Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Ethics-In-Technology - WGU Ethics In Technology QCO1

Page: 1 / 2
Total 66 questions

A company builds a new artificial intelligence (Al) system that helps address drug and alcohol use disorders by developing an individualized plan to support people with one of these disorders. The system developers load nationwide information from the last 20 years to provide a baseline for the Al to analyze. Upon activating the system, the company receives complaints about bias against minorities with a drug or alcohol use disorder.

What introduced bias into the system?

A.

Size disparity

B.

Skewed sample

C.

Proxy data

D.

Limited features

A large telecommunications company pledged to adopt green computing in everything it does. The telecommunications company hired a consulting firm to help it evaluate, compare, and select supplies based on standard eco-friendly criteria.

What should the consulting firm use to help achieve this goal?

A.

Electronic Product Environmental Assessment Tool (EPEAT).

B.

Environmental impact assessment (EIA).

C.

Professional employer organization (PEO)

D.

Restriction of Hazardous Substances Directive (RoHS)

What are two outcomes of adherence to a professional code of ethics for individuals, their profession, and society as a whole? Choose 2 answers.

A.

Standardized business practices

B.

Consistent decision-making

C.

Assured employer integrity

D.

Faster career advancement

An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.

Which security practice has been violated?

A.

Availability

B.

Accessibility

C.

Integrity

D.

Confidentiality

A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.

Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?

A.

Minimizing scope creep requests from the customer

B.

Improving decision-making around agreeing to additional scopes

C.

Avoiding the delivery of an incompatible solution

D.

Understanding the legal implications of noncontractual agreements

A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?

A.

Anonymous expression

B.

Doxing

C.

Hate speech

D.

Libel

A team of game designers must decide if players whose game characters commit violent and unlawful acts should be rewarded. The team agrees that the acts are simul-ations, and the game will be rated for adult or mature audiences. One designer raises questions about how contributing to this work will reflect upon the team's moral character.

Which ethical theory does this represent?

A.

Deontology

B.

Virtue

C.

Consequentialism

D.

Relativism

An auto manufacturer is developing a new line of autonomous vehicles. Multiple accidents, including fatalities, involving competitors' autonomous vehicles have already occurred. Management is concerned about potential liability, reputational damage, and financial loss. In response, the system safety engineer conducts a review at each stage of the software development process to record, assess, and account for detected issues.

Which type of log is the system safety engineer using?

A.

Risk

B.

Change

C.

Hazard

D.

Defect

A group of hackers manipulated data to disable the national energy infrastructure for its political goals. Which type of attack did the group employ?

A.

Advanced persistent threat

B.

Cyberterrorism

C.

Cyberespionage

D.

Trojan horse

An IT company adopts a professional cod© of ethics suggested by a nationally recognized IT professionals organization. Which benefit to the company can be directly derived from adopting a professional code of ethics?

A.

Guidelines for principled decision-making

B.

An evaluation benchmark

C.

Increased yearly revenue

D.

Decreased company expenditure