Solution Manual Advanced Accounting 9th Edition by Baker Chapter 13Saskia Ahmad
This document provides answers to questions about segment and interim reporting. It discusses the purpose of segment reporting and the criteria for determining reportable segments. It also addresses accounting issues related to interim reporting, including recognizing revenue and expenses, inventory valuation, and allocating costs between interim periods. Matching revenue and expenses, accounting for long-term contracts and other items in interim statements is also examined.
The document discusses additional consolidation reporting issues including:
- Cash flows from operations cannot be easily incorporated into the existing three-part workpaper format because both beginning and ending consolidated balance sheet totals are needed to determine cash flows for the period.
- Dividends paid to noncontrolling shareholders are included in the consolidated cash flow statement but not the consolidated retained earnings statement.
- The indirect method of preparing the statement of cash flows focuses on reconciling net income to cash flows from operations, but does not report explicit payments to suppliers.
Standar analisis laporan_keuangan_Cross SectionVicky Farahani
Dokumen tersebut membahas tentang analisis perbandingan cross section dalam analisis keuangan dengan membandingkan data laporan keuangan suatu perusahaan dengan perusahaan atau industri yang sejenis. Dokumen tersebut menjelaskan beberapa cara untuk mendefinisikan industri sejenis dan berbagai metode perhitungan rata-rata industri seperti rata-rata aritmatika, rata-rata tertimbang, median, dan modus.
Dokumen tersebut membahas pengaruh strategi perusahaan terhadap sistem pengendalian manajemen. Ada tiga jenis strategi yang dibahas yaitu build, hold, dan harvest. Sistem pengendalian yang efektif berbeda untuk masing-masing strategi karena tingkat ketidakpastian dan waktu yang berbeda. Misalnya, untuk strategi build yang memiliki tingkat ketidakpastian tinggi, sistem pengendalian lebih fleksibel dan berorientasi pada jangka panjang.
The document discusses concurrency control in database management systems. It defines key terms like transaction, atomicity, consistency, isolation, and durability. Transactions must have ACID properties - Atomicity, Consistency, Isolation, and Durability. Atomicity means all operations of a transaction are completed or none are. Consistency means the database remains consistent before and after a transaction. Isolation means transactions appear to execute serially despite concurrent execution. Durability means committed transactions persist even after failures.
Ringkasan dokumen tersebut adalah:
1. Dokumen tersebut membahas akuntansi pelaporan investor untuk investasi dalam saham, termasuk penggunaan metode biaya dan metode ekuitas.
2. Metode ekuitas digunakan untuk investasi antara 20-50% yang memberikan pengaruh signifikan, sedangkan metode biaya digunakan untuk kurang dari 20%.
3. Dokumen tersebut juga membahas ketentuan APB Opinion No. 18 mengenai penerapan
Solution Manual Advanced Accounting 9th Edition by Baker Chapter 13Saskia Ahmad
This document provides answers to questions about segment and interim reporting. It discusses the purpose of segment reporting and the criteria for determining reportable segments. It also addresses accounting issues related to interim reporting, including recognizing revenue and expenses, inventory valuation, and allocating costs between interim periods. Matching revenue and expenses, accounting for long-term contracts and other items in interim statements is also examined.
The document discusses additional consolidation reporting issues including:
- Cash flows from operations cannot be easily incorporated into the existing three-part workpaper format because both beginning and ending consolidated balance sheet totals are needed to determine cash flows for the period.
- Dividends paid to noncontrolling shareholders are included in the consolidated cash flow statement but not the consolidated retained earnings statement.
- The indirect method of preparing the statement of cash flows focuses on reconciling net income to cash flows from operations, but does not report explicit payments to suppliers.
Standar analisis laporan_keuangan_Cross SectionVicky Farahani
Dokumen tersebut membahas tentang analisis perbandingan cross section dalam analisis keuangan dengan membandingkan data laporan keuangan suatu perusahaan dengan perusahaan atau industri yang sejenis. Dokumen tersebut menjelaskan beberapa cara untuk mendefinisikan industri sejenis dan berbagai metode perhitungan rata-rata industri seperti rata-rata aritmatika, rata-rata tertimbang, median, dan modus.
Dokumen tersebut membahas pengaruh strategi perusahaan terhadap sistem pengendalian manajemen. Ada tiga jenis strategi yang dibahas yaitu build, hold, dan harvest. Sistem pengendalian yang efektif berbeda untuk masing-masing strategi karena tingkat ketidakpastian dan waktu yang berbeda. Misalnya, untuk strategi build yang memiliki tingkat ketidakpastian tinggi, sistem pengendalian lebih fleksibel dan berorientasi pada jangka panjang.
