4/13/10

accounting theory

The basic concepts of accounting as we understand them today were first published in Italy in 1494 by Luca Pacioli (1445 - 1517.)  He described them in a section of his book on applied mathematics entitled Summa de Arithmetica, geometria, proportioni et Proportionalita.  Pacioli was a Franciscan monk whose life and work was dedicated to the glory of God.
       Accounting is the process of measuring and recording the financial value of the assets and liabilities of a business and monitoring these values as they change with the passage of time.  When we refer to a business we could be referring to an individual, a company or any other entity for which accounting records are to be kept (for example a church, club or other non-profit organisation.)
      The assets of a business are those things that belong to the business that have a positive financial value i.e. items that could be sold by the business in exchange for money.  Examples of assets include land, buildings, vehicles, stock, equipment, rare gold coins, bank accounts with positive balances and money owed to the business by its debtors.
       The liabilities of a business are those things that belong to the business but unlike assets have a negative financial value i.e. items that will require the payment of money by the business at some point in the future.  Examples of liabilities include unpaid bills, unpaid taxes, unpaid wages, rusty motor vehicles, stock that has passed its use-by date, overdrawn bank accounts and money owed by the business to its creditors. 
The equity of a business is defined as the value of the assets minus the value of the liabilities.  In other words the equity is the financial value that would be left if all the assets were sold and the money from the sale was used to pay off all the liabilities.  Another way of expressing this is to say that the equity is the amount of money that would be released if the business was to be wound up.
The assets, liabilities and equity of a business are all financial measurements that relate to a particular point in time.  The financial statement that is used to present this information is known as the balance sheet.  The balance sheet is a statement of the assets, liabilities and equity of a business as they exist at a particular point in time.
The relationship between the assets, the liabilities and the equity can be represented algebraically by what is commonly known as the accounting equation.  If we use the letter A to represent the assets, the letter L to represent the liabilities and the letter P to represent the equity then the accounting equation is
P = A - L
This equation states that the equity is the value of the assets minus the value of the liabilities.  This equation is more commonly written as
A = L + P
This equation states that the value of the assets is equal to the value of the liabilities plus the equity.  This is just another way of saying the same thing.  Because the equity is defined as the value of the assets minus the value of the liabilities then this equation is always true by definition.
A balance sheet is commonly divided into two sections.  One section shows the value of the assets and the other section shows the value of the liabilities and the equity.  Each section will be broken down into more or less detail depending on the intended use of the balance sheet.  Because the accounting equation is always true the totals of each of the two sections of the balance sheet should always be the same i.e. the balance sheet should always be in balance.
The financial measurements we have looked at so far are used to describe the financial position of a business at a particular point in time.  For this reason the balance sheet is also known as the statement of financial position.  It presents a summary of the business' financial position at a particular point in time.  However in order to gain a complete financial picture of a business we need to recognise that the financial position of the business is undergoing constant change.
As a business engages in various commercial activities such as buying, selling, manufacturing, maintaining equipment, paying rent and other expenses, borrowing, lending or investing then the value of the assets, liabilities and equity will change and these changes will have an effect on the balance sheet.  The only thing we can be sure about at any point in time is that the accounting equation A = L + P will always apply.  In other words even though the balance sheet is always changing from day to day we can be certain that it will always balance or should do so if it has been prepared correctly.
Recognising that the financial position of a business is constantly changing leads us to the definition of two additional financial measurements that relate to a period of time (unlike assets, liabilities and equity that relate to a particular point in time.)
The income of a business is the sum of those things that increase the value of the assets without any corresponding increase in the liabilities or any new investment by the owners of the business.  Examples include revenue from the sale of goods, equipment or services supplied, rent or interest received and capital gains.
The expenses of a business are those things that reduce the value of the assets without any corresponding reduction in the liabilities or any capital drawings by the owners.  Examples include the cost of stock and raw materials, rent or interest paid, electricity bills, telephone, wages, taxes, dividends, depreciation and donations to charity.
The income and expenses of a business are financial measurements that relate to a specified period of time rather than a specific point in time.  The financial statement that is used to present this information is known as the income statement.  The income statement is a statement of the income and expenses of a business as they occur during a specific period.
If we use the letter I to represent the income over a specified period of time and the letter E to represent the expenses over that same period we can represent the relationship between the assets, the liabilities, the equity, the income and the expenses by using a modified form of the accounting equation as follows
