a)
Credit report:
Credit report is a summary of the credit history about lenders and creditors. It has been categorized into four sections they are:
- Personal information of user
- Credit account information like credit card, loans, and mortgages.
- Public record information
- Inquiries
Personal information of user:
This section used to store the user name, contact number, social security number, and employment details.
Credit account information like credit card, loans, and mortgages:
This section contains the information about loans, credit accounts and limits and payment history.
Public record information:
This section used to store the information about the tax, bankruptcies, or court judgment against the user account.
Inquiries:
This section has the business information for overall credit report.
a)
Explanation of Solution
In my credit report, there is no error in both personal information and credit data. The following guidance used to check the credit report for last year.
Guidance to review the credit records:
The user should check the credit report at least once in a year to make sure “no errors” in report and get the information about credit history.
Evaluate the personal identifiable information and debt:
This process used to evaluate all payment history like monthly payments, interest payments, etc. If the personal information wrongly updated on the report, then the user can complain for that.
Check for inaccurate data:
An inaccurate data like mistaken name, mistyped address, or incorrect amount can confuse the user. So, checking for inaccurate data is essential to users.
b)
Credit report:
Credit report is a summary of the credit history about lenders and creditors. It has been categorized into four sections they are:
- Personal information of user
- Credit account information like credit card, loans, and mortgages.
- Public record information
- Inquiries
Personal information of user:
This section used to store the user name, contact number, social security number, and employment details.
Credit account information like credit card, loans, and mortgages:
This section contains the information about loans, credit accounts and limits and payment history.
Public record information:
This section used to store the information about the tax, bankruptcies, or court judgment against the user account.
Inquiries:
This section has the business information for overall credit report.
b)
Explanation of Solution
Actions that are taken by user if they find error in the credit report:
If the user got the error in the credit report, he should take the following actions. They are:
- Inform to the credit bureaus and data furnisher about the error.
- Markup and highlight the mistakes in the credit report
- Request a fresh report from credit bureaus
- Write a dispute letter per error
c)
Credit report:
Credit report is a summary of the credit history about lenders and creditors. It has been categorized into four sections they are:
- Personal information of user
- Credit account information like credit card, loans, and mortgages.
- Public record information
- Inquiries
Personal information of user:
This section used to store the user name, contact number, social security number, and employment details.
Credit account information like credit card, loans, and mortgages:
This section contains the information about loans, credit accounts and limits and payment history.
Public record information:
This section used to store the information about the tax, bankruptcies, or court judgment against the user account.
Inquiries:
This section has the business information for overall credit report.
c)
Explanation of Solution
Identity theft:
- Identity theft is a crime when a hacker access enough information about other person’s identity for financial gain.
- The information can be a signature, name, phone number, or credit card data. Using these personal information, a thief can apply for loan and run up without user knowledge.
Victims of identity theft:
If someone thinks he or she has been the victim of identity theft, he/she should follow some actions to recover his good name and data:
Give the alert on credit file:
After the identity theft, call the credit report agencies and place the fraud alert for the corresponded file.
Request for the credit report and create the identity-theft report:
Request the credit report from credit agencies to calculate theft report. Create the identity-theft report to complain the certain authority.
Contact the authority:
Inform the local law enforcement to take appropriate action for the theft.
Keep the records and originals:
Keep the good notes of all the dealings with creditors and law enforcement. Send the valuable documents as photocopies in certified mail.
Want to see more full solutions like this?
Chapter 10 Solutions
Using MIS (9th Edition)
- Vision statements are more specific than strategic objectives. a) True b) Falsearrow_forwardThe three components of the __________ approach to corporate accounting include financial, environmental, and social performance measures. Multiple Choice a) stakeholder b) triple dimension c) triple bottom line d) triple efficiencyarrow_forwardCompetitors, as internal stakeholders, should be included in the stakeholder management consideration of a company and in its mission statement. a) True b) Falsearrow_forward
- At what level in the organization should the strategic management perspective be emphasized? Multiple Choice a) throughout the organization b) from the bottom up in an organization c) at the top of the organization d) at the middle of the organizationarrow_forwardA good manager can be flexible when it comes to sticking to the original plan; to get good results, the intended strategy has to become the realized strategy. a) True b) Falsearrow_forward________ tend to be quite enduring and seldom change. Multiple Choice a) Strategic objectives b) Vision statements c) Strategic plans d) Mission statementsarrow_forward
- The idea that organizations are not only accountable to stockholders but also to the community-at-large is known as social responsibility. a) True b) Falsearrow_forwardAmong the leaders needed for an effective strategic management process are ________, who, although they have little positional power and formal authority, generate their power through the conviction and clarity of their ideas. Multiple Choice a) executive leaders b) triple bottom line advocates c) internal networkers d) local line leadersarrow_forwardI would like to get help to resolve the following casearrow_forward
- Last Chance Securities The IT director opened the department staff meeting today by saying, "I've got some good news and some bad news. The good news is that management approved the payroll system project this morning. The new system will reduce clerical time and errors, improve morale in the payroll department, and avoid possible fines and penalties for noncompliance. The bad news is that the system must be installed by January 1st in order to meet new federal reporting rules, all expenses from now on must be approved in advance, the system should have a modular design if possible, and the vice president of finance would like to announce the new system in a year-end report if it is ready by mid-December." Tasks 1. Why is it important to define the project scope? How would you define the scope of the payroll project in this case? 2. Review each constraint and identify its characteristics: present versus future, internal versus exter- nal, and mandatory versus desirable. 3. What…arrow_forward2. Signed Integers Unsigned binary numbers work for natural numbers, but many calculations use negative numbers as well. To deal with this, a number of different methods have been used to represent signed numbers, but we will focus on two's complement, as it is the standard solution for representing signed integers. 2.1 Two's complement • Most significant bit has a negative value, all others are positive. So, the value of an n-digit -2 two's complement number can be written as: Σ2 2¹ di 2n-1 dn • Otherwise exactly the same as unsigned integers. i=0 - • A neat trick for flipping the sign of a two's complement number: flip all the bits (0 becomes 1, or 1 becomes 0) and then add 1 to the least significant bit. • Addition is exactly the same as with an unsigned number. 2.2 Exercises For questions 1-3, answer each one for the case of a two's complement number and an unsigned number, indicating if it cannot be answered with a specific representation. 1. (15 pts) What is the largest integer…arrow_forwardcan u solve this questionarrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education