The document discusses concurrency control in database management systems. It defines key terms like transaction, atomicity, consistency, isolation, and durability. Transactions must have ACID properties - Atomicity, Consistency, Isolation, and Durability. Atomicity means all operations of a transaction are completed or none are. Consistency means the database remains consistent before and after a transaction. Isolation means transactions appear to execute serially despite concurrent execution. Durability means committed transactions persist even after failures.
Ringkasan dokumen tersebut adalah:
1. Dokumen tersebut membahas akuntansi pelaporan investor untuk investasi dalam saham, termasuk penggunaan metode biaya dan metode ekuitas.
2. Metode ekuitas digunakan untuk investasi antara 20-50% yang memberikan pengaruh signifikan, sedangkan metode biaya digunakan untuk kurang dari 20%.
3. Dokumen tersebut juga membahas ketentuan APB Opinion No. 18 mengenai penerapan
Computer Assisted Audit Techniques (CAATS) - IS AUDITShahzeb Pirzada
This document discusses computer assisted audit techniques (CAATS) which are tools used by auditors to analyze large amounts of client data. It describes two categories of CAATs - audit software, which can extract samples, check ratios, and perform other procedures; and test data, which involves submitting test transactions to check for errors. The benefits of CAATs include independent data access, testing of IT controls, and more efficient audits. Potential disadvantages include costs, client cooperation, and requiring specialized IT skills.
Solution Manual Advanced Accounting by Baker 9e Chapter 16Saskia Ahmad
Solution Manual, Advanced Accounting, Thomas E. King, Cynthia Jeffrey, Richard E. Baker, Valdean C. Lembke, Theodore Christensen, David Cottrell, Richard Baker, Advanced Financial Accounting, Advanced Financial Accounting by Baker Chapter 18, Advanced Financial Accounting by Baker Chapter 18 9th Edition, 9th Edition,
Dokumen tersebut membahas proses pengauditan yang mencakup berbagai jenis pengujian audit seperti pengujian analitik, pengujian pengendalian, dan pengujian substantif. Tujuan audit adalah untuk menyatakan pendapat atas kewajaran laporan keuangan, sementara bukti audit diperlukan untuk mendukung data laporan keuangan.
This document discusses controls related to IT governance, including the structure of the IT function, computer center operations, and disaster recovery planning. It covers topics such as segregating incompatible duties within the IT function, physical and environmental controls for the computer center, and key elements of an effective disaster recovery plan including identifying critical systems, backup sites, and testing procedures. Audit procedures are also presented for evaluating these various IT governance controls.
Dokumen tersebut membahas tentang pusat laba sebagai unit organisasi yang bertanggung jawab atas pendapatan dan biaya tertentu. Pusat laba dapat berupa divisi bisnis, unit fungsional, pemasaran, produksi, dan layanan tertentu yang diberi otonomi untuk menghasilkan laba melalui keputusan operasional. Ada berbagai pengukuran kinerja dan batasan yang diterapkan untuk memastikan pusat laba beroperasi secara efektif.
Network security and firewalls are important tools for protecting client-server networks. Firewalls act as a barrier between private networks and the public internet, controlling incoming and outgoing network traffic based on set rules. Common security threats to client-server networks include malicious software, phishing, hacking, and denial of service attacks. Encryption techniques like public key cryptography and digital signatures are important for ensuring data security and authenticity in electronic communications. Firewall types include packet filtering routers, application proxies, and hardened firewall hosts.
hubungan antara kantor pusat dengan cabangfazri himawan
1. Hubungan antara kantor pusat dan kantor cabang adalah kantor cabang beroperasi sebagai unit usaha terpisah namun dibawah pengendalian kantor pusat.
2. Pencatatan akuntansi kantor cabang dapat dilakukan secara sentralisasi oleh kantor pusat atau desentralisasi dimana kantor cabang mencatat sendiri transaksinya.
3. Penyusunan laporan keuangan gabungan melibatkan penghapusan sal
Tiga kalimat:
Dokumen tersebut membahas tentang audit berbasis risiko, termasuk pengertian, tujuan, manfaat, ruang lingkup, peran, aspek yang perlu diperhatikan, dan metodologinya. Audit berbasis risiko bertujuan untuk memberikan keyakinan bahwa risiko telah dikelola sesuai batasan yang ditetapkan manajemen dengan berfokus pada penilaian dan evaluasi risiko-risiko strategis, finansial, operasional, dan lainnya.
The document contains questions and answers related to intercompany transfers of services and noncurrent assets between affiliated companies. It addresses topics such as when profits from intercompany sales are considered realized, the accounting treatment for upstream and downstream sales, and how unrealized profits are eliminated in consolidated financial statements. The document provides guidance on preparing eliminating entries and calculating income allocated to noncontrolling interests.
