Ethics in Technology Practice Exam
60 Questions
10 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A U.S. company launched an e-commerce platform in the European Union (EU). The board of directors raised concerns about compliance with applicable privacy regulations and the collection of customer information.

Which regulation applies to this scenario?

  • EU Data Protection Directive
  • Electronic Communications Privacy Act
  • Freedom of Information Act
  • General Data Protection Regulation (correct)
  • A homeowners' association (HOA) installs license plate readers after an increase in reported crime in the neighborhood. Two domestic workers petition the HOA, requesting that their data be deleted to protect their privacy. The HOA considers this but denies their request, citing the greater need for security protection for residents.

    Which ethical theory does this represent?

  • Consequentialism (correct)
  • Relativism
  • Deontology
  • Virtue
  • An IT company holds itself accountable for how its actions affect its shareholders, consumers, employees, community, the environment, and suppliers.

    What is this company demonstrating?

  • Corporate social responsibility (correct)
  • Corporate code of ethics
  • Supply chain sustainability
  • Environmental, social, and governance policies
  • A university is authoring a code of ethics for its professors to abide by to promote high standards of practice and ethical behavior.

    What are the two main parts of a code of ethics the university should include?

    Choose 2 answers.

    <p>Outline of the organization's aspirations</p> Signup and view all the answers

    A company is engaged as a third party to perform debt collection on behalf of a telecommunications provider. The company operates an outbound call center to contact debtors and set up payment arrangements. The company needs to ensure that the debtors' data privacy is not at risk.

    Which two areas should the company ensure are properly managed?

    Choose 2 answers.

    <p>Network security</p> Signup and view all the answers

    An aircraft company has developed an updated model of one of its best-selling airliners. It has attempted to keep new systems to a minimum so that existing pilots do not require expensive simulator retraining. During development, the company authorized a new software system to keep the aircraft in balanced flight. In rare circumstances during testing, the system caused uncommanded nose-down inputs, which in the worst case could lead to a crash.

    Which two groups should the company inform to mitigate the potential liability?

    Choose 2 answers.

    <p>Regulatory authority</p> Signup and view all the answers

    A store manager of a home service company hires a data entry clerk to process customer returns. The data entry clerk is trained to enter data in the system for every customer record. An internal audit shows typographical mistakes in customers' records for the last two weeks.

    Which data aspect does the home service company need to address to reduce errors?

    <p>Accuracy</p> Signup and view all the answers

    A project team at an animal welfare agency is using predictive analytics to help take animals out of abusive environments. The algorithm the team designed has a false positive rate that is higher than zero, which means that some animals could be removed erroneously if the algorithm's recommendations are followed. The project owner understands that pets may wrongfully be removed from loving healthy homes but decides to use the algorithm anyway because it will happen only a small percentage of the time.

    Which ethical theory does this represent?

    <p>Consequentialism</p> Signup and view all the answers

    A company is notified of a breach of its systems. An investigation reveals that although no financial information was taken, the customer records for all its customers, including names, email addresses, and passwords, may have been taken. Although it is uncertain whether the records were taken, evidence suggests that the intruders accessed the database containing the information. The investigation team indicates that, given six weeks, they will be able to identify what, if anything, has been taken.

    Which action should the company take?

    <p>Notify all customers that there may have been a data breach</p> Signup and view all the answers

    A software development company develops a public website for the federal government. The website is dedicated to remediating threats of a pandemic based on detailed specifications provided by the customer. During final tests, the company discovers specification flaws that could potentially aggravate the effects of the pandemic.

    What should the company do to mitigate its risk associated with strict liability?

    <p>Disclose the test results to the government</p> Signup and view all the answers

    Which verification should a software engineer obtain from the state to serve as proof of professional ability?

    <p>License</p> Signup and view all the answers

    A patient visited a primary care doctor for headaches and was referred to a specialist clinic that deals with neuroimaging. After visiting the specialist, the patient receives results that do not seem to match their symptoms. After calling the clinic, the patient discovers that their electronic health records (EHRs) from the primary care provider were mismatched with another patient’s records when the patient visited the specialist.

    What is the cause of the mismatch?

    <p>The lack of a nationwide unique patient identifier impedes error-free matching of an individual’s files.</p> Signup and view all the answers

    A developer creates video games based on real war scenarios and designs characters that mimic real people from world events. The video game has content perceived as excessively violent and rewards players who inflict the most harm on other players' virtual characters. The developer knows that these are simulated acts that depict real war scenarios to create an immersive experience for players but is concerned about the impact on their moral character.

