
a)
Credit report:
Credit report is a summary of the credit history about lenders and creditors. It has been categorized into four sections they are:
- Personal information of user
- Credit account information like credit card, loans, and mortgages.
- Public record information
- Inquiries
Personal information of user:
This section used to store the user name, contact number, social security number, and employment details.
Credit account information like credit card, loans, and mortgages:
This section contains the information about loans, credit accounts and limits and payment history.
Public record information:
This section used to store the information about the tax, bankruptcies, or court judgment against the user account.
Inquiries:
This section has the business information for overall credit report.
a)

Explanation of Solution
In my credit report, there is no error in both personal information and credit data. The following guidance used to check the credit report for last year.
Guidance to review the credit records:
The user should check the credit report at least once in a year to make sure “no errors” in report and get the information about credit history.
Evaluate the personal identifiable information and debt:
This process used to evaluate all payment history like monthly payments, interest payments, etc. If the personal information wrongly updated on the report, then the user can complain for that.
Check for inaccurate data:
An inaccurate data like mistaken name, mistyped address, or incorrect amount can confuse the user. So, checking for inaccurate data is essential to users.
b)
Credit report:
Credit report is a summary of the credit history about lenders and creditors. It has been categorized into four sections they are:
- Personal information of user
- Credit account information like credit card, loans, and mortgages.
- Public record information
- Inquiries
Personal information of user:
This section used to store the user name, contact number, social security number, and employment details.
Credit account information like credit card, loans, and mortgages:
This section contains the information about loans, credit accounts and limits and payment history.
Public record information:
This section used to store the information about the tax, bankruptcies, or court judgment against the user account.
Inquiries:
This section has the business information for overall credit report.
b)

Explanation of Solution
Actions that are taken by user if they find error in the credit report:
If the user got the error in the credit report, he should take the following actions. They are:
- Inform to the credit bureaus and data furnisher about the error.
- Markup and highlight the mistakes in the credit report
- Request a fresh report from credit bureaus
- Write a dispute letter per error
c)
Credit report:
Credit report is a summary of the credit history about lenders and creditors. It has been categorized into four sections they are:
- Personal information of user
- Credit account information like credit card, loans, and mortgages.
- Public record information
- Inquiries
Personal information of user:
This section used to store the user name, contact number, social security number, and employment details.
Credit account information like credit card, loans, and mortgages:
This section contains the information about loans, credit accounts and limits and payment history.
Public record information:
This section used to store the information about the tax, bankruptcies, or court judgment against the user account.
Inquiries:
This section has the business information for overall credit report.
c)

Explanation of Solution
Identity theft:
- Identity theft is a crime when a hacker access enough information about other person’s identity for financial gain.
- The information can be a signature, name, phone number, or credit card data. Using these personal information, a thief can apply for loan and run up without user knowledge.
Victims of identity theft:
If someone thinks he or she has been the victim of identity theft, he/she should follow some actions to recover his good name and data:
Give the alert on credit file:
After the identity theft, call the credit report agencies and place the fraud alert for the corresponded file.
Request for the credit report and create the identity-theft report:
Request the credit report from credit agencies to calculate theft report. Create the identity-theft report to complain the certain authority.
Contact the authority:
Inform the local law enforcement to take appropriate action for the theft.
Keep the records and originals:
Keep the good notes of all the dealings with creditors and law enforcement. Send the valuable documents as photocopies in certified mail.
Want to see more full solutions like this?
Chapter 10 Solutions
Using MIS (10th Edition)
- What is the worst case time complexity of the following algorithm for i = 1 to x do for j = 2^((i-1)x) to 2^(in) do print(i,j)arrow_forwardProve for each pair of expression f(n) and g(n) whether f(n) is big O, little o Ω,ω or Θ of g(n). For each case it is possible that more than one of these conditions is satisfied:1. f(n) =log(n2^n), g(n) = log(sqrt(n)2^(n^2))2. f(n) =nsqrt(n) +log(n^n), g(n) =n + sqrt(n)lognarrow_forwardI need to make a parallel version of this sequential codearrow_forward
- I need to make a parallel version of this sequential code.arrow_forwardBenefits of using arrays as instance variables: What are the advantages of incorporating arrays as instance variables within a class? Initializing and managing arrays: How do you initialize and manage arrays within class constructors and mutators (setters)? Example of using arrays as instance variables: Share an example where you have used arrays as instance variables and discuss its application in a real-world scenario. Common mistakes with arrays as instance variables: What are some common mistakes to avoid when working with arrays as instance variables? Information hiding violations: What is the potential violation of information hiding when using arrays as instance variables? How can this be resolved?arrow_forwardDo you think that computers should replace teachers? Give three references with your answer.arrow_forward
- Is online learning or face to face learning better to teach students around the around the world? Give reasons for your answer and provide two references with your response. What are benefits of both online learning and face to face learning ? Give two references with your answer. How does online learning and face to face learning affects students around the world? Give two references with your answer.arrow_forwardExplain Five reasons if computers should replace teachers. Provide three references with your answer. List three advantages and three disadvantages face to face learning and online learning may have on children. Provide two references with your answer.arrow_forwardYou were requested to design IP addresses for the following network using the address block 10.10.10.0/24. Specify an address and net mask for each network and router interfacearrow_forward
- For the following network, propose routing tables in each of the routers R1 to R5arrow_forwardFor the following network, propose routing tables in each of the routers R1 to R5arrow_forwardUsing R language. Here is the information link. http://www.cnachtsheim-text.csom.umn.edu/Kutner/Chapter%20%206%20Data%20Sets/CH06PR18.txtarrow_forward
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage




