right to freely modify and redistribute the
software.
Commercial License: These are mostly for the large enterprises that use software
for commercial purposes.. Following are the main licensing models:
22
Traditional model : This includes single user-single license, multi users- Software Evolution
shared license, temporary or fixed-period licenses. This has mostly been used
for large proprietary mainframe applications.
Transaction-based model : Here, the pricing is based on providing a
committed business service, for ex, processing payroll for a global company
as part of HR offering and this can be priced per employee. Larger the
employee base at a given location, lower the price / employee can be. This
model came into existence with the evolution of software architecture from
mainframes to internet based. As mentioned before, when a company
provided a particular business service, its client could access the system from
anywhere over the Internet and they need not bother about maintaining the
database or the software system. The service provider then charges them for
each transaction/ record processed through their system.
Rental model : This has come into picture as Software as a Service (SaaS)
and Platform as a Service (PaaS) models have evolved over a period of time.
Here, the buyer need not need make upfront investment in hardware and
software, rather these come as bundled service to them. Few examples where
these are prevalent are – Finance & Accounting (Core Finance), Human
Resources (Core HR), Analytics (Business Intelligence/Reporting),
Procurement etc. There are also scenarios where the software vendor provides
subscription of a given solution (ex. Windows Azure, Salesforce.com, Siebel
On Demand, Amazon Web Services etc) on a periodic (ex. monthly, annual)
basis.
Technology Partnerships : Such agreements provide the consumer un-
limited access to vendor’s technology. Such contracts are typically multi-year
in nature where the consumer pays a fixed annual fee, which can be adjusted
in the subsequent years based on the actual usage. For example, a large
corporate customer deciding to use Oracle suite of ERP (Finance, HR),
database, CRM, Business Intelligence/ Reporting solutions can get into a
long-term multi-year partnership.
There is a wide variety of software available today. And there is no clear cut
distinction in certain software systems. Still, most computer software can be
broadly classified as:
System software
Programming software
Application software
At times the categorization is vague and some software may fall into more than
one categories.
End User
Application Software
Utility Software
Programming Software
System Software
Hardware
System software helps run the computer hardware and system. It is designed to
control the operations of a computer and coordinate all external devices like
communication devices, printers, keyboards, display units, etc. It manages all the
computer resources like memory and processor time in optimal and stable
manner.
System software provides a useful link between user and computer. It also assists
the computer in the efficient control, support, development and execution of
application software. System software is essential for computer hardware to be
functional and useful.
a) Operating Systems
Operating System is the software that manages all the computers’ resources to
optimize its performance provides common services for efficient execution of
various application software and acts as an interpreter between the hardware,
application programs and the user.
An operating system is essential for any computer to be useful to us. When a user
or a program wants the hardware to do something, the request is always
communicated to and processed by the operating system.
Operating systems performs basic tasks, such as recognizing input from the
keyboard, sending output to the display screen, keeping track of files and
directories on the disk and controlling peripheral devices.
For large systems, the operating system has even greater responsibilities and
powers.
You will study in detail about the operating system in the following units in this
block.
25
Basics of Computer b) Server Programs
Software
Server programs are dedicated computer programs that run as services and serve
the needs or requests of other programs. These services may run on a dedicated
hardware or on the same computer as the requesting program. Also, one on more
services may run on the same computer hardware. Some common examples of
different types of server programs are:
Web server – for hosting websites.
Print server – manage multiple print requests for multiple printers.
File server – manages the storage and retrieval of shared computer files.
Database server – provide database services to other computer programs.
Mail Server – manages and transfers electronic mail messages.
c) Device Drivers
Device drivers are shared computer programs that provide an interface between
the hardware devices and operating system or other higher level programs.
You need a specific software program to control each hardware device attached to
the computer. It is very tedious to make any piece of hardware work. For example
to write to a hard disk, you need to know the specific address available, wait till
hard disk is ready to receive data and then feed it with data once it is ready. So
instead of writing the same code for a device in multiple applications you share
the code between applications. To ensure that the shared code is not
compromised, you protect it from users and programs. Such a piece of code is
called the device driver.
Device drivers are hardware dependent and operating system specific. They allow
you to add and remove devices conveniently from your computer system without
changing any of the applications using that device.
Common hardware components that require drivers are:
Keyboards
Mouse
Printers
graphics cards
sound cards
card readers
CD/ DVD drives
Network cards
Image Scanners
26
d) Communications Software Software Evolution
a) Compilers
When a compiler compiles a program, the source program does not get executed
during the process, it only gets converted to the form that can be executed by the
computer.
Compiler
b) Debuggers
A linker or link editor is a program that takes one or more Object file codes
generated by a compiler and combine them into a single executable program.
Object Code
Linker Execution
Results
External
Libraries
A text editor is a type of program used for editing plain text files.
Many text editors for software developers include source code syntax
highlighting and automatic completion to make programs easier to read and write.
Application software may be for commercial or scientific use. There is wide range
of application software available for varied purposes. Some major categories of
these applications include:
28
a) Word Processing Software can be used to create, edit, format, save, view or Software Evolution
print any text based document like letters, memos, reports, etc. MS Word is an
example of word processing software
29
Basics of Computer Check Your Progress 2
Software
Utility programs help manage, maintain and control computer resources. These
programs are available to help you with the day-to-day chores associated with
personal computing and to keep your system running at peak performance.
Computer viruses are software programs that are deliberately designed to interfere
with computer operation; record, corrupt, or delete data; or spread themselves to
other computers and throughout the Internet. Virus Scanning Software are utility
programs designed to protect your computer from computer viruses, worms and
trojan horses.
To help prevent the most current viruses, you must update your antivirus software
regularly. You can set up most types of antivirus software to update
automatically.
Most anti-virus programs use one of the following techniques to identify viruses:
1. Signature based detection: This is the most common method. It compares
the contents of the infected file to a known pattern of data. Because viruses
can embed themselves in existing files, the entire file is searched.
2. Heuristic-based detection: This method is primarily used to identify
unknown viruses by looking for malicious code or variations of such code.
3. File emulation: This is another heuristic approach in which the infected
program is run in a virtual environment and the actions it performs are
recorded. The actions are analyzed to check for any malicious actions and
carry out disinfection actions accordingly.
No matter how useful antivirus software can be, these can sometimes have some
drawbacks.
Antivirus software can impair a computer's performance. Active anti-virus
programs can cause conflicts with other programs.
A "false positive" is when antivirus software identifies a non-malicious file as
a virus. When this happens, it can cause serious problems. For example, if an
antivirus program is configured to immediately delete infected files, a false
positive in a essential file can render the operating system or some
applications unusable.
Most popular anti-virus programs are not very effective against new viruses.
The reason for this is that the virus designers test their new viruses on the
major anti-virus applications to make sure that they are not detected before
releasing them into the market.
31
Basics of Computer Some apparent antivirus programs are actually malware being sold as
Software
legitimate software, such as Win Fixer and MS Antivirus.
Some commercial antivirus software agreements include a clause that the
subscription will be automatically renewed. For example, McAfee requires
users to unsubscribe at least 60 days before the expiration of the present
subscription. Norton Antivirus also renews subscriptions automatically by
default.
Finally, antivirus software generally runs at the highly trusted kernel level of
the operating system, creating a potential avenue of attack
Despite the drawbacks, anti-virus software have become a necessity these days. A
number of popular anti-virus programs include those by Kaspersky, Symantec,
McAfee, and Norton. The cost of the program increases with the increase in the
number of virus detection and removal features and ease they offer.
Backup utilities
Backup refers to making copies of data so that these additional copies may be
used to restore the original after a data loss event. All types of data could be
backed up like pictures, word documents, files, executables or an entire database.
The main purpose is to recover data in the event of data loss or data getting
corrupt. Other purpose could be to recover historical data.
A number of Backup software are available that assist you in taking backup of
your important data on the computer. Selecting between various back-up software
is not only a based on the cost but also on the software that meeting the
requirements.
Backup could be taken on variety of media including hard drive, CDs, DVDs,
floppy disks etc. It could also be taken on FTP locations, tape or online servers. A
number of free and proprietary back-up software are available including those
from Microsoft, Symantec, Apple, IBM, and Norton.
It is important to take backup of important data regularly and also verify that it
can be restored successfully.
32
Diagnostic programs Software Evolution
In practical experience, these tools do not usually identify the exact cause of the
system problem, but they often provide some information about what is in the
system and how it is working. Some of these are free or are included with
common operating systems at no additional charge, while others are commercial
products that range from affordable to rather pricey.
33
Basics of Computer the disk. Disk defragmenters gather those free spots and put them together to
Software
enable you to continue to save your data in the most efficient manner.
Norton Diagnostics : This utility is meant to go beyond the System
Information program and actually perform tests on the hardware to identify
problems. It includes tests of the processor and motherboard and system
memory, and will identify some types of resource conflicts. In reality, it is still
quite limited in terms of the numbers of problems it will find.
QAPlus : QAPlus from DiagSoft is a more advanced diagnostic suite that
comes in several flavours, depending on what you need to do and how you
want to do it. This is a more expensive package but can give you much more
detailed information about your system and help identify problem situations as
well.
File view programs
File view utilities let you see the contents of a wide variety of documents even
when you don't have the application on your system
All the fundamental types of file viewers are filters which translate binary files
into plain text (one example antiword). Another common type of file viewer is a
picture viewer that can display picture files of various formats. Common features
here are thumbnail preview and creation, and image zooming.
The primary reason behind limited functionality is marketing and control. For
example, a popular software program, Adobe Acrobat, can be used to create
content for most computer platforms, under various operating systems. To ensure
that people can access the documents created with Adobe Acrobat, the software
publisher created a viewer program, the Acrobat Reader, and made it available for
free. This viewer application allows the content created by the proprietary
authoring software to be readable on all supported operating-system platforms,
free of charge, thus making it a more attractive solution.
There are many products which can qualify as a file viewer: Microsoft Word
viewer or Microsoft PowerPoint viewer, and the Open Office equivalents are
examples. In a sense, a web browser is a type of file viewer, which translates, or
renders, the HTML markups into a human-friendly presentation. Although HTML
is plain text, viewing an HTML file in a browser and in a text editor produces
significantly different results.
Google Docs is another very good example of online file viewer. Google Docs
Viewer supports 12 new file types in, including all remaining Microsoft Office
file types, Apple's Pages format, and Adobe's Photoshop and Illustrator files.
34
Computer performance enhancement utilities Software Evolution
Disk defragmenter utility reorganizes non contiguous files into contiguous files
and optimizes their placement on the hard drive for increased reliability and
performance.
The Windows registry can quickly become crowded and hence slower to search
when you remove unused programs that do not uninstall properly. There are
utilities like Registry Mechanic or Registry Clean Expert that can help clean
Windows registry to improve performance.
Most malware requires the user to initiate its operation. For example, sending
infectious attachments (it acts when users downloads them and runs the
attachment) in e-mails, browsing a malicious website that installs software after
the user clicks ok on a pop-up, and from vulnerabilities in the operating system.
Early infectious programs, such as Internet Worm and MS DOS viruses, were
written as experiments and were largely harmless or at most annoying. With the
spread of broadband Internet access, malicious software has been designed for a
profit, for forced advertising. Here the malware keeps track of user’s web
browsing, and pushes related advertisements.
35
Basics of Computer Typical types of malicious software are - Computer virus, Computer Worm,
Software
Trojan horse, Rootkits, Spyware etc.
Computer Virus
Some viruses do little but replicate while others can cause severe harm or
adversely effect program and performance of the system. They can destroy files,
software, program applications, and cause the loss of data.
There are various types of computer virus that can be classified by their origins,
techniques of attack, modes of spreading, forms of infections, hiding locations
and the kind of damage caused. Examples of computer viruses are: Randex,
Melissa.A and Trj.Reboot
Computer Worm
Computer Worm is a program that is very similar to a virus. It has ability to self
replicate. It actively spreads itself over the network, copies itself from one disk
drive to another or copies using email. It does not need user action to start it
unlike virus. Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C,
Sobig.D, Mapson.
Trojan Horse
Rootkits
This is a technique using which the malware remains concealed in the system, and
continues to do the damage in a concealed manner. Rootkits can prevent a
malicious process from being visible (ex Task Bar in Windows operating system)
36
in the list of running applications. Rootkits normally attempt to allow someone to Software Evolution
gain control of a computer system. These programs are usually installed by
trojans and are generally disguised as operating system files.
Trap doors
Logic Bombs are not programs in their own right but rather camouflaged
segments of other programs. They are not considered viruses because they do not
replicate. But their objective is to destroy data on the computer once certain
conditions have been met. Logic bombs go undetected until launched, and the
results can be destructive. For example, some malicious programs are sot off
during days such as April Fools Day or Friday the 13th.
Spyware
While so far we have discussed the malware’s intent to damage the computer
system, spyware is designed for commercial gain. These programs gather
information about the user in a concealed manner, show pop-up advertisements,
redirects the search engine results to paid advertisements etc.
Keystroke loggers
This is a program, once installed on the system, which intercepts the keys when
entering the password or the Credit Card number while shopping online. This can
be used for Credit Card fraud.
Data-stealing
This is a web threat that results in stealing of personal and proprietary information
to be used for commercial gains either directly or via underground distribution.
Some popular examples of recent data-stealing cases are – steal and sell large
number of credit card numbers from businesses such as TJX, OfficeMax, Sports
Authority etc.
37
Basics of Computer Block unwanted email viruses by installing a spam filter and spam blocker.
Software
When browsing the internet, always watch what one clicks and installs. Do
not simply click OK to dismiss pop-up windows.
Install anti-virus software; scan and update regularly. It can, in most cases,
remove and prevent viruses, worms, trojans, and (depending on the software)
some spyware.
Install anti-spyware/anti-adware; scan and update regularly. It will remove
and (depending on the software) prevent future adware and spyware.
Open Source Software (OSS) is software that comes with source code, and
importantly also provides rights (typically reserved for copyright holders) to
study, change and improve the software. This development happens in a larger
collaborative environment, without any direct objective of the software’s
commercial success.
Open Source Initiative (OSI) is the patron of the Open Source Definiton (OSD)
and is the community-recognized body to evaluate and approve the software as
OSD compliant. Some key criterion for OSD compliance are mentioned below:
Free Redistribution : The license should allow any party to sell or give away
the software as a component of a larger software distribution containing
programs from multiple sources. The license shall not require a royalty or
other fee for such sale.
Source Code : The program must include source code, and must allow
distribution in source code as well as in executable form. Where some form of
a product is not distributed with source code, there must be a well-publicized
means of obtaining the source code for no more than a reasonable
reproduction cost preferably, downloading via the Internet without charge.
Derived Works : The license must allow changes to the existing source code
and must allow them to be distributed under the same terms as the license of
the original software.
No Discrimination against specific applications : The license must not
restrict anyone from making use of the program in a specific scenario. For
38
example, it may not restrict the program from being used in a business, or Software Evolution
from being used in drug research.
License must Not Be Specific to a Product : The rights attached to the
program must not depend on the program being part of a particular software
distribution.
License must Not Restrict Other Software : The license must not place
restrictions on other software that is distributed along with the licensed
software. For example, the license must not insist that all other programs
distributed on the same medium must be open-source software.
Programming language
PHP - Scripting language suited for the web
Operating System
GNU Project — “a sufficient body of free software”
Linux — operating system kernel based on Unix
Server Software
Apache — HTTP web server
Tomcat web server — web container
MySQL – database, popular for applications built on LAMP stack (Linux,
Apache, MySQL, PHP/PERL/Python)
MediaWiki — wiki server software, the software that runs Wikipedia
Client software
Mozilla Firefox — web browser
Mozilla Thunderbird — e-mail client
Some typical challenges that used to be associated with the Open Source Software
were lack of product support that typically comes with proprietary software,
future upgrades, end-user training etc. Over a period of time, industry has evolved
to overcome these challenges. For example, Red Hat Linux sells Linux operating
system and provides product support, training as well. Further, it is important to
note that Open Source Software is not always the best option for all the business
needs. However, it does provide a good alternative to the proprietary software.
One needs to do the required due-diligence to decide the right product for a
specific situation.
39
Basics of Computer Check Your Progress 3
Software
1.8 SUMMARY
Software is the brain of computer systems. Any piece of hardware is useful till it
has its associated software.
In this unit, we studied how software evolved over the years. Software grew in its
size, usage, complexity, development techniques, design and architecture. In the
early days software was developed for large centralized systems. It was generally
bundled with the hardware, since the cost of software was negligible in
comparison to the hardware. The source code was easily available for
modification, improvement and redistribution. As the hardware developed,
machines became smaller yet much more powerful, computer systems usage and
software complexity increased considerably. Higher complexity resulted in higher
software costs. Software now came at a price and with restrictive licenses.
40
One could no longer use, modify or redistribute it freely. Various licensing Software Evolution
models evolved based on whether the software would be used by an individual or
limited users or enterprise wide, whether it is for commercial or non commercial
purposes, whether it is free software or proprietary software, or how often it is
used. Companies have been selling these licenses to increase their revenues. The
changing pattern of software distribution and sharing led to a movement for free
and open source software.
c) Encapsulation: Ability to hide data and methods from outside the world
and only expose data and methods that are required. It helps in hiding all
the internal details from outside world. It also provides a way to protect
data from accidental corruption
Linker is a program that uses multiple object files created by the compiler
and predefined library object files, links them together and creates a single
executable file.
c) Compiler is a program that takes the whole source code in high level
language and converts it into the source code in low level language. Any
errors are reported at compile time for the complete code. Once the
translation is complete, only the executable version of the code runs in the
memory.
An interpreter takes the source code in high level language one line at a
time during run time, translates the instruction into low language code and
executes it before proceeding to the next instruction. Hence the interpreted
program remains in the source language and is converted into low level
language only at run time. So the translator program also needs to be in
the memory at run time.
Since the compiler translated the whole program before it is run while
interpreter translates one line at a time while the program is being run,
compiled programs run faster than the interpreted ones.
43
Basics of Computer 3. The device driver for the printer may not have been installed. You can
Software
search for the driver for the particular printer on the internet and install it on
your machine.
Open source refers to a program in which the source code is available to the
general public for use and/or modification from its original design free of
charge. Open source sprouted in the technological community as a response
to proprietary software owned by corporations. Advantages of Open source
are: 1) Low cost and no license fees; 2) Open standards that facilitate
integration with other systems; and 3) it is easily customizable. The
disadvantages are: 1) Lack of professional support; 2) Evolving developer
communities; 3) Lack of release co-ordination; and 4) Erratic updates.
3. a Install anti virus and anti spyware. Scan and update regularly.
b. Keep the windows system updated with patches and updates.
c. Browse and click only known and secure web sites. Avoid suspicious
ones.
d. Open email attachments from verified source only.
44
Software Evolution
1.10 FURTHER READINGS
http://www.opensource.org/.
http://en.wikipedia.org/wiki/Malicious_software.
45
Basics of Computer
Software UNIT 2 OPERATING SYSTEM
2.0 Introduction 46
2.1 Objectives 47
2.2 The Concept of an Operating System 47
2.3 Operating System Services 50
2.3.1 Command Processor and User Interface 50
2.3.2 File Management 51
2.3.3 Input/Output Services 52
2.3.4 Process Control Management 52
2.3.5 Memory Management 52
2.4 A Bit of History 53
2.5 Summary 57
2.6 Answers to Check Your Progress 57
2.7 Further Readings 57
2.0 INTRODUCTION
There are many important reasons for studying operating systems. Some of them
are:
1) User interacts with computer through the operating system in order to
accomplish his/her task since it is his/her primary interface with a computer.
2) It helps users to understand the inner functions of a computer very closely.
3) Many concepts and techniques found in the operating system have general
applicability in other applications.
The introductory concepts of an operating system will be the main focus in this
unit. The unit introduces several OS concept such as command interface,
bootstrap loader, kernel, nanokernel, thin clients, multitasking and
multiprogramming OS. To understand OS one needs to understand what kinds of
services are provided by process management, I/O device management, memory
management and file system. This topic is an important part of the unit. The end
of unit goes into a brief history of evolution of OS, starting from serial processing,
batch processing till date.
46
Operating Sytem
2.1 OBJECTIVES
1. It accepts requests from users and from the user’s programs and executes their
commands.
2. It optimally manages the hardware resources of the computer which may
include CPU, main memory, hard disks, I/O devices, network interface
card, etc.
User
Application
program
Command
interface
I/O
services
The figure 2.1 shows the command interface as part of the operating system. In
some systems, this is viewed as a shell outside of the operating system. 47
Basics of Computer In a real situation, the operating system does more complex tasks: It controls not
Software
only one I/O devise but many such devises; it allows many programs to share the
H/W resources of a system and not one. There could be many CPUs in a system.
Operating system has to optimally manage all of them. So how does operating
system execute a command? In order to execute a command OS does the
following steps:
It accepts a command from a user through mouse clicks or from the keyboard.
Through a port number it is able to recognize what is the source of input.
It must interpret these commands and take actions accordingly.
It must provide a file system that can interpret the name of the program being
requested and determine the location of the file on secondary storage device
for example.
It must read the appropriate blocks from the device into memory. Only then
can the operating system transfer control to the program being executed.
With this example one can make out what kind of facilities operating system
provides to
the users and programs:
The operating system provides interfaces for the user (keyboard, mouse,
clicks, and pen drive) and also for the user’s programs.
It provides file system support to manage huge volume of data in to secondary
storage device.
It provides I/O services that can be used by every program.
It provides boot-strapping or Initial Program Load (IPL) to start a
computer
It manages all kinds of errors and also supports error recovery mechanisms
It provides networking services.
It provides the environment (allocation of memory, I/O devices and CPU
time) for concurrent processing. As you are aware, a single processor is
capable of executing only one instruction at a time. Concurrent processing is
the means used to simulate the simultaneous execution of multiple programs
to provide multitasking and multiuser support.
The operating system is commonly divided into resident and non resident parts.
Some operating system services are critical to the operation of the system and
must be resident in memory all the time. Others can be loaded into memory only
when they are needed, and executed just like other programs.
48
The critical programs are loaded into memory by the bootstrap loader at start-up Operating Sytem
time and will remain resident as long as the computer is running. The bootstrap
for most modern computers is stored in read-only memory; on some computers,
part of the resident operating system will also be contained in ROM, so that it is
permanently resident in memory and always available for use. The memory
resident components of an operating system are commonly known as the kernel
of the operating system. For example, the operating system program accepts user
commands must always be present, as well as the programmes that handle request
from the user systems and manage resources in a multitasking system. On the
other hand, an operating system command that formats a new disk is only used
occasionally; it can be loaded and executed only when it is required. Today, the
trend is towards design of nano kernel or micro kernel. The essence of these
kernels is to keep the basic kernel smaller.
Most people assume that the operating system is stored on a disk that is connected
directly to the computer, but this is not necessarily true. If the computer is
attached to a network, it may obtain its programs, including the operating system,
from another computer on the network. This has led to the concept of the diskless
workstation, a personal computer that relies completely on the network for its data
and program storage and access. Diskless workstations are also known as thin
clients. The size of the kernel and the particular services provided within a kernel
vary from one operating system to another operating system, depending on the
organization and capabilities of the system, as well as by the type of system.
UNIX, WINDOWS 2000, WINDOWS XP and Linux are examples of
operating systems that operate on a variety of different hardware platforms
(i.e., microprocessor). There is a strong advantage providing a standard
operating system that works on different hardware platforms. Such a system
provides portability for programme as well as for file, therefore it is easy for
the users to move comfortably from one machine to another. They are also
called multiuser and multiprogramming or multitasking operating system
which makes it possible for many users or tasks to share the computer
resources, providing fuller utilization of the system resources.
The operating system extends the capability of the computer to include
features that require special coordinated hardware and software that is
invisible to the user. These features include virtual memory, cache memory,
multiprocessing.
Systems can also be categorized by the degree of activity between the user
and the system during program execution. As a student, you are probably
most familiar with online, interactive systems. “Online” simplify means that
the user is connected directly to the computer. When the system is interactive,
the user interacts directly with the program to provide input data and guidance
during program execution. This is called online processing. Interactive
systems are sometimes known as conversational systems.
Many business tasks such as banking operations are performed more
effectively in a batch, where the data input for the program is collected
together into a file on disk or tape. It does not make sense to have a user enter 49
Basics of Computer data one record at a time if an entire set of data is to be sorted, for example.
Software
Instead, the user submits the program(s), or job(s), to the computer for
processing. This type of processing is known as batch processing. The user
does not interact with the program during batch processing. The OS system
user interface provides a means for the user to get work done more quickly
and efficiently. This is especially true for the user interface such as menu,
icons found on modern operating systems. The modern operating systems
combine graphical user interface simplicity with sophisticated text
command input capability to provide the user with powerful access to the
facilities of the computer.
Check Your Progress 1
1. Define the following terms:
(i) Online Processing:
………………………………………………………………………………….
………………………………………………………………………………….
………………………………………………………………………………….
(ii) Batch Processing:
………………………………………………………………………………….
………………………………………………………………………………….
………………………………………………………………………………….
2. How does multiprogramming improve performance of a system?
………………………………………………………………………………….
………………………………………………………………………………….
………………………………………………………………………………….
To the user, the most important and visible services provided by the OS is the user
interface and the capabilities that it provides to execute commands which may not
be a part of OS.
50
Instead these systems consider the user interface as a separate shell that is Operating Sytem
provided with the operating system and that interacts with the kernel to provide
the necessary-user command capabilities. In UNIX, three different shells, the C
shell, the Bourne shell, and the Korn shell are in common use, and many other
shells for UNIX are available. Each of these shells provides different command
structures and different capabilities.
Different types of user interface exist. The most common are the graphical user
interface, or GUI, and the command line interface. The graphical user interface
accepts commands primarily in the form of drop-down menus, mouse movements,
and mouse clicks. The command line interface relies on typed commands which
provide direct access to various methods within operating system such as File
system, I/O system, and network services. UNIX allows certain class of users
called superusers to use some kind of commands for changing the platform or
access rights.
Command languages extend the power and flexibilities of the operating system
and simplify use of the system for less sophisticated users.
The concept of a file is central to the effective use of a computer system. A file is
generally loosely defined as a collection of related information such as students
records employee database. It might contain graphical usage. A file may be
organized internally into records or it may simply be a stream of bytes. A file
constitutes a logical unit of storage, that is, logical to the person or program using
the file.
The file management system provides and maintains the mapping between a file
logical storage needs and the physical location where it is stored. Users and
programs simply access the files by the name, and the file management system
handles the details The file management system identifies and manipulates files
by the names provided by their users determines the physical requirements of the
file, allocate space for it, stores it in that space, and maintains the information
about the file so that it may be retrieved partially or in full, later. The file
management system keeps track of the available space on each device connected
to the system. The user and the user’s program need not be aware of the
underlying physical storage issues.
The file management system allows the retrieval and storage of files by name,
keeps track of the mappings, allocates and frees space, allows the mounting and
unmounting of file structures, and provides other functions required to maintain
the structures of the file system.
Directory structures for each I/O device in the system and tools to access and
move around these structures. The directory structure provisions are made to
move easily from one structure to another.
It also protects files and limit file access to authorized users. 51
Basics of Computer File management systems are particularly important in systems in which
Software
secondary storage devices are shared in common by multiple users, since they
provide a directory system that assures that there is no duplicate use of physical
storage.
Every operating system, large or small, provides input/output services for each
device in the system. The operating system includes I/O device driver programs
for each device installed on the system. These drivers provide services to the file
management system and are also available, through the API, to other programs for
their use. The I/O device drivers accept I/O requests and perform the actual data
transfers between the hardware and specified areas of memory.
Devices drivers for newly installed devices are added and integrated into the
operating systems. In Windows, this capability is known as plug-and-play.
The purpose of the memory management system is to load programs into memory
in such a way as to give each program loaded the memory that it requires for
52 execution.
In multiprogramming operating system there are many programs residing in the Operating Sytem
memory simultaneously in the memory.
The memory management system has three primary tasks. It attempts to perform
these tasks in a way that is fair and efficient to the programs that must be loaded
and executed.
1. It keeps track of which parts of the memory are currently being used and by
which process into memory together with the space being used and also keeps
track of available space.
2. It maintains one or more queues of programs waiting to be loaded into
memory as space becomes available, based on such program criteria as
priority and memory requirements.
3. When space is available, it allocates memory to the programs that are next to
be loaded. It also de-allocates a program’s memory space when it completes
execution. The de-allocated space is made available for other programs.
In attempting to understand the key requirement for an operating system and the
significance of the major features of a contemporary operating system, it is useful
to consider how operating systems have evolved over the years.
Serial Processing
During the late 1940s to the mid-1950s, the programmer interacted directly with
computer hardware; there was no operating system. These machines were run by
operators from a console, consisting of displays lights, toggle switches, some
53
Basics of Computer form of input device and a printer. Programs in machine code were loaded via a
Software
card reader.
This mode of operation could be termed serial processing, reflecting the fact that
users have access to the computer in series. Gradually, various system software
tools were developed which included libraries of common functions, linkers,
loaders, debuggers, and I/O driver software to attempt to make serial processing
more efficient.
Early machines were very expensive, and therefore it was important to maximize
machine utilization. To improve utilization, the concept of batch operating system
was developed. It appears that the first batch operating system (and the first
operating system of any kind) was developed in the mid-1950s by General Motors
for use on an IBM 701. The concept was subsequently refined and implemented
on the IBM 704 by a number of IBM customers.
The central idea behind the batch processing system was the use of a piece of
software known as the monitor. With the use of this type of operating system, the
user no longer had direct access to the machine. Rather, the user submitted the job
on cards or tape to a computer operator, who batches the jobs together
sequentially and places the entire batch on an input device, for use by the monitor.
Many important breakthroughs in operating system design occurred in the early
1960s which laid the foundation for design of modern operating system.
IBM introduces OS/360 as the operating system for its new System/360 in 1964.
OD/360 provided a powerful language to expedite batch processing known as Job
Control Language. It introduced a simple form of multiprogramming or
multitasking feature that facilitated loading several jobs into main memory, so
that other jobs programs could use the CPU when one job was busy with I/O. By
this time, disks were also becoming available. To take its advantage the OS
introduced features to cards onto disk while the CPU executed its jobs; thus, when
a job completed, the OS could load another job from disk into memory, ready to
run. This improved the OS scheduling capability. Multiprogramming or
multitasking is the central theme of modern operating system.
With the use multiprogramming, the batch processing can be quite efficient.
However, for many jobs, it is desirable to provide a mode in which the user
interacts directly with the computer. Indeed for some jobs, such as transaction
processing, an interactive mode is essential.
54
Today, the requirement for an interactive computing facility can be, and often is, Operating Sytem
met by the use of a dedicated microcomputer. That option was not available in the
1960s when most computers were big and costly. Instead time sharing was
developed. Just as multiprogramming allows the processor to handle multiple
batch jobs at a time, multiprogramming can be used to handle multiple interactive
jobs. In this latter case, the technique is referred to as time sharing, because the
processor’s time is shared among multiple users. In time sharing system, multiple
users simultaneously access the system through terminals, with the operating
system interleaving the execution of each user program in a short burst or
quantum of computation.
Both batch processing and time sharing use multiprogramming. The key
differences are shown in the following table.
Development of UNIX
55
Basics of Computer the OS also developed techniques for interprocess communication, and even
Software
provided for networked and distributed processing.
UNIX earned a reputation for power and flexibility. Because it was written in
C, it was also easy to port it that is to make it run on other computers. As a
result of these factors, UNIX became an important operating system for
universities and was ultimately adopted, in many versions.
Another important innovation, some would say the most important
development in making the computer accessible to nontechnical users, was the
development of the concept of graphical user interfaces.
The next important breakthrough in computer use occurred in 1982, with the
introduction of the IBM personal computer. The IBM PC was designed as a
stand-alone, single-user computer for the mass market. The IBM PC was
supplied with a reasonably easy-to-use operating system, PC-DOS, which was
developed, and also later marketed, by Microsoft as MS-DOS. PC-DOS was
actually derived from an earlier personal computer operating, CP\M (Control
Program for Microcomputers).
56
2.5 SUMMARY Operating Sytem
This unit has laid down to foundation for understanding the OS concepts which
will be discussed in advanced operating system courses. OS accepts requests from
users and from users programs and executes their cards in optional manner. The
unit introduced several OS concepts such command interface, boot straping,
concurrent processing, nanokernals, microkernals, thin clients, multitasking,
multiprogramming operating system. To understand an operating system are
needs to understand the services provided by the OS. It briefly describes services
provided by command processor, file management system, I/O control system,
process management and memory management. In the last section of the unit we
trace the evolution of OS since 1940s onwords.
1. (i) Online simplfy mens that the user is directly connected to the computer
and when the system is interchanges, the user interacts directly with the
program to provide important data and other works.
(ii) In batch processing, an user directly interact with the system. Rather than
they collect their programs or job(s) in a file or a disk or tape and submit it
for later execution. Many business tasks such as banking and insurance
operations are performed much effectively in a batch.
2. Multiprogramming improves performance by overlapping CPU and I/O
operation on a single machine.
William Stalling, Operating Systems, 4th edition, Prentice Hall of India – 2003
Irv Englander, Architecture of Computer Hardware and System Software, Wiley
2000 57
Basics of Computer
Software UNIT 3 CONCEPT IN PROGRAMMING
LANGUAGE
3.0 Introduction 58
3.1 Objectives 58
3.2 Problem, Algorithm, Program and Programming Language 59
3.3 Concept of a Programming Language 65
3.4 Elements of Programming Language 67
3.4.1 Variables, Constants, Data Type, Array and Expression 67
3.4.2 Conditional and Looping Statement 72
3.4.3 Subroutine and Function 73
3.5 Editor, Assembler, Interpreter & Compiler 76
3.6 Summary 78
3.7 Answers to Check Your Progress 80
3.8 Further Readings
3.0 INTRODUCTION
3.1 OBJECTIVES
A Problem is to carry out a particular task. For solving the problem, some input
has to be given to the system. The system will process or manipulate the input and
produce the desired output. An algorithm describes the steps required to solve a
problem. Once an algorithm is obtained for solving a problem, a Program has to
be written which a computer can execute so as to accomplish the given task,
thereby solving the problem at hand. The program can be in any suitable
programming language and is not dependent on the algorithm in any way.
The steps that comprise an algorithm must be organized in a logical, clear manner
so that the program that implements this algorithm is similarly well structured.
