Tuesday, November 26, 2019
Free Essays on Criminal
Deep within the word, ââ¬Å"Americanâ⬠is its association with Race. To identify someone as Hispanic is to say very little, we need the adjective ââ¬Å"whiteâ⬠or ââ¬Å"Latinoâ⬠or ââ¬Å"coloredâ⬠to make our meaning clear. In this country itââ¬â¢s the reverse. American means white and thatââ¬â¢s it, and Latinos struggle to make the term applicable to themselves hyphen after hyphen and so on. Because American means white, those who are not white are presumed to be recent arrivals and often told to ââ¬Å"go back to where they came from.â⬠Thus we appear to operate within the dichotomized racial categories of American/non-American; these are racial categories, because they effectively mean white/nonwhite (17). This is the reason why I believe race in the United States has indeed been socially constructed is through stereotypes and lack of knowledge. The comparison between ââ¬Å"whitesâ⬠and ââ¬Å"Latinosâ⬠are very different and how each of the group is perceived is very different. A "stereotype" is a generalization about a person or group of persons. We develop stereotypes when we are unable or unwilling to obtain all of the information we would need to make fair judgments about people or situations. In the absence of the "total picture," stereotypes in many cases allow us to "fill in the blanks."... Free Essays on Criminal Free Essays on Criminal Deep within the word, ââ¬Å"Americanâ⬠is its association with Race. To identify someone as Hispanic is to say very little, we need the adjective ââ¬Å"whiteâ⬠or ââ¬Å"Latinoâ⬠or ââ¬Å"coloredâ⬠to make our meaning clear. In this country itââ¬â¢s the reverse. American means white and thatââ¬â¢s it, and Latinos struggle to make the term applicable to themselves hyphen after hyphen and so on. Because American means white, those who are not white are presumed to be recent arrivals and often told to ââ¬Å"go back to where they came from.â⬠Thus we appear to operate within the dichotomized racial categories of American/non-American; these are racial categories, because they effectively mean white/nonwhite (17). This is the reason why I believe race in the United States has indeed been socially constructed is through stereotypes and lack of knowledge. The comparison between ââ¬Å"whitesâ⬠and ââ¬Å"Latinosâ⬠are very different and how each of the group is perceived is very different. A "stereotype" is a generalization about a person or group of persons. We develop stereotypes when we are unable or unwilling to obtain all of the information we would need to make fair judgments about people or situations. In the absence of the "total picture," stereotypes in many cases allow us to "fill in the blanks."...
Friday, November 22, 2019
An Overview of the Process of Balkanization
An Overview of the Process of Balkanization Balkanization is a term used to describe the division or fragmentation of a state or region into smaller, often ethnically similar places. The term can also refer to the disintegration or break-up of other things such as companies, Internet websites or even neighborhoods. For the purposes of this article and from a geographic perspective, balkanization will describe the fragmentation of states and/or regions. In some areas that have experienced balkanization the term describes the collapse of multiethnic states into places that are now ethnically similar dictatorships and have undergone many serious political and social issues such as ethnic cleansing and civil war. As a result, balkanization, especially with regard to states and regions, is typically not a positive term as there is often much political, social and cultural strife that takes place when balkanization occurs. Development of the Term Balkanization Balkanization originally referred to Europeââ¬â¢s Balkan Peninsula and its historic break-up after control by the Ottoman Empire. The term balkanization itself was coined at the end of World War I following this break-up as well as that of the Austro-Hungarian Empire and the Russian Empire. Since the early 1900s, Europe, as well as other places around the world, have seen both successful and unsuccessful attempts at balkanization and there are still some efforts and discussions of balkanization in some countries today. Attempts at Balkanization In the 1950s and 1960s, balkanization began occurring outside of the Balkans and Europe when several British and French colonial empires began fragmenting and breaking up in Africa. Balkanization was at its height in the early 1990s however when the Soviet Union collapsed and the former Yugoslavia disintegrated. With the collapse of the Soviet Union, the countries of Russia, Georgia, Ukraine, Moldova, Belarus, Armenia, Azerbaijan, Kazakhstan, Uzbekistan, Turkmenistan, the Kyrgyz Republic, Tajikistan, Estonia, Latvia, and Lithuania were created. In the creation of some of these countries, there was often extreme violence and hostility. For example, Armenia and Azerbaijan experience periodic war over their borders and ethnic enclaves. In addition to violence in some, all of these newly created countries have experienced difficult periods of transition in their governments, economies, and societies. Yugoslavia was created out of a combination of over 20 different ethnic groups at the end of World War I. As a result of differences between these groups, there were friction and violence in the country. Following World War II, Yugoslavia began to gain more stability but by 1980 the different factions within the country began fighting for more independence. In the early 1990s, Yugoslavia finally disintegrated after around 250,000 people were killed by war. The countries eventually created out of the former Yugoslavia were Serbia, Montenegro, Kosovo, Slovenia, Macedonia, Croatia and Bosnia and Herzegovina. Kosovo did not declare its independence until 2008 and it is still not recognized as fully independent by the entire world. The collapse of the Soviet Union and the disintegration of the former Yugoslavia are some of the most successful but also the most violent attempts at balkanization that have taken place. There have also been attempts to balkanize in Kashmir, Nigeria, Sri Lanka, Kurdistan, and Iraq. In each of these areas, there are cultural and/or ethnic differences that have caused different factions to want to break away from the main country. In Kashmir, Muslims in Jammu and Kashmir are trying to break away from India, while in Sri Lanka the Tamil Tigers (a separatist organization for the Tamil people) want to break away from that country. People in the southeastern part of Nigeria declared themselves to be the state of Biafra and in Iraq, Sunni and Shiite Muslims fight to break away from Iraq. In addition, Kurdish people in Turkey, Iraq, and Iran have fought to create the State of Kurdistan. Kurdistan is currently not an independent state but it is rather a region with a mostly Kurdish population. Balkanization of America and Europe In recent years there has been talk of the balkanized states of America and of balkanization in Europe. In these cases, the term is not used to describe the violent fragmentation that occurred in places like the former Soviet Union and Yugoslavia. In these instances, it describes potential divisions based political, economic and social differences. Some political commentators in the United States, for example, claim that balkanized or fragmented because it is special interests with elections in specific areas than with governing the entire country (West, 2012). Because of these differences, there have also been some discussions and separatist movements at the national and local levels. In Europe, there are very large countries with different ideals and opinions and as a result, it has faced balkanization. For example, there have been separatist movements on the Iberian Peninsula and in Spain, particularly in the Basque and Catalan regions (McLean, 2005). Whether in the Balkans or in other parts of the world, violent or not violent, it is clear that balkanization is an important concept that has and will continue to shape the geography of the world.