A = L + P + (I - E)
This equation states that the value of the assets is equal to the value of the liabilities plus the equity plus the excess of income over expenses.  Another way of writing this equation is
A + E = L + P + I
This equation states that the value of the assets plus the expenses is equal to the value of the liabilities plus the equity plus the income.  This is just another way of saying the same thing.  However it is helpful to express it in this way when we come to consider the practice of bookkeeping below.
The income statement is commonly divided into two sections in a similar fashion to the balance sheet.  One section shows the total income and the other section shows the total expenses.  Like the balance sheet each section will be broken down into more or less detail depending on its intended use.  However unlike the balance sheet the totals of each of the two sections are unlikely to be the same.  The difference will usually be shown as a separate item at the bottom of the income statement and if the total income exceeds the total expenses it will be given a title such as retained earnings, net profit or excess of income over expenditure.  If the total expenses exceed the total income it will instead be called something like retained loss, net loss or excess of expenditure over income.
Income and expenses are financial measurements that relate to the performance of a business during a specified period of time.  For this reason the income statement is also known as the statement of financial performance.  It describes the performance of a business during a specified period.  It is sometimes also referred to as the profit and loss statement.
In order to produce a balance sheet or an income statement it is necessary to have a systematic method of recording all the activities or events that have an effect on the financial measurements (A, L, P, I and E) described above.  Traditionally these events were entered by hand into a set of books or accounts.  More recently it has become common practice to enter these into a computer accounting system.  Each entry is referred to as an entry and the practice of maintaining these entries in the accounts is referred to as bookkeeping.  The act of placing a particular entry into an account is known as posting.  The total of all the entries in an account is known as the balance of that account.  The accounts themselves are referred to collectively as the general ledger or sometimes just the ledger.
Because each business will have different assets, liabilities, income, expenses and equity categories the accounts it uses to record its activities will vary from one business to another.  This set of accounts that a business creates in the general ledger is known as the chart of accounts.
Each account in the ledger will be categorised into one of the five types of financial measurements described above (A, L, P, I or E.)  Because the accounting equation
A + E = L + P + I
is always true the total of all the A and E account balances in the ledger must be equal to the total of all the L, P and I account balances if the ledger is to represent a logically correct picture of the finances of the business.  If this is the case then we say that the accounts are in balance or that the ledger is in balance.  For the ledger to remain in balance whenever an entry is posted to an account matching account entries must be posted at the same time to ensure that the total of the A and E account balances remain the same as the total of the L, P and I account balances.  For this reason bookkeeping is often referred to as double-entry bookkeeping.
Most postings consist of two entries but there is no reason why there cannot be three or more entries posted at the same time provided that the ledger remains in balance.
Traditionally a report was prepared showing the total of the A and E account balances and the total of the L, P and I account balances to ensure that these totals were the same.  This report was known as a trial balance.  Because most computer accounting systems will not allow entries to be posted unless the accounts remain in balance this has in many ways obviated the need for a trial balance.
An entry that increases the balance of an A or E account or reduces the balance of an L, P or I account is known as a debit.  An entry that reduces the balance of an A or E account or increases the balance of an L, P or I account is referred to as a credit.  Traditionally hand-written books were divided into two columns.  Debits were entered into the left-hand column and credits into the right.  In fact the traditional definition of a debit is an entry on the left-hand side of an account.  Conversely a credit was defined as an entry on the right-hand side of an account.  In order for the ledger to remain in balance the total debits must equal the total credits.
It is interesting to note that neither of these definitions of debit and credit are intuitive or immediately obvious.  Neither can they be deduced easily from their commonly understood meanings.  This partly explains why students who are learning accounting for the first time have difficulty understanding the meaning of debits and credits.  The traditional definitions come from the commonly established practice of manual double-entry bookkeeping that puts debits on the left and credits on the right.
It is worthwhile repeating the more precise definitions of debit and credit given above as they are derived from the accounting equation since familiarity with them is essential for a proper application of accounting practice to the process of setting up and maintaining a general ledger.
A debit is an entry in a general ledger account that increases its balance if it is an A or E account and reduces its balance if it is an L, P or I account.
A credit is an entry in a general ledger account that reduces its balance if it is an A or E account and increases its balance if it is an L, P or I account.