Number of steps in the algorithm should be finite, they should be executed in
finite amount of time and they should give the desired output. Algorithms are
designed using three basic methods of control:
Let us take few problems to illustrate how to express the solution to a problem in
the form of an algorithm. We will also see how algorithm can be
diagrammatically represented using flow chart, and also how a program can be
written based on the algorithm.
For providing a solution to any problem some input from the user is required. In
the following examples the number n that is expected from the user should be an 59
Basics of Computer integer. In the program, it will be declared of the required type only, referred as
Software
data type of the variable. A Detailed description of variable and data type is given
in a later section.
Computational or Process
processing
Input/Output Operation Input-Output
Example 1
60
Concept in Programming
Language
The program to implement this so that it can be run on a computer can be written
in any of the known programming languages. For example, here C has been used
as the Programming language for writing the program:
61
Basics of Computer Example 2
Software
Step 1 Start
Step 2 Input number n
Step 3 Initialize product=1
Step 4 Initialize the counter, i=1
Step 5 Compute product=product * i
Step 6 Increment counter i by 1 i.e i=i+1
Step 7 Check counter <= n if yes go to step 5
Step 8 Print Product of first n natural numbers as product
Step 9 End
#include<stdio.h>
void main()
62
{ Concept in Programming
int n,i; Language
int prod=1;
printf(“Enter number n :”);
scanf(“%d”,&n);
for(i=1;i<=n;i++) /* For loop construct for repeating a set of statement n
number of times */
{
prod=prod * i;
}
Example 3
Problem: To find the sum and average of marks obtained by 20 students in some
subject of a course.
Algorithm:
Step 1 Start
Step 9 avg=(sum/20)
Step 10 End
63
Basics of Computer
Software
#include <stdio.h>
void main()
{
int i, sum; /* declaring variables */
int s[20]; /* declaring array to refer set of memory locations of same data
type with one name */
float avg;
In order to communicate with other human beings, one needs some language or a
medium. In the same way for solving problems, a programming language is
required in order to communicate with the computer. A Programming Language is
used to design and describe a set of instructions/actions for the computation that
we wish to be executed by the computer.
First an algorithm is designed which solves the problem in question. In the next
step, the algorithm is expressed in the form of a program. For this one should
have a sound knowledge of some programming language. A program written in a
particular Programming Language can control the behavior of a computer and
perform a designated task to generate the desired output for any given input.
S-> A
A->Ab | b i.e any word with sequence of any number of occurrence of character b
Start symbol:
Here S is start symbol. Any sentence will start with start symbol only.
In respect of BNF notation it is as follows:
L(T,N,P,S)
T={b}
N={A}
P={S->A,A->Ab}
S=Start sybmol
Example grammar:
Program: statement
Statement: stmt| stmt
Stmt: var=expression
Var:a|b
Expression: term +term | term-term
Term: var/const
e.g x=y+2
Similarly
Sentence: subject,verb,object
Subject: noun/article
Any number of sentences can be formed with the help of a grammar defined for a
language. The grammar should be unambiguous. otherwise during syntactic
analysis at some point of time it can have more than one meaning.
For writing a program, one must know how to use the internal memory of a
computer. A Computer memory is divided into several locations where each
location has its own address. Memory organization can be represented
diagrammatically as below:
Cell1
Cell2
Cell3
Cell4
CellN
Each location or cell can hold some information. In order to store, retrieve or
manipulate data from a specific memory location, we must have some identifier
for a particular location. .
In the above declaration, a & b are the variable name, which refer to a memory
location where integer values can be stored. Instead of address of the memory
location, variable names a and b will be used to refer to a memory location in
order to store or retriever update its value.
Data Type: Anything that is processed by a computer is called data. There are
different types of data that can be given to the computer for processing. A data
type is a classification identifying the typeof data. It determines the
68
In each programming language there are some primitive data types. For example Concept in Programming
Language
in the C programming language they are: Please note that these sizes can be
compiler or machine dependent in the case of this language. For other languages
such as Java, the sizes are defined by the language itself.
double, floating point number with double precision. These are organized
in 8 bytes (64 bits)
char, character type size of 1 byte (8 bits) It is used to form the strings i.e
sequence of characters.
An array is a set of elements of same data type that can be individually referenced
by an index. Usually these are placed in contiguous memory locations. Generally
two types of array are used:
where type is a valid data type (like int, float...), name is a valid identifier or
variable name and the elements field (which is always enclosed in square brackets
[]), specifies how many of these elements the array will contain.
Therefore, in order to declare an array named as marks, that will store marks for 5
students,
69
Basics of Computer int marks[5];
Software
50 70 80 90 63
i) arithmetic operator:
ii) relational operator
iii) logical operator
e.g temp=5;
temp=temp+1;
This means to add 1 to the current value of the variable temp and make that the
new contents of the variable temp
temp = a+b ;
+(addition),
70 -(subtraction),
*(Multiplication), Concept in Programming
Language
/(Division),
% (modulo),
++(increment by 1),
--(decrement by 1)
Here are some examples of arithmetic expressions.
e.g. x=y+z; /* addition of y and z will be stored in x */
i++; /* i will be incremented by 1 i.e i=i+1 */
y=x%2; /* remainder after x divided by 2 will be stored in y */
== (equal to)
!= (Not equal to)
< (less than)
<= (less than equal to)
> (greater than)
>=(greater than equal to)
&& (logical AND)
|| (logical OR)
! (logical NOT)
Relational expressions result in one of the truth value either TRUE or FALSE.
They are capable of comparing only two values separated by any valid relational
operator.
e.g.
Bit Wise: Bitwise operators modify variables considering the bit patterns that
represent the values they store.
For example,
if (n %2 ==0)
{
printf(“Number %d is even”,n);
}
else
{
printf(“Number %d is odd”,n)
}
A program loop consists of two segments, one is the body of the loop and the
other is the control statement. The control statement tests certain conditions and
then directs the repeated execution of the statements contained in the body of the
loop. The test may be either to determine whether the loop has repeated the
specified number of times or to determine whether the particular condition has
been met.
Initial condition
Execution of set of statements inside the loop
Test the condition
Again execute the statements if the condition is met else go to the next
statement in the sequence
72
There are three variants of looping statements in the C programming language Concept in Programming
Language
are:
For loop
While loop
Do while loop
In this brief introductory unit, we will not go into the details of the distinctions
between these three types of loops.
e.g 1
for(i=0;i<20;i++)
{ printf(“%d =”,i+1);
scanf(“%d”,&s[i]);
}
e.g 2
i=0;
while(i<20)
{
sum=sum+s[i];
i++; /* increment counter */
}
Basic structure or keywords may vary in different languages. Also loop structure
may be structured or not as it might not have control variables. Most of the
languages do have control variables in their loop structure.
A subroutine has no value associated with its name. All outputs are defined in
terms of arguments; there may be any number of outputs.
A parameter represents a value that the procedure expects you to supply when you
call it. You can create a procedure with no parameters, one parameter, or more
than one. The part of the procedure definition that specifies the parameters is
called the parameter list.
An argument represents the value you supply to a procedure parameter when you
call the procedure. The calling code supplies the arguments when it calls the
procedure. The part of the procedure call that specifies the arguments is called the
argument list. For example here is a subroutine to find the sum of three numbers
Functions can be called from the main program or from anywhere else, even from
within itself. Program control will transfer to function definition statement as soon
they are called and then return back to next statement immediately after the
calling point.
e.g
#include<stdio.h>
void main()
{
int x, y;
printf(“Enter number”);
scanf(“%d”,&y);
x=funname(y);
if(x==1)
printf(“Number %d is even”,y);
else
printf(“Number %d is odd”,y);
}
int funname(int a)
{
if((a%2)==0)
return 1;
else
return 0;
}
Library function: These are the functions supplied with the programming
language. The code or definition of library functions does not have to be written
in a user program while writing it. Coding or definition of these function are
defined in header or library files which are required to be included in program.
e.g.
#include<stdio.h>
printf(),scanf() etc. are functions defined in stdio.h header file.
Similarly every programming language has a set of library or header files.
75
Basics of Computer
Software 3.5 EDITOR, ASSEMBLER, INTERPRETOR & COMPILER
There are different types of editors. Some of the programming languages have
some specific built in editors.
Source pgm executable pgm
Compiler /
Editor Interpreter
As you may already know from a previous unit, programming languages can be
low level languages or high level languages.
Assembly
language Assembler
Machine code
program
Good readability
Portability
76
Easy debugging Concept in Programming
Language
Easy software development
Compilers
Interpreters
Compilers produce better optimized code that generally runs faster and compiled
code is self-sufficient and can be run on their intended platforms without the
compiler present.
e.g Basic , Prolog, Perl are languages that are typically interpreted.
3.6 SUMMARY
Input n
Initialize
fact=1 , i=1
No
Is i<=n ?
Yes
fact=fact+ i
i=i+1
End
79
Basics of Computer Check Your Progress 2
Software
3. The operators in any programming language are broadly classified into the
following types:
c) Relational Operators : >,<,=, not = ,<=, >= these are the relational
operators.
80
Computer Applications
UNIT 4 COMPUTER APPLICATIONS
4.0 Introduction 82
4.1 Objectives 82
4.2 Concepts of Open Source Software 83
4.2.1 Introduction 83
4.2.1.1 Free Software Definition 83
4.2.2.2 Open Software Definition 84
4.2.2 Open Source Development Model 84
4.2.3 Open Source Licensing 86
4.3 Project Management Software 87
4.3.1 Introduction 87
4.3.2 Project Manager – Role and Responsibility 87
4.3.3 Software Project management 88
4.3.4 Project Management Software 88
4.3.5 Tools for Project Management 90
4.3.5.1 Miscrosoft Office Project 90
4.3.6 Create and Schedule Project 90
4.3.7 Define File Properties for the Project 91
4.3.8 Add Taks to the Project 91
4.3.9 Create Milestones 92
4.4 Offce Applications 93
4.4.1 Word Processing 93
4.4.2 Introduction 93
4.4.3 Adding Header, Footer or Page Number to a Document 95
4.4.4 Creating a Table in Word 95
4.4.5 Creating a Table of Contents 96
4.4.6 Creating a Memo for Multiple Receipients – Mail Merge 98
4.5 Spreadsheet 99
4.5.1 Introduction 99
4.5.2 Basic Features 100
4.5.3 Formulae and Functions 102
4.5.4 Charting 104
4.5.5 Macros 104
4.5.6 A Small Example in Excel 2007 105
4.6 Database 105
4.6.1 Introduction 106
4.6.2 Create Table in Database 106
4.6.3 Add Fields to the Table 107
4.6.4 Add Data in the Table 107
4.6.5 Add New Fields in the Table 108
4.6.6 Set a Table’s Primary Key 108
4.6.7 Defining Relationships 109
4.6.8 Defining Queries 111 81
Basics of Computer 4.6.9 Reports 113
Software
4.6.9.1 A Small Example 113
4.7 Email 114
4.7.1 Introduction 114
4.7.2 Creating Email Accounts and Profiles 115
4.7.3 Create a New Email Message 116
4.7.4 Manage Contacts 116
4.7.5 Calendar Management 117
4.8 Summary 119
4.9 Answers to Check Your Progress 119
4.10 Further Readings 122
4.0 INTRODUCTION
In the previous units, we have learnt the basics of computer software and the
evolution of software. We also learnt the basic definition of Open Source
Software. As we go further we will learn in detail this concept and how it is
governed by the Open Source definition.
In this unit, we introduce the concept of Open Source software, its philosophy and
copyrights. We will also discuss its licensing arrangements under the Open
Source Definition.
4.1 OBJECTIVES
82
Computer Applications
4.2 CONCEPTS OF OPEN SOURCE SOFTWARE
Open Source Software is a computer software which is available along with the
source code and software license that permits the code to be studied, modified and
improved. It is often developed in public and collaborative manner.
Open source development, follows the model of the bazaar. In an open source
development model, roles are not clearly defined. The best features and
functionality evolve into popular use much as good ideas evolve into popular use
in the marketplace of ideas. Development is a collaborative process, resources are
not scarce, and no one person or organization directs the project. The users are
treated like co-developers and so they should have access to the source code of
the software.
The Open Source Initiative (OSI) was formed in 1998 with a mission to
harmonize the workings of the free software movement and commercial software
development. The purpose of the OSI was to “build bridges among different
constituencies in the open-source community.”
The OSI is the organization responsible for certifying software licenses as open
source licenses. Its website (www.opensource.org) gives a list of all the certified
licenses in existence. OSI previously certified almost any license agreement that
fit the open source definition. However, recently it announced a change in policy
that requires any newly certified license agreement not only to fit the open source
definition but also to be substantially different from existing certified licenses.
This is a part of the “nonproliferation” movement in open source.
4.2.1 Introduction
There are two competing definitions. The free software definition was authored
by Richard Stallman and is more normative in nature. The open source software
definition was authored by Eric Raymond and is more descriptive in nature.
The other definition is the Open source definition promulgated by OSI. This
broader definition includes permissive software licenses. The elements are:
Free redistribution
In this sense, the model is not a pure model of the bazaar. It is more like a free
market with a specialist’s desk. In well-known open source projects, these
gatekeepers include some of the most respected computer scientists in the world.
The gatekeeper decides which modifications to be included in the source tree,
based on technical considerations, including security and stability of the code and
compatibility with other technology, and the desires of the community at large on
issues such as features and functionality.
The most popular open source utility used by the gatekeeper is the Concurrent
Versioning System (CVS), which is licensed under GPL. A revision control
84 system allows only designated persons to check code into the source tree. It also
keeps track of published versions, what was added, changed, or deleted and when, Computer Applications
and who made the change; it further helps reconcile conflicting changes.
The users are treated like co-developers and so they should have access to the
source code of the software.
Early releases
Frequent integration
Code changes should be integrated (merged into a shared code base) as often as
possible so as to avoid the overhead of fixing a large number of bugs at the end of
the project life cycle. Some open source projects have builds where integration is
done automatically on a daily basis.
Several versions
There should be at least two versions of the software. There should be a buggier
version with more features and a more stable version with fewer features. The
buggy version (also called the development version) is for users who want the
immediate use of the latest features, and are willing to accept the risk of using
code that is not yet thoroughly tested. The users can then act as co-developers,
reporting bugs and providing bug fixes.
High modularization
The general structure of the software should be modular allowing for parallel
development on independent components.
There is a need for a decision making structure, whether formal or informal, that
makes strategic decisions depending on changing user requirements and other
factors.
Most well known open source software products follow the bazaar model as
suggested by Eric Raymond. These include projects such as the Linux kernel,
Firefox, Apache, the GNU Compiler Collection and Perl.
85
Basics of Computer 4.2.3 Open Source Licensing
Software
License defines the rights and obligations that a licensor grants to a licensee.
Open Source licenses grant licensees the right to copy, modify and redistribute
source code (or content). These licenses may also impose obligations (e.g.,
modifications to the code that are distributed must be made available in source
code form; an author attribution must be placed in a program/ documentation
using that Open Source, etc.).
All open source licenses, by definition, freely allow the licensee to exercise all of
the rights of copyright with respect to the licensed software. Some open source
software licenses contain explicit license grants, and some contain implicit ones.
All open source licenses contain broad warranty disclaimers and limitations of
liability. Most also include disclaimers of any license grant under any trademark
of the licensor—not that any such grant would necessarily be implied in the first
place.
Placing code (or content) in the public domain is a way of waiving an author’s (or
owner’s) copyrights in that work. No license is granted, and none is needed, to
copy, modify or redistribute a work in the public domain.
Examples of free software license / open source licenses include Apache License,
BSD license, GNU General Public License, GNU Lesser General Public License,
MIT License, Eclipse Public License and Mozilla Public License.
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
2. What are the advantages of using Open Source Software ?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
86
3. How is the Open Source Code maintained with the developers distributed Computer Applications
across geographical regions ?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
4. Give name of other industries besides software, where the concept of Open
Source is being implemented ?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
4.3.1 Introduction
The primary challenge of project management is to achieve all of the project goals
and objectives within the preconceived project constraints. Typical constraints are
scope, time, and resources. The secondary—and more ambitious—challenge is to
optimize the allocation and integration of inputs necessary to meet pre-defined
objectives. Typical development phases of a project are:
Software project management is the art and science of planning and leading
software projects. It is a sub-discipline of project management in which software
projects are planned, monitored and controlled.
The purpose of project planning is to identify the scope of the project, estimate
the work involved, and create a project schedule. Project planning begins with
requirements that define the software to be developed. The project plan is then
developed to describe the tasks that will lead to completion.
The purpose of project monitoring and control is to keep the team and
management up to date on the project's progress. If the project deviates from the
plan, then the project manager can take action to correct the problem. Project
monitoring and control involves status meetings to gather status from the team.
When changes need to be made, change control is used to keep the products up to
date.
By applying the project management cycle, one can make sure that everything
gets done on time and that the project objectives are being achieved.
The different project management activities which can be performed using the
Project Management Software are:
Scheduling
One of the most common purposes is to schedule a series of events or tasks. The
complexity of this schedule can vary considerably depending on how the tool is
used. Some common challenges include:
1. Events which depend on one another in different ways
2. Scheduling team members tasks along with the resources required by them
commonly termed resource scheduling
In many complex schedules, there will be a critical path, or series of events which
depend on each other, and whose durations directly determine the length of the
whole project. Some software applications (for example, Dependency Structure
Matrix solutions) can highlight these tasks, thus helping in optimization of effort.
Providing information
Timesheet Management
A good timesheet management system in place, is essential both for the customer
projects as well as internal activities within the organization. Timesheets not only
help the Project Manager in managing the project in a better manner but is also
useful for maintaining employee records for payroll calculations as well as helps
in improving the overall productivity of the organization.
89
Basics of Computer 4.3.5 Tools for Project Management
Software
Desktop applications : These are software packages installed on the PC. E.g. MS
Project, Gantt Project
Web based Systems : These are web based software which are installed in your
own hardware and accessed through intranet network. E.g. dot Project
In this section, the main features of MS Project software are described:
One of the most widely used software for Project Management used all over the
world is MS Project. It is used for planning, managing and organizing resources
for all kinds of projects. It uses a powerful scheduling engine to help align
different projects and tasks with available resources.
Project requires all information about the overall project, the individual tasks
needed to complete the project and the resources needed. For each task, the
duration of task, its dependencies and constraints are also required. Once it has all
the necessary information, it can calculate the start date and finish date for each
task.
The resources responsible for completing each task helps in Project staffing and
management of these resources across projects.
After project scheduling if at any point of time, the information about the project
changes, the task and resources can be updated and the project schedule is
adjusted.
Most of the projects are scheduled based and the project start date and the finish
date is calculated on the basis of the last task to be completed. However, there
might be projects where the finish date is known, and there is a need to calculate
the project start date so that it is completed on schedule date. Both kind of
projects with known start date or known finish date can be scheduled using MS
Project.
4. Schedule the project in the project Information dialog box. To schedule from
Start date, select Project Start date in the Schedule from box and then chose
the start date. To schedule from the finish date, select the Project Finish Date
in the Schedule from box and choose the finish date.
Tasks are created to break the project work into smaller pieces. Tasks are
activities of the project.
1. On the View tab, in the Task Views group, choose Gantt chart option
91
Basics of Computer 2. In the Task Name field, type a task name. The Task IDs are automatically
Software
created.
3. It is also possible to create multiple tasks using the Task Form View. To do
this, On the View Tab, in the Split View group, select Details. The window is
split to display the Gantt chart on the top and Task view form at the bottom. In
the Task Form view, type the task information like Name, Duration, assigned
resources and predecessor tasks.
Any major event in a project is marked as a Milestone and is used to monitor the
project’s progress. Any task with zero duration is marked as milestone. Any other
task of any duration can also be a Milestone in the project.
1. On the View Tab, in the Tasks View tab, click Gantt chart.
2. Type the name of the new milestone in the Task Name field
3. Type 0 in the Duration field of the milestone task to create the task as
milestone
4. To create a task with greater than zero duration as Milestone, select the task
and then on the Task tab, choose the Task Information from the Properties
group. Select the Mark Task as Milestone check box. In the task Information
dialog box, click Advanced tab and then give the duration of the Milestone.
92
Check Your Progress 2 Computer Applications
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
2. What is a critical task in a project?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
3. What information can help me analyze my projects progress?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
4. What is the difference between Lead time and Lag time?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
This section will introduce the world of office applications that are used widely
by all of us to carry on our day to day tasks like writing a project document,
preparing our monthly budget, corresponding with each other on email or
scheduling our daily calendar.
4.4.2 Introduction
Word processing was one of the earliest applications for the personal computer in
office productivity. Although early word processors used tag-based markup for
document formatting, most modern word processors take advantage of a graphical
user interface providing some form of “What You See Is What You Get” editing.
Most are powerful systems consisting of one or more programs that can produce
any arbitrary combination of images, graphics and text, the latter handled with
type-setting capability.
93
Basics of Computer Microsoft Word is the most widely used computer word processing system;
Software
Microsoft estimates over five hundred million people use the Office suite, which
includes Word. There are also many other commercial word processing
applications, such as WordStar, WordPerfect, which dominated the market from
the mid-1980s to early-1990s, particularly for machines running Microsoft's MS-
DOS operating system. Open-source applications such as AbiWord, KWord, LyX
and OpenOffice.org Writer are rapidly gaining in popularity. Online word
processors such as Google Docs are a relatively new category.
Word processing typically implies text manipulation functions that extend beyond
a basic ability to enter and change text, such as automatic generation of:
batch mailings using a form letter template and an address database (also
called mail merging);
footnote numbering;
Other word processing functions include "spell checking" (actually checks against
wordlists), "grammar checking" (checks for what seem to be simple grammar
errors), and a "thesaurus" function (finds words with similar or opposite
meanings. Other common features include collaborative editing, comments and
annotations, support for images and diagrams and internal cross-referencing.
Text editors (modern examples of which include Notepad, BBEdit, Kate, Gedit),
were the precursors of word processors. While offering facilities for composing
and editing text, they do not format documents.
Almost all word processors enable users to employ styles, which are used to
automate consistent formatting of text body, titles, subtitles, highlighted text, and
so on.
94
4.4.3 Adding Header, Footer or Page Number to a Document Computer Applications
2. You can select from the available gallery and choose the design required.
3. After selection, the same design chosen will appear in the document.
To add a customized design for the Header or Footer, double click on the Header
or Footer area in the document. The same is opened in the design mode. After
making the required changes to the design, close the Header/Footer area.
2. On the Insert tab, in the Tables group click Table, and then choose Quick
table.
95
Basics of Computer
Software
2. On the Insert tab, in the Tables group click Table, and then under Insert Table,
select the number of rows and columns required in the table.
Table of Contents (TOC) is created by applying heading styles to the text that is
to be included in the TOC. Word will search for those headings and create the
TOC in the document. The Table of Contents can be selected from design gallery
provided in word.
3. Click the place in the document where the TOC has to be inserted.
Here it will be possible to change the heading levels, overall look of TOC etc.
97
Basics of Computer 4.4.6 Creating a memo for multiple recipients – Mail Merge
Software
You use mail merge when you want to create a set of documents, such as a form
letter that is to be sent many customers or a sheet of address labels. Each letter or
label has the same kind of information, yet the content is unique. For example, in
letters to your customers, each letter can be personalized to address each customer
by name. The unique information in each letter or label comes from entries in a
data source.
1. Set up the main document. The main document contains the text and graphics
that are the same for each version of the merged document. For example, the
return address or salutation in a form letter.
2. Connect the document to a data source. A data source is a file that contains the
information to be merged into a document. For example, the names and
addresses of the recipients of a letter.
98
3. Refine the list of recipients or items. Microsoft Office Word generates a copy Computer Applications
of the main document for each item, or record, in your data file. If your data
file is a mailing list, these items are probably recipients of your mailing. If you
want to generate copies for only certain items in your data file, you can
choose which items (records) to include.
4. Add placeholders, called mail merge fields, to the document. When you
perform the mail merge, the mail merge fields are filled with information from
your data file.
5. Preview and complete the merge. You can preview each copy of the document
before you print the whole set.
Thus, Mail Merge is used to create documents that are essentially the same but
have a few unique data elements that vary for each document.
4.5 SPREADSHEET
A Spreadsheet, as you all would know, is a grid made of columns and rows
known as cells and is used for making tables and charts used for mathematical and
statistical analysis as well as business calculations. One of the widely used
spreadsheet software is MS-Excel. A few features of MS Excel 2007 are
described below.
4.5.1 Introduction
Text or Labels
Numbers or Constants
Formulae which are mathematical equations to do all calculations
Each cell is designated with a name which is actually the COLUMN Name and
ROW NUMBER.
E.g. A2 means the cell A21 is the intersection of column A and row 2
99
Basics of Computer The following example shows the three basic types of data that a cell may have:
Software
Labels Text which simply is the column heading like cell B2, C2, C3 etc.
Values which are constant fixed numbers entries like C3, C4, D3, E4 etc
Formulas which are mathematical calculations as in the highlighted column
E8. Formula cells always begin with an EQUAL SIGN (=). It is best to use the
reference to data within the formula cells by giving the cell location. This
helps in keeping the formula unchanged even if the values change.
The spreadsheet consists of various sheets like sheet1, sheet2, sheet3 etc. within
the workbook. These sheets can be can be given meaningful names. New sheets
can be inserted and worksheets can be deleted from the workbook.
The format of the cells on the sheets can be modified using the Home->Cells-
>format->format cells option on the menu. This will give the following dialog
box which is used to format datatype of the cell, alignment, font etc.
The contents of the cells can be cut, copied and pasted using the Home-
>Clipboard options. There is an option of “Paste Special” (Home -> Clipboard->
Paste -> Paste Special) which allows only to paste certain aspects of the cells
copied to the clipboard.
100
Formulas : Only pastes the formulas from the cells on the clipboard. Computer Applications
Values : Will paste the values of the cells on the clipboard. If the cells copied
contained formulas, only the results of the formulas will be pasted.
Column Widths : Will paste only the column widths of the cells that you
copied to the clipboard.
Operations : This is useful if you want to scale a group of numbers or
add/subtract a certain amount from each. Whatever value is copied to the
clipboard, the current operation will be done using that number on the cells in
which you are pasting to.
Skip blanks : Will paste data, skipping any blank cells.
Transpose : Will transpose the data and paste it (columns to rows, rows to
columns).
It is possible to protect the cells so that the data cannot be changed or modified.
By default all cells in a worksheet have the locked property turned on (the cell is
capable of being protected). is also possible to protect worksheet or the whole
workbook using password protection.
Protecting a Worksheet
4. Click OK.
101
Basics of Computer
Software
Protecting a Workbook
1. Click Tools, click Protection, and click Protect Workbook.
4. Click OK.
There are different categories of functions that can be incorporated in the sheets
like Date & Time, Mathematical, Statistical, Logical, Text functions etc.
Text:
CONCATENATE – Joins several text items into one text item
RIGHT - Returns the rightmost characters from a text value
LEN - Returns the number of characters in a text string
EFT - Returns the leftmost characters from a text value
Logical:
IF - Specifies a logical test to perform
NOT - Reverses the logic of its argument
AND - Returns TRUE if all of its arguments are TRUE
Advanced Functions:
MATCH- Looks up values in a reference or array
INDEX - Uses an index to choose a value from a reference or array
SEARCH - Finds one text value within another (not case-sensitive)
REPLACE - Replaces characters within text
Database Functions:
DGET- Extracts from a database a single record that matches the specified criteria
DCOUNT - Counts the cells that contain numbers in a database
DSUM - Adds the numbers in the field column of records in the database that
match the criteria
DPRODUCT - Multiplies the values in a particular field of records that match the
criteria in a database
103
Basics of Computer 4.5.4 Charting
Software
Charts and Graphs can be created based on data in the sheets. To create a chart to
represent data graphically:
1. Select the data
2. Go to Insert
3. Select the chart type from the options available like Bar, Line, Pie, Scatter etc.
4. The chart will get automatically populated with the selected data on which the
chart is to be based.
4.5.5 Macros
A macro is a short program written using VBA that can be used to carry out a
specific task. VBA is the language that Excel macros are written in. It is a
programming language that is included with all of the Microsoft Office
applications e.g. Word, Access, Power Point, Excel as well as others.
VBA is a subset of Microsoft Visual Basic, an extremely popular programming
language that has been around for over 10 years. The Macro has to be recorded as
follows:
1. Go to the Tools menu, go to “macro” and then “Record New Macro”
2. Assign a name to your macro if you'd like, as well as type a short description.
3. You can also assign a keyboard shortcut to it (so you can press a sequence of
keys to run the macro).
6. Once you're done recording your macro, press the Stop button which should
now be visible on your screen.
104
Once the Macro is recorded it can be executed in the following ways: Computer Applications
Take a small example given in the table below for calculation of Salary and
Income tax deduction and compute the result in excel to give the net monthly and
annual income as shown below:
After calculation and writing the formulas in Excel 2007, we would get the
following results:
4.6 DATABASE
Database is used to organize information into data in the form of tables. For
example, a table with student’s data. Different tables are joined together on the
basis of relationships. The table and relationships together form relational
structure. Relational Structure helps in reduction of repetitive data, improves
accuracy and provides better management of data. 105
Basics of Computer 4.6.1 Introduction
Software
A Table is a database object that is used to store data about a particular subject
like employees, students or products. In a Table, the columns are called fields or
attributes and the individual records are called Tuples (rows). One of the most
important advantage of a Relational table structure is the Primary key field in
each table. A Primary key is a field or a combination of fields that make each
record in the table unique. Primary keys help in removing duplicate data and
creating relationships between different tables. Foreign Key contains values that
correspond to the primary key of another table. A table can have one or more than
one foreign key.
Every field has a datatype which indicates the type of data that filed will stores,
such as text, numbers or external files.
The most commonly used database in the industry is MS-Access. Here, we will
see how to manage a simple database in MS-Access.
2. In the File Name box, type a file name for the new database.
3. To browse to a different location to save the database, click the folder icon.
4. Click Create.
The new database opens, and a new table named Table1 is created and opens in
Datasheet view. When you create a new table in Datasheet view, Access
automatically creates a primary key for you and assigns it a field name of ID and
the AutoNumber data type.
106
4.6.3 Add Fields to the Table Computer Applications
In order to add new fields to the Table, enter into Design view, On the Home tab,
in the Views group, click View, and then click Design View. Here add the fields
and set their properties like datatype, size, default value, input mask etc. The field
which has to be made primary key is also set here.
When you create a new table in Datasheet view, Access automatically creates a
primary key for you and assigns it a field name of ID and the AutoNumber data
type. In Design view, you can change or remove the primary key, or set the
primary key for a table that doesn't already have one.
After the table is created, it is saved in the database by going to Microsoft office
button and choosing the Save option.
Once the Tables have been created, data has to be added to them.
1. Open the database to which data has to be added.
4. Add the data to the table record by record in the datasheet grid and save the
table.
The data added can also be modified also in the datasheet view mode.
107
Basics of Computer
Software
To add new fields to the table, open the table in design view mode.
1. In the Home tab, in the Views group, click View, and then click Design View.
When a new table is created, Access automatically creates a primary key and
gives a default field name ID and AutoNumber as its datatype. In Design view
mode, it is possible to change, remove or set the primary key of a Table.
108
1. Select the table for which the primary key has to be set or modified. Computer Applications
2. On the Home tab, in the Views group, click view and then select the Design
view mode.
3. In the Design grid, select the field or fields (by holding down CTRL to select
more than one field.
4. On the Design tab, in the Tools group, click Primary Key. A key indicator
appears on the left of the field or fields selected to indicate the field as
primary key.
When you create a relationship between tables, the common fields are not
required to have the same names, although it is often the case that they do. But,
the common fields must have the same data type. If the primary key field is an
AutoNumber field, however, the foreign key field can also be a Number field if
the FieldSize property of both fields is the same. For example, you can match an
AutoNumber field and a Number field if the FieldSize property of both fields is
Long Integer. When both common fields are Number fields, they must have the
same FieldSize property setting.
2. Then Choose the Table option and add the tables between which relationship
has to be created.
109
Basics of Computer
Software
3. Drag a field (typically the primary key) from one table to the common field
(the foreign key) in the other table. To drag multiple fields, press the CTRL
key, click each field, and then drag them.
6. Click Create.
Access draws a relationship line between the two tables. If the Enforce
Referential Integrity check box is selected, the line appears thicker at each end. In
addition, the number 1 appears over the thick portion on one side of the
relationship line, and the infinity symbol (∞) appears over the thick portion on the
on the other side of the line, as shown in the following screen.
110
Computer Applications
When data has to be reviewed, added, changed or deleted from the database, a
query is used. Queries are also used to answer very specific questions about the
data that would be difficult to answer directly by just looking at the table data.
Queries can be used to perform calculations on the data, to filter data and to
summarize the data.
1. On the Create tab, in the query group, click query design. A show Table
dialog box appears.
2. In the Show Table dialog box, choose the table on which query has to be
based and close the show Table dialog box.
111
Basics of Computer
Software
3. In the selected Table, double click the fields that have to be added to the query
The query will be executed and the result is displayed in the grid as shown below.
112
4.6.9 Reports Computer Applications
A Report consists of information from tables and queries that is stored with a
particular report design such as labels, headings and graphics.
1. In the Navigation pane, select the query or Table on which the report has to be
based.
Once the report is created, its layout can be modified in the Report design view.
Reports can be created using the Report wizard tool also.
4.6.9.1 A Small Example in Access 2007
T_Dept_master
Field Name Datatype
Dept_code Text
Dept_Name Text
Define Emp_Code and Dept_code as the Primary keys for the table
T_Employee_dtls and T_dept_master respectively. Then define the relationship
113
Basics of Computer between the two tables as explained above in section 5.3.7. Add data to the table
Software
and then define the following queries as explained above:
SELECT T_Employee_dtls.Emp_Name, T_Employee_dtls.Emp_Address
FROM T_Employee_dtls;
SELECT T_Employee_dtls.Emp_Name, T_Employee_dtls.Emp_Age,
T_Dept_Master.Dept_Name
FROM T_Dept_Master INNER JOIN T_Employee_dtls ON
T_Dept_Master.Dept_Code = T_Employee_dtls.Dept_Code;
Reports can be generated based on these queries or different queries can be
written to generate various reports.
4.7 E-MAIL
Emailing is one of the most important utilities in today’s world. It is used widely
and utilized by almost each and every one of us not only as professionals but also
in our personal lives. Emailing software like MS Outlook , Outlook Express etc,
not only provides emailing facility but also used for scheduling appointments,
maintaining contacts, setting task reminders, sending attachments with emails etc.