    Which ethical theory does this situation represent?

    <p>Virtue</p> Signup and view all the answers

    What are two reasons technical workers should become members of IT professional organizations?

    Choose 2 answers.

    <p>Skill building</p> Signup and view all the answers

    A retail company experiences a data breach. Customer data is stolen, including credit card numbers, names, addresses, and account passwords. The attackers have amassed enough combinations of personally identifiable information (PII) to commit identity theft.

    Which adverse impacts, in addition to the loss of business, does the company face?

    <p>Reputational damage and the need to provide support for victims</p> Signup and view all the answers

    Which two intellectual property items are protected by a patent?

    Choose 2 answers.

    <p>Inventions</p> Signup and view all the answers

    A software engineering company offers its employees free technical training every year. Many of its software engineers are taking the training to further their knowledge in the design, development, and testing of software.

    Which concept of the Software Engineering Code of Ethics and Professional Practice are the engineers following?

    <p>Lifelong learning</p> Signup and view all the answers

    An international organization based in a foreign country invites a U.S. ambassador to help promote its communications business. In exchange for the promotion, the president of the organization offers the ambassador a family trip package for 15 days as a thank-you gesture, with a bonus check of an undisclosed amount.

    Which law did the organization potentially violate?

    <p>Foreign Corrupt Practices Act</p> Signup and view all the answers

    A police department employee has access to data related to an ongoing investigation. A local politician whom the employee supports has come under investigation. The employee accesses the data relating to the investigation and provides the file to the politician anonymously.

    How should this behavior be classified?

    <p>Corruption</p> Signup and view all the answers

    What is a reason for organizations to pursue corporate social responsibility (CSR) goals?

    <p>Gain goodwill</p> Signup and view all the answers

    A social media website collected personal information about consumers when they subscribed to the service. Subscribers opted in or out before creating their online profiles.

    Which European Union Data Protection Directive did the website follow?

    <p>Choice</p> Signup and view all the answers

    A new tech startup in the U.S. is considering hiring a large group of workers to complete a new project. It has considered the pros and cons of hiring temporary foreign workers versus training full-time employees for this project. To lower costs, the company decides to hire H-1B workers.

    What is a potential risk the new company faces by hiring these H1-B workers?

    <p>Lack of employee loyalty</p> Signup and view all the answers

    An organization enters customer information in different formats, styles, and varieties into a database. Two customers placed an order on January 12, 2022, but one customer's purchase date is entered as 01/12/22, whereas the other's is entered as 12/01/22.

    Which aspect of data could be negatively impacted by the format issue?

    <p>Accuracy</p> Signup and view all the answers

    A patient received treatment at an urgent care facility. Prior to being seen, the patient completed the required Health Insurance Portability and Accountability Act (HIPAA) forms. The doctor recorded all relevant treatment data in the urgent care facility's electronic medical record (EMR) system.

    Which entity is responsible for ensuring the accuracy of the patient's medical information stored in the EMR?

    <p>The urgent care facility</p> Signup and view all the answers

    A company releases a new financial software package. Along with the installation program, the company includes a written assurance that the program meets appropriate levels of quality. It also provides for specific remedies in the case of malperformance.

    What did the company use to limit its legal liabilities?

    <p>Limited warranty</p> Signup and view all the answers

    Which legislation protects social networking companies from defamation lawsuits in connection with user postings that appear on the companies' sites?

    <p>Communications Decency Act (CDA)</p> Signup and view all the answers

    A financial services company hires a consultant to help build its data analytics capabilities. The company and consultant have a binding agreement for a list of deliverables and a delivery schedule. The consultant completes the work but delivers it six weeks late.

    Which ethical problem is this consultant engaged in?

    <p>Breach of contract</p> Signup and view all the answers

    What is the cause of the rise in computer-related security issues, particularly among small- and medium-sized businesses?

    <p>Bring your own device policies</p> Signup and view all the answers

    An employee of a large tech company notices that the company is not taking the proper steps to protect consumer information. The employee has raised concerns to management multiple times but has been ignored. The employee finds that the company is harming the public interest and takes steps to attract public attention.

    Which action is the employee demonstrating?

