Information Technology > QUESTIONS & ANSWERS > WGU C961Ethics in Technology: Preassessment Questions and Answers Already Passed (All)

WGU C961Ethics in Technology: Preassessment Questions and Answers Already Passed

Document Content and Description Below

WGU C961Ethics in Technology: Preassessment Questions and Answers Already Passed What is an example of corporate social responsibility (CSR)? A. The CEO of an internet provider takes a large end-of... -year bonus while shareholders lose money on the dwindling stock value. B. A software company outsources its production facility to another location to take advantage of a tax loophole. C. A large technology company dumps old electronic waste in impoverished third-world countries. D. A local IT firm invests in green energy by partnering with a small business to install solar panels in the office. ✔✔D What does the Bathsheba syndrome refer to? A. The National Security agency (NSA) incident B. The WikiLeaks incident C. Moral corruption of the general public D. Ethical failure of people in power ✔✔D. What is defined as a concept by which organizations assimilate social and environmental concerns in their business operations and interactions with their stakeholders? A. CSR B. BSA C. FCC D. GAAP ✔✔A According to Aristotle's virtue ethics, what should be the nature of a person who wants to donate something to an orphanage? A. CourteousB. Tolerant C. Frugal D. Generous ✔✔D What is one outcome leaders should be aware of when making organizational decisions? ✔✔Increasing profits and revenues A person breaks a traffic law in order to get a critically injured man to a hospital. Which decision-making behavior describes this action? A. Ethical and legal B. Unethical and illegal C. Ethical and illegal D. Unethical and legal ✔✔C Why is it important for IT professionals to incorporate good ethical practices? ✔✔So that employees are prepared to handle situations that could lead to misconduct. Why is it important for leaders to understand how technology affects their organization's daily practices? A. To increase the organization's global footprint B. To understand possible legal ramifications C. To increase the workload of the technical department D. To maintain the interest of their employees ✔✔B What is an example of an IT professional demonstrating a commitment to ethics? A. An IT professional's company has an acceptable use policy for employees, She sets up an incognito browser, so she can surf social media sites without the boss knowing. B. An IT professional wants to do a side project for a local business. He checks his employer's company policy handbook first to avoid a conflict of interest.C. An IT professional is trying to get her best friend hires at her office. After the friend is hired, she discloses the relationship to HR. D. An IT professional works for a mobile data provider. He uses his administrative log-on privileges to secretly check a friend's account. ✔✔B What does PAPA stand for? A. Personal, actualism, privacy, and access B. Privacy, accuracy, property, and access C. Political, analysis, personal, and accuracy D. Personal, Actualism, property, and access ✔✔B Many computer-enabled equipment including tablets, smartphones, and vehicles is used to track the location of users. Corporations issue these devices to their employees to help them perform their jobs more efficiently. IT personnel can work remotely to assist customers and clients with various technology issues and projects. Some professionals are also provided a company-owned vehicle with GPS capabilities, which gives the employer 24/7 access to the employee's movements. What describes an employee's legal rights when an employer is using an auto-tracking device to monitor the employee's whereabouts? A. It is a company owned vehicle, and IT workers have no lawful recourse B. The employer must obtain employee consent before installing an auto-tracking device. C. Employees are legally bound to the company and cannot turn off the GPS device D. State law prohibits employees from filing an invasion of privacy lawsuit. ✔✔B Many computer-enabled equipment including tablets, smartphones, and vehicles is used to track the location of users. Corporations issue these devices to their employees to help them perform their jobs more efficiently. IT personnel can work remotely to assist customers and clients with various technology issues and projects. Some professionals are also provided a company-owned vehicle with GPS capabilities, which gives the employer 24/7 access to the employee's movements.An IT worker uses a company-owned vehicle to transport illegal drugs. How does the use of autotracking devices explain the ethical issue in this scenario? A. an employee's right to privacy has been breached B. The company is responsible for the employee's actions C. Only information gathered by police can be used in a court of law D. An employer can use GPS-tracking data as evidence for the investigation. ✔✔D Many computer-enabled equipment including tablets, smartphones, and vehicles is used to track the location of users. Corporations issue these devices to their employees to help them perform their jobs more efficiently. IT personnel can work remotely to assist customers and clients with various technology issues and projects. Some professionals are also provided a company-owned vehicle with GPS capabilities, which gives the employer 24/7 access to the employee's movements. An IT professional traveling for a work assignment decides to take a detour for personal business and due to excessive speed, causes an auto accident. Who is responsible for damages? A. The company owns the vehicle and is, thus, liable for negligence B. Both the IT professional and the business must make reparations. C. IT workers who breach the duty of care are accountable for injuries. D. Determination of liability is the responsibility of the police. ✔✔C Many computer-enabled equipment including tablets, smartphones, and vehicles is used to track the location of users. Corporations issue these devices to their employees to help them perform their jobs more efficiently. IT personnel can work remotely to assist customers and clients with various technology issues and projects. Some professionals are also provided a company-owned vehicle with GPS capabilities, which gives the employer 24/7 access to the employee's movements. Many IT professionals feel their privacy is violated when employers use GPS-tracking devices. What describes the employer's point of view? A. Legal and ethical B. Ethical but illegal C. Unethical and illegalD. Legal but unethical ✔✔A There is a news story about employees of a pharmacy at a local grocery store inadvertently releasing patient information. According to the story, the pharmacy employees printed patient records to review them and later threw them into the grocery store dumpster. Which privacy law was violated by these pharmacy employees? A. FERPA