Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D333 ETHICS IN TECHNOLOGY OBJECTIVE ASSESSMENT EXAM QUESTIONS AND VERIFIED ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
41
Cijfer
A+
Geüpload op
29-04-2026
Geschreven in
2025/2026

This resource for WGU D333 Ethics in Technology Objective Assessment Exam provides a structured collection of Questions and Answers designed to support students in understanding ethical principles in technology. It covers key topics such as data privacy, professional responsibility, cybersecurity ethics, and decision-making in technological environments. Each question includes verified answers to reinforce understanding and improve accuracy. This material is ideal for exam preparation, helping students strengthen critical thinking and ethical reasoning skills. The Questions and Answers format allows learners to identify weak areas, improve performance, and build confidence when preparing for the objective assessment exam.

Meer zien Lees minder
Instelling
Ethics In Technology
Vak
Ethics in Technology

Voorbeeld van de inhoud

WGU D333 Ethics in Technology - WGU
Study online at https://quizlet.com/_cyvv28
1. acceptable use policy (AUP): A document that stipulates restrictions and
prac-tices that a user must agree in order to use organizational computing and
network resources.
2. acceptance: When an organization decides to accept a risk because the cost of
avoiding the risk outweighs the potential loss of the risk. A decision to accept a risk
can be extremely difficult and controversial when dealing with safety-critical
systems because making that determination involves forming personal judgments
about the value of human life, assessing potential liability in case of an accident,
evaluating the potential impact on the surrounding natural environment, and
estimating the system's costs and benefits.
3. advanced persistent threat (APT): A network attack in which an intruder gains
access to a network and stays there—undetected—with the intention of stealing
data over a long period of time (weeks or even months).
4. agile development: A software development methodology in which a system is
developed in iterations lasting from one to four weeks. Unlike the waterfall system
development model, agile development accepts the fact that system requirements
are evolving and cannot be fully understood or defined at the start of the project.
5. Agreement on Trade-Related Aspects of Intellectual Property Rights
(TRIPS): An agreement of the World Trade Organization that requires member
governments to ensure that intellectual property rights can be enforced under their
laws and that penalties for infringement are tough enough to deter further
violations. 6. American Recovery and Reinvestment Act: A wide-ranging act
that authorized $787 billion in spending and tax cuts over a 10-year period and
included strong privacy provisions for electronic health records, such as banning
the sale of health information, promoting the use of audit trails and encryption, and
providing rights of access for patients.
7. annualized loss expectancy (ALE): The estimated loss from a potential risk
event over the course of a year. The following equation is used to calculate the
annual loss expectancy: ARO × SLE = ALE. Where ARO is the annualized rate of
occurrence, an estimate of the probability that this event will occur over the course
of a year and SLE is the single loss expectancy, the estimated loss that would be
incurred if the event happens.
8. annualized rate of occurrence (ARO): An estimate of the probability that a risk
event will occur over the course of a year.
9. anonymous expression: The expression of opinions by people who do not
reveal their identity.

,10. anonymous remailer service: A service that allows anonymity on the Internet
by using a computer program that strips the originating header and/or IP address
from the message and then forwards the message to its intended recipient.


, WGU D333 Ethics in Technology - WGU
Study online at https://quizlet.com/_cyvv28
11. anti-SLAPP laws: Laws designed to reduce frivolous SLAPPs (strategic
lawsuit against public participation (SLAPP), which is a lawsuit filed by
corporations, gov-ernment officials, and others against citizens and community
groups who oppose them on matters of concern).
12. antivirus software: Software that scans for a specific sequence of bytes,
known as a virus signature, that indicates the presence of a specific virus.
13. artificial intelligence systems: The people, procedures, hardware, software,
data, and knowledge needed to develop computer systems and machines that can
simulate human intelligence processes, including learning (the acquisition of
information and rules for using the information), reasoning (using rules to reach
conclusions), and self-correction (using the outcome from one scenario to improve
its performance on future scenarios).
14. audit committee: A group that provides assistance to the board of directors in
fulfilling its responsibilities with respect to the oversight of the quality and integrity
of the organization's accounting and reporting practices and controls, including
finan-cial statements and reports; the organization's compliance with legal and
regulatory requirements; the qualifications, independence, and performance of the
company's independent auditor; and the performance of the company's internal
audit team. 15. avoidance: The elimination of a vulnerability that gives rise to a
particular risk in order to avoid the risk altogether. This is the most effective
solution but often not possible due to organizational requirements and factors
beyond an organization's control.
16. Bathsheba syndrome: The moral corruption of people in power, which is often
facilitated by a tendency for people to look the other way when their leaders act
inappropriately.
17. best practice: A method or technique that has consistently shown results su-
perior to those achieved with other means and that is used as a benchmark within
a particular industry.
18. Bill of Rights: The first 10 amendments to the United States Constitution that
spell out additional rights of individuals.
19. black-box testing: A type of dynamic testing that involves viewing the
software unit as a device that has expected input and output behaviors but whose
internal workings are unknown (a black box).
20. blended threat: A sophisticated threat that combines the features of a virus,
worm, Trojan horse, and other malicious code into a single payload.
21. body of knowledge: An agreed-upon sets of skills and abilities that all
licensed professionals must possess.

, 22. botnet: A large group of computers, which are controlled from one or more
remote locations by hackers, without the knowledge or consent of their owners.

Geschreven voor

Instelling
Ethics in Technology
Vak
Ethics in Technology

Documentinformatie

Geüpload op
29 april 2026
Aantal pagina's
41
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$17.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
TestBankCentral

Maak kennis met de verkoper

Seller avatar
TestBankCentral Rasmussen College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1
Lid sinds
2 maanden
Aantal volgers
0
Documenten
105
Laatst verkocht
3 weken geleden
Your most trusted seller!

⭐ Loved the document? Please don’t forget to leave a review after your download — your feedback helps me grow and keeps more quality materials coming your way! ⭐ Feel free to reach out if you need any specific materials or wish to raise an issue—I’m always here to help. Thank you in advance for your support and trust!

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen