Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

D333 Pre-assessment Ethic in Technology 2025 EDITION AID GRADE A+

Beoordeling
-
Verkocht
-
Pagina's
19
Cijfer
A+
Geüpload op
27-01-2025
Geschreven in
2024/2025

D333 Pre-assessment Ethic in Technology 2025 EDITION AID GRADE A+ Two programmers disagree about which philosophical theory is best suited for their autonomous vehicles. One programmer suggests their vehicle should always choose the greatest good for the greatest number of people. Which philosophical theory encapsulates this stance? Utilitarianism What is the difference between ethics and morals? Ethics reflect a societal code of behavior, whereas morals reflect personal principles. An IT company holds itself accountable for how its actions affect its shareholders, consumers, employees, community, the environment, and suppliers. 3 Corporate social responsibility A homeowners' association (HOA) installs license plate readers after an increase in reported crime in the neighborhood. Two domestic workers petition the HOA, requesting that their data be deleted to protect their privacy. The HOA considers this but denies their request, citing the greater need for security protection for residents. Which ethical theory does this represent? Consequentialism A developer creates video games based on real war scenarios and designs characters that mimic real people from world events. The video game has content perceived as excessively violent and rewards players who inflict the most harm on other players' virtual characters. The developer knows that these are simulated acts that depict real war scenarios to create an immersive experience for players but is concerned about the impact on their moral character. Which ethical theory does this situation represent? Virtue A project team at an animal welfare agency is using predictive analytics to help take animals out of abusive environments. The algorithm the team designed has a false positive rate that is higher than zero, which means that some animals could be removed erroneously if the algorithm's recommendations are followed. The project owner understands that pets may wrongfully be removed from loving healthy homes but decides to use the algorithm anyway because it will happen only a small percentage of the time. Which ethical theory does this represent? Consequentialism A software sales company is currently struggling with low sales. The company is aware that one of its competitor's senior sales managers is dissatisfied with the competitor due to having been overlooked for a promotion to the position of a vice president (VP). The company approaches the sales manager and offers them a position as VP for sales on the condition of bringing the manager's existing customer list and contacts to the new role. The sales manager is bound by a noncompete clause. Which type of decision-making process did the company follow? Unethical and illegal A municipality decides to use the data it has on household water usage to build an algorithm that can identify welfare fraud. This would result in a list of potential fraudsters that could be used to make welfare decisions. Although the municipality is the rightful owner and processor of the data, citizens have raised privacy issues with the application. The citizens object that they have no way of knowing whether they are on the list and have no possibility of redress if they are. Which decision-making process did the municipality follow? Legal but unethical The marketing department of a financial services institution asks data scientists to build a consumer profile based on transaction data. Although company lawyers approve the request to explicitly signal customers with potential gambling addiction problems, the data scientists refuse to build the profiles. What describes this request? Unethical and legal Which ethical concept is related to the right to use a person's or an organization's intangible creative activities? Property An IT company that specializes in software development has an organizational structure that consists of a chief executive officer, chief ethics officer, chief finance officer, and chief operating officer. Which of these executives provides the company with vision and leadership in business conduct? Chief ethics officer What is a reason for organizations to pursue corporate social responsibility (CSR) goals? Gain goodwill A police department employee has access to data related to an ongoing investigation. A local politician whom the employee supports has come under investigation. The employee accesses the data relating to the investigation and provides the file to the politician anonymously. How should this behavior be classified? Corruption An IT manager implements security measures at the organization, network, application, and employee levels. Which approach to security is the manager using? Layered A new startup tech company plans to provide secure wireless access within its office for employees and other trusted visitors. The company has concerns about competitors eavesdropping or compromising the connections and obtaining unauthorized access to the company's intellectual property. The company is considering using Wireless Protected Access 2 (WPA2) to secure data in transit. Which protocol does this wireless protection implement? Advanced Encryption Standard (AES) A Federal Bureau of Investigation (FBI) agent monitors a telephone conversation between a 12-year-old child and the child's stepfather. The monitoring is part of a criminal investigation. A warrant was not obtained prior to commencement of the monitoring. Which law or regulation did the agent violate? Wiretap Act A U.S. company launched an e-commerce platform in the European Union (EU). The board of directors raised concerns about compliance with applicable privacy regulations and the collection of customer information. Which regulation applies to this scenario? General Data Protection Regulation A social media website collected personal information about consumers when they subscribed to the service. Subscribers opted in or out before creating their online profiles. Which European Union Data Protection Directive did the website follow? Choice A company is engaged as a third party to perform debt collection on behalf of a telecommunications provider. The company operates an outbound call center to contact debtors and set up payment arrangements. The company needs to ensure that the debtors' data privacy is not at risk. Which two areas should the company ensure are properly managed? Insider access/Network security