Premium Essay

Business File

In:

Submitted By TanvirSA
Words 720
Pages 3
Dutch-Bangla Bank Limited
Financial Statements as at 31 March 2010
BALANCE SHEET
As at 31 March 2010 (Provisional & Unaudited)
PROPERTY AND ASSETS Cash In hand (including foreign currencies) Balance with Bangladesh Bank and its agent bank (s) (including foreign currencies) Balance with other banks and financial institutions In Bangladesh Outside Bangladesh Money at call and short notice Investments Government Others Loans and advances Loans, cash credits, overdrafts, etc. Bills purchased and discounted Lease receivables
31-Mar-10 31-Dec-09 31-Mar-09

Taka 2,905,394,592 4,185,665,045 7,091,059,637 8,673,446,131 (72,867,130) 8,600,579,001 530,000,000 9,666,160,646 1,284,671,156 10,950,831,802 45,623,938,139 5,109,136,657 20,991,764 50,754,066,560 1,908,586,455 4,162,264,224 83,997,387,679

Taka (Audited) 1,938,163,866 4,715,736,654 6,653,900,520 9,941,747,284 272,069,775 10,213,817,059 820,000,000 9,669,879,937 16,000,000 9,685,879,937 44,048,957,314 4,311,738,981 50,293,324 48,410,989,619 1,773,599,221 3,922,343,126 81,480,529,482

Taka 1,507,701,863 4,131,547,154 5,639,249,017 2,920,189,386 (37,196,795) 2,882,992,591 2,365,000,000 8,289,142,464 19,000,000 8,308,142,464 37,255,081,586 3,300,327,431 599,526,336 41,154,935,353 1,514,454,561 3,085,328,732 64,950,102,718

Fixed assets including land, building, furniture and fixtures

Other assets Non-banking assets TOTAL ASSETS LIABILITIES AND CAPITAL Liabilities Borrowings from other banks, financial institutions Deposits and other accounts Current deposits and other accounts Bills payable Savings bank deposits Term deposits Other liabilities Subordinated debt TOTAL LIABILITIES

1,940,530,900

2,511,486,589

656,557,191

12,234,570,407 982,629,706 24,625,099,865 32,286,541,418 70,128,841,396 5,630,947,255 1,514,731,226 79,215,050,777

11,448,356,019 994,834,821 22,344,361,766 33,000,980,429 67,788,533,035 5,313,981,373

Similar Documents

Free Essay

Hurray

...PROCEDURES FOR CONDUCTING PRACTICAL ICT TESTS The Supervisor A suitably competent supervisor, who may be the candidates’ tutor, is responsible for the administration of the practical tests according to these instructions. The supervisor is responsible for the preparation of the hardware and software for the test. Timetabling of the Practical Tests CIE does not timetable the practical tests in the same way as most IGCSE and AS & A Level written papers. The IGCSE and AS & A Level timetable will specify a period within which candidates must take the two practical tests for each syllabus. Within this period, Centres may conduct the practical tests at any convenient time or times. Candidates must complete each practical test in a single session. Wherever possible, candidates from the same Centre should sit their assessment at the same time. If more than one session is necessary to accommodate all candidates, these sessions should follow on from each other. However, Centres do not need to sequester candidates until other candidates have taken the test. When arranging examination dates, Centres should take into account the time needed to set up the system and should allow contingency planning (e.g. to reschedule examination times due to possible hardware failure) wherever possible. Preparation for the Practical Tests Before the candidates take a practical test, the supervisor must work through a past/specimen paper, using the hardware and software that the candidates will be using...

