Download eSignature Form Myself
Make the most out of your eSignature workflows with airSlate SignNow
Extensive suite of eSignature tools
Robust integration and API capabilities
Advanced security and compliance
Various collaboration tools
Enjoyable and stress-free signing experience
Extensive support
ESign Form for Legal Myself
Keep your eSignature workflows on track
Our user reviews speak for themselves
Download eSignature Form Myself. Check out by far the most user-helpful experience with airSlate SignNow. Manage your entire document processing and revealing process digitally. Go from hand-held, document-based and erroneous workflows to programmed, electronic digital and perfect. You can easily make, provide and indicator any documents on any gadget just about anywhere. Make sure that your crucial organization cases don't slide over the top.
Learn how to Download eSignature Form Myself. Adhere to the simple guideline to start:
- Design your airSlate SignNow profile in mouse clicks or log on along with your Facebook or Google bank account.
- Benefit from the 30-day free trial or go with a prices program that's ideal for you.
- Locate any legal web template, create on the internet fillable forms and reveal them safely.
- Use advanced functions to Download eSignature Form Myself.
- Signal, personalize putting your signature on buy and accumulate in-individual signatures 10 times quicker.
- Set auto reminders and obtain notifications at each and every stage.
Shifting your tasks into airSlate SignNow is uncomplicated. What follows is a simple procedure to Download eSignature Form Myself, in addition to suggestions to help keep your colleagues and associates for greater cooperation. Empower your employees with all the finest equipment to be in addition to organization operations. Increase efficiency and size your business faster.
How it works
Rate your experience
-
Best ROI. Our customers achieve an average 7x ROI within the first six months.
-
Scales with your use cases. From SMBs to mid-market, airSlate SignNow delivers results for businesses of all sizes.
-
Intuitive UI and API. Sign and send documents from your apps in minutes.
A smarter way to work: —how to industry sign banking integrate
FAQs
-
How do I file income tax return in India?
Greeting Friends !!!If you are going to file it yourself, then following is the procedure:-Before you start the process, keep your bank statements, Form 16 issued by your employer and a copy of last year's return at hand. Next, log on to http://incometaxindiaefiling.gov...Follow these steps:Step 1: Register yourself on the website. Your Permanent Account Number (PAN) will be your user ID.Step 2: View your tax credit statement — Form 26AS — for the financial year 2015–16 . The statement will reflect the taxes deducted by your employer actually deposited with the I-T department. The TDS as per your Form 16 must tally with the figures in Form 26AS. If you file the return despite discrepancies, if any, you could get a notice from the I-T department later.Step 3: Under the 'Download' menu, click on Income Tax Return Forms and choose AY 2016–17 (for financial year 2015–16 ). Download the Income Tax Return (ITR) form applicable to you.Which Income Tax Return Form Require to file or applicable F.Y. 2015–16 by Hetal M Kukadiya on Tax Knowledge Bank - IndiaStep 4: Open the downloaded Return Preparation Software (excel or Java utility) and complete the form by entering all the details , using your all documentsStep 5: Ascertain the tax payable by clicking the 'Calculate Tax' tab. Pay tax (if applicable) and enter the challan details in the tax return.Step 6: Confirm all the information in the worksheet by clicking the 'Validate' tab.Step 7: Proceed to generate an XML file and save it on your computer.Step 8: Go to 'Upload Return' on the portal's left panel and upload the saved XML file after selecting 'AY 2016-2017 ' and the relevant form. You will be asked whether you wish to digitally sign the file. If you have obtained a DS (digital signature), select Yes. Or, choose 'No'.Step 9: Once the website flashes the message about successful e-filing on your screen, you can consider the process to be complete. The acknowledgment form — ITR—Verification (ITR-V ) will be generated and you can download it.Step 10: you can Verify online with EVC Pin or Take a printout of the form ITR-V , sign it preferably in blue ink, and send it only by ordinary or Speed post to the Income-Tax Department-CPC , Post Bag No-1 , Electronic City Post Office, Bangalore - 560 100, Karnataka, within 120 days of filing your return online.Its Advisable to go with CA help for filling Tax return. There are lots of amendment come in every year, to file accurate return and Tax planning benefit etc so Prefer to go with expert like CA, Tax Preparer etc…Be Peaceful !!!