Bab ini membahas strategi audit yang digunakan auditor untuk mengumpulkan bukti audit. Terdapat dua pendekatan strategi audit yaitu pendekatan terutama substantif yang mengandalkan pengujian substantif dan pendekatan tingkat resiko pengendalian taksiran rendah yang meletakkan kepercayaan pada pengendalian intern. Kedua pendekatan ini memiliki perbedaan dalam ruang lingkup prosedur, pengujian kontrol, dan pengujian substantif yang dilakukan.
Dokumen ini membahas metode ekuitas dalam akuntansi investasi perusahaan induk pada perusahaan anak. Metode ekuitas digunakan untuk mencatat perubahan kepemilikan perusahaan induk atas perusahaan anak dengan menyesuaikan nilai tercatat investasi. Prosedur akuntansi metode ekuitas sejalan dengan laporan keuangan konsolidasi dan mencatat laba/rugi, dividen, dan selisih harga perolehan investasi. Metode ekuitas wajib dig
Solution Manual Advanced Accounting Chapter 15 9th Edition by BakerSaskia Ahmad
The document provides information about partnerships, including:
1) Partnerships are easy to form, allow individuals to combine talents and skills, provide more equity capital than one person, and allow risk sharing.
2) Most states have enacted the Uniform Partnership Act of 1997 to regulate partnerships, describing partners' rights during formation, operation, and liquidation.
3) Partnership agreements typically include the name, business type and duration, capital contributions, profit/loss distribution, admission of new partners, and accounting methods.
This Presentation is useful to make PPT on the topic "Servlet and Servlet Life Cycle" in Advanced Java. This Presentation is also useful to study this topic.
Makalah ini membahas aspek-aspek keperilakuan dalam akuntansi. Dimensi akuntansi keperilakuan mencakup lingkupnya yang luas seperti pengaruh sistem akuntansi terhadap perilaku manusia, dan metode untuk memprediksi serta mengubah perilaku. Akuntansi keperilakuan merupakan perluasan logis dari peran akuntansi tradisional dengan menyertakan informasi keperilakuan untuk mendukung pengambilan keputus
This document discusses information system audits (IS audits). IS audits refer to auditing computer-based systems that provide organizational information to management to ensure the reliability of generated information. As organizations increasingly rely on computerized systems for processes, there is a need for auditors to understand how to audit various aspects of information systems, such as software, hardware, networks, and controls. Several regulatory bodies in India, such as RBI, IRDA, and SEBI, now mandate periodic system audits for financial institutions and listed companies to ensure compliance, manage risks, and improve processes.
This document provides a conceptual overview of the OpenStack architecture in 3 sentences or less:
OpenStack is an open source cloud operating system that consists of a set of interrelated services that are written in Python and provide APIs to interact with components like compute, networking, storage and identity. The core components include compute (Nova), object storage (Swift), block storage (Cinder), image service (Glance), identity (Keystone), networking (Quantum), and dashboard (Horizon), which provides a web-based user interface. Each component communicates with others via APIs to provide infrastructure as a service capabilities.
Computer Assisted Audit Techniques (CAATS) - IS AUDITShahzeb Pirzada
This document discusses computer assisted audit techniques (CAATS) which are tools used by auditors to analyze large amounts of client data. It describes two categories of CAATs - audit software, which can extract samples, check ratios, and perform other procedures; and test data, which involves submitting test transactions to check for errors. The benefits of CAATs include independent data access, testing of IT controls, and more efficient audits. Potential disadvantages include costs, client cooperation, and requiring specialized IT skills.
Solution Manual Advanced Accounting by Baker 9e Chapter 16Saskia Ahmad
Solution Manual, Advanced Accounting, Thomas E. King, Cynthia Jeffrey, Richard E. Baker, Valdean C. Lembke, Theodore Christensen, David Cottrell, Richard Baker, Advanced Financial Accounting, Advanced Financial Accounting by Baker Chapter 18, Advanced Financial Accounting by Baker Chapter 18 9th Edition, 9th Edition,
Dokumen tersebut membahas proses pengauditan yang mencakup berbagai jenis pengujian audit seperti pengujian analitik, pengujian pengendalian, dan pengujian substantif. Tujuan audit adalah untuk menyatakan pendapat atas kewajaran laporan keuangan, sementara bukti audit diperlukan untuk mendukung data laporan keuangan.
This document discusses controls related to IT governance, including the structure of the IT function, computer center operations, and disaster recovery planning. It covers topics such as segregating incompatible duties within the IT function, physical and environmental controls for the computer center, and key elements of an effective disaster recovery plan including identifying critical systems, backup sites, and testing procedures. Audit procedures are also presented for evaluating these various IT governance controls.
