Free Essay

Af 302

In:

Submitted By saiyad
Words 4279
Pages 18
Computer basics
A computer is defined as a device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions. Input is what is typed, submitted, or transmitted to a computer system, either by a person, the environment, or another person. Data represents facts, objects and ideas that can be processed or manipulated with computer programs known as software. Most of this processing takes place in a component known as the CPU – central processing unit, or the computer’s brain. Memory is the area within a computer that temporarily holds data for processing while the computer’s storage area is where data is stored on a more permanent basis. Output is what is produced by a computer.
Today’s computers work by loading a set of instructions into memory from a stored program and then allowing those instructions to be executed to produce output. This concept allows you to use your computer for multiple tasks, such as word processing, image editing, sending e-mails, and much more.
Nearly all of today’s computers use some type of microprocessor, or single chip CPU, so the older classifications of microcomputer, minicomputer, and mainframe computer to classify computers are no longer used today. Computers are now categorized based on their intended use and physical sizes. Typical categories include personal computers, handheld computers, workstations, videogame consoles, mainframes, supercomputers, and servers.
A personal computer is one designed to meet the computing needs of an individual person, usually those computers for e-mail, word processing, and internet access. Personal computers can be desktop computers, notebooks, or tablet computers. A personal computer system usually contains a system unit, display devices, keyboard, mouse, floppy disk drive, hard disk drive, CD and DVD drives, sound card and speakers, modem, and a printer. A detailed description and picture of each of these items can be found on page 10 of your textbook.
A desktop computer is one that is found in homes and offices and typically fits on or under a desk with a separate computer screen, keyboard, and mouse. A notebook computer, or laptop, is a small, lightweight personal computer that incorporates all of its parts in a single unit, also capable of operating on a battery. A tablet computer is a portable computer featuring a touch-sensitive screen that can be used or writing or drawing.
A handheld computer features a small keyboard or touch-sensitive screen and is designed to fit into your pocket. These types of computers, or PDAs (personal digital assistants) are designed for keeping track of addresses and appointments. More information about the latest PDA models, prices, software, and accessories can be found by visiting the PDA InfoWeb.
One definition of the computer category workstation is a powerful computer designed to do a particular task, such as medical imaging, computer-aided design, etc. Another definition of the category is any ordinary personal computer connected to a network. A computer network is two or more computers and other devices connected to share data, programs, and hardware, typically through a LAN (local area network), or a network located in a limited geographical area.
Videogame consoles such as Xbox, PlayStation, and GameCube are also computers. These computers are equipped with microprocessors and produce graphics that rival some powerful workstation computers.
Mainframe computers are large and expensive computer systems capable of processing data for hundreds of thousands of users. Mainframes are very expensive and are used when reliability, data security, and centralized control are necessary.
A supercomputer is one that when it is created, is one of the fastest in the world. Supercomputers are able to perform tasks that no other computer can do. Supercomputers are used to model world-wide weather systems, simulate nuclear explosions, etc. Supercomputers are typically constructed of thousands of microprocessors and can cost upwards of $100 million. Additional information about supercomputers can be found by visiting the Supercomputer InfoWeb.
Servers are computers or hardware devices whose purpose is to “serve” data to other computers connected through a network. A personal computer, workstation, or software package that requests data from a server is known as a client. Just about any computer can be configured to run as a server.
In terms of computers, data is defined as the symbols that represent people, events, things, and ideas. Data turns into information when it is presented in a format that people can understand and use. Data is stored within a computer in a digital form, or series of 1s and 0s. Each 1 or 0 is called a bit and it takes 8 bits to form a byte, which is equivalent to a single character – letter, number, or punctuation mark.
Files are a named collection of data that exists on a storage medium, such as a hard drive, floppy disk, or CD-ROM. Data files contain data for processing while executable files contain programs or instructions that tell the computer how to do something. You can determine what type of file a given file is by looking at its extension, or the last 3 letters after the dot (period) in the filename. Executable files typically have the .exe extension while data files will have a variety of extensions, determining their type.
Application software is a set of computer programs that help a person carry out a given task. An operating system is essentially the master controller of all activities that take place on a computer. Operating systems are classified as system software, not application software. Some of the most popular operating systems for personal computers today include Microsoft Windows and Mac OS. Linux and Unix are popular operating systems for servers.
Two of the most important factors that influence application and device compatibility that define a computer’s platform are the microprocessor and the operating system. PCs are based on the design of the original IBM PC and typically serve the Windows platform. Macs are based on a proprietary design manufactured by Apple Computer, Inc.