-
As a startup founder of three years our legal housekeeping is a bit of mess, how can I best setup a system to organize and track
As a startup founder of three years myself, I can relate to how legal housekeeping can be messy. Once a year, I have our own lawyers go through and do an audit of all of our legal paperwork (which costs a couple thousand dollars to be extremely thorough, but it’s worth it). Luckily, there are now many ways to easily manage and track all of your legal, financial, and HR documents via third-party sites that specialize in these management proceedings. I wrote a blog post about this awhile back titled “5 Ways to Save Time Dealing With Documents” which highlights certain sites that can be very beneficial depending on what paperwork you’d like to track or manage. They are as follows:1. GroupDocsGroupDocs is a new, comprehensive online service for document creation and management. It has multiple features, including a viewer for reading documents in your browser, an electronic signature service, an online document converter, a document assembly service, a feature for comparing different versions of a document, and an annotation feature. An individual plan is $10 per month for limited storage and 500 documents, while a group plan for up to 9 people is $19 per user per month. Based on the number of features and pricing, GroupDoc is a good-value purchase for a small business. As you’ll see below, GroupDocs can be cheaper than a service that offers only one such feature.2. signNowWhen you’re closing a deal and need to get documents signed, the last thing you need is a slow turnaround due to fax machine problems or the postal service. The solution is to use an electronic signature service such as signNow, which is one of the most popular e-signature companies in the world. This service allows you to email your documents to the person whose signature you need. Next, the recipient undergoes a simply e-signing process, and then signNow alerts you when the process is completed. Finally, signNow electronically stores the documents, which are accessible at any time. As a result, you can easily track the progress of the signature process and create an audit trail of your documents. The “Professional” plan is recommended for sole proprietors and freelancers, and costs $180 per year ($15 per month) for up to 50 requested signatures per month. The “Workgroup” plan is geared towards teams and businesses, and it costs $240 per user per year ($20 per month per user), for unlimited requested signatures.3. signNowsignNow is another e-signature service. Similar to signNow, signNow allows you to upload a PDF file, MS Word file or web application document. Next, you can edit the document, such as by adding initials boxes or tabs, and then email them out for signatures. Once recipients e-sign the document, signNow notifies you and archives the document. signNow offers low rates for these services: a 1-person annual plan with unlimited document sending costs $11 per month. An annual plan for 10 senders with unlimited document sending costs only $39 per month.4. ExariExari is a document assembly and contract management service that assists in automating high-volume business documents, such as sales agreements or NDAs. First, the document assembly service allows authors to create automated document templates. No technical knowledge is required; most authors are business analysts and lawyers. Authors have a variety of options for customizing documents, such as fill-in-the-blank fields, optional clauses, and dynamic updating of topic headings. They also can add questions that the end user must answer. Once you send out the document, the user answers the questionnaire, and Exari uses that data to customize the document. Next, the contract management feature allows you to store and track both the templates and the signed documents. Pricing is based on the size and scope of your planned implementation, so visit their website for more information.5. FillanyPDFIt’s a hassle having to print out PDF forms in order to complete them. Fortunately, FillanyPDF is a service that allows you to edit, fill out and send any PDFs, while entirely online. This “Fill & Sign” plan costs $5 per month, or $50 per year. If you subscribe to the “Professional” plan, you can also create fillable PDFs using your own documents. With this service, any PDF, JPG or GIF file becomes fillable when you upload it to the site. You can modify a form using white-out, redaction and drawing tools. Then, you can email a link to your users, who can fill out and e-sign your form on the website. FillanyPDF also allows you to track who filled out your forms, and no downloads are necessary to access these services. The “Professional” plan costs $49 per month, or $490 per year.Switching firms can be a hassle. As a former startup attorney, I have a bit of advice about finding the right attorney for your business: it’s best to focus on the specific attorney you’ll be working with. He or she should have a solid understanding of the ins and outs of your business industry, a deep knowledge of the legal issues your startup may face, and previous work experience with startups to ensure a quality and efficient work product. This is absolutely key when matching our startup clients at UpCounsel to attorneys on our platform who can perform their legal work and hash out their legal projects in a timely manner. We also allow clients to store any and all of their legal documents directly on UpCounsel so they don’t have to go searching in alternative places for the correct paperwork. It’s proven to be a free and lightweight way to store legal documents that our clients love. Here's what it looks like:As I’ve mentioned, it’s more important to find the right attorney as opposed to the right law firm. And seeing as you’re a startup, our own startup clients typically save an average of 50-60% on their legal work, since the attorneys don't include overhead fees (a.k.a. the fees included for doing business with the firm itself) in their invoices.Hope this gives you a deeper look into what other sites and services are out there. If you have any questions or would like more information on how best to handle your legal housekeeping/ attorney matters, feel free to signNow out to me directly. As a former startup attorney at Latham & Watkins, I’d be happy to give you some guidance.