Thursday, November 21, 2019
Primary and Secondary Sources Coursework Example | Topics and Well Written Essays - 500 words
Primary and Secondary Sources - Coursework Example It is the strongest source identified. The agreement represented the actual plans and activities of United States government and her allies on the World War II. It is a strong source written by an important agent in the war. Nevertheless, it just provides the final copy of the agreement. The author wrote several articles as the wars progressed. It stated the way the Prime Minister of Britain announced the war against Germany on September 3, at 11: 15 AM. The article is unedited and represents a very strong source. However, the copy obtained was not original and published on eyewitness online source. A very credible source written in 1943 as the war progressed. It covers the Japan plan to evacuate its soldiers from regions occupied. The US, army wrote the report and it may contain elements of bias. Albert wrote the letter to Franklin on the plan to use uranium in the war. The copy of the original letter obtained contained actual communication and it is not biased. Nonetheless, Albert wrote the letter three years before the actual use of the atomic bomb. New Yorker magazine first published the interview with Hallock. He described the use of B-17 planes in the war against Germany. It a very strong source because Hallocck took part in the bombing against Germany as a lieutenant. Nevertheless, the writings were not obtained in the original source. The book critically links the way the World War II generated from the results of World War I. It also covers all the activities carried out by all the continents in the World War II. The coverage of the events of World War II is more comprehensive. The book incorporates the elements of religion during and after the Second World War. It explores the structure of religion during the World War II. Wuthnow also shows the changes that occurred after the war. It incorporates a very important element in the
Tuesday, November 19, 2019
Annotated Bibliography-Terence-W6 Coursework Example | Topics and Well Written Essays - 1250 words
Annotated Bibliography-Terence-W6 - Coursework Example It is important that the knowledge was diverse due to age and type of diabetes, and the adopted app should be individually based. Published by sense publishers from Rotterdam Netherlands, the chapter discusses the increase of activities aimed towards the elderly persons. The findings well support the study as such actions as development and literacy levels have been improved and forms majority of the policy making towards the older generation. The study is unique as no information is provided by other authors and also silent on other studies regarding the topic. The review of the study is quite detailed that enabled the reader to assimilate the subject with ease. The methodology was majorly theories such as a functional theory of the society to support the hypothesis that was unique to other researchers. It is significant that society has changed to help older persons to have active life. It is a comprehensive scholarly journal published online. The article examines on the behavior of the senior members towards the computer use that formed the hypothesis. The study does not offer for further research, but there was knowledge concerning the topic. The literature review was extensive that the readers easily integrated the research. Methods of research were limited to participantsââ¬â¢ observations and surveys that were done in pre and post analysis of the sixty-four seniors selected. These criteria though were unique to other studies. The findings showed an increased positive attitude by the seniors to embrace computers, even though, earlier studies indicated resistance by the target group. Nonetheless, women showed little response that should be a concern to any researcher. The manuscript is a publication by the Wiley-Blackwell. The author explores how health information can be used to improve health administration. The writer is very silent on provisions of other studies. Not much information is provided by
Sunday, November 17, 2019
Kant Ethics Essay Example for Free
Kant Ethics Essay Introduction Immanuel Kant was a German philosopher born in 1724 and died in 1804. He is considered one of the most influential people on modern philosophy for his intensive research in the subject. This paper will discuss various articles written by Kant and analyze his thoughts on deeds that are right and deeds that are morally wrong. It will finally discuss importance of motives and duty of morality as illustrated by Kantââ¬â¢s work. Discussion Kant believed that there is no good that can emerge from the world apart from a good will (Kant, 1998). He said that without good will, qualities that are good and desirable become useless. This is because the person yielding these qualities may at times lack the fundamental will to implement and portray them. He called this lack of good will as bad character. He continued to say that when good will is not present, then Power, honor, health and the overall welfare, contentment and happiness will usually mess with the mind of the person and they will start pretending and believing lies created in their mind. Good will, according to Kant, can be facilitated by application of various qualities. However, these qualities may have no inherent absolute value, but constantly presume a good will, which succeeds the esteem that we simply have for them, not permitting us to consider them as extremely good. He attempted to identify the primary maxims of motives, which people are required to achieve. Kant did not base his opinions on claims about any subjective perception of the good, preferences, moral beliefs or regularly shared desires that people may have. Kant also recognized good will as the only absolute good; he refused to accept that the notion of good will could be established by referring to a tangible good. He believed that nothing could be a moral principle, if it was not initially a principle for everyone. According to Kant, morality starts with the denial of non-globalized principles. This idea was devised as a demand, which Kant termed as the Moral Law. He grouped the maxims in a manner that mediators could refer as ââ¬Å"acting on the only adage that one can, and likewise will, just like an international lawâ⬠. To clarify the point, Kant gave an example of an agent who gives false promises. He adds to this by saying that the agentââ¬â¢s action in this case does not fit to be termed as an international law. He explains that if the agent was hypothetical, then he would take part in the final outcome and this would make him stop his behavior of giving false promises (Kant, 2009). It is therefore clear that the principle of giving false promises cannot be categorized under universally shared principles. According to Kant, the principle of repudiating false promises is vital and the maxim of giving false morally forbidden. Kant is different from many utilitarianââ¬â¢s who regard false promises as wrong due to their adverse effects. He considers this principle as wrong since it cannot be used internationally. Kant identified two ethical modes of assessment, one of them being the fact that human beings have a high probability of evaluating the maxims adopted by agents. He asserted that if human beings had the capacity of evaluating such maxims, then principles with moral worth would come into being, since humans could decline immoral principles. He stated, ââ¬Å"Those who accept principles that are not universal, have principles that are morally unworthyâ⬠. He considered those holding morally worth policies as working out of duty and said that human beings lack knowledge concerning the maxims of one another. Kant added to this by saying that people usually deduce the underlying principles or maxims of agents from the pattern of their actions, though no pattern identifies a unique principle. He gave the example of a genuinely honest shopkeeper by saying that his actions are not different from those of a shopkeeper who is reluctantly honest. Kant said that both shopkeepers deal justly out of an aspiration for a good reputation in business and would cheat if given the opportunity. Thus for common reasons, human beings usually do more than is of their concern with outer compliance to principles of duty, instead of paying attention to claims that an action was done out of such a principle. Kant discussed the relationship between principles of morality and peopleââ¬â¢s real inclinations and desires (Mac Intyre, 1981). He built the political insinuations of Categorical Imperative, which consists of constitution of the republic and value for freedom, particularly of speech and religion. He linked this with individual happiness which according to him can indirectly be viewed as an obligation. This is because oneââ¬â¢s dissatisfaction with the wants of another might turn out to be a great lure to the wrongdoing of duty (Oââ¬â¢Neill, 1991). He viewed this from another perspective and claimed that most men possess the strongest tendency to happiness. At this point, Kant gave the example of a gouty patient, who can make a choice of what he likes, and endure whatever suffering that comes with it. If he does this, he does not forego enjoying the present time to a probably wrong expectation of happiness believed to be experienced in good health (Kant, 1994). Kant states that, ââ¬Å"an action from duty has its moral worth not in the aim that is supposed to be attained by it, but rather in the maxim in accordance with which it is resolved upon; thus that worth depends not on the actuality of the object of the action but merely on the principle of the volitionâ⬠(ONeill, 1991). The moral worth of a deed does not lie in the result anticipated from it, nor in the action or maxim which needs to make use of its intention from the expected result. In relation to the discussed effects, the endorsement of other peopleââ¬â¢s happiness could be caused by other reasons (Beck, 1960). Conclusion Significance of motives and the role of duty in morality Motives can either be of good or bad intentions. They often influence oneââ¬â¢s roles of duty. The morality of duty is relative to the law and is therefore compared to the morality of religion. It, therefore, does not criticize man for not making full use of his life or by not doing good. He states that, ââ¬Å"There is nothing possible to think of anywhere in the world, or indeed anything at all outside it, that can be held to be good without limitation, excepting only a good willâ⬠(ONeill, 1991). Instead, it criticizes man for not respecting the fundamental principles and necessities required in life. A good example is the moral rule that man should not kill, since this does not have much to do with aspiration but the recognition that if one kills, he has not realized his duty of morality. I do not agree with Kant on the importance of motives and the role of duty in morality. This is because Kant only points out principles of ethics, but the same principles are so abstract that they canââ¬â¢t guide motives. Thus, his theory of the role of duty in morality is not motivating. He does not also give a full set of instructions to be followed. Kant lays emphasis on the appliance of maxims to cases that involve deliberation and judgment. He does insist that maxims must be abstract which can only guide individual decisions. The moral life is all about finding ways of good motives that meet all the obligations and breach no moral prohibitions. There is no procedure for identifying any motives. However, the role of duty in morality begins by ensuring that the precise acts that people bear in mind are not in line with deeds on principles of duty. References Beck, L. W. (1960). A Commentary on Kantââ¬â¢s Critique of Practical Reason. Chicago: University of Chicago Press. Kant, I. (1998). Groundwork of the Metaphysics of Morals. Cambridge: Cambridge University Press. Kant, I. (2009). Fundamental Principles of the Metaphysic of Morals. London: Thomas Kings mill Abbot. Kant, I. (1994). On a Supposed Right to Lie from Altruistic Motives. Oxford: Oxford University Press. ONeill, O. (1991). Kantian Ethics. In A Companion to Ethics. Blackwell: Oxford. MacIntyre, A. (1981). After Virtue. London: Duckworth.
Thursday, November 14, 2019
Individualism in Habits of The Heart Essay -- essays research papers
Habits of The Heart create a vision of the middle class American life with all its good, bad, strengths and weaknesses. Its examines the conflict that exists between individuality and community in this country, as well as how these conflicts effect our ability to form relationships with others, whether it is in a public arena or our own intimate relationships with family and friends. The very word individualism means to look out for number one, it implies a me society that has lost itââ¬â¢s way from the way it use to be. The title ââ¬Å"Habits Of The Heartâ⬠creates images of love, faith, hope and commitment to others, a sense of belonging to something larger than yourself. Does individualism really exist, or is it that people tend to forget where they came from and how much they really are influenced by family, community and others around them. In ââ¬Å"Habits Of The Heartâ⬠Bellah et al write that ââ¬Å"they attempt to follow Tocqueville and call it individualismâ⬠. This they say is the first language in which Americans tend to think about their lives, values independence and self-reliance above all else (Viii). Americans separate work, family and community, when in fact, these worlds must be combined. We are hiding in such "lifestyle enclaves," our isolated existence limits our ability to relate ourselves to a broader community. The virtue of community interaction lies in its ability to provide meaning to the frustrating mechanisms of politics and combat the "inevitable loneliness of the separate self" (Bellah et. al., 190). It seems our definition of success is related to our own individuality. Our view of success is rooted in the outcome of competition among individuals. Americans seem quick to claim that we have each succeeded through their o... ...t create ourselves. That we owe what we are to the communities that helped form usâ⬠(Bellah et. al., P. 295). We have a long history in this country of others who gave and sacrificed so much so we could have our present. We must understand that life is to be shared, it is not a race whose only ââ¬Å"goal is to he foremostâ⬠(Bellah et. al., P. 296). It is to be lived. We must be committed to those we love, and to our communities. Maybe the longing for nostalgia in this country can help to return to a time when family, friends, community, church and more were important and we all knew we were part of something greater than ourselves. We must however not live in the past, we must use the past to build and focus on the future. Work Citied Bellah, et.al.(1996). Habits of the heart: Individualism and commitment in American life. Berkeley: University of California Press.