4.7.1 Introduction
Email Accounts can be from the Internet Service provider, employer, or webmail
services like yahoo, Gmail etc. Outlook doesn’t have its own accounts but uses
these email accounts. Outlook uses POP configuration to access the web based
servers for emails. Post Office Protocol (POP) is an application-layer Internet
standard protocol used by local e-mail clients to retrieve e-mail from a remote
server over a TCP/IP connection.
To send or receive email messages with Microsoft Outlook, these email account
information has to be added. Email Accounts are contained in profiles. An email
profile consists of email accounts, data files and settings as to where the emails
are to be stored. There can be one profile or more than one profile depending on
the requirement of the user. There can be one or more email accounts within a
single outlook profile.
114
4.7.2 Creating Email Accounts and Profiles Computer Applications
3. Click on Add and Type a name for the profile and then click OK
4. Add email account to use in your profile by following the directions on the
screen.
The most important feature of Email software is to send and receive emails. Once
the email account has been configured, the same can be used to send and receive
emails.
1. On the File menu, select, New ->Mail Message
3. Add the recipient’s name in the To, CC, Bcc box. Separate the names with
semicolon.
115
Basics of Computer 4. To select the recipient’s name from a address book, click the To or CC button
Software
5. The level of importance for message can also be set which appears as an
indicator by selecting High Importance or Low Importance in the Options
group in the message tab. This is only an informational flag and does not
expedite or affect actual message delivery.
It is also possible to put file attachments along with the email message or include
website links or links to documents present on a shared network.
New Contacts can be added to the Address Book. It is possible to make groups of
Contacts and create distribution lists to ease selection of contacts when sending
messages.
116
It is also possible to create a contact from an email message received. To do this: Computer Applications
1. Open or preview the email message that contains the Contact name that is to
be added to the Contact List
2. Right Click the name of the sender and then Click Add to Contacts through
the shortcut menu.
To view the activities of any day, click on Calendar in the Navigation Pane. And
then choose the date for which the activities need to be shown.
It is possible to view the activities, day wise, month wise or week wise as
required.
Right Click on the time and date the activity has to be set and choose the activity
type whether it will be an appointment, meeting or event or task.
A meeting occurs only at a schedules time and includes other people and a
meeting location. An Appointment is an activity where only one person is
involved. A task is an entry that is seen in the calendar but doesn’t need to be
scheduled for a specific time. An event is an activity that lasts all day and do not
occupy schedule time in the calendar but appear as banners on the top of the date
specified for the event like conferences, business travels, holidays etc.
117
Basics of Computer
Software
If any particular activity is occurring again and again, it can be set as a Recurring
activity using the Recurrence feature. To set up a recurrence pattern, open the
appointment and click Recurrence button in the Options group in the
Appointment tab.
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
2. What is a signature of an email message?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
3. Is it possible to get a delivery receipt from the email recipient?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
4. Which of the following entry will be best entered as an event in your
calendar?
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………..
A party that occurs from 4 pm to 6 pm
Birthday
In this unit, you have learnt about the concepts of Open Source Software. The
history and philosophy behind this concept has briefly been described. The
Licensing and copyright issues have been discussed. This is an upcoming concept
in the industry and the idea of open source software is here to stay.
You have also been introduced to one of the most important roles of Project
management which is essential for the success of any project. The different kinds
of software which are used for project management of resources, time and scope
of project have been discussed.
The essential tools of Office Applications which are used widely in the industry
have been discussed. After reading this unit, you must have become familiar with
the important features of these tools used for word processing, database
management and emailing.
Graphics – Paint.NET
FTP - Filezilla
4. The different industries where Open Source concept is being practiced are:
Digital Content: Sites such as Wikipedia and Wiktionary where the content
remains free to re-use and the source documents are readily made available to
those interested and changes are accepted back into the system.
Robotics: Here the blueprints, schematics and source code are released under
the open source model.
2. Tasks which cannot be delayed without affecting the project finish date are the
critical tasks. A Critical must be completed on schedule for the project to
finish on time. If a critical task is delayed, the project completion date might
also be delayed. A series of critical tasks makes up a project's critical path.
Work
Start date
Finish date
Cost
Variations of each of these types of fields help you compare and evaluate your
progress.
120
4. Lead time: An overlap between tasks that have a dependency. Computer Applications
Lag time: A delay between tasks that have a dependency. For example, if you
need a two-day delay between the finish of one task and the start of another,
you can establish a finish-to-start dependency and specify a two-day lag time
1. Yes, it is possible to import data from Excel workbook into Access 2010. This
can be done by copying data from an open worksheet and pasting into Access
datasheet, or by importing a worksheet into a new or existing table, or linking
the worksheet from an access database.
2. Signature is the way the senders name will appear at the end of the message.
One can create a default signature to be added to all your outgoing messages,
or you can insert a signature manually into outgoing messages on an
individual basis.
3. A delivery receipt tells you that your e-mail message was delivered to the
recipient's mailbox, but not whether the recipient has seen it or read it.
A read receipt tells you that your message has been opened. In both cases, you
receive a message notification when your message is delivered or read. The
contents of the message notifications are then automatically recorded in the
original message in your Sent Items folder.
4. Birthday’s happens all day long, and that's what an event is used to enter. The
benefit of using an event is that you can show the event at the top of that day
in the calendar. You'll remember, and the time in your calendar is still
available for you to schedule.
121
Networking
and Internet
UNIT 1 NETWORKING AND INTERNET
Structure
1.0 Introduction
1.1 Objectives
1.2 What is a Computer Network?
1.2.1 Advantages of using Computer Networks
1.2.2 The Internet
1.2.3 Data Communication System
1.3 Data Transmission Channels
1.3.1 Guided Media
1.3.2 Unguided Media
1.4 Network Topologies
1.4.1 Bus Topology
1.4.2 Ring Topology
1.4.3 Star Topology
1.5 Network Classification
1.5.1 Local Area Network (LAN)
1.5.2 Metropolitan Area Network (MAN)
1.5.3 Wide Area Network (WAN)
1.6 Reference Models
1.7 Networking Devices
1.7.1 Network Interface Card
1.7.2 Modem
!.7.3 Repeaters
1.7.4 Bridge
1.7.5 Hub
1.7.6 Switches
1.7.7 Router
1.7.8 Gateway
1.8 Internet and its Software Components
1.9 Internet Addresses
1.9.1 IP Addresses
1.9.2 DNS and Web Addresses
1.9.3 E-Mail Addresses
1.10 Summary
1.11 Answers to Check Your Progress
1.12 Further Readings
1.0 INTRODUCTION
As discussed in the previous blocks, the initial computers were designed as a machine
that could perform monotonous arithmetic calculations with ease and lot of accuracy.
The computing power of the computers kept on increasing every year while during the
same time the technologies of message transfer were advancing. During the era of
1960-70, the computers were becoming faster, cheaper but more powerful and smaller
in size. The number of application of the Computer also kept growing, however, the
main breakthrough that enhanced the use of Computer was the advent of network of
interconnected computers. The Computer Network made various computers to share The Internet
information at a very high speed.
5
Internet
Technologies In the year 1960, the Advanced Research Projects Agency (ARPA) of the U.S.
Department of Defence and researchers from Universities and research centres
developed a network called the ARPANET. The main goal of ARPANET was to
share data and processing time over a set of computers connected through telephone
lines and satellite links. This led to creation of one of most widely used network of
networks ± the Internet. The Internet could carry any digital signals such as text,
graphics, sound, video and animation. Today, Internet has thousands of networks and
millions of users, with the numbers expanding daily.
This unit introduces you to some of the basic fundamentals of Computer Networks
and the Internet.
1.1 OBJECTIVES
After going through this unit, you should be able to:
x define the basic concepts of networking;
x discuss the basic models of networks;
x explain different types of networks;
x differentiate among different networking devices;
x explain the addresses used on the Internet; and
x explain the different advantages of networks.
6
Networking
and Internet
e) Powerful communication medium: Networks make cooperation among
far-flung groups of people easy where it previously had been impossible.
In the long run, the use of networks to enhance human-to-human communication
may prove more important than technical goals such as improved reliability.
One of the most popular application of network is the World Wide Web which is an
application of Internet. Let us introduce you to internet in the next subsection.
1.2.2 The Internet
Internet is an interconnection of thousands of networks. It came into being in 1967.
Internet has a very interesting history. You can trace the evolution of Internet at the
website http://www.wikipedia.com . One of the major applications of the Internet is
the World Wide Web (WWW). Internet and WWW (World Wide Web) are often used
as synonyms of each other, which is technically not correct as the Web is a collection
of interconnected documents and other resources. WWW was started in 1989 by Sir
Tim Berners-Lee at Physics Laboratory (CERN).The WWW provides a ³point-and-
click´ interface to text, images, sound and movies that has proven to be very easy-to-
use. This feature was made avaLODEOHGXHWR+\SHUWH[WWKDWSURYLGHVD³SRLQWDQG
FOLFN´OLQNWRRWKHUGRFXPHQWVRQWKH::: To access the information on internet
you require a software called web browser. Some of the popular browser software are
- Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari etc.
The Internet is a collection of various services, tools, applications and resources.
Some of the popular services on the internet are ± browsing, searching, e-mail, chat,
e-learning and lots more. Today, Internet has brought the world on your desktop.
Right from news across the world, wealth of knowledge to shopping, purchasing the
movie, railway or air tickets everything is at your mouse click. It has also become the
most excellent business tool of modern scenario. Several activities can be performed if
you have access to the Internet; like you can use it for learning or teaching, you can be
part of an online distributed project, you can use it for publicity and advertisement,
you can refer Internet for career or job consultation and so on. Unit 2 and Unit 3
discuss some of the services tools, applications and resources available on the Internet
in more details.
Before we discuss more about Internet, first let us describe the process of data
communication system that forms the core of computer network.
1.2.3 Data Communication System
In the connected world, a computer does not work as a standalone system but as part
of a communication system. Besides computers, most of the large/complex systems
like the navigation systems for ships or aircraft or rockets, the satellites and many
other systems rely on the communication system. In the most fundamental sense,
communication involves implicitly the transmission of data or information (the
information is derived from data) from one point to another through a succession of
processes. Data is transmitted over any communications medium as either digital or
analog form. The most important factors affecting the transfer of a signal over a
medium are noise and attenuation. Noise is the external disturbances whereas
attenuation is defined as degeneration of the signal. A simple communication system
can be represented by the block diagram shown in Figure 1.1.
noise
7
Internet
Technologies The communication system essentially consists of five parts:
Source: Source produces a message or sequence of messages to be communicated to
the receiver. The source output may be in many different forms such as a waveform, a
sequence of binary digits, and a set of output from sensors in a space probe, or many
other similar forms.
An Encoder: Encoder represents any processing of the source messages/ signals prior
to transmission. The processing might include, for example, any combination of
modulation (discussed in later section), data reduction and insertion of redundancy to
combat the channel noise.
The Channel: Channel is the medium for transmitting signals from transmitter to
receiver. It may be a telephone line, a high frequency radio link, a space
communication link or a storage medium. A channel is usually subject to various
types of noise disturbances, which on telephone line, for example, might take the form
of a time-varying frequency response, crosstalk from other lines, thermal noise, and
impulsive switching noise. A channel subject to noise is called noisy channel. An
error-correcting code corrects errors due to noise.
The Decoder: A decoder represents the processing of a channel output received from
the channel to produce an accepted replica of the input at the destination.
The Destination: Destination is the receiver. It may be the person or object for whom
the message is intended.
An example of communication system: Suppose a student computer is connected
through a modem to a telephone line. If she/he wants to send a file to his/her friend
over a communication system, his/her computer is the source, the modem converts his
digital file into analog signal that can be transmitted over the telephone line to the
UHFHLYHU¶VPRGHPZKLFKDWLWVHQGFRQYHUWVWKHVLJQDOEDFNWRWKHGLJLWDOVLJQDO The
digital data then is accepted by the destination computer.
Some standard data transmission concepts are:
x The data in a communication system may be transmitted as analog or digital data
over a single path serially or number of parallel paths.
x The data can be sent asynchronously when both the source and receiver are not
following timing or synchronously when both sender and receiver agree on the
sequence of arrival of data.
x Modes of Data Transmission: There are 3 modes of data communication:
x Simplex
A B
x Half duplex
Simplex ± only from A to B
x Full duplex
A B
A B
A B
8
Networking
and Internet
Half Duplex Mode: Half duplex communications occurs when data flows in both
directions; although in only one direction at a time. An example of a half-duplex
system is a Walkie-Talkie system used a two-way radio normally by Police. You
may use the word "Over" to indicate the end of transmission, and ensure that only
one party transmits at a time. In such systems sender and receiver both transmit on
the same frequency.
Full Duplex Mode: In full duplex mode of data transmission, data is transmitted
in both the direction simultaneously. This means that both the devices in a
network can send and receive the data at the same time. It is like a two lane road
with traffic moving in both directions at the same time. In this mode signals going
in either direction share the capacity. Half of the bandwidth is used for sending
data in one direction, while the other half is used for receiving data from other
direction. An example is a telephone conversation.
x Speed of transmission: Speed of data transmission plays a major role in data
communication. How fast data can be transmitted from place to place is
sometimes called bandwidth. Bandwidth is a data transmission rate that tells the
maximum amount of information (bits/second) that can be transmitted along a
channel. It is measured in kilobits, kbps, 1,000 of bits per second, or megabits
(Mbps), millions of bits per second. Actual transfers are considerably lower
because of software and protocol overheads.
x Some Sample Transmission Speed: Dial-up modems are generally capable of a
maximum bit rate of 56 kb/s (kilobits per second) and require the full use of a
telephone line²whereas broadband technologies support at least double this
bandwidth. Broadband usually has a high rate of data transmission. In general,
any connection to the customer of 256 kb/s (0.256 Mb/s) or greater is more
concisely considered broadband Internet.
x Packet, and Circuit Switching: This terminology has started from telephone
network, where switching offices were places having switches that were used to
create connection from one source to destination. Circuit switching involves
creating a switched path for entire communication, for example, when you make a
telephone call the connection is established by switching and is available for the
whole communication. Whereas in packet switching a message is broken in small
packet which are handed over from a source to destination through many small
steps.
A Computer Network although works on the basic communication system, but is
much more than that. It is characterized by a number of tasks that are mostly
implemented with the help of networking software that takes care of addressing,
routing and reliable delivery of messages. These software are implemented as a
number of protocols which are discussed later in the Unit.
What should you know about a computer network?
A computer network requires that the computers must somehow be connected with
each other. Thus, you require a physical connection between two or more computers.
This connection may be through physical wired media or wireless medium. In
addition, it will require certain devices that will enable the connection. These
concepts are explained in brief in section 1.3 and 1.7
A related question here is: Are the computer in networks connected arbitrarily or
there exists some architecture and structure? Section 1.4 and 1.5 provide details of
some simple topological structures and network architectures for networks. It also
details the classification of networks.
Another related point is how the data will be transmitted over these connections. We
have provided some information on these points in section 1.2.3. For more details on
these topics you should refer to the further readings.
9
Internet
Technologies Finally, one of the major issues is how two computers will be able to exchange
information over the network. This will require discussion on the term protocols and
networking software. Section 1.6 and 1.8 covers some basic concepts of these. For
more details, you may refer to further readings.
b) Optical Fiber
An optical fiber consists of two concentric cylinders: an inner core surrounded by a
cladding. Both the core and the cladding are made of transparent plastic or glass
material as shown in the Figure 1.4, which transmit signals in the form of light.
Optical fiber use reflections to guide light through a channel. The density of the core
and cladding must differ sufficiently to reflect the beam of light instead of refracting.
10
Networking
and Internet
The core is used for guiding a light beam, whereas the cladding (which has a different
refractive index) acts as a reflector to prevent the light signal instead of electrons, it
does not suffer from the various noise problems associated with electromagnetic
signals. The signal is usually generated by a laser or Light Emitting Diode (LED).
Optical fibers can provide bandwidth to distance ratios in order of 100s of MHz per
kilometer. Like other cables, hundreds of optical fibers are usually housed within one
cable.
They are being increasingly used as telecommunication carriers for long distance
digital trunk lines. Current trends promise that they will replace twisted pair
residential loops in the near future.
Optical fiber
Core
Cladding
11
Internet
Technologies An increasingly-popular form of radio is cellular radio, which is currently being used
by carriers for providing mobile telephone networks. These operate in the VHF (Very
High Frequency) band and subdivide their coverage area into conceptual cells, where
each cell represents a limited area which is served by a low-power transmitter and
receiver station. As the mobile user moves from one cell area to another, its
communication is handed over from one station to another. Radio waves transmitted
by one antenna are susceptible to interference by another antenna due to its
Omni-directional property. Radio waves can be received both inside and outside the
building.
Radio waves are very useful in multicasting and hence used in AM and FM radios,
cordless phones and paging. You may be wondering about the term multicasting. If
the communication is between single source and destination then it is called unicast;
on the other hand, if one source is transmitting signal and any destination that is in the
range may be able to reach it then it is called broadcast. Multicast is when a source
transmits a signal for some specific group of destinations which may be more than
one.
Bluetooth: Bluetooth is a very popular application of short wave length radio
transmission in the frequency band of 2400 to 2480 MHz. It is a proprietary wireless
technology standard used for exchanging data over short distances in mobile phones
and other related devices. It allows wireless devices to be connected to wireless host
which may be a computer over short distances. You may have it for transferring data
between a mobile phone and a computer provided both have Bluetooth technology.
b) Microwaves
Electromagnetic waves ranging from 1 to 300 Gigahertz are called microwaves.
Microwaves are unidirectional that is the sending and receiving antennas need to be
aligned.
Microwave is by far the most widely used form of radio transmission. It operates in
the GHz range with data rates in order of hundreds of Mbps per channel.
Telecommunication carriers and TV stations are the primary users of microwave
transmission.
An important form of microwave system is a satellite system, which is essentially a
microwave system plus a large repeater in the sky as shown in Figure 1.5. The signals
transmitted by earth stations are received, amplified, and retransmitted to other earth
stations by the satellite. Like other microwave systems, the bandwidth is subdivided
into channels of 10s of MHz each, providing data rates in order of 100s of mbps.
Because of their high bandwidths, satellites are capable of supporting an enormous
number and variety of channels, including TV, telephone, and data. The satellite itself,
however, is a major investment and typically has a limited lifetime (at most a few
decades).
Unidirectional property of microwave helps in avoiding interference by a pair of
aligned antenna to another. High frequency micro waves cannot be received inside the
building.
Repeater
12
Networking
and Internet
c) Infrared
Infrared signals range between 300 Giga-Hertz to 400 Tera-Hertz. These can be used
for short range communication. High range infrared rays cannot be used for long
range communication as it cannot penetrate walls. This also helps in avoiding
interference.
Infrared signals are generated and received using optical transceivers. Infrared
systems represent a cheap alternative to most other methods, because there is no
cabling involved and the necessary equipment is relatively cheap. Data rates similar to
those of twisted pairs are easily possible. However, applications are limited because of
distance limitations (of about one kilometer). One recent use of infra-red has been for
interfacing hand-held and portable computing devices to Local Area Networks as
shown in Figure 1.6.
It cannot be used outside building as rays of sun contain infrared which leads to
interference in communication. Infrared having wide bandwidth can be used to
transmit digital data with a very high data rate. Infrared signals can be used for
communication between keyboards, mouse and printers.
LAN
Infra-red
Hand-held
Computer
Network Topology is the study of the arrangement or mapping of the elements (links,
nodes, etc.) of a network interconnection between the nodes. It also determines the
strategy for physically expanding the network, in future. Topologies can be physical
or logical. Physical Topology means the physical design of a network including the
13
Internet
Technologies devices, location and cable installation. Logical Topology refers to the fact that how
data actually transfers in a network as opposed to its design.
There are different types of the topologies like bus, ring, tree, mesh etc. However, we
will discuss only the first three to introduce you to the concepts.
1.4.1 Bus Topology
Bus topology is a single common communication to which all the computers are
connected. It has a single length of cable with a terminator at each end as shown in the
Figure 1.7. It is a passive topology which means only one computer at a time can send
a message. Hence, the number of computers attached to a bus network can
significantly affect the speed of the network. A computer must wait until the bus is
free before it can transmit. Each node is connected to others nodes. The network
operating system keeps track of a unique address of each node and manages the flow
of data between machines.
The bus topology is the simplest and most widely used with local area network design.
The computers on the bus keep on listening. When they hear data that belongs to
them, they receive. When one device on the network wants to send a broadcast
message to another device on the network, it first makes sure no one else on the bus is
transmitting, and then it sends information out on the media. All other devices on the
network see it, but only the intended recipient accepts and processes it. This is
accomplished by using data frames which contain source and destination addresses.
Advantages
a) It is simple, reliable, and easy to be used in a small sized local area network.
b) It requires least amount of cable to connect computers together and is therefore
less expensive than other cabling arrangements.
c) It is easy to implement and extend using connectors.
d) If one computer on the bus fails, it does not affect the rest of the traffic on the bus.
Disadvantages
a) In this topology, no two computers can transmit data at the same time.
b) It does not cope well with heavy load which can slow down a bus considerably.
c) Performance degrades as additional computers are added.
d) Terminators are required at both ends of the cable.
1.4.2 Ring Topology
Ring topology is also known as circular topology. This layout is similar to the linear
bus, except that the nodes are connected in a circle as shown in Figure 8. In this
topology, each node is connected to two and only two neighboring nodes. The ring
does not have an end. It is made of short segments that connect one PC to the next PC
and so on Data is accepted from one of the neighboring nodes and is transmitted
14
Networking
and Internet
onwards to another node .Therefore data travels in only direction from node to node
around the rings. Since, each computer retransmits what it receives, a ring is an active
network and is not subject to the signal loss problems. There is no termination because
there is no end to the ring.
This type of topology can be found in peer-to-peer networks, in which each machine
manages both information processing and the distribution of data files. Examples of
such topology:
1) IBM Token Ring
2) Fiber Distributed Data Interface (FDDI)
Advantages
a) It is an orderly network where every device has access to the token (control
signal) and the opportunity to transmit ± because every computer is given equal
access to the token, no computer can monopolize the network.
b) It performs better than a star topology under heavy network load.
c) It can create much larger network using Token Ring.
d) It does not require network server to manage the connectivity between the
computers.
Disadvantages
a) Network adapter cards and Multi Access Units used in this topology are much
more expensive than Ethernet cards and hubs used in bus topology.
b) It is much slower than an Ethernet network under normal load.
c) It is difficult to troubleshoot.
d) One malfunctioning node or bad port in the Multi Access Units can create
problems for the entire network
15
Internet
Technologies
Advantages
a) It is more reliable (if one connection fails, it does not affect others) ±The centre of
a star network is a good place to diagnose network faults and if one computer fails
whole network is not disturbed. Hub detects the fault and isolates the faulty
computer.
b) It is easy to replace, install or remove hosts or other devices, problem can be
easily detected-It is easier to modify or add a new computer without disturbing the
rest of the network by simply running a new line from the computer to the central
location and plugging it to the hub.
c) Use of multiple cables types in a same network with a hub.
d) It has good performance
Disadvantages
a) It is expensive to install as it requires more cable, it costs more to cable a star
network because all network cables must be pulled to one central point, requiring
more cable length than other networking topologies.
b) Central node dependency, if central hub fails, the whole network fails to operate.
c) Many star networks require a device at the central point to rebroadcast or switch
the network traffic.
16
Networking
and Internet
LAN is generally limited to specific geographical area less than 2 Km., supporting
high speed networks. A wide variety of LANs have been built and installed, but a few
types have more recently become dominant. The most widely used LAN system is the
Ethernet system based on the bus topology.
Intermediate nodes (i.e., repeaters, bridges and switches discussed in section 1.7)
allow to be connected together to from larger LANs. A LAN may also be connected to
DQRWKHU/$1RUWR:$1VDQG0$1VXVLQJD³5RXWHU´GHYLFH
In general, there are five components of a LAN:
1) Network devices such as Workstations, printers, file servers which are normally
accessed by all other computers.
2) Network Communication Devices i.e., devices such as hubs, routers, switches etc.
that are used for network connectivity.
3) Network Interface Cards (NICs) for each network device required to access the
network. It is the interface between the machine and the physical network.
4) Cable as a physical transmission medium. However, present day LAN may not
require the physical transmission media. It may be a Wireless LAN. (Please refer
to further readings for more details on wireless LANs)
5) Network Operating System ±software applications required to control the use of
network operation and administration.
Characteristics of LAN
x It connects computers in a single building, block or campus, i.e. they work in a
restricted geographical area.
x LANs are private networks, not subject to tariffs or other regulatory controls. For
the Wireless LANs there are additional regulations in several countries.
x LANs operate at relatively high speed when compared to the typical WAN (.2 to
100 MB /sec).
x There are different types of Media Access Control methods in a LAN, the
prominent ones are Bus based Ethernet, Token ring.
Advantages of LAN
x It allows sharing of expensive resources such as Laser printers, software and mass
storage devices among a number of computers.
x LAN allows for high-speed exchange of essential information.
x It contributes to increased productivity. A LAN installation should be studied
closely in the context of its proposed contribution to the long range interest of the
organization.
17
Internet
Technologies Disadvantage of LAN
Some type of security system must be implemented if it is important to protect
confidential data. The security may be further low if it is a wireless LAN.
1.5.2 Metropolitan Area Network (MAN)
Metropolitan area networks, or MANs, are large computer network that spans a
metropolitan area or campus. Its geographic scope falls between a WAN and LAN.
They typically use wireless infrastructure or Optical fiber connections to link their
sites.
A MAN is optimized for a larger geographical area than a LAN, ranging from several
blocks of buildings to entire cities. MANs can also depend on communications
channels of moderate-to-high data rates. A MAN might be owned and operated by a
single organization, but it usually will be used by many individuals and organizations.
MANs might also be owned and operated as public utilities or privately owned. They
will often provide means for internetworking of local networks. Metropolitan area
networks can span up to 50km, devices used are modem and wire/cable.
MANs provide Internet connectivity for LANs in a metropolitan region, and connect
them to wider area networks like the Internet.
1) The network size falls intermediate between LAN and WAN. A MAN typically
covers an area of between 5 and 50 km diameter. Many MANs cover an area the
size of a city, although in some cases MANs may be as small as a group of
buildings or as large as the North of Scotland.
2) A MAN often acts as a high speed network to allow sharing of regional resources.
It is also frequently used to provide a shared connection to other networks using a
link to a WAN.
Characteristics of MAN
1) It generally covers towns and cities (50 kms)
2) It is developed in 1980s.
18
Networking
and Internet
3) Communication medium used for MAN are optical fiber cables, however it may
use other media too.
4) Data rates adequate for distributed computing applications.
1.5.3 Wide Area Network (WAN)
Wide Area Network (Figure 1.12) is a network system connecting cities, countries or
continents, a network that uses routers and public communications links. The largest
and most well-known example of a WAN is the Internet.
WANs are used to connect LANs and other types of networks together, so that users
and computers in one location can communicate with users and computers in other
locations. Many WANs are built for one particular organization and are private.
Others, built by Internet service providers, provide connections from an organization's
LAN to the Internet. WANs are often built using leased lines. At each end of the
leased line, a router connects to the LAN on one side and a hub within the WAN on
the other. Leased lines can be very expensive. Instead of using leased lines, WANs
can also be built around public network or Internet.
Virtual Private Network (VPN): Consider a situation when you have a secure office
LAN which contains some important update of your company products. You are out
of the country for a business trip and want to see that information. What your
company needs is a VPN. A VPN may be defined as the secure way of connecting to
your private LAN (such as your company network) from a remote location using the
Internet or any other unsecure network. In such a case, the data that is to be
transmitted over the unsecure network is encrypted. In addition, VPNs have a proper
mechanism for authenticating the user.
Characteristics of WAN
1) It generally covers large distances (states, countries, continents).
2) Communication medium used are satellite, public telephone networks which are
connected by routers.
3) Routers forward packets from one to another on a route from the sender to the
receiver.
Table 1.1 compares the three technologies :
19
Internet
Table 1.1: Difference between LAN, WAN and MAN
Technologies
20
Networking
and Internet
layer below. For example, a layer that provides error-free communications across a
network provides the path needed by applications above it, while it calls the next
lower layer to send and receive packets that make up the contents of the path. Any two
instances at one layer are connected by a horizontal protocol connection on that layer.
The following are the layers of OSI model:
7 Application
6 Presentation Upper
Application (within a
System) Layer
5 Session
4 Transport
Network
3 Network
Lower
2 Data Link (between
Media Systems) Layer
1 Physical
In transmission side data flows from layer 7 to layer 1, then to cabling or suitable
medium. When data reaches the reception side, it flows from layer 1 to layer 7.
Application Layer: This layer is the layer for user interaction. We must have
application software for dealing with the data.
Presentation Layer: It converts the data into suitable format. It does tasks like
compression, decompression, encryption and decryption.
Session Layer: This layer manages connections between different application layers.
Transport Layer: This layer converts data into segments and re-assembles the data
stream. TCP and UDP are the protocols used in this layer. In this layer, data is
converted into so called segments.
Network Layer: This layer translates logical address into physical address. This layer
also fixes the route for data path. Router works in this layer. In this layer data is called
a packet.
Data-Link Layer: This layer provides physical identification of a device using Media
Access Control Address. It adds source and destination address to packets and convert
them into frames. This is the layer that provides error free transmission.
Physical Layer: This layer provides the functional requirements for activating a
physical link. In this layer, data is carried from one device to another.
Now, we can better understand the OSI layer with an example. Consider that you have
to send a word document to a different network or through internet. The following are
the process that will take place:
1. In the APPLICATION LAYER, the user can edit the file by using application
software like a word processor.
21
Internet
Technologies 2. In the PRESENTATION LAYER, user can compress the word file by using
WINRAR or WINZIP and convert the data into different format for example.zip
or .rar. You can also convert the word document into different formats.
3. In the SESSION LAYER, the particular file has to be integrated with browser
for attaching it to email or likewise clients.
4. In the TRANSPORT LAYER, data is converted to segments. Source IP and
destination IP are added to each packet. Frame checks and parity bits are also
added in this layer.
5. In the NETWORK LAYER, the data is handed over to a router. The router
calculates the best path for data transmission
6. In the DATA-LINK LAYER, transmission errors are handled and also flow of
data is regulated so that receivers are not swamped by fast senders.
7. In the PHYSICAL LAYER, frames are transmitted as bits through media such
as Optical fibre.
For creating a network, you need certain basic devices. This section details some of
these basic devices which are used to form a network. Network Interface cards, Hubs,
bridges, repeaters, and routers are the devices that let you connect one or more
computers to other computers, networked devices, or to other networks. Each has two
or more connectors called ports (this term presently is used in the context of
hardware) into which you plug in the cables to make the connection. Let us discuss
each of these communication devices in detail.
1.7.1 Network Interface Cards
The network interface card (NIC) provides the physical connection between the
network and the computer. Most NICs are internal, with the card fitting into an
expansion slot inside the computer. Network interface cards are a major factor in
determining the speed and performance of a network. It is a good idea to use the
fastest network card available for fast transfer of data. The most common network
interface connection today is Ethernet cards. Ethernet cards Ethernet cards that
contain connections for twisted pair cables have a RJ-45 connection. The Ethernet
card is sometimes also called as network adapter card. Each for the Ethernet card is
identified by a unique number called the Media Access Control (MAC) address. Your
mobile phone on which you use internet, generally has a MAC address.
1.7.2 Modem
Modem is an acronym for modulator demodulator. The meaning of the word
modulator is to change and the meaning of the word demodulator is to restore to an
original condition. A modem is a communication device that converts (i.e., modulates)
22
Networking
and Internet
binary signal into analog signals for transmission over telephone lines and converts
(i.e., demodulates) these analog signals back into binary form at the receiving end.
Figure 1.15 shows the data transmission through modem
Telephone
Modem Modem
Line
You can use a modem to send data and files to other computer users using standard
telephone lines. You can transfer data, exchange electronic files, and even carry on a
typed conversation in real time.
Modems are of two types: Internal and External. Internal modems are hardware cards
and External modems, are kept outside of your computer, connected either by a USB
or Serial Port. Internal modems are good for general usage, as they take up less desk
space, and do not require a power supply, and for most purposes, internal modems
work fine. External modems tend to be slightly more expensive than internal modems.
Many experts consider them superior because they contain lights which indicate how
the modem is functioning. In addition, they can easily be moved from one computer to
another. However, they do use up one COM port.
External modem
Internal modem
1.7.3 Repeaters
When a signal travels a network cable (or any other medium of transmission), they
lose strength, degrade and become distorted in a process that is called attenuation A
repeater is a device that electrically amplifies the signal it receives and re-broadcasts it
(Figure 1.17). They are used when the total length of your network cable exceeds the
standards set for the type of cable being used.
A good example of the use of repeaters would be in a local area network using a star
topology with unshielded twisted-pair cabling. If a cable is long enough, the
attenuation will finally make a signal unrecognizable by the receiver.
23
Internet
Technologies
24
Networking
and Internet
Hubs are typically used on small networks where the amount of data going across the
network is never very high. A hub is typically the least expensive, least intelligent,
and least complicated of the hub, router and switches. Every computer connected to
WKHKXE³VHHV´HYHU\WKLQJWKDWHYHU\RWher computer on the hub sees.
1.7.6 Switches
A switch does essentially what a hub does but more efficiently. By paying attention to
WKHWUDIILFWKDWFRPHVDFURVVLWLWFDQ³OHDUQ´ZKHUHSDUWLFXODUDGGUHVVHVDUH)RU
example, if it sees traffic from machine A coming in on port 2, it now knows that
machine A is connected to that port and that traffic to machine A needs to only be sent
to that port and not any of the others. The net result of using a switch over a hub is
that most of the network traffic only goes where it needs to rather than to every port.
On busy networks this can make the network significantly faster.
A switch (or Switching Hub) is a device that can segment a larger local area network
to reduce the traffic load. One should implement a switch when you have a network
with 20 or more users that have bogged down the network by excess traffic. It splits
the network into two or more segments with devices that normally talk with each
other. Conceptually ± switching takes data from one interface and delivers it to
another interface.