-
What are some lesser known Gmail tips?
Perhaps not "lesser known", but I've been using keyboard shortcuts for years under "Settings": This probably comes from my vim background, but inside gmail, I almost never use the mouse. Instead:While viewing a list of threads (i.e. Inbox, All Mail, Drafts, search results, etc.):c to compose a new mailj and k to move the cursor down and upx to select/deselect the current thread that's pointed to by the cursore to archive all threads that have been selected [Enter] to go into the thread pointed to by the cursor"g i" to go to my Inbox"g a" to go to All Mail"g d" to go to DraftsWhile inside a thread:n and p to browse down and up messages inside a thread (move the cursor up and down)a to reply all (or r to reply individually, but that's rare) to the message currently pointed to by the cursorf to forward the message that's pointed to by the cursoru to go back to the previous thread list view, which could be your Inbox, All Mail, Drafts, etc. This is the same as the back button: s to toggle through the stars on the message currently pointed to by the cursorIn case you're wondering, the "cursor" is the very thin vertical blue line visible to the left of the third thread in this picture:Other useful shortcuts:/ to make the search bar active"* u" to select all unread emails"* n" to deselect all emailsShift+i to mark all selected emails as readShift+u to mark all selected emails as unreadWhile inside a thread, Shift+u will bring you back to the previous thread list view and marking the current thread as unread. I do this a lot to keep important threads at the top of my inbox.And that's basically all I ever do in gmail. It can be painful to learn at first, but just start with the very basics: j, k, and [Enter] to browse through your inbox. Within a month or two, you'll be zipping through your inbox like Usain Bolt through the 200m.Full list: http://support.google.com/mail/b...Edit: David Craige mentioned a very useful Google Labs add-on under "Settings --> Labs": a [Send & Archive] buttonAnd another useful add-on:
-
How are cracked versions of software created and why are developers not able to prevent it?
Cracked versions of software are created with the use of debuggers. (A debugger is a special type of software that lets programmers deconstruct their software into its constituent parts for the purpose of finding bugs, and thus de-bugging. Additionally debuggers can be used for reverse-engineering, or to see what is inside the software, to learn its logic. The latter method is used mostly by malware researchers to study what malware (or computer viruses) do on-the-inside. But it can be also used by an attacker to "crack" (or bypass) legal software registration, or at times, to alter normal behavior of software, for instance by injecting a malicious code into it.)For the sake of this example, I will assume that the software that is being "cracked" was compiled into a native code, and is not a .NET or a JavaScript based application. (Otherwise it will be somewhat trivial to view its source code.) The compiled native code is a bit more tricky "beast" to study. (Native means that the code executes directly by the CPU, GPU, or other hardware.)So let's assume that the goal of an attacker is to bypass the registration logic in the software so that he or she doesn't have to pay for it. (Later for lolz, he or she may also post such "crack" on some shady online forum or on a torrent site so that others can "use" it too and give him or her their appreciation.)For simplicity let's assume that the original logic that was checking for the software registration was written in C++ and was something similar to the following code snippet:In this code sample "RegistrationName" and "RegistrationCode" are special strings of text that a legitimate software user will receive after paying for the license. (The name is usually that person's actual name or their email address, and the code is some string of unique/special characters that is tied to the name.)In the logic above, the function named "isRegistrationCodeGood()" will check if "RegistrationName" and "RegistrationCode" are accepted using some proprietary method. If they are, it will return true. Otherwise false. That outcode will dictate which branch (or scope) the execution will follow.So the logic above will either show that registration failed and quit:Or, if the registration code and name matched, it will save the registration details in persistent storage (such as the File System or System Registry) using the function named "rememberRegistrationParameters()" and then display the message thanking the user for registering:A "cracker" will obviously want to achieve the second result for any registration code that he or she enters. But they have a problem. They do not have the C++ source code, part of which I showed above. (I hope not!)So the only recourse for an attacker is to disassemble the binary code (that always ships with software in the form of .exe and .dll files on Windows, and mostly as Unix executables inside the .app packages on a Mac.) An attacker will then use a debugger to study the binary code and try to locate the registration logic that I singled out above.Next you can see the flowchart for a snippet of code that I showed in C++, presented via a low-level debugger. Or, as the code will be read in the binary form after compilation:(For readability I added comments on the right with the names of functions and variables. They will not be present in the code that an attacker could see.)