Internet basics
The Internet is a network of interconnected communications lines for transporting data around the world. The main routes of the Internet are known as the Internet backbone, and the backbone is constructed and maintained by companies such as AT&T and Sprint. Local telephone systems, cable television companies, etc. play a major role in creating regional Internet connection lines.
Communication is made possible through all of the devices connected to the various companies’ lines on the Internet through a standard called TCP/IP (Transmission Control Protocol/Internet Protocol), a standard set of rules for electronically addressing and transmitting data.
The information that is available on the Internet is stored on various servers worldwide, which are owned by businesses, schools, organizations, government agencies, and even individuals. Internet resources include Web sites, search engines, downloads and uploads, P2P (peer-to-peer) file sharing, e-mail, bulletin boards, blogs, chat groups and instant messaging, internet telephony, e-commerce, broadcasts, and remote access and control. If you would like to check out some of these resources, be sure to visit the Internet Resources InfoWeb.
To access everything that is available on the Internet, you must first connect your computer to the Internet. There are many different options available for connecting your computer to the Internet, including through a dial-up connection and a modem. A modem is a device in your computer system that converts a computer’s digital signals into analog for transmission across a phone line. When you wish to connect to the Internet through a modem, your computer dials a special access number, which is answered by an Internet modem. The fastest speed available to typical dial-up connections is 56Kbps, meaning 56,000 bits of data per second. This speed is good for e-mail, e-commerce, and chat, but not so good for Internet video and intense graphics.
Cable companies are now offering high-speed, broadband, connections to home users through coaxial cable lines. Cable modem service requires two pieces of equipment – a network card and a cable modem. The network card is a device designed to connect a personal computer to a LAN, which your computer becomes a part of with a cable modem service. The cable modem is a device that changes the signals from the computer into a form that can travel over cable TV lines. This type of service is referred to as an always-on connection because when your computer is on, it is connected to the Internet, whereas with a modem, you have to dial through a phone line and “hang up” your connection to talk on the phone. Cable modem speeds can reach 1.5Mbps (1.5 million bits per second), or about 25x faster than a dial-up connection.
Other high-speed access options that are available include ISDN (Integrated Services Digital Network) and DSL (Digital Subscriber Line). ISDN is not much faster than dial-up access, but costs substantially more, making it a low ranking technology in today’s times for home use. DSL can connect at speeds twice as fast up to 125x as fast as a 56Kbps modem. Both ISDN and DSL require a proximity to telephone switching stations, which means not everyone can gain access to these services. An alternative for those who live in a rural area is DSS (Digital Satellite Service) which can reach speeds up to 500Kbps.
To access the Internet, you also must connect to an Internet Service Provider (ISP). An ISP is a company that maintains Internet computers and equipment to provide access to businesses, home users, etc. typically for a monthly fee. A local ISP is a company that provides Internet access within a limited geographical region while a national ISP, such as AOL, can offer the same service across the country. To find a list of ISPs that provide access in your area, check your local Yellow Pages directory. Before selecting an ISP, you should consider a variety of factors, including geographical coverage, type of service, quality of service, cost of monthly service, cost of equipment and installation, extra services, and customer service, all of which are summarized on page 21 of your textbook.
Access to the Internet is usually restricted in various ways, including through the use of user IDs and passwords by ISPs. In this way, ISPs are able to limit access to their paying customers. A user ID is a series of characters that become a person’s unique identifier. A password is a different series of characters that verifies your identity. In most cases, a person is allowed to choose their own user ID, but some services will assign you a user ID, which may be case sensitive, meaning that the user IDs and password differentiate on lowercase and uppercase letters.
Usually, an ISP, or even your school, will assign you an initial password when you receive your user ID. This password should be changed to one that could not be “guessed” or “discovered” by someone else. Your password should be a sequence of characters that are easily remembered by you, but that would be difficult for someone else to guess. You should consider keeping two passwords – one for high-security use and one for low-security – because various Web sites that are available require the establishment of a password for site access. Page 23 of your textbook provides a nice summary of Dos and Don’ts for selecting a password.

Web basics
Once you have gained access to the Internet, you can then start to explore the many resources available to you, including the Web. The Web is short for the World Wide Web, which is a collection of files that can be accessed through HTTP (HyperText Transfer Protocol) using a software program called a Web browser. Web-based files are typically called Web pages these pages contain links, or hyperlinks, that allow users to click the links to move between pages. A series of Web pages can be grouped into a Web site, or virtual “place” on the Internet. Web sites are hosted by computers all over the world called Web servers.
Every Web page has its own unique address called a URL (Uniform Resource Locator). Most URLs begin with http:// to indicate that the page uses the HTTP protocol. Most Web sites will have a doorway to other pages in their Web site, and this doorway is accessed through their main URL. For example, CNN has a Web site that can be accessed via the URL http://www.cnn.com/. A particular Web page within CNN’s site may be accessed through the URL http://www.cnn.com/showbiz/movies.htm. HTTP is the Web protocol standard, www.cnn.com is the Web server name or domain name, showbiz is the folder name, and movies.htm is the name of the particular Web page being viewed. Remember that the slashes in a URL go in one direction, known as a forward slash. Web pages typically end in the .htm or .html file extension, which represents the fact that the page is an HTML document, a standard format for Web documents.
A Web browser is a software program that runs on your computer system that is used to access Web pages. Two of the most popular Web browsers today are Microsoft Internet Explorer and Netscape Navigator. For up-to-the-minute information on Web browsers, see the Browser InfoWeb.
Despite user interface differences and variations in terminology, Web browsers typically offer the same set of standard features to their users. Page 29 of your textbook contains a list of these standard features for working with Web pages.
When you want to view a Web page, you enter its URL into the address box of a browser and hit enter. If you have formatted the URL correctly, the server where the page is located is contacted and the contents of the file will be returned to your Web browser. The information returned contains the information you wish to view and the formatting codes for the page, called HTML tags. These tags tell your browser how to display the page. An example showing what the original HTML file looks like with tags as compared to how the page looks when displayed in a browser can be found on page 30 of your textbook.
You can copy sections from Web pages into your own documents, providing copyright clearance or proper citing, by highlighting text with your mouse in a Web page and selecting Copy from the Edit menu of the Web browser program. You can then paste this information into another program, such as a word processor, by going to that program’s Edit menu and selecting Paste.
To help you find Web pages related to various topics of interest to you, there are search engines on the Web, such as Google and Yahoo!, that allow you to find Web sites for visiting by entering queries. A query describes information you want to find by providing keywords, or search terms, to the search engine. Search engines store information about Web pages in a large database that is searched when you enter keywords into a search engine’s query area, but this can cause thousands of unmanageable results to be returned. To aid with searches, search engines also allow you to use search operators to define relationships between keywords to narrow the listing of results available. A listing of search operators is found on page 32 of your textbook. Additional information about search engines can be found at the Search Engine InfoWeb.
Topic directories are sites that list topics by category and hierarchically categorize sites based on topics and sub topics. An example of a topic directory is Yahoo! (http://www.yahoo.com/) which also serves as a search engine.
If you do not like the fact that you may have to enter a cryptic query into a search engine to find matching Web pages, you could try a site such as http://www.askjeeves.com/ which allows you to enter a question in English in the way that you would ask the question of a human.

