accurate solutions + detailed rationales
1. Which ethical theory emphasizes that the morality of an action is
determined by its consequences?
a) Deontology
b) Utilitarianism
c) Virtue ethics
d) Relativism
Rationale: Utilitarianism, associated with Bentham and Mill, judges actions by
their outcomes – the greatest good for the greatest number.
2. A software engineer discovers a security flaw that could expose user data.
The company tells her not to fix it because the patch would delay a product
launch. Which ethical principle is most directly violated?
a) Fidelity
b) Non-maleficence (do no harm)
c) Beneficence
d) Justice
Rationale: Non-maleficence requires avoiding harm to others. Deliberately leaving
a known security flaw risks user harm.
3. Under the ACM Code of Ethics, which responsibility is considered most
fundamental for computing professionals?
a) Maximize profits for employers
b) Contribute to society and human well-being
c) Protect proprietary software
d) Avoid all legal risks
Rationale: The ACM Code’s first principle is “Contribute to society and to human
well-being.”
,4. What is the primary purpose of the General Data Protection Regulation
(GDPR)?
a) Regulate artificial intelligence
b) Protect the personal data and privacy of EU citizens
c) Mandate cybersecurity insurance
d) Control cross-border data flows only
Rationale: GDPR (2018) gives individuals control over their personal data and
imposes strict rules on data handlers.
5. Which of the following is an example of a “dark pattern” in user interface
design?
a) A clear “decline cookies” button
b) A pre-checked opt-out box that requires multiple clicks to uncheck
c) A simple privacy policy written in plain language
d) An option to download your data
Rationale: Dark patterns trick users into actions they don’t intend, such as making
it hard to unsubscribe.
6. A company collects customer location data and sells it to third parties
without customer consent. This violates which ethical principle?
a) Respect for autonomy (informed consent)
b) Beneficence
c) Justice
d) Fidelity
Rationale: Respect for autonomy requires that individuals give informed consent
before their data is used or shared.
7. Which US law specifically protects health information privacy?
a) FERPA
b) COPPA
c) HIPAA
d) ECPA
Rationale: HIPAA (Health Insurance Portability and Accountability Act) sets
standards for protected health information.
,8. What does the “right to be forgotten” under GDPR allow individuals to do?
a) Erase their entire online presence instantly
b) Request deletion of their personal data when it is no longer necessary or
lawful to keep
c) Opt out of all targeted advertising
d) Forbid companies from collecting any data
Rationale: Article 17 of GDPR gives individuals the right to erasure under specific
conditions.
9. A developer uses open-source code under the GPL license. Which
requirement must they follow?
a) Keep the code proprietary
b) Release their derivative work under the same GPL license
c) Pay a royalty to the original author
d) Remove all copyright notices
Rationale: GPL (General Public License) is a copyleft license requiring derivative
works to also be GPL-licensed.
10. Which ethical framework would most likely support whistleblowing when
a company endangers public safety?
a) Ethical egoism
b) Deontology (duty-based ethics)
c) Cultural relativism
d) Machiavellianism
Rationale: Deontology emphasizes duties; a duty to protect the public overrides
loyalty to an employer.
11. What is the main ethical concern with algorithmic bias in hiring software?
a) Increased efficiency
b) Perpetuation of discrimination against protected groups
c) Higher computational cost
d) Lack of transparency to candidates
, Rationale: Biased algorithms can systematically exclude qualified individuals
based on race, gender, etc., violating justice.
12. Which of the following is considered a “moral right” associated with
copyright?
a) Right to make unlimited copies
b) Right of attribution (to be named as the author)
c) Right to sell the work to anyone
d) Right to modify any derivative work
Rationale: Moral rights include the right of paternity (attribution) and the right of
integrity (prevent distortion).
13. The “digital divide” refers to:
a) A gap in programming languages
b) Inequitable access to information technology and the internet
c) Differences in software licensing
d) Encryption standards
Rationale: The digital divide separates those with access to digital resources from
those without, often by income, geography, or age.
14. Which of the following is an example of a conflict of interest for an IT
professional?
a) Recommending open-source software to save costs
b) Accepting a gift from a vendor whose product you are evaluating for
purchase
c) Reporting a security bug to the vendor
d) Using a company laptop for work only
Rationale: Accepting gifts can bias professional judgment, undermining objectivity
and trust.
15. What does the term “surveillance capitalism” refer to?
a) Government monitoring of financial transactions
b) The commodification of personal data for profit through prediction and