1.7.7 Router
A router translates information from one network to another; it is similar to an
intelligent bridge. Router selects the best path to route a message, based on the
destination address and origin. The router can direct traffic to prevent head-on
collisions, and is smart enough to know when to direct traffic along shortcuts. Routers
FDQHYHQ³OLVWHQ´WRWKHHQWLUHQHWZRUNWRGHWHUPLQHZKLFKVHFWLRQVDUHEXVLHVW²they
can then redirect data around those sections until they are removed.
If you have a LAN that you want to connect to the internet, you will need to purchase
a router. In this case, the router serves as the translator between the information on
your LAN and the internet. It also determines the best route to send the data over the
internet. Routers maintain a map of the physical networks on a Internet (network) and
forward data received from one physical network to other physical networks.
25
Internet
Technologies 1.7.8 Gateway
If you are connected to the internet, you have to enter through a Gateway. A Gateway
connects your smaller network to the internet. A gateway passes information from one
network to another network as your information travels across the internet.
Gateway Interconnects networks at higher layers than bridges or routers. A gateway
usually supports address mapping from one network to another, and may also provide
transformation of data between the environments to support end to end application
connectivity. Gateway typically limits the interconnectivity of two networks to a
subset of the application protocols supported on either one.
Routers exemplify special cases of gateways. Gateway, also called protocol
converters, can operate at any layer of the networking model. The job of a gateway is
much more complex than that of a router or a switch. Typically, a gateway must
convert one protocol into another.
The main function of a gateway is to convert protocols among communications
networks. A router by itself transfers, accepts and relays packets only across networks
using similar protocol. A gateway, on the other hand, accepts data formatted for one
protocol and convert it to data formatted for another protocol before forwarding it. A
gateway can be implemented in hardware, software or both, but they are usually
implemented by the software installed within a router. A gateway must understand the
protocols used by each network linked into the router. Gateways are slower than
bridges, switches and (non- gateway) routers.
The computers of Internet users and the computers that serve pages to users are host
nodes, while the nodes that connect the network in between are gateways. For
example, the computers that control traffic between company networks or the
computers used by internet service providers (ISPs) to connect users to the internet are
gateway nodes.
Check Your Progress 2
1) Identify the characteristics of bus, ring and star topologies and write the best
characteristic that you think while designing a topology.
««««««««««««««««««««««««««««««««
««««««««««««««««««««««««««««««««
2) Differentiate amongst LAN, MAN and WAN in terms of their coverage area.
««««««««««««««««««««««««««««««««
««««««««««««««««««««««««««««««««
3) Identify the examples of networks around you and classify them in terms of
LAN, MAN and WAN.
««««««««««««««««««««««««««««««««
««««««««««««««««««««««««««««««««
4) Differentiate between a bridge and a router.
««««««««««««««««««««««««««««««««
««««««««««««««««««««««««««««««««
5) Explain the function of hub and where should we use this communication
device?
««««««««««««««««««««««««««««««««
««««««««««««««««««««««««««««««««
6) What is the function of gateway?
««««««««««««««««««««««««««««««««
««««««««««««««««««««««««««««««««
26
Networking
and Internet
1.8 INTERNET AND ITS SOFTWARE
COMPONENTS
After through some of the basic networking concepts, let us now look into some more
concepts relating to one of the major application of networks the Internet. You have
been introduced to internet in section 1.2.2. Let us once again sketch some of the basic
points on Internet.
x Internet is a global connection of networks. But, how are these computer
connected? The Internet is basically built up of multiple smaller networks called
the subnets. Each computer systems on a subnet must have a unique address. All
these subnets are connected together with network devices called routers, and
each subnet may also contain its own subnets.
x Figure 1.22 is a top level view of the structure of the Internet as a cloud of many
routers that are connected to each other. You may be able to connect to any of the
search engines that allows you to locate information on Internet or any of the web
servers like IGNOU web server through many alternative routes. A client may be
a part of LAN, WAN or wireless network, it does not matter. Everything is almost
in the Internet cloud -why? Because all these networks use one common protocol
for reliable data transfer, so they speak common language and communicate
irrespective of physical differences. This basic communication protocol on
Internet is the Transmission Control Protocol/ Internet Protocol (TCP/IP). This
protocol ensures reliable delivery of information from one source identified by a
unique IP address to a destination also identified by a unique IP address. Please
note that the source and destination computer may either be local or remote
computer, depending on the destination location. But what are these IP addresses?
27
Internet
Technologies x TCP and IP (TCP/IP) are the two core protocols of the Internet Protocol suite. The
TCP primarily provides the reliable delivery of stream of bytes from a computer
or a program to another computer or a program. It breaks the data stream into
packets at the source and makes sure that all the packets are assembled orderly at
the destination. The IP protocol on the other hand identifies the location of source
and the destination. Any computer on Internet is identified by its unique IP
address. Currently two standard versions of IP are available viz. Internet Protocol
Version 4 (IPv4) which is currently being used on most of the Internet. An IPv4
address is a 32 bit address. IPv6 has not been discussed in this Unit.
x Using the TCP/IP as the basic protocol Internet offers many services and
application to it users like work wide web, Email, Chat, Social networking,
collaboration etc
x WWW is one of the major applications of Internet and is based on the concept of
Hypertext that is hot links to a document that may reside on any website. It is a
global infrastructure of connected documents.
x Following are some of the major Software Components required to access
Internet:
x The first software for internet access is the Operating system. An operating
system must be installed properly on your system (so that it can handle the
driver requirements of the hardware components).
x Internet Browser: Browser is software that allows the user to access and
read information on the World Wide Web. Internet Explorer, Mozilla,
Netscape are the best-known browsers. SpaceTime 3D is new three-
dimensional browser. Only browser is sufficient for working with the Internet
viz., the browser software that should be loaded on all the clients. In fact, the
browser is one of the very intelligent software that contributed to the growth
of World Wide Web. A browser converts the standard Hyper Text Markup
Language (HTML) web pages to a very sophisticated display with colours and
pictures.
x Firewall: Internet has many security problems like hacking, Trojan Horse,
Virus, etc. There are various tools to provide protection against unwanted
access of your computer by anyone else, but the most popular among all
security measures is the firewall. Firewall is software that works on some set
of rules and instructions given by you. A firewall helps to keep your computer
more secure. It restricts information that comes to your computer from other
computers, giving you more control over the data on your computer and
Firewall providing a line of defense against people or programs (including viruses and
worms) that try to connect to your computer without invitation.
x TCP/IP protocol: This is the group of protocols that define the Internet and
communication method used by it. Let us discuss it in more details :
TCP/IP Stack
TCP/IP was originally designed for the UNIX operating system; however, TCP/IP
software is now available for every major operating system. In order to be compatible
to the Internet, the computer must have TCP/IP compatible software. The major
advantage of Internet is information sharing. Since in computers, bits and bytes are
basic building blocks of information. Thus, one of the key aspects in network of many
computers is to move bits between two specific computers. For such a
communication, we require the address of the destination and a safe mean of moving
data in the form of electronic signals. As far as safe movement of data is concerned,
there exists a set of rules, which governs the sending, and receiving of data on the
Internet.
28
Networking
and Internet
A stack of protocols called TCP/IP (Transmission Control Protocol/Internet Protocol)
implements these rules. Its name reflects names of only two protocols called TCP and
IP. For sending large block of text/data to another machine, TCP divides the data into
little data packets. It also adds special information e.g., the packet position, error
correction code etc. to make sure that packets at the destination can be reassembled
correctly and without any damage to data. The role of IP here is to put destination-
addressing information on such packets. On Internet, it is not necessary that all the
packets will follow the same path from source to destination. A router tries to load
balance various paths that exist on networks. Other gateways allow different
electronic networks to talk to Internet that uses TCP/IP.
The Internet layer is an important layer in the protocol suite. At this layer, TCP/IP
supports Internet Protocol (IP). This layer is responsible for the format of datagram or
a packet as defined by IP and routing and forwarding a datagram or packet to the next
hop (hop is a term that can be used to represent any computing device on Internet like;
router, gateway, computer etc. A hop is the trip from one device to the next.) The
primary goal of the Internet is to provide an abstract view of the complexities
involved in it. Internet must appear as single network of computers. At the same time
network administrators or users must be free to choose hardware or various
internetworking technologies like Ethernet, Token ring etc. Different networking
technologies have different physical addressing mechanisms. Therefore, identifying a
computer on Internet is a challenge. To have uniform addressing for computers over
the Internet, IP defines an IP address, which is a logical address. IP address is a 32 bits
number, can be represented in decimal e.g., 192.168.32.10. Now, when a computer
wants to communicate with another computer on the Internet, it can use logical
address and is not bothered with the physical address of the destination and hence the
format and size of data packet. IP address is a basic address used by the lower
architecture of Internet. It is important for you to know that, any address you type as
web address or email address actually gets converted into the equivalent IP address of
a machine or computer where the server or resource is available. Web address or
email addresses are used for ease and convenience of human beings otherwise; it is
just a burden for network.
TCP/IP Model
Just like the OSI model, the TCP/IP model has many layers which are described
below:
Host to Host Network: In fact TCP/IP model does not specify this layer. But it
basically combines functionally of physical and data link layers. Starting at the
bottom, the Physical layer is what deals with hardware (wires, cables, satellite links,
NICs, etc.). Utilizing the existing Physical layer, TCP/IP does not define its own, thus
letting the layer be compatible with all network suites. This layer also encodes and
transmits data over network communications media in the form of bits which are
received by the Physical layer of the destination device. Often combined with this
layer is the Data link layer which is responsible for moving packets from the network
layer onto different hosts. Depending on the connection type, IP packets are
transmitted using various methods. Dial-up modems transmit IP packets using PPP
while broadband users transmit using PPoE. TCP/IP
Application
Not present
In the model
Transport
Internet
Host network
29
Internet
Technologies
Internet Layer: This layer routes and delivers data across similar networks or
completely different networks. The Network layer is responsible for end to end packet
delivery while maintaining routing, flow control, and error control functions. An
example of this layer is the Internet Protocol (IP) or the Internet Protocol Security
(IPSec).
Transport Layer: The Network layer can be thought of the actual vehicle which
transports information. This layer categorizes end to end message transmissions or
connecting applications as either Transmission Control Protocol (TCP) or User
Datagram Protocol (UDP). TCP is a connection-oriented protocol which is considered
to provide a reliable byte stream. Some characteristics of TCP are traffic congestion
control, data arrives in order, data has minimal error, and duplicate data is discarded.
The top layer of the TCP/IP model is the Application layer which is used for network
communication. Ports are used by programs to transfer data through this layer. For
example, the File Transfer Protocol uses port 21 by default while the Hypertext
Transfer Protocol uses port 80.
TCP/IP has many benefits. TCP/IP enables cross-platform networking which is useful
in this day-in-age. This suite also has superior failure recovery and the ability to add
networks without interrupting existing services. The reliability of TCP/IP is also a
huge benefit to using this protocol. The fact that if one part of the network goes down,
other parts are still able to function is what has set TCP/IP above other networking
protocols. TCP/IP is also easily expandable which allows for the unprecedented rate
of growth which the Internet possesses.
We can classify the computers connected with Internet in two categories, servers and
clients. A server is a computer with the capacity to provide connectivity and sharing to
multiple personal computers or clients (any computing device you use to access the
Internet), which is specifically set up to serve its files to client computers. The files
that a server makes available to your computer can be web pages, videos, sounds,
images, etc. A web server normally has:
x A high end computer with web server software. The three most popular web
server software are:
x Apache HTTP Server, available in public domain
x Microsoft Internet Information Services (IIS)
x Sun Java System Web Server
x A very good Internet connection speed, so that it can support multiple
simultaneous users.
x Its own URL and IP address. (What is a URL? URL - Uniform Resource Locator.
URL is theglobal address of a document or resource on the WWW)
For your home computer to be able to receive files or any data from a server, your
computer must request this information. This happens when you enter an URL in your
browser or when you receive e-mail. When we work on Internet we come across
different types of addresses used for different purposes, like; web address, IP address,
email address. Each one has a special syntax, and meaning. It is important for you to
know about these addresses, before you start working on Internet.
30
Networking
and Internet
1.9.1 IP Addresses
Figure 1.23 shows an IPv4 address:
IP address: 192.168.1.97 in various forms:
Hexadecimal C 0 A 8 0 1 6 1
Binary 1 1 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 1 0 1 1 0 0 0 0 1
IPv4 address is a series of four numbers separated by dots (.). The four numbers
ranges between 0 and 255. So IPv4 address takes only 4-bytes (or 32-bits) of
computer memory. Not all the IPv4 addresses may be used to identify a computer.
Some addresses of IPv4 are not used at all due to certain restrictions. In addition,
some addresses are reserved, for example; the IP address 255.255.255.255 is used for
broadcasts.
Every device, computer, printer or peripheral connected to a TCP/IP network must
have its own IP address. Each 32 bit IP address consists of two components:
x Network Identifier (Net ID) ± which identifies one of the Networks that is a part
of Internet.
x Device Identifier (Device ID) ± which identifies a specific device within the
identified Net-ID.
A Net ID may be of 8 to 24 bits long. By using a subnet mask in combination with
their own IP address, you can determine the destination address of the devices is
remote or local. For example, consider the IP address 192.168.1.35, having 24 bits Net
ID. The remaining 8 bits of this address specifies the device ID. The subnet mask for
this network should be 255.255.255.0. This subnet mask is used to identify the IP
address of the network.
Now, consider a situation in your office, you want to create a small network, but your
network service provider has given you only one IP address? Fortunately, there are IP
addresses that have been kept for private network. These addresses are not globally
allotted to any organisation but are addresses with in your private network. To connect
your private network to the Internet, you are required either to use a network address
translator gateway, or a proxy server. Please refer to further readings for more details
on these networks. The IP range that is allocated for such non-routable addresses are:
The subnet mask is similar to an IP address - it is also a 4-byte (or 32-bits) field and
can be represented using dot notation. In binary, it always comprise a series of ones,
followed by sequence of zeros. The total number of bits is 32, but the number of ones
and zeros determines the nature of the mask. By comparing any IP address with a
31
Internet
Technologies given mask, you can split addresses into two parts, a network ID and a device ID. The
following example explains this concept in more details.
Suppose your computer has an IP address of 193.168.1.35 and you want to access a
location 193.168.1.56, as your subnet mask is 255.255.255.0, it will give you
following answers:
Result: 193.168.1.0
Result: 193.168.1.0
Since, the Result of both the operation points to same Net ID, therefore, you can
conclude that the referred destination IP address is local.
Now, suppose your computer has an IP address of 191.168.1.35 and your NetID is 16
bit long. Suppose you want o access a location 190.168.1.35. Since, you have 16 bit
NetID, therefore, your network subnet mask will be 255.255.0.0, it will give you
following answers:
Since, the Result of both the operation points to different Net ID, therefore, you
can conclude that the referred destination IP address is remote.
By comparing the source network ID with the IP address of the source and the
network ID of the destination IP address, you can easily determine if the destination is
within the same subnet. A web page request, thus, can be identified as local page or a
page from remote server. But, how do you find the location of the remote server? The
answer to this question is beyond the scope of this unit. However, you should know
that routers may be responsible in finding the final path to the remote server.
As the numbers of users are increasing, the IPv4 addresses will run short. Therefore, a
128 bit Internet Protocol Version 6 (IPv6) was designed which is at present actively
being deployed on the Internet. This series can provide up to 3.4 X 1038 addresses. For
more details on IPv6, please refer to Further Readings.
32
Networking
and Internet
1.9.2 DNS and Web Addresses
An Internet or Web address is used to view a web page. When you are viewing a Web
page, the web address of the page appears in the Address bar in the browser. In the
previous section, you have gone through the concept of IP addresses. What do you
think about the IP address? Are they not very cumbersome to remember? For
example, to visit IGNOU website the address www.ignou.ac.in is far simpler than that
of an IP address like 190.10.10.247. Obviously, what we want to use are simpler
textual domain addresses instead of complex IP addresses. However, to enable the use
of simple textual address, you will require a service that will map these text based
names to respective IP addresses automatically. Such a service was designed in 1983
by the University of Wisconsin with the name Domain Name System (DNS).
In the present day, Internet, Domain Name System (DNS) should keep track of
address of each computer or any other internet device and email addresses. The name
servers translates the web address or email address to respective IP address. For
example, the name server translates address like www.ignou.ac.in into a computer
understandable IP address. It sounds simple, but remembers on Internet you are
dealing with million of addresses and every day this list is increasing. All these
computers have a unique address. Therefore, DNS follows a hierarchical naming
scheme that is supported by distributed database system to ensure no duplicate names
are issued at all. Figure 1.24 shows the hierarchical structure of domains names on
Internet. For example, traversing the hierarchy from the top you can track down
ignou.ac.in as:
First you can find the in (India) in the top level country domains. Within this domain
find the ac (Academic) sub domain. Please note most of the Indian Universities will
be in this sub-domain. Finally, in the ac you can find the entry for ignou. This entry
should point to the IP address for the ignou.ac.in for the WWW as well as for the mail
server. This is how the DNS finds the addresses, thus, is a very efficient system.
Thus, using the DNS you will be able to relate a given textual address to IP address.
For converting domain name into IP address, it first accepts request from programs
and other servers. After accepting the request, the name server can do the following:
x If it knows the IP address of requested domain, it will answer the request with an
IP address of the requested domain.
x If it does not know the requested domain name, it will contact another name
server and try to find the IP address.
x If the requested domain name is invalid or domain does not exist, it will return an
error message.
33
Internet
Technologies But how can you name a web page on the Internet? To answer this question you may
first identify that a web page actually is part of a website that may reside on a web
server having a unique IP address. Thus, to identify a web page you need to identify ±
x The protocol used to access that page.
x The server on which the website is located.
x The name of the page within that web site. Please note that simple web pages are
stored as files.
Please note that a web page may be stored as a single or multiple files.
Thus, to identify a web page you will have an address like:
http://www.ignou.ac.in/students/result.html
x the address as above recognises the protocol http (Hyper Text Transfer Protocol)
to access the page,
x the www.ignou.ac.in identifies the DNS name of IGNOUs WWW server, and
x the name of the page accessed by you is result.html which resides in the students
folder within the website.
This address is called the URL. URL stands for Uniform Resource Locater.
You can now clearly see that a URL consists of three parts ± the first part is used to
tell the browser what kind of server it will connect to. In the example above, the
browser will connect to a web server using Hypertext Transfer Protocol (HTTP).
Other protocols that we can use in this field of an URL are FTP, smtp etc. the protocol
is alwa\VIROORZHGE\³://´
The second part of an URL is a fully Qualified Domain Name (www.ignou.ac.in). In
The range of Well an URL, the fully qualified domain name identifies the site running the server. Web
Known Ports is in servers use port 80 by default, but some servers has been set up to use other ports. For
between 0±65535 this, a URL can contain a port number following the domain name and separated from
it by a colon (www.ignou.ac.in:80), it is optional to write a port number with domain
name. If the URL contains no port number, the default port is used.
The first two parts of an URL are used to identify the web server of the website. Each
web server has a home page and a directory to store the entire document related to the
web page like images, audio, video files.
The third component of URL is an optional pathname for a particular document itself.
For example, the address http://www.ignou.ac.in/students/result.html specifies the file
result.html i.e., in the directory students (/students/result.html) in the specified web
server.
But how does this information exchange between the web client and web server is
achieved? This whole communication is managed by a protocol called the Hyper Text
Transfer Protocol (HTTP). However, the only protocol that works on Internet as told
to you in the previous section was TCP/IP. So what is this HTTP? Please note HTTP
can work only over a connection that is managed by TCP. Thus, it is a higher level
URL - Uniform protocol that uses the services of TCP.
Resource Locator ± HTTP specifies the list of actions that lead to transfer of a requested information
identifies the
exchange between a web client and web server. Whenever you wish to visit a web
GLOBAL address of
a document or page on the internet, you request that page from a web server. When you type a URL
into your browser (for example, "http://www.abc.com/"), your web browser requests
the page (or file) named index.html from the web server and the web server sends the
page back to the web browser. Let us identify these steps in more details:
1) As a first step you may put a URL like http://www.abc.com/index.html or
equivalent Domain name www.abc.com as the address of the website that you
want to access through your web browser.
34
Networking
and Internet
2) The Web browser tries to resolve the IP address of the website www.abc.com by
the information available in its own cache memory. If web server does not have
the information about IP address stored in its cache, it requests the IP address
from Domain Name System (DNS) servers. The DNS server tells the browser
about the IP address of the website.
3) Once the web browser knows the IP address of the website, it then requests the
web page (index.html page which is the home page in the present example) from
the web server.
4) The web server responds by sending back the requested web page. If the requested
page does not exist then it will send back the appropriate error message.
5) Your web browser receives the page from the web server and displays it as per the
display requirements of the web page.
1.5.3 E-mail Addresses
As you have studied earlier that e-mail is one of the popular services increasingly
being used by people in their daily life. The following can be a typical email address
format on Internet for any e-mail service provider like, Gmail, Rediff, Yahoo, MSN,
or any network (domain) name etc.
username@subdomain.domain
The username in general is the name assigned or chosen during creation of an email
account. Sub-domain are domain we have already discussed in above section, in case
of private service provider it is generally its own name like abc@yahoo.com,
abc@yahoo.co.in, abc@gmail.com, etc. On the Internet you can see both kind of
domains non-Geographic and geographic domains. Lets take an example to better
understand an e-mail address: In an e-mail address ³naveen@ignou.ac.in´, naveen
indicates the username, the sub-domain named IGNOU (Indira Gandhi National Open
University) which is an academic organisation (.ac) and is situated in country India
(.in).
35
Internet
Technologies
1.10 SUMMARY
This unit is an effort to answer some of the very basic questions about the data
communications, networking and the Internet. The Unit first defines the term
networks, while discussing its advantages and disadvantages. It also defines the term
Internet. Some of the basic terminology of data communications like modes of
transmission, speed of transmission, packet etc has also been defined. To
communicate data, you require some channel. This unit provides details on the Guided
and unguided data transmission channels. Network topologies define the basic
structure of the network. Three basic network topologies ± bus, ring and star have
been defined in this Unit. The networks can also be classified on the basis of their
characteristics. LANs are the networks that cover a range of few Kilometers whereas
MANs cover a range of about 50 Kilometers. The WANs have the largest range. On
the other hand, the speed of transmission of data decreases from LAN to WAN as you
can employ better, faster but costlier technology at short distances. The unit also
covers the reference models that may define the networking software. In addition, the
unit discusses about some of the basic devices used in Computer Network. These
devices are - Network Interface Card, Modem, Repeaters, Bridge, Hub, Switches,
Router and Gateway. The Unit also explains the IP addresses, DNS and email based
addresses. One of the most important addresses for Internet user is Uniform Resource
Locator that uniquely identifies a document or resource on the Internet. Networking
and Internet is a very dynamic area and newer technologies emerge very fast in this
area. Therefore, you must update yourself on various newer concepts on these topics
from the further readings.
36
Networking
and Internet
3. LAN ± Network in a University, Small office, Internet Cafes
MAN ± Cable TV network
WAN ± Internet, VPN etc.
4. A bridge connects several LANs. A bridge can also divide a network to isolate
traffic or problems. Bridge Interconnects LAN segments at the network
interface layer level and forwards frames between them.
A router translates information from one network to anther; it is more intelligent
than a bridge. Routers select the best path to route a message, based on the
destination address and origin. In contrast to bridges few of the large routers
may include programs for their operations.
5. A hub is the simplest of connection devices. Any data packet coming from one
port is sent to all other ports. It is then up to the receiving computer to decide if
the packet is for it. A hub is typically the least expensive, least intelligent, and
least amount of date going across the network is network is never very high.
6. Gateway Interconnects networks at higher layers than bridges or routers. A
gateway usually supports address mapping from one network to another, and
may also provide transformation of the data between the environments to
support end-to-end application connectivity. The main functionality of a
gateway is to convert protocols among communications networks. A gateway
on the other hand can accept a packet formatted for one protocol and convert it
to packet formatted for another protocol before forwarding it. Gateways work
on all seven OSI layers.
Check Your Progress 3
1) Today you can avail the facilities of e-mail; messenger services, Chatting etc.,
to share your ideas, knowledge, and feeling. You can join different groups,
discussion forums or create your own blogs. You can use websites to broadcast
huge amount of information on Internet.
2) Firewall is software that works on some set of rules and instructions given by
you. A firewall helps to keep your computer more secure and protect from many
security problems like; hacking, Trojan Horse, Virus, etc. It restricts
information that comes to your computer from other computers, giving you
more control over the data on your computer and providing a line of defense
against people or programs (including viruses and worms) that try to connect to
your computer without invitation.
3) A stack of protocols called TCP/IP (Transmission Control Protocol/Internet
Protocol) implements different rules to handle the data communication from
source machine to destination machine. For sending a message from source
machine to destination machine, TCP divides the message data into little data
packets. It also adds special information e.g., the packet position, error
correction code etc., to make sure that packets at the destination can be
reassembled correctly and without any damage to data. The role of IP here is to
put destination-addressing information on such packets. On Internet it is not
necessary that all the packets will follow the same path from source to
destination A special machine called routers tries to, load balance various paths
that exist on networks. Other special machine called gateways allows different
electronic networks to talk to Internet that uses TCP/IP.
4) A URL is a unique identifier for a resource on Internet.
5) DNS is responsible for Web addresses to IP address; IPv4 address is a 32 bit
address of a host on Internet. Subnet mast separates Network ID and Machine
ID.
37
Internet
Technologies
1.12 FURTHER READINGS
References websites
x http://www.brainbell.com/tutorials/Networking/
x http://www.networktutorials.info/
x http:// www.nethistory.info/
x http://en.wikipedia.org/wiki/Modem
x http://en.kioskea.net/contens/transmission/transmode.php3
x http://brainbell.com
x http://eiu.edu
x http://neiu.edu
x http://public.pacbell.net/faq/general_faq.html
x www.unf.edu/library/guides/search.html
x www.lib.berkeley.edu/TeachingLib/guides/Internet/SearchEngines.html
x www.sc.edu/beaufort/library/pages/bones/lesson7.shtml
x http://mail.google.com/support/?hl=en
x http://help.yahoo.com/l/us/yahoo/messenger/messenger8/index.html
x http://en.wikipedia.org/wiki/wiki
38
345674658))
*4)+,67,-6.)
/031)2)345)*66738*13+09)3)
9)57:;5:76) ) ) ) ) ) ) )))))))
<=>? @ABCDEFGBHDA
<=I? JKLMGBHNMO
<=<? PCDQOHAR
<=<=I STUBHOPCDQOMCV
<=<=< WDQEDMOPCDQOMCQDCXV
<=<=1 WDQGDYYFAHGUBHDABUXMOZ[UGMKMBQMMAQMKOMCNMCUAESMKKCDQOMCV
<=<=\ ]PCHM^WHOBDC_D^SMKKCDQOMC
<=<=`? PCDQOMCaMGFCHB_
<=1 aMUCGTHAR
<=\ bYUH[
<=\=I WHOBDC_D^bcYUH[
<=\=< WDQBDGCMUBMbYUH[]GGDFABV
<=` dTUB
<=e aMGFCHB_BTCMUBODA@ABMCAMB
<=f aFYYUC_
<=g ]AOQMCOBDdTMGXhDFCiCDRCMOO
<=2 jFCBTMCkMUEHARO
2lm)))301n+o/813+0)
)
@ABTMZCMNHDFOFAHBp_DFTUNMRDAMBTCDFRTBTMGDAGMZBOCM[UBHARBDAMBQDCXHARUAE
@ABMCAMB=qTM@ABMCAMBHOBTMAMBQDCXD^AMBQDCXOUAEHOFOME^DCYUA_UZZ[HGUBHDAO=
@ABMCAMBU[[DQO_DFBDOTUCMCMODFCGMOUAEUZZ[HGUBHDAOQHBTMUOM=qTM@ABMCAMBFOMO
qdir@iUOHBOKUOHGZCDBDGD[DAQTHGTYUA_YDCMUZZ[HGUBHDA[MNM[ZCDBDGD[OTUNM
KMMAEMNM[DZME=qTM@ABMCAMBGUAGUCC_UA_EHRHBU[OHRAU[OOFGTUOBMsBpRCUZTHGOp
ODFAEpNHEMDUAEUAHYUBHDA=qDEU_p@ABMCAMBTUOBTDFOUAEOD^AMBQDCXOUAEYH[[HDAO
D^FOMCOpFOHARYUA_OMCNHGMO=
tOMOD^@ABMCAMBBMGTAD[DRHMOTUNMKMGDYMGDYYDAZ[UGMHACMGMABBHYMO=aHAGMpBTM
UENMABD^uDOUHGPCDQOMCHAI221pBTMZDZF[UCHB_D^QMKUAEHBOFOMCORCMQNMC_^UOB=
qTMQMKUZZ[HGUBHDAEFCHARBTHOMCUZCHYUCH[_QUABMEBDZCDNHEMHA^DCYUBHDAUKDFB
NUCHDFODCRUAHvUBHDAOUAEODYMKUOHGHABMCUGBHDAQHBTBTMG[HMABM[M=bNMAHABTHOBHYM
ODYMD^YULDCFOURMOD^@ABMCAMBQMCMBDKCDQOMUAEOMUCGTBTMHA^DCYUBHDAUAE
GDYYFAHGUBHDABTCDFRTMYUH[O=aHAGMp<>>1BTMCMHOUOTH^BHA^DGFOHAFOMD^SMK
BMGTAD[DRHMO=qTMSMKTUOADQKMGDYMUZ[UB^DCY^DCGD[[UKDCUBHNMpGDYYFAHB_
ECHNMAUZZ[HGUBHDAO=qTHO^DCYD^SMKUBZCMOMABHOGU[[MESMK<=>=qTMCMUCMDBTMC
YDCMOBCFGBFCME^DCYOD^QMKDCRUAHvUBHDABTUBHOUBZCMOMABZDZF[UCAUYMESMK1=>
UAEKM_DAE=WDQMNMCpBTUBHOKM_DAEBTMOGDZMD^BTHOP[DGX=
qTHOFAHBHABCDEFGMO_DFBDODYMD^BTMKUOHGUZZ[HGUBHDAOD^BTM@ABMCAMBBTUBTUNM
KMGDYMZUCBD^EUH[_CDFBHAMUZZ[HGUBHDAD^UA_@ABMCAMBFOMCOpQTMCMUOpBTMAMsBFAHB
QH[[^DGFODAODYMD^BTMUZZ[HGUBHDAOCM[UBHARBDSMK<=>=SMQH[[EHOGFOOUKDFB
KCDQOHARpMYUH[HARpOMUCGTHARUAEGTUBBHARHABTHOFAHB=@^_DFUCMFOHARSDC[ESHEM
SMKDA@ABMCAMBBTMA_DFUCMMOOMABHU[[_EDHARBTMKCDQOHAR=hDFYU_AMMEBDOMUCGT
BTMAMB^DCCM[MNUABHA^DCYUBHDA=aDYMBHYMOp_DFYU_[HXMBDOMAEYMOOURMOBD_DFC
^CHMAEOMHBTMCD^^[HAMDCDA[HAMUAETMAGM_DFQH[[AMMEMYUH[DCGTUB=
12
34567465(9*4+6,5-((
./012345963758((
9:;<=>?@A>;B=?C>B;B@DCA@;EF?CDB?CGHI<JIG<;?K
LM<NOGJ@A;B<;<=PI=?QD@A>JAHO<=:?=PI=?QD@A>?A;B<RA;<=A<;S
LM<NOGJ@A;B<=?G<?:D<J=TB<A>@A<DS
LM@H<A;@:FJAHCD<;B<IJD@T:<J;C=<D?:<PJ@GD<=U@T<DS
LM@H<A;@:FJAHCD<IJD@TP?H<GD?:TBJ;SJAH
LMJOO=<T@J;<;B<UJ=@?CDD<TC=@;F@DDC<D?A;B<RA;<=A<;V
./.13W2X83YZ(
(
[=?QD@A>JGD?TJGG<H\C=:@A>;B<O=?T<DD?:G??]@A>@A;?;B<@A:?=PJ;@?AJUJ@GJIG<@A
;B<Q<IV^A<?:;B<O=<T?AH@;@?AD:?=I=?QD@A>@D;BJ;F?CDB?CGHI<T?AA<T;<H;?;B<
RA;<=A<;V_?=T?AA<T;@A>;?RA;<=A<;F?CDB?CGHBJU<JARA;<=A<;JTT?CA;Q@;BJD<=U@T<
O=?U@H<=`G@]<abcdE[\cdeJAHF?CBJU<H?A<;B<T?AA<T;@?AD<;;@A>D?AF?C=
T?POC;<==<GJ;@A>;?;BJ;JTT?CA;V
f+5ghg5ij\<;COJT?AA<T;@?A;?RA;<=A<;?AF?C=k?POC;<=V9D]:?=;B<=<G<UJA;
D<;;@A>DV
(
././0( Xlm5(g-(37*n-67o(
9p<II=?QD<=q@DD?:;QJ=<JOOG@TJ;@?A;BJ;<AJIG<DF?C;?:@AHE=<;=@<U<EJAHH@DOGJF
@A:?=PJ;@?AJUJ@GJIG<?A;B<p?=GHp@H<p<I`pppeV[=?QD<=JGD?JGG?QDF?C;?
;=JU<=D<@A:?=PJ;@?A=<D?C=T<D?A;B<pppV9DF?C]A?Q;BJ;;B<@A:?=PJ;@?A?A
;B<p<I@D?=>JA@r<HJAH:?=PJ;;<HCD@A>;J>D?:JaJ=]COGJA>CJ><TJGG<HsFO<=;<N;
aJ=]COdJA>CJ><?=t6uvV9Q<II=?QD<=@DT?AU<=;D;B<sbad;J>DJAH;B<@=
T?A;<A;@A;?J:?=PJ;;<HH@DOGJF?:@A:?=PJ;@?AVbBCDEJQ<II=?QD<=JGG?QDF?C;?
