(1) Some softwares have refund function or invoice reprinting function.
(2) Some softwares have no corresponding functions and can only be reopened by skipping the used numbers.
(3) Open the system, enter the invoice query, find out the invoice with unprinted invoice number, print the invoice into the printer, and click Print to decide whether to reprint it.
Invoice refers to:
(1) The business vouchers issued and collected by various units and individuals in buying and selling commodities, providing or receiving services and engaging in other business activities are the original basis for accounting and the important basis for law enforcement inspection by audit institutions and tax authorities.
(2) Receipt is the proof of receipt and payment of money, and invoice can only prove that the business has happened, but can't prove whether the money has been received and paid.
What if the computer system is poisoned? The primary solution to computer system poisoning There are two typical cases of online poisoning: one is to modify the default home page or title of the browser when browsing some web pages with malicious code. What's more, you can format your hard disk, or keep your window open until you run out of resources and crash-this situation is much worse, and all the data you haven't saved and put on your hard disk may be lost in part or in whole. Second, the potential Trojan horse attack, or worm-like virus attack, makes your machine constantly send your privacy to the outside world, or use your name and email address to send garbage to further spread the virus; What's more, hackers manually invade and spy on your privacy, or delete and destroy your files. Self-help measures: disconnect immediately, so as to reduce your own losses and prevent the virus from spreading to more online computers. Please do not restart or shut down the system immediately. Please refer to the following for further treatment measures. Second, back up and transfer files and emails immediately after poisoning. It is natural to run antivirus software after poisoning, but in order to prevent antivirus software from killing or deleting your unfinished documents and important emails by mistake, you should back them up to other storage media first. Some documents with long document names and unprocessed emails need to be backed up under Windows, so I suggest that you don't quit Windows yet, because once the virus breaks out, you may not be able to enter Windows. Whether these documents are poisonous or not, you should back them up and mark them with label paper as "pending investigation". Because some viruses are specially designed for a certain anti-virus software, they will destroy other documents as soon as they run, so backing up first is a preventive measure. It is best to analyze and process these extra backup documents slowly after clearing the virus on the hard disk. Third, you need to run the software that kills CIH under Windows (even in a toxic environment). If CIH virus is found, we should pay attention to the measures suggested in newspapers and manuals, that is, turn off the computer first, then use the system disk to guide anti-virus, but run the software to kill CIH once in a toxic environment. If you do this, the antivirus software may report that some files can't be cleaned because of read-write protection, but the actual purpose of running with virus is not to completely remove the virus, but to minimize the harm of CIH at the next boot, so as to prevent the BIOS hardware of the motherboard from being damaged when booting again, resulting in a black screen, which makes your next antivirus work impossible. Fourth, you need a clean DOS startup disk and antivirus software under DOS. Up to now, you should follow the standard manuals of many antivirus software step by step. That is, cold start after shutdown, and start with clean DOS startup disk; In addition, due to poisoning, some key files of Windows may have been destroyed, illegal operations will be frequently reported, and anti-virus software under Windows may not run. So please also prepare an antivirus software under DOS, such as KV300 series and Kingsoft Internet Security, just in case. Even if you can run antivirus software under Windows, please use more than two tools for cross-cleaning. In most cases, Windows may need to be reinstalled, because viruses can destroy some files, slow down the system or cause frequent illegal operations. For example, even if CIH was killed, Microsoft's Outlook mail program was slow to respond. It is recommended not to be biased against a certain antivirus software. Due to different research and development priorities and anti-virus engines, all kinds of anti-virus software have their own advantages and disadvantages, and the cross-use effect is ideal. 5. If you have a backup of Ghost, partition table and boot area, it is safest to restore it once. If you use Ghost backup to make Windows at ordinary times and mirror it once, the operating system you get is the safest. In this way, even the potential trojans that have not been killed have been cleaned up by the way. Of course, this requires that your Ghost backup is absolutely reliable. If the Trojan horse is also "carried" when it is a ghost, the trouble will be endless. 6. After restoring the system again, change your network-related password.
How to deal with computer system poisoning 1. Murder. I remember Jinshan has a first aid kit. It's good.
2. Restore the system (restore point/backup, if any) to see if it can solve the problem.
3. Tragically helpless ... reinstall. After all, the more effective aspect of security software is prevention. If it is infected, it will be difficult.
What if the computer system is poisoned? You'd better scan it thoroughly with 360 antivirus software. If not, use the 360 system first aid kit! If it doesn't work, you'd better restart and press F8 to enter the safe mode to kill virus!
How to print the invoice list after the invoice is issued? As far as I know, the list must be printed out from the billing system, and the list without the billing system is invalid.
Apple MP4 cannot be displayed on the computer system. Is the urgent H disk in the portable device?
You'd better explain the model of MP4. Some MP4s have card insertion function, so I guess you haven't noticed.
After connecting MP4, open my computer and see if there are too many drive letters in the hard disk device, which is the correct MP4 storage.
What should I do if a file in the computer system is lost? 1. Press F8 when starting the computer until advanced options appear, and then release. Select Last Known Good Configuration and press Enter to repair it.
2. Press F8 to enter the safe mode, then exit, and select restart or shutdown to start, and then you can enter the normal mode (repair the registry).
3. If the fault still exists, please use the system that comes with the system to recover until there is no such fault (if the normal mode recovery fails, please press F8 to enter the safe mode and use the system recovery).
4. If the fault remains, use the system disk to repair it, open the command prompt and enter SFC/SCANNOW(SFC and/) to insert it into the original system disk repair system, and the system will automatically compare and repair it.
5. If the fault still exists, set the optical drive as the first boot device in the BIOS, insert the system installation disk, and press the R key to select "Repair Installation".
6. If the fault still exists, it is recommended to reinstall the operating system.
Your graphics driver crashed. ...
Just reset the graphics card driver.
NVIDIA
If you don't know your graphics card model
You can download the driver wizard, which will automatically detect your graphics card driver and then display the latest driver. Just click download, install, install and restart.
What if the computer system is poisoned? Suggest killing Trojan horse first and trying to repair the system.
It is recommended that you download windows Cleanup Assistant to kill malware and Trojans (please search and download, do not use 360 guards instead):
Download 360 system first aid kit scanning system
1. Please use the system that comes with the system to recover until there is no such fault (or use recovery software to recover the system. If you cannot enter the system, press F8 to enter the safe mode to restore the system).
2. If the fault remains, use the system disk to repair it, open the command prompt and enter SFC/SCANNOW(SFC and/) to insert it into the original system disk repair system, and the system will automatically compare and repair it.
3. If the fault still exists, set the optical drive in the BIOS as the first boot device, insert the original system installation disk, and press the R key to select "Repair Installation".
4. If the fault still exists, it is recommended to reinstall the operating system.
Use the system restore method that comes with the system:
System Restore: Start/Programs/Accessories/System Tools/System Restore, click Restore my computer to an earlier time, and then click Next. You will see that the date page has a dark date, which is the restore point. After it is selected, click Next to restore the system (Win7), and then select the device and security sub-options in the control panel.