B. HIPPA C. PCI D. GLB ✔✔B There is a news story about employees of a pharmacy at a local grocery store inadvertently releasing patient information. According to the story, the pharmacy employees printed patient records to review them and later threw them into the grocery store dumpster. How may the source of this IT issue be described? A. Lack of internal controls B. Misrepresentation of facts C. Insider threat D. Employee fraud ✔✔A There is a news story about employees of a pharmacy at a local grocery store inadvertently releasing patient information. According to the story, the pharmacy employees printed patient records to review them and later threw them into the grocery store dumpster. What explains this ethical issue? A. Misrepresentation of facts. B. Breach of contract C. conflict of interest D. inappropriate sharing ✔✔DThere is a news story about employees of a pharmacy at a local grocery store inadvertently releasing patient information. According to the story, the pharmacy employees printed patient records to review them and later threw them into the grocery store dumpster. How may the actions of these pharmacy employees be characterized? A. Illegal and unethical B. Legal and ethical C. Legal but unethical D. Illegal but ethical ✔✔A The sandwich generation has increased. This generation compromises people who care for elderly parents and children simultaneously. In efforts to manage time effectively, this generation does the majority of work and communication electronically. What can organizations do to assist the sandwich generation in understanding the importance of protecting personal and financial information? A. Have IT, financial, and medical professionals conduct information sessions for the community monthly B. Have IT, financial, and medical professionals conduct information sessions for the employees monthly C. Have IT, financial, and medical professionals mail information to some of the community members D. Have only IT professionals conduct monthly information sessions for the community ✔✔A A major online pet medical record supplier's information system is attacked, and data are stolen about recent pet deaths. The FBI determines that a mall pet store chain has taken the data and used it to send "buy a puppy" solicitations to the owners of the deceased pets. What is the source of the data threat in the scenario? A. Industrial SpyB. Hacker C. Cybercriminal D. Hacktivist ✔✔A A major online pet medical record supplier's information system is attacked, and data are stolen about recent pet deaths. The FBI determines that a mall pet store chain has taken the data and used it to send "buy a puppy" solicitations to the owners of the deceased pets. What is a description of the threat to the data? A. intended release of sensitive data or the access of sensitive data by unauthorized individuals B. intended release of sensitive data or the access of sensitive data by authorized individuals C. Unintended release of sensitive data or the access of sensitive data by unauthorized individuals D. Unintended release of sensitive data or the access of sensitive data by authorized individuals ✔✔C Jack works in the IT department of a major U.S. bank. The bank has created a mobile application for use by its customers. One of the permissions needed by the application is the location of the bank customer. Jack has decided to share the customer location information with his friend who works for a major hotel chain. The hotel chain will then reach out to the bank customers to offer them a discounted room in the customer's travel area. What is a description of the threat to the customer data? A. intended release of sensitive data or the access of sensitive data by unauthorized individuals B. intended release of sensitive data or the access of sensitive data by authorized individuals C. Unintended release of sensitive data or the access of sensitive data by unauthorized individuals D. Unintended release of sensitive data or the access of sensitive data by authorized individuals ✔✔B Jack works in the IT department of a major U.S. bank. The bank has created a mobile application for use by its customers. One of the permissions needed by the application is the location of the bank customer. Jack has decided to share the customer location information with his friend whoworks for a major hotel chain. The hotel chain will then reach out to the bank customers to offer them a discounted room in the customer's travel area. How should Jack's actions be characterized? A. Illegal but ethical B. Ethical and legal C. Unethical but legal D. Illegal and unethical ✔✔D There are eight cities that impose a sugary drink tax. The purpose of this tax is to provide revenue for the city for additional educational support while reducing consumption of sugary drinks. An algorithmic decision-making process is used to collect data from different sources for a research project. The goal of the research project is to explore behaviors of the people in those cities before and after the tax. What can a novice researcher use to ensure data is accurate? A. Sites that promote information accuracy and objectivity B. Predictive coding to accelerate the review process C. Free data collection software to streamline the process D. Social media as a collection tool ✔✔A There are eight cities that impose a sugary drink tax. The purpose of this tax is to provide revenue for the city for additional educational support while reducing consumption of sugary drinks. An algorithmic decision-making process is used to collect data from different sources for a research project. The goal of the research project is to explore behaviors of the people in those cities before and after the tax. The agency the researcher works for has many resources to mine data. What concerns should this researcher have about these resources? A. Fraudulent results B. Rights and ownership of the dataC. Organizational need for data D. Inexperienced employees to analyze data ✔✔B There are eight cities that impose a sugary drink tax. The purpose of this tax is to provide revenue for the city for additional educational support while reducing consumption of sugary drinks. An algorithmic decision-making process is used to collect data from different sources for a research project. The goal of the research project is to explore behaviors [Show More]

Last updated: 1 year ago

Preview 1 out of 26 pages

Reviews( 0 )

$8.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
88
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 28, 2022

Number of pages

26

Written in

Seller


seller-icon
bundleHub Solution guider

Member since 2 years

307 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 28, 2022

Downloads

 0

Views

 88

Document Keyword Tags

More From bundleHub Solution guider

View all bundleHub Solution guider's documents »

Recommended For You

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·