SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Criminology The scientific study of the causes and prevention of crime and the rehabilitation and punishment of offenders
Crimionology ,[object Object],[object Object]
What gives rise to ciminality? ,[object Object],[object Object],[object Object]
Possible explanations for “why people commit crimes?” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crime vs Deviant behavior ,[object Object],[object Object]
Deviance ,[object Object],[object Object]
The Measurement of Crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Characteristics of Offenders ,[object Object],[object Object],[object Object]
Characteristics of Victims ,[object Object],[object Object],[object Object],[object Object]
Criminal Justice Systems and Crime Victims ,[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt? (20)

CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 
Crime and society criminal theories
Crime and society  criminal theoriesCrime and society  criminal theories
Crime and society criminal theories
 
Theories of crime (criminology)
Theories of crime (criminology)Theories of crime (criminology)
Theories of crime (criminology)
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
 
Theories of Criminal Behavior and Rehabilitation Overview
Theories of Criminal Behavior and Rehabilitation OverviewTheories of Criminal Behavior and Rehabilitation Overview
Theories of Criminal Behavior and Rehabilitation Overview
 
Prevention of Crime
Prevention of CrimePrevention of Crime
Prevention of Crime
 
Basic introduction to crime
Basic introduction to crimeBasic introduction to crime
Basic introduction to crime
 
Crime definition
Crime definitionCrime definition
Crime definition
 
Criminology
CriminologyCriminology
Criminology
 
Criminology Theories
Criminology TheoriesCriminology Theories
Criminology Theories
 
Crime detection
Crime detectionCrime detection
Crime detection
 
Crime
CrimeCrime
Crime
 
Types of Crime presentation
Types of Crime presentationTypes of Crime presentation
Types of Crime presentation
 
Theories of crimes
Theories of crimesTheories of crimes
Theories of crimes
 
Classical school & Positive school
Classical school & Positive schoolClassical school & Positive school
Classical school & Positive school
 
Basics of criminology
Basics of criminologyBasics of criminology
Basics of criminology
 
The Elements of a Crime
The Elements of a CrimeThe Elements of a Crime
The Elements of a Crime
 
Criminology
CriminologyCriminology
Criminology
 
History of criminology
History of  criminologyHistory of  criminology
History of criminology
 

Andere mochten auch

The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of CriminologyJwooten2
 
Biological Theories of Crime
Biological Theories of CrimeBiological Theories of Crime
Biological Theories of Crimeknoxmodernstudies
 
Psychological explanations of criminal behavior
Psychological explanations of criminal behaviorPsychological explanations of criminal behavior
Psychological explanations of criminal behaviorJennifer Vogt-Erickson
 
Biological theory of crime
Biological theory of crimeBiological theory of crime
Biological theory of crimeUmair Aslam
 
Compilation of previous board examination questions
Compilation of previous board examination questionsCompilation of previous board examination questions
Compilation of previous board examination questionsRhem Rick Corpuz
 
9 Punishment: POWERPOINT
9 Punishment: POWERPOINT9 Punishment: POWERPOINT
9 Punishment: POWERPOINTmattyp99
 
Criminological theories
Criminological theoriesCriminological theories
Criminological theories91369
 
Biological Theories of Crime
Biological Theories of CrimeBiological Theories of Crime
Biological Theories of CrimeDani Cathro
 
Technique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board ExamTechnique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board Exammonde24836
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
GuideStar Webinar 10.02.14 Best Practices in Nonprofit Compensation
GuideStar Webinar 10.02.14 Best Practices in Nonprofit CompensationGuideStar Webinar 10.02.14 Best Practices in Nonprofit Compensation
GuideStar Webinar 10.02.14 Best Practices in Nonprofit CompensationGuideStar
 
Chapter 12
Chapter 12Chapter 12
Chapter 12glickauf
 

Andere mochten auch (15)

Criminology Powerpoint One 2008
Criminology Powerpoint One 2008Criminology Powerpoint One 2008
Criminology Powerpoint One 2008
 
The Classical School of Criminology
The Classical School of CriminologyThe Classical School of Criminology
The Classical School of Criminology
 