Tuesday, November 12, 2019
ââ¬ÅAccounting Procedures in Educational Institution in Banlgladesh
Term Paper On ââ¬Å"Accounting Procedures in educational Institution in Banlgladesh ââ¬Å" North South University (NSU)â⬠Supervised by: Shapon Kumar Paul Associate Professor Department Of Accounting Govt. Bangla College, Dhaka Prepared by: Md. Bellal Hossain Bapari BBA (Honours), 2nd Year. Roll. 9593910 Department. of Accounting Govt. Bangla College, Dhaka. Date of submission: Govt. Bangla College, Dhaka Letter of Transmittal Date. To Supervisor Shapon Kumar Paul Associate Professor Department Of Accounting Govt. Bangla College, Dhaka Subject: Submission of Term Paper Dear Sir,With due respect it is my pleasure to you my term paper on ââ¬Å"Accounting Procedures in educational Institution in Banlgladesh. â⬠I have tried my level best to work sincerely to cover all aspects regarding the matter. Though I have faced some limitations to prepare the term paper due to scarcity of bank. Data, time, limitations. I have really enjoyed the hand work behind preparing the term pape r. I hope you will asses my term paper considering the limitations of study. Your kind advice encourages me to do further work. I shall be highly appreciating you if you kindly accept my term paper.Your kind approval is solicited. Sincerely Yourââ¬â¢s Md. Bellal Hossain Bapari BBA (Honours), 2nd Year. Roll. 9593910 Department. of Accounting Govt. Bangla College, Dhaka. Student Declaration I do hereby declare that the term paper entitled: ââ¬Å"Accounting Procedures in educational Institution in Banlgladesh. â⬠submitted in partial fulfillment of the requirement for the degree of BBA (Honours) dept; Accounting, National University under Bangla College Dhaka. I also declare that this whole term paper has prepared by me. Md. Bellal Hossain BapariBBA (Honours), 2nd Year. Roll. 9593910 Department. of Accounting Govt. Bangla College, Dhaka. Letter of Acceptance The term paper title ââ¬Å"Accounting Procedures in educational Institution in Banlgladesh. â⬠Submitted as partia l requirement of BBA program. This term paper has been prepared by Md. Bellal Hossain Bapari, Dept: Accounting BBA program at National University under Govt. Bangla College. This term paper is approved and accepted in quality from. Supervisor â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. Shapon Kumar Paul Associate Professor Department Of Accounting Govt.Bangla College, Dhaka Acknowledgement At first I would like to give thanks to almighty Allah who has given me to the opportunity to successfully complete the term paper entitled ââ¬Å"Accounting Procedures in educational Institution in Banlgladesh. â⬠was challenging and interesting program. I would like to give thanks to my honorable supervisor Shapon Kumar Paul for his kind and hearty guidance and close supervisor. It was not possible for me to prepare the term paper properly without his help. I am very much grateful to Mr. Md. Abdus Satter Mazumder. Head of Department), Mr. Md. Jamal Hossain Bhyian Sir. Mr. Md. Jahangir Sir. I am also gra teful to my friends and every one who help to me make the term paper. NSU's Vision The vision of North South University (NSU) is to become a leading university and remain as a top center of excellence in higher education and research. It aims at attracting brilliant students, teachers, scholars, and from all over the world. Mission The mission of NSU is to produce highly skilled manpower, visionary professional leaders and responsible and enlightened citizens.This mission is achieved by imparting high quality higher education, and training, and by conducting useful research so that individuals can achieve their intellectual, social, and personal potentials. NSU is committed to developing human capital by sharpening creative thinking. In addition to creation and dissemination of knowledge, its mission includes promotion of humanism and peace through higher education. As a social institution, NSU endeavors to induce changes for betterment of the society as a whole through public servi ces, and through promotion of ethical behavior and social justice. StrategiesTo fulfill its mission, NSU applies five basic strategies: (1) it offers socially relevant academic programs which meet the changing needs of the students coming from different backgrounds and seeking different career goals; (2) it hires highly qualified and internationally experienced academics to teach the courses / programs it offers; (3) NSU, through a rigorous selection process, admits only those students who demonstrate the potential to pursue and complete the programs of study they select; (4) it provides appropriate physical and electronic infrastructural facilities, logistic supports and an environment conducive to teaching and learning; and (5) it practices the principles of good governance that ensure best management practices and encourage academic freedom and faculty-governance. AccreditationNSU is fully accredited by the University Grants Commission, the only national accreditation authority i n Bangladesh. Its Business School has applied for accreditation of South Asian Quality Improvement System (SAQS), an accrediting agency created by the Hyderabad-based AMDISA (Association of Management Development Institutions in South Asia) with the technical help from EQUIS (European Quality Improvement System, Brussels and AACSBI, USA. The establishment of SAQS was largely funded by European Union. NSU has already got two of the senior Business School Professors trained in how to respond to the SAQS accreditation requirements. The B- School of NSU has almost completed the required Self-Assessment process.It is expected that the necessary Peer Review will be done by SAQS before the end of June 2010. International Recognition The credits obtained at NSU are accepted in most of the reputable universities of USA, Canada, Australia and other countries. NSU graduates are accepted in the Graduate programs of Harvard, Cornell, University of Pennsylvania, and other well-known universities. Eight Economics graduates of NSU are studying for higher degrees at York University, Canada, with scholarship provided by York University. NSU attracts foreign students from India, Pakistan, Sri Lanka, Nepal, China, Japan, Thailand, Myanmar, Malaysia, Sudan, Saudi Arabia, Iran, Kenya and Nigeria.In addition, under the Study Abroad and Group Exchange program, students from world-class universities of the USA and Canada such as Brown University, University of Illinois, Urbana-Champaign, Penn State University, Smith College, Mt. Holyoke College, Windsor University, York University, and other similar institutions attend summer semester at NSU and transfer credits back to their parent institutions. The goal of the University is to provide excellent modern education for students with a view to equipping them with the skill and knowledge necessary to lead the country in its quest for development. Along with this, the University also aims at producing students of high moral standard in its students.Northsouth University (NSU) has the authority, under its charter, to provide instruction to confer Undergraduate and Post Graduate degrees. It has plans to offer MPhil. and PhD programs in all branches of higher studies including engineering, agriculture, language, law and medical sciences. It has also the authority to grant diplomas, certificates and other academic distinctions. It has also the authority to open new Schools of studies and new institutions on its own campus. The University is run by a number of statutory bodies as required under the provisions of the Private University Act, 1992. Table of Contents SUBJECT MATTER EXPERTISE John McPeek, CPA iii Bud Carlson, CPA iii James Skelton ivChristopher Anderson, MBA iv Introduction WHO NEEDS ACCOUNTING POLICIES AND PROCEDURES The Recent Past 1 The Present 2 The future 2 ACCOUNTING BASICS 2 Bookkeeping 3 Accounting 3 Reporting 4 Non-financial data 4 Financial data 4 COMPONENTS OF AN ACCOUNTING SYSTEM 5 Revenue Cycle 6 Order Entry â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 6 Cash Receipts / Depositsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 6 Accounts Receivableâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 6 Purchase Cycle 6Purchase Orders / Purchasing â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 6 Cash Dis bursements / Checksâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 7 Accounts Payableâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 7 Payroll Cycle 7 General Journal Cycle 7 How does posting work? 7 ACCOUNTING TERMS AND CONCEPTS 8 Double-Entry Accounting 8 BASIC ACCOUNTING STRUCTURE 9 Balance sheet 9 Income Statement 10 Basic Accounting Formula: 10 SUMMARY OF ACCOUNTING CYCLES & ACCOUNTING CONCEPTS 12 ACCOUNTING STRUCTURE ââ¬â ACCOUNTING SOFTWARE PROGRAMS 19 ACCOUNTING METHODS 20Accrual Methodâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â ¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 20 Cash Methodâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 20 Percentage of Completion Methodâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 21 REPORTING STANDARDSâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 21 GAAP ââ¬â Generally Accepted Accounting Principles â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 21 The Matching Principle â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 22 Conformity â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 22 Valuation â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 22 Inventory Valuationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 22 Materiality â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 23 TYPES OF REPORTSâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 3 External Reportsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 24 Compilationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢ ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 24 Reviewâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 24 Auditâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 25 SEC ââ¬â Audit â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â ¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 25 Internal Reports â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 5 SUMMARYâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 26 Manual Preparationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. Tab 2 SECTION 1 INTRODUCTION