|
INTERVIEW QUESTIONS
ACCOUNTS
DETAILS
Question: How does the payment mechanism work?
Answer: The open items of an account can only be cleared once you post an identical offsetting amount to the account. In other words, the balance of the items assigned to each other must equal zero. During clearing, the system enters a clearing document number and the clearing date in these items. In this way, invoices in a vendor account are indicated as paid, and items in a bank clearing account are indicated as cleared.
You generally use the payment program to clear invoices. Manual clearing of open items is therefore not usually necessary. However, you will sometimes have to clear items manually if, for example, you receive a refund from your vendor or you have set up a direct debit procedure.
|
|
|
Category |
Accounts Interview Questions & Answers -
Exam Mode /
Learning Mode
|
Rating |
(0.3) By 6784 users |
Added on |
7/22/2015 |
Views |
65493 |
Rate it! |
|
|
Question:
How does the payment mechanism work?
Answer:
The open items of an account can only be cleared once you post an identical offsetting amount to the account. In other words, the balance of the items assigned to each other must equal zero. During clearing, the system enters a clearing document number and the clearing date in these items. In this way, invoices in a vendor account are indicated as paid, and items in a bank clearing account are indicated as cleared.
You generally use the payment program to clear invoices. Manual clearing of open items is therefore not usually necessary. However, you will sometimes have to clear items manually if, for example, you receive a refund from your vendor or you have set up a direct debit procedure. Source: CoolInterview.com
If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
- There should not be any Spelling Mistakes.
- There should not be any Gramatical Errors.
- Answers must not contain any bad words.
- Answers should not be the repeat of same answer, already approved.
- Answer should be complete in itself.
|
|
Related Questions |
View Answer |
|
What do you understand by Open Item Managed Account?
|
View Answer
|
|
What do you mean by WCC?
|
View Answer
|
|
What do you mean by WCC?
|
View Answer
|
|
What is an IFA?
|
View Answer
|
|
What do you understand by Intercompany Settlement?
|
View Answer
|
|
What is FBT (Fringe Benefit Tax)?
|
View Answer
|
|
What is meant by liabilities?
|
View Answer
|
|
What steps would you take before making a payment?
|
View Answer
|
|
1. If assume we paid 50/- as an advance for worth or 100/- goods, but our supplier sent only up to 25/- worth of goods. Know my question is that we want to close the transaction now. How it possible? 2. What about VAT like Tax Setups in AP and AR? 3. what about the SWEEP command in AP?
|
View Answer
|
|
What are steps to define supplier?
|
View Answer
|
|
Your company deploys Office Communications Server 2007 Enterprise Edition and Microsoft Office Communicator 2007. A user reports that he is not able to automatically connect to Communications Server 2007. You need to ensure that the user can connect to Communications Server 2007. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Use the Validation Wizard. B. Use the Configure Users Wizard. C. Check the client DNS settings. D. Use the Communicator Web Access Activation Wizard.
|
View Answer
|
|
You need to install the necessary components prior to installing Exchange Server 2007 on a new server. Which three components should you install? (Each correct answer presents part of the solution. Choose three.) A. Windows PowerShell 1.0 B. Network News Transfer Protocol (NNTP) C. Simple Mail Transfer Protocol (SMTP) D. Microsoft Management Console (MMC) 3.0 E. Microsoft .NET Framework 1.1 F. Microsoft .NET Framework 2.0
|
View Answer
|
|
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) A. Allow unrestricted access to the console or VTY ports. B. Use a firewall to restrict access from the outside to the network devices. C. Always use Telnet to access the device command line because its data is automatically encrypted. D. Use SSH or another encrypted and authenticated transport to access device configurations. E. Prevent the loss of passwords by disabling password encryption.
|
View Answer
|
|
Certkiller .com is considering an HA solution for disaster recovery and backups. They require regular switch testing and a daily backup from the target system. What should they purchase?
A. A single logically partitioned system
B. Two servers in the same computer room C. High Availability model located in a remote location D. CBU (Capacity Backup Unit) located in a remote location
|
View Answer
|
|
What is virtual constructors/destructors?
|
View Answer
|
Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.
View All Accounts Interview Questions & Answers - Exam Mode /
Learning Mode
|