Biological Theories of Crime
Biological Theories of CrimeBiological Theories of Crime
Biological Theories of Crime
 
Social Theories of Crime
Social Theories of CrimeSocial Theories of Crime
Social Theories of Crime
 
Psychological explanations of criminal behavior
Psychological explanations of criminal behaviorPsychological explanations of criminal behavior
Psychological explanations of criminal behavior
 
Biological theory of crime
Biological theory of crimeBiological theory of crime
Biological theory of crime
 
Compilation of previous board examination questions
Compilation of previous board examination questionsCompilation of previous board examination questions
Compilation of previous board examination questions
 
9 Punishment: POWERPOINT
9 Punishment: POWERPOINT9 Punishment: POWERPOINT
9 Punishment: POWERPOINT
 
Criminological theories
Criminological theoriesCriminological theories
Criminological theories
 
Biological Theories of Crime
Biological Theories of CrimeBiological Theories of Crime
Biological Theories of Crime
 
Technique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board ExamTechnique and strategies on Criminology Board Exam
Technique and strategies on Criminology Board Exam
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Causes of crimes
Causes of crimesCauses of crimes
Causes of crimes
 
GuideStar Webinar 10.02.14 Best Practices in Nonprofit Compensation
GuideStar Webinar 10.02.14 Best Practices in Nonprofit CompensationGuideStar Webinar 10.02.14 Best Practices in Nonprofit Compensation
GuideStar Webinar 10.02.14 Best Practices in Nonprofit Compensation
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 

Ähnlich wie Criminology Power Point 1

Chapter 2 Criminal Justice
Chapter 2 Criminal JusticeChapter 2 Criminal Justice
Chapter 2 Criminal JusticeKatrina Homer
 
2Crime Occurrence Evaluation PaperProfessor M. Callaha.docx
2Crime Occurrence Evaluation PaperProfessor M. Callaha.docx2Crime Occurrence Evaluation PaperProfessor M. Callaha.docx
2Crime Occurrence Evaluation PaperProfessor M. Callaha.docxlorainedeserre
 
crime and society.docx-thus is a pdf based on the factors of crime affecting ...
crime and society.docx-thus is a pdf based on the factors of crime affecting ...crime and society.docx-thus is a pdf based on the factors of crime affecting ...
crime and society.docx-thus is a pdf based on the factors of crime affecting ...eveanchalvaj2206
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)Arete-Zoe, LLC
 
· What Did Robert Merton Know, AnywayChapter 12 discussed Polic.docx
· What Did Robert Merton Know, AnywayChapter 12 discussed Polic.docx· What Did Robert Merton Know, AnywayChapter 12 discussed Polic.docx
· What Did Robert Merton Know, AnywayChapter 12 discussed Polic.docxoswald1horne84988
 
Running head IDENTIFYING AND GATHERING RELEVANT DATA1IDENTIFYI.docx
Running head IDENTIFYING AND GATHERING RELEVANT DATA1IDENTIFYI.docxRunning head IDENTIFYING AND GATHERING RELEVANT DATA1IDENTIFYI.docx
Running head IDENTIFYING AND GATHERING RELEVANT DATA1IDENTIFYI.docxcowinhelen
 
Ongoing Delinquent Criminal Behavior
Ongoing Delinquent Criminal BehaviorOngoing Delinquent Criminal Behavior
Ongoing Delinquent Criminal BehaviorJenny Smith
 
Mapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docxMapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docxgertrudebellgrove
 
Urban violence in Nakuru, Kenya
Urban violence in Nakuru, KenyaUrban violence in Nakuru, Kenya
Urban violence in Nakuru, KenyaFamous Nakuru
 
Presented byJohn Lynch, Yamhill Co. Juv. Dept.SUPERVISION .docx
Presented byJohn Lynch, Yamhill Co. Juv. Dept.SUPERVISION .docxPresented byJohn Lynch, Yamhill Co. Juv. Dept.SUPERVISION .docx
Presented byJohn Lynch, Yamhill Co. Juv. Dept.SUPERVISION .docxharrisonhoward80223
 
Running head CRIMINAL BEHAVOR .docx
Running head CRIMINAL BEHAVOR                                    .docxRunning head CRIMINAL BEHAVOR                                    .docx
Running head CRIMINAL BEHAVOR .docxsusanschei
 