    <p>Whistleblowing</p> Signup and view all the answers

    A new startup tech company plans to provide secure wireless access within its office for employees and other trusted visitors. The company has concerns about competitors eavesdropping or compromising the connections and obtaining unauthorized access to the company's intellectual property. The company is considering using Wireless Protected Access 2 (WPA2) to secure data in transit.

    Which protocol does this wireless protection implement?

    <p>Advanced Encryption Standard (AES)</p> Signup and view all the answers

    An IT company that specializes in software development has an organizational structure that consists of a chief executive officer, chief ethics officer, chief finance officer, and chief operating officer.

    Which of these executives provides the company with vision and leadership in business conduct?

    <p>Chief ethics officer</p> Signup and view all the answers

    Before an IT employee transfers to a new job, the chief information officer (CIO) asks the employee to review a business proposal from the employee's future company.

    Which situation does this place the employee in?

    <p>Conflict of interest</p> Signup and view all the answers

    A researcher develops a new model based on artificial intelligence (AI) to assist with tracking the movement of foreign nationals into and out of the United States. Due to ongoing civil unrest in Middle Eastern countries, the researcher wants to ensure that the nationality marker within the data set is not affected by AI bias.

    Which concept should be applied to the data set to reduce or eliminate AI bias?

    <p>Protected attribute</p> Signup and view all the answers

    A computer science student downloads a pirated copy of a movie and shares it with friends.

    What has the student infringed upon?

    <p>Copyright</p> Signup and view all the answers

    A newly founded IT startup has ambitious goals for the upcoming year and decides to rapidly onboard many contingent workers.

    What are two potential disadvantages of hiring contingent workers from the startup's perspective?

    Choose 2 answers.

    <p>Employees feeling disconnected from the company</p> Signup and view all the answers

    A municipality decides to use the data it has on household water usage to build an algorithm that can identify welfare fraud. This would result in a list of potential fraudsters that could be used to make welfare decisions. Although the municipality is the rightful owner and processor of the data, citizens have raised privacy issues with the application. The citizens object that they have no way of knowing whether they are on the list and have no possibility of redress if they are.

    Which decision-making process did the municipality follow?

    <p>Legal but unethical</p> Signup and view all the answers

    An IT manager implements security measures at the organization, network, application, and employee levels.

    Which approach to security is the manager using?

    <p>Layered</p> Signup and view all the answers

    An organization is evaluating potential harm to its networks to ensure data is stored accurately and securely from both internal and external threats.

    What is the process the organization is following?

    <p>Risk assessment</p> Signup and view all the answers

    An attending physician at a local hospital receives an email with a link that appears to be from a neighboring clinic. When the physician clicks the link, computers throughout the hospital freeze, and patient information can no longer be accessed. A message appears demanding payment of five bitcoins within 48 hours to decrypt the hospital database and threatening that without payment, all information will be deleted.

    Which type of exploit is this?

    <p>Ransomware</p> Signup and view all the answers

    A company is using software to track workforce operational activity. Management communicates that the data collected will be treated as sensitive. Administrative and technical security measures are put in place to protect employee data. These measures include periodically culling records that are no longer relevant.

    Which additional measure should be taken to safeguard employee data from misuse?

    <p>Limit who can view employee data</p> Signup and view all the answers

    A hospital wants to improve patient outcomes while reducing the amount of time it takes to send and receive a patient's treatment records to and from a neighboring hospital. The hospital engages a technology organization to create an electronic bridge to better facilitate faster data transfer while minimizing the threat of external parties compromising the data.

    Which type of technology solution does the hospital implement?

    <p>Health information exchange</p> Signup and view all the answers

    Two programmers disagree about which philosophical theory is best suited for their autonomous vehicles. One programmer suggests their vehicle should always choose the greatest good for the greatest number of people.

    Which philosophical theory encapsulates this stance?

    <p>Utilitarianism</p> Signup and view all the answers

    A government contractor is rebuilding a telecommunications network. One of the contractor's employees discovers that the company is participating in illegal and unethical acts to defraud the government. The employee considers filing a lawsuit against the company on behalf of the government.

    Which law protects the employee if the lawsuit is filed?

    <p>False Claims Act</p> Signup and view all the answers

    A social media user discovers that a former romantic partner posted humiliating photos of the two together without obtaining the social media user's permission. The social media user suffers severe emotional distress as a result.

    Which form of threat does this represent?

