Preview

Unit 3 Assignment

Good Essays
Open Document
Open Document
461 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assignment
ADOPT A STANDARD INVOICE NUMBERING CONVENTION

A major cause of duplicate payments is multiple copies of the same supplier invoice being entered in the computer system, but with slight variations on the invoice number that keep the computer from flagging them as duplicate invoices. This is an especially common problem when suppliers issue invoices with leading zeros, since one data entry clerk may enter the zeros, while another may ignore them. It is also common for employee expense reports and a variety of utility billings, since these documents have no invoice number. It also happens when an original invoice is not paid on time, so the supplier floods the company with extra copies of the invoice, hoping that one of the copies will eventually
…show more content…

It is also possible to reverse this rule and always use leading zeros, but the extra characters may overflow the computer field for invoice numbers.
• Use the packing slip number. If the invoice contains no invoice number and it is related to a physical delivery, then there should be a packing slip that accompanied the delivery. If so, enter the packing slip number as the invoice number. If a duplicate invoice arrives, it must still be matched to the packing slip before payment is approved, so the packing slip number will be fl aged by the computer as a duplicate invoice number.
• Use an alternate document identifier. If an invoice contains no invoice number but does have other tracking numbers, such as an internal indexing number or a job number, then use this number instead.
• Use invoice date. A less foolproof alternative is to use the invoice date. This approach can still result in duplicate payments, because suppliers may legitimately issue more than one invoice on the same day, resulting in such coding variations as MMDDYY-2 to signify that an invoice is the second one received that has the same invoice date. If this alternative must be used, then at least require that dates always be entered using the same format every time, such as MMDDYY or


You May Also Find These Documents Helpful

  • Good Essays

    1. Payee information-Make sure the check is written out to the correct person/office and all information is spelled correctly.…

    • 602 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 383 Words
    • 2 Pages

    Video Connectors – Video Graphics Adapter (VGA), Digital Video Interface (DVI), and S-Video (TV connection)…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Orders table is related to the Customers, Shippers, Orders Status, Orders Tax Status, Order Details, Invoices, Inventory Transactions, and Employees tables.…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    There is not a procedure to check if the sequence is missing invoice numbers but there is a processes to where a shipment is pending until copy $ is received before the order can be sent out.…

    • 1820 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1: Assignment

    • 480 Words
    • 2 Pages

    2) Mrs. Caretaker has severe knee pain. Mrs. Caretaker’s knee pain could be the result of working over 25 years caring for patients. Mrs. Caretaker worked in a nursing home as a CNA and then in the local hospital as an LPN. The physical demands as a CNA and LPN likely attributed to knee pain. Both jobs demanded lifting patients and standing on her feet 80% of the time.…

    • 480 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 126 Words
    • 1 Page

    As the number of computers in a company network grows, so does the administrative overhead involved in maintaining the computer network. DNS and DHCP can keep the overhead to a background task.…

    • 126 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Company invoices should be pre-numbered and make sure that all numbers are accounted for periodically.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment

    • 80 Words
    • 1 Page

    In the unit 1 assignment, we defined the relations and keys for a library system. In unit 2 we learned about constraints. For your unit 2 assignment, identify and describe the constraints that would be appropriate for the relations that we have within our library system. Constraints that you should consider may include:…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 266 Words
    • 1 Page

    The Johnson Company can do several things to reach out to new customers. Even though many companies still use them, the yellow pages are all but obsolete and viewed by a low number of people. Most companies utilize websites and social media to attract customers. The Johnson Company can create these to get their name out on the internet. In conjunction with these websites, they could utilize web advertising services such as Google advertisements or banner ads. Additionally, they could contact their local cable providers to film commercials to air on television.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    unit 3 assignment 3

    • 854 Words
    • 3 Pages

    1. Which of the following is true about a TCP/IP network? A) The network uses only standards defined in TCP/IP RFCs.…

    • 854 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 253 Words
    • 2 Pages

    3) Why would this affect child labor-Why is the labor force utilizing children-shouldn’t they be in school…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    RYS 1

    • 389 Words
    • 2 Pages

    Match the QuickBooks file type on the left with the correct description on the right. (Either draw the lines by hand or with Word, depending on how you are submitting your work.)…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    P1 Unit 3 Assignment

    • 582 Words
    • 3 Pages

    A multimedia essay combines textual content and multimedia elements to create a unique and inventive version of an essay to share with others. In this activity, you will use textual material from your literary essay and multimedia elements such as sound, layout, video, images, web-quests, etc. to create a unique version of your essay to share with your classmates.…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    b. Invoice/ Statement of Invoice along with invoices need to be attached with SOFTEX Form.…

    • 1359 Words
    • 6 Pages
    Powerful Essays

Related Topics