EXAM
QUESTIONS AND CORRECT VERIFIED
ANSWERS
Design Thinking Process - ✔✔✔ Correct Answer > Five stages:
Empathize (Research user's needs), Define (state users needs and
problems, Ideate (challenge assumptions and create ideas), prototype
(create solutions) and Test (try out solution).
Value-Sensitive Design - ✔✔✔ Correct Answer > Design approach
that accounts for ethical values, such as privacy, in addition to
usability-oriented design goals. Here are the steps for Valuesensitive
design: 1) Clarify project values, 2) Identify the direct and Indirect
stakeholders, 3) Identify the benefits and hams for stakeholders, 4)
Identify and elicit potential values 5) Develop working definistions of
key values, 6) Identify potential value tensions and 7) Value-oriented
design and development.
Page 1 of 50
,Privacy Notices - ✔✔✔ Correct Answer > External documents that
informs users of an organizations practices, values and commitments
concerning their personal data.
Privacy Policies - ✔✔✔ Correct Answer > Internal documents that
inform employees on how to protect consumer data.
Security Policies - ✔✔✔ Correct Answer > Document that spells out
the rules, expectations and overall approach to how an organization
will maintain contidentiality, integrity and availability of its data. This
will include Data Classification (granting and revoking access to
assets and information based on their classification), Data Schema
(Contraints on data to seperate customer data), Data Retention
(Policies that align with laws and regulation concerning storage) and
Data Deletion (Disposal of data and methods for removal and
recovery).
Defect - ✔✔✔ Correct Answer > A flaw in the requirement, design or
implementation that can lead to a fault.
Fault - ✔✔✔ Correct Answer > An incorrect step, process or data
definition in a computer program.
Page 2 of 50
,Error - ✔✔✔ Correct Answer > The difference between a computed,
observed or measured value or condition and the true, specified or
theoretically correct value or condition.
Failure - ✔✔✔ Correct Answer > Inability of system or component to
perform it required funstions within specified performance
requrements.
Harm - ✔✔✔ Correct Answer > The actual ill effect to an individual's
personal privacy.
Information Collection - ✔✔✔ Correct Answer > A category of
Solove's Taxanomy and involves risk associated with data collection;
more specifically it concerns surveillance (data captured through
observation or a user's activities) and interrogation (Actively
questioning an individual probing for information).
Information Processing - ✔✔✔ Correct Answer > A category of
Solove's Taxanomy and involves aggregation (bringing sensitive data
together), Identification (information linked to specific individuals),
Insecurity (failure to protect individuals information), Secondary use
Page 3 of 50
, (using individual's information without consent) and Exclusion
(failure to allow the individual to participate or have knowledge of
what is done with their information).
Information Dissemination - ✔✔✔ Correct Answer > A category of
Solve's Taxanomy that involves breach of confidentiality, Disclosure
(release of truthful information about individual that may negatively
affect how others view them), Distortion (spreading of false and
inaccurate information), Exposure (revealing private information),
accessibility (making an individuals information to easy to obtain),
blackmail (using a persons information against their will) and
appropiation (using someone elses personal information).
Active collection - ✔✔✔ Correct Answer > Data directly from
subject
Passive collection - ✔✔✔ Correct Answer > Data without the
participant Knowing
First Party - ✔✔✔ Correct Answer > Providing information directly
to collector
Page 4 of 50