Dokumen tersebut membahas tentang pusat laba sebagai unit organisasi yang bertanggung jawab atas pendapatan dan biaya tertentu. Pusat laba dapat berupa divisi bisnis, unit fungsional, pemasaran, produksi, dan layanan tertentu yang diberi otonomi untuk menghasilkan laba melalui keputusan operasional. Ada berbagai pengukuran kinerja dan batasan yang diterapkan untuk memastikan pusat laba beroperasi secara efektif.
Network security and firewalls are important tools for protecting client-server networks. Firewalls act as a barrier between private networks and the public internet, controlling incoming and outgoing network traffic based on set rules. Common security threats to client-server networks include malicious software, phishing, hacking, and denial of service attacks. Encryption techniques like public key cryptography and digital signatures are important for ensuring data security and authenticity in electronic communications. Firewall types include packet filtering routers, application proxies, and hardened firewall hosts.
hubungan antara kantor pusat dengan cabangfazri himawan
1. Hubungan antara kantor pusat dan kantor cabang adalah kantor cabang beroperasi sebagai unit usaha terpisah namun dibawah pengendalian kantor pusat.
2. Pencatatan akuntansi kantor cabang dapat dilakukan secara sentralisasi oleh kantor pusat atau desentralisasi dimana kantor cabang mencatat sendiri transaksinya.
3. Penyusunan laporan keuangan gabungan melibatkan penghapusan sal
Tiga kalimat:
Dokumen tersebut membahas tentang audit berbasis risiko, termasuk pengertian, tujuan, manfaat, ruang lingkup, peran, aspek yang perlu diperhatikan, dan metodologinya. Audit berbasis risiko bertujuan untuk memberikan keyakinan bahwa risiko telah dikelola sesuai batasan yang ditetapkan manajemen dengan berfokus pada penilaian dan evaluasi risiko-risiko strategis, finansial, operasional, dan lainnya.
The document contains questions and answers related to intercompany transfers of services and noncurrent assets between affiliated companies. It addresses topics such as when profits from intercompany sales are considered realized, the accounting treatment for upstream and downstream sales, and how unrealized profits are eliminated in consolidated financial statements. The document provides guidance on preparing eliminating entries and calculating income allocated to noncontrolling interests.
Bab ini membahas strategi audit yang digunakan auditor untuk mengumpulkan bukti audit. Terdapat dua pendekatan strategi audit yaitu pendekatan terutama substantif yang mengandalkan pengujian substantif dan pendekatan tingkat resiko pengendalian taksiran rendah yang meletakkan kepercayaan pada pengendalian intern. Kedua pendekatan ini memiliki perbedaan dalam ruang lingkup prosedur, pengujian kontrol, dan pengujian substantif yang dilakukan.
Dokumen ini membahas metode ekuitas dalam akuntansi investasi perusahaan induk pada perusahaan anak. Metode ekuitas digunakan untuk mencatat perubahan kepemilikan perusahaan induk atas perusahaan anak dengan menyesuaikan nilai tercatat investasi. Prosedur akuntansi metode ekuitas sejalan dengan laporan keuangan konsolidasi dan mencatat laba/rugi, dividen, dan selisih harga perolehan investasi. Metode ekuitas wajib dig
Solution Manual Advanced Accounting Chapter 15 9th Edition by BakerSaskia Ahmad
The document provides information about partnerships, including:
1) Partnerships are easy to form, allow individuals to combine talents and skills, provide more equity capital than one person, and allow risk sharing.
2) Most states have enacted the Uniform Partnership Act of 1997 to regulate partnerships, describing partners' rights during formation, operation, and liquidation.
3) Partnership agreements typically include the name, business type and duration, capital contributions, profit/loss distribution, admission of new partners, and accounting methods.
This Presentation is useful to make PPT on the topic "Servlet and Servlet Life Cycle" in Advanced Java. This Presentation is also useful to study this topic.
Makalah ini membahas aspek-aspek keperilakuan dalam akuntansi. Dimensi akuntansi keperilakuan mencakup lingkupnya yang luas seperti pengaruh sistem akuntansi terhadap perilaku manusia, dan metode untuk memprediksi serta mengubah perilaku. Akuntansi keperilakuan merupakan perluasan logis dari peran akuntansi tradisional dengan menyertakan informasi keperilakuan untuk mendukung pengambilan keputus
This document discusses information system audits (IS audits). IS audits refer to auditing computer-based systems that provide organizational information to management to ensure the reliability of generated information. As organizations increasingly rely on computerized systems for processes, there is a need for auditors to understand how to audit various aspects of information systems, such as software, hardware, networks, and controls. Several regulatory bodies in India, such as RBI, IRDA, and SEBI, now mandate periodic system audits for financial institutions and listed companies to ensure compliance, manage risks, and improve processes.