E-mail basics
E-mail, or electronic mail, is the technology that caused the Internet to take off. The Internet delivers nearly 15 billion e-mails each year around the world. Anyone with an e-mail account can send and receive e-mail. An e-mail account provides you with an e-mail address and storage space for e-mail messages (mailbox). An e-mail address consists of a user ID, and @ symbol, and the name of the computer which stores the mailbox. A person’s e-mail user ID could be the same as the user ID they are issued by an ISP, or it could be assigned by a school, business, etc. For example, if Missy Morgan’s user ID at Marshall University was missy_morgan and Marshall’s server name was marshall.edu, her e-mail address would be missy_morgan@marshall.edu.
An e-mail message is a document composed on a computer consisting of a message header and body. The header contains who you are sending the e-mail to (their address), your return address, and a subject line. The body of the message contains the information you are sending to the recipient, including the possibility for sending them files from your computer system, called attachments.
Basic e-mail activity includes the composing (writing), reading, replying to, and forwarding of e-mail messages. If you receive a message that you wish to send to someone else, e-mail programs provide a button that says Forward that will allow you to send the message by just entering someone’s e-mail address without having to retype the message.
E-mail was originally developed to store and send ASCII text across the Internet, but since its inception, you can now covert any file you wish through MIME (Multi-Purpose Internet Mail Extensions) into ASCII code for sending across the Internet. Any file that travels with an e-mail message is known as an e-mail attachment.
Most e-mail programs will allow you to create e-mail messages in HTML, meaning you can format the messages as you type them, instead of sending them in plain text format. In addition to this formatting and the attaching of files to e-mail messages, most e-mail programs typically offer features that help you perform the tasks that are contained in the listing on page 38 of your textbook.
Because e-mail messages are composed without facial expressions, voice inflections, and body gestures, one must carefully consider their audience and message that is to be conveyed. Netiquette is online jargon for Internet etiquette, which can help you avoid some of the pitfalls with online communications. This series of customs or guidelines for maintaining communications are contained on page 39 of your textbook.
An e-mail system is defined as the equipment and software that carries and manipulates e-mail messages. This includes an e-mail server that stores, sorts and routes mail, and also the personal computers that send and receive the e-mail. E-mail is based on store-and-forward technology, which means that individuals cannot receive their messages directly from other senders without it first being stored on the e-mail server.
There are three types of e-mail systems that are used today – POP, IMAP, and Web-based mail. POP (Post Office Protocol) temporarily stores messages in your mailbox on a server. When you request the messages, they are downloaded to your PC. IMAP (Internet Messaging Access Protocol) is similar to POP, but you can leave your messages on the e-mail server so that they can be accessed from multiple computers. Web-based e-mail keeps your mail on a Web site instead of ever transferring it to your computer. To use Web-based e-mail, you need an e-mail account with a Web-based e-mail provider, such as Yahoo! or Hotmail. Most Web-based e-mail accounts are free. Additional information can be found on Web-based E-mail at the Web-based E-mail InfoWeb. Even though you can choose to use Web-based e-mail, you are usually forced to use either POP or IMAP depending on what your ISP offers. A POP server that stores POP messages requires users to use a POP e-mail client program, such as Microsoft Outlook Express or Qualcomm Eudora to access those messages. When sending messages from your e-mail client program, they are stored in an Outbox on your computer until they are routed through an SMTP server (Simple Mail Transfer Protocol) instead of a POP server. Think of POP for incoming and SMTP for outgoing. A nice illustration of this process can be seen on page 41 of your textbook.
One advantage of e-mail client programs and the POP protocol is that you can compose and read e-mail while you are not connected to the Internet, and once you have reconnected, the messages that you composed can be sent. However, with Web-based e-mail, you must be connected to the Internet in order to read and compose messages. So, which system should you choose to use? A POP or Web-based system? Your choice should be based on such factors as control, security, and travel, each of which are summarized on page 42 of your textbook.