(To understand what is shown above an attacker will have to have good knowledge of the Assembly language instructions for the native code.)I also need to point out that having a disassembly snippet like the one above is the final result for an attacker. The main difficulty for him or her is to locate it among millions and millions of other similar lines of code. And that is their main challenge. Not many people can do it and that is why software "cracking" is a special skill.So having found the code snippet above in the software binary file a "cracker" has two choices:1) Modify (or patch) the binary.2) Reverse-engineer the "isRegistrationCodeGood()" function and copy its logic to create what is known as a "KeyGen" or "Key Generator."Let's review both:The first choice is quite straightforward. Since an attacker got this far, he or she knows the Intel x64 Instruction Set quite well. So they simply change the conditional jump from "jnz short loc_7FF645671430" at the address 00007FF645671418 (circled in red in the screenshots) to unconditional jump, or "jmp short loc_7FF645671430". This will effectively remove any failed registration code entries and anything that the user types in will be accepted as a valid registration.Also note that this modification can be achieved by changing just one byte in the binary code from 0x75 to 0xEB:But this approach comes with a "price" of modifying the original binary file. For that an attacker needs to write his own "patcher" (or a small executable that will apply the modification that I described above.) The downside of this approach for an attacker is that patching an original executable file will break its digital signature, which may alert the end-user or the vendor. Additionally the "patcher" executable made by an attacker can be easily flagged and blocked by the end-user's antivirus software, or lead criminal investigators to the identity of the attacker.The second choice is a little bit more tricky. An attacker will have to study "isRegistrationCodeGood()" function and copy it into his own small program that will effectively duplicate the logic implemented in the original software and let him generate the registration code from any name, thus giving any unscrupulous user of that software an ability to register it without making a payment.Vendors of many major software products understand the potential impact of the second method and try to prevent it by requiring what is known as "authentication." This is basically a second step after registration, where the software submits registration name to the company's web server that returns a response back to the software of whether the code was legitimate or not. This is done by Microsoft when you purchase Windows (they call it "Activate Windows") and also by signNow, and many other companies. This second step may be done behind-the-scenes on the background while the software is running, and will usually lead to cancellation of prior registration if it was obtained illegally.So now you know how software is "cracked".Let me answer why it is not possible to prevent it. It all boils down to the fact that any software code needs to be read either by CPU (in case of a binary native code) or by an interpreter or a JIT compiler (in case of JavaScript or .NET code.) This means that if there's a way to read/interpret something, no matter how complex or convoluted it is, an attacker with enough knowledge and persistence will be able to read it as well, and thus break it.There is an argument though that cloud-based software is more secure, which is true, since its (binary) code remains on the server and end-users do not have direct access to it. And even though cloud-based software is definitely the future, it has some major drawbacks that will never allow it to fully replace your conventional software. To name just a few:Not everyone has an internet connection, or is willing to upload their data online. Additionally someone’s internet connection can be very expensive or too slow to make the software run very laggy.Then there’s a question of distributed computing. For instance, Blizzard Entertainment would never make “World of Warcraft” to fully run on their servers due to immense computational resources needed to render every single scene for every player they have. Thus it is in their best interest to let each individual user’s computer