This document provides a conceptual overview of the OpenStack architecture in 3 sentences or less:
OpenStack is an open source cloud operating system that consists of a set of interrelated services that are written in Python and provide APIs to interact with components like compute, networking, storage and identity. The core components include compute (Nova), object storage (Swift), block storage (Cinder), image service (Glance), identity (Keystone), networking (Quantum), and dashboard (Horizon), which provides a web-based user interface. Each component communicates with others via APIs to provide infrastructure as a service capabilities.
Sistemi domotici integrati per la gestione intelligente d’ambientefreedomotic
Tesi di laurea magistrale in Ingegneria Informatica di Riccardo Trivellato svolta presso l'Università degli Studi di Padova.
In questo lavoro si è voluto progettare e realizzare un sistema intelligente domotico che si integrasse in due scenari comuni: casa e ufficio. La simulazione degli ambienti è stata effettuata con il framework Freedomotic
The document summarizes Brigid Freeman's presentation on benchmarking university policy frameworks to identify best practices. The presentation examined policy development at 16 universities in Australia and New Zealand to establish models for effective policy management. Freeman identified key aspects of policy frameworks such as defining policy instruments, approval processes, and the policy development cycle. She discussed benchmarking University of Tasmania's policy framework, website, repository, and specific policies on plagiarism, environment, leave, and credit to incorporate identified best practices from other universities. The goal was to provide recommendations for enhancing UTAS' policy framework and processes based on the research findings.
The document discusses the festival of San Pedrín de la Cueva, a popular party held around the hermitage and cave of San Pedrín in the village of Castanyera, Asturias, Spain. The festival includes cultural and sporting events and was declared a festival of Regional Tourist Interest in 2000. It also hosts an annual motocross championship that draws competitors from across the country.
My school is located on Dionisio Ruisánchez Street in Ribadesella, Asturias, Spain near the coast. It has a library, gym, art rooms, laboratories, computer rooms, an assembly hall, music room, administration room, caretaker's room, cafeteria, and teacher's room. The school is very large with many high and comfortable rooms. It has a library where students can check out books, an indoor and outdoor gym since it is sometimes too cold outside, three computer rooms for computer lessons, two art rooms for art classes, and an assembly hall used for movies, videos and guest speakers.
Tutorial para ingreso del curriculum al portal laboral cibertecLNolbert
El documento describe los pasos para registrar un currículum en el Portal Laboral de Cibertec, incluyendo iniciar sesión, completar los datos personales y académicos, subir una fotografía, y enviar el currículum al profesor para revisión.
El documento presenta un programa de ingresos y egresos realizado por Patricia León y Leonardo Ortega para el segundo ciclo "A" de Sistemas bajo la supervisión del profesor Ing. Max Zúñiga. El programa utiliza las clases Scanner, LinkedList y Queue de Java para ingresar y mostrar datos financieros como fecha, valor y descripción.
Leyla Vega Moreno is a Colombian woman seeking a career in bacteriology. She provides her contact information and education history, but leaves many of the experience and skills sections blank, only noting dancing, drawing, and interests in art and philosophy. She completed secondary education in Colombia but provides no details on degrees or training.
The homework-maker is a new device that can complete homework assignments for students. It works like a printer by scanning homework questions inserted into its slot, using an advanced microchip to understand the questions and generate answers. The homework-maker then copies the student's handwriting to make it appear the student completed the work themselves. It incorporates cutting-edge technology allowing it to read 5,000 words per second and perfectly mimic a student's handwriting style. The homework-maker is available for purchase for only $399.95.
This document provides a guide for companies looking to implement effective customer service on Twitter. It discusses trends showing customers are increasingly contacting companies on Twitter for customer service. The guide outlines a seven step process for setting up customer service on Twitter, including setting a vision, defining goals and metrics, operationalizing a strategy, and building capabilities to scale. It also shares success stories from companies like Hilton and Microsoft and highlights how Twitter uniquely enables customer service through its conversational, public and real-time nature. The overall document serves as a playbook to help companies navigate providing customer service on the Twitter platform.
Top 3-tech-trends-marketers-should-watch-in-2015 infographicsRaj Narayanan
Connected devices will generate more user data that can be used to personalize experiences and recommendations. Marketers should leverage this data through real-time targeted ads, location-based content, and context-aware services to improve the customer experience. As technology becomes more integrated into everyday life through smartphones, smart home devices, wearables and drones, consumers expect immediate, simple access to information and services on demand anytime, anywhere.