â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â ¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 5 SECTION 2 INSTALLATION INSTRUCTIONSâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 7 Editing Files â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 8 Word Processing (Text) Filesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ File Properties And Style Formats â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 8 Printing Files â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 9 Technical Supportâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 10 SECTION 3 YOUR ACCOUNTING MANUAL â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 11 Style and Format â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â ¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 11 Considerations in writing your manual â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 2 Sources of additional Informationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 13 SECTION 4 EFFECTIVE COMMUNICATIONâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 15 Communication and Addressing Your Audienceâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 15 Sexism in Writingâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 15 Number Usageâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 16 Organizing Your Thoughtsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 6 Outlining Techniqueâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 16 Defining the Format and Organization of Your Manualâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 17 Design Features â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 18 Style and Mechanicsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 18 Sources of additional Informationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 19 SECTION 5 ACCOUNTING PROCEDURES â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 1 F ormat â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 21 Heading Information â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 21 Title And Introductionâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 23 The Body Of The Procedure Statement â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. . 24 Attachmentsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 24 Authorizationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 5 Production And Distribution â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 26 Revising And Updating Statements â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 26 Accounting Manual â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ Tab 3 1. 0 Purposeâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 5 2. 0 Scopeâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 7 2. 1 Responsibility â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢ ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 7 2. Exclusionsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 7 2. 2. 1 Internal Auditing â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 7 2. 2. 2 Payroll â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 7 2. 2. 3 Finance And Treasury â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 7 2. 2. 4 Information Systemsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 7 2. 2. 5 Security Planning â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 7 2. 2. Disaster Recoveryâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 7 3. 0 Management Responsibilityâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢ ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 9 3. 1 Accounting Organizationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 9 3. 1. 1 Accounting Department Organization Chartâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 9 3. 1. 2 Finance & Treasury Responsibilities â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 10 3. 1. 3 Controller Responsibilitiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 10 3. 1. Accounting Staff Responsibilitiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 11 3. 1. 5 Operations Staff Responsibilities â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 12 3. 2 Management Commitmentâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 12 3. 3 Management Accounting Policyâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 12 3. 4 Planning â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦. 13 3. 4. 1 Accounting Objectives â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 13 3. 4. Accounting System Planning â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 13 3. 5 Responsibility, Authority, And Communication â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 13 3. 5. 1 Responsibility And Authority â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 13 3. 5. 2 Management Representative â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â ¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 13 3. 5. 3 Internal Communicationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 14 3. 5. 4 Referenced Procedures:â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 14G Management Reports Activities 1. 0 Preparation Guidelines 2. 0 Daily Flash Report 3. 0 Weekly Financial Report 4. 0 Six-Week Cash Flow Report 5. 0 Budget Vs. Actual Report 6. 0 Financial Statements 7. 0 Department Reports References A. Federal Accounting Standards Board (FASB) B. Generally Accepted Accounting Principles (GAAP) Forms G Ex1 Department Reporting Summary G Ex2 Daily Flash Report G Ex3 Weekly Financial Report G Ex4 Six Week Cash Flow Report G Ex5 Budget vs. Actual Report G Ex6 Financial Statements G Pe riod-End Review & Closing Activities 1. 0 Closings Preparations 2. 0 Balance Sheet: Assets 3. Balance Sheet: Liabilities And Stockholders' Equity 4. 0 Income Statement: Revenues 5. 0 Income Statement: Expenses 6. 0 Financial Ratio Analysis G&A106 Controlling Legal Costs Activities 1. 0 Arbitration 2. 0 Legal Services 3. 0 Legal Billings G&A107 Taxes And Insurance Activities 1. 0 Organization Fees And Taxes 2. 0 Business Activity Fees And Taxes 3. 0 Payroll Fees And Taxes 4. 0 Excise Taxes 5. 0 Other Taxes And Credits 6. 0 Tax Payments 7. 0 Insurance References A. Trust Fund Recovery Penalty Forms G&A107 Ex1 Federal Tax Calendar G&A108 Property Tax Assessments Activities 1. 0 Review Of Assessments 2. 0 Appealing Of Assessments G&A109 Confidential Information Release Activities . 0 Financial Information Requests 2. 0 Personnel Information Requests 3. 0 Credit Reference Inquires Forms G&A109 Ex1 Non-Disclosure Agreement G&A110 Document Control Activities 1. 0 Document Distribution 2. 0 Document Revision 3. 0 Procedure and Work Instruction Format 4. 0 Temporary Changes Forms G&A110 Ex1 Request For Document Change (RDC) G&A110 Ex2 Document Change Control CSH101 Cash Drawers And Credit Cards Activities 1. 0 Opening 2. 0 Transactions 3. 0 Special Tender Items 4. 0 Closing 5. 0 Chargebacks And Disputed Transactions 6. 0 Security Precautions Forms CSH101 Ex1 Daily Cash Report CSH102 Cash Receipts And Deposits Activities 1. Receiving Cash Drawers 2. 0 Application Of Accounts Receivable 3. 0 Deposit Forms CSH102 Ex1 Deposit Log CSH103 Problem Checks Activities 1. 0 Unsigned Checks 2. 0 Partial Payment Checks Marked ââ¬Å"Payment In Fullâ⬠3. 0 Returned Checks 4. 0 Redeposited Checks References A. Uniform Commercial Code (UCC) B. Bad Check Law Forms CSH103 Ex1 Bad Check Notice CSH104 Wire Transfers Activities 1. 0 Incoming Wires 2. 0 Outgoing Wires References A. FRB Reg D: Reserve Requirements Of Depository Institutions B. FRB Reg E: Electronic Fund Transfer Act For ms CSH104 Ex1 Bank Wire Instructions CSH104 Ex2 Wire Transfer Form CSH105 Check Signing Authority Activities 1. Authorized Check Signers 2. 0 Changing Check Signers 3. 0 Authority Levels Forms CSH105 Ex1 Check Signing Authority Log CSH106 Check Requests Activities 1. 0 Check Origination 2. 0 Check Stop Payment Forms CSH106 Ex1 Check Request CSH107 Bank Account Reconciliations Activities Bank Statement Preparation Computerized Format Manual Preparation And Reconciling Items Computerized Preparation And Reconciling Items Adjustments And Other Troubleshooting Forms CSH107 Ex1 Sample Bank And Book Balances Reconciliation Inventory & Assets â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. Tab 6 INV101 Inventory Control Activities 1. Inventory Stocking And Storage 2. 0 Inventory Usage 3. 0 Inventory Protection 4. 0 Invent ory Obsolescence 5. 0 Inventory Disposal References A. Food And Drug Administration (FDA) Food Code Forms INV101 Ex1 Inventory Requisition INV102 Inventory Counts Activities 1. 0 Inventory Types 2. 0 Preparation For Inventory Counting 3. 0 Period End Cut-Off 4. 0 Complete Physical Count ââ¬â Cost (Or ââ¬Å"Skuâ⬠) Method Sales Order Routing And Review Invoice Preparation And Posting Distribution Accounts Receivable REV106 Invoicing And Accounts Receivable Activities 1. 0 2. 0 3. 0 4. 0 Forms REV106 Ex1 Invoice REV 106 Ex 2 Accounts Receivable Write-Off Authorization REV107 Sales Tax CollectionActivities 1. 0 Basis Of Tax 2. 0 Applicable Sales Tax Rates 3. 0 Nontaxable Sales 4. 0 Sales Outside Of Our Jurisdiction 5. 0 Sales Tax Billing REV108 Progress Billing Activities 1. 0 Contract Types 2. 0 Breakdown Of Contract Amount 3. 0 Progress Claims 4. 0 Release Of Holdback REV109 Account Collections Activities 1. 0 Collection Process 2. 0 Seriously Delinquent Or Unresponsive Acco unts 3. 0 Working With Collection Agencies 4. 0 Writing Off Uncollected Debt References A. Fair Debt Collection Practices Act (FDCP) Forms REV109 Ex1 Account Collection Control Form REV110 Customer Returns Activities 1. 0 Origination 2. 0 Receiving Goods And Processing 3. Returned Goods Disposition Forms REV110 Ex1 30-Day Satisfaction Guarantee REV 110 Ex2 Returned Goods Authorization Purchasing PUR101 Vendor Selection Activities 1. 0 Vendor Selection 2. 0 Vendor Inspections 3. 0 Vendor Files Forms PUR101 Ex1 New Vendor Notification PUR101 Ex2 Vendor Survey Form PUR102 General Purchasing Activities 1. 0 Order Determination And Requisition 2. 0 Order Placement 3. 0 Recordkeeping And Matching 4. 0 Sundry Purchases Forms PUR102 Ex1 Purchase Requisition PUR102 Ex2 Purchase Order PUR102 Ex3 Purchase Order Log PUR102 Ex4 Purchase Order Follow-Up PUR102 Ex5 Daily Sundry Payable Log PUR103 Project Purchasing Activities 1. 0 Purchasing Overview 2. 0 Requisition For Material Order 3. 0 Orders And Arrivals 4. Follow-Up 5. 