SlideShare a Scribd company logo
Liens: Kanahara is employed part-time by the Cross-Bar Packing Corp. and earns take-home pay
of $400 per week. He is $2,000 in debt to the Holiday Department Store for goods purchased on
credit over the past 8 months. Most of this property is non-exempt and is now in Kanahara's
apartment. Kantara is in default on his payments to Holiday. Holiday learns that Kanahara has a
girlfriend in another state and that he plans to give her most of this property for Christmas.
Discuss what actions are available to and should be taken by Holiday to collect the debt owed by
Kanahara.
Solution
There are some actions taken by Holiday to collect the debt owed by Kanahara are
1.Company can hold his salary ,
2.Company can stop providing any facility like conveyance,transport allowance,phone
allownace.
3.He has to work for over time

More Related Content

More from brijeshagarwa329898l

computer math Use the following to answer questions 1-2 In the q.pdf
computer math Use the following to answer questions 1-2 In the q.pdfcomputer math Use the following to answer questions 1-2 In the q.pdf
computer math Use the following to answer questions 1-2 In the q.pdf
brijeshagarwa329898l
 
CASe Stic ato wad duun SolutionAggregates used in this method a.pdf
CASe Stic ato wad duun SolutionAggregates used in this method a.pdfCASe Stic ato wad duun SolutionAggregates used in this method a.pdf
CASe Stic ato wad duun SolutionAggregates used in this method a.pdf
brijeshagarwa329898l
 
Write MatLAb code that would produce the following printSolution.pdf
Write MatLAb code that would produce the following printSolution.pdfWrite MatLAb code that would produce the following printSolution.pdf
Write MatLAb code that would produce the following printSolution.pdf
brijeshagarwa329898l
 
Why do rays run radially in a woody stemHow would wood produced i.pdf
Why do rays run radially in a woody stemHow would wood produced i.pdfWhy do rays run radially in a woody stemHow would wood produced i.pdf
Why do rays run radially in a woody stemHow would wood produced i.pdf
brijeshagarwa329898l
 
Write a java program that reads a number N as input and displays the.pdf
Write a java program that reads a number N as input and displays the.pdfWrite a java program that reads a number N as input and displays the.pdf
Write a java program that reads a number N as input and displays the.pdf
brijeshagarwa329898l
 
Why is the DNA fragment amplified with Phusion DNA into pGEM-T plasmi.pdf
Why is the DNA fragment amplified with Phusion DNA into pGEM-T plasmi.pdfWhy is the DNA fragment amplified with Phusion DNA into pGEM-T plasmi.pdf
Why is the DNA fragment amplified with Phusion DNA into pGEM-T plasmi.pdf
brijeshagarwa329898l
 
Which of these is a function of the skeletal system communication s.pdf
Which of these is a function of the skeletal system  communication s.pdfWhich of these is a function of the skeletal system  communication s.pdf
Which of these is a function of the skeletal system communication s.pdf
brijeshagarwa329898l
 
what is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfwhat is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdf
brijeshagarwa329898l
 
Which monetary aggregate would you expect the Federal Reserve to hav.pdf
Which monetary aggregate would you expect the Federal Reserve to hav.pdfWhich monetary aggregate would you expect the Federal Reserve to hav.pdf
Which monetary aggregate would you expect the Federal Reserve to hav.pdf
brijeshagarwa329898l
 
wavelet decomposition process code in matlabSolution WAVE.pdf
wavelet decomposition process code in matlabSolution WAVE.pdfwavelet decomposition process code in matlabSolution WAVE.pdf
wavelet decomposition process code in matlabSolution WAVE.pdf
brijeshagarwa329898l
 
What happens if a red hot inoculation loop plunges into the nutrient .pdf
What happens if a red hot inoculation loop plunges into the nutrient .pdfWhat happens if a red hot inoculation loop plunges into the nutrient .pdf
What happens if a red hot inoculation loop plunges into the nutrient .pdf
brijeshagarwa329898l
 
What are speaking notes Have you used speaking notes before What wo.pdf
What are speaking notes Have you used speaking notes before What wo.pdfWhat are speaking notes Have you used speaking notes before What wo.pdf
What are speaking notes Have you used speaking notes before What wo.pdf
brijeshagarwa329898l
 