Techtalk: The boot process
The sequence of events that take place between the time that you turn on your computer and that it is ready to use is known as the boot process. This process involves flashing lights, whirring noises, and beeping as your computer performs what is called a power-on self-test (POST). This boot process can warn you if something is wrong with your computer and also loads your operating system from the hard drive of a computer into the volatile random accessory memory (RAM) section of a computer’s memory.
There are six major events that take place during the boot process of a computer, including: power up, start the boot program, power-on self-test, identify peripheral devices, load the operating system, and check the configuration and customization.
If you were to boot your computer and the operating system will not load, you may see an error on your screen detected by the POST to let you know what happened. You may also hear a beep code if the screen is not functioning which will signal what problem you may be encountering. Beep codes are machine dependent and can be referenced through your computer’s reference manual.
The first time an error is encountered during the boot process, try rebooting your computer to see if the computer boots normally the second time. If it does not, you may want to check the manufacturer’s Web site for information, including any patches that may need to be made or installed, or contact your manufacturer’s technical support department.
If after a computer boots the operating system starts to act erratically, you may have to reinstall your operating system, or you may have contracted a computer virus (more on this in Chapter 4). In some cases, a computer may be booted in Safe Mode for the more technically savvy computer owners to solve their own problems. More on Safe Mode can be found through the Safe Mode InfoWeb.

Issue: E-mail privacy?
Have you ever worried about your e-mail being read by others before it reaches its intended recipient? Technically, it can be, but the Electronic Communications Privacy Act of 2000 prohibits the use of intercepted e-mail as evidence unless a judge approves a search warrant. However, the Patriot Act, passed in 2001, has provided the federal government a means for lowering fourth amendment standards for obtaining e-mail logs. The FBI has developed a technology known as Carnivore which can scan messages entering and leaving an ISP’s e-mail system to find e-mail associated with a person under investigation. Privacy advocates are concerned because the technology scans all messages.
What about employers? They have the right to monitor employees e-mail without a court order. Even if you delete an e-mail message, it can still be saved on an employer’s mail server. Like employees, students who use a school’s e-mail system cannot be assured of e-mail privacy. So why would an employer or school be concerned about your e-mail? Because the owner of the e-mail system can be held responsible for the contents of messages sent through its servers. This is why many businesses and schools have created e-mail privacy policies, and made those policies available to anyone with accounts on their servers.
Computers in context: Homeland security
Once a localized problem affecting the Middle East and South Asia, terrorism is now spreading around the globe. Governments in many countries are devoting significant resources to combat this growing threat. In the U.S., the Department of Homeland Security is responsible for reducing America's vulnerability to terrorism and leading a unified national effort to prevent terrorist attacks on American citizens and assets.
Technology is a key component of the DHS strategy. Electronic sniffing devices in airports detect explosives. The PROTECT system, designed to be deployed in subways, uses chemical detectors to sense toxic fumes, video surveillance cameras to monitor subway-train and passenger status, a computer program to predict the dispersion of toxic materials, and a wireless communications system to coordinate emergency responders.
Terrorists might use cell phones or e-mail to communicate and plan attacks. The National Security Agency uses electronic intercepts to monitor worldwide “chatter.”
Homeland security efforts are producing job opportunities in government agencies and the private sector.

Similar Documents

Free Essay

Af 302 Essay on Web 2.0 Technologies

...Introduction Web 2.0 refers to a variety of websites and applications that allow people to create, share, collaborate and communicate. Web 2.0 unlike from other types of websites as it does not require any web design or publishing skills to participate, making it easy for people to create and publish or communicate their work to the world. The nature of this technology makes it easy and popular way to communicate information to a much wider audience. There are number of different types of web 2.0 applications including wikis, blogs, social networking, folksonomies, podcasting & content hosting service, YouTube, Facebook, MySpace, and Flickr (Thomson, 2008). However, despite it greater advantageous to our world today, there are some threats involved on the other hand. In this essay, I will discuss some number of privacy and ethical issues associated with the use of this type of technologies. As well some threats such technologies pose for small Pacific Island communities. Lastly, I will discuss the reasons why a privacy bill should or should not be adopted in the Pacific. Ethical and privacy issues related with the use of web 2.0 technologies? Copyright is one of a major issue related with the use of web 2.0 technologies. This ethical issue is referring to copy of others information illegally, by means without the permission of the copyright holder. Using of web 2.0 technologies like Facebook, you tube and other applications nowadays are rapidly growth all over the world...

Words: 774 - Pages: 4

Free Essay

Home Is

...Home Is... - Research Paper - Louisemarie 27/12/14 00.37 Login Join Spar optil 50 % The Research Paper Factory www.itasker.dk Join Search Browse Saved Papers Search over 100,000 Essays Home Page » Novels Home Is... In: Novels Home Is... Home is... The main character in Home Is, by Morris Lurie, is Max Gottlieb. Max; an out burned poet with a boyish and sad eyes with an intense look (p. 60, l. 36). He is meeting up in Rhodes with his two good friends, the couple Sylvia and Larry, wich is one of the places he has got a house or a place he calls home. Larry is an artist, a painter. He is very modest and attenuates his answer when Max asks about his painting; “Just dabbling” he says (p. 60, l. 5), even though Max presumes that he is winning prices and making lots of money. Larry doesn’t deny this. His wife, Sylvia, is a very talkative lady, the novel doesn’t tell much about her but that she is sunbathing and likes a good gossip. Since she wants all the gossip before everyone else (p. 61, l. 3) one could think that one of her main doings on a small island like Rhodes is hostessing. Max is out of a rich family; when his father dies he inherits a lot of money; “Max the millionaire” (p. 61, l. 32). Sylvia and Larry seem financially privileged too; him painting and her probably being a housewife. The novel doesn’t tell anything from their background; maybe Larry is such a skilled painter that they can live carefree out of that. Max, Sylvia and...