0 Receiving Procedures 6. 0 Material Transfers 7. 0 Sundry Purchases Forms PUR103 Ex1 Order And Arrival Log PUR104 Receiving And Inspection Activities 1. 0 Receiving 2. 0 Inspection 3. 0 Rejection, Discrepancies And Disposition 4. 0 Stocking 5. 0 Product Returns Forms PUR104 Ex1 Receiving Log PUR104 Ex2 Receiving and Inspection Report PUR104 Ex3 Inventory Inspection Levels PUR105 Shipping And Freight Claims Activities 1. 0 Shipping 2. 0 Receiving 3. 0 Claims Procedures 4. 0 Additional Information Resources References A. Interstate Commerce Act PUR106 Accounts Payable And Cash Disbursements Activities 1. 0 Documenting Accounts Payable 2. Recording Merchandise Payables 3. 0 Recording Non-Merchandise Payables 4. 0 Payment Of Accounts Payable 4. 0 Manual Checks Embezzlement Prevention â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦ Tab 9 SUBJECT MATTER EXPERTISE â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. v Dana L. Turner â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. v 1. 0 ORGANIZATIONAL STRUCTURE AND FUNCTIONSâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 1 1. 1 Where Embezzlers Look For Opportunitiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 1 1. Corporate Cultureâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â ¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 1 1. 3 Code Of Conductâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 2 1. 4 Summary â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 2 2. 0 EMPLOYEES' RIGHTS â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 3 2. 1 Establishing The Company's And Employees' Rights â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦. 3 2. 2 Employee Rights To Privacy And Related Issuesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 3 2. The Employee Polygraph Protection Actâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 4 2. 4 Admonishment To Suspect Employeesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 5 2. 5 Summary â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 6 3. 0 EXAMPLES OF EMBEZZLEMENT SCHEMES â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢ ⬠¦Ã¢â¬ ¦.. 15 3. 1 Misuse Or Misappropriate Fundsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 15 3. 2 The Most Popular Embezzlement Schemes â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 15 3. Summary â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 16 4. 0 CRITICAL AREAS OF RISK TO EMBEZZLEMENTâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 17 4. 1 Areas Of Risk â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 17 4. 2 Summary â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 22 5. 0 UNIVERSAL SYMPTOMS OF EMBEZZLEMENT ACTIVITY â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 23 5. 1 Embezzlements Are Predictableâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 23 5. 2 Motives For Committing Embezzlement â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 23 5. Summary â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 26 6. 0 PROFILE OF AN EMBEZZLER â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 27 6. 1 Common Characteristics Shared By Most Embezzlersâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 27 6. 2 Summary â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 28 INV103 Fixed Asset Control Activities 1. 0 Acquisitions 2. 0 Dispositions 3. 0 Asset Records Forms INV103 Ex1 Capital Asset Requisition INV103 Ex2 Asset Disposition Form INV103 Ex3 Bill Of Sale INV104 Customer Property Activities 1. Receipt, Inspection And Stocking 2. 0 Unsuitable Or Missing Items 3. 0 Customer Supplied Tooling And Fixtures 4. 0 Intellectual Property Forms INV104 Ex1 Material Return Notice INV105 Fixed Asset Capitalization & Depreciation Activities 1. 0 Capitalization 2. 0 Depreciation References A. IRS Publication 946 ââ¬Å"How To Depreciate Propertyâ⬠Revenue â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ Tab 7 REV101 Sales Order Entry Activities 1. 0 Sales Representatives 2. 0 Internet Orders 3. 0 Credit Department 4. 0 Sales Administration 5. 0 Manufacturing/Shipping 6. 0 Customer Service 7. Accounting/Billing 8. 0 Changes To Orders 9. 0 Additional Information Resources REV102 Point-Of-Sale Orders Activities 1. 0 Point Of Sale 2. 0 Sales Orders And Invoices 3. 0 Sales Invo ices And Accounts Receivable REV103 Customer Credit Approval And Terms Activities 1. 0 Credit Application 2. 0 Credit Investigations 3. 0 Credit Approval/Rejection 4. 0 Additional Information Resources References A. Equal Credit Opportunity Act (ECOA) B. Truth In Lending Act (TILA) C. Fair Credit Billing Act (FCBA) D. Fair Credit Reporting Act (FCRA) E. FRB Reg B: Equal Credit Opportunity Act F. FRB Reg Z: Truth In Lending Act Forms REV103 Ex1 Credit ApplicationREV103 Ex2 Request For Credit Approval REV 103 Ex3 Credit Inquiry REV104 Sales Order Acceptance Activities 1. 0 Document Verification 2. 0 Telephone Confirmation 3. 0 Order Acceptance Forms REV104 Ex1 Phone Confirmation Checklist REV105 Shipment Of Goods Activities 1. 0 Shipping Inspection And Packaging 2. 0 Export Shipping 3. 0 Manifest Systems 4. 0 Shipment Pick-Up 5. 0 Additional Information Resources Forms REV105 Ex1 Shipping Log REV105 Ex2 Commercial Invoice Who Needs Accounting Policies and Procedures? This introduction is an accounting primer to explain the basic concepts of accounting, its structure, standards and definitions. The need to review these concepts is greater now then ever.On one hand, popular accounting programs for small and mid-sized businesses have become more widely used than ever before, and on the other hand, industry consolidation has significantly reduced the accounting program choices to just a handful. These choices are typically inexpensive, easy to implement, and come with little support to develop appropriate policies and procedures to ensure that the data generated by these programs is accurate and complete. Entry-level software like Quickbooksà ® and midlevel software like MAS-90 or Great Plains share this common deficiency. The ââ¬Å"supportâ⬠documentation is long on the explanation of user features and short on policy and procedural advice for appropriate use. The Recent Past Only twenty years ago, small to medium sized businesses faced daunting choices for selecting an accounting system.There were only three choices: Continue to use a full manual system (a comprehensive pegboard ââ¬Å"one-writeâ⬠system, employing many journals anchored to an imposing cloth bound general ledger book that rivaled the size of the largest Webster's Dictionary), purchase or lease a computerized accounting system, or build your own. The manual systems were not trivial. They were produced by major firms, which provided on-site implementation and training. These systems were well documented with many policies and procedures built into the regimented use of the ââ¬Å"one-writeâ⬠journals and corresponding ledgers. An alternative decision was to purchase or lease an automated information system.But this required another decision of whether to buy a ââ¬Å"ready madeâ⬠product or build your own. To make this decision, the company would typically hire a consultant or CPA firm to perform a comprehensive ââ¬Å"needsâ⬠analysis. The consultan t would eventually select, either a commercially built multi-module accounting program (like Solomon, our Real World), or a programmer to develop the structure from custom code (RPG was a popular language used to create custom accounting programs). Either one of these alternatives would have to run on a leased or purchased dedicated mini-computer system, (the IBM 36 was the popular mid-size business choice for many years).Both solutions required tremendous resources in time and money. Even the ââ¬Å"ready madeâ⬠solutions required plenty of additional programming to fit it into the specific company's needs. For a half a year or more, various consultants, programmers and specialists would write code, test and rewrite code. In either case, documentation was paramount. Hence policies and procedures, as they applied to the mechanics of the accounting system were well documented as a by-product of the installation and implementation procejss. The total costs in the purchase or leas e of the hardware and software (ready made or custom built), and in the company's own human resources, was staggering. The PresentImagine the months of decision making preparation, the months of development, the reams of documentation and the total costs that easily went from tens of thousands, to hundreds of thousands of dollars. Compare this to the present practice occurring throughout the country on a daily basis. The owner, or the owner's controller or other designee walks into a local retailer, picks up a copy of the most successfully marketed accounting software package, (ie: the one occupying the most prime and visible shelf space), drives back to the office, and loads the program on any available PC computer. There you have it: the decision making process, ââ¬Å"needsâ⬠analysis, implementation and installation; all for the price of $299! The future The future begins today, with your purchase of this 4expertiseâ⠢ Accounting Policies and Procedures Manual.This manu al is needed more now than ever. Accounting systems are more accessible than ever before. Unfortunately, they come with no instructions. The user guide that comes with the accounting software only explains what the menu options do, it doesn't explain which options result in sound accounting practices. Accounting software is looking more and more like your own internet browser home page, (no surprise since each manufacturer is competing to be your primary web portal). In the process, the actual functions of accounting are less obvious, and as a result, less understood. This introduction is a look behind the scenes of the ââ¬Å"splash screenâ⬠.Hopefully, by understanding the concepts and consistent accounting rules utilized by all accounting software programs, you will develop more confidence to rely on the information generated by the program and you will be able to use it more effectively to run your company. Accounting Basics Three important terms that are easily confused: â ⬠¢ Bookkeeping â⬠¢ Accounting â⬠¢ Reporting What are they and how do they interrelate? Bookkeeping Bookkeeping and accounting share two basic goals: â⬠¢ To keep track of income and expenses, thereby improving The Company's ability to achieve profitability â⬠¢ To