Words: 2393 - Pages: 10

Premium Essay

An Analysis of Ecb

...This customer data file is for 60,000 customer records in the restaurant category. Clean up the data: As with most customer data files, there is incomplete information. Address how you handle incomplete data. (I suggest completely eliminating records in Acquisition Channel with “NULL” or “Uncategorized”.) Also eliminate any records with blank in Ethnicity. Note in Ethnicity African-Americans is also coded as Afr. Am. so these two should be combined. In Age of Kids there are cells coded as Pre-teen &? I suggest combining with “Age Mix” or “Preteen & Teenagers”. After cleaning up the file, we are left with 26,352 records which should still be an adequate sample size.) Questions for analysis: 1. Calculate the profitability of each customer. Assume the average Cost of Goods Sold (COGS) for all vouchers (with promotional discounts factored in) is 20% of the total revenue. Assume the average one-time Cost per Acquisition (CPA) for each channel is: $12 for Advertising, $10 for Affiliate, $5 for Email, $8 for ILS, $7 for Paid Search and $5 for Social Media. Assume there are no additional costs. You may find the Excel VLOOKUP function helpful for this (https://support.office.com/en-sg/article/VLOOKUP-function-0bbc8083-26fe-4963-8ab8-93a18ad188a1). 2. What does the “average” ECB.com customer look like? Is the “average” customer desirable or undesirable? Why? 3. Describe each segment (new, engaged, lapsed, inactive). How much revenue does each segment...

Words: 517 - Pages: 3

Free Essay

Introducing Transaction Log Files

...Introducing Transaction Log Files Each SQL Server 2000 database has at least one transaction log file and can have multiple transaction log files spread across a number of disks. Each transaction log file is a separate operating system file and is used by only one database. Each transaction log file generally has the .ldf filename extension (this extension is not required). Each transaction log has a logical filename that is used in Transact-SQL statements and a physical filename that is used by the Windows operating system. Additional file properties include the file ID number, initial file size, file growth increment (if any), and maximum file size. Unlike data files that contain pages, transaction log files contain a series of transaction log records. A sequential log sequence number (LSN) identifies each transaction log record. Regardless of the number of physical log files, SQL Server 2000 treats the transaction log as one continuous log. SQL Server 2000 logically divides each physical transaction log file into a number of virtual log files (VLFs). The number and size of virtual log files are determined dynamically based on the size of each transaction log file. Each transaction log file has at least two VLFs. Each growth increment (if any) is treated as a separate physical file with its own VLFs. The number or size of VLFs cannot be configured or set directly by the database administrator. SQL Server 2000 tries to maintain a small number of virtual file logs because it operates...

Words: 2158 - Pages: 9

Free Essay

Case Project

...College Case Project Linux as an operating system is a powerful tool used in businesses for its secure kernel and command line interface. From a small business to a large enterprise, Linux is used to run servers, store vital information and documents. In Outdoor Adventures, this store needs a more efficient computing system. The system will need to keep information available and secure enough to ensure that the information can only be seen by the right people. To help keep things organized, a file structure will also be required to keep all the files with special permissions together for easy access. To better illustrate the security capabilities of Linux Ed Sawicki of Biznix.org said, “The Linux firewall has functionality that rivals expensive commercial firewalls. Its rules allow fine grained control over stateless and stateful packet filtering. The Linux firewall is extensible, allowing new filtering capabilities as the need arises.” This comparison is powerful when considering what would be the most cost effective direction for a business, but also the safest. Another advantage of linux is that it is generally free to try before applying it to a commercial setting. The product can in effect speak for its self by allowing itself to be made publicly available so there is no need to consider it a “business risk” when a technician can experiment with it first before applying it on a much grander scale. “Linux…is a freely available multitasking and multiuser operating...

Words: 1333 - Pages: 6

Free Essay

Batch Files

...Batch Files: What is it and its harm Devry University The early business computers systems developed in the 1950’s showed how efficient they were by processing large group of records. They did all of this in batches. In the 1960s, computer engineers introduced interactive terminals. This would allow users to input for the very first time. Now today, even with use of laptops, home computers, and mobile devices. Most of the business and organizations still use some type of batch file processing for most of their applications. A batch file is a collection of commands that are processed in a certain order sometimes requiring the user to input information. With a computer using an operating system like Windows. A batch file is stored in a .bat file extension format. Most other operating systems may determine a batch file in a command file, using two or more commands that are processed one right after another. Just to perform the task at hand. Batch files are normally used to load programs, run different task at one time, and to perform repetitive tasks. An example of a batch file could be to back up files from different computers to a storage device or run the diagnostics on a system or process some type of log files. Batch files can start working at any time and can be left completely alone until the process is finished. The one of the main advantages to using batch files is the accessibility. A person can make the file entry themselves and...