Words: 532 - Pages: 3

Free Essay

Badabing

...Employer Name: Job/Occupation & Employer Name: Work or Mobile Phone/s, if any: Email/s, if any: Work or Mobile Phone/s, if any: Email/s, if any: My Passport No. (if available): My Passport issue date: My Passport expiry date: City/Country issuing passport: PHILIPPINES Religion: □ Christianity □ Islam □ Other __________________ Ethnic background, if applicable: Foods I cannot eat / Allergies: Native/Foreign languages spoken: Family/relative who has participated in an YES Program or other AFS exchange program: No. of My Siblings (brothers/sisters): □ Yes, I have a relative who has participated in YES Program or AFS exchange program. □ No, I don’t have a relative who has participated in YES or other AFS exchange program. IF yes, name of relative: Relationship: Program Name/Destination: Date/Month/Year of Departure: K-L YES Program: I learned about YES through: □ YES alumni □ AFS returnee/volunteer □ School □ Friends/relatives □ Internet □ Print (newspaper/brochure/poster) □ Other:__________________ II. SCHOOL INFORMATION Complete school name: Complete school mailing address: (House No., Street, Barangay, City/Municipality, Province) Region: Zip...

Words: 1115 - Pages: 5

Free Essay

Sox, Voor En Nadelen

...aan moeten houden. De SOx richt zich vooral op het boekhoud technische gedeelte van een onderneming. De voordelen van de SOx zijn onder andere, de vermindering van risico’s op fraude, betere controle van ondernemingsrisico’s en toenemend inzicht in bedrijfsprocessen. Nadelen van de SOx zijn onder andere dat de markt heeft waardeverlies geleden, dat de naleving van de SOx hoge kosten met zich meebrengt en dat het aantal beursgenoteerde bedrijven afneemt sinds de invoering van de SOx. Inhoudsopgave 1. Introductie 3 1.1 Het onderwerp en de centrale vraag 3 1.2 De aanleiding voor het paper 4 1.3 Het wetenschappelijk kader 5 1.4 De werkwijze 5 2. De Sarbanes-Oxley Act 6 3.1 Artikel 302 6 3.2 Artikel 404 7 3. Voordelen Sarbanes-Oxley Act 8 3.1 Voordelen 9 4. Nadelen Sarbanes-Oxley Act 10 5.3 Nadelen 12 5. Conclusie 13 6. Hypotheses 16 7. Referentielijst 17 1 Introductie 1.1 Het onderwerp en de centrale vraag “De Amerikaanse autoriteiten zijn een grote boekhoudfraude op het spoor. Volgens de SEC, de Amerikanse beurscommissie, heeft het bedrijf Healthsouth sinds 1999 zijn winst opgeblazen met in totaal 1,4 miljard dollar.” (De Trouw, 2001) “Bernard Lawrence Madoff (1938) is door de FBI gearresteerd voor fraude. Hij wordt ervan beschuldigd zijn klanten met een Ponzifraude voor zo'n 65 miljard dollar te hebben opgelicht...

Words: 4673 - Pages: 19

Premium Essay

Accounting 351 Answer

...(2) Available-for-Sale Securities. Please record the initial purchase of the bonds and the first two interest payments on June 30 and December 31, as well as any adjusting entries on June 30 and December 31 assuming these two classifications. HTM and AFS (PV = 2,000,000*.37689 + 80,000*12.46221): Jan 1 Investment in Bonds 2,000,000 Discount on Bonds Cash Jun 30 Cash 80,000 Discount on Bonds 7,538 Interest Revenue Dec 31 Cash 80,000 Discount on Bonds 7,915 Interest Revenue 249,243 1,750,757 87,538 87,915 Adjusting Entries for AFS: Adjustment = 2,037,000 – 1,758,295 = 278,705 Jun 30 Fair Value Adjustment 278,705 Net Unrealized Gains/Losses – OCI 278,705 Adjustment = (1,977,000 – 1,766,210) - 278,705 = -67,915 Dec 31 Net Unrealized Gains/Losses – OCI 67,915 Fair Value Adjustment 67,915 b) CMT sells the bonds on January 1, 2014 for $1,988,000. Please record the entry for the sale using the above two classifications. 1 Jan 1 Cash Discount on Bonds Investment in Bonds Gain on Sale of Bonds 1,988,000 233,790 2,000,000 221,790 c) For the bonds classified at AFS, also make the fair value adjusting entry at the end of June, 2014 assuming this was the only AFS investment. Jun 30...