collect the necessary financial information about The Company's business to file required reports and tax returns Bookkeeping refers to the actual transactional entering and recording of data. Examples are writing checks, processing payroll, making deposits, recording disbursements and recording receipts. AccountingAccounting encompasses the broader responsibilities over developing and maintaining the accounting system under which bookkeeping functions are performed. Accounting is concerned with the timely and accurate recording of transactions, providing useful management information, and properly reporting such information for various user needs. Developing and maintaining an accounting system involves s etting up and maintaining an appropriate chart of accounts for the particular business. Policies and procedures are then established to provide guidance for all possible financial transactions, from source documents (checks, sales orders, etc. ), to journals (payroll journal, cash disbursement journal, invoice register, etc. , to the general ledger, (based on the chart of accounts), and ultimately to a variety of reports for all internal and external needs. Bookkeeping and reporting can be thought of as the input and output of a complete accounting system. Accounting policies and procedures ensure Reporting Reporting, (the output of the data generated through various bookkeeping functions), is used for both internal and external purposes. Internal Reports are reports used within the company, by both management and other designated personnel. Internal reporting can be further divided into financial and non financial data. Non-financial data Non-financial data includes a variety of me asurement and productivity data, applicable to the specific business.These can be daily customer count, web page ââ¬Å"hitsâ⬠, production activity per employee hour, units and total weight of product shipped, or even daily weather conditions. Financial data Examples of financial data reports include: â⬠¢ Financial statements ââ¬â Profit and loss reports (income statement), balance sheets and cash flow statements â⬠¢ Daily reports with critical balances, such as, sales, cash level, inventory, accounts receivable and accounts payable â⬠¢ Segmented profit and loss reports (or P/L) on specific jobs, profit centers or departments â⬠¢ Register reports, listing all transactions for specific areas such as, payroll, checks, receipts, invoices, etc. â⬠¢ Listings of source data files such as customer, employee, vendor and inventory lists. Aging reports for both Customers (accounts receivable or A/R) and Vendors (accounts payables or A/P) â⬠¢ Inventory reports for costing and valuation â⬠¢ Exception reports ââ¬â open purchase orders, back orders, inventory stock outs. External reports generated for the use of people or organizations outside of the business. Report data and format will vary depending on user: â⬠¢ Banks, lending institutions. To observe the financial viability of a business and to determine its ability to support additional amounts and types of debt financing â⬠¢ Employees. To determine the stability of the business of their employer ââ¬â this may be useful in wage negotiations â⬠¢ Suppliers. To assess the suitability of granting credit terms to a business â⬠¢ Existing and Potential Investors.To assess the potential risk of investing in a business and to monitor the status of existing investment in a business â⬠¢ Public. To gain more insight into any business, which is legally required to make certain financial information available â⬠¢ Government. To fulfill the requirements of all appli cable local, state and federal reporting statutes, including income, sales, insurance, property, and payroll tax returns â⬠¢ Media / Press. To use available business reports in specific trade and business publications Components of an Accounting System The financial transactions of any accounting system can be grouped into four major transaction cycle groups: Revenue Cycle, Purchase Cycle, Payroll Cycle, and General Journal Cycle.Transactions in the form of sales invoices, receipts, purchase invoices, checks and payroll entries are posted to the appropriate journals. Simultaneously, these postings are also recorded in the General Ledger. The General Ledger accumulates all transaction activity, organized by account classification. Various reports, including financial statements can then be prepared from the data collected in the General Ledger. Corrections or necessary adjustments can be made to the General Ledger by creating adjusting journal entries, posted to the general journ al. The following outline on the next two pages provides more explanatory detail on these four cycles: . Revenue Cycle Order Entry Invoices entered through direct entry, through sales orders or through a point-of-sales system, (such as a cash register) are posted to the sales journal. These entries also accumulate on the accounts receivable ledger, organized by customer. If the business maintains an inventory, the posting of sales also affects the inventory ledger. Finally, all sales journal activity is also posted to the general ledger Cash Receipts / Deposits Receipts on sales and other bank deposits are posted to the cash receipts journal. Sales receipts information also accumulates on the accounts receivable ledger, organized by customer.These postings are also entered on the bank account ledger. Finally, all cash receipts journal activity is also posted to the general ledger. Accounts Receivable Accounts Receivable is a separate journal that records both sales and cash receipt data by customer. The data comes from the postings to the cash receipts journal and the sales invoice journal. 2. Purchase Cycle Purchase Orders / Purchasing Invoices entered through direct entry or through purchase orders are posted to the purchase journal These entries also accumulate on the accounts payable ledger, organized by vendor. If the business maintains an inventory, the posting of purchases also affects the inventory ledger.Finally, all purchase journal activity is also posted to the general ledger Cash isbursements / Checks Payments on account or for expenses are posted to the cash disbursement journal. Payment on account information also accumulates on the accounts payable ledger, organized by vendor. These postings are also entered on the bank account ledger. Finally, all cash disbursement journal activity is also posted to the general ledger. Accounts Payable Accounts Payable is a separate journal that records both sales and cash receipt data by vendor. The data come s from the postings to the cash disbursement journal and the purchase journal. 3. Payroll Cycle Payroll data, by employee, for each payroll data is entered into the payroll journal.These postings are also entered in the cash disbursements journal and the payroll ledger. Finally, all payroll journal activity is also posted to the general ledger. 4. General Journal Cycle Corrections or adjustments to the above major transaction cycles can be made through adjusting journal entries, posted directly to the General Ledger. These are compiled in a separate journal, known as the General Journal. How does posting work? The specific postings, as outlined in the cycles above, do not necessarily take place as separate steps, especially in computerized environments. There are only two basic methods of posting in computerized accounting systems: real-time posting and batch posting.In real-time posting, the source transaction, (check, bill, payment, receipt, etc. ), is posted to the specific journ al and any related subsidiary ledgers (accounts receivable, accounts payable, inventory, bank account, etc. ), and is simultaneously posted to the general ledger. In batch posting, the journals and subsidiary ledgers are posted, but entries are not yet posted to the general ledger. Posting these journals to the general ledger is done separately. Typically, a group of transactions is entered, a full day's worth, for example. Later, after the journals are reviewed for accuracy, this entire day's group, or ââ¬Å"batchâ⬠is posted to the general ledger.To understand this posting process better, it would be helpful to follow specific transactions through a sample company. First, however, we need to define various accounting terms and concepts. Accounting Terms and Concepts Double-Entry Accounting We can justifiably thank the 14th century Italian merchants for developing the doubleentry system of accounting that we still use today. It is widely believed that Benedetto Cotrugli was t he first to document this concept of double-entry accounting. In 1458, he wrote Delia Mercatura et del Mercante Perfetto (Of Trading and the Perfect Trader), which included a brief chapter describing many of the features of double entry accounting.Years later in 1494, Luca Pacioli, from San Sepulcro in medieval Tuscany, published The Summa's 36 short chapters on bookkeeping, entitled ââ¬Å"De Computis et Scripturisâ⬠(ââ¬Å"Of Reckonings and Writingsâ⬠), so that the subjects of the Duke of Urbino could learn how to conduct business and to provide the trader with a fast method to determine his assets and liabilities. For centuries before, commercial transactions had been recorded and journalized, whether on paper, papyrus or clay tablets. However, these journals provided only totals of transaction groupings. It was the Italians that first recognized that it is impossible for a business transaction to occur without affecting at least TWO accounts. There can never be only o ne effect from a transaction.An Italian farmer sells wood to a shipbuilder for 400 ducats. To account for this transaction he would record: wood sale ââ¬â 400 ducats. His ââ¬Å"salesâ⬠account has been increased by 400 ducats. But, what else has happened? What other account was affected? His ââ¬Å"cashâ⬠account also increased by 400 ducats. What if he sells his wood to the shipbuilder on credit, and he receives no cash? In this case it's his ââ¬Å"accounts receivableâ⬠account, which increased by 400 ducats. There are always, at least two sides to each transaction. Later, when the shipbuilder pays his debt to the farmer, the farmer records an increase in his cash and a decrease in his accounts receivable by 400
Saturday, November 9, 2019
Reificaition Case Essay