D<<;B<=@TBQ<IT?A;<A;D:=?PJQ<ID@;<V\?P<?:;B<O?OCGJ=Q<II=?QD<=DJ=<w
34567465(5x,y*767z(u*{gyym(|g76}*xz(f,,y6(8m}m7gz(Z**~y6(9l7*6z(m4(2,67m/(
(
(
bFO<D?:D<=U<=DJ=< ( -67(5i,6-(m(Wv(g4(
X6(-67h67z ( 5l6(m77*6n-
--(m7(*}(m(
67(
9OOG@TJ;@?AD<=U<=E (
_bD<=U<=EaJ@G
D<=U<=E_@G<D<=U<=E
(
=@A;D<=U<=Eb<=P@AJG ( 6l6(37*n-67(
D<=U<= ( W6+6gh6-(m4(
(g-,ymi-(X6(,m~6-(
( MM
( M
( |g~76(./0(j(6l6(37*n-g4~(
(
././.((t*n(*6-(37*n-67(n*7o((
RA;<=A<;@DTBJ=JT;<=@r<HIF;B<kG@<A;\<=U<=k?POC;@A>;BJ;T?AD@D;D?:;B=<<IJD@T
+*,*4645-j(
LMbB<X6(+yg645(QB@TBPJFI<;B<n6(7*n-67
LMbB<n6(-67h67;BJ;D<=U@T<D;B<=<
C<D;?:;B<Q<ITG@<A;SJAH(
LMbB<465n*7;BJ;T?AA<T;D;B<TG@<A;JAH;B<D<=U<=D;B=?C>BJA<;Q?=]DCTBJD
d9cEp9c?=;B<RA;<=A<;V(
12
345674658))
/01234567897897:01;6<907=2<>227<524?927<67@<52A21B21C676DD?946<907?2B2? *4)+,67,-6.)
D10<040?EFD21G23<H167A:21I10<040?JKLLMN9AOA2@PL59AD10<040?OA2A<52A21B942A
0:LQMRSM:0140;;O7946<9070:12?96=?297:01;6<9070B21<52S7<2172<PK0>2B21C
KLLM9A70<AO9<6=?2:016??T97@A0:6DD?946<907A2AD2496??F<56<12UO912A?61826;0O7<
0:@6<6<167A:2197126?<9;2C:01236;D?2CV09420B21SMJV0SMN6DD?946<907>5945
12UO912A126?<9;2<167A:210:B0942@6<6P/01AO456DD?946<907AC@9::2127<6DD?946<907
?2B2?D10<040?A56B2=227@2A9872@C:01236;D?2C:01V0SM6D10<040?76;2@W26?X
<9;2L167AD01<D10<040?JWLMN56A=227@2A9872@PYO45D10<040?A97A<26@0:12?96=?2
LQM;6F1O70B21O712?96=?2ZA21[6<6816;M10<040?JZ[MN
L52KLLMD10<040?6??0>AOA<06442AA6.6\)]^_6=F6>2=4?927<1O779786
=10>A21P`a2=D6829A6@04O;27<0112A0O1420:97:01;6<907<56<;6F=26B69?6=?2
076a2=Y21B21P
bcbcd)))efghifjjklminomflhonpqrhstniqhuqogqqlhgquhrqvwqvhnlxhyquhuvfgrqvz
`AA<6<2@261?921C6>2==10>A219A676DD?946<907<56<6??0>AF0O<097<2164<
>9<5B6190OA>2=A9<2A07<52S7<2172<P{0O4671O76=10>A21:10;F0O1
a97@0>A[2AT<0DP/98O12|P|67@/98O12|P}A50>AA0;20:<529;D01<67<
97<2164<907AR@9AD?6FA<56<6126B69?6=?2076=10>A21>97@0>~
¤¢¢ ¨¢¦
¥¦§ ¥© ¥¦
)))))) ¡¢£
¥ªª
-_76)bcb) -56)-4)34567465)]767)
12
34567465(9*4+6,5-((
~\|}\
|}~\
}\
}\ (\
( ( \}\ \}\
./0176(234(56789:;<=(>6?(-/56(/4(@*A/BBC(./76D*E(
FGHIJKLJMNHIOPIQRSGQTPMQUJQKPVJMJIRPJHSNPIQRMWGTPPQRMIMSMKQXXQYMZ
(
[\ ]C+^_.*7>C7`(]155*4-ZaSNbGTPPQRNSRGJTMJLGccQTKQHdQIRdGSNbPQPVJ
OHJeIQTMXceIMIPJLYJGOSdJYVJHJSMPVJfQHYSHLGTPPQRIMTMJLPQeIMIPPVJRJgP
OSdJhIKcQTSHJRQPQRPVJUQMPHJNJRPOSdJeIMIPJLGccQTiPVIMUScVSOOJR
YVJRcQTVSeJOHJMMJLPVJGSNbGTPPQRSPXJSMPQRNJjk
[\ lC?ZmPSXXQYMcQTPQeIJYUTXPIOXJYJGOSdJMIRPVJMSUJGHQYMJHYIPVQTP
QOJRIRdSRJYGHQYMJHMJMMIQRk
[\ n``76--(?C7ZFXMQbRQYRSMopqaSHIMSOXSNJYVJHJcQTNSRPcOJPVJYJG
OSdJSLLHJMMPVSPcQTYSRPPQHJPHIJeJKHQUPVJYJGSLLHJMMkmPSXMQLIMOXScMPVJ
SLLHJMMQKPVJYJGOdJNTHHJRPXcGJIRdeIMIPJLGccQTk
[\ r6+645(s/-5*7tZuVIMMVQYMPVJXIRbMPQPVJYJGOSdJMOHJeIQTMXceIMIPJLGc
cQTk
[\ r6D76-vZuVIMIMSXMQNSXXJLSMHJXQSLGTPPQRkmPHJXQSLMPVJNTHHJRPYJGOSdJk
[\ w5*,ZmPNSRNJXMXQSLIRdQKPVJNTHHJRPYJGOSdJkuVIMGTPPQRIMTMJLYVJRPVJ
OSdJIMIRPVJXQSLIRdMPSPJk
[\ s*x6ZuVIMGTPPQRYIXXGHIRdcQTGSNbPQPVJVQUJOSdJQKcQTHYJGMIPJk
yQUJOSdJIMPVJKIHMPOSdJQKSRcYJGMIPJk
[\ w6C7+vz{JSHNVGQgSXXQYMSRcPJHUPQGJMJSHNVJLGcPVJMJSHNVJRdIRJKHQU
PVJYJGkmPNSRSXMQTMJLKQHMJSHNVIRdNQRPJRPMKHQUPVJYJGMIPJeIMIPIRdk
12
345674658))
/0123456371826019::;1<<4=9>1?<861@=4;1A9B7C1@DEEFGHHIIIJKLMNOJPQJKM82601 *4)+,67,-6.)
9::;1<<?9;4=345;>1??;4><1;@601>1??;4><1;71;=4;B<601=4CC4>82R9S6842<T
UV W45;>1??;4><1;X24><6096345>926649SS1<<9>1?<861Y0667TZZ82:8S961<
6096[\]56@>01;18<608<>1?<861^_01>1??;4><1;;1`51<6<601219;1<6abcd-4)
4dc6)efe56c)gahij)e67,67)64;1<4Ck1601lm9::;1<<4=60182612:1:>1?<861
IIIJKLMNOJPQJKM
UV _0129B1<1;k1;B9369X160101C74=4601;29B1<1;k1;<82S9<1868<2469?C164
;1<4Ck1601lm9::;1<<@4601;>8<186>8CCR121;961921;;4;B1<<9R1\
UV n<<5B82R6096601;18<92126;3=4;601>1?<861@60129B1<1;k1;>8CC;165;2601
;1<4Ck1:lm9::;1<<4=601/1?<1;k1;4=601>1?<861DEEFGHHIIIJKLMNOJPQJKM
UV _01?;4><1;6012;1`51<6<_omZlm7;464S4C641<69?C8<09S4221S6842>860601
>1?<1;k1;>04<1lm9::;1<<09<?112;1<4Ck1:826017;1k845<<61792:R16601
04B179R14=601>1?<861YR121;9CC329B1:9<82:1A\06BC[\l29::86842@64601
p_qr61A6=8C1@601?;4><1;B939C<4;1`51<6:4>2C49:4=601;1C961:8B9R1
=8C1<@95:84=8C1<@k8:14=8C1<@sqr=8C1<@tC9<0=8C1<@u9k9977C16<16S\>860
p371;61A6q9;X57r92R59R1Yp_qr[\
UV n>1??;4><1;6012;1S18k1<>1?79R192:;1C961:=8C1<=;4B601<1;k1;6012
:8<7C93<601>1?79R19<:1<8;1:\
/012601:1<8;1:>1?79R1C49:<8264345;?;4><1;345>8CC<1160161A6S4B1<82@601
78S65;1<9;;8k1<@601928B96842R16<C49:1:92:<442\W45>8CC2468S16096<4B161A68<
52:1;C821:92:82:8==1;126S4C45;v 868<wfx6756y6@8=345C82XB5C68B1:891C1B126<
C8X1R;9708S<@<452:@92:k8:146012868<S9CC1:zfx67c6{-d|)_01S426126<4=601<1
C82X<9;104<61:42<4B1>1?<1;k1;\_01<1C82X<9;1S9CC1:wfx67}-4~e\<59CC3@?3
SC8SX82R0371;C82X345>8CCB4k1=;4B421C4S9684264924601;C4S96842>86082601
<9B1:4S5B1264;82924601;:4S5B1264;<4B14601;>1?<861\_08<7;4S1<<4=
SC8SX82R0371;61A6C82X<@C49:82R42179R19=61;924601;@8<S9CC1:7b.e-44;
e7-4)5w6).6\
l2601S5;;12668B1<@/1?];4><1;<9;1B4<65<1;
=;812:C392:1<<12689C61S024C4R3
644C=4;<5;=82R6018261;216\/1??;4><1;<01C734564k81>S426126<4=:8==1;126=8C1
=4;B96<@8261;9S6>8604601;>1?<861<@92:82S4;74;961977;47;896161S024C4R364k81>
4;:4>2C49:4;57C49:B5C68
B1:89S42612692:<6;19B82RB5C68
B1:89\/1??;4><1;<
9C<47;4k8:1=52S6842<C8X1?C4SX82R4=52>9261:747
579:k1;68<1B126<<73>9;1<
92:708<082RY7C19<1;1=1;64;1=1;12S1<=4;B4;1:1698C<42601<161;B<[\_0137;4k8:1
601S42k12812S14=69??1:?;4><82R92:S4B1>8609:k92S1:=1965;1<C8X19564
=8CC
92:79<<>4;:92::4>2C49:B929R1;<\/1??;4><1;<4=64:939;1=5CC
=C1:R1:
7;4R;9B<S979?C14=5<82R=53C4R8S64<1C1S6B4<6977;47;8961S42612692:01C7345
64?;4><1<9=1C3\
|| *)7-6)z-e5b7f)b)6)7b.e67))
l2601}d56)e9k9;81634=61S024C4R81<C98:601=452:96842=4;/4;C:/8:1/1?
?38;_8B]1;21;<
r11\W45B936;9S160108<64;34=601/// 92:/1?];4><1;
=;4B601>1?<861DEEFGHHIIIJIKKFKPJNL\4B1X1374826<4=60108<64;39;1
08R0C8R061:?1C4>T
UV _01=8;<6R;9708S9C>1??;4><1;<>08S0C1:641A7C4<8424=>1?5<9R1>9<
:1k1C471:822?352:1;601C19:1;<0874=q9;Sn2:;11<<12\_01?;4><1;
>9<29B1:onq4<98S\
UV 16<S9719k8R964;>9<601=8;<6k1;37475C9;?;4><1;821\l69SS45261:=4;
4=9CC>1?5<19686<719X\
12
23456354'893*5+4,'' -. /0123435678692896:;<=3292>?4=?@81A9B08CDDEFGA9@4?H9356A044356>?29
<9?I9B08JKKJ?6DELF78692896:;<=329204389356A9<3<@=?2M23>4924F
-. N<92?>?446?269B08CDDOF7604<294986=P389356A9<3<@=?2M23>492438?
Q3M0=9<A389F
-. R02953;A?49S3=S9B523QT9641?<9F76>?429=9?49B08JKK1F7604389356A9
<3<@=?2M23>4924F
-. U<<=9V?5?20>?4B9S9=3<9B08JKKWF76046A9Q?08M23>492@49B08U<<=9
Q?1A0894F
-. X33H=9YA23Q9>?429=9?49B08V9<69QM92ZJKK[F7604?=43M913Q08H<3<@=?2F
\]+5,'9^'_69`,56,
ab35'c9d5'_69`,56,eGA908060?=M23>4924>929=089Q3B969;6M23>4924FGA949
M23>4924>92940Q<=9?8B@49B63B04<=?P69;6=089MP=089FGA9P@49B63<23S0B9
13QQ?8B=089086925?19636A9@49238?=94443<A04601?69B13Q<@6924?8B692Q08?=4F
GA949M23>4924<23S0B9B5?46?1194463>9M40694?46A9PB04<=?P9B38=P6A969;6<?26F
fP8;04?=089Q3B9M23>492F
g6h+ib*hj'k,56'23456^h*5'lh,5d'_69`,56,eGA949M23>49242@8@8B92H2?<A01@492
086925?194P469Q44@1A?4m08B3>4Z/?108634A961FUH2?<A01?=M23>492Z08?BB06038
6369;61?8A?8B=90Q?H94Z?@B03ZS0B93?8B?80Q?6038FGA949M23>4924?29S92P9?4P
63@49no3@p@46899B?<3086?8B1=01IB9S019=0I9Q3@49FGA9PA?S9H33BB04<=?P
59?6@294F
qhrh'53hlj5d'`5l'l69`,56,eGA949M23>4924081=@B9?s?S?t@860Q9:8S0238Q986
6A?64@<<326s?S?<23H2?QQ08H=?8H@?H9FGA949M23>49241?8BP8?Q01?==P=3?Bp?S?
?<<=96523Q >9M492S9263>9M1=0986FGA949M23>4924?29<326?M=9Z9;69840M=9?8B
491@29Fuvwxwyz{|}wx~xzzxwz}wx
~w
xxF76043<9843@2194356>?29
>20669813Q<=969=P08p?S?F
_69`,56'5*6b4]'''
mmm 04@49B532Q?8P?<<=01?6038463B?P081=@B08H?8I08HZ29492S?6038Z62?B08HZ
913QQ9819?8BQ?8P4@1A?<<=01?60384>A01A29@029491@206P?8B13850B9860?=06P35
=9?49Q?I94@29>A0=9 B?6?F3>9S92ZGG>?4836?491@29<236313=FGA@4Z?491@29GG<236313=>?4
=3HH08H0863P3@2?8I B9S9=3<9B532?<<=01?603846A?629@029B491@2913QQ@801?60381A?889=3S92?8
?113@866A?6>9MM23>492
4A3>4A66<4329=496A929 @8491@29B896>32IFGA04041?==9BGGV91@29?8BQ346356A913869Q<32?2P
Q?PM9?1A?81935=9?I35 M23>49244@<<3266A04GGV<236313=FGA@4Z05P3@?29M23>408H?491@29>9M4069
P3@2=3H0808532Q?6038F 6A98P3@>0==508BA66<4?66A9M9H08808HF781?49ZP3@?29M23>408H523Q?<@M=01
13Q<@6926A98P3@Q@46B9=9696A91386986435>9M1?1A9Z133I094?8BM23>408H
A04632PFU==M23>4924<23S0B940Q<=9>?P35B308H6A046?4IF
*4brb4]'ef0466A9469<4631=9?2M23>4921?1A9Z133I094?8BA04632P386A9M23>492
@49BMPP3@F
_69`,56'899b5,'
U133I0904?4Q?==Q944?H94986MP6A9m9M492S9263?P3@2>9M1=0986FGA04
Q944?H90446329BMP6A9M23>492?4?69;650=9FGA9M?401<@2<34935133I09046346329
08532Q?6038899B9BMP?492S92?66A9@49298B38=PFGA9133I0904@49B63498B
08532Q?6038M?1I636A9m9MV92S929?1A60Q96A9M23>49229@9464?<?H9523Q6A9
492S92FR329;?Q<=9Z?>9M4069Q?P?4IP3@6350==@<?532Q>06A6A908532Q?6038
?M3@6P3@28?Q9?8B086929464FGA0408532Q?603804<?1I?H9BMP6A9492S920863?
133I09?8B498663P3@2m9MM23>492>A01A46329406532=?692@49FGA989;660Q9ZP3@
H3636A94?Q9m9M4069ZP3@2M23>492>0==498B6A946329B133I09636A9m9M492S92
?=38H>06A6A929@946532?>9M<?H9FGA04>?PZ492S92>0==M9?M=96329Q9QM92P3@
?8B498BP3@38=P6A?608532Q?60386A?6P3@A?BB94029B9?2=092F
65'*99b5,'lhde'Y33I094?29Q929=P69;650=946A?61?8M9B9=969B?6?8P60Q96A9P
?29836Q?=0103@4832?296A9P<23H2?Q4FY33I0941?8836M9@49B634<29?BS02@494?8B
11
345674658))
/01234556//471365/8696:26;8048<<8=>1?@6A1>18B/012365/4=5=CD68/45/ *4)+,67,-6.)
=5:68C4/=654E6;/26;BF6/012C42E1/0814//626;8D8=>43245<45652C=/265/01
G5/1851/?H013667=1365/4=5F=5:68C4/=65/04/26;D86>=<1/64I1EF=/1?J6E13481:;9
4E6;/A04/=5:68C4/=6526;D86>=<165/01A1E?
KLM6)K6NO7-5P)Q-RS)TU-V6)W7L.S-4X8)
I1E49/06;Y065651F=<1=F0;Y181F6;8316:=5:68C4/=65BE;/65/016/018/0181=F45
=53814F=5Y/0814/:86CF6:/A4814//437F/04//4714<>45/4Y16:>;95184E91A1E
E86AF18F?H0181:681B26;4814<>=F1</6/471:6996A=5YD8134;/=65FA0=91E86AF=5Y4
A1EF=/1Z
[\ ]656/39=37499/019=57FA=/06;/365F=<18=5Y/018=F7F6:26;843/=65F?J6C1
A1ED4Y14<<81FF1FC42E1<=FY;=F1<45<C42E1>182396F1/64<<81FF6:4F=/1
26;A45//6>=F=/E;//012C42/47126;/645;51^D13/1<F=/1?
[\ _6;C;F/;F1/0194/1F/>18F=65F6:E86AF18F45<D914F1<656/365:=Y;81/01C
/604>1<13814F1<F13;8=/2?
[\ ]656/96Y=5/6438=/=3494DD9=34/=65=:=/<61F56/04>10//DFZ̀`?
[\ a914F1<656/<6A5964<68=5F/499D9;Yb=5:86C/01;5756A5D48/2F;30
/15<153=1FC42D;/26;836CD;/18/64<<=/=65498=F7?
[\ H0=8<bD48/2F6:/A481C4256/04>14C13045=FC:688131=>=5YF13;8=/2;D<4/1F?
[\ ]656/>=F=/;5F69=3=/1<A1EF=/1FB/06F14<</626;836CD;/18>;95184E=9=/=1F?
[\ _6;C42;F14F1D484/1;F184336;5/:684331FF=5Y=5/1851/6526;836CD;/18?
_6;C4281F/8=3//018=Y0/F6:/0=F;F184336;5/?
H0=F9=F/C42=539;<1C452C681/151/4F26;E136C1C681D869=:=3=5/1851/;F18?
*N5-,-5P)c8defeghijkjlhmineoepqrfejdhqjkpsjdhptuqjvknsjhpjwpuenpeujxqey
zU6N{)|LO7)}7LX76SS)~)
)
? I04/=F4E86AF18]=F3;FF>48=6;F/2D1F6:E86AF18F?
? @6A<61FI1EJ18>1836CC;5=34/1A=/0I1EE86AF18
? I04/=F3667=1GF=/814992E4<]=F3;FF?
*N5-,-5P)Z
F14/914F/E86AF18F=>14/914F/238=/18=465A0=3026;36CD481
/01C
cK*z3)
H01G5/1851/)365F=F/F6:C=99=65F6:D8=>4/1D̀;E9=34̀34<1C=3È;F=51FF45<Y6>185C15/
51/A687F04>=5Y96349/6Y96E49F36D1?G/04FE=99=65F6:A1ED4Y1F65>48=1</6D=3F
/04/C42E14331FF1<E226;?H0;FB=:26;4814F71</6F;8:/0151/:68FD13=:=3
12
34567465(9*4+6,5-(( ./012345.1/26745./8514519.:;.534<54=6<642>?60126<1@:1@7A0./A4775B69486>
267456A519.:<1@426711=./8012CD1E:4/<1@34=65B.>921:6>>04>562FG677962B49>
<1@26H@.265B6>62I.:6104>642:B6/8./61/5B6J/562/65CK136105B6919@742>642:B
6/8./6>1/5B6J/562/65426LM4B11N;O11876;P./8;Q>=C:134/A34/<3126CRB6>6
4265B65117>51B679<1@71:4565B6:1/56/55B45<1@426711=./8012C
S
s_tt**4(uVn6-(
TT
S
STTT
((
(
(
(
(
( (
UVWX76(YZ[(\(](^6_7+`(a4WV46(
(
Q>642:B6/8./6:4/?6A60./6A4>4511751>642:BA.I62>64/AA.>1284/.b6A>1@2:6>10
./012345.1/4I4.74?761/5B6J/562/65CM1@:4/:76427<I.>@47.b602135B.>A60./.5.1/
5B454>642:B6/8./6B4>51@>6>1364@513456A9218243>5B45/66A>51:1/5./@1@>7<
=669I.>.5./85B6E6?9486>4?1@55B6:1/56/55B6<B4I64/A1284/.b65B6./012345.1/
4?1@5E6?9486>./>136012345Cc218243>5B45:1/5./@1@>7<=669>642:B./8012
./012345.1/0213E6?9486>426:4776Ad>9.A62>;21?15>;:24E762>;E4/A6262>4/A
E123>CK642:B6/8./6>0./A>;:74>>.0.6>4/A>5126>./012345.1/4?1@55B6:1/56/5>10
I42.1@>E6?>.56>1/5B6J/562/65C
ef,6-(*g(^6_7+`(a4WV46(((
K136105B6?4>.::456812.6>10K642:B6/8./6>426L(
4CT h7Vi_7f(^6_7+`(a4WV46-\K@:B>642:B6/8./6>@>6E6?:24E762>12>9.A62>51
524I62>65B6E6?4/A>:4/E6?>.56>012=6<E12A>;9B24>6>;5186/62456A454?4>6
10E6?9486>B4I./8>136./A6j./812:74>>.0.:45.1/CO118764/AQ754k.>54426
6j43976>1092.342<>642:B6/8./6>C
?CT l6m(nV76+5*7f\G6?A.26:512.6>1284/.b6./012345.1/./51:456812.6>
4/A>@?:456812.6>12A.26:512.6>CM1@:4/>642:B4E6?A.26:512<012
4775B1>66/52.6>5B45:1/54./49425.:@742>6510=6<E12A>Co.26:512.6>
A.00620213>642:B6/8./6>./5B6E4<5B6<1284/.b6./012345.1/CM4B11
.>4/6j4397610E6?A.26:512<C
:CT p65_(-6_7+`(64WV46-\K@:B>642:B6/8./6>94>><1@2H@62.6>5134/<>642:B
6/8./6>4/AE6?A.26:512.6>4/A926>6/5>@3342.b6A26>@75>515B6@>62>CK136
105B66j43976>103654>642:B6/8./6>426q o189.76;J/0./A;r654:24E762;
r6540./A4/Ar654>642:BC
M1@:4/26062510@25B62264A./8>0123126A654.7>1/I42.1@>5<96>10>642:B6/8./6>C
P@5B1EA16>>642:B6/8./68654?7651A1>642:B./8F
12
345674658))
/012345167861913:;3<0=>51:;??;@867>531124>8;60A *4)+,67,-6.)
BCD E98F13867;3G1H432@?867
ICD J6F1K867
LCD E12345867
MN-O67-4P)Q7)R6S)T7U.V-4P8)E98F13;3G1H432@?138024;<9W>1393;732<>52>
H3;@010>51@1H92710;:GGG 8620X0>1<2>84=2W>;<2>1F<26613CE12345Y678610
W01098F13:;371>>867W9Z>;ZF2>1F2>2;6@1H08>10C[51X231W01F>;4312>124;9X;:
>5192710\808>1FHX>51<:;3?2>1393;4100867>;4312>1J6F1KC[510193;732<02312?0;
W01:W?86\2?8F2>867][^_4;F1>;2923>84W?230>26F23F?8̀1a][^_;34514`867;3
\2?8F2>867>515X913?86`0C
34O6b-4P8c641=>51098F13052\14;<9?1>1F>51>20`;::86F86786:;3<2>8;62H;W>
G1H92710=>51012345167861<W0>0>;31>5186:;3<2>8;6860W45@2X>52>X;W2312H?1
>;W018>C[51012345167861<2X93;\8F10;<186:;3<2>8;631?2>867>;31?1\2641;:
86:;3<2>8;6<2XH186>51:;3<;:d26`867C[5W0=2012345167861<2X0>;31>51
`1X@;3F0;:2@1H9271=6W<H13;:>8<10>52>@;3F2991231F;6>519271=>51ed_;:
>519271C/@1875>867:24>;3>52>78\10<;31@1875>2718642012@;3F80:;W6F2>>51
>;9;:>51F;4W<16>CY2454;<<13482?012345167861W0102F8::1316>:;3<W?2:;3
200876867@1875>>;>51`1X@;3F0868>086F1KC[58080;61;:>513120;60>52>2012345
:;3>5102<1@;3F;6F8::1316>0123451678610@8??93;FW41F8::1316>310W?>0C
E8641=>51F2>2>52>80>;H10>;31F:;386F1K86780?2371=>5131:;31=012345167861<2X ª66S67)
164;F18>C[51J6F1K804312>1F@8>5>510;?19W39;01=>52>80=8>2??;@0X;W>;:86F>51 ;W?12\1
}vv{yosr{p
86:;3<2>8;6;6>51J6>1361>fW84`?XCJ6716132?=J6F1KW0105205867gX;W@8??0>WFX>580 qooyrsyxp
4;6419>86>51h2>2E>3W4>W314;W301iC @5131\13X;W7;
;6>51@1H:;3
012345867CE;
M6U7Tj-4P8)G5162W01316>1302fW13X86>;2012345167861=>511678611K2<86108>0 F1?1>14;;`810
86F1K26F93;\8F102?80>867;:H10>Z<2>45867@1H92710244;3F867>;8>0326`867
438>1382C[58005;3>?80>=W0W2??X=52\1205;3>0W<<23X4;6>286867>51>8>?1;:>51
F;4W<16>26F0<2??923>;:>51>1K>C^;0>01234516786100W99;3>kQQV6U4)l6U7Tjm)
E;<108<9?11K2<9?1;:20123458078\16H1?;@A
nopqrstpuvwxryvpuzr{zp{osy|rsxp}~||pyyor|p
op|
py
vpU,U)55Q7-UV)86>51
xv|{zpwopoqpyzvpwouxvpnzvpxv|{zpurpoopqopv
uotxp}||pp}nyor|
>510123451K931008;6@8??31>381\12??>5;01314;3F0@5131H;>5>51>13<0;44W3
g87W31ICiC
) G1H08>10 G1H08>104;6>286867
DDDDDDDDDDDDDD4}D;n
DD6D>Dy2DoD8D6rD8|D6DD7DD@;
DDDD3DFDD uotp}||
D G1H08>10
D {osy|rsrsp}~||p
D p}yyor|
D
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
))))))-P76)m8)*)M6U7Tj-4P)bUNV6)l-4P)*D
;W<2XW01;>513;;?126;9132>;30?8̀1cd26Fc[86>5101234510C;31K2<9?1=8:X;W231
rsyvvxyvtpvryzvprspuvwp|vxpz|rspv
uotp}||popyzv
p|vpyyor|xpyzvsp
op|
pxvpxv|{z
1K931008;620A}5Q7-UVl ¡¢£¡¤¥¦§¦ ¡¡¨9?120131:13>;87W31IC©iC
)
)
)
)
)
)
12
34567465(9*4+6,5-(( (
...3=;873; 3=;873;:59718989X
:59718989X<562 _]fghg^
]eg_]
/0123245678592348:7;<3=;873;38703659>1?1567@756. 81A;
56>1?17@75681A;
.
BCDE76(FGHI(J(K6L7+MC4D(NOLP,Q6(E-C4D(RS(
TUV5@163A55W89XU56Y@75681A;701716395763A173275Z1?17039V5@[1V@;3703;316:03\463;;8591;
]Y@75681A;^_`ab_cade_]fghg^ij63U3675k8X@63lmnim
. F$9(.8$(%
F$..9..(...8$(%+!*8'.*.*"% +!*8'.*.*"%&!0-%
.
GH.IJLMNOPHIQRSKT% MZR[RT%
.
.
. F$9(.8$(%+!*8'.*.*"%
. GHIJKLMNOPHIQRSKTL
. ]VWLMZR[RT%
.........................
. <,'-$-%6!08.!*%(,!&(%F$9(.8$(%+!*8'.*.*"%
. GH
%
IJKLMNOPHIQRSKTLUVWLXVYNLMZR[RT\%
.
.
.
BCDE76(FGoI(J(KCP,Q6(6OLP,Q6(*p(E-6(*p(qRr(
(
.
/5[357036s55A3193\463;;859;163t
BRuuRvNw(xyIz935U703736[;[@;7=32863:7AVU5AA5<32=V70357036m
qNJStz935U703736[;[@;7=3<870891;43:8U8329@[=365U<562;5U70357036m
{E*5L5C*4(|L7}-tY03<562;=37<339703~@5717859[16W;16376317321;1
4061;319270174061;3[@;7=3U5@92<8708970325:@[39756U8A3m
BC6Q(-6L7+Mt
_____g___(
!!"#$%&'(%#')*+,$-%.*%% uCPC5C4D(-6L7+MI(8[8789X=V78[3217356U8A37V43A19X@1X3565::@6639:3;m
/'*)'01%23345%'(%'%
0$($'0+,%60!7$+8%91%:'001%
;'"$%'*-%<$0"$1%=0.*%'(%
A31;39573701728UU36397;316:039X893465?823;703;3;316:0U56[;@;89X28UU36397
;,>%(8)-$*8(%'8%<8'*?!0-% ;V971\m5@;05@A263U3675U@67036;7@283;U56[56323718A;59708;7548:m
@*.A$0(.81% 37@;95<;05<V5@05<V5@[1V=31=A375@;3;316:039X893;mk567034@645;35U
708;@987<301?3;3A3:73255XA3192105505<3?36V5@[@;725703;8[8A16
B',!!%%&'(%#')*+,$-%% 3\36:8;3@;89Xs89X;Wm:5[192[19V57036;316:039X893;m
.*%/'*)'01%23345%%91%
/$001%B'*"%'*-%>'A.-%
C.#!5%D#$+80.+'#%
D*".*$$0.*"%"0'-)'8$%
(8)-$*8(%%?0!E%
<8'*?!0-%@*.A$0(.81%
12
345674658))
/01/234156570897:;<1=2:478>18?=01327:@?12=AB178?C88D412;<E20886 *4)+,67,-6.)
FGHI6)JKJ)8)LGM-N)O6G5P76M)QR)SQQTI6)G4U)VGWQQ)
E8A\A7==[]12;[
98B<?8B16D6^19
_140:2;<@4:@`
712B@0
/01a17A4=
X@B11;7
)
g<b2;@1712B@0@2;014][8A=8@B12=1 E20882<b2;@1712B@0:7]B:>2B:4[@2=1D8B[
>8B17]1@:?:@712B@06 3271<
d;e8>1f2D1
;12B712B@03A==8;
=01B1:78]=:8;
g<b2;@1X12B@06
h?[8Ai4:@`=02=
3A==8;[8AD1=
=0:77@B11;
12
34567465(9*4+6,5-(( ./010210324567/0180219/:027;108<16=>?0?@580219/04A>408BC6;3;87;80
=21>6;880219/04A>40824?0D<E6107/0:29>E>7>087/05<16=>?0B
F+5GHG5I(JKL63<2107/0:027;1086:27E0287:6;180219/04A>408B
M*N6(M6O7+PG4Q(RG,-(
S45T0219/04A>402EE6U856;76<01:6130>7/012@162?80219/6:0=0157/>4A647/0
V0@61242116U80219/E>3>70?8<09>:>92EE576>32A08W=>?06W40U8W6167/018<09>:>9
80219/75<0BX:56;210>47010870?>4:;17/0142116U>4A56;180219/108;E78W7152??>4A
3610U61?87656;1Y;015Z180219/2A2>4;8>4A?>::0104770138B[6EE6U>4A2108630
6:7/07><87/27325/0E<56;76:613;E270@0770180219/871>4A8\
9P**-6(]*7^-(+O76_`aaI\b808<09>:>9U61?876?0891>@00D297E5U/2756;210E66c>4A
:61B
d2c08;1076U279/:61U61?8U>7/36107/246403024>4ABX49280U61?/283610
7/246403024>4A7/042E86>49E;?07/096470D7>4U/>9/56;21080219/>4A7/0
>4:61327>64
.1576;80</12808>48702?6:8>4AE0U61?:61<6>470?80219/B
e*`(-P*`a^(,67_*7N(N`a5G,a6(-6O7+P6-(-GN`a5O46*`-aI
f6UE07;8?>89;882@6;786306:7/0<16?;978<16=>?0?@57/080219/04A>40B[>A;10
gBhE>8787/0<16?;978<16=>?0?@5i66AE024?C2/66\jj
j
(
kGQ`76(lmnK(o7*^`+5-(G4(p**Qa6(
12
345674658))
*4)+,67,-6.)
/
0-1276)3458)6778295:)-4);<=77)
>?@@?ABCDBEF@BEG?HE?IJ?HGKJEJLM?NOPGEQ
6778295 R771S6 ;<=77
TFCDOFDJ
U??@VWFCXJ
OEJNG?