4/7/10

How to Remove Windows Genuine Advantage Notifications

Windows genuine advantage notifications occur when your computer hasn't passed the validation test. The validation test can be failed due to being sold a pirated (non-genuine) copy of XP, or because you have changed your XP product key to a software-generated key, or sometimes it just happens for no reason at all. The failed validation installs three types of notifications on your computer: one on the log in screen, one log in timer, and one balloon. It also stops updates from Microsoft and disables your ability to install IE7 and Windows Media Player 11. This solution can get rid of all three notifications, even though you will still not be able to update through Windows Update. You will not be able to download things from Microsoft that requires a valid license either.

edit Steps


  1. 1
    If you have only just installed Windows Genuine Advantage notifications, simply using the system restore function will remove the program. Then refuse to accept the WGA update next time Windows updates. Otherwise, proceed as detailed below. (NOTE: If you try these steps while you are in "Safe Mode," step #8 is unnecessary).

    Need Validation Services?

    Pharmacuetical Validation Expert Full Validation Consulting Services
    www.validation.org

  2. 2
    First, try the following:

  3. 3
    Open a CMD Line Window by Clicking on Start ==>Run ==> type CMD and Press OK.

  4. 4
    Change Directory into the System32 Folder (Like Cd c:\Windows\System32)

  5. 5
    Open a notepad Window and type the following lines:
    • taskkill -IM wgatray.exe
    • del wgatray.exe
    • del wgalogon.dll

  6. 6
    Highlight and copy to the Clipboard the three lines above

  7. 7
    Paste the contents of the Clipboard to the CMD Window

  8. 8
    This should kill the wgatray.exe Process from the Taskbar and immediately delete both files wgatray.exe and wgalogon.dll without the need to to go through all steps bellow.

  9. 9
    If that does not work, then continue and follow the steps below;

  10. 10
    Open System32 by either A or B of the following methods:


    • a)
      Click "Start", "Run", then type-in "System32". Click "Okay".
    • b) Find System32 manually by clicking "Start" > "My Computer" > "(X:)" (Replacing "X" with the drive letter of the host of Windows) > "Windows" > "System32".

  11. 11
    In "System32", go to "Tools" > "Folder options" > click on the tab, "View" > Uncheck "Hide extensions for known file types". Now you can begin...

  12. 12
    Check to make sure the window that comes up has a full screen of various files. The files are in alphabetical order, which makes it easier to locate the specific file.

  13. 13
    Find "WgaLogon.dll" and rename it "WgaLogon.dll.bak".

  14. 14
    Create an empty copy of WgaLogon.dll:



    • Right click on a blank space in System32 and select "New" > "Text Document".
    • Leave the text document empty and label it "WgaLogon.dll". Press Enter (on your keyboard).

    • You may get a warning from the above step that says, "If you change a file name extension, the file may become unusable. Are you sure you want to change it?". Click "Yes" on this warning.

  15. 15
    Be ready to complete the next two steps very quickly! Find "WgaTray.exe" in "System32" and delete it. You will then have 5 seconds to find "WgaTray.exe" in the Task Manager (the next step). NOTE: If you remove the files mentioned above while you are in "Safe Mode," step #8 is unnecessary.

  16. 16
    Immediately open Task Manager. You can do this by pressing the Ctrl, Shift, and Esc keys simultaneously, pressing the Ctrl, Alt, and Delete keys simultaneously, or right clicking the Taskbar and selecting "Task Manager". Click on the process tab and click end process when "WgaTray.exe" is selected. Note: If you take longer, do not panic! All that will happen is that "WgaTray.exe" will keep reappearing in the processes list (i.e. you won't be able to delete it as required). To remove the notifications after this, return to system32. You will find two files:"WgaLogon.dll.bak" (the one you renamed) and an Application Extension (0KB) called "WgaLogon.dll". Delete the Application Extension, rename "WgaLogon.dll.bak" to "WgaLogon.dll" and repeat the steps from the fifth one onwards (at a greater speed!!).

  17. 17
    Restart your computer once you have finished. All the notification messages should be gone.