El documento describe cómo elaborar un árbol de problemas, un diagrama que representa gráficamente un problema central y sus causas y soluciones. Explica los 6 pasos para crear un árbol de problemas: 1) identificar los principales problemas, 2) formular el problema central, 3) anotar las causas, 4) anotar las soluciones, 5) elaborar un esquema mostrando las relaciones, y 6) revisar el esquema completo.
Git/Continuous Integration/Docker: la terna dello sviluppo moderno.Gerardo Di Iorio
Git/Continuous Integration/Docker: la terna dello sviluppo moderno.
Andremo alla scoperta di Git (https://git-scm.com/), un source control che si ad
atta alle esigenze degli sviluppatori, ottimizeremo il codice passando per l'app
roccio del Continuous Integration ed in fine useremo Docker (https://www.docker.
com/) per deploy rapidi e scalabili.
Breve introduzione a GIT:
. Iniziare un nuovo progetto o clonarne uno esistente
. primi commit e comandi base
. esempi di utilizzo
Autore: Valerio Radice
tag line:
Tutorial GIT ITA italiano
La nuova sprint release: TYPO3 CMS 8.4
Le principali innovazioni:
- revisione del backend per un utilizzo da tablet e da smartphone
- prosegue la migrazione ad un totale utilizzo di Doctrine per le chiamate al database, manuale compreso
- wizard per semplificare e monitorare gli upgrade di release
- e molte altri miglioramenti descritti in questo documento
Riassunto delle funzionalità. modifiche e aggiornamenti presenti nella versione 7.5, in preparazione del rilascio della nuova LTS previsto per il 10 novembre. Sarà organizzato un Party Release in cui conoscere da vicino il nuovo prodotto CMS. Contattami per avere maggiori informazioni.
Tutte le novità presenti in TYPO3 CMS 7.4, rilasciato il 4 agosto 2015. A fine anno è previsto il rilascio della nuova versione LTS.
Hai qualche dubbio o curiosità su TYPO3? Contattami subito!
A fine 2015 è stato lanciato lo sviluppo della nuova major release di TYPO3 CMS. A marzo 2016 il rilascio della prima sprint release. In questo documento si trovano tutte le novità di TYPO3 CMS 8.0
4. • La versione stabile è la 2
• La versione 3 è in beta, ma va già molto, molto bene
• La versione 3 ha tre versioni
• Stable
• Dev (http://www.sublimetext.com/3dev)
• Nightly
5. I pacchetti
• Tutte le impostazioni, plugin, temi ecc. si trovano
nella cartella packages di Sublime
• Raggiungibile da Preferenze-> Browse Packages
6. • Installazione command line Tool
• Sublime Text 2
•ln -s “Applications/Sublime Text
2.app/Contents/SharedSupport/bin/subl” ~/bin/subl
• Sublime Text 3
•ln -s “Applications/Sublime
Text.app/Contents/SharedSupport/bin/subl” ~/bin/subl
Per Windows o Linux vedere la documentazione
7. Utilizzare subl
• Aprire una cartella
• subl ~path/to/directory
• Aprire la cartella corrente
• subl .
• Aprire un singolo file
• subl index.js
• Aprire un file alla riga
• subl index.js:200
• Aprire un file alla riga e alla colonna
• subl index.js:200:10
8. Argomenti di subl
•subl -
Il comando apre sublime come standard output
È utile in coda ad un pipe per far salvare l’output di un comando in
una finestra di sublime.
La si può anche utilizzare per scrivere nella console. Con Cmd+D si
ferma il segnale e si passa a Sublime.
Esempio…
9. Argomenti di subl
• subl —project <project>
• Apre uno specifico progetto
• subl —command <command>
• Esegue uno specifico comando di sublime
• subl -n file.js
• Apre un file in una nuova window
• subl —add file.js
• Aggiunge un file alla vista attiva
12. Aprire un file
• Cmd + P
Basta digitare il nome del file che si vuole aprire,
purché faccia parte del progetto.
Esempio…
13. Andare alla riga
• Cmd + P oppure Ctrl + G
Se si ha premuto solo Cmd+P aggiungere “:” e
scrivere la riga a cui andare.
Esempio…
14. Andare alla riga e alla colonna
Possibile solo dalla recente versione di Sublime Text
Dev
•Cmd + P oppure Ctrl + G
aggiungere “:” e scrivere la riga a cui andare seguito
da “:” con il numero della colonna
15. Andare alla definizione
• Cmd + P oppure Ctrl + R
Se si ha premuto solo Cmd+P aggiungere “@” e
scrivere la funzione in cui si vuole andare.
Esempio…
19. Settings files
• Il file per ogni modifica di impostazione possibile
sia per sublime che per i plugin si trova in
preferences.
