2000 Challenge Bell – Singles
Jennifer Capriati was the defending champion, but lost in the final 6–4, 6–2 to Chanda Rubin.
Singles | |
---|---|
2000 Challenge Bell | |
Champion | ![]() |
Runner-up | ![]() |
Final score | 6–4, 6–2 |
Seeds
Jennifer Capriati (Final) Chanda Rubin (Champion) Julie Halard-Decugis (Second round) Amy Frazier (Semifinals) Kristina Brandi (First round) Meghann Shaughnessy (Second round) Justine Henin (Withdrew) Lilia Osterloh (First round) Fabiola Zuluaga (Quarterfinals)
Draw
Key
- Q = Qualifier
- WC = Wild Card
- LL = Lucky Loser
- Alt = Alternate
- SE = Special Exempt
- PR = Protected Ranking
- ITF = ITF entry
- JE = Junior Exempt
- w/o = Walkover
- r = Retired
- d = Defaulted
Finals
Semifinals | Final | ||||||||||||
1 | ![]() | 3 | 7 | 7 | |||||||||
4 | ![]() | 6 | 5 | 5 | |||||||||
1 | ![]() | 4 | 2 | ||||||||||
2 | ![]() | 6 | 6 | ||||||||||
![]() | 5 | 1 | |||||||||||
2 | ![]() | 7 | 6 | ||||||||||
Top half
First Round | Second Round | Quarterfinals | Semifinals | ||||||||||||||||||||||||
1 | ![]() | 6 | 77 | ||||||||||||||||||||||||
LL | ![]() | 6 | 1 | 3 | ![]() | 4 | 63 | ||||||||||||||||||||
![]() | 2 | 6 | 6 | 1 | ![]() | 7 | 6 | ||||||||||||||||||||
![]() | 6 | 6 | ![]() | 5 | 0 | ||||||||||||||||||||||
![]() | 3 | 3 | ![]() | 77 | 6 | ||||||||||||||||||||||
Q | ![]() | 1 | 2 | 6 | ![]() | 64 | 4 | ||||||||||||||||||||
6 | ![]() | 6 | 6 | 1 | ![]() | 3 | 7 | 7 | |||||||||||||||||||
4 | ![]() | 5 | 6 | 7 | 4 | ![]() | 6 | 5 | 5 | ||||||||||||||||||
![]() | 7 | 4 | 5 | 4 | ![]() | 6 | 6 | ||||||||||||||||||||
Q | ![]() | 2 | 3 | Q | ![]() | 4 | 1 | ||||||||||||||||||||
Q | ![]() | 6 | 6 | 4 | ![]() | 6 | 6 | ||||||||||||||||||||
WC | ![]() | 1 | 4 | Q | ![]() | 2 | 2 | ||||||||||||||||||||
![]() | 6 | 6 | ![]() | 3 | 1r | ||||||||||||||||||||||
Q | ![]() | 6 | 6 | Q | ![]() | 6 | 2 | ||||||||||||||||||||
8 | ![]() | 0 | 3 |
Bottom half
First Round | Second Round | Quarterfinals | Semifinals | ||||||||||||||||||||||||
5 | ![]() | 4 | 4 | ||||||||||||||||||||||||
![]() | 6 | 6 | ![]() | 6 | 6 | ||||||||||||||||||||||
![]() | 2 | 5 | ![]() | 1 | 0 | ||||||||||||||||||||||
![]() | 6 | 7 | ![]() | 0 | 7 | 0 | |||||||||||||||||||||
![]() | 4 | 4 | ![]() | 6 | 5 | 6 | |||||||||||||||||||||
![]() | 6 | 6 | ![]() | 77 | 7 | ||||||||||||||||||||||
![]() | 1 | 2 | 3 | ![]() | 65 | 5 | |||||||||||||||||||||
3 | ![]() | 6 | 6 | ![]() | 5 | 1 | |||||||||||||||||||||
9 | ![]() | 6 | 6 | 2 | ![]() | 7 | 6 | ||||||||||||||||||||
![]() | 4 | 3 | 9 | ![]() | 4 | 6 | 6 | ||||||||||||||||||||
![]() | 77 | 7 | ![]() | 6 | 2 | 2 | |||||||||||||||||||||
WC | ![]() | 61 | 5 | 9 | ![]() | 3 | 6 | 2 | |||||||||||||||||||
![]() | 4 | 7 | 6 | 2 | ![]() | 6 | 3 | 6 | |||||||||||||||||||
![]() | 6 | 5 | 3 | ![]() | 2 | 5 | |||||||||||||||||||||
2 | ![]() | 6 | 7 | ||||||||||||||||||||||||
gollark: I don't have control over it much, it runs on an ISP-supplied router and I haven't changed that.
gollark: My ISP is slightly less bad than usual about this.
gollark: Yes.
gollark: My public IP works fine for me on my network. IPv4 and v6.
gollark: Presumably the idea is to just remove/backdoor the encryption stuff which is easily used and accessible to consumers (encrypted messaging, full disk encryption on phones), which is not going to stop anyone who is doing evilness but will definitely allow widespread surveillance on most people.
References
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.