    <p>Cyberharassment</p> Signup and view all the answers

    A company provides machine learning software that helps judges make decisions in parole hearings by assigning each person up for parole a score estimating the probability that they will commit another crime if paroled. The model was trained on the profiles of incarcerated people and information on whether they were sent back to prison after release. Race was not a variable that was included in the training data. However, it was uncovered that the model gave higher probabilities to members of certain races. It was found that a proxy variable was inadvertently included.

    Which data point in the incarcerated peoples' profiles was likely the variable understood by the machine learning models as a proxy for race?

    <p>Zip code</p> Signup and view all the answers

    An auditor tries to test the existence of bias within an artificial intelligence (AI) system. The auditor needs to determine if the model's predictions are equivalent across each protected class.

    What is the auditor testing for based on a fairness metric?

    <p>Equal representation</p> Signup and view all the answers

    A data analytics company introduces a new artificial intelligence (AI) platform to help amusement park operators understand visitor preferences for rides, shows, and other entertainment. The analytics company tries to reduce bias in the system by ensuring that any ingested data is transformed to remove correlations between the target and a protected attribute.

    Which stage of the bias mitigation process is the company in?

    <p>Preprocessing</p> Signup and view all the answers

    Individuals need to be given an opportunity to correct inaccurate information held about them in databases.

    Which societal impact drives this capability?

    <p>Companies make decisions based on accurate data</p> Signup and view all the answers

    What is the difference between ethics and morals?

    <p>Ethics reflect a societal code of behavior, whereas morals reflect personal principles.</p> Signup and view all the answers

    A software sales company is currently struggling with low sales. The company is aware that one of its competitor's senior sales managers is dissatisfied with the competitor due to having been overlooked for a promotion to the position of a vice president (VP).

    The company approaches the sales manager and offers them a position as VP for sales on the condition of bringing the manager's existing customer list and contacts to the new role. The sales manager is bound by a noncompete clause.

    Which type of decision-making process did the company follow?

    <p>Unethical and illegal</p> Signup and view all the answers

    Which ethical concept is related to the right to use a person's or an organization's intangible creative activities?

    <p>Property</p> Signup and view all the answers

    The marketing department of a financial services institution asks data scientists to build a consumer profile based on transaction data. Although company lawyers approve the request to explicitly signal customers with potential gambling addiction problems, the data scientists refuse to build the profiles.

    What describes this request?

    <p>Unethical and legal</p> Signup and view all the answers

    While on vacation, an IT leader leaves a manager in charge of a major client project. Because the IT leader's team abides by a strong code of ethics, the IT leader knows the manager has the tools to perform ethical self-assessment during and after any challenging situations that may arise.

    Which benefit of following a professional code of ethics do these self-assessment tools provide?

    <p>Evaluation benchmark</p> Signup and view all the answers

    A local community opposes the building of a new factory in its neighborhood and has organized on social media to run a posting campaign to shut down construction. To silence community members, the building corporation decides to go to court to intimidate them.

    Which threat is the corporation implementing?

    <p>Strategic lawsuits against public participation (SLAPP)</p> Signup and view all the answers

    The United Nations Security Council (UNSC) is briefed on a cyberattack in which hackers were able to breach system integrity, gain access to sensitive data, and manipulate the data without being noticed.

    What should the UNSC use to be alerted to these threats in the future?

    <p>Intrusion Detection System (IDS)</p> Signup and view all the answers

    A healthcare company decides to adopt an artificial intelligence (AI) solution to help identify which doctors and drugs will provide the greatest value to patients.

    The data team is feeding four years of data into the system, including pharmacy and insurance claims. Based on this data, the AI will make recommendations based on which doctors and drugs should result in the best healthcare outcomes for patients. A data scientist is concerned about the disparate data sources and the fact that all information about a patient's medical history and ongoing treatment will be easily accessible.

    What should the data scientist provide to the AI to ensure a comprehensive data set?

    <p>Electronic health record (EHR)</p> Signup and view all the answers

    What are two reasons IT job seekers should invest in obtaining a vendor's product certification?

    Choose 2 answers.

    <p>Increased hiring demand</p> Signup and view all the answers

    A company hires an independent contractor to build a website for a product launch. In the contract, the contractor agrees to deliver the finished website within two months. The company promises more contracts if the contractor successfully completes the project. The company provides the contractor with a laptop and tablet with unrestricted access. The schedule requires the contractor to work around 60 hours per week with no overtime compensation or paid time off. The contractor delivers the website, meeting the contract terms. However, the company does not award the contractor more contracts. The contractor sues the company on the grounds that the company misclassified the contractor and treated them as an employee.