Wikipedia defines reification as ââ¬Å"(Lat. res thing + facere to make) n. the turning of something into a thing or object; the error which consists in treating as a ââ¬Å"thingâ⬠something which is not one. Hypostatization, treating an abstract entity as if it were concrete, is a case in pointâ⬠. In Marxist terms, it is the consideration of a human being as a physical object, deprived of subjectivity. According to Marxists, this is one of the pitfalls of the capitalist system because in such a system the laborers and their work are not valued to their proper extent. Their work is treated as a commodity and is valued according to the unpredictable needs of the market. This concept is closely tied to the Marxist idea of commodity fetishism which Wikipedia describes as ââ¬Å"an inauthentic state of social relations, said to arise in complex capitalist market systems, where social relationships are confused with their medium, the commodity.â⬠Marxist writer, Georg Lukà ¡cs, writes thus: The transformation of the commodity relation into a thing of ââ¬Ëghostly objectivityââ¬â¢ cannot there ore content itself with the reduction of all objects for the gratification of human needs to commodities. It stamps its imprint upon the whole consciousness of man; his qualities an abilities are no longer an organic par of his personality, they are things which he can ââ¬Ëownââ¬â¢ or ââ¬Ëdispose ofââ¬â¢ like the various objects of the external world. Simply put, Marxists criticize capitalist systems for stripping the human person of his social nature. He is transformed into a commodity or a product. Oneââ¬â¢s labor is transformed into money which is in turn used to purchase the products of other peopleââ¬â¢s labor. Although this may facilitate the exchange of goods, the problem of the system lies in the fact that because of this abstraction, the use-value (the actual usefulness of the object) is oftentimes totally different from its exchange-value (the value of the object in the marketplace). For example, a person who creates a hammer (which has a variety of uses) will be paid less than a person who makes jewelry (an object which has less use than a hammer). The value given to the work of the laborer is incommensurate to the work and effort that he made in order to produce the good. How can reification be avoided? Marxist measures against reification have proven themselves to be ineffective (including complete control over the market and standardization of wages). This is because these measures tend to remove the element of competition from the formula, thus, causing production to suffer instead. An alternative mode by which reification is avoided is through the respect of human rights. According to John Locke, each person has the natural right to life, liberty and estate which must be protected by the government. These rights must ensure that each person shall be given his due. By treating persons as individuals with human rights and dignity, people will be treated as an end and never as a means. The theory of human rights has been upheld and accepted by most of the world and are embodied in international instruments and conventions, most notable is the Universal Declaration of Human Rights. In the field of labor and employment, modern societies have integrated this idea of human dignity by setting minimum standards and conditions to be strictly followed by employers under the pain of appropriate sanctions should they be defied. For example, there could be a law saying that any employee who works beyond eight hours in a single day shall be given additional overtime pay. Another instance would be a law that would lay down a minimum wage based on the living standards and conditions of the locality where the worker belongs. By recognizing the human dignity of every person, reification is completely obliteration because persons are then given the respect they deserve. They are no longer treated as cogs in the machinery of production but are considered partners in the enterprise. By holding that each person deserves to be treated with dignity, they are esteemed as subjects never objects, and will be given their due. à à Bibliography Lukà ¡cs, Georg. 1967. History & Class Consciousness. Translated by Andy Blunden. Merlin Press. Smith, John, Bob Snider, and Diane Hill. 2005. A study of physics. New York: McGraw Hill. Wikipedia. 2006. Commodity fetishism. Wikipedia. http://en.wikipedia.org/wiki/Commodity_fetishism. Ashcraft, Richard. 1986. Revolutionary Politics and Lockeââ¬â¢s ââ¬Å"Two Treatises of Governmentâ⬠. Princeton: Princeton University Press. Wikipedia. 2006. Georg Lukà ¡cs. Wikipedia. http://en.wikipedia.org/wiki/Georg_Luk%C3%A1cs. Wikipedia. 2006. Human Rights. Wikipedia. http://en.wikipedia.org/wiki/Human_rights. Wikipedia. 2006. John Locke. Wikipedia. http://en.wikipedia.org/wiki/John_locke. Wikipedia. 2006. Reification. Wikipedia. http://en.wikipedia.org/wiki/Reification.
Thursday, November 7, 2019
Supercomputers Essays
Supercomputers Essays Supercomputers Essay Supercomputers Essay A supercomputer is a computer that is at the frontline of current processing capacity, particularly speed of calculation. Supercomputers were introduced in the 1960s and were designed primarily by Seymour Cray at Control Data Corporation (CDC), which led the market into the 1970s until Cray left to form his own company, Cray Research. He then took over the supercomputer market with his new designs, holding the top spot in supercomputing for five years (1985ââ¬â1990). In the 1980s a large number of smaller competitors entered the market, in parallel to the creation of the minicomputer market a decade earlier, but many of these disappeared in the mid-1990s supercomputer market crash. Today, supercomputers are typically one-of-a-kind custom designs produced by traditional companies such as Cray, IBM and Hewlett-Packard, who had purchased many of the 1980s companies to gain their experience. As of May 2010[update], the Cray Jaguar is the fastest supercomputer in the world. The term supercomputer itself is rather fluid, and todays supercomputer tends to become tomorrows ordinary computer. CDCs early machines were simply very fast scalar processors, some ten times the speed of the fastest machines offered by other companies. In the 1970s most supercomputers were dedicated to running a vector processor, and many of the newer players developed their own such processors at a lower price to enter the market. The early and mid-1980s saw machines with a modest number of vector processors working in parallel to become the standard. Typical numbers of processors were in the range of four to sixteen. In the later 1980s and 1990s, attention turned from vector processors to massive parallel processing systems with thousands of ordinary CPUs, some being off the shelf units and others being custom designs. Today, parallel designs are based on off the shelf server-class microprocessors, such as the PowerPC, Opteron, or Xeon, and coprocessors like NVIDIA Tesla GPGPUs, AMD GPUs, IBM Cell, FPGAs. Most modern supercomputers are now highly-tuned computer clusters using commodity processors combined with custom interconnects. Supercomputers are used for highly calculation-intensive tasks such as problems involving quantum physics, weather forecasting, climate research, molecular modeling (computing the structures and properties of chemical compounds, biological macromolecules, polymers, and crystals), physical simulations (such as simulation of airplanes in wind tunnels, simulation of the detonation of nuclear weapons, and research into nuclear fusion). A particular class of problems, known as Grand Challenge problems, are problems whose full solution requires semi-infinite computing resources. IBM SUPERCOMPUTERS According to the June 2010 TOP500 (link resides outside of ibm. com) List of Supercomputers, IBM continues to lead the list for the twenty-second consecutive time with the most installed aggregate performance. IBM has regained the lead with the most entries on the list with 196. IBM also leads the Top 10 for the twelfth consecutive time with a total of four of the systems including, the #3 system, the first system to sustain a petaflop of performance, which IBM built for the Roadrunner project at the Los Alamos National Lab. Other systems in Top 10 were the #5 IBM Blue Gene/P system at Forschungszentrum Juelich, with over 825 teraflops which is the most powerful supercomputer in Europe. The IBM Blue Gene/L at the US Department of Energy Lawrence Livermore National Lab, long time previous leader, is now the #8 system, and the #9 IBM Blue Gene/P at Argonne National Lab. IBM Offers: Unmatched expertise to help you solve your toughest problems due to our technology leadership in clustering, chip technology, Linux and support for a broad range of applications for your solution area. Improved flexibility provides you a full-scope infrastructure worldwide based on our vast portfolio spanning the widest range of platforms, architectures and operating systems. Faster implementations by applying our in-depth vertical expertise and broad range of deployment experience. Results that speak for themselves: IBM is supercomputing leader as provider of 27 of the worlds 100 most powerful supercomputers according to the most recent TOP500 Supercomputing Sites (link resides outside of ibm. com) ranking Awarded more patents than any other company for each of the last 17 years with 4,914 patents in 2009 alone. First to break the petaflop performance barrier. Leading energy-efficiency with 17 of 20 highest megaflops per watt systems. IBM7030 [pic] The IBM 7030, also known as Stretch, was IBMs first transistorized supercomputer. The first one was delivered to Los Alamos in 1961. Originally priced at $13. 5 million, its failure to meet its aggressive performance estimates forced the price to be dropped to only $7. 