There are five components of internal control1) Control environme.pdf
There are five components of internal control1) Control environme.pdfThere are five components of internal control1) Control environme.pdf
There are five components of internal control1) Control environme.pdf
brijeshagarwa329898l
 
The height of a right triangle is 2 feet more than twice the length .pdf
The height of a right triangle is 2 feet more than twice the length .pdfThe height of a right triangle is 2 feet more than twice the length .pdf
The height of a right triangle is 2 feet more than twice the length .pdf
brijeshagarwa329898l
 
ST=TS show that the generalized eigenspace of T are invariant under .pdf
ST=TS show that the generalized eigenspace of T are invariant under .pdfST=TS show that the generalized eigenspace of T are invariant under .pdf
ST=TS show that the generalized eigenspace of T are invariant under .pdf
brijeshagarwa329898l
 
Singer and Nicolson proposed the fluid mosaic model of the cell membr.pdf
Singer and Nicolson proposed the fluid mosaic model of the cell membr.pdfSinger and Nicolson proposed the fluid mosaic model of the cell membr.pdf
Singer and Nicolson proposed the fluid mosaic model of the cell membr.pdf
brijeshagarwa329898l
 
Opportunity or temptationJournal of Case StudiesIntroductionT.pdf
Opportunity or temptationJournal of Case StudiesIntroductionT.pdfOpportunity or temptationJournal of Case StudiesIntroductionT.pdf
Opportunity or temptationJournal of Case StudiesIntroductionT.pdf
brijeshagarwa329898l
 
Multiple choice.Is there evidence that the age at which women get .pdf
Multiple choice.Is there evidence that the age at which women get .pdfMultiple choice.Is there evidence that the age at which women get .pdf
Multiple choice.Is there evidence that the age at which women get .pdf
brijeshagarwa329898l
 
List three Key characteristics of DNA used in studying DNA in electr.pdf
List three Key characteristics of DNA used in studying DNA in electr.pdfList three Key characteristics of DNA used in studying DNA in electr.pdf
List three Key characteristics of DNA used in studying DNA in electr.pdf
brijeshagarwa329898l
 
Let T be the transform from P2 (the vector space of second degree po.pdf
Let T be the transform from P2 (the vector space of second degree po.pdfLet T be the transform from P2 (the vector space of second degree po.pdf
Let T be the transform from P2 (the vector space of second degree po.pdf
brijeshagarwa329898l
 

More from brijeshagarwa329898l (20)

computer math Use the following to answer questions 1-2 In the q.pdf
computer math Use the following to answer questions 1-2 In the q.pdfcomputer math Use the following to answer questions 1-2 In the q.pdf
computer math Use the following to answer questions 1-2 In the q.pdf
 
CASe Stic ato wad duun SolutionAggregates used in this method a.pdf
CASe Stic ato wad duun SolutionAggregates used in this method a.pdfCASe Stic ato wad duun SolutionAggregates used in this method a.pdf
CASe Stic ato wad duun SolutionAggregates used in this method a.pdf
 
Write MatLAb code that would produce the following printSolution.pdf
Write MatLAb code that would produce the following printSolution.pdfWrite MatLAb code that would produce the following printSolution.pdf
Write MatLAb code that would produce the following printSolution.pdf
 
Why do rays run radially in a woody stemHow would wood produced i.pdf
Why do rays run radially in a woody stemHow would wood produced i.pdfWhy do rays run radially in a woody stemHow would wood produced i.pdf
Why do rays run radially in a woody stemHow would wood produced i.pdf
 
Write a java program that reads a number N as input and displays the.pdf
Write a java program that reads a number N as input and displays the.pdfWrite a java program that reads a number N as input and displays the.pdf
Write a java program that reads a number N as input and displays the.pdf
 
Why is the DNA fragment amplified with Phusion DNA into pGEM-T plasmi.pdf
Why is the DNA fragment amplified with Phusion DNA into pGEM-T plasmi.pdfWhy is the DNA fragment amplified with Phusion DNA into pGEM-T plasmi.pdf
Why is the DNA fragment amplified with Phusion DNA into pGEM-T plasmi.pdf
 
