Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > WGU > Courses and Certificates > Ethics-In-Technology

Ethics-In-Technology WGU Ethics In TechnologyQCO1 Question and Answers

Question # 4

What is the first step in ethical decision-making for an IT professional?

A.

Choose an alternative

B.

Develop a problem statement

C.

Implement a solution

D.

Identify alternatives

Full Access
Question # 5

Employee A works as a developer for a software company. Their sibling is also a developer at a competitor company. Both companies are working on a similar application. The sibling's company struggles to get a feature to work, so the sibling copies the source code for the relevant sections of the application from Employee A's laptop after it was left unattended.

How should this behaviorbe classified?

A.

Nepotism

B.

Conflict of interest

C.

Industrial espionage

D.

Corruption

Full Access
Question # 6

Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?

A.

PRISM

B.

Cookies

C.

MYSTIC

D.

Stingray

Full Access
Question # 7

A new Al-driven software package helps schools determine the best type of online learning support based on the current racial segments of students. The developer selected zip codes as a method for identifying specific groups.

Which source of bias does this approach introduce into the system?

A.

Tainted examples

B.

Skewed sample

C.

Proxy discrimination

D.

Limited features

Full Access
Question # 8

Which data retention practice complies with the General Data Protection Regulation (GDPR)?

A.

Storing personal data for a maximum of six months

B.

Prohibiting the storage of personal data with financial data

C.

Performing biannual data quality audits and reporting findings

D.

Securely erasing data that is no longer needed

Full Access
Question # 9

A customer places an order for a product on an e*commerce site after reviewing the quantity and pricing on the online form. The customer then receives an email confirmation that displays different pricing than the order form. The customer reports the discrepancy to customer service.

Which security practice is this customer addressing?

A.

Availability

B.

Integrity

C.

Accessibility

D.

Confidentiality

Full Access
Question # 10

A publicly-traded organization listed on the New York Stock Exchange has been flagged for possible accounting malpractices. An auditor discovers that the company used funds to disguise payments to international officials. The auditor also finds that the system of internal control does not adequately maintain books and records that reflect all business transactions.

Which law did the organization potentially violate?

A.

Committee on Foreign Investment in the United States

B.

Foreign Intelligence Surveillance Act

C.

Foreign Corrupt Practices Act

D.

Electronic Communications Privacy Act

Full Access
Question # 11

A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.

Which ethical theory does this approach represent?

A.

Deontology

B.

Relativism

C.

Virtue

D.

Consequentialism

Full Access
Question # 12

A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?

A.

Anonymous expression

B.

Doxing

C.

Hate speech

D.

Libel

Full Access
Question # 13

A company has used Its credit approval system for a long time. A risk evaluation director initiates an update of the data model to make sure it meets the highest ethical standards. Which Software Engineering Code of Ethics and Professional Practice principle does the director's action represent?

A.

Management

B.

Colleagues

C.

Self

D.

Judgment

Full Access
Question # 14

Which action can IT leaders take to encourage ethical behavior in their organizational culture?

A.

Include traditional criteria in employee appraisals

B.

Offer optional training for employees

C.

Establish a chief executive officer (CEO) position

D.

Conduct social audits and communicate goals

Full Access
Question # 15

A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.

A.

Privacy violation

B.

Predictive coding

C.

Proxy discrimination

D.

Small sample size

Full Access
Question # 16

Which legislation provides a safe harbor for internet service providers (ISPs) whose customers violate intellectual property rights?

A.

Digital Millennium Copyright Act

B.

Copyright Term Extension Act

C.

Digital Performance Right in Sound Recordings Act

D.

Leahy-Smith America Invents Act

Full Access
Question # 17

To establish an expectation among consumers that a professional will behave ethically, a nonprofit society publishes a professional code of ethics. Which benefit can be directly derived from this effort?

A.

Principled decision-making

B.

Public trust and respect

C.

High standards of practice

D.

Evaluation benchmark

Full Access
Question # 18

An organization plans to hire three external software engineers to build client software to connect its lightweight wireless devices to the cloud. It will do so according to specific terms and a specific duration defined in a legal document. The duration of the work will be six months.

Which workforce category should the organization hire within?

A.

Full-time employees

B.

In-house expertise

C.

Part-time salaried workers

D.

Independent contractors

Full Access
Question # 19

A company needs to fill a specialized, long-term engineering role. The worker in this role needs to work on-site and use a company-provided laptop for security. The company's corporate code of ethics dictates that it should prioritize economic empowerment in its local community. The company has not been successful in sourcing local candidates.

Which type of worker should the company consider expanding its candtdate pool to include?

A.

H-1B

B.

Offshore

C.

Gig

D.

Freelance

Full Access