    What establishes the contractor's grounds for arguing for the misclassification?

    <p>Working on a company-provided laptop and tablet</p> Signup and view all the answers

    An organization wants to take steps against an anonymous person who posts inaccurate negative reviews about the organization on its website.

    Which tactic can the organization employ?

    <p>File a John Doe lawsuit</p> Signup and view all the answers

    A Federal Bureau of Investigation (FBI) agent monitors a telephone conversation between a 12-year-old child and the child's stepfather. The monitoring is part of a criminal investigation. A warrant was not obtained prior to commencement of the monitoring.

    Which law or regulation did the agent violate?

    <p>Wiretap Act</p> Signup and view all the answers

    Study Notes

    Privacy Regulations

    • A U.S. company launching an e-commerce platform in the EU must comply with applicable privacy regulations and ensure the collection of customer information is done ethically.
    • The company must consider privacy regulations, such as the EU's General Data Protection Regulation (GDPR), to avoid legal and ethical issues.

    Ethical Theories

    • The HOA's decision to deny the domestic workers' request to delete their data represents a utilitarian ethical theory, which prioritizes the greater good over individual interests.
    • The IT company's accountability to its stakeholders, including shareholders, consumers, employees, community, environment, and suppliers, demonstrates a stakeholder theory.
    • The developer's concern about the impact of a violent video game on players' moral character represents a virtue ethics theory.

    Code of Ethics

    • A university's code of ethics for professors should include two main parts: a set of principles and a set of rules.
    • The Software Engineering Code of Ethics and Professional Practice emphasizes the importance of protecting the public interest and promoting high standards of practice.

    Data Protection

    • A company must ensure the proper management of debtors' data privacy, including data collection, storage, and transmission.
    • A company that experiences a data breach faces adverse impacts, including loss of business, reputational damage, and legal liability.

    Intellectual Property

    • A patent protects two intellectual property items: processes and products.
    • A company's intellectual property, including trade secrets and confidential information, must be protected from unauthorized access and use.

    Professional Development

    • Technical workers should become members of IT professional organizations to stay updated on industry trends, best practices, and ethics.
    • The Software Engineering Code of Ethics and Professional Practice emphasizes the importance of continuous learning and professional development.

    Corporate Social Responsibility

    • Organizations should pursue corporate social responsibility (CSR) goals to improve their reputation, reduce risks, and increase profitability.
    • A company's CSR goals should align with its business objectives and values.

    Employment and Labor

    • A company's decision to hire H-1B workers may be influenced by cost considerations, but it also faces potential risks, including cultural and language barriers.
    • A company must ensure that its employees are aware of and comply with relevant laws and regulations, including those related to data privacy and security.

    Health Information

    • A healthcare provider must ensure the accuracy and confidentiality of patients' medical information, including electronic health records (EHRs).
    • The Health Insurance Portability and Accountability Act (HIPAA) sets standards for the protection of patients' health information.
    • The rise in computer-related security issues is attributed to the increasing reliance on technology and the growing number of cyberattacks.
    • A company must implement security measures to protect its networks, systems, and data from unauthorized access and malicious activities.

    Ethics in IT

    • IT professionals must consider the ethical implications of their work, including the potential impact on individuals, organizations, and society.
    • The use of technology to harm or exploit others is unethical and may be illegal.

    Cybersecurity

    • A company's cybersecurity strategy should include measures to prevent, detect, and respond to cyberattacks.
    • The implementation of security measures, such as firewalls and encryption, can help prevent cyberattacks.

    Artificial Intelligence

    • The development and use of artificial intelligence (AI) systems raise ethical concerns, including bias and discrimination.
    • AI systems must be designed and trained to ensure fairness, transparency, and accountability.
    • A company's legal and ethical obligations, including those related to data privacy and security, must be taken seriously.
    • The failure to comply with legal and ethical requirements can result in reputational damage, legal liability, and financial losses.

    Miscellaneous

    • A company's organizational structure and leadership play a crucial role in promoting ethical behavior and decision-making.
    • The use of technology to monitor and control employees raises ethical concerns, including privacy and autonomy.
    • The implementation of a code of ethics and conduct can help promote ethical behavior and decision-making within an organization.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This is the practice test for Ethics in Technology (D333) at WGU.

    More Like This

    Use Quizgecko on...
    Browser
    Browser