Understanding Topic v. Thesis

What is a thesis?
                 A thesis is a historical argument on a person, event, or concept. It briefly introduces a topic to the reader and presents a claim regarding the topic.  Historians are in many ways “Monday Morning Quarterbacks” or the “Critics” of the past.  By collecting data, historians strive to make objective arguments of the past.  The key to this process is objectivity.  Without objectivity, historians can butcher the past and leave generations of people misinformed, misled, and ignorant of the past.
                 Once you have narrowed down your topic and done some reading, the next step is to form your thesis, which is the main idea of your research.  The thesis will appear in the introduction of your report.  It often appears at the end or near the end of the first paragraph or two.  It signals to the reader what the paper will be about.
As you write your paper, you should focus on finding research that supports your statement.  In the writing process, you will find new information about your topic which may lead you to rewrite your statement.  That is fine. However, you will need to see your teacher for approval.

How to Create a Powerful Thesis Topics

Are you dreaming about the Master of Business Administration degree? Do you want to be a respected person among the academic staff?

Well, dreams always come true if you invest efforts to realize them. Perhaps, the word ‘efforts’ does not sound good for you. Still, it is the only way to see your dreams come true. Maybe, MBA thesis project will sound even more distressing, but you will certainly manage it with our help.

So, what do you need to make a striking MBA thesis project and attract public attention?

  1. You need to choose an extraordinary topic for your MBA thesis project
  2. Do you think professors like reading MBA thesis projects on well-worn topics? You may be sure they do not! Every reader expects to see something new and unusual in a text. It is the same with professors and your MBA thesis project.
  3. You need to make a shocking statement
  4. Every professor, being an expert in the area you are dealing with, knows approximately what a thesis statement on this or that topic may be like. Try to surprise your professor. Formulate a shocking thesis statement. It will be a kind of intriguing trait of your MBA thesis project. Thus, the professor will certainly get interested in your MBA thesis project.
  5. You need strong evidences
  6. An original thesis statement of MBA thesis projects will be of no value if strong evidences, examples, statistics, quotations, and reasonable explanations do not support it. It might be quite difficult for you to find them because of your thesis specification. Still, if you manage to gather enough evidences, your MBA thesis projects will be a real shock for the research community.
‘Will it be enough to make a powerful MBA thesis project?’ you may ask. Almost. These 3 stages are the most important ones. The other three stages are: writing thesis, editing, and defending.

You can also read about a Master thesis and Business coursework on our weblog.

In order to write a good paper you need to spend all of your free time writing endless assignments. Contact us to get a cheap custom written paper! We are always ready to complete a paper for you and give away the best purchase and assistance! Free title page, outline, delivery and plagiarism report specially for you with our service only! We are the thesis writing service that values customers buying papers. Pay through PayPal or other option is available. Order your help with our custom writing services – become the top student!