78 million and its withdrawal from sales to customers beyond those having already negotiated contracts. Even though the 7030 was much slower than expected, it was the fastest computer in the world from 1961 until the first CDC 6600 became operational in 1964. The IBM 7950 [pic] The IBM 7950, also known as Harvest, was a one-of-a-kind adjunct to the Stretch computer which was installed at the US National Security Agency (NSA). Built by IBM, it was delivered in 1962 and operated until 1976, when it was decommissioned. Harvest was designed to be used for cryptanalysis. ACS -1 The ACS-1 and ACS-360 are two related supercomputers designed by IBM as part of the IBM Advanced Computing Systems project from 1961 to 1969. Although the designs were never finished and no models ever went into production, the project spawned a number of organizational techniques and architectural innovations that have since become incorporated into nearly all high-performance computers in existence today. Many of the ideas resulting from the project directly influenced the development of the IBM RS/6000 and, more recently, have contributed to the Explicitly Parallel Instruction Computing (EPIC) computing paradigm used by Intel and HP in high-performance processors. BLUE GENE [pic] Blue Gene is a computer architecture project designed to produce several supercomputers, designed to reach operating speeds in the PFLOPS (petaFLOPS) range, and currently reaching sustained speeds of nearly 500 TFLOPS (teraFLOPS). It is a cooperative project among IBM (particularly IBM Rochester and the Thomas J. Watson Research Center), the Lawrence Livermore National Laboratory, the United States Department of Energy (which is partially funding the project), and academia. There are four Blue Gene projects in development: Blue Gene/L, Blue Gene/C, Blue Gene/P, and Blue Gene/Q. The project was awarded the National Medal of Technology and Innovation by U. S. President Barack Obama on September 18, 2009. The president bestowed the award on October 7, 2009. BLUE WATERS [pic] Blue Waters is the name of a petascale supercomputer being designed and built as a joint effort between the National Center for Supercomputing Applications, the University of Illinois at Urbana-Champaign, and IBM. On August 8, 2007 the National Science Board approved a resolution which authorized the National Science Foundation to fund the acquisition and deployment of the worlds most powerful leadership-class supercomputer. The NSF is awarding $208 million over the next four and a half years for the Blue Waters project. CYCLOPS64 Cyclops64 (formerly known as Blue Gene/C) is a cellular architecture in development by IBM. The Cyclops64 project aims to create the first supercomputer on a chip. Cyclops64 exposes much of the underyling hardware to the programmer, allowing the programmer to wri te very high performance, finely tuned software. One negative consequence is that efficiently programming Cyclops64 is difficult. [citation needed] The system is expected to support TiNy-Threads (a threading library developed at the University of Delaware) and POSIX Threads DEEP BLUE [pic] Deep Blue was a chess-playing computer developed by IBM. On May 11, 1997, the machine won a six-game match by two wins to one with three draws against world champion Garry Kasparov. Kasparov accused IBM of cheating and demanded a rematch, but IBM refused and dismantled Deep Blue. Kasparov had beaten a previous version of Deep Blue in 1996. IBM Kittyhawk Kittyhawk is a new theoretical IBM supercomputer. The project was announced, which entails constructing a global-scale shared supercomputer capable of hosting the entire Internet on one platform as an application. Currently the Internet is a collection of interconnected computer networks. In 2010 IBM open sourced the Linux kernel patches that allow otherwise unmodified Linux distributions to run on Blue Gene/P. This action allowed the Kittyhawk system software stack to be run at large scale at Argonne National Lab. The open source version of Kittyhawk is available on a public website hosted by Boston University. MAGERIT [pic] Magerit is the name of the supercomputer which reached the second best Spanish position in the TOP500 list of supercomputers. This computer is installed in CeSViMa, Computer Science Faculty of the Technical University of Madrid. Magerit was installed in 2006 and reached the 9th fastest in Europe and the 34th in the world. It also reached the 275th position in the first Green500 list published. It is the second most powerful supercomputer designated for scientific use in Spain, after the Barcelona Supercomputing Center MareNostrum. Magerit is the ancient name of the current city of Madrid. The name comes from a fortress built on the Manzanares River in 9AD, and means Place of abundant waterâ⬠. IBM Naval Ordnance Research Calculator (NORC) pic] The IBM Naval Ordnance Research Calculator (NORC) was a one-of-a-kind first-generation (vacuum tube) electronic computer built by IBM for the United States Navys Bureau of Ordnance. It went into service in December 1954 and was likely the most powerful computer at the time. The Naval Ordnance Research Calculator (NORC), was built at the Watson Scientific Computing Laboratory under the direction of Wallace Eckert. The computer was presented to the US Navy on December 2, 1954. At the presentation ceremony, it calculated pi to 3089 digits, which was a record at the time. The calculation took only 13 minutes. In 1955 NORC was moved to the Naval Proving Ground at Dahlgren, Virginia. It was their main computer until 1958, when more modern computers were acquired. It continued to be used until 1968. Its design influenced the IBM 701 and subsequent machines in the IBM 700 series of computers. PERCS PERCS (Productive, Easy-to-use, Reliable Computing System) is IBMs answer to DARPAs High Productivity Computing Systems (HPCS) initiative. The HPCS program is a three-year research and development effort. IBM was one of three companies, along with Cray and Sun Microsystems, that received the HPCS grant for Phase II. In this phase, IBM collaborated with a consortium of 12 universities and the Los Alamos National Lab to pursue an adaptable computing system with the goal of commercial viability of new chip technology, new computer architecture, operating systems, compiler and programming environments. IBM was chosen for Phase III in November 2006, and granted $244 million in funds for continuing development of PERCS technology and delivering prototype systems by 2010. Roadrunner [pic] Roadrunner is a supercomputer built by IBM at the Los Alamos National Laboratory in New Mexico, USA. Currently the worlds third fastest computer, the US$133-million Roadrunner is designed for a peak performance of 1. 7 petaflops, achieving 1. 026 on May 25, 2008 to become the worlds first TOP500 Linpack sustained 1. 0 petaflops system. It is a one-of-a-kind supercomputer, built from off the shelf parts, with many novel design features. In November 2008, it reached a top performance of 1. 456 petaflops, retaining its top spot in the TOP500 list. It is also the fourth-most energy-efficient supercomputer in the world on the Supermicro Green500 list, with an operational rate of 444. 4 megaflops per watt of power used. IBM Sequoia The Sequoia is a petascale Blue Gene/Q supercomputer being constructed by IBM for the National Nuclear Security Administration as part of the Advanced Simulation and Computing Program (ASC). It is scheduled to go online in 2011 at qpetaflops was more than the combined performance of the top 500 supercomputers in the world, about 20 times faster than then reigni ng champion Roadrunner. It will also be twice as fast as Pleiades, a proposed supercomputer built by SGI at NASA Ames Research Center SHAHEEN [pic] Shaheen consists primarily of a 16-rack IBM Blue Gene/P supercomputer owned and operated by King Abdullah University of Science and Technology (KAUST). Built in partnership with IBM, Shaheen is intended to enable KAUST Faculty and Partners to research both large- and small-scale projects, from inception to realization. Shaheen, named after the Peregrine Falcon, is the largest and most powerful supercomputer in the Middle East and is intended to grow into a petascale facility by the year 2011, Originally built at IBMs Thomas J. Watson Research Center in Yorktown Heights, New York, Shaheen was moved to KAUST in mid-2009. The father of Shaheen is Majid Al-Ghaslan], KAUSTs founding interim chief information officer and the Universitys leader in the acquisition, design, and development of the Shaheen supercomputer. Majid was part of the executive founding team for the University and the person who also named the machine. Super computers [pic] Submitted by: Hina maheshwari BBM 3rd year 087518 Uses of Supercomputer Since its creation in the 1960s, the supercomputer has been used by a variety of large companies and colleges in an effort to conduct research that otherwise would not be possible. Because supercomputers can crunch numbers at a far superior rate than humans as well as work in a multidimensional way, the devices are essential to modern studies and research. 1) Quantum Mechanics Supercomputers are used heavily in the processing of information on quantum mechanics. They are used to study physical systems at the atomic level. 2) Weather Large-scale weather forecasting, such as that of global climate change, needs to use supercomputers in order to take into account globally changing conditions. 3) Modeling Intensive modeling is conducted using supercomputers. This is useful for molecular studies, polymer research, chemical composition and simulations such as wind tunnel research. 4) Military Military applications are very elaborate. From organizing war games to studying the effects of nuclear detonations on a large scale, many militaries across the planet use supercomputers. The Role and Importance of super Computers is hidden from no one. Yet The use of Super Computers has been limited to only a handful of nations in the world who have this expertise. In India the The Saga of Super Computer Dates backs to 80s when India was denied the Cray Super Computer. Since then India has made Several Indegenious Efforts which have been Highly successful. The Use of Super computers in Military is an All Together New Concept which has unleashed a new Era of Military Super Computing With India Signing the Nuclear Deal, It has become an urgent requirement to devise means that can test and simulate our weapons and one such application is Nuclear testing. As the readers might know the Indian Super Computing Efforts are centred around CDAC, Centre for Development of Advanced Computing, Pune which has developed the PARAM series of Super Computers. India has achieved the capability through which it can Actually Test a Nuclear Detonation and Without the fear of Sanctions Improve its Weapon Parameters. 5) Grand Challenge Unsolved problems (known as Grand Challenge problems) are frequently the subject of supercomputer use. Examples of this include mathematical problems and protein-folding techniques.
Subscribe to:
Posts (Atom)