Words: 710 - Pages: 3

Free Essay

Bitlocker

... Business Laptops Tablets Phones Hardware Security Software Gadgets Security Games Productivity Audio Business Software Photography Utility software How to Encrypt Your Windows PC More Stories in this Series Security software Business security , Encryption , file management, encryption How to Use BitLocker to Encrypt Your Hard Drive By Eric Geier, PCWorld Oct 26, 2011 7:00 PM e-mail print Even without knowing your Windows password, intruders can easily gain access to files and passwords stored by Windows and other programs on your computer. They can do this by booting into their own operating system (Windows or Linux) from a special disc or USB flash drive. After doing so, they can access your hard drives just as you can when you're logged into Windows. The only way to protect your data completely is by using encryption. You can encrypt select files, but to protect your system files and saved passwords, you must encrypt your entire hard drive. This operation takes more time and effort than encrypting select files does, but it offers more security--and it's great for laptops and netbooks that can easily go missing. If your computer is running the Ultimate or Enterprise edition of Windows 7 or Vista, you can use Microsoft’s included BitLocker feature to encrypt your entire drive. BitLocker offers protection for all of your personal files and documents...

Words: 1352 - Pages: 6

Premium Essay

Windows Server Proposal for Worldwide Advertising Inc.

...failure of a business. After reviewing the needs of Worldwide Advertising Inc., I have come up with what I think is the best solution.  I will be covering infrastructure server roles such as:  DHCP and DNS, which work behind the scenes, to the application servers which give life to your advertising dreams.  I have prescribed an active directory schema that will require effortless management. I have proposed a File and Sharing implementation that suites a growing enterprise as well as state of the art data storage. I have also noted some preliminary estimates of scheduling and manpower required for the solution. Deployment and Server Edition             Throughout the infrastructure the most advanced server operating system, Windows Server 2008 R2, will be used. Enterprise edition will be leveraged on all servers, because it has 4 virtual licenses per OS. To increase reliability and security Server Core will be on all servers. There will be a total of 10 servers for the Worldwide Advertising Inc. internal network. The majority of the servers will be managed from the Los Angeles main office while four servers will be located at the New York branch. All 35 desktops will run Windows Vista Service Pack 1 for its’ operability with the network and specifically Terminal Services Web Access. Thirty terminals will be utilized to satisfy the current employees’ needs, and five desktops for backup. (Zacker, 2009)  All servers and operating systems will be installed using image files remotely...

Words: 2342 - Pages: 10

Premium Essay

Organizing Law Firm

...procedures and policies that will be put in place to make the law office operate efficiently and effectively. Throughout the Plan, I will detail how the policies and equipment work together to aid the law firm in serving its clients. I. Equipment a. Computer Equipment, including Phones, Fax, and Printers In organizing the law office of Boggs & Buggs, I would first acquire state-of-the-art computers equipped with Microsoft Office, Adobe Acrobat, Internet Explorer and other vital applications. I would make sure that the computers have enough permanent memory and temporary memory to run efficiently using various software packages. I would also acquire the fastest internet available for business because I would want to keep all business processes efficient. Therefore, the firm would not endure delays due to slow or mediocre internet connections. Furthermore, I would establish a multiple-line phone system. The phone system will be able to transfer calls within the law office and from the law office to the attorneys' cell phone and house phone. In addition, the phone system would allow for calls to be redirected to other phone numbers for certain instances when no person is available in the law office. To avoid massive phone calls and messages, I would direct clients to email all inquiries that are not considered an immediate emergency. By employing this policy, the phone lines should receive less activity. In addition, inquiries from...

