Consider the following information and use it to answer the questions that follow; A customer owning account 801 is transferring Ksh. 139,500 from his account to an account 998 belonging to one of his business partners. The business partner (owner of account 998) is also trying to settle a debt of raw materials supplied by one of his suppliers by issuing a cheque of 150,000. Assume that cheques are debited (credited) immediately after being deposited. Assume the bank has a rule that minimum balances cannot go below zero.   What anomaly might have occurred above? Why so?

Question

Consider the following information and use it to answer the questions that follow;
A customer owning account 801 is transferring Ksh. 139,500 from his account to an account
998 belonging to one of his business partners. The business partner (owner of account 998) is
also trying to settle a debt of raw materials supplied by one of his suppliers by issuing a
cheque of 150,000. Assume that cheques are debited (credited) immediately after being
deposited.
Assume the bank has a rule that minimum balances cannot go below zero.

 

What anomaly might have occurred above? Why so?

 

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Science

Databases

Related Computer Science Q&A

Find answers to questions asked by students like you.

Q: Write a program in C++. Program Information You recently visited a clock shop and it started you thi...

A: Actually, c++ is a general language.

Q: The Internet has fast become a key instrument for the exercise of the right to freedom of speech. In...

A: Freedom of speech is a principle that encourages an individual's or a community's freedom to express...

Q: Q6: (Display patterns using loops) Use nested loops that display the following pattern in three sepa...

A: Pattern A  : Program in  C #include <stdio.h> int main() {    int i, j, rows;    printf("Enter...

Q: SOLVE IN C#

A: The main object of the program is to create a program that tests the 1Dimensional array of values is...

Q: Subject :database

A: The following properties are required to solve the problems in the given scenario: Atomicity, Consis...

Q: 3- Please I want solution of this question urgently. Thanks

A: Given program:   #include <stdio.h> void main(){    int A = 0;        if (A < 0)        pri...

Q: what is live streaming in social media

A: Live streaming refers to the continuous capture and transmission of internet streaming media in real...

Q: (g) get_total_crimes_by_type(adict, 2Dlist) takes a dictionary (crime_dict) and a 2D-list (database)...

A: def get_total_crimes_by_type(adict, 2Dlist):    total_crime = {}    for i in adict:        value = a...

Q: Q2: Which of the following statements are equivalent? Which ones are correctly indented?

A: In the given statements, All statement contains Two if statement, One else if statement, and One el...

Q: Write a class named StockPrices . The class constructor should accept an array of stock prices as it...

A: Actually, c++ is powerful general purpose language.

Q: Problem 2 (. ). Consider the following heap, which shows integer keys in the nodes: 5 22 15 34 27 28...

A: Remove the minimum from a given heap i.e 5 Copy the last value in the heap to the root of the heap....

Q: JAVA Please solve Question 4 Please solve Question 4 Please solve Question 4 Please solve Question 4...

A: Actually, java is a object oriented programming language it is platform independent.

Q: Subject:Database Myid=18191103032 doing solve step bye step

A: It is used to implement database indexes In B+ tree leaf nodes denotes actual data pointers All leaf...

Q: Information Security For a sniffer attack to succeed, what must the attacker do? How can an attacker...

A: Remember back in some movies, law agencies, and criminals used to bug the telephone lines in order t...

Q: (#2) computer science: theory of computation or automata theoryplease provide (step-by-step) explana...

A: Click to see the answer

Q: Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Re...

A: The, given information is:  A file that contains a list of at least 15 six-digit account numbers. Re...

Q: Write short notes on:a. Virtual private networksb. Tunnelingc. IP Securityd. Network Security

A: Virtual private networks : A virtual private network (VPN) gives you online privacy and anonymity by...

Q: Please solve very soon completely

A: Given,   L R T 2,2 0,0 B 0,0 1,1 Player1 can play in Top or in Bottom and Player2 can play...

Q: Question 6: Write a Java program that displays the GUI shown on the right, as precisely as possible,...

A: The main objective of the java program GUI.java is to create a frame with the buttons as shown in th...

Q: Decode J mpwf zpv

A: Decode J mpwf zpv I love you

Q: Search online for samples of IT contracts. Use search phrases like “IT contract” or “sample contract...

A: The, given information is: Search online for samples of IT contracts. Use search phrases like “IT co...

Q: What code would you use to create a style sheet to specify 30-point blue arial heading and all other...

A: <style>h1{color: blue;font-size: 30px;font-family: Arial;}p {  line-height: 2;  color: blue;  ...

Q: The Code must be in Matlab

A: x = input('Input the value of x : ');if(x<1)    y = log(1./(1-x));    disp('Calculated value is :...

Q: Design an algorithm and hence, a logic using C language, based on STM32F100RB peripherals to follow ...

A: Algorithm is a step-by-step procedure, which defines a set of instructions to be executed in a certa...

Q: create the program for a game that simulates rolling two dice by generating two random numbers betwe...

A: Open flowgorithm. Click on the line in between Main and End. Select Output. Double click on Output. ...

Q: a)      Consider this Algorithm-Z , Taking list of integer as input List Of Integer: X(Integer: ...

A: i) The above algorithm is used to find the factors of number. In the above algorithm Y is a list sto...

Q: A vector contains the grades obtained by students of a class in an assessment, with the following ch...

A: Declare an integer variable size to hold the capacity of both the vectors.   Declare one float and o...

Q: // Flowers.cpp - This program reads names of flowers and whether they are grown in shade or sun from...

A: #include <fstream> #include <iostream> #include <string> using namespace std; int ...

Q: Question 3) 3.1) From IEEE-754 32 Bit Single Precision To decimal baseConvert to formata) 1111111110...

A: Based on our rules, when multiple questions are posted, we should answer only the first question. Pl...

Q: Textbook: Digital Systems Chapter 8  Question/Problem 44 I'm not sure if I'm running the correct Que...

A: Click to see the answer