1
WGU - Ethics in Technology Questions and
Answers (100% Correct Answers) Already
Graded A+
A student makes two copies of a software package that was just
purchased and sells one to a friend. How should this student's actions be
described? Ans: Unethical and illegal
© 2026 Assignment Expert
What describes an employee's legal rights when an employer is using an
auto-tracking device to monitor the employee's whereabouts? Ans: The
employer must obtain employee consent before installing an auto-
tracking device.
Guru01 - Stuvia
Many IT professionals feel their privacy is violated when employers use
GPS-tracking devices. What describes the employer's point of view? Ans:
Legal and Ethical
The implementation deadline for a highly visible IT project that will
improve global client services is going to be missed due to a data
integrity issue. An IT team member from an international country is
confident that he has the solution code, but he does not have the
resources to the test code. The project leader is receiving a lot of
pressure to complete the project.
What should this project leader do? Ans: Accept the code, test it, and
implement the project late
How should Charlotte's actions be characterized? Ans: illegal and
unethical
, For Expert help and assignment handling,
2
How should Jim's actions be characterized? Ans: Illegal and unethical
How should the president's actions be addressed? Ans: Report to the
compliance officer
Which regulation is relevant to this video game company's actions with
the children users? Ans: Children's Online Privacy Protection Act
(COPPA)
© 2026 Assignment Expert
Which action should the programmer take to handle this situation? Ans:
Contact and inform the FBI and the social media site of the company's
activities
Guru01 - Stuvia
A cell phone company is conducting a survey to learn more about the
demographic and preferences of its current customers. The IT
professionals at the company design the survey to be accessible through
the customer's mobile phone. Customers can return to the survey data
multiple times to update or revise their responses until the survey closes.
To access the previously entered data, the customer must enter a one-
time log-in code provided by the cell phone company, as well as
answer individualized security questions on a secure mobile server.
What is this method of conducting a survey an example of? Ans: A
multistage process to prevent unauthorized access to sensitive data
To spy on his girlfriend, a man uses her social security number and her
mother's maiden name to reset the online password for her cell phone
account. He is then able to enter the account to review her text
messages and phone records from the past month of usage.
What is this action an example of? Ans: misrepresentation