Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Ethics-In-Technology PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

Ethics-In-Technology PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: WGU Ethics In TechnologyQCO1
  • Last Update: Dec 5, 2024
  • Questions and Answers: 66
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

Ethics-In-Technology Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

Ethics-In-Technology Practice Exam Questions with Answers WGU Ethics In TechnologyQCO1 Certification

Question # 6

An organization collects data in aggregate format about its employees to improve workflow. Managers at the organization must ensure that the data collected is for business purposes only. Which data collection method should the organization implement?

A.

Electronic discovery

B.

Consumer profiling

C.

Workplace monitoring

D.

Advanced surveillance

Full Access
Question # 7

An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information. Which ethical issue does this incident pose?

A.

Property

B.

Privacy

C.

Access

D.

Accuracy

Full Access
Question # 8

A software company continues to refine and update the predictive algorithm that makes its product the market leader. Although the company announces some changes, most are unannounced so that people and businesses remain unaware.

What is this company protecting?

A.

Tradecraft

B.

Trade secret

C.

Trade dress

D.

Trademark

Full Access
Question # 9

What is the first step in ethical decision-making for an IT professional?

A.

Choose an alternative

B.

Develop a problem statement

C.

Implement a solution

D.

Identify alternatives

Full Access
Question # 10

To gain access to the electronic health record of a critically injured patient, an intensive care specialist decided to circumvent privacy policies to save the patient Which decision-ma king process guided the action of the specialist?

A.

Unethical and legal

B.

Unethical and illegal

C.

Ethical and legal

D.

Ethical andIllegal

Full Access
Question # 11

A consulting company employs H-1B workers. Even though companies applying for H*1B visas must offer a wage that is at least 95% of the average salary for the occupation, a close review of salarieswithin the consulting firm suggests that its H-1B workers are often paid 20% less on average than those with similar skill sets.

Which loophole is the company using to avoid paying H-1B workers a fair wage?

A.

Laying off employees with U.S. citizenship to lower the average salary numbers

B.

Classifying an H-1B worker as entry level when they fill a position of an experienced worker

C.

Pressuring H-1B workers to file petitions with the government to allow lower salary

D.

Employing H-1 B workers to work remotely from countries where the cost of living is lower

Full Access
Question # 12

After Alliah Company and Quiet Flag Industries signed an exclusive data exchange deal, Alliah Company received a better offer from Endothon Company. Despite legal obligations. Alliah Company signs a deal with Endothon Company and immediately ceases activities with Quiet Flag Industries.

Which ethical issue is Alliah Company engaging in by signing the deal with Endothon Company and ceasing activities with Quiet Flag Industries?

A.

Computer fraud

B.

Misrepresentation

C.

Breach of contract

D.

Conflict of interest

Full Access
Question # 13

Which piece of legislation outlines who may access a person's credit data?

A.

Fair and Accurate Credit Transactions Act

B.

General Data Protection Regulation

C.

European Union Data Protection Directive

D.

Fair Credit Reporting Act

Full Access
Question # 14

A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?

A.

Anonymous expression

B.

Doxing

C.

Hate speech

D.

Libel

Full Access
Question # 15

How can organizations differentiate between ethical decision-making and legal decision-making frameworks?

A.

Legal decision-making frameworks provide a complete guide to ethical decision-making but go beyond to encompass decision-making tools to employ in situations where the ethical code is not clearly defined or easily applied.

B.

Ethical decision-making frameworks help an organization uphold a code of behavior generally agreed upon by the members of the larger society which the organization operates in. Legal decision-making frameworks help an organization to navigate a set of rules that convey what people can and cannot do.

C.

Ethical decision-making frameworks help an organization navigate a set of rules that convey what people can and cannot do. Legal decisionmaking frameworks help an organization uphold a code of behavior generally agreed upon by members of the larger society which the organization operates in.

D.

Ethical decision-making frameworks provide a complete guide to legal decision-making but go beyond to encompass decision-making tools to employ in situations where the law is not clearly defined or easily applied.

Full Access
Question # 16

A software development company's executive management team recently met to review its progress on ethical and social responsibility goals. After the review, the team planned a new set of goals for the upcoming year. The team shared the results of this review and the new goats with the employees and the board of directors.

Which process did the team complete?

A.

Establish code of ethics

B.

Model high ethical standards

C.

Deliver ethics training

D.

Conduct social audit

Full Access
Question # 17

A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.

A.

Privacy violation

B.

Predictive coding

C.

Proxy discrimination

D.

Small sample size

Full Access
Question # 18

An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.

Which security practice has been violated?

A.

Availability

B.

Accessibility

C.

Integrity

D.

Confidentiality

Full Access
Question # 19

A publicly-traded organization listed on the New York Stock Exchange has been flagged for possible accounting malpractices. An auditor discovers that the company used funds to disguise payments to international officials. The auditor also finds that the system of internal control does not adequately maintain books and records that reflect all business transactions.

Which law did the organization potentially violate?

A.

Committee on Foreign Investment in the United States

B.

Foreign Intelligence Surveillance Act

C.

Foreign Corrupt Practices Act

D.

Electronic Communications Privacy Act

Full Access