Hani hmed dessoki,forensic psychiatry
Hani hmed dessoki,forensic psychiatryHani hmed dessoki,forensic psychiatry
Hani hmed dessoki,forensic psychiatryHani Hamed
 

Ähnlich wie Criminology Power Point 1 (20)

Criminology.pdf
Criminology.pdfCriminology.pdf
Criminology.pdf
 
Chapter 2 Criminal Justice
Chapter 2 Criminal JusticeChapter 2 Criminal Justice
Chapter 2 Criminal Justice
 
2Crime Occurrence Evaluation PaperProfessor M. Callaha.docx
2Crime Occurrence Evaluation PaperProfessor M. Callaha.docx2Crime Occurrence Evaluation PaperProfessor M. Callaha.docx
2Crime Occurrence Evaluation PaperProfessor M. Callaha.docx
 
1-measuring_crime.ppt
1-measuring_crime.ppt1-measuring_crime.ppt
1-measuring_crime.ppt
 
Criminal Justice
Criminal JusticeCriminal Justice
Criminal Justice
 
crime and society.docx-thus is a pdf based on the factors of crime affecting ...
crime and society.docx-thus is a pdf based on the factors of crime affecting ...crime and society.docx-thus is a pdf based on the factors of crime affecting ...
crime and society.docx-thus is a pdf based on the factors of crime affecting ...
 
Sexual assault (2017)
Sexual assault (2017)Sexual assault (2017)
Sexual assault (2017)
 
Sexual Assault Training (2017)
Sexual Assault Training (2017)Sexual Assault Training (2017)
Sexual Assault Training (2017)
 
Chapter2
Chapter2Chapter2
Chapter2
 
Victimology
VictimologyVictimology
Victimology
 
· What Did Robert Merton Know, AnywayChapter 12 discussed Polic.docx
· What Did Robert Merton Know, AnywayChapter 12 discussed Polic.docx· What Did Robert Merton Know, AnywayChapter 12 discussed Polic.docx
· What Did Robert Merton Know, AnywayChapter 12 discussed Polic.docx
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Running head IDENTIFYING AND GATHERING RELEVANT DATA1IDENTIFYI.docx
Running head IDENTIFYING AND GATHERING RELEVANT DATA1IDENTIFYI.docxRunning head IDENTIFYING AND GATHERING RELEVANT DATA1IDENTIFYI.docx
Running head IDENTIFYING AND GATHERING RELEVANT DATA1IDENTIFYI.docx
 
Ongoing Delinquent Criminal Behavior
Ongoing Delinquent Criminal BehaviorOngoing Delinquent Criminal Behavior
Ongoing Delinquent Criminal Behavior
 
Mapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docxMapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docx
 
Urban violence in Nakuru, Kenya
Urban violence in Nakuru, KenyaUrban violence in Nakuru, Kenya
Urban violence in Nakuru, Kenya
 
ADJ 201-63 Criminology Lesson 1
ADJ 201-63 Criminology Lesson 1ADJ 201-63 Criminology Lesson 1
ADJ 201-63 Criminology Lesson 1
 
Presented byJohn Lynch, Yamhill Co. Juv. Dept.SUPERVISION .docx
Presented byJohn Lynch, Yamhill Co. Juv. Dept.SUPERVISION .docxPresented byJohn Lynch, Yamhill Co. Juv. Dept.SUPERVISION .docx
Presented byJohn Lynch, Yamhill Co. Juv. Dept.SUPERVISION .docx
 
Running head CRIMINAL BEHAVOR .docx
Running head CRIMINAL BEHAVOR                                    .docxRunning head CRIMINAL BEHAVOR                                    .docx
Running head CRIMINAL BEHAVOR .docx
 
Hani hmed dessoki,forensic psychiatry
Hani hmed dessoki,forensic psychiatryHani hmed dessoki,forensic psychiatry
Hani hmed dessoki,forensic psychiatry
 

Kürzlich hochgeladen

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Criminology Power Point 1

  • 1. Criminology The scientific study of the causes and prevention of crime and the rehabilitation and punishment of offenders
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.