GMFCE@FGJQYOG
L@JFEJPKJPZ
GKJEJ
GMFCE@FGB?CE
XJH?MJOEJQ
) )
[@JMGE [@JMGEEJCNE\?OFCJIFB@FX?OGGKJ@FGJEGMJ@J]FCGOLNFGJE?CBCH?MIFGB?C?H\?OM
PK?BPJQ
[CEAJME [CEAJMEIF\KJ@L\?OG?DJGFCEAJMEG?\?OM^OJEGB?CEHM?IMJEJFMPKJMEQ
_BMJPG?M\ _BMJPG?MBJEFMJL??@?HBCH?MIFGB?CGKFGBEBCGJDMFGJNABGKGKJEJFMPK?LGB?CG?LM?]BNJ
I?MJEGMOPGOMJNBCH?MIFGB?C?CGKJAJXQ
>BCFCPJ `?OIF\DJGEG?PZOLNFGJEFCNMJ@FGJN aGLM?]BNJE\?OFPPJEEG?HBCFCPBF@
BCH?MIFGB?CQ MJE?OMPJEQ
bM?OLE aGBEFC?C@BCJNBEPOEEB?CDM?OL?MIFB@BCD@BEGGKFGKJ@LE\?OP?IIOCBPFGJABGK\?OM
HFIB@BJEcHMBJCNE?MFDM?OL?HLJ?L@JQ
dFB@ UKJEJFMJP@BJCGeEJM]JMXFEJNJIFB@EJM]BPJEGKFGLM?]BNJHMJJJIFB@FPP?OCGABGKKODJ
EG?MFDJELFPJQfJPGB?CgQhLM?]BNJEI?MJBCH?MIFGB?C?C?CJ?HGKJIFB@EJM]BPJQ
dFLE dFLEFMJ]JM\AJ@@NJ]J@?LJNIFLLBCDEJM]BPJEABGKIFC\HJFGOMJE@BZJNMB]BCD
NBMJPGB?CEc@?PFGB?CFNNMJEEJEJGPQ
iGKJM iGKJMEJM]BPJELM?]BNJNX\b??D@JFCN`FK??BCP@ONJj
fJM]BPJE d?XB@JjGKFGF@@?AEXM?AEBCDFCNEJFMPKBCD?HP?CGJCGEGKM?ODKI?XB@JLK?CJE
kJAEjGKFGP?@@JPGECJAEHM?INBHHJMJCGCJAEE?OMPJEFCNLMJEJCGG?GKJOEJMFELJM
KBEeKJMLMJHJMJCPJEQ
lJME?CF@BEJNK?IJLFDJEj\?OPFCPMJFGJ\?OM?ACK?IJLFDJE]JM\^OBPZ@\Q
mJFGKJMj\?OPFCEJJAJFGKJMP?CNBGB?CEFCNLMJNBPGB?CEQ
f?IJ?GKJMEJM]BPJEBCP@ONJE?PBF@CJGA?MZBCDFCNPKFGQ
12
34567465(9*4+6,5-(( ./01203450561571382019:603;<302=94><?025602<7</19=94?@:52AB4@7@25598
20>091/2019:603;<302C9475<70545<70125608D00=@=?15<3;560<9C015@902A
E+5FGF5H(IJK<3?1//560=94?@:521>1</1L/0M<56138C4@9?<CC090352019:603;<302A
9N6+O(P*Q7(R7*S76--(T(
UA V615<21W019:6X3;<30YZ4M?402<5M49DY
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
2A V615<22019:6<3;YZ4M0CC<:<035/884@:132019:6\
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
1A] ^@549<1/24C_`a
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[b
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
LA] c3<>092<5<02<3d3?<113?cWe
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
:A] c3<>092<5<02<2345<3cWe49f9<51<3
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
?A] g/013<3;=94:0224C;4/?h<5264@/?345;<>0=94:02290/150?54:/013<3;4C
i0M0/98
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[b
E+5FGF5H(jJ(K<3?4@5Uk2019:603;<302C947560M0LAe/24/<25560<7=49513:0<3560
:4350l54C58=04C2019:6025608190;44?15AB4@71820/0:556024704C5602019:6
03;<302C947560C4//4M<3;/<25\
f<3;hB1644hm44;/0h`WnW019:6ha8:42hV0L:91M/09hZ45L45he/51o<251h
epaW019:6he//560M0LA:47he//1:1?07<:A
TqrstuvE3w(
(
d3509305612:613;0?5601954CM9<5<3;/05509254071</AX71</<24304C560M18243
d350930554203?70221;02541345609=092431:9422560305M49DAXx71</13?=4251/
71</:40l<25<3560=902035d3?<1Ad34@9:4@3598h560901:64C=4251/71</<2C197490
=0305915<>05694@;650:63<:1//884@718:/1<756150x71</612560=45035<1/54901:6
0>098><//1;0718L05694@;674L</0?0><:02A^600x71</282507612L003?02<;30?43
560=4251/2825075615<2M68<3071</84@61>054M9<50560071</1??90224C560
203?0913?56090:<=<035Ad3:1205601??90224C56090:0<>09<2<3:4990:556071</<2
@3?0/<>090?13?905@932L1:D54560203?09A^601?>1351;024C0x71</4>09=4251/71</
718L0\
y] Xx71</<2C125095613=4251/71</A
y] Xx71</:13345L0/425/<D0/05509213?:13L025490?C49/<C0/43;A
12
345674658))
/0 1234567789278458:;<=4<8782;;2>7<?@7<@A *4)+,67,-6.)
/0 BC49D@4<75;24::732786E89@24537@A1234567@75245E=>7<795=;<D895
@73;58@?5D9F7G;@24DC49D@A
/0 H;?345488I987;4584?89;=92>2>77JC49DA
K>789@48I4524L7@;:7C49D;I7<G;@24DC49D4<7M
/0 K>7<7C?@2673;CG?27<;<4D27<5429I7DE@?9246D7C;69D787I937@458572=;<F
3;557329;5@>;?D8674I49D46D742@7587<458<739G9752@987?5D9F7G;@24DC49D@A
/0 K>7<79@45778;:F5;=D78L7;:;G7595L7C49D433;?52458>;=7C49D34567
@752AK>7<79@5;@?3>F5;=D78L79@<7N?9<78:;<G;@24DC49DA
OPQPR)))S-T5U7V)UW)XYZ[-\)
1527<57264@78BJC49D@E@27C=4@87@9L5786E4];CG?27<75L9577<J^4EK;CD95@;5
95D427_`a_=>9D7=;<F95L=92>b^cbdBKAK;CD95@;5?@784:9D72<45@:7<G<;2;3;D
2;@7587D732<;593C7@@4L7@2;45E3;CG?27<;52>7b^cbdBK572=;<FAK>7:9<@2
7C49D=4@@752672=7752=;3;CG?27<@2>42=7<7432?4DDE@92295L67@987743>;2>7<6?2
3;55732782><;?L>b^cbdBKA
K>7:9<@29CG;<24527C49D@24584<8=4@34DD78efghi;<@9CGD7C7@@4L72<45@:7<
G<;2;3;DAjkKc=4@I7<E@9CGD74589@@29DD95?@7J>;=7I7<ijkKc>4@4G<;6D7Cl
92C4F7@5;4227CG22;:958;?2=>72>7<2>7G7<@;53D49C95L2;>4I7@7524C7@@4L79@
432?4DDE2>7@4C7G7<@;5AK>9@64@93:D4=952>7G<;2;3;D=4@D427<2;677mGD;92786E
I9<?@7@458=;<C@i4586E@73?<92E:<4?8@458@G4CC7<@:;<L95L987529297@Aj;C7;:
2>7@7G<;6D7C@4<7@29DD6795L488<7@@78A
15noopi=>751527<572@24584<8@:;<7C49D67L452;C42?<72>7h+h)qU7)hUT5)+WW-r6)
h7U5UrU\s@7<I7<@67L452;4GG74<4@4@24584<8J67:;<72>42743>@7<I7<=4@4D922D7
89::7<752Actc=4@459CG;<2452@24584<82;4DD;=?@7<@2;87I7D;GC49D@E@27C@2>42
=;?D8=;<F=92>743>;2>7<A
d;=1527<572C49D9@87:95786E4D4<L75?C67<;:@24584<8@458<73;CC758429;5@6E
2>71527<572B5L9577<95LK4@Fu;<37v1BKusAw;=7I7<i;5DE4:7=;:2>7G<;2;3;D@
?@78951527<572C49D4<7:?DD1BKu@24584<8@Ak;@2;:2>7@7@24584<8@4<76795L?@78
6E:;<G7;GD7=<9295L1527<572C49D@;:2=4<7A
OPQPO))SU.)5U)r76[56)XZ[-\)*rrUx45y
u;<@75895L;<<7379I95L7C49DiE;?57782;>4I72;457C49D433;?52AK>77C49D
433;?52C4E67G<;I98786E2>7;<L459z429;5:;<=>93>E;?4<7=;<F95L;<7D@7E;?
3453<742745433;?52=92>=7664@787C49DG<;I987<@A1:E;?4<7=;<F95L;5C49D
@7<I937@G<;I98786EE;?<{|}~~{C49D@7<I7<iE;?>4I72;95@24DD458?@77C49D
3D9752@;:2=4<7@?3>4@k93<;@;:2t?2D;;FBmG<7@@ic7L4@?@k49DibGGD7k49D3D9752i
k;z9DD4K>?587<69<8723At52>7;2>7<>4589:E;?4<7?@95L=7664@78C49D@7<I937@
2>75E;?C4E?@72>7C49D@7<I937@;::7<786E45E;:2>7=7664@78C49D@7<I937
G<;I987<@Aj;C7;:2>7@7=7664@78C49DG<;I987<@4<7l
958;=@9I7C49DiH4>;;
C49DiC49Di^789::C49Di458C45EC;<7A152>9@@7329;5=789@3?@@46;?22>7G<;37@@
;:3<74295L457C49D433;?52=92>2>7=76C49D@7<I937AbD2>;?L>:;<7m4CGD7=7
>4I7@7D73278C49DiE;?C?@22<E3<74295L433;?52=92>42D74@22Jp@?3>@7<I937@458
3>;;@72>7;572>42@?927@E;?2>7C;@2A129@4D@;=;<2>C7529;595L>7<79@2>42C;@2
;:2>7@7=767JC49DG<;L<4C@=;<F954@9C9D4<=4EA
j24<22>76<;=@7<458tG752>7C49Dw;C7G4L7AK>7@3<775@9C9D4<
2;u9L?<7nA_o~~~|{{||~~{ {{
2>7<9L>2A
12
34567465(9*4+6,5-((
./0176(23456(786(9+7664(:*7(+76;5/40(;4(;++*145
<=>?@ABBACD?EFGE>CDBBAF>?
(
767H-(*:(967J/+66 KB>GL>M=>MNO=>PAAEB>QMMAR?OD?@ASTGODA?UARVW>>?O>S>XGYAW>Z@>>B@S>>OAM=G?E>
G?UO=D?EUARBDN>[\G?XS>WD>CO=><>STLA@]>SWDM>Y>BAC^
_DO=PTGDB\UARCA?VOL>>YBD?ND?EYG??>SGXL^`?LO>GX\C>XDLFBGUGXLUARTDE=O@D?X
RL>@RBO=GOGS>S>B>WG?OOAO=>MA?O>?OA@UARST>LLGE>L^a>GS?TAS>
bcdeefghicjkfdhfclmcdeenophi
./0176(23446(786(9+7664(:*7(64567/40(/4:*7H;5/*4(;4I(+76;5/40(;4(;++*145(
12
234563547((
./001200134516/507812971:0/:;1<=12::5>3?1@A52351BC12::DE93F 93(*+56+,5-(
GHIJKLMNOPJQRMSOMPIRTUQMVOQLOPIJKWMXXJKPQYTZZ[OXWOMQOS\JQLOWYTUOQLO
OWWJWYTZZ[OSTU]ZMIOS^_JWWOXQQLOOWWJWUMPSQWIM`MTP^aJYIJKLMNOXWOMQOSIJKW
MXXJKPQ^
9b4,+,4c(def]OPIJKWMXXJKPQYTQLMQZOMUQghiYO[RMTZUOWNTXOU^
aOjQQTROIJKNTUTQQLOkRMTZYO[UTQO\IJKXMPPJYIJKMXXOUUIJKWMXXJKPQMUe
lPQOWQLOmnopqrsoMPStrnnuvpwxyMUULJYPTPzT̀KWO{^|{}MPSXZTXV<~T̀PTPF1
[KQQJP^
,65(7(
(,3(4(c6(bb34(
aJYIJKXMPMXXOUUIJKWMXXJKPQ^PORMTZMXXJKPQ\TP`OPOWMZLMUQLOHJZZJYTP`
HJZSOWUe(
237GP[JjTUQLORMTPHJZSOWTPIJKWORMTZMXXJKPQ^GQXJPQMTPUMZZQLOOhRMTZUQLMQ
LMNOMWWTNOSTPIJKWOhRMTZMXXJKPQ^JKXMPXZTXVJPTP[JjQJUOOQLORMTZUQLMQIJK
LMNOPJQWOMSyULJYPTP[JZS}MUYOZZMUQLORMTZUQLMQIJKLMNOMZWOMSIWOMSyTP
PJWRMZHJPQ}
534(,7GQULJYUMZZQLOOhRMTZUUOPQ[IIJKHWJRIJKWOhRMTZMXXJKPQ^
647LTUHJZSOWUQJWOUQLJUOROUUM`OUQLMQIJKLMNOXWOMQOS[KQLMNOPJQ[OOPUOPQ
[IIJKUJHMW^LOUOROUUM`OUMWOUMNOS[IIJKHJWRJWOYJWV^
7(]MRTUKPUJZTXTQOSOhRMTZUJWKPVRMTZU^GQTU`OPOWMZZIOhRMTZMSNOWQTUTP`
UOPQQJ`WJK]JH]OJ]ZO^OXMPMZUJQOWRU]MRMUKPYMPQOSOhRMTZU^]MRRMTZUMWO
MZUJM[T̀XMKUOJHXJR]KQOWNTWKUOU^]MRRMTZUMWOTSOPQTHTOS[IQLORMTZUOWNTXOU
MPS]ZMXOSTPQLTUHJZSOW^LOUOU]MRRMTZUMWOMKQJRMQTXMZZISOZOQOSMHQOWHOYSMIU^
67(PISOZOQOSRMTZTU]KQTPQLOWMULHJZSOW^WMULHJZSOWMZZJYUIJKQJ`OQ
[MXVMPOhRMTZYLTXLLMNOMZWOMSI[OOPSOZOQOS^KQTQTUTR]JWQMPQQJVPJYQLMQIJK
XMP`OQ[MXVQLORMTZUJPZIYTQLTPHOYSMIUHWJRQWMULMHQOWTQUSOZOQTJP^HQOWHOY
SMIU\RMTZUMWO]OWRMPOPQZISOZOQOSHWJRQWMULHJZSOW^
PORMTZMXXJKPQ\TP`OPOWMZLMUQLOHJZZJYTP`J]QTJPUe(
5(,7_JR]JUTP`TUMSSWOUUTP`\YWTQTP`\MPSUOPSTP`MPOhRMTZROUUM`O^
IXZTXVTP`JPQLO_JR]JUOMTZ[KQQJPMYTPSJYM]]OMWUYLOWOYOXMPYWTQOJKW
ROUUM`OTPQLOROUUM`O[JjMPSQLOORMTZMSSWOUUOUJHQLO]OWUJPYOYMPQQJUOPSQLO
RMTZ^
11
34567465(9*4+6,5-(( 9*45.+5-/0123456786912:;9<4=64>?5@2A7?:7@@B2994>7;2B945C14A<4=17D2
97D2@?5<4=B3456786:?96EF28757:94G=?8H:<>?5@2A7?:845D2B976?45979948?762@
C?6178456786I75@964B27@@?6?457:?5>4BA76?457J4=64=B4612B;2B9459C14922A7?:
?@?9964B2@?54=B84567869K9=81797A7?:?5L7@@B299I6?6:2I;14525=AJ2BI268ME
N4CI?OPQRSPTUVWPWRPXYUZPQRSXP[U\]^PW_YVP̀]\`aPPbP34c*deKf?L=B2(gEhiM
jklm76(nopqr(34c*d(
s><4=C75664925@Y[U\]PW_YVP̀]\`aPb`R[tR^Y^[U\]ePUVZP^`XYYVP79914C5?5f?L=B2
gEhuC?::7;;27BE
s5612v*>?2:@<4=17D264;=66127@@B2994>612B282?D2BEs58792<4=C75664925@
2A7?:64A4B26175452B282?D2B6125;=684AA79J26C225612?B2A7?:7@@B299294B
QRSP̀UVPS^YPbUZZP̀`ePRXPbUZZPw``eE
389675@9>4Bxyz{|}~|612;2B9459C14927@@B299?9:?962@?561?9>?2:@C?::B282?D2
87BJ4584;<4>612A2997L275@88A2759{}
~yz{|}~|9?A?:7B6438J=645:<
@?>>2B2582?96176612B28?;?256C1417@L4688?9?5D?9?J:2644612BB28?;?2569E
mc6+5(r012A7?5127@?5L4><4=BA7?:?E2EI?6C?::2;:7?56176612A7?:?9B2L7B@?5L
C1?81?99=2E:2792546261766129=J286914=:@J2@298B?;6?D24>612A7?:6412:;612
B282?D2B=5@2B9675@C176A7?:?97J4=6C?614=617D?5L644;25612A7?:E
v6d5(76.(r012A2997L2?9CB?6625?561?97B27E
F1257::612B2G=?B2@>?2:@97B2>?::2@79914C5?5f?L=B2gEhuI<4=875925@612A7?:
J<8:?8H?5L612}
~J=6645E
(
jklm76(nopr(9*,*-6(.k(k4*(
12
345674658))
/012301104324567708029245:;2<1=>:;2<10792801?;906@?07A0;@B701=C64@;8@121 *4)+,67,-6.)
6401B8?<21@;10DE<;240;7<207=C64@;8@18;4F0675;42G032432AA0704@576BE1<2H0
6AA280I18?66<I70<;@29010@8=
J-KL76)MNOP8)QR45ST5U)
V:;2<;<16E7692301:;4W6@?07A;82<2@20124;332@264@6@?0:;2<=X?010248<B30C?;@I
Y7HB@IC;<043;7IZ68B:04@1IE?6@61I[0F;43:;4W:670=\0[2<<3218B11C?;@24
@?21B42@I[?070;1Y7HB@21;1682;<40@[67H245A;82<2@W=]682;<40@[67H245213218B1103
24@?040D@B42@=^6B1?6B<3@7W@?06@?07A;82<2@201W6B710<A=
MNP_Q`*a)
X?0[6738?;@24>45<21?<;45B;50:0;41b8;1B;<8649071;@264=Y4c4@0740@2@:0;41
@?01;:0I0D80E@@?;@W6B4003@6B10@0D@;43W6B7H0WF6;731H2<<1;70@01@03=>;7<207
8?;@@245[;1E6112F<064<WF0@[004@[6E06E<0I46[W6B8;404d6W8?;@@245[2@?;
4B:F076AE06E<0;@;@2:0=e6[IW6B8;4B10f6280C?;@g2@70hB2701:2876E?640
;431E0;H07i;43f2306C?;@g2@70hB2701:2876E?640I1E0;H071;43[0F8;:07;=^6B
8;48?;@0904B1245W6B7:6F2<02A2@?;3@?;@A;82<2@W=
C?;@21467:;<<W364024;8?;@766:=]6:06A@?086::648?;@10792801;70W;?66
:01104507jW;?66kIV@;<HjV665<0kIl032AA/6<=\0[2<<dB1@1?6[W6B;40D;:E<0
B12455@;<H=m6[0907IW6B:;WB10;4W6@?078?;@16A@[;70=l0:0:F07W6B4003@6
36[4<6;3;43241@;<<8?;@16A@[;706AW6B78?6280=nA@07241@;<<245@?08?;@16A@[;70I
W6B:;W7B42@@66E04@?08?;@[2436[16@?;@W6B8;41@;7@8?;@@245=o25B70p=qr
1?6[1;@WE28;<8?;@[2436[=X68?;@IW6BdB1@@WE024@?0@0D@;43E7011@?0>4@07
H0W=
)
J-KL76)MNOs8)QtS5)u-4vR.)
12
34567465(9*4+6,5-(( ./01234105678250490/:6/78;5;8<<565=1</6>?0@2/??>=81850@;802>008/=A6/>:0B
C3505</6>?0?4DE5>05<>9@</65F4?:95@8<D/>34754=DG>56D@D/>H>01:/01818=
</6>?BI/>?4DA511354=0J56/6D/>?4DA510/?5659415;=5J0/6659415;
8=</6?418/=:/015;ED42/??>=81DBC3565465?4=D0>231523=82492/??>=81850
J3565D/>24=9546=9415018=D/>6<859;BC>1/68490@8=156785J@J49KL8=495610@4=;
/=98=5;802>008/=J8135F:5610465474894E95136/>A31350505678250BI/>?4D65A80156
J8130/?50>232/??>=81DB
MNO5(+O4(P*Q(R*(ST5N(9NO5(U*V5SO76W
XY ./01/<13523410/<1J4650>::/6115F1>49@7/8254=;78;5/234118=AB
XY I/>24=265415D/>6595216/=824741460>08=A135050/<1J465B
XY Z3895D/>?4DE5234118=AJ813A6/>:@D51?4DE54E951/05=;:687415
?5004A501/8=;878;>490B
XY I/>24=4;;A64:3820J3895234118=A@575=<895164=0<5680:/008E95B
C356546505756491D:50/<23416//?7468418/=0/=98=51/;4DBC35D8=29>;5[474@
\9403@.]^_ 4=;?4=D/1356B
`OaO(9NO5(7**b-c(C35?/012/??/=4=;:/:>94623410268:10465E405;/=H474
J382380/EH521/685=15;94=A>4A5B[47480<6559D474894E954=;2/?50J8137861>499D
5756D2/?:>1560/9;1/;4DBC/>054[47423416//?D/>?>013475[4745=4E95;8=
D/>6E6/J056B
[47423416//?09/4;G>82K9D4=;4656540/=4E9D<4011/>05Bd/J5756@135D65G>865
D/>1/K55:135=5J6595405/<[474BI/>24=A51135?<6/?eeefghihfjkl
mnO-N(9NO5(7**b-(
\94032341804=>:A64;5;75608/=/<23416//?0134180E52/?8=A?/654=;?/65
:/:>946B\940323416//?0>05o;/E5p.426/?5;84\9403q94D562985=11341465
8=15A6415;8=1/4J5E0815B\9403_3416//?065G>8651341135.426/?5;84\9403q94D56
<6/?o;/E5E58=014995;/=D/>62/?:>156BI/>24=A51135<9403:94D56</6<655
<6/?eeefhrkstfjkluf
34567465(v6nOP(9NO5(w3v9x(
]^_80?>918L>0562341=51J/6KJ3565:5/:9546/>=;135J/69;24=23414=;149K8=
234==590/68=:687415BC/>05]^_D/>?>018=01499]^_2985=1/=D/>62/?:>156B
y08=A13802985=1@D/>24=2/==5211/4=]^_056756@J3823802/==5215;1//1356]^_
=51J/6K0Bo=]^_?4D347513/>04=;0/<:5/:95D/>24=2341J813B]^_80E58=A>05;
</649/=A18?5B
z3v9
.]^_8040?4992/?:>156:6/A64?</62341B]1340?4=D2341234==590BI/>
24=;/J=9/4;135?8622341<6/?135?8623/?5:4A5{||}~eeefljfjklf
U*b6(O-T+(bO4467T-b-(SNTn6(+NO55T4c(C35156?23418G>5115;50268E50E40826>950
/</=98=52/??>=82418/=BC/47/8;?80>=;56014=;8=A04=;1/08?:98<D135
2/??>=82418/=E51J55=>05608=42341@135052/=75=18/=0/6A>8;598=503475E55=
265415;B\/65F4?:95@/=50>232/=75=18/=80134181802/=08;565;6>;51/J6815/=9D8=
yqq^_o
4081802/=08;565;4=49/A/>01/03/>18=ABI/>03/>9;=/116D1/2341
J813>=K=/J=:5/:95BI/>03/>9;=5756>054E>0875/6/E0500875J/6;0B(
U9v3(vU((3v(
C35]=156=51340?4=D4;74=14A503/J5756@81490//:5=0>:052>681D136541B]=1380
05218/=J5H>01J4=11/38A398A310/?5/<13513654101341D/>?4D<425E524>05/<
E58=A4=]=156=51>0560BZ35=D/>>058=156=51D/>465<425;J81313655E4082136541
081>418/=0
12
345674658))
*4)+,67,-6.)
/0 1243-4645-56-5789:;<=;>?:@ABCDEC@F:<F?:;GDHC=HGC>:@C=D:@I:EJ
A<K:@L=>A:<>?=>FM?CAF<:>F;EE:FCD>:@C=DN
/0 3456O7-578))9:;<=;>?:@ABCDEC@F:<F?:;GDHC=HGC>:L:DAKJA<K:@L=>A:<N
/0 *,5-65P-6-5789:;<=;>?:@ABCDEC@F:<F?:;GDHC=HGC>:C@=FCA<K:@L=>A:<:@
L=QCA>A<=IICFFAHGCN)
R?C:>?C@>?@C=>FE:FCD:<>?CS<>C@<C>=@CD;C>:T:LE;>C@UA@;FCF=<DADC<>A>J
A<K:@L=>A:<>?CK>FN
R:L=QCF;@C>?C=H:VCFCI;@A>JFA>;=>A:<F>?CK:GG:WA<XLC>?:DFL=JHCK:GG:WCDHJ
J:;8))
*Y5Z645-[55-24=<D5Y5Z27-\55-24)L:F>GJ;FA<X;FC@<=LC=<DE=FFW:@D=@C;FCDHJ
L:F>S<>C@<C>FCI;@A>JFJF>CLFNR?C@CK:@C]J:;@;FC@<=LC=<DE=FFW:@D=@CVC@J
ALE:@>=<>=<DF?:;GDHCF;I?>?=>>?CJI=<<:>HCH@:QC<C=FAGJNS<=DDA>A:<]J:;L;F>
XAVC>?C;FC@<=LC=<DE=FFW:@D:<GJ:<=^RR_`CI;@CWCHFA>CN
a:;I=<E@:>CI>J:;@I:LE;>C@=X=A<F>T:LE;>C@UA@;FCF=<Db=GW=@CcADC<>A>J>?CK>
E@:X@=LFd>?@:;X?;FC:K=<>AVA@;FF:K>W=@C]W?AI?e;=@=<>A<CF:@@CL:VCFL=GAIA:;F
F:K>W=@CE@:X@=LFN`:;FCX::D=<>AVA@;FF:K>W=@C:<J:;@L=I?A<C>?=>FI=<FCL=AG
=<DSb =>>=I?LC<>FNb=A<>=A<=H=IQ;E:KJ:;@I@A>AI=GD=>==<DE@:X@=LFNfCCE
DCGC>A<XI::QACFK@:LJ:;@I:LE;>C@K@:L>ALC>:>ALCN
a:;I=<;FCKA@CW=GGF>:HG:IQWCHFA>CF?=VA<X;<W=<>CDI:<>C<>FN
R?C@CIC<>>?@C=>A<IG;DCF]=@AFCA<>?@C=>F>:I:<KADC<>A=GA<K:@L=>A:<]CgEG:A>=>A:<:K
CLC@XA<XhCHH@:WFC@V;G<C@=HAGA>ACF]=<DE@CDAI>A:<FK:@K;>;@C=>>=IQF=FF:IA=>CD
WA>?HG:XF=<DF:IA=G<C>W:@QA<XFA>CFN`:QCCEJ:;@H@:WFC@;Ei>:iD=>C=<DD:<:>
XAVCJ:;@EC@F:<=GA<K:@L=>A:<:<HG:XF=<DF:IA=G<C>W:@QA<XFA>CFN
j>?C@@CIC<>>?@C=>F@CG=>C>:WA@CGCFF<C>W:@QA<XNkALA>J:;@WA@CGCFF@:;>C@@=<XC>:
>?CFL=GGCF>I:<VC<AC<>DAF>=<ICNlGF:>@J>:L=gALABC>?CFCI;@A>J:KWA@CGCFF
<C>W:@QHJQCCEA<X=FC@ACF:KE=FFW:@DFN
mYOO6n5-24)
R?CH=FAIFCI;@A>Jbo`R;FC=X::DKA@CW=GG]F>@:<X=<>AVA@;FF:K>W=@C]=<D
D:W<G:=DKAGCFK@:LF=KCFA>CF:<GJN
1Z6[p)q2Y7)r72O76nn)s)
tN0 h?=>K=IAGA>J:KCL=AGL=QCFA>=EEC=GA<X>?=<E:F>=GL=AGu
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
wN0 ^:WI?=>AFDAKKC@C<>>?=<CL=AGu
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
xN0 h?=>=@CFCI;@A>J>?@C=>Fu^:WI=<J:;E@CVC<>A>u
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
*[5-,-57)
tN0T@C=>C=<D;FCCL=AG=II:;<>A<J=?::N
wN0kAF>>?CL:F>ALE:@>=<>FCI;@A>J>?@C=>F:<S<>C@<C>
12
34567465(9*4+6,5-((
./012344567(
(
89:;<=:>?@AB:CD;EA<FGAACFHHA<=>AIJF;:H:=>D@=D>F??K:HF>:A=;LM=DAI>9DNFOA@
;AI>PF@D;@DQ<:@DC>ACAJ@AP;:=G:;>9DR@AP;D@LR@AP;:=G:;NF:=KEKAAS:=G:=>A>9D
HA=>D=>AIT=>D@=D><;:=G>9D9E?D@K:=S;LUA<N<;>9FBDFGAACJ@AP;D@F=CSDD?
<?CF>:=G>9DJ@AP;D@VA>9D@P:;D:>NFEJDHANDF;DH<@:>E>9@DF>LWDF@H9:=G:;FBD@E
:N?A@>F=>FH>:B:>EA=>9DT=>D@=D>F;:>HA=>F:=;9<GDFNA<=>AI:=IA@NF>:A=L
89D@DIA@DV;DF@H9D=G:=D;F@D>AJD<;DCD;;D=>:FKKE>A;DF@H9GAAC:=IA@NF>:A=L
WDF@H9D=G:=D;<;D;;?:CD@;>9F>;DF@H9>9DPDJIA@:=IA@NF>:A=FJA<>>9DPA@C;L89D
:=IA@NF>:A=>9D=:;:=CDXDCL89D;D:=CDXD;?@AB:CD>9DPA@CF=CYZ[AI>9D
CAH<ND=>P9D@D:>:;<;DCL89:;:=IA@NF>:A=FKA=GP:>9A>9D@:=IA@NF>:A=FJA<>>9D
CAH<ND=>;9DK?;:=>9D?@AHD;;AI;DF@H9:=GL\NF:KF=CH9F>F@D>PANF:=F??K:HF>:A=;
AIT=>D@=D>L\NF:KFKKAP;EA<>A;D=CND;;FGD;P9:KD>9DA>9D@?D@;A=NFE=A>JD
?@D;D=>>A@DHD:BD:>P9:KDH9F>>:=G@DQ<:@D;F?D@;A=@DHD:B:=GF=C@D?KE:=GLUA<N<;>
<;D:=>D@=D>:=F;FIDNF==D@A>9D@P:;DEA<NFEJDDX?A;DC>ANF=E;DH<@:>E>9@DF>;L
./](5^2_`62(ab(9c`9d(7b36(e6bf6`22
(
9g6+h(7*i7(e7*j76--(k(
lLm nJ@AP;D@:;;AI>PF@D>9F>FKKAP;EA<>AFHHD;;F=CC:;?KFEFo8p[CAH<ND=>
A@PDJ?FGDI@ANFPDJ;D@BD@L89DCAH<ND=>I:@;>GD>;CAP=KAFCDCFKA=GP:>9
FKK>9D@DKF>DCI:KDF=C>9D=:;C:;?KFEDC:=FJ@AP;D@P:=CAPL89D@DF@D
C:IID@D=>S:=C;AIqDJJ@AP;D@;r8DX>JF;DCVs@F?9:HFK<;D@:=>D@IFHDJF;DC
J@AP;D@;VtFBFD=FJKDCJ@AP;D@;Lu@D;D=>CFEJ@AP;D@;F@DDQ<:??DCP:>9NF=E
IDF><@D;:=HK<C:=G;DH<@:>EL
vLm wANN<=:HF>:A=:;;>F@>DCJEEA<P9D=D:>9D@EA<HK:HSF9E?D@K:=SA@>E?DF
PDJFCC@D;;xYZ[y:=>9DJ@AP;D@FCC@D;;JF@L
zm 89DJ@AP;D@I:@;>>FSD;>9D9DK?AI{|W>A@D;AKBD>9DTuFCC@D;;AI>9D
PDJ;:>DL
zm 89D=:>@DQ<D;>;F8wuHA==DH>:A=P:>9>9DWD@BD@F=C;D=C;>9D@DQ<D;>
IA@>9DPDJ?FGDA=HD>9DHA==DH>:A=:;D;>FJK:;9DCL
zm 89D;D@BD@:=@D;?A=;D;D=C;JFHS>9D@DQ<:@DCPDJ?FGDF=CF=E
FCC:>:A=FK@DQ<D;>IA@?FGD;L89:;P9AKDHANN<=:HF>:A=:;GABD@=DCJE
o88u?@A>AHAKL
}Lm nHAAS:D:;F;NFKK>DX>ND;;FGD;D=>JEFPDJ;D@BD@>AEA<@PDJHK:D=>L89:;
ND;;FGDHA=>F:=;>9D:=IA@NF>:A=>9F>EA<9FBD;<JN:>>DC>A>9F>qDJWD@BD@L
\BD@E>:NDEA<HA==DH>>A>9D;D@BD@>9F>9F;;D>>9DHAAS:DV>9D:=IA@NF>:A=
HA=>F:=DC:=>9DHAAS:D:;;D=CJE>9DJ@AP;D@>A>9D;D@BD@L
wAAS:D;F@DO<;>>DX>I:KD;>9F>HF=JDCDKD>DCF>F=E>:NDL89DEHF==A>;?@DFC
B:@<;D;A@9F@NEA<@9F@CC@:BDLoAPDBD@V>9DENFEJD@:;S>AEA<@?@:BFHEL
UA<;9A<KC=A>G:BDEA<@:=IA@NF>:A=A=<=?@A>DH>DC;:>D;~FK;A=DBD@IA@GD>>A
CDKD>DHAAS:D;V:I;ANDJACEDK;D:;;9F@:=GEA<@HAN?<>D@D:>9D@:=EA<@;><CE
HD=>D@VAII:HDA@HEJD@HFIL
9g6+h(7*i7(e7*j76--(.(
lLm WDF@H9D=G:=D;F@D;?DH:FK;:>D;A=>9DqDJ>9F>9DK?;EA<>AI:=C:=IA@NF>:A=
;>A@DCA=A>9D@;:>D;L89D@DF@DC:IID@D=HD;:=>9DPFE;BF@:A<;;DF@H9D=G:=D;
PA@SLR<>>9D@DF@D>9@DDJF;:H;>D?;P9:H9NA;>;DF@H9D=G:=D?D@IA@N(
FLm qDJw@FPK:=G
JLm T=CDX:=G
HLm WDF@H9:=G
12
345674658))
/0 162)374.5-46)789:;<=;<:9>?/@;9<9<@ABAC<=>B=D9:?;EE;9<D9:FBGH/IBD *4)+,67,-6.)
