Issues in Smart Devices Comprehensive Practice Exam
| 2026 Curriculum Update
Exam Instructions: This examination consists of 130 questions designed to assess
your understanding of privacy issues in smart devices, ethical frameworks,
regulatory compliance, and risk mitigation strategies. Select the best possible
answer for each question, then review the rationale provided to deepen your
comprehension.
SECTION 1: FOUNDATIONAL CONCEPTS AND THE INTERNET OF
THINGS (Questions 1-15)
1. What is the most accurate definition of the Internet of Things (IoT)?
A. A global network of computers and servers
B. A network of connected devices that collect and exchange data through
embedded sensors
C. A system of satellite-based communication technologies
D. A protocol for wireless internet connectivity
Answer: B
Rationale: The Internet of Things (IoT) refers to the network of physical objects
("things") embedded with sensors, software, and other technologies that connect
and exchange data with other devices and systems over the internet. This includes
smart home devices, wearables, and connected appliances.
2. Which of the following is NOT typically considered a smart device?
A. A refrigerator with internal cameras and inventory tracking
B. A traditional analog thermostat
C. A voice assistant like Amazon Echo
D. A fitness tracker that monitors heart rate and sleep patterns
Answer: B
Rationale: A traditional analog thermostat lacks the connectivity, sensors, and
data processing capabilities that define smart devices. Smart devices must have the
ability to collect data and communicate with other devices or networks.
,3. Smart devices create privacy risks primarily because they:
A. Are too expensive for most consumers
B. Continuously collect personal data including voice recordings, location, and
behavioral patterns
C. Require monthly subscription services
D. Have short battery life
Answer: B
Rationale: The continuous data collection capability of smart devices—capturing
voice recordings, location data, biometric information, video footage, and usage
habits—creates unprecedented privacy risks that distinguish them from traditional
appliances .
4. What is "sensor fusion" in the context of IoT privacy?
A. The ability to repair damaged sensors
B. The compounding effect of combining data from multiple sensors to create
detailed profiles
C. The process of deleting sensor data
D. A manufacturing technique for smart devices
Answer: B
Rationale: Sensor fusion refers to the combination of data from multiple sensors to
create more comprehensive and detailed information about users than any single
sensor could provide alone. This compounding effect significantly increases
privacy risks.
5. Why is truly de-identifying sensor data nearly impossible?
A. Because sensors are always changing
B. Because the combination of multiple data points can often be re-identified
through correlation
C. Because companies don't want to delete data
D. Because laws prohibit de-identification
Answer: B
Rationale: Research has demonstrated that seemingly anonymous sensor data can
often be re-identified when combined with other datasets. The unique patterns
created by multiple data points—location traces, behavior patterns, and device
identifiers—make true anonymization extremely difficult.
,6. Biometric data collected by smart devices includes:
A. Only fingerprints
B. Biological measurements like heart rate, facial recognition data, and sleep
patterns
C. Credit card information
D. Social security numbers
Answer: B
Rationale: Biometric data encompasses biological measurements and
characteristics, including heart rate, facial recognition patterns, voice prints, sleep
patterns, and fingerprints. Smart devices increasingly collect this sensitive data for
authentication and health tracking.
7. What percentage of users typically change default privacy settings on smart
devices?
A. Over 90%
B. Approximately 75%
C. A small minority
D. Exactly 50%
Answer: C
Rationale: Research consistently shows that a small minority of users change
default privacy settings. This makes default configurations critically important for
privacy protection, as most users will remain with whatever settings come pre-
configured.
8. The "privacy paradox" refers to:
A. The idea that privacy is guaranteed by law
B. The disconnect between users' stated privacy concerns and their actual behavior
C. The elimination of all privacy rights
D. The high cost of privacy protection
Answer: B
Rationale: The privacy paradox describes the phenomenon where individuals
express strong concerns about their privacy yet continue to use devices and
services that collect their data, often without changing settings or reading privacy
policies .
, 9. What makes smart TVs particularly concerning from a privacy
perspective?
A. Their large screens consume too much power
B. They can monitor viewing habits, listen to conversations, and in some cases
participate in proxy networks
C. They are difficult to install
D. They have poor picture quality
Answer: B
Rationale: Smart TVs can track viewing habits, listening patterns through built-in
microphones, and some newer models may even participate in proxy networks that
route internet traffic, creating significant surveillance risks .
10. Which ethical principle emphasizes that individuals have a moral right to
privacy regardless of consequences?
A. Utilitarianism
B. Deontological ethics
C. Virtue ethics
D. Relativism
Answer: B
Rationale: Deontological (duty-based) ethics holds that certain actions are
inherently right or wrong regardless of their consequences. From this perspective,
privacy is a fundamental right, and companies have a moral duty to protect it
regardless of potential benefits.
11. Utilitarianism evaluates ethical decisions based on:
A. Religious principles
B. The character of the decision-maker
C. The balance of total benefits versus total harms
D. Legal compliance only
Answer: C
Rationale: Utilitarianism focuses on consequences, holding that the most ethical
choice is the one that produces the greatest good for the greatest number, or
maximizes overall benefits while minimizing harms .