Words: 3202 - Pages: 13

Free Essay

Advanced Accounting Chapter1

...Advanced Accounting Third Edition Susan S. Hamlen University at Buffalo, The State University of New York Ronald J. Huefner University at Buffalo, The State University of New York James A. Largay III Lehigh University Cambridge BUSINESS PUBLISHERS Cambridge Business Publishers ADVANCED ACCOUNTING, Third Edition, by Susan S. Hamlen, Ronald J. Huefner, and James A. Largay III. COPYRIGHT © 2016 by Cambridge Business Publishers, LLC. Published by Cambridge Business Publishers, LLC. Exclusive rights by Cambridge Business Publishers, LLC for manufacture and export. ALL RIGHTS RESERVED. No part of this publication may be reproduced, distributed, or stored in a database or retrieval system in any form or by any means, without prior written consent of Cambridge Business Publishers, LLC, including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. STUDENT EDITION ISBN: 978-1-61853-151-3 Bookstores & Faculty: to order this book, call 800-619-6473 or email customerservice@cambridgepub.com. Students: to order this book, please visit the book’s Website and order directly online. Printed in Canada. 10 9 8 7 6 5 4 3 2 1 PREFACE W elcome to Advanced Accounting. We wrote this book with two major objectives in mind. First, we seek to reflect the changing topical emphases and content in the advanced accounting course; coverage is completely updated for new developments concerning...

Words: 24336 - Pages: 98

Free Essay

Law Acase

...Grundlæggende Skatteret – særtryk 2011 Henrik Dam Henrik Gam Kjeld Hemmingsen Jacob Graff Nielsen Grundlæggende Skatteret 2011 3. udgave, 1. oplag © 2011 Magnus Informatik A/S Palægade 4, 1261 København K Tlf. 70 20 33 14 Telefax 33 96 01 01 E-mail: magnus@magnus.dk www.magnus.dk Mekanisk, fotografisk eller anden gengivelse eller mangfoldiggørelse af denne bog eller dele heraf er ikke tilladt ifølge gældende dansk lov om ophavsret Layout og planlægning: Charlotte Illum Omslag: Klausen+Partners, Frederiksberg Tryk: rosendahls print•design•media ISBN: 978-87-7762-934-1 ISSN: 1903-735X Forord til særtryk Kære læser, Du sidder nu med et særtryk af Grundlæggende Skatteret 2011, kapitel VIIIXIV. Vi har lavet særtrykket, da der er graverende fejl i disse kapitler. Dette skyldes udelukkende fejl i vores interne produktionsproces, og vi påtager os det fulde ansvar herfor. Vi beklager selvfølgelig dybt den ulejlighed, både læsere og forfattere er blevet påført i denne forbindelse. Særtrykket skal bruges i stedet for kapitel VIII-XIV i Grundlæggende Skatteret 2011, 3. udgave, 1. oplag. Dorte Carlsson Redaktionschef © Magnus Informatik 3 Forkortelser AAL ABL AMFL AL APSL ASL BAL BEK CIR DEP DSL DSKL EBL EBSL EFD EFT EKL EVSL FBL FUL GRL H eller HD IFL IFORE KGL KKSL KOM KSL LBK LL LSI LSR LSRM LV 4 Arve- og gaveafgiftsloven Aktieavancebeskatningsloven Arbejdsmarkedsbidragsloven Afskrivningsloven Anpartselskabsloven Aktieselskabsloven Boafgiftsloven Bekendtgørelse...

Words: 49704 - Pages: 199

Premium Essay

Histo Practice Exam 1

...1. Fixation 2. formaldehyde 3. glutaraldehyde 4. Dehydration 5. clearing 6. epoxy resins, paraffin 7. microtome 8. glass slide, wire grid 9. Hematoxylin, Eosin 10. Eosin 11. Hematoxylin 12. cationic/ + charged 13. acidophilia 14. anionic/ – charged 15. basophilia 16. RNA 17. pink, purple 18. False, it differs 19. insoluble molecules 20. small, organic solvents 21. Shrinkage 22. artificial spaces, molecules 23. artifacts 24. chemical composition 25. enzymes 26. antibodies 27. RNA, DNA 28. radioactive 29. resolution/resolving power 30. 0.2 31. true 32. non–membrane bound 33. membrane 34. Mitochondria 35. fluorescent tags. 36. rhodamine 123 37. False, this is not a self sufficient replication system 38. EM of mitochondria 39. Vesicular cristae of mitochondria, replication 40. Ribosomes on rough ER 41. mRNA, lumen 42. steroid hormones and in detoxification 43. smooth ER (in hepatocyte) 44. Golgi Apparatus 45. transfer vesicles 46. Golgi apparatus (cis surface is concave/ trans is convex) 47. Lysosome (primary and secondary) 48. Endosomes 49. Peroxisomes 50. Nucleus 51. blue 52. Microtubules, plus 53. MTOC (microtubule organization center) 54. microtubule 55. centrosome 56. 9 triplets 57. centrosome 58. Microfilaments 59. filamentous actin, globular actin 60. Intermediate filaments 61. epithelial cells/derivatives 62. Vimentin (cells of mesenchymal origin), Desmin (skeletal muscle), Glial fibrillary acidic protein (astrocytes)...