@A/@BJ;D@K/DB/>LAB<I;<BB?HE9MDDHBL;/ED9:@N/>B>9G9@DKL/EEB=DH;=B>DK@9
GC;E=E;D@D9:@ABN9>=D:9C<=9<FBGD;@BDOP>9LBDD9:GC;E=;<IE;D@GMDH;=B>D
;DL/EEB=L>/NE;<IO
G0 34Q6R-46)8S<LB@ABE;D@9:;<:9>?/@;9<9<FBGH/IBD;D?/=BK@ABDB/>LA
B<I;<BD@9>BD@AB;<:9>?/@;9<;</N/M@A/@;@L/<GBDB/>LAB=9<N9>=D/<=E;D@
>BE/@B=TUVDO
L0 W647XY-46)8ZB/>LA;<I@A>9CIA@AB;<=BJ;<[9E[BD/CDB>GC;E=;<I/\CB>M/<=
DCG?;@@;<I;@@A>9CIA@ABDB/>LAB<I;<BO
]O ZB/>LA;<I;?HE;BD@MH;<I@AB>B\C;>B=DB/>LA@B>?;<@9@ABDB/>LA:;BE=/<=
H>BDD;<I@ABZB/>LAGC@@9<
/O ^;>D@M9CD;?HEM@MHB 8C@9>;/ED9:_`V
abcdefgbdbghedeijgdklmdekngdddddddopmelqirstdludvwxy
8ABDBL9<=DB/>LAN;EEGB?9>B/LLC>/@B/D;@L9<@/;<B=@ABBJ/L@HA>/DBO
GO T<;[B>D;@;BD/<=z{<=;/9>TZ|0O
LO T<;[B>D;@;BD/<=z<9@zTZ|9>}>;@/;<0
SU
~ T<;[B>D;@;BDTZ|}>;@/;<
=0 EB/<;<IH>9LBDD9:I9E=LEB/<;<IH>9LBDD9:BNBEEB>M
)
8A;DN;EEI;[BE;D@9:NBGH/IBDNA;LAA/DLEB/<;<IH>9LBDD9:I9E=/<=<9@9:
BNBEEB>MO
)
3Y6X)
7)7
676))
2O ?/;EH>9[;=BD:B/@C>B9:L9<@/L@DKDB<=;<ID/?B?/;E@9?/<MHB>D9<K
:9>N/>=;<I?/;ED;</==;@;9<@9GB;<I[B>M:/D@O
]O ?/;E=9BD<9@>B\C;>B>BLB;[B>9:@AB?/;E@9GBH>BDB<@/@@AB@;?B9:DB<=;<I
@AB?/;EO8AB>BLB;[B>?/M9HB<@ABB?/;ENAB<B[B>DABE9ID;<OA/@K
A9NB[B>K;D/DM<LA>9<9CDL9??C<;L/@;9<O
O 8AB;<:9>?/@;9<DA9CE=GBDBB<KN>;@@B</<=?/=B/[/;E/GEB/@@AB>B\C;>B=@;?B
@9@AB/C@A9>;B=HB>D9<9<EMOS@AB>@A>B/@;<LEC=BD[;>CDBD/<=H>;[/LM9:
;<:9>?/@;9<O8ABGBD@D9EC@;9<;<DCLAL/DBD;D@9CDB;<@B><B@C=;L;9CDEMOTDB
I99=/<@;[;>CDD9:@N/>B/<=:;>BN/EEK=9<9@I;[BM9C>;<:9>?/@;9<9<<9<
DBLC>BNBGD;@BDK=9<9@=9N<E9/=L9<@B<@:>9?C<D/:BNBGD;@BDB@LO
))*3W)
)
NNNON;;HB=;/OL9?
A@@H7NNNOB;COB=C
A@@H7NNNO<B;COB=C
12
345674659)4*6+5,
-.3/ 0 1234556394/37.833
8579*5976
:;< =>?@ABCD?EA>
:;F GHIJD?EKJL
:;2 MNOJP@>E>Q
:;2;F MNRJP@>E>Q
:;2;2 MNRJP@>E>QS@ADJLLJL
:;2;: T>JUPVWRJAXMNDA>?J>?P>BYCWWA@?N=Z[G\
:;2;] ^GG_OM
:;2;` TBKP>?PQJP>B_ELPBKP>?PQJAXJNRJP@>E>Q
:;: MRJD?@A>EDMBCDP?EA>PRaJLAC@DJL
:;] bARRPHA@P?EA>L
:;` YADEPR[J?cA@dE>Q
:;1 eRAQ
:;f YCVVP@g
:;h T>LcJ@L?AbiJDdjAC@S@AQ@JLL
:;k lC@?iJ@aJPBE>QL
0mn3./o7p-9/37.
TLBELDCLLJBE>?iJW@JKEACLC>E?q=>?J@>J?iPLVP>gPWWREDP?EA>LXA@E?LCLJ@;=>?iJ
@JDJ>??EVJLqA>JAX?iJVPIA@PWWREDP?EA>LAX=>?J@>J?iPLHJJ>?iJrJH2;<
?JDi>ARAQEJL?iP?P@JEBJ>?EXEJBHgVA@JE>?J@PD?EKJ=>?J@>J?HPLJBPWWREDP?EA>L;YAVJ
AX?iJWAWCRP@?JDi>ARAQEJLCLJBE>rJH2;<E>DRCBJstu^OqbPLDPBE>QY?gRJYiJJ?L
vbYYwqJs?J>LEHRJ^P@dCWOP>QCPQJvs^OwqTLg>Di@A>ACLxPKPYD@EW?A>s^O
vTIPUwqaCHgA>aPERLqTBAHJlRJUqxPKPP>BE?LX@PVJcA@dLqStSqTYS;>J?P>BVP>g
VA@J;uiJPEVAX?iELC>E?EL>A??AE>?@ABCDJgAC?A?iJLJ?JDi>ARAQEJLHC?XPVEREP@EyJ
gACcE?iLAVJAX?iJEVWA@?P>?PWWREDP?EA>L?iP?iPKJHJJ>BJKJRAWJBCLE>Q?iJLJ
?JDi>ARAQEJLC>BJ@?iJrJH2;<;uiJLJ>JcJ@PWWREDP?EA>LP@JPRRAcE>QgAC?ABAP
>CVHJ@AXPD?EKE?EJL?iP?cJ@JC>?iE>dPHRJE>?iJRPL?BJDPBJ;uABPgqgACDP>QA?A
LADEPR>J?cA@dE>QLE?JL?i@ACQiciEDigACDP>XE>BP>B@JVPE>E>?ACDicE?igAC@
X@EJ>BL;jACDP>LiP@JgAC@WED?C@JLqKEBJALqEBJPLcE?i?iJV;jACDP>QAA>?AVPdJ
VP>g>JcX@EJ>BL;jACDP>PRLA@JQEL?J@P>BL?CBg?i@ACQiA>RE>JVJP>L;jACDP>QJ?
PDDJLL?AA>RE>JL?CBgVP?J@EPRq?C?A@EPRLqXJJBHPDdLgL?JVP>BLAA>;uiCLqE>?J@>J?
iPL?iJPHERE?g?A?@P>LXA@VgAC@REXJ;tAcJKJ@qgACVCL?CLJ=>?J@>J?E>?JRREQJ>?Rg
A?iJ@cELJE?DP>HJKJ@gBEL?@PD?E>QPRLA;jACVCL?CLJ?iJA>RE>JPD?EKE?EJLXA@HJ>JXE?
P>BPBKP>DJVJ>?AXgAC@DP@JJ@;
uiELC>E?ELP>P??JVW??AW@AKEBJgACE>XA@VP?EA>A>LAVJAX?iJWAWCRP@PWWREDP?EA>L
AX?iJ=>?J@>J?E>@JDJ>??EVJL;
0mz73{29/3|28
TX?J@QAE>Q?i@ACQi?iELC>E?qgACLiACRBHJPHRJ?A}
~ BJXE>J?iJWC@WALJAXJNRJP@>E>Q
~ BJLD@EHJ?iJW@ADJLLJLE>JNRJP@>E>Q
~ JUWRPE>?iJCLJAXrEdE
~ WP@?EDEWP?JE>bARRPHA@P?EA>A>?iJ>J?
~ ?PdJL?JWL?ABAYADEPR>J?cA@dE>QP>B
~ D@JP?JPLEVWRJeRAQ;
12
345
1234564778089 7889)*+,)-./00
:;<=>?@A@BACD@=DEFG=HDCFIC=JF=?HCD@FG=K@F=?@=FFG>FJ=CL?AM=C>@NED?HDE
<=>?@A@BFG>FACE>LA<AF>F=J>L>J=HAL><<NMNFG==<=LF?D@ALH=>@COPILGH=>@CH>NM=
A@FG=ED?HDEHI<FAH=JA>?ALGLD@F=@FCQR=MM>C=J<=LFI?=C>@JR=MM>C=JFIFD?A><CD?
F?>A@A@BS?DB?>HH=COK@B=@=?><Q:;<=>?@A@BACCF?D@B<NCISSD?F=J=<=LF?D@AL><<NMNFG=
>JHA@ACF?>FAT=Q>L>J=HAL>@J>CC=CCH=@FS?DL=CC=CO
PDH=DEFG=>LFATAFA=CFG>FH>NM=JD@=ICA@BCILG=<=LF?D@ALED?HICA@BR=MCAF=C
A@L<IJ=S?DTAJA@BHI<FAH=JA>M>C=JLD@F=@FCQS?DTAJA@B>CCAB@H=@FCQLD@JILFA@BD@
<A@=F=CFCQ<=LFI?=CD?JACLICCAD@CFG?DIBGR=MLD@E=?=@LA@BQE==JM>LUD@CFIJ=@FC
RD?UQCFIJ=@FS?DB?=CC?=SD?FFDE>LI<FN=FLO
PDH=DEFG=H>VD?>JT>@F>B=CDE:;<=>?@A@B>?=W
X KF><<DRCL?=>FAD@>@JE>CFISJ>F=DED@<A@=LD@F=@FCO
X YDIH>NIC=FG=LD@F=@FC>FNDI?DR@S>L=>@JLD@T=@A=@L=O
X :;<=>?@A@B><CDS?DTAJ=C>SDCCAMA<AFNDECF>@J>?JAZ>FAD@DELD@F=@FCFG>FL>@M=
LG>@B=JHILGE>CF=?O
X KFG>CFG=SDF=@FA><DES?DTAJA@B@=R<=>?@A@BDSSD?FI@AFA=CO
X [\]^_\]`ab__cdcec\fbg_\hi`j\k_cj\`l^m\cbjO
X n<=oAMA<AFNDES?DB?>HH=pLDI?C=H>@>B=H=@FCILG>CCFIJ=@FH>NLGDDC=
LDI?C=CDEFG=A?LGDAL=CO
X q<<DRCL?=>FAT=J=T=<DSH=@FDE@=RLDI?C=CA@CS=LAEAL>?=>CO
X :;<=>?@A@BM?A@BCS=DS<=FDB=FG=?>@J><<DRCCG>?A@BFG=A?=oS=?A=@L=>@J
FGDIBGFCO
X YDIL>@JD>@=;<=>?@A@BS?DB?>HH=E?DH>@NRG=?=A@>HILG=>CA=?R>NO
X KF><<DRC=oS>@JA@BMDI@J>?A=C>@JB>A@U@DR<=JB=RAFGDIFG>TA@BFD<=>T=
GDH=O
X rT=?><<QA@B=@=?><=;<=>?@A@B><<DRCC>TA@BDE?=CDI?L=CO
PDH=DEFG=U=N?=sIA?=H=@FCED?>BDDJ=;<=>?@A@BCNCF=H>?=W
X qCILL=CCEI<=;<=>?@A@BCNCF=HJ=S=@JCD@BDDJCFIJ=@FA@F=?>LFAD@QC=<E;
HDFAT>FAD@DEA@JATAJI><CO
X qCFIJ=@FG>CFDCFIJNA@>@=EE=LFAT=H>@@=?OtGACAC=CC=@FA><>CFG=?=AC@D
F=>LG=?FDHDFAT>F=D?J?AT=FG=CFIJ=@FO
1232u4564+v.).wxv-*4//4/
PA@L=Q>@N=;<=>?@A@BS?DV=LFLG=LUCNDI?>LGA=T=H=@FC>B>A@CF><=>?@A@BDIFLDH=Q
FG=?=ED?=QAFCF>?FCRAFGAJ=@FAEAL>FAD@>@JT=?AEAL>FAD@S?DL=CCOtG=LDHHD@S?DL=CC
IC=JED?FGACSI?SDC=ACFG=IC=DEyC=?@>H=>@Jz>CCRD?JOYDI>?=>CU=JFD<DBA@FD
FG==;<=>?@A@BCNCF=HM=ED?=NDICF>?FICA@BAFO
r@L=NDI>?=CILL=CCEI<<N<DBB=JA@FDFG=CNCF=HOtG==;<=>@A@BFDSALCD?LD@F=@FC
>?=S?=C=@F=JFDNDIFDSALMNFDSALOtGACLD@F=@FH>NA@L<IJ=F=oFQB?>SGALCQTAJ=DQ
>IJADQ>@AH>FAD@Q<A@UFDDFG=??=E=?=@L=COK@B=@=?><QCILGLD@F=@FH>NM=ED<<DR=J
MNCDH=sIAZD?sI=CFAD@CFG>FF?NFD>LL=CCNDI?I@J=?CF>@JA@B>MDIFFG=FDSALFG>F
NDIG>T=CFIJA=COtG==;<=>?@A@BCNCF=HCH>NM=>{=>?@A@B|>@>B=H=@FPNCF=H
}{|P~D?D@F=@F|>@>B=H=@FPNCF=H}|P~?I@@A@B>CFG=M>C=CNCF=HOtG=C=
CNCF=HCG=<SA@?=LD?JA@BA@ED?H>FAD@>MDIFNDI;CILG>CFAH=CS=@FMNNDID@>
FDSALQH>?UCCLD?=JMNNDIA@>E==JM>LUsIAZ=FLOq<<CILGA@ED?H>FAD@H>NM=C=@FFD
FG=LD@F=@FJ=CAB@=?>C>E==JM>LUQRGDA@FI?@H>NHDJAENFG=LD@F=@FDEFG=M>CACDE
12
345674659)4*6+5, -./0//123456772-389/1:;.<6=39/>?/3@989A6B6-/C6<DD7@-/12BEFG7@HFGI8??
.3J/1800/@/9--BD/670<6/@6I.7I8??.3J/1800/@/9-344/66@8A.-6:K7@/L3CD?/=3
6-<1/9-C3B2/3??7I/1-76//-./479-/9-670-./47<@6/66M./.36@/A86-/@/107@=
.86M./@647@/689J3@87<6N<8OO/63913668A9C/9-6=I./@/3639896-@<4-7@C3B?7A89-7
47@@/4--./6D/48084479-/9-=?731393668A9C/9-07@-./6-<1/9-7@39/IJ81/707@-./
6-<1/9-=D@7J81/3?895-739/I8CD7@-39-C3-/@83?=?77589-747967?813-/16-<1/9-
@/6D796/39181/9-80BI/359/66/689-./479-/9-6=81/9-80B-./6-<1/9-6I.73@/
1/03<?-89A3910891I3B6-7479-34--.76/6-<1/9-6C3B2/<689AGFG:;.<6=-./
-/4.97?7ABD@7J81/639<C2/@70I3B63-/34./@39136-<1/9-43947CC<9843-/I8-.
/34.7-./@-.@7<A.-.//>?/3@989A6B6-/C:P?/36/97-/-.3-/>?/3@989A-/4.97?7A8/63@/
3J38?32?/89-./D@/6/9--8C/=79?B-.3--./B9//1-72/D@7D/@?B.3@9/66/107@-./
D@7D/@-/34.89A?/3@989AD@74/66:G7C/70-./34-8J8-8/6-.3-C3B2/<91/@-35/92B
6-<1/9-689-.//>?/3@989AD@74/66Q
R E7A89:
R H79-/9-344/663913668C8?3-879:
R <91/@-35/07@C3-8J/366/66C/9-79?89/:
R 07@C3-8J/366/66C/9-<689A3668A9C/9-63911864<668796:
R S/--89A-./0//123457907@C3-8J/366/66C/9-391I7@589A-7I3@1634.8/J89A
?/3@989A7<-47C/6:
R H7CC<9843-879I8-.-./6-<1/9-6-.@7<A.J3@87<6C/396?85/T/C38?=4.3-=
GFG=3917-./@C/396:
R S7-.@7<A.36<CC3-8J/366/66C/9-:
R F/36<@89A-.//00/4-8J/9/6670/>?/3@989A391D/@07@C394/366/66C/9-:
R U/47189A6-<1/9-34.8/J/C/9-63914/@-80843-879:
P?/36/97-/-.3-8-8697-9/4/663@B-.3-3??-.//>?/3@989A6B6-/C.3J/3??6<4.
34-8J8-8/6:V7I/J/@=3A771/>?/3@989A6B6-/C6.7<?1.3J/C76-70-./6/34-8J8-8/6:
WXYXY Z[\6]74^4_9)45645`6a6b)+c645d7)*6,,
e/J/?7D89AfE/3@989A479-/9-68636D/483?86/134-8J8-B:;./N<3?8-B70/>?/3@989A
@/?3-/6-734.8/J/C/9-670-./72g/4-8J/670-./479-/9-2B-./?/3@9/@6:h/--/@N<3?8-B
/>?/3@9/@479-/9-4392/4@/3-/180B7<07??7I3D@7D/@D@74/6670/>479-/9-
A/9/@3-879:i68CD?//>?/3@989A479-/9-D@74/6686A8J/989-./K8A<@/j:k:
stuvwvxyzv{| }|y~v
tt~{ tv|
l^_m76WXnop,^c+b6q6a6b)+c645+7)*6,,r)7q6a6b)+c645)r6[b6]74^4_*)45645,
12
345
7.+91/)/23+/4456789:;:<=>?;<=:;@=6A;B9;6CAD=8=7<6;6CEFG=HA;I=:BE<AD= 7889)*+,)-./00
@=I=8EJK=6AEBHE6A=6ABE<AD=A7<C=A7?@;=6H=LMD;:JD7:=78:E8;:A:AD=B;676H;78N
A=HD6E8EC;H7876@A;K=HE6:A<7;6A:BE<AD==O8=7<6;6CJ<EG=HALPA78:E=67F8=:
;@=6A;B;H7A;E6EBAD=C7JF=AQ==6AD==RJ=HA=@S6EQ8=@C=EBAD=A7<C=A7?@;=6H=76@
QD7AAD=9:DE?8@S6EQ7BA=<CE;6CAD<E?CDAD=HE?<:=LMD;:B7H;8;A7A=:AD=@=:;C6
JD7:=L
T4/)U.23+/44P6KE:AE<C76;V7A;E6:AD=@=:;C6JD7:=;6IE8I=:@=I=8EJK=6AEB7
:AE<9FE7<@AD7AK79;6H8?@=7HE6H=JAB8EQNA=RANC<7JD;H:NI;@=EN7?@;EN76;K7A;E6;B
6==@=@LP6AD;:JD7:=9E?K7978:E@=:;C6AD=F7:;H>?=:A;E6:AD7AK?:AF=76:Q=<=@
F9AD=8=7<6=<7BA=<CE;6CAD<E?CDAD=8=7<6;6CHE6A=6ALWE?K7978:E@=:;C6AD=
;6A=<B7H=76@;6A=<7HA;I;A9@?<;6CAD;::A=JL
0X894X4.,+,)-.23+/44PKJ8=K=6A7A;E6JD7:=F<;6C:AD=@=:;C6AE8;I=HE?<:=
K7A=<;78LWE?K79A7S=AD=D=8JEBI7<;E?:=RJ=<A:BE<AD;:JD7:=;6H8?@;6CHE6A=6A
=RJ=<ANC<7JD;H=RJ=<AN;6A=<7HA;E6@=:;C6=<NQ=F@=:;C6=<=AHL
Y4Z)[)*+,)-.23+/44@?<;6CAD=\=<;B;H7A;E6JD7:=AD=HE6A=6A::EJ<E@?H=@H76F=
A=:A=@AE@=A=<K;6=;B;A;:HE6I=9;6CQD7A;A;:=RJ=HA=@AEHE6I=9LPAK7978:EF=
?:=@AEHD=HSAD=?:7F;8;A9B=7A?<=:EBAD=J<E@?HALWE?K79J=<BE<KI=<;B;H7A;E6:F9
=O8=7<6;6C=RJ=<A:E<:7KJ8=EBA7<C=A7?@;=6H=L
]^_^] 7.`a+X894-[`bc-.,4.,+.def88-Z,b0ghij
Pklmn?:=:AQE@;BB=<=6A=OJ87ABE<K:BE<KJ<EI;@;6C8=7<6;6C76@:?JJE<ALMD=B;<:A
J87ABE<KJ<EI;@=::=I=<78J<EC<7KK=:B<EKAD=Q=F:;A=oppqrsstttuvwxyzyx{vx|u}~uvxL
MD;:Q=F:;A=:?JJE<AK769B=7A?<=::A7<A;6CBE<KE68;6=7@K;::;E6AE@=8;I=<9EB
HE6A=6A:76@E68;6=@;:H?::;E6:=::;E6:LEK=EBAD=:H<==6:@=KE6:A<7A;6CAD=:=
7HA;I;A;=:7<=:DEQ6;6AD=;C?<=LL
L
)UfZ4]^_40ghij-.9).48Z-UZ+XX4/
12
23456354893)5*4+
,-./65010233934-35*69.65665+97289:;
<=>?>@ABCDEFGHAIJG=FGK?LBC>IC>M>EADJ>BGFGNOPQRK?SF?>CABNOPQRTKUK
T=K@=K??LDDAIG>CSVG=>WQQXYZEKU>E>FIBKB[FBC@ABG>BGJFBF[>J>BG?V?G>J\
<=>JAC>EAH>]E>FIBKB[F?@AB@>KM>CFGNOPQRK?[KM>BKB^K[LI>_\`
¸¹º»¼½º¾¿ÀºÁ¼ÃÄŹÀºÁƹ½ ÕÆÒÈ¿Òº¹ÒÓÒÁ¼½ºÁ¼½º¾¿ÀºÁ¼ÒÈ
ÂÄŹÀºÁƹ½
»ÊËÃÌÃ͹¼ ÜÁ¼ÒÈÝÒ¾Þ½Ô
â »¼½º¾¿ÀºÁ¼ ο¾½¹Ê¿ÁϹÐ
ѹҾ¼Á¼Ó üÈÁ¼¹½¹È×Ø ÕÖÒÚ½Û Ê¾ÒϹ½
ǹÈÁƹ¾É ÒÀºÁÆÁºÁ¹½Ô Ù¹½º½ ÕÆÒÈ¿ÒºÁ¼
ÕÖ¹¾ÀÁ½¹½
Ù¹ÒÀ๾áѹҾ¼¹¾»¼ÆÂÈƹڹ¼ºÁ¼ÒÈȽºÒÓ¹½
ܹ¹ÏÄÒÀ޺ ߽½¹½½Ú¹¼º
ѹҾ¼¹¾½
,-./6501a2:35974b5c69*9+5d5e45563-3.f9d5497289:;
ghijklmnokmpmqrsrtiqiuokiuvwhktxsrypsqzoki{tlm|ysqlm}}ikz~
X>GFKE>CC>?@IKDGKABAH>F@=SEA@UK?ALGEKB>CS>EAT
2 ¡ ¢£¤¡¥¡¦
AS§>@GKM>?KBFE>FIBKB[JACLE>?L@=F?FRBKGAIF¨EA@U<QG=>LBC>I?GFBCKB[
F@=K>M>CF?J>F?LI>CSVG=>©>EH<>?GAIKBG=>KBG>IF@GKAB?KBCK?@L??KAB?\
23+46/)4-93ª54-«56¬2NB?GIL@GKABX>EKM>IVJFVL?>CKHH>I>BGJAC>?\
NGJFVS>G=>@ABM>BGKABFE@EF??G>F@=KB[\®DE>F?>BAG>G=FGG=K?JAC>E>M>B
>BMK?F[>?G=>@EF??IAAJF?T>EEF?>]E>FIBKB[¯
NGJFVS>I>@AIC>C°KC>AY>@GLI>?S>KB[L?>CSVF@ALB?>EAIHAIF[IALDAH
?GLC>BG?\
NGJFVS>G=>©>EHKB?GIL@GKABFEJFG>IKFE®?L@=F?G=K?SEA@UKG?>EH¯C>?K[B>CFBC
C>M>EAD>CHAIF@ALI?>SVNOPQR
NGJFVS>G=>DIA[IFJJ>DAIGFEEKU>K[BALABEKB>AIFBVAG=>I>]±ABG>BG
²>S?KG>AHNOPQR\
³BV=VSIKCAHG=>?>JAC>?JFVFE?AS>>JDEAV>C\
289:;:*5389/6+58/-d5´2:88µ2<=>AD>B@ALI?>[LKC>K?FB>¶G>BC>CM>I?KAB
AHVALI·IA[IFJJ>OLKC>\<=>AS§>@GKM>AHKBGIACL@KB[G=>NQ±OK?GA=>ED?GLC>BG
11
345
1234256789:3275:;7<3:=7<8>?:5@:A>737B87C2@?256789:327575D77@ 7889)*+,)-./00
><BBA?9?53:8E=753?53FGHIJ9:E;?9:253:25?@;E34?I7<8>?K:5:D?9?53J87<BF
L.9).4MN49OP4/,/+.QR44Q5+*S,-,T4U4+V.4V/WXD77@?@<=:3275>E>3?92>75?
34:3B87C2@?>6??@;:=Y3723>A?:85?8>:3>?C?8:A>3:D?>76>3<@E25:=7<8>?FZ42>
6??@;:=Y9:E;?B87C2@?@<>25D>?A63?>3>34:338E37@?3?8925?4719<=434?E4:C?
<5@?8>377@:D:25>334?25>38<=3275:A7;[?=32C?>>3:3?@2534?\A7=Y]^52376>3<@EFX3
B8?>?5334?>?3?>3>:8?2534?678976I4?=Y_7<8`87D8?>>?a?8=2>?>25E7<8>3<@E
9:3?82:AFZ4?>?3?>3>9:E;?=75@<=3?@2534?6<3<8?3EB2=:AAE<>25D75A25?BA:36789>
A2Y?K7@<A?bKc78?C?575:d2Y2F
7//4//e4.,W_7<:>:>3<@?534:>37<5@?83:Y?6789:32C?:>>?>>9?5312346??@;:=Y
34:3625@>7<334??a3?53766<A62AA9?53767;[?=32C?>7634?A?:8525DFX3B8?>?53
:>>2D59?53:8?34?377A>37@7><=4:>>?>>9?53Ff71?C?8g25:?hA?:8525D>E>3?9:
5<9;?876B7>>2;2A232?>?a2>3>34:39:E;?<>?@2534?6<3<8?Fc79?7634?>?:=32C232?>
9:E;?>3<@?53B:832=2B:3275:5@?5D:D?9?53>25>B?=262?@A?:8525D:=32C232?>A2Y?
B8:=32=?>?>>275>gD87<B@2>=<>>275>gA:;78:378E?aB?829?53>g3?89B:B?8>g=8232=:A
182325Dg?3=F
ij+e).+,)-./+.Qik+9l+,)-.WZ42>2>:B:8376c<99:32C?:>>?>>9?537634?
>3<@?53:=42?C?9?53FZ4?7C?8:AA=7<8>?9:E4:C?:3?89h?5@?a:925:3275FX3
B8?>?53g><=4?a:925:32752>3487<D4:6789:A?a:925:3275>E>3?9Ff71?C?8g1234
@?C?A7B25D3?=457A7DE9:E;?256<3<8?g239:E3:Y?:@266?8?536789Fm78?a:9BA?g
>79?B:837634?><99:32C?:>>?>>9?539:E4:BB?53487<D475hA25??a:925:3275>:>
2>:A8?:@E;?25D@75?678C:827<>B876?>>275:A=?83262=:3275:5@?538:5=??a:925:3275>F
Z4?@?3:2A>75n?@E@4:8::8?D2C?52534?>?=3275oFoF
pqrqst-Ql9+VL5u4*,vLV)4.,4Qwx.+e)*U4+V.).yi.k)V-.e4.,ztLLwUi{
KHH|b}2>:68??:5@7B?5h>7<8=??hA?:8525D>7631:8?BA:36789FG3B87C2@?>6?:3<8?
678b?:85?8>:5@=753?539:5:D?9?53FG534?B:>3@?=:@?g234:>;?=79?C?8EB7B<A:8
67834?@?A2C?8E76?hA?:8525D=753?53:5@>3<@?539:5:D?9?53F_7<=:5D?3:==?>>37
256789:32758?A:3?@37K77@A?67834?1?;>23?~
z`A?:>?8?6?837
m2D<8?oFFXA3?85:32C?AEgE7<9:E@715A7:@34?K77@A?>7631:8?:5@=8?:3?E7<8
715>?8C?84:C25DK77@A?
R)ylV4pqW-e4+y4-OtLLwUi
12
345674659)4*6+5, -./00122341566789/:;<1/=:/>.?3@3A=.B3415..;<1C1>2@31DE.?B/E:11;3.
0=1/31/:/00.?:3F-41G=.0122.A0=1/3@.:.A/:/00.?:3C@345..;<1@22.B1C4/3
2@B@</=3.C4/3E.?;.A.=0=1/3@:H/:EI:31=:13>/21;/00.?:3<@J11B/@</00.?:3F
-41G.G?</=@3E.A566789B/E>1/33=@>?31;G=@B/=@<E3.341A/0334/3@3@2A=11/:;
@3/<<.C2;E:/B@00.:31:30=1/3@.:A/0@<@3@12FI34/2/:?B>1=.A3..<2/K/@</><1A.=
B/:/H@:H/:?B>1=.A23?;1:32.:<@:1FI:/;;@3@.:3.0.:31:3B/:/H1B1:3D566789
G=.K@;12/:?B>1=.A3..<2A.=>?@<;@:H@:31=/03@.:/B.:H341<1/=:@:H0.BB?:@3EF
-4?2D/<<.C@:H0.<</>.=/3@.:/:;G11=3.G11=<1/=:@:H@:341<1/=:@:H0.BB?:@3@12F
-41>123C/E3.<1/=:566789@2=1/;3?3.=@/<.:566789A=.B341566789
C1>2@31F-41B/@:0.:31:3G/H1A.=34@2C1>2@31@224.C:@:L@H?=1MF1F
NOPQ76RSTUVWWXYZ9)Q7,6+[P6
L@:/<<EDG<1/21:.3134/334121;/E2341=1/=121K1=/<23/:;/=;2C4@044/K1>11:
;1K1<.G1;A.=23/:;/=;@\/3@.:.A<1/=:@:H0.:31:32F5667892?GG.=32B.23.A34121
23/:;/=;2F];13/@<1;;@20?22@.:.:3412123/:;/=;2@2>1E.:;34120.G1.A34@2^:@3F
RS_S̀abc[45[P6,[4bXO,[bc[45[P6,)dZeY6[74O4P
f1A.=1C1;@20?22/>.?3/;K/:3/H12/:;;@2/;K/:3/H12.A1g<1/=:@:HDE.?24.?<;
J:.C34/31g<1/=:@:H@2h?23/:.341=B.;1<A.=<1/=:@:HFI3@2:.334/3@30/:=1G</01/<<
.341=A.=B2.A<1/=:@:HB.;1<2Fi.C1K1=D@3G=.K@;1221K1=/<.GG.=3?:@3@1234/3B/E
>1.A>1:1A@3A.=0=1/3@:H01=3/@:<1/=:@:H@:23/:012Fj.B1.A34121.GG.=3?:@3@12/=1k
l I3/<<.C2G.22@>@<@3@12.A0.?=21B/31=@/<>?334/3=1m?@=10.:23/:32?GG.=3.A/
0.?=2131/BF
l -41<1K1<.AG/=3@0@G/3@.:.A23?;1:3@:<1/=:@:HB/E@BG=.K1/2@3G=.K@;12
/:E3@B1D/:EC41=1<1/=:@:HD>?3@:/:E0/2134123?;1:34/23.>1B.3@K/31;>E
3410.?=2131/BA=.B3@B13.3@B1F
l 9g<1/=:@:H;.12@BG=.K1341I-2J@<<2.A@:;@K@;?/<2/:;B/E@BG=.K1341@=3@B1
B/:/H1B1:32J@<<2F
l -410.:31:3<@J1=10.=;1;<103?=12B/E>1K@1C1;>E/23?;1:3/3/:E3@B1D
4.C1K1=D341@:31=/03@K12?GG.=334/3=1m?@=1231/041=/3341.341=1:;B/E23@<<
>1/K/@</><1@:2<.331;3@B1.:<EF
12
345
1 2345567896:36;<48:=<83:><?34@3ABA3A<8B<=9<48A59CD:3D<74=<366;:@E6F 7889)*+,)-./00
A?3<=F<=<?@<A?83:><?38395<6F5<4=?A?GA8?634>BA84D5<H
1 IJ5<4=?A?GGAB<8F5<KADA5A39A?@:==A@:5:;><8AG?4?>=<:8<6F@6?3<?38CE67<B<=C
3E<<KL<=33<4;E483676=M@6?834?35936;4M<3E43E4LL<?H
1 NE<G<?<=45:?><=834?>A?G6F<J5<4=?A?G48@683<FF<@3AB<;<@E4?A8;A86F3<?
;A85<4>A?GHO5<48<?63<3E43FA=83<J5<4=?A?GA84D6:33<4@EA?GJ5<4=?A?GL=6@<88H
P?9G66>3<4@EA?GJ5<4=?A?GL=6@<88A8=AG6=6:84?>=<Q:A=<88:D834?3A45@6838H
RSR TUTVWXYZ0VT[\V7W0YZ7UXT]Y\XVT]
2?3E<L=<8<?3<=4C96:@4?G<34@@<8836454=G<?:;D<=6F<5<@3=6?A@<>:@43A6?45
=<86:=@<83E=6:GE3E<7<DHNE<8<=<86:=@<8;49D<6?>AFF<=<?38L<@A45A^<>4=<48H
NE<8<=<86:=@<8A?@5:><3E<<5<@3=6?A@_6:=?458C<?@9@56L<>A48C>A@3A6?4=A<8C>AGA345
5AD=4=A<8C<>:@43A6?45=<86:=@<>434D48<8CA?><KA?G4?>4D83=4@3A?G>434D48<84?>
<5<@3=6?A@D66M8H`67<B<=CL5<48<?63<3E4386;<6F3E<8<=<86:=@<8=<Q:A=<L4A>
8:D8@=AL3A6?HNE<8<=<86:=@<84556796:36D=678<3E=6:GE3E<4D83=4@38C8<4=@E6?