4/6/10

GTA 4 Download Game Link





http://rapidshare.com/files/328871607/GTA4.Repack.part01.rar.html
http://rapidshare.com/files/328864225/GTA4.Repack.part02.rar.html
http://rapidshare.com/files/328886998/GTA4.Repack.part03.rar.html
http://rapidshare.com/files/328909298/GTA4.Repack.part04.rar.html
http://rapidshare.com/files/328875023/GTA4.Repack.part05.rar.html
http://rapidshare.com/files/328873853/GTA4.Repack.part06.rar.html
http://rapidshare.com/files/328874621/GTA4.Repack.part07.rar.html
http://rapidshare.com/files/328892747/GTA4.Repack.part08.rar.html
http://rapidshare.com/files/328896939/GTA4.Repack.part09.rar.html
http://rapidshare.com/files/328931460/GTA4.Repack.part10.rar.html
http://rapidshare.com/files/328870770/GTA4.Repack.part11.rar.html
http://rapidshare.com/files/328936508/GTA4.Repack.part12.rar.html
http://rapidshare.com/files/328889954/GTA4.Repack.part13.rar.html
http://rapidshare.com/files/328898004/GTA4.Repack.part14.rar.html
http://rapidshare.com/files/328910378/GTA4.Repack.part15.rar.html
http://rapidshare.com/files/328870261/GTA4.Repack.part16.rar.html
http://rapidshare.com/files/328891935/GTA4.Repack.part17.rar.html
http://rapidshare.com/files/328938457/GTA4.Repack.part18.rar.html
http://rapidshare.com/files/328876030/GTA4.Repack.part19.rar.html
http://rapidshare.com/files/328903975/GTA4.Repack.part20.rar.html
http://rapidshare.com/files/328887804/GTA4.Repack.part21.rar.html
http://rapidshare.com/files/328886134/GTA4.Repack.part22.rar.html
http://rapidshare.com/files/328889118/GTA4.Repack.part23.rar.html
http://rapidshare.com/files/328909201/GTA4.Repack.part24.rar.html
http://rapidshare.com/files/328891509/GTA4.Repack.part25.rar.html
http://rapidshare.com/files/328873212/GTA4.Repack.part26.rar.html
http://rapidshare.com/files/328903866/GTA4.Repack.part27.rar.html
http://rapidshare.com/files/328870026/GTA4.Repack.part28.rar.html
http://rapidshare.com/files/328876896/GTA4.Repack.part29.rar.html
http://rapidshare.com/files/328934813/GTA4.Repack.part30.rar.html
http://rapidshare.com/files/328922184/GTA4.Repack.part31.rar.html
http://rapidshare.com/files/328882859/GTA4.Repack.part32.rar.html
http://rapidshare.com/files/328888858/GTA4.Repack.part33.rar.html
http://rapidshare.com/files/328915993/GTA4.Repack.part34.rar.html
http://rapidshare.com/files/328884513/GTA4.Repack.part35.rar.html
http://rapidshare.com/files/328885238/GTA4.Repack.part36.rar.html
http://rapidshare.com/files/328910006/GTA4.Repack.part37.rar.html
http://rapidshare.com/files/328885265/GTA4.Repack.part38.rar.html
http://rapidshare.com/files/328874294/GTA4.Repack.part39.rar.html
http://rapidshare.com/files/328910266/GTA4.Repack.part40.rar.html
http://rapidshare.com/files/328907111/GTA4.Repack.part41.rar.html
http://rapidshare.com/files/328881097/GTA4.Repack.part42.rar.html
http://rapidshare.com/files/328869215/GTA4.Repack.part43.rar.html
http://rapidshare.com/files/328880787/GTA4.Repack.part44.rar.html
http://rapidshare.com/files/328869449/GTA4.Repack.part45.rar.html
http://rapidshare.com/files/328902898/GTA4.Repack.part46.rar.html

4/3/10

how to remove viruses beselo

Worm:SymbOS/Beselo.B




Name : Worm:SymbOS/Beselo.B
Category:Malware
Type:Bluetooth-Worm
Platform:SymbOS
Origin:Asia
Date of Discovery:December 21, 2007

Summary

Beselo.B is an MMS and Bluetooth worm that operates on Symbian S60 Second Edition devices.

Beselo.B spreads via MMS messages and Bluetooth using the filenames beauty.jpg, sex.mp3, or love.rm.

Disinfection

CAUTION! this method will remove all data on the device including calendar and phone numbers:

  • Power off the phone
  • Hold the following three buttons down - "answer call" + "*" + "3"
  • Keep holding down the buttons and power on the phone
  • Depending on the model, you will either get text that reads "formatting" or a start-up dialog that asks for the initial phone settings
  • Your phone is now formatted and can be used again

To prevent future infections, please download F-Secure Mobile Anti-Virus from here: http://f-secure.mobi.

Additional Details

Infection

The worm's SIS installation package contains .exe, .ini, and .dat files named using a random format that has seven letters followed by the extension. For example, qsnpwsg.exe,qsnpwsg.ini, and qsnpwsg.dat.

When Beselo.B is run the installer will copy the worm's main executable to C:\system\data and execute. After execution the worm will copy its executable file to C:\system\apps with the same name as worm's main executable. Additionally, the worm creates a new unique SIS installation package to C:\systems\apps and recognizer to C:\system\recogs with the name that has the same first four letters as worm's executable. If the phone has a memory card the worm will also copy itself there. To summarize, here is a list of all files created in one installation using example filenames.