Words: 1265 - Pages: 6

Premium Essay

Nikon

...DIGITAL CAMERA User's Manual En Where to Find It Find what you’re looking for from: i i i i i The Table of Contents Find items by function or menu name. ➜ 0 iv–xi The Q&A Index ➜ 0 ii–iii Know what you want to do but don’t know the function name? Find it from the “question and answer” index. The Index Search by key word. ➜ 0 322–325 Error Messages Troubleshooting ➜ 0 305–308 If the camera displays a warning, find the solution here. ➜ 0 299–304 Camera behaving unexpectedly? Find the solution here. A For Your Safety Before using the camera for the first time, read the safety instructions in “For Your Safety” (0 xii–xvii). Help Use the camera’s on-board help feature for help on menu items and other topics. See page 18 for details. Digitutor “Digitutor”, a series of “watch and learn” manuals in movie form, is available from the following website: http://www.nikondigitutor.com/index_eng.html Q&A Index Table of Contents 0 ii 0 iv 0 1 X Introduction s Basic Photography and Playback x Live View y Recording and Viewing Movies # P, S, A, and M Modes $ User Settings: U1 and U2 Modes k Release Mode d Image Recording Options N Focus S ISO Sensitivity Z Exposure/Bracketing r White Balance J Image Enhancement l Flash Photography t Other Shooting Options I More on Playback Q Connections U Menu Guide n Technical Notes 0 35 0 49 0 57 0 67 0 75 0 77 0 85 0 91 0 101 0 105 0 117 0 131 0 143 0 151 0 163 0 179 0 195...

Words: 76513 - Pages: 307

Free Essay

Det Store L

...Peter Kaspersen TEKSTENS TRANSFORMATIONER En undersøgelse af fortolkningen af den litterære tekst i det almene gymnasiums danskundervisning Ph.D.-afhandling Dansk Institut for Gymnasiepædagogik Syddansk Universitet 2004 INDHOLDSFORTEGNELSE Indholdsfortegnelse Forord Første del. Forudsætninger Kapitel 1. Debatten om faget Fremtidens danskfag Litteratursynet i Fremtidens danskfag Danskfagets mangler Den litterære fronts modangreb En fagdidaktisk kritik Kapitel 2. Afhandlingens placering i debatten Samfundssyn Didaktiksyn Litteratursyn Inspirationen fra Fremtidens danskfag Inspirationen fra litteraturteorien Inspirationen fra systemteorien Dannelsessyn Utraditionel dannelse Sammenfatning af første del Anden del. Teorier Kapitel 3. Den sociokulturelle udfordring Vygotsky Bakhtin Hvorfor ikke sociokulturalisme? Kapitel 4. Amerikansk litteraturpædagogik Klasserummets dialog Fortolkningens instanser Læsercentrerede teorier – og derudover Kapitel 5. Systemteori Bruner iagttaget af Luhmann 1 1 3 4 6 9 10 13 13 16 21 22 24 28 31 34 36 38 38 39 44 48 50 50 57 61 68 68 Systemteoriens grundlæggende paradoks Kommunikationsbegrebet Meningsbegrebet Systemteoretisk uddannelsesteori Interaktionssystemet undervisning Systemteori og danskundervisning Videns- og læringsformer. Stokastiske processer Systemteoretisk kunstteori Det selvprogrammere(n)de værk Kunstsystemets historie Litteratur og undervisning Kritik af Luhmanns systemteori Kapitel 6. Pædagogisk forskning Klasserumsforskning...

Words: 201508 - Pages: 807

Free Essay

English Land of the Lost

...feeling so She was a cashier at a ro strong could be mistaken. She didn't tell anyone what she was doing she wasn't stupid. The first time was the hardest because she felt foolish. In the privacy of her garage, while Ollie looked on, she stocked the trunk of her car with a shovel, a spade, a dry-cell flashlight and a pair of work gloves. She opened the door and he leaped into the backseat, capering from window to rs window, frantic just to be going somewhere' 'A1l right, calm down," she said. "It's not playtime." Searching on foot took longer than she thought. They came across nothing more sinister than a rotting seagull, but she wasn't disappointed. Bushwhacking3 through the overgrown no-man's-land behind the commercial strip on Route 302 was an adventure, and , looking gave her a sense of accomplishment. They could cross this location off and move on to the next one. Later she added more serious gear like bolt cutters and a lightweight graphite walking stick recommended by professionals, whose Web sites she treated like the Bible. She religiously documented everything, taking videos of...