B4=A6:836LA@8C4?>4@@<883E<@6;L5<3<A?F6=;43A6?F6==<8<4=@EA?8L<@AFA@4=<48H
a6;<6F3E<8<<5<@3=6?A@=<86:=@<84=<5A83<>D<567b
IJc6:=?4584?>d434D48<8
1 Pef dAGA345gAD=4=9
1 Ihaei>434D48<
1 2Igi?5A?<
1 caNij
1 g479<=8e655<@3AB<f4G4^A?<
1 g<@3:=<?63<A?f43E<;43A@8
1 f43E8a@Ak?<3
1 O=6_<@3f:8<
1 O=6l:<83
1 aL=A?G<=gA?M
1 N4956=4?>m=4?@A8
nNiIJ5AD=4=9
2?><KA?G4?>PD83=4@3A?Gd434D48<8b
1 g2aP
1 cJo43<
IJh66M8
1 e=<>6j<F<=<?@<8
1 2><4Jj<F<=<?@<j<86:=@<8
1 p<3gAD=4=9
30q0
rstsuvwxywz{|yx}~{{}{xxyws{w{xws
yt{|yyxyv{~xyvxywy nAMA834?>8
F6=nE432
3E<@6;;:?A39HP7AMAA84L4G<6=@655<@3A6?6Fn<DL4G<8><8AG?<>36@=<43<4?> {|v
<>A3@6?3<?38HnAMA8:LL6=38E9L<=5A?M84?>E488A;L5<3<K389?34KF6=@=<43A?G?<7
zwyvrstsuvwxywv{~vy{xywy|yvsyv{ywyy}yw~xyv{}{~s
7<D8A3<84?>F6=M?675<>G<;4?4G<;<?3HNE<@6554D6=43AB<<?@9@56L<>A4CnAMAL<>A4
A86?<6F3E<D<83Jt{||stsuv{wsv
yxwxy~yx
6F4=3A@5<8455@=<43<>4?>;6><=43<>D93E<@6;;:?A39Hn4=>e:??A?GE4;
><B<56L<>3E<FA=837AMA86F374=<JnAMAnAMAn<DA?22H
12
345674659)4*6+5, 9-.7.*567/,5/*,)01/2/
3 456766896:;<=>>?;@6<:;?;AB<;?<:C;A6:=8DE=@;C?:CF?;=:;8;5E=@;<56:G68
:G;5676H;I<6:;J
3 H676E?CKC:;<K;=868@LB>:CE6F=<<CF6=:6C8<I;:5;;8A6LL;?;8:E=@;<IDK=768@
E=@;>687F?;=:6C89;?D;=<DJ
3 H676E?CKC:;<A6<FB<<6C8=8A=><C7;;E<:G;G6<:C?DCLFG=8@;<CL=ACFBK;8:J
M/NO76PQRS13T3/41/2/+6U/.
VCBF=85?6:;ACFBK;8:<68=5676B<68@=K=?7BE>=8@B=@;JVCBF=8<;;=5676E=@;
B<68@5;II?C5<;?JH676E=@;<=?;FC88;F:;A:G?CB@GGDE;?>687<JWC68@;8;?=>X=
56766<A=:=I=<;LC?F?;=:68@X;A6:68@XI?C5<68@X=8A<;=?FG68@:G?CB@G68LC?K=:6C8J
48C:G;?;Y=KE>;CL5676Z=<<:=:;A68<;F:6C8[J\]6<^;AD=AG=?=X=><CF=>>;A:G;
_`abcbE;8dCB?<;`B6A;Z6CF@]5676JeG;L6@B?;[Jf<GC5<:G;GCK;E=@;CL
^;AD=AG=?=CL_`abcghhijkklmnopngpqprstuvwrpxrsukyszsk
M/NO76PQ{S|6U}.U-.7.~/2/
12
345
1234536575895:2;98<2<65<=9299>2?8@8?:8A89B@<:572@B7=927?725<8BC5C3238<8CD 7889)*+,)-./00
B@:2;>5D29EFC<62?592B@FGHIJK<62:8A89B@<:572=9238CL2385M8A8N<62
95O29B@<:572=923;4<62@5OB=9M8A8>2385EF<89598O>P2949<2O<65<2C5;P29
?725<8BCB@:2;>5D29:8<6B=<ACB:8CD<62Q4>27<2R<L57A=>S5CD=5D2TQULSVEF<
72W=8729BCP4?BOOBC:B73X>7B?2998CD9A8PP9K5C3ACB:P23D2B@9BO2L2385M8A8
<5D9<B:B7AE1234536575O54;2=9238C<62@=<=72@B753O8C89<75<8Y25C35?532O8?
5?<8Y8<8299=?659Z
[ \=778?=P=O]298DC3B?=O2C<9
[ \BO>8P5<8BCB@3B?=O2C<9
[ ^22>8CD358P472?B73959:2PP59>279BC5P8C@B7O5<8BC
[ ]2Y2PB>8CDS257C8CDL5<2785P98C5?BPP5;B75<8Y2O5CC27
1234536575:8PP>7BY832@BPPB:8CD8C@B7O5<8BC5;B=<Y578B=9?B=7929Z
[ \B=792I;_2?<8Y2
[ \B=792?BC?2><O5>:68?6P8CA9<BP257C8CDOB3=P2
[ `2W=2C?2B@P257C8CDOB3=P29
[ \B=7929=>>B7<5C3?B=C92P8CD32<58P9E
[ \B=792?5P2C357
[ a998DCO2C<9572=>PB5323
[ \B=7922Y5P=5<8BC5>>7B5?6
[ b2@272C?29K:2;72@272C?29
[ 1832BP2?<=729;4FGHIJ5C3B<627P2?<=7279E
[ FC9<7=?<8BC<25O5C3?BC<5?<32<58P9E
F<@=7<627>P5C9<B65Y2>7272W=898<2W=8c@B79<=32C<9<B?62?A<65<<62465Y25;598?
ACB:P23D2@B7<5A8CD=><65<?B=7925C3@223;5?A949<2OD8Y2C;49<=32C<9<B<62
?B=792<25OE
d)efg4hijk7lg-eg+mm4l+e4-.n4op+oq+g+r)s)
12
345674659)4*6+5, 9-6*./)0717)276,,3
45 6789:;<=<8>?:?@ABCDE8><<F=<8>?:?@GCH>;<;I:979>8J:9:C?8KLC?FG8DEH;
GCH>;<;A
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
25 NCIJC<F=<8>?:?@GK8;;<;IC>OA
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
P5 NCI:;<FK<8>?:?@H;<QHKQC>R?:S<>;:9:<;A
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
T5 6789:;I:O:ANCI:;:9H;<QHKA
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
U5 6789:;VWWX=YA
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
Z[\ 9]^^_`]a_b3]cd
BCKK8eC>89:C?:;J<Q:?<J8;8?8G9C>E>CG<;;CQIC>O:?@9C@<97<>C?8E>Cf<G9C>;CD<
:?9<KK<G9H8K8G9:S:9g5
hH9I789:;97<:DEC>98?G<CQGCKK8eC>89:C?Ai7<IC>KJ:;:?G><8;:?@Kge<GCD:?@
@KCe8K:;<JC?:;;H<;K:O<<?S:>C?D<?9E>C9<G9:C?LGC?9>CKCQ9<>>C>:;DL:?9<>?89:C?8K
eH;:?<;;LK<8>?:?@<9G5j?;HG7G78?@:?@G:>GHD;98?G<;L<S<?97<;G:<?9:Q:G
<kEKC>89:C?;78S<e<GCD<GCKK8eC>89:S<5i7H;L:?97:;@KCe8KIC>KJL>CK<CQ97<j?9<>?<9
9CCK;:;9C<?8eK<GCKK8eC>89:C?8DC?@E<CEK<5l>CD97:;E<>;E<G9:S<G789L?<I;
@>CHE;LI:O:;8KK8><;CD<e8;:G9CCK;QC>GCKK8eC>89:C?5BCKK8eC>89:C?:?SCKS<;eC97
GCDDH?:G89:C?8?J;78>:?@CQ:J<8;5VCJ<>?J8g;G:<?G<L9CG<>98:?<k9<?9L78;
e<GCD<GCKK8eC>89:S<5iCJ8gLgCHD8gQ:?J8?HDe<>CQ><;<8>G7E8E<>;GC8H97C><J
egD8?gE<CEK<;98g:?@89@<C@>8E7:G8KKgJ:S<>;<EK8G<;5
Y8G7GCKK8eC>89:S<E>Cf<G978;;<S<>8K;CG:8KLECK:9:G8KL<97:G8K8?J9<G7?:G8K:;;H<;9789
8><9Ce<8JJ><;;<;8997<;98>9CQ97<E>Cf<G9:9;<KQ5
mCD<CQ97<O<gnH<;9:C?;8J:;9>:eH9<JGCKK8eC>89:S<E>Cf<G9?<<J;9C8JJ><;;8><o
6:KKGHDHK89:S<I:;JCD<D<>@<Q>CD97<GCKK8eC>89:S<<QQC>9;ApQ9<>8KK8
GCKK8eC>89:S<E>Cf<G98K;C><nH:><;@CCJ:?S<;9D<?95m<S<>8K><;<8>G7E8E;<>;78S<
e<<?I>:99<?8eCH997<e>C8J;<9CQ;HGG<;;D<8;H><;8?JQ8G9C>;97898><><;EC?;:eK<
QC>;HGG<;;QHKGCKK8eC>89:C?5qCHD8g><Q<>9CQH>97<>><8J:?@;@:S<?8997<<?JCQ97:;
R?:9QC>DC><J<98:K;5
mCD<CQ97<8><8;I7<><GCKK8eC>89:C?78;e<<?QCH?J9Ce<;HGG<;;QHK:;97<8><8CQ
E7g;:G8K;G:<?G<9789><nH:><;7H@<:?S<;9D<?9:?<kE<?;:S<J<S:G<;5NCI<S<>L:Q97<
8K><8Jg<k:;9:?@K8e;G8?JC8J:;9>:eH9<JGCKK8eC>89:S<899<DE997<?97<CS<>8KKGC;9CQ
8E>Cf<G9D8ge<><JHG<J5W?<;HG78><8D8ge<97<7:@7F<?<>@gE7g;:G;5p?C97<>
:DEC>98?98><8:?97:;J:><G9:C?D8ge<N<8K97mG:<?G<;5mCD<CQ97<GCDEK<kJ898
:?9<?;:S<E>CeK<D;:?GKHJ:?@@<?<9:G;L?<H>CKC@gLe:CD<J:G:?<<9G5D8g><nH:><
:?9<>?89:C?8KE8>9:G:E89:C?5i7<97:>J:DEC>98?98><8QC>GCKK8eC>89:C?:;97<
Y?S:>C?D<?98Km9HJ:<;L97:;8K;C><nH:><I:J<;E><8JJ898GCKK<G9:C?8?J:?SCKS<D<?9
CQK8>@<GCDDH?:9:<;5mCD<CQ97<9CE:G;CQGC?G<>?D8ge<97<<GCKC@g5i7<K89<;9
12
345
1234567895:;7<3=742735:=>?;@3?;1?;2A?>3?87873B>@5:45>>?C58?@2677::58@3DEF7 7889)*+,)-./00
7?8@FGB?H71?@??;1I>5C?>@3B;?A2<?8;2;I393@7AA?9C7C?3715;<58>1<217
45>>?C58?@25;D
J33@?@717?8>278KA53@5:@F7@55>3B3715;@F7L;@78;7@4?;C7B371:5835A7:58A5:
45>>?C58?@25;DM5<7678K<7<5B>1>2H7@53F5<?;7N?A=>75:45>>?C58?@267@55>:58
3@B17;@DO55I>7P543235;73B4F@55>@F?@A?97;?C>795B@5487?@7?45>>?C58?@267
=85Q74@87=58@5;>2;7DR5BA?9487?@7?154BA7;@B32;I2@?;13F?872@<2@F95B8
45>>7?IB73<F52;@B8;A?9C7?C>7@5?1145;@7;@@52@:85A?;9<F787K712@2@?;1
1234B33?C5B@2@B32;I?1234B3325;I85B=DS587N?A=>7K95B<?;@?87<82@2;I?
8737?84F=?=78<2@F:7<5@F78<82@783DR5BA?9487?@7?18?:@87=58@@F?@A?9C7
712@71C95@F78<82@7835;>2;7DT>7?37;5@7@F?@2;3B4F?4?37?>>5:95B?87<58H2;I
5;@F73?A7154BA7;@DT>7?37;5@7@F?@@F23154BA7;@A?9C7?3=87?13F77@58
=8737;@?@25;58QB3@@7N@154BA7;@D
U)VWX4YZ[\]^--V94_-*/
U)VWX4YZ[[]^--V94-.9).4`8X4+a/b44,
12
345674659)4*6+5, -./.01203456789.:;<=7<001><21?.@A17?.@.?3AB.5?5.:?8AC.72<5<=?D==.7AEFGF1:;
H;<>AH72<>1?IJ:1;;.?.<:4?8A2A12A/1:3?<<051@1.01>0A<:K.:;<L51:;MNJO=<2
7<001><21?.<:I
H:<?8A25<=?L12A?81?71:>A65A;=<27<001><21?.<:.5P<<Q0AK1@AIJ?100<L53<61
5812A;LA>5R17A=<2;.57655.<:<2L<29.:Q?<QA?8A2.:1Q2<6RIS<6/1365A?AB?4
R8<?<Q21R854/1R5A?7=<2?8.5R62R<5AIT8.55<=?L12A105<7</>.:A57<001><21?.<:
L.?8A/1.04781?4/A551Q.:QA?7IT8A=<00<L.:Q=.Q62A58<L5151/R0A572AA:<=
P<<Q0AL1@AU
VWXY76Z[\]^_`a+b6c))Xb6d`e6_*7664
T8A2A12AR0A:?3<=<?8A2LA>f>15A;7<001><21?.<:?<<05IgA2A12A1=AL<=?8A/U
h6iẀdWjW
H5;.57655A;A120.A24CA;.1K.9..5?8A5<=?L12A.:L8.78K.9.RA;.11:;JDkPL.9.
<=JPNDM81@A>AA:;A@A0<RA;IJ?.51@A235./R0A?<<0?81?100<L5/60?.R0ARA<R0A?<
/19A1:;7<//.?781:QA5.:1;<76/A:?IJ?9AAR5?8A@A25.<:<=A178781:QAIC1:3
M:.@A25.?.A581@A65A;?8.55<=?L12A?<;A@A0<R17<001><21?.<:5R17AI
l)m)
n<8<.51;.@.5.<:<=nDgDk<2R<21?.<:41M-f>15A;-<=?L12Ak</R1:3In<8<.51
@A23Q<<;5.?A=<27<001><21?.<:IJ?:<?<:03100<L55./R0A/6:;1:A?15950.9AQ2<6R
A;.?.:Q4;<76/A:?5812.:Q4Q2<6R781?4A?7>6?105<R2<@.;A55</A/1:1QA/A:??1595
0.9A/.0A5?<:A?2179.:Q4.:@<.7A72A1?.<:41:;<?8A2?A1/?1595IT8A=.Q62AoIGo58<L5
?8A572AA:<:n<8<Ip<2/<2A;A?1.05<:n<8<43<6/13@.5.??8ALA>5.?AU
12
345
7889)*+,)-./00
1)2344567589:;:<-*/+.<=-4<84-*4//-4
>-93.,444?-@83,).28
ABCDEFGHIBJDJKHLMCNMEOIICMCKKHPCLHIJCNJBIGEMCNMEOICQRCKSNIEELMCDOSIJNT
FGELEUCSHKKCFUCSLGHLVFHLELEBCSLMEBICPESBEVQCLIGEOSLOCBECQBCDECNKJNE
OLCWEMIXYNEBSMGOLCWEMIIGHIJBGCBIEVPUZOHMEZMJENME[HPCLHICLUHIIGE\NJRELBJIU
CQ]HKJQCLNJH^_EL`KEUJBQCLZEHLMGCQabILHcdELLEBILJHKeNIEKKJTENMEMHKKEV
ZadefgCDEXdGJBOLCWEMIEDOKCUBHBCQIFHLEOKHIQCLDMHKKEV_Yeh]IGHIUCSNEEV
ICVCFNKCHVJNMHBEUCSFJBGICOHLICQIGEOLCWEMIXYNME^UCSPEMCDEOHLICQIGE
OLCWEMIIGENUCSLMCDOSIELEbEMSIEBBCDECQIGEVHIHIGHIJBMCNBIHNIKUPEJNTLEMEJREV
QLCDBENBCLBXdGJBOLCWEMIGHBOHREVIGEFHUQCLRCKSNIEELMCDOSIJNTPSIGHBNCI
KCMHIEVHNUabILHdELLEBILJHKBCQHLXiCSMHNCPIHJNDCLEVEIHJKBCNIGJBOLCWEMIQLCD
IGEFEPBJIEjkklmnnopkqrkjstpuvpwxpypzup{|nX}EBEHLMGEBJNdHJFHNHLEDH`JNTHN
HIIEDOIICSBERCKSNIEELMCDOSIJNTICRJBSHKJ~EEHLIGSH`EBX
56 :?07
3:0
ABCMJHKNEIFCL`JBHNEIFCL`CQJNVJRJVSHKBFGJMGGHREBCDEBCLICQJNIELVEOENVENME
CNEHMGCIGELXdGJBJNIELVEOENVENMEDHUPEJNIGEQCLDCQQLJENVBGJO^`JNBGJO^
MCDDCNMHSBEBHNVBCCNXAZCMJHKNEIFCL`JNTBELRJMEDHUPECQQELEVIGLCSTGHFEP
BJIECNIGEeNIELNEIXZCDECQIGEOCOSKHLBCMJHKNEIFCL`JNTBELRJMEBHLEYL`SI^
HMEPCC`^dFJIIEL^[JN`EVKN^UZOHME^LJENVJNVEL^iHGCC^]KHBBDHIEBHNV
DHNUDCLEX
iCSNEEVICLETJBIELICHBCMJHKNEIFCL`JNTBELRJMEJNCLVELICSBEJIXZCDECQIGE
QEHISLEBOLCRJVEVPUIGEBEBELRJMEBHLE
]LEHIJCNCQHOLCQJKEOHTECQUCSLCFNJNQCLDJNTCIGELBHPCSIIGEJNQCLDHIJCNIGHI
UCSFCSKVKJ̀EICBGHLEHPCSIUCSX
JEFJNTCQOLCQJKEOHTEBCQCIGELBX
]LEHIJNTUCSLCFNNEIFCL`CQQLJENVBX
ZEHLMGJNTCNKJNEQLJENVBX
12
345674659)4*6+5, - ./0012345/6789/:;52812<=5645/6=61<2>;?
- @A7612345/60A5/3A0;72><BC<61<2D<;?
- @A761235=7/>1572>E1><5:749<0A65/3A45/F/9<G7C5C/876H<9;10<HA<6<
45/D72C/045/6E1><5;=563<2<678C/981DE1<H<6;A1C?
FA<@5D1782<0H56I1230<DA258531<;A7E<5C<2<>/C72<HH74=5612=56:7015272>
I25H8<>3<;A76123?@5D1782<0H56I1237885H;12;072072<5/;D5::/21D701525=
12=56:70152058763<7/>1<2D<?J0A<8C;123<2<6701238763<;D78<C/981D6<;C52;<05
<:<63<2D4;10/70152;0A70:745DD/6>/6123>1;7;0<6?K2<;/DA/;<5=;5D178
2<0H56I12372>:5918<0<DA2585341;D10<>120A<=/60A<66<7>123;LHA<6<0A<;<0558;
H<6<A<8C=/8=56<:<63<2D46<;D/<;L72>370A<612372>>1;;<:12701236<78M01:<
12=56:701529435E<62:<2073<2D1<;L120A<D7;<5=04CA552>1;7;0<612F71H72?
FA<=13/6<N?OP;A5H;7;D6<<25=D5::52;5D1782<0H56I123;<6E1D<;Q
RSTU76VWXYZ[\]^+_6\)*S]_`65a)7bS4T\67cS*6
@5D1782<0H56I123;5:<01:<;D729<C50<2017884/2;7=<?d)U]76]ecS,6e4)55)+U5
]4f*)4gSe645S]_S4g)7^]5S)4]h)U5f)U)4,U*i,S56,Wj5/:/;0/;<;/DA;<6E1D<;
=56355>6<7;52;72>250:1;/;<0A<:?@5:<97;1D;<D/6104C581D1<;=56;/DA;10<;76<Q
- .8<7;<>5250;A76<45/67DD5/206<870<>12=56:70152;/DA7;/;<627:<72>
C7;;H56>?
- k8H74;;D7245/6D5:C/0<6=56E16/;<;72>;C4H76<?
- l52507>>;06723<6;7;45/6=61<2>;795/0HA5:45/76<250;/6<795/00A1;mA<6
1><20104?
- k8H74;:7I<;/6<05;1325/052D<45/A7E<>52<45/6120<2><>7D01E101<;
- n<;061D00A<12>1E1>/78;HA5:74;<<45/6C65=18<?
- l5250/;<97>567336<;;1E<E5D79/876452;/DAH<9;10<;?
- l52507885HC<5C8<05/;<;/DA;10<;=56/287H=/8C/6C5;<;?
12
234
012 3456 67789)*+9,-.//
789:;<=>?@<;A?>B?C??DAC;?<=C?>C;AA?D=<;DE9CF=A;9D9CD?><9D=G=CA;HI8=C 789::;D:;<
<I@J?HAKL9IF=MHB99<?=DM<I@J?HAE9C>C;A;D:=@89:8;N?E99OPB?=8ABP9C ?F?C:;D:=<
;DE9CF=A;9D=@9IAQRSTUO=A?<?AHKV@89:F=MH9F@;D?A?WAP;F=:?<P9C9AB?C >9DO?CEI8>=MA9
F?O;=H9FG9D?DA<XB9>?Y?CPF9<A@89:<=C?A?WAI=8KZB?MF=M=8<9GC9Y;O?8;DN<A9 <B=C?=DOGI@8;<B
9AB?C>?@G=:?<9C@89:<KQD=OO;A;9DP@89:=889><M9IA98?=Y?H9FF?DA<;D=D M9ICY;?><Kt9<A
;DA?C=HA;Y?E9CF=AK789::;D:;<@?H9F;D:;DHC?=<;D:8MG9GI8=C=F9D:<AIO?DA<=<;A E=F9I<G?C<9D
=889><M9IGI@8;<B=DON??GC?H9CO9EM9IC;O?=<9Y?CA;F?KQD=OO;A;9DPM9IF=M:?A AB?<?O=M<B=Y?
<9F?I<?EI8H9FF?DA<9DM9IC;O?=<F=M@?EC9FM9ICA?=HB?C9CM9ICG??C:C9IG9C AB?;C9>D789:K
9AB?CG?9G8?KV@89:D??OD9A@?C?<AC;HA?OA9=<;D:8?=IAB9CX;AH=DF?C:?O;EE?C?DA
N;DO<9E;O?=<P;DH8IO;D:E?889><AIO?DA<PA?=HB?C<P=DO<I@J?HA<G?H;=8;<A<KVD
?W=FG8?[\]]^_`àbcdefghidjgkK̀
l9mno301pqrl3s38,m.
11
345674659)4*6+5, -./01.234567853/.9:;:75;<757=.05.87<35;:/>;<7:83?/@93>AB<713993?:/>:5
3/731;<72./0?7@5:;75;<834><?<:C<034C./C87.;703483?/@93>A
DEFG76HIJKLM46)N5O6P6Q,E565OR5RSS)P,T)G5)*76R56QS)F
U3993?:/>.87;<79:5;31532731;<7;067531@93>5;<.;.87C4887/;90:/4573/
V/;78/7;AW7<.X7/3;>:X7/>8.6<:C.97Y.2697531;<757@93>5AZ34245;7Y69387
@93>53/:/;78/7;:;5791A
[ \38638.;7./=38>./:].;:3/.9@93>5^2.0@7457=138683_7C;:/>38>./:].;:3/.9
C49;487./=2.8`7;@8./=:/>A
[ \.;7>380@.57=@93>5^@93>53/6.8;:C49.854@_7C;9:̀7;8.X79a<7.9;<a
7/X:83/27/;a245:Ca7=4C.;:3/./=2./03;<78A
[ b93>5<.X:/>=:11787/;27=:../==7X:C7;0675^.@93><.X:/>3/90X:=7352.0
@7C.997=cdefa<.X:/>3/909:/`52.0@7C.997=dghidefa;<787.872./054C<
C.;7>38:75a.93>13823@:97=7X:C752.0@7C.997=jekdefAB<7C3997C;:X7
C3224/:;031@93>5:5`/3?/.5;<7kdefelmnonA
p)P5)q5R75r)G7MP4sS)F
[ .>33=@93>>:/>578X:C7683X:=78AZ342.05797C;@93>>:/>578X:C7683X:=7859:̀7
t:X7u348/.9ab93>>78aW38=v8755AC32aw./>.aB42@98./=W7@5A-35;31;<757
578X:C75683X:=7;7269.;75138C87.;:/>./=64@9:5<:/>@93>5AZ342.0@7.@97;3
C<3357C393485./=9.034;1380348@93>A
[ Z34C./2.`7.@93>64@9:C3868:X.;7@.57=3/034887x4:8727/;5Ay68:X.;7@93>
2.0@76.55?38=683;7C;7=A
[ -.`717?5.2697635;:/>5./=;75;0348@93>138;<7933`./=1779Ay1;78
C32697;:/>;<7@93>64@9:5<;<7z{t310348@93>3/0348?7@5:;7A
[ |:5:;./=97.X7C3227/;53/3;<78@93>597.X:/>0348@93>.==875553;<.;;<70
C./.9532.`7.X:5:;;30348@93>A
[ z6=.;70348@93>187x47/;9053;<.;?<7/67369787;48/;<70<.X75327;<:/>/7?
;387.=A
q)}63,,G6,POES6QS)FFE4F
b93>>:/>2.087549;:/;353274/1387577/C3/57x47/C75:/C94=:/>97>.99:.@:9:;:75a
;<7871387a0345<349=@7X780C.87149?<:97@93>>:/>AZ345<349=/7X788797.57./0
C3/1:=7/;:.9:/1382.;:3/.@34;03438./03;<7867853/3838>./:].;:3/Av97.57=3/3;
457./0=71.2.;3809./>4.>7.>.:/5;./0@3=0:/.@93>Av97.57=3/3;=:5C455311:C7
12
345
123345637589:7;<8:6=><4264;4?45@A254B9<8B374<2C:92:4@8925496DC:8C374 7889)*+,)-./00
;<8:ED36789<FC83;48BB4CFDC:E2::5466D?4852;96D?4=
GH4*IJ-KLML-NL4//O
PQ R7@D6A8<<2;8523D8C964F8CSC345C43T
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
VQ R723254374FDBB454C3W2@68B6725DC:DCB85123D8C37589:7SC345C43T
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
XQ YZ[<2DC3742F?2C32:468B\<8::DC:=
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
]^_`abb7cJ
d7D6eCD37D:7<D:73668148B374[8[9<252[[<DA23D8C68B374SC345C43WD373742F?4C3
8BR4;V=f=d7D6eCD3D6C832;89337434A7C8<8:D46;932;893W723254374FDBB454C3
2[[<DA23D8C62CF78WA2C@89964378642[[<DA23D8C6=d74eCD3BD56372?4DC358F9A4F
@89384g<425CDC:2[[<DA23D8C6=S37D:7<D:736374Shije4g<425CDC:18F4<2CF374W2@
@89A2C2AA466Shije4g<425CDC:=d749CD32<68DC358F9A46@8938374[58A4668B
A5423D8C8B4gA8C34C36=d74eCD32<68[58?DF46DCB85123D8C8C4F9A23D8C2<546895A46
3723A2C;4B89CF8C374SC345C43=SC2FFD3D8CD3[58?DF46DCB85123D8C2;893374962:4
8BWDkD=Shije12@;496DC:l4F@2F7252WDkDB85D36A895646=mRDkDD62
A8<<2;8523D?4A8119CD3@W4;6D34W7454@89A2CA81[D<42CF[9;<D67374DCB85123D8C
[8634F;@FDBB454C354:D63454F96456=R472?42<68FD6A9664F38[DA669A726
A8<<2;8523D8C6E68AD2<C43W85kDC:2CF;<8::DC:=n8<<2;8523D8C2<<8W69638[253DAD[234
DCFDBB454C3[58o4A36B5818958WC[<2A46E68AD2<C43W85kDC:2<<8W6963867254
DCB85123D8CWD37B5D4CF62CF;<8::DC:2<<8W69638[9;<D67DCB85123D8C8C<DC4=m
W85F8BA293D8Cpqrstuvtwvtussxytvtuzzs{|ux{}~vw{|{}wvstu
tt}~}x
kC8W78W68148C412@1D6964DCB85123D8C2;89396=
]^ 7`3c`GGJacMcc``
GH4*IJ-KLML-NL4//
P= Yg<425CDC:D64<4A358CDA;264F<425CDC:37239646<2346334A7C8<8:D463869[[853
374F4<D?45@8B352DCDC:854F9A23D8C=Yg<425CDC:26B2526542A72CF2AA466D6
A8CA45C4F[58?DF46;433458[[8539CD3D46B85374<425C45=SC2FFD3D8CEDB4g<425CDC:
9646n8C34C32CF425C452C2:414C3@6341374CA2C[58?DF4964B9<3D[6B85
342A74562;893374<425C4562CF964B9<C4668BA8C34C3=Yg<425CDC:A2C2<68
69[[853DC3452A3D?D3@=
V= D5638B4g<425CDC:C44FC83C4A46625@;4A8CF9A34F262A<2665881<4A39548C
374SC345C43=S312@;4254A85F4F<4A39548526466D8CDCW7DA7639F4C3
9CF4532k46374639F@8B<425CDC:A8C34C3A54234FB85374[95[8648B4g<425CDC:=
d796E@89A2C<425C37589:78C<DC4639F@12345D2<E@89A2CDC3452A3WD37374
342A74596DC:412D<856@CA758C896A723EF88C<DC49D4685266D:C14C36E
[253DAD[234DCFD6A966D8C6=
12
345674659)4*6+5,
-. /01234565783592:;2<65=35>?3>;9>@A2B56C24;6@62;D=3>92EF4
<216C24657F51652<6;@358212345657G4F743==2;:;65712356578F5@25@;HF4
9125<6572012345657?6@AF@A24E382@FE3828F:4;2;.I59F@A@A283;2;H@A2426;35
FGGF4@:56@>@F25A3582@A2J:316@>FE12345657.
K. L2<63?6M66;;FE@?342@A3@253912;8F1139F43@6C2H<>53=688423@6F5FE?29;6@2;
83112<?6M6;@A3@83592:;2<@FG4FC6<265EF4=3@6F539F:@35F47356N3@6F5.O6M6
6;:;2E:13;6@311F?;2<6@657FE@A28F5@25@?6@AF:@35>G4F912=653
8F1139F43@6C2=35524.
P. LQQRS/6;3FG25;F:482;FE@?342@A3@6;C24>GFG:134@A2;2<3>;3;38F5@25@
<2C21FG=25@35<1234524=35372=25@;>;@2=.I@6;C24>GFG:1343=F57@238A657
8F==:56@62;EF4<2C21FG=25@35<<216C24>FE2<:83@6F531G4F743==2;.
9T6*UV)W7X7)Y76,,Z
[\ ]A28F1139F43@6F5A21G;65;A34657FE42;F:482;.]A2;242;F:482;=3>92>F:4
65@21128@:312EEF4@;HA34<?3428F=G:@657GF?24F435>F@A24EF4=FE38@6C6@>.
^F1139F43@6F5A21G;65;F1C6578F=G12_G4F912=<F=365;9><6;@469:@657@A2
G4F912=;.
`\ aF:835:;220=361b=2;;25724;24C682;H^A3@@657@F;A342>F:46<23;H
M5F?12<72H35<E221657.aF:835cF65;F863152@?F4M657;6@2;35<8423@2E4625<;
74F:G@F;A342>F:465EF4=3@6F5.aF:835:;2?29;6@2;@FG:916;AA:723=F:5@
FE65EF4=3@6F5F5I5@2452@.
-\ d1F7;6E:;2<G4FG241>835A21G>F:42_G42;;6F5.I@A3;@A2GF@25@631FE
G42;24C3657>F:46<23;H72@@6578F==25@;F5>F:46<23;35<<2C21FG657>F:4
6<23;.
efg hijklmjjmno3pqr
[. sttuvwvxyz{|}wy~vww}txxtvwt~t~vy
~vy~yv/<6@2<9>34>L.
Q1;F5H556==24=3535<3@A35dF;.a234FE:91683@6F5\
`. ???.?6M6G2<63.8F=
-. ???.E3829FFM.8F=
K. 2<:.91F7;.8F=
P. ???.=>52?91F7.8F=
. ???.675F:.38.65
. A@@G;2@63@AF=2.924M212>.2<:
1. ???.7FF712.8F=
. ???.NFAF.8F=
[2. A@@G???.=FF<12.F47
[[. O29`.235<65@2452@;F863152@?F4M657352?@FF1EF4<6;3;@24=35372=25@00
12;;F5;E4F=]36?35H:357^LH^A35/H><24H:9168L2<.7FC3@
¡¢£¤ ¥¦§¨©§ª©««b¬F:4820I5@2453@6F531I5c:4>
2;2348AB56@HR2G34@=25@FEI5@2453@6F531231@AH®FA5;FGM65;d1FF=9247
¬8AFF1FE:9168231@AH[PF4@AOF1E2¬@422@H¬:6@2/01[-`Hd31@6=F42H
L34>135<`[`2PHB¬.¤¯¡°±²¥¦¤
[`. A@@G???.?6M6AF?.8F=¬@34@030d1F7
12