Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

Ethics-In-Technology WGU Ethics In TechnologyQCO1 Questions and Answers

Questions 4

What is the first step in ethical decision-making for an IT professional?

Options:

A.

Choose an alternative

B.

Develop a problem statement

C.

Implement a solution

D.

Identify alternatives

Buy Now
Questions 5

A company struggles to maintain project schedules with its current resource capacity. With a new set of corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to help fill the gap.

What is a disadvantage of using contingent workers to support the company's goals?

Options:

A.

Any skills gained during employment will be lost to the company at the project's completion.

B.

Internal business process understanding will be minimal given the temporary nature of the workers.

C.

The company may require the same worker tor other projects.

D.

The company does not have to provide benefits throughout the project's lifecycle.

Buy Now
Questions 6

Which action can IT leaders take to encourage ethical behavior in their organizational culture?

Options:

A.

Include traditional criteria in employee appraisals

B.

Offer optional training for employees

C.

Establish a chief executive officer (CEO) position

D.

Conduct social audits and communicate goals

Buy Now
Questions 7

A chief financial officer (CFO) at a major telecommunications company decides to replace a high number of its customer-facing stores with artificial intelligence-enabled telecom booths. The telecom booths will enable current or new subscribers to buy or replace SIM cards or mobile phones on the go. The CFO is concerned about a major reduction in the workforce but believes this move will help grow the company's subscriber base, reduce customer churn, and increase overall company profits.

Which ethical theory does this approach represent?

Options:

A.

Deontology

B.

Care

C.

Consequentialism

D.

Virtue

Buy Now
Questions 8

To establish an expectation among consumers that a professional will behave ethically, a nonprofit society publishes a professional code of ethics. Which benefit can be directly derived from this effort?

Options:

A.

Principled decision-making

B.

Public trust and respect

C.

High standards of practice

D.

Evaluation benchmark

Buy Now
Questions 9

A new Al-driven software package helps schools determine the best type of online learning support based on the current racial segments of students. The developer selected zip codes as a method for identifying specific groups.

Which source of bias does this approach introduce into the system?

Options:

A.

Tainted examples

B.

Skewed sample

C.

Proxy discrimination

D.

Limited features

Buy Now
Questions 10

A malicious hacker takes over several computers via the internet and causes them to flood a target site with high volumes of data queries and other small tasks. Which type of attack is the hacker performing against the target site?

Options:

A.

Zero-day exploit

B.

Ransomware

C.

Denial-of-service (DoS)

D.

Worm

Buy Now
Questions 11

Which legislation provides a safe harbor for internet service providers (ISPs) whose customers violate intellectual property rights?

Options:

A.

Digital Millennium Copyright Act

B.

Copyright Term Extension Act

C.

Digital Performance Right in Sound Recordings Act

D.

Leahy-Smith America Invents Act

Buy Now
Questions 12

An organization gathers data using various technologies to optimize sales processes for its current and prospective customers. The data consists of demographic, geographic, and behavioral customer changes.

Which data collection method is the organization using?

Options:

A.

Advanced surveillance

B.

Electronic discovery

C.

Workplace monitoring

D.

Consumer profiling

Buy Now
Questions 13

Which organization licenses software developers who implement safety and health software in the United States?

Options:

A.

National Society of Professional Engineers

B.

Accreditation Board for Engineering and Technology

C.

American Society for Engineering Education

D.

National Council of Examiners for Engineering and Surveying

Buy Now
Questions 14

Which data retention practice complies with the General Data Protection Regulation (GDPR)?

Options:

A.

Storing personal data for a maximum of six months

B.

Prohibiting the storage of personal data with financial data

C.

Performing biannual data quality audits and reporting findings

D.

Securely erasing data that is no longer needed

Buy Now
Questions 15

A company builds a new artificial intelligence (Al) system that helps address drug and alcohol use disorders by developing an individualized plan to support people withone of these disorders. The system developers load nationwide information from the last 20 years to provide a baseline for the Al to analyze. Upon activating the system, the company receives complaints about bias against minorities with a drug or alcohol use disorder.

What introduced bias into the system?

Options:

A.

Size disparity

B.

Skewed sample

C.

Proxy data

D.

Limited features

Buy Now
Questions 16

After Alliah Company and Quiet Flag Industries signed an exclusive data exchange deal, Alliah Company received a better offer from Endothon Company. Despite legal obligations. Alliah Company signs a deal with Endothon Company and immediately ceases activities with Quiet Flag Industries.

Which ethical issue is Alliah Company engaging in by signing the deal with Endothon Company and ceasing activities with Quiet Flag Industries?

Options:

A.

Computer fraud

B.

Misrepresentation

C.

Breach of contract

D.

Conflict of interest

Buy Now
Questions 17

A software company continues to refine and update the predictive algorithm that makes its product the market leader. Although the company announces some changes, most are unannounced so that people and businesses remain unaware.

What is this company protecting?

Options:

A.

Tradecraft

B.

Trade secret

C.

Trade dress

D.

Trademark

Buy Now
Questions 18

A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?

Options:

A.

Anonymous expression

B.

Doxing

C.

Hate speech

D.

Libel

Buy Now
Questions 19

A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.

Options:

A.

Privacy violation

B.

Predictive coding

C.

Proxy discrimination

D.

Small sample size

Buy Now
Exam Name: WGU Ethics In TechnologyQCO1
Last Update: Oct 21, 2024
Questions: 66
Ethics-In-Technology pdf

Ethics-In-Technology PDF

$24  $80
Ethics-In-Technology Engine

Ethics-In-Technology Testing Engine

$28.5  $95
Ethics-In-Technology PDF + Engine

Ethics-In-Technology PDF + Testing Engine

$39  $130