• Tutti i file di configurazione sono in formato JSON
• Per le modifiche dell’editor serve il file Settings -
User
20. Copia con indentazione
• Aprire il file Key Bindings - User
• Aggiungere le righe
{“keys”: [“super+v”], “command”: “paste_and_indent”},
{“keys”: [“super+shift+v”], “command”: “paste”}
21. Font
• Aprire il file Settings - User
• “font-face” -> Nome del font
• “font-size” -> Dimensione del font
• “line_padding_bottom" e “line_padding_top" ->
determinano la line height
23. Altre utili modifiche
• “highlight_line" -> Evidenzia la riga selezionata
• “bold_folder_labels" -> Imposta il grassetto al nome delle
cartelle nel sidebar
• “indent_guide_options":["draw_normal","draw_active" ] ->
Mostra le linee guida dell’indentazione
• “highlight_modified_tabs" -> Una schiccheria
• “rulers” -> imposta la colonna in cui visualizzare il righello
Esempio…
25. Sublime Code Intel
• Necessita di NodeJS
• Scaricabile da GitHub con il branch Development
• git clone -b development
git@github.com:SublimeCodeIntel/SublimeCodeIntel.git
• Rimuovere la cache
• rm -R ~/.codeintel
• Andare al rispettivo file di configurazione e abilitare
il plugin per i vari linguaggi di programmazione
26. Finestre multiple
•Nel menu view->layout è possibile impostare una
griglia in cui impostare la finestra del proprio editor
Esempio…
27. Finestre multiple
Scorciatoie
• Cmd + alt + [1-4] -> Divide lo schermo in [1-4] colonne
• Cmd + alt + 5 -> Divide lo schermo in una griglia 4x4
• Cmd + alt + shift + [2-3] -> Divide lo schermo in [2-3] righe
• Cmd + [1-4] -> Ci si sposta tra le colonne
• Ctrl + Shift + [1-4] -> Sposta il file corrente in una vista
28. Finestre multiple
Origami
• Cmd + K seguito da …
• Cmd + -> Crea una nuova colonna a destra→
• Cmd + -> Crea una nuova colonna a sinistra←
• Cmd + -> Crea una nuova riga in alto↑
• Cmd + -> Crea una nuova riga in basso↓
• Per distruggere una view aggiungere Shift al comando
29. • Focus
• Cmd + K seguito da , , ,→ ← ↑ ↓
• Spostare file
• Cmd + K seguito da Shift + , , ,→ ← ↑ ↓
30. Cursore multiplo
•Per aggiungere un cursore in un determinato punto
basta tenere premuto Cmd e cliccare dove lo si
vuole aggiungere
•Se non si vuole usare il mouse… Ctrl + Alt + o↓ ↑
Esempio…
31. • Si può selezionare tutte le istanze di una parola e
consecutivamente piazzare un cursore a quella
parola con Cmd + D
•Per saltare un valore Cmd + K + D
Esempio…
32. • Piazzare il cursore ad ogni riga di un blocco senza
dover premere per ogni riga:
1. Piazzare il cursore all prima riga del blocco
2. Tenendo premuto Cmd + Alt
3. Evidenziare il resto delle righe
Esempio…
33. Azioni da tastiera
• Cmd + Ctrl + o -> sposta una riga in alto o in basso↑ ↓
• Cmd + J -> unisce due righe
• Cmd + Shift + D -> duplica una riga
• Cmd + Shift + K -> seleziona i tag
• Ctrl + Shift + K -> elimina una riga
• Cmd + backspace -> elimina il testo dal cursore alla fine della stringa
• Ctrl + backspace -> elimina una parola (sinistra)
• Ctrl + fn + backspace -> elimina una parola (destra)
34. • Cmd + Enter -> aggiunge una riga sotto
• Cmd + Shift + Enter -> aggiunge una riga sopra
• Shift + Cmd + a -> Seleziona il contenuto di un tag
(solo il contenuto)
• Ctrl + Shift + M -> Seleziona il contenuto di una
parentesi
• Cmd + L -> Evidenzia l’intera riga
36. Color Scheme
• Si può cambiare il Color Scheme semplicemente
selezionando quello che più si aggrada nel menu
• Preferences->Color Scheme
• Oppure modificando il file di preferenze
• “color_scheme”: url al color scheme
• Si possono trovare molti color scheme su internet o sul
package control
• Oppure personalizzarne uno con dei tools online
37. Temi
• I temi li si scaricano dal Package Control
• Per abilitarne uno occorre dichiararlo nel fili di preferenze
• “theme":
• Ogni tema ha le proprie preferenze, bisogna vedere le
opzioni sulla documentazione del tema
• I temi più famosi (da cui nascono le fork) sono Soda e
Cobalt2
• Degni di nota sono a mio parere:
42. Snippets
•Sublime supporta nativamente gli snippets
•Ne si può creare uno da Tool->New Snippet…
<snippet>
<content><![CDATA[I ${1:love} to make ${2:snippets!}.${3}]]></content>