Words: 1808 - Pages: 8

Premium Essay

Is4670 Project

...A detailed search of the Web site has been conducted, and no files were found beyond the static HTML Web pages expected. Three workstations are used to update content on the Web site, and a network packet trace has been captured for traffic between the workstations and the internal FTP upload site for posting data to the Web server. This packet trace is available for your use. Once you understand the situation, your manager tells you to divide the investigation into three parts. The first part involves the use of NetWitness Investigator to identify user credentials, correlate source host address(s), and evaluate network traffic for unusual activity that might provide a starting point for your system forensic investigation. In the second part, you will use Paraben P2 Commander to examine a forensic system image and evaluate files, communications, and applications, which could be items of potential evidentiary value in this investigation. You will use your findings from the first part of the investigation to guide your selection of workstation(s) for review and user profile(s) for specific investigation. In the third part, you need to document your results along with the investigative process and any indicators you discovered that led to additional actions on your part. The investigation must be limited to the scope identified by these indicators, and all investigative actions should be supportable if you are called as an expert witness in later proceedings. AAA Computer...

Words: 1589 - Pages: 7

Premium Essay

Case Study: Foreclosure Unit

...Foreclosure is a specific legal process in which a lender attempts to recover the balance of a loan from a borrower who has stopped making payments to the lender by forcing the sale of the asset used as the collateral for the loan. Formally, a mortgage lender (mortgagee), or other lien holder, obtains a termination of a mortgage borrower (mortgagor)'s equitable right of redemption, either by court order or by operation of law. It is usually an activity to a business like a bank since it is an institution for lending money or an exchange of collateral like a house or any assets. Banks act as payment agents by conducting checking or current accounts for customers, paying checks drawn by customers on the bank, and collecting checks deposited to customers' current accounts. Banks also enable customer payments via other payment methods such as Automated Clearing House (ACH), Wire transfers or telegraphic transfer, EFTPOS, and automated teller machine (ATM). Banks borrow money by accepting funds deposited on current accounts, by accepting term deposits, and by issuing debt securities such as banknotesand bonds. Banks lend money by making advances to customers on current accounts, by making installment loans, and by investing in marketable debt securities and other forms of money lending. Being a money-based institution, as for money acts as a medium of exchange, people would like to invest it in able to get a higher return. Because of the usefulness of a bank, they create other...

Words: 1815 - Pages: 8

Premium Essay

Pos 355 File Management

...File Management Comparison for Operating Systems All computers and their subsequent operating systems use a means of digitally storing data within a file onto an allotted section of some type of storage media. The allotted section of storage can theoretically be read from, and written to as required. The data in the file is stored as bytes of binary code, and can be identified as belonging to a particular file by the file’s start or “address”. Though the storage section is linear in nature, it can be visualized as a cross grid of cells, with each cell containing one byte of data. The combined cells of data populate the allotted section of storage within a file. At this point, operating systems diverge from this commonality, particularly in the way the operating systems manage files through their respective “file management” programs. The following is a cursory look at three such operating system’s file management schemes. Mac OS file system Mac OS uses what is called the Hierarchical File System (plus). It comes from the original version of the Hierarchical File System (HFS), which comes from the Macintosh File System (MFS), used with older Mac systems. The HFS concept begins with a sole directory on a storage media (in this case a hard drive or hard disk). From this directory, sub-directories are created, and so on, down to the user and user access files. This is the most simplistic of file management system concepts, in theory. Mac OS is also proprietary. Linux...