Words: 1953 - Pages: 8

Free Essay

Sahha

...KOT HOVEDTAL 2012 Den Koordinerede Tilmelding 1977-2012 90000 80000 ansøgere 70000 60000 50000 40000 Optagne 30000 20000 Afviste 10000 0 03 04 05 09 10 78 79 06 08 11 82 83 87 90 91 01 02 86 94 88 92 93 95 96 97 19 19 19 19 19 98 20 20 20 20 20 20 20 20 19 19 19 19 19 19 19 19 19 19 20 20 20 19 19 19 19 19 19 19 19 20 20 12 77 80 81 84 85 89 99 00 07 Den Koordinerede Tilmelding 1. udgave FIVU 2012 side 2 INDHOLD Københavns Universitet Copenhagen Business School – Handelshøjskolen IT-Universitetet i København Danmarks Tekniske Universitet Roskilde Universitet Syddansk Universitet Aarhus Universitet Aalborg Universitet Det Kongelige Danske Kunstakademiets Skoler for Arkitektur, Design og Konservering Det Informationsvidenskabelige Akademi Designskolen Kolding Arkitektskolen Aarhus Professionshøjskolen Metropol, University College Professionshøjskolen UCC (University College) Professionshøjskolen Sjælland University College Professionshøjskolen Lillebælt University College PH UC Syddanmark Professionshøjskolen VIA University College Professionshøjskolen University College Nordjylland Erhvervsakademiet Copenhagen Business Academy Københavns Erhvervsakademi (KEA) Erhvervsakademi Sjælland Erhvervsakademiet Lillebælt Erhvervsakademi Kolding Erhvervsakademi SydVest Erhvervsakademi MidtVest Erhvervsakademi Aarhus Erhvervsakademi Dania Bornholms Sundheds- og Sygeplejeskole Danmarks Medie- og Journalisthøjskole Den Frie Lærerskole Ingeniørhøjskolen...

Words: 12759 - Pages: 52

Free Essay

Controversies Around Dam Reservoirs Benefits, Costs and Future

...DOI: 10.2478/v10104-010-0001-4 Vol. 9 No 2-4, 141-148 2009 Controversies around dam reservoirs: benefits, costs and future Ryszard Kornijów1, 2 of Life Sciences in Lublin, Department of Hydrobiology, B. Dobrzańskiego 37, 20-262 Lublin, Poland, e-mail: ryszard.kornijow@up.lublin.pl 2Sea Fisheries Institute in Gdynia, Department of Fisheries Oceanography and Marine Ecology, H. Kołłątaja 1, 81-332 Gdynia, Poland 1University Abstract The paper reviews the social and environmental problems concerning the functioning of dams including their local and global effects. Particularly emphasized is a trend toward removing dams in many countries. These are issues of significant importance, particularly in view of the current discussions on justification of investing in new dams, and seeking safe and economical solutions for aging dams, risky in their further operation. Key words: dam building and removal, local and global effects. „Dams are both a blessing and a curse” Dr. Ute Collier 1. Introduction The above citation accurately, although briefly, reflects general perception of dams. On the one hand, they have undoubtedly played, and still play a significant role in the development of the civilization. On the other hand, their construction and functioning entail incurring immense social costs, often disproportionate to the resulting advantages. Dams have also caused vast irreversible damage in the natural environment. Therefore, there is growing opposition against constructing...

Words: 6151 - Pages: 25

Premium Essay

Jpmorgan Chase

...Global Social Finance Research 02 May 2012 Volume Growth and Valuation Contraction Global Microfinance Equity Valuation Survey 2012 J.P. Morgan Global Research J.P. Morgan Social Finance Yasemin Saltuk Yasemin Saltuk AC (44-20) 7742-6426 (44-20) 7742-6426 yasemin.x.saltuk@jpmorgan.com yasemin.x.saltuk@jpmorgan.com J.P. Morgan Securities Ltd. J.P. Morgan Equity Research Frederic de Mariz (55-11) 4950-3398 frederic.de.mariz@jpmorgan.com Banco J.P. Morgan S.A. CGAP Jasmina Glisovic Henry González This report is the result of a collaborative effort between CGAP and J.P. Morgan. J.P. Morgan analysts are solely responsible for the investment opinions and recommendations, if any, in this report. See page 21 for analyst certification and important disclosures. J.P. Morgan does and seeks to do business with companies covered in its research reports. As a result, investors should be aware that See page 21 for important disclosures. the firm may have a conflict of interest that could affect the objectivity of this report. Investors should consider this report as only a single factor in making their investment decision. www.morganmarkets.com Global Microfinance Equity Valuation Survey 2012 Global Social Finance Research 02 May 2012 Background & Acknowledgements Equity capital flows into microfinance have been increasing for many years, with both retail and institutional investors showing interest in this sector of financial services. Despite this growth...

Words: 8856 - Pages: 36

Free Essay

Who Guidelines on Hand Hygiene in Health Care: a Summary First Global Patient Safety Challenge Clean Care Is Safer Care

...WHO Guidelines on Hand Hygiene in Health Care: a Summary First Global Patient Safety Challenge Clean Care is Safer Care a WHO Guidelines on Hand Hygiene in Health Care: a Summary © World Health Organization 2009 WHO/IER/PSP/2009.07 All rights reserved. Publications of the World Health Organization can be obtained from WHO Press, World Health Organization, 20 Avenue Appia, 1211 Geneva 27, Switzerland (tel.: +41 22 791 3264; fax: +41 22 791 4857; e-mail: bookorders@who.int). Requests for permission to reproduce or translate WHO publications – whether for sale or for noncommercial distribution – should be addressed to WHO Press, at the above address (fax: +41 22 791 4806; e-mail: permissions@who.int). The designations employed and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of the World Health Organization concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. Dotted lines on maps represent approximate border lines for which there may not yet be full agreement. The mention of specific companies or of certain manufacturers’ products does not imply that they are endorsed or recommended by the World Health Organization in preference to others of a similar nature that are not mentioned. Errors and omissions excepted, the names of proprietary products are distinguished by initial capital letters. All reasonable...

Words: 27087 - Pages: 109