to do the rendering instead.As a software developer myself, I obviously don't like when people steal software licenses. But I have to accept it and live with it. The good news is that there are not that many people who are willing to go extra mile and search for a cracked version of software. The main problem for those who do, is that by downloading a patched executable, or an attacker's KeyGen or a Patcher, they are effectively "trusting" him or her not to put anything "nasty" into it that was not "advertised on the package" (stuff like trojans, malware, or keyloggers.) So the question for those people becomes -- is it worth the cost of the software license to potentially infect your system with a nasty virus?On the other side of the equation, some developers react very negatively to any attempts to steal their software licenses. (I was there too.) They try to implement all kinds of countermeasures -- anything from tricking reverse-engineers, to adding booby traps in the code that may do something nasty if the code detects that it is being debugged, to obfuscating or scrambling the code, to enforcing all kinds of convoluted DRM schemes, to blocking users from certain countries. I personally try to stay away from all of those measures. And here's why:A) Any kind of anti-reverse-engineering tactics could be bypassed by an attacker with enough persistence. So why bother and waste my time when I can invest that time into adding something useful to my software that will make it more productive for legitimate users?B) Some code packers could create false positives with antivirus software, which is obviously not good for marketing of that software. It also creates unnecessary complexity for the developer to debug the software.C) Adding booby traps in the code can also “misfire” on your legitimate users, which will really infuriate them and can even lead to lawsuits.D) Any DRM scheme will probably catch some 100 illegal users and greatly inconvenience 10,000 legitimate ones. So why do it to your good customers?E) Our statistics show that about 75% of all illegal licenses come from China, Russia, Brazil, to name the worst offenders. (I also understand that the reason may be much lower incomes that people have in those countries.) The main issue for us though was the fact that if we enforce our DRM or add some strong registration authentication, many people that wanted to bypass our registration would simply use a stolen credit card number. And we had no control over it. Our system will use it to send them a legitimate license only to have the payment bounce in weeks time. As a result we would lose the money that were paid for the license, plus the credit card company will impose an additional chargeback fee to our account, which may range from $0.25 to $20 per bad purchase on top of the license cost.F) As was pointed out in the comments, some companies may actually benefit from allowing pirated copies of their software. Microsoft for instance gets a lot of free publicity from people using their Windows OS, the same goes for signNow with their Photoshop. That is a good point that I agree with.So my philosophy is now this -- if someone wants to go extra mile and steal our software, go for it! They went this far to do it anyway, so they probably have a good reason. On the positive side there are so many other customers that appreciate the work that goes into creating software that greatly outnumber those that don’t.PS. Thank you for all your feedback! It makes me feel good that the knowledge I shared is useful to others.
-
India: What are the steps to fill an income tax return by myself in India?
what are the steps to fill tax return by myself in INDIA? Steps to be followed:-1. Check your tax credit online -The form 26AS has details of tax deposited with the income tax department on your behalf. This includes the TDS on bank deposits, salary, consultancy charges, or even sales of property. You can access it on line through your net banking account if it is linked to your PAN. Check whether the tax paid by you is reflecting in the form 26AS.2. Rectify mismatch, if any 1. in case oif mis match get the deductor to rectify and file a revised TDS return. this is important because tax department goes by what is stated in your form 26AS...
-
How can I fill GSTR1 by myself?
Hi,For July 2017, GSTR 1 has to be filed by 30th October,2018.You can use ClearTax GST Software: India's first ready-to-use GST Software-It is easy to use & you need to only upload your sales data & the software will automatically read the data & prepare the return form for you.Steps:1. Import / Create your dataGet your data into ClearTax GST software by following any of the four ways:Create invoices on ClearTax GST softwareIf you are using Tally, export GSTR 1 under statutory reports & import the file into Cleartax GSTIf you are using government GSTR 1 offline excel utility, fill the data ...
-
How do I file my income tax myself?