<tabTrigger>hello</tabTrigger>
<scope>source.python</scope>
<description>A sample snippet</description>
</snippet>
43. • Lo snippet vero è proprio va inserito tra il CDATA
• ${1:default text for this placeholder} setta un place
holder che all’utilizzo verrà selezionato per poter poi
essere sostituito con il valore corretto
• Gli snippets vanno salvati in una cartella snippets
dentro la cartella Users di Sublime Text
• È possibile trovare degli snippets già fatti nel
package control
47. • .sublime-project
• Setta le impostazione di un progetto
• .sublime-workspace
• Setta le impostazioni dell’editor di quel progetto
• Switch veloce per progetti
• Ctrl + Cmd + P
48. .sublime-project
• Imposta tutte le cartelle facenti parte il progetto
• Gli setta un nome -> “name”
• Se seguire i link -> “follow_symlinks”
• Escludere file -> “file_exclude_patterns”
52. Bookmarks
• In sublime in qualsiasi documento è possibile
settore dei segnalibri
• Selezionata una riga è possibile applicare un
segnalibro con Cmd + F2
• I segnalibri sono indicati nella sezione GoTo-
>Bookmarks
54. Git
• È presente un plugin per Sublime di Git reperibile
tramite il package control
• Il plugin mette a disposizione molti comandi
richiamabili tramite la Command Palette
55. Sublime Git: comandi
• Il plugin mette a disposizione i principali comandi di
Git
• git init
• git status
• I file segnati con ?? sono non tracciati
• git add
56. • git commit
• Il file si chiude con Cmd + W
• git push
• git diff
• git pull
• git branch
• Degno di nota è il comando git quick commit
58. Installare il package control
• Andare alla pagina
https://packagecontrol.io/installation
• Aprire la console di sublime
• Copiare lo script reperibile alla pagina citata
• Premere Invio
• Riavviare Sublime
60. GitCutter
• Fa apparire nel lato sinistro di una riga un icona in
base alla modifica rilevata da Git
• Ti avverte visivamente se una riga è stata
aggiunta, modificata o rimossa
61. Emmet
• Il famigerato plugin per la stesura veloce di HTML
• Oltre a quello mette a disposizione un comodo
comando per wrappare del testo selezionato in tag
scritti con la dicitura di emmet
62. LiveReload (o Takana)
• Esegue un server locale per ricaricare una pagina
web dinamicamente al cambiamento del codice
• Necessita di una estensione per browser
66. Grunt
• Mette a disposizione grunt senza passare da
terminale
67. Indent XML e Pretty JSON
• Indentano i file XML e JSON per una più facile
visualizzazione
68. Sublime SFTP
• Permette di connettersi ad un server tramite SFTP
• File->SFTP/FTP->Setup Server
• Permette di navigare su un server (una volta connessi)
• File -> SFTP/FTP->Browse Server
• Permette di mappare una cartella locale con una in
remoto
• Click destro sulla cartella da mappare
69. Vim Mode
• Il pacchetto è Vintageous per Sublime 3
• Mette a disposizione tutte le scorciatoie da tastiera
per utilizzare sublime come se fossimo in Vim
• Ma perché mai uno dovrebbe?
70. AutoFileName
• Permette, quando si sta digitando un percorso, di
utilizzare un autocomplete sui nomi dei file e delle
cartelle
71. Sidebar enhancements
• Aggiunge funzionalità molto utili al click destro su
un file/cartella nella sidebar
• Spostare nel cestino
• Copia/Incolla
• Aprire nel browser
• Copiare il contenuto di un file come data:uri base64
• Duplicate
• …
76. • Esistono pacchetti per quasi tutti i linguaggi di programmazione
• Implementano l’autocomplete e l’evidenziazione del colore
• jQuery
• Wordpress
• PHP
• SASS
• CSS 3
• …
78. Sublime Linter
• È un sistema di controllo del codice scritto in realtime
• Il pacchetto principale è Sublime Linter, ma occorre aggiungere
un pacchetto per ogni linter che si vuole utilizzare.
• Ogni linter necessita dell’eseguibile nella propria macchina.
• Es. se si fa lint di php occorre che sublime possa accedere a
>> php -i
• Se si fa lint di javascript bisogna aver scaricato con node.js
jshint
• Ecc.
80. –Cav. Silvio Berlusconi
“And I want to say another thing. I consider the
American flag, not only a flag of a nation; but
also a symbol of democracy and freedom”.