today's oil price 2. Accounting earnings are based on the assumption of accounting instalments, which refers to the production and operation results of a certain period of time. Early accounting earnings is calculated according to the cash basis, and the modern accounting earnings is according to the classification current income and expenses of accrual basis, after the appropriate ratio calculated. However, the benefits of cash determination are more acceptable to users. (2) enterprise liquidation or transfer of wholly owned subsidiaries and holding more than 95% of the business, should according to the state administration of taxation on printing < enterprise reorganization restructuring on certain questions in the business income tax provisional regulation > notice (guoshuifa (1998) no. 97) of the relevant provisions. Where the investor shall share the accumulated undistributed profit and accumulated surplus of the investor, the income from the dividend of the investor shall be recognized. In order to avoid double taxation on after-tax profits, it will affect the restructuring activities of the enterprise and, when the equity transfer proceeds of the investment party are calculated, the income from the dividend will be deducted from the transfer income. In terms of the importance of the plan, the plan can be divided into strategic planning and operational planning. Mooney and si prowse in its around the main accounting principles for enterprises ", not only emphasize to determine profits in a timely manner, and emphasizes the necessary through division operating earnings, the gains and the impact of price changes, to improve the comparability of financial statements and understandability. To do this, monetary and fiscal policymakers must work together, including letting the central bank liquidate its budget deficit in extreme circumstances. But central bank independence is an obstacle, not a help, in working with the financial sector. Powerful and smart key logger software programs are safe, reliable and value effective application which quickly monitors all unauthorized/external users’ activities and generates report in encrypted log files that may be sent at pre defined email address or upload at html page using FTP server setting. Key logger software is suitable for different version of Windows systems including Windows XP, Windows Vista, Windows 2000, and Windows 7 etc for monitoring internet activity details performed on your own laptop.