Greeting Friends !!!If you are going to file it yourself, then following is the procedure:-Before you start the process, keep your bank statements, Form 16 issued by your employer and a copy of last year's return at hand. Next, log on to http://incometaxindiaefiling.gov...Follow these steps:Step 1: Register yourself on the website. Your Permanent Account Number (PAN) will be your user ID.Step 2: View your tax credit statement — Form 26AS — for the financial year 2015–16 . The statement will reflect the taxes deducted by your employer actually deposited with the I-T department. The TDS as per your Form 16 must tally with the figures in Form 26AS. If you file the return despite discrepancies, if any, you could get a notice from the I-T department later.Step 3: Under the 'Download' menu, click on Income Tax Return Forms and choose AY 2018–19 (for financial year 2017–18 ). Download the Income Tax Return (ITR) form applicable to you.Step 4: Open the downloaded Return Preparation Software (excel or Java utility) and complete the form by entering all the details , using your all documentsStep 5: Ascertain the tax payable by clicking the 'Calculate Tax' tab. Pay tax (if applicable) and enter the challan details in the tax return.Step 6: Confirm all the information in the worksheet by clicking the 'Validate' tab.Step 7: Proceed to generate an XML file and save it on your computer.Step 8: Go to 'Upload Return' on the portal's left panel and upload the saved XML file after selecting 'AY 2018-2019 ' and the relevant form. You will be asked whether you wish to digitally sign the file. If you have obtained a DS (digital signature), select Yes. Or, choose 'No'.Step 9: Once the website flashes the message about successful e-filing on your screen, you can consider the process to be complete. The acknowledgment form — ITR—Verification (ITR-V ) will be generated and you can download it.Step 10: you can Verify online with EVC Pin or Take a printout of the form ITR-V , sign it preferably in blue ink, and send it only by ordinary or Speed post to the Income-Tax Department-CPC , Post Bag No-1 , Electronic City Post Office, Bangalore - 560 100, Karnataka, within 120 days of filing your return online.Its Advisable to go with CA help for filling Tax return. There are lots of amendment come in every year, to file accurate return and Tax planning benefit etc so Prefer to go with expert like CA, Tax Preparer etc…Be Peaceful !!!
-
What are the best Gmail tips to save time?
Gmail offers many tools for us organize our inbox, such as folders, labels, and even tabs, which in turn saves time when we want to look for some particular mails.Labels are a simple way to categorize our messages. For eg : When a mail comes from friends we can label them as friends and if a mail comes from work, we can label them as work. So next time if we want to check those mails, we dont have to look through our entire inbox. We can just click on the respective labels they belong to. And from there the mail we want to look into.Steps to create and tag mails with LabelsGo to Create new label option on your left menu bar. (You may have to click on More to show this button)Then enter the name of the label you want to create.Then click on create.Then go to the mail you want to add the label toClick on the label button and choose the label you want to applyOn your left menu bar you will see a new category has come up having the label name you just created.When you click on it, it will show the mails to which the label is added to
-
How do I file the income tax return in India online for the year 2019-20 myself?
Hi!You and file your Income Tax Return (ITR) for AY 2019–20 yourself online using the following ways:Online:ERI (e-return intermediaries): They are government approved tax filing intermediaries. ERIs usually have a better interface for users to e-file the ITR easily.ERIs like Quicko have Do-It-Yourself (DIY) platform that allows you to prepare, review and e-file your ITR on your ownERIs also have Expert Assisted plans that where an expert reviews your tax situation and help you e-file your ITR.Income Tax Website:e-filing ITR using income tax website[1]e-filing ITR using Income Tax Department (ITD) Utility[2]You can also file your ITR offline, by physically submitting the ITR to the nearest income tax department centre.Footnotes[1] e-File Income Tax Return using Income Tax Website | Help Center | Quicko[2] e-File ITR using Income Tax Department Utility | Help Center | Quicko
Trusted esignature solution— what our customers are saying
Get legally-binding signatures now!
Related searches to Download eSignature Form Myself
Frequently asked questions
How do i add an electronic signature to a word document?
How do you esign financial documents in pdf?
What is the best esign service?
Get more for Download eSignature Form Myself
- How Can I Electronic signature Montana Real Estate Document
- How Do I Electronic signature Montana Real Estate Form
- Can I Electronic signature Montana Real Estate Document
- How Can I Electronic signature Montana Real Estate Document
- Help Me With Electronic signature Montana Real Estate Form
- Can I Electronic signature Montana Real Estate Document
- How To Electronic signature Montana Real Estate Word
- How Do I Electronic signature Montana Real Estate Word
Find out other Download eSignature Form Myself
- Leas c form
- Softball roster form 38060121
- Functional assessment interview tool parent guardian form
- Ds 694 form
- Rts juror form
- Dna replication worksheet answer key form
- T medial words form
- Motorcycle ride waiver form template
- Jntuk transcript application form
- Dental claim form 48843
- Self perception profile questionnaire form
- Doc nebraska form
- Tint permit guyana form
- Health assessment tool pdf fort bliss mwr form
- Caldwell chronograph manual form
- Genetics practice 2 beyond the basics form
- Leaseholder affidavit form
- Pepfer forms
- Vsa 10b form
- World hope academy form