Words: 829 - Pages: 4

Premium Essay

Is3350 Unit 7 Discussion

...Violation of your copyright privileges, and how you feel knowing that thousands of users are simply copying and sharing your composition, for which they might have paid for otherwise. Peer-to-Peer (“P2P”) file sharing is a way of exchanging or transferring files of which you do not have permission to share can have serious consequences. We have worked hard to compose this new pop song and it is unfair that others are sharing and copying this song without paying for it. We are in the business of entertaining our fans but we are also a business and as such, we rely on the revenues generated from the sales of our music. • Enabling your case as a consideration in the purview of “fair use” under the law. Fair use is a concept that allows use of limited portions of a copyrighted work, without the permission of the copyright owner, for purposes such as scholarship, research, and criticism. Fair use does not mean that if you think it's fair that you should be able to use a work, it's okay. Rather, whether a particular use of copyrighted material is a fair use must be judged according to the four criteria in the Copyright Act: Purpose and character of the use (why do you want to use it?). Nature of the copyrighted work (what kind of work is it?). Amount and substantially used (how much do you want to copy?). Effect on the potential market for or value of the work (will your copying contribute to decreasing the value or demand for the work?). ...

Words: 417 - Pages: 2

Free Essay

Organization, Time Management, Effective Communication

...learning. While some people believe if they have intelligence and talent, they will get success in their study, but others claim that a important factor to contribute to the achievements of their performance is hard-working. For me, in my self-study experience, intelligence, talent or hard-working are not enough, the improvement of some modern-technology skills in looking for informaton leads student to be successful. The truth is that because of taking advantage of using organization, some abilities in time management and effective communication on online learning is the way to approach me to knowledge and get good achievements in my MBA online course. The role of organization Regarding organization, well organized materials, documents or files is one of the ways a person use to save his time and manage his work. Many people could not remember where they are put a hard copy document in, hence, they waste a lot of time to locate it with an exhausted and confused feeling. It also...

Words: 1642 - Pages: 7

Free Essay

Computer Forensics

...Computer Forensics The world of crime has expanded right along with the explosion of the internet. The modern cyber criminal has veritable global playground in which to steal money and information from unsuspecting victims. Computer forensics is a quickly emerging science against the increasingly difficult battle to bring criminals to justice who perpetrates crimes on others. The computer forensics field is a relatively new investigative tool but enjoys continual advances in procedures, standards, and methodology which is making the identification, preservation, and analyzing of digital evidence a powerful law enforcement apparatus. The job of the cyber forensic professional is to look for clues the attacker left behind on web sites, servers, and even the e-mail message itself that will unravel their sometimes carefully woven veil of secrecy. Attackers come in all forms and from a variety of different circumstances. For instance, an attacker can begin a phishing scam with only a web server they control with very little programming experience and a way to send a lot of e-mail messages. (Jones 4) In order to combat the waves of cyber-attackers, we must utilize Open Source Community applications to combat the continual onslaught of infections, exploitations, and trickery employed everyday against our systems and networks. Today's attacker uses a variety of technologies to employ their methods and understanding those abilities is integral to preparing for an investigation...

Words: 2742 - Pages: 11

Premium Essay

Windows Os File System Comparsion

...File System Comparison POS/421 Windows Server Networking January 30, 2012 Ali Shokraee File System Comparison This paper is going to compare the different file system structures used for the different version of Windows Operating Systems. This will go from the Disk Operating System (DOS) of the early years to the latest Windows Server 2008. The desktop OS and the servers OS will be compared and contrasted in this paper. Different Types of File Systems There were many different types of file systems that were used over the years that Microsoft was in business. This ranges from the DOS years to the most current version from Microsoft, Windows Server 2008. The following table (table 1) shows the different File Systems that Microsoft has used and the Operating System (OS) that uses that type of File System (NTFS.com, 2011). |File System Structure |Operating System | |FAT12 |All Versions of MS DOS | |FAT16 |All Versions of MS DOS | |FAT32 |DOS v7 and Higher, Windows 98, Windows ME, Windows 2000, Windows XP, Windows 2003 | | |Server, Windows Vista, Windows 7 | ...

Words: 1183 - Pages: 5