2000 Challenge Bell – Singles

Jennifer Capriati was the defending champion, but lost in the final 6–4, 6–2 to Chanda Rubin.

Singles
2000 Challenge Bell
Champion Chanda Rubin
Runner-up Jennifer Capriati
Final score6–4, 6–2

Seeds

  1. Jennifer Capriati (Final)
  2. Chanda Rubin (Champion)
  3. Julie Halard-Decugis (Second round)
  4. Amy Frazier (Semifinals)
  5. Kristina Brandi (First round)
  6. Meghann Shaughnessy (Second round)
  7. Justine Henin (Withdrew)
  8. Lilia Osterloh (First round)
  9. Fabiola Zuluaga (Quarterfinals)

Draw

Key

Finals

Semifinals Final
          
1 Jennifer Capriati 3 7 7
4 Amy Frazier 6 5 5
1 Jennifer Capriati 4 2
2 Chanda Rubin 6 6
  Meilen Tu 5 1
2 Chanda Rubin 7 6

Top half

First Round Second Round Quarterfinals Semifinals
1 J Capriati 6 77
LL J Lee 6 1 3 J Nejedly 4 63
J Nejedly 2 6 6 1 J Capriati 7 6
S Jeyaseelan 6 6 S Jeyaseelan 5 0
M Irvin 3 3 S Jeyaseelan 77 6
Q J Chi 1 2 6 M Shaughnessy 64 4
6 M Shaughnessy 6 6 1 J Capriati 3 7 7
4 A Frazier 5 6 7 4 A Frazier 6 5 5
E Callens 7 4 5 4 A Frazier 6 6
Q M Washington 2 3 Q T Snyder 4 1
Q T Snyder 6 6 4 A Frazier 6 6
WC M-È Pelletier 1 4 Q M Vento 2 2
A Stevenson 6 6 A Stevenson 3 1r
Q M Vento 6 6 Q M Vento 6 2
8 L Osterloh 0 3

Bottom half

First Round Second Round Quarterfinals Semifinals
5 K Brandi 4 4
T Poutchek 6 6 T Poutchek 6 6
A Jidkova 2 5 Ľ Cervanová 1 0
Ľ Cervanová 6 7 T Poutchek 0 7 0
R Kolbovic 4 4 M Tu 6 5 6
M Tu 6 6 M Tu 77 7
H Parkinson 1 2 3 J Halard-Decugis 65 5
3 J Halard-Decugis 6 6 M Tu 5 1
9 F Zuluaga 6 6 2 C Rubin 7 6
N Pratt 4 3 9 F Zuluaga 4 6 6
E deLone 77 7 E deLone 6 2 2
WC M Marois 61 5 9 F Zuluaga 3 6 2
J Hopkins 4 7 6 2 C Rubin 6 3 6
B Rippner 6 5 3 J Hopkins 2 5
2 C Rubin 6 7
gollark: I don't have control over it much, it runs on an ISP-supplied router and I haven't changed that.
gollark: My ISP is slightly less bad than usual about this.
gollark: Yes.
gollark: My public IP works fine for me on my network. IPv4 and v6.
gollark: Presumably the idea is to just remove/backdoor the encryption stuff which is easily used and accessible to consumers (encrypted messaging, full disk encryption on phones), which is not going to stop anyone who is doing evilness but will definitely allow widespread surveillance on most people.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.