Which of these is a function of the skeletal system communication s.pdf
Which of these is a function of the skeletal system  communication s.pdfWhich of these is a function of the skeletal system  communication s.pdf
Which of these is a function of the skeletal system communication s.pdf
 
what is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfwhat is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdf
 
Which monetary aggregate would you expect the Federal Reserve to hav.pdf
Which monetary aggregate would you expect the Federal Reserve to hav.pdfWhich monetary aggregate would you expect the Federal Reserve to hav.pdf
Which monetary aggregate would you expect the Federal Reserve to hav.pdf
 
wavelet decomposition process code in matlabSolution WAVE.pdf
wavelet decomposition process code in matlabSolution WAVE.pdfwavelet decomposition process code in matlabSolution WAVE.pdf
wavelet decomposition process code in matlabSolution WAVE.pdf
 
What happens if a red hot inoculation loop plunges into the nutrient .pdf
What happens if a red hot inoculation loop plunges into the nutrient .pdfWhat happens if a red hot inoculation loop plunges into the nutrient .pdf
What happens if a red hot inoculation loop plunges into the nutrient .pdf
 
What are speaking notes Have you used speaking notes before What wo.pdf
What are speaking notes Have you used speaking notes before What wo.pdfWhat are speaking notes Have you used speaking notes before What wo.pdf
What are speaking notes Have you used speaking notes before What wo.pdf
 
There are five components of internal control1) Control environme.pdf
There are five components of internal control1) Control environme.pdfThere are five components of internal control1) Control environme.pdf
There are five components of internal control1) Control environme.pdf
 
The height of a right triangle is 2 feet more than twice the length .pdf
The height of a right triangle is 2 feet more than twice the length .pdfThe height of a right triangle is 2 feet more than twice the length .pdf
The height of a right triangle is 2 feet more than twice the length .pdf
 
ST=TS show that the generalized eigenspace of T are invariant under .pdf
ST=TS show that the generalized eigenspace of T are invariant under .pdfST=TS show that the generalized eigenspace of T are invariant under .pdf
ST=TS show that the generalized eigenspace of T are invariant under .pdf
 
Singer and Nicolson proposed the fluid mosaic model of the cell membr.pdf
Singer and Nicolson proposed the fluid mosaic model of the cell membr.pdfSinger and Nicolson proposed the fluid mosaic model of the cell membr.pdf
Singer and Nicolson proposed the fluid mosaic model of the cell membr.pdf
 
Opportunity or temptationJournal of Case StudiesIntroductionT.pdf
Opportunity or temptationJournal of Case StudiesIntroductionT.pdfOpportunity or temptationJournal of Case StudiesIntroductionT.pdf
Opportunity or temptationJournal of Case StudiesIntroductionT.pdf
 
Multiple choice.Is there evidence that the age at which women get .pdf
Multiple choice.Is there evidence that the age at which women get .pdfMultiple choice.Is there evidence that the age at which women get .pdf
Multiple choice.Is there evidence that the age at which women get .pdf
 
List three Key characteristics of DNA used in studying DNA in electr.pdf
List three Key characteristics of DNA used in studying DNA in electr.pdfList three Key characteristics of DNA used in studying DNA in electr.pdf
List three Key characteristics of DNA used in studying DNA in electr.pdf
 
Let T be the transform from P2 (the vector space of second degree po.pdf
Let T be the transform from P2 (the vector space of second degree po.pdfLet T be the transform from P2 (the vector space of second degree po.pdf
Let T be the transform from P2 (the vector space of second degree po.pdf
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

Liens Kanahara is employed part-time by the Cross-Bar Packing Corp..pdf

  • 1. Liens: Kanahara is employed part-time by the Cross-Bar Packing Corp. and earns take-home pay of $400 per week. He is $2,000 in debt to the Holiday Department Store for goods purchased on credit over the past 8 months. Most of this property is non-exempt and is now in Kanahara's apartment. Kantara is in default on his payments to Holiday. Holiday learns that Kanahara has a girlfriend in another state and that he plans to give her most of this property for Christmas. Discuss what actions are available to and should be taken by Holiday to collect the debt owed by Kanahara. Solution There are some actions taken by Holiday to collect the debt owed by Kanahara are 1.Company can hold his salary , 2.Company can stop providing any facility like conveyance,transport allowance,phone allownace. 3.He has to work for over time