Files created on the phone:

  • c:\system\data\qsnpwsg.exe
  • c:\system\data\qsnpwsg.dat
  • c:\system\data\qsnpwsg.ini
  • c:\system\apps\qsnpwsg.exe
  • c:\system\apps\qsnpwsg.sis
  • c:\system\recogs\gsnp.mdl

Files created on the memory card:
  • e:\system\apps\qsnpwsg.exe
  • e:\system\recogs\gsnp.mdl

Hiding and Protecting the Process from the User

Beselo.B attempts to hide its process from the user by running as executable, so that it is not visible in the standard application list. The process is visible in third party tools that show system processes. It is named with same random name as the worm's main executable.

The worm protects its process from being killed by setting the process type to "system". It is not possible to kill a system process.

Replication via MMS Messages

Beselo.B replicates using MMS with SIS files that have the text "Photo" as message body and a SIS file attachment named beauty.jpg, sex.mp3, or love.rm.

The MMS messages are sent in 1 minute interval to either numbers found in the device phone book or else to internally generated numbers.

Beselo.B also listens for incoming SMS messages and responds to any message with an infected MMS message.

Replication via Bluetooth

Beselo.B replicates using Bluetooth in SIS files using the same name as the MMS messages. Bluetooth messages are attempt in one minute intervals to one phone number at a time.

The extension used in the worm installation file causes the message to be shown with an icon that indicates a broken media file.

Replication to an MMC Card
Beselo.B listens for any MMC cards inserted to the infected phone, and copies itself to inserted card. The infected card contains both the worm executable and the bootstrap component, so that if infected card is inserted into another phone it will also be infected.

Detection

F-Secure Mobile Anti-Virus for Symbian detects this malware starting from the update build number 149.

4/1/10

Link game pc download command-conquer-4-tiberian-twilight

http://hotfile.com/dl/33890922/4c4cdf3/CNC4_JAYZZY.part01.rar.html
http://hotfile.com/dl/33892227/118f6df/CNC4_JAYZZY.part02.rar.html
http://hotfile.com/dl/33893253/7331bd8/CNC4_JAYZZY.part03.rar.html
http://hotfile.com/dl/33894568/eb9733e/CNC4_JAYZZY.part04.rar.html
http://hotfile.com/dl/33895918/d3344ed/CNC4_JAYZZY.part05.rar.html
http://hotfile.com/dl/33897124/f3fd9f6/CNC4_JAYZZY.part06.rar.html
http://hotfile.com/dl/33898638/d8cb3e9/CNC4_JAYZZY.part07.rar.html
http://hotfile.com/dl/33908750/7a088af/CNC4_JAYZZY.part08.rar.html
http://hotfile.com/dl/33891300/b424594/CNC4_JAYZZY.part09.rar.html
http://hotfile.com/dl/33892196/c24451a/CNC4_JAYZZY.part10.rar.html
http://hotfile.com/dl/33893601/da0fda8/CNC4_JAYZZY.part11.rar.html
http://hotfile.com/dl/33895109/20907c3/CNC4_JAYZZY.part12.rar.html
http://hotfile.com/dl/33896312/510f97f/CNC4_JAYZZY.part13.rar.html
http://hotfile.com/dl/33897729/fccfe5e/CNC4_JAYZZY.part14.rar.html
http://hotfile.com/dl/33899141/c9b23d9/CNC4_JAYZZY.part15.rar.html
http://hotfile.com/dl/33908918/de6a440/CNC4_JAYZZY.part16.rar.html
http://hotfile.com/dl/33891128/a573c9a/CNC4_JAYZZY.part17.rar.html
http://hotfile.com/dl/33892378/e40f12b/CNC4_JAYZZY.part18.rar.html
http://hotfile.com/dl/33893625/dd9e2ed/CNC4_JAYZZY.part19.rar.html
http://hotfile.com/dl/33895210/4393c23/CNC4_JAYZZY.part20.rar.html
http://hotfile.com/dl/33896495/3fb94a3/CNC4_JAYZZY.part21.rar.html
http://hotfile.com/dl/33897762/554f773/CNC4_JAYZZY.part22.rar.html
http://hotfile.com/dl/33899146/8ca61e6/CNC4_JAYZZY.part23.rar.html
http://hotfile.com/dl/33909922/36d715a/CNC4_JAYZZY.part24.rar.html
http://hotfile.com/dl/33908797/045aa65/CNC4_JAYZZY.part25.rar.html
bangau kodox © 2008 Template by:
SkinCorner