A company is using software to track workforce operational activity. Management communicates that the data collected will be treated as sensitive. Administrative and technical security measures are put in place to protect employee data. These measures include periodically culling records that are no longer relevant. Which additional measure should be taken to safeguard employee data from misuse? Limit who can view employee data A retail company experiences a data breach. Customer data is stolen, including credit card numbers, names, addresses, and account passwords. The attackers have amassed enough combinations of personally identifiable information (PII) to commit identity theft. Which adverse impacts, in addition to the loss of business, does the company face? Reputational damage and the need to provide support for victims An attending physician at a local hospital receives an email with a link that appears to be from a neighboring clinic. When the physician clicks the link, computers throughout the hospital freeze, and patient information can no longer be accessed. A message appears demanding payment of five bitcoins within 48 hours to decrypt the hospital database and threatening that without payment, all information will be deleted. Which type of exploit is this? Ransomware What is the cause of the rise in computer-related security issues, particularly among small- and medium-sized businesses? Bring your own device policies A company is notified of a breach of its systems. An investigation reveals that although no financial information was taken, the customer records for all its customers, including names, email addresses, and passwords, may have been taken. Although it is uncertain whether the records were taken, evidence suggests that the intruders accessed the database containing the information. The investigation team indicates that, given six weeks, they will be able to identify what, if anything, has been taken. Which action should the company take? Notify all customers that there may have been a data breach A government contractor is rebuilding a telecommunications network. One of the contractor's employees discovers that the company is participating in illegal and unethical acts to defraud the government. The employee considers filing a lawsuit against the company on behalf of the government. Which law protects the employee if the lawsuit is filed? False Claims Act An organization enters customer information in different formats, styles, and varieties into a database. Two customers placed an order on January 12, 2022, but one customer's purchase date is entered as 01/12/22, whereas the other's is entered as 12/01/22. Which aspect of data could be negatively impacted by the format issue? Accuracy An organization is evaluating potential harm to its networks to ensure data is stored accurately and securely from both internal and external threats. What is the process the organization is following? Risk assessment A store manager of a home service company hires a data entry clerk to process customer returns. The data entry clerk is trained to enter data in the system for every customer record. An internal audit shows typographical mistakes in customers' records for the last two weeks. Which data aspect does the home service company need to address to reduce errors? Accuracy A patient visited a primary care doctor for headaches and was referred to a specialist clinic that deals with neuroimaging. After visiting the specialist, the patient receives results that do not seem to match their symptoms. After calling the clinic, the patient discovers that their electronic health records (EHRs) from the primary care provider were mismatched with another patient’s records when the patient visited the specialist. What is the cause of the mismatch? The lack of a nationwide unique patient identifier impedes error-free matching of an individual's files. Which legislation protects social networking companies from defamation lawsuits in connection with user postings that appear on the companies' sites? Communications Decency Act (CDA) The United Nations Security Council (UNSC) is briefed on a cyberattack in which hackers were able to breach system integrity, gain access to sensitive data, and manipulate the data without being noticed. What should the UNSC use to be alerted to these threats in the future? Intrusion Detection System (IDS) Individuals need to be given an opportunity to correct inaccurate information held about them in databases. Which societal impact drives this capability? Companies make decisions based on accurate data A patient received treatment at an urgent care facility. Prior to being seen, the patient completed the required Health Insurance Portability and Accountability Act (HIPAA) forms. The doctor recorded all relevant treatment data in the urgent care facility's electronic medical record (EMR) system. Which entity is responsible for ensuring the accuracy of the patient's medical information stored in the EMR? The urgent care facility A computer science student downloads a pirated copy of a movie and shares it with friends. What has the student infringed upon? Copyright Which two intellectual property items are protected by a patent? Inventions/Tools An international organization based in a foreign country invites a U.S. ambassador to help promote its communications business. In exchange for the promotion, the president of the organization offers the ambassador a family trip package for 15 days as a thank-you gesture, with a bonus check of an undisclosed amount. Which law did the organization potentially violate? Foreign Corrupt Practices Act A company provides machine learning software that helps judges make decisions in parole hearings by assigning each person up for parole a score estimating the probability that they will commit another crime if paroled. The model was trained on the profiles of incarcerated people and information on whether they were sent back to prison after release. Race was not a variable that was included in the training data. However, it was uncovered that the model gave higher probabilities to members of certain races. It was found that a proxy variable was inadvertently included. Which data point in the incarcerated peoples' profiles was likely the variable understood by the machine learning models as a proxy for race? Zip code A local community opposes the building of a new factory in its neighborhood and has organized on social media to run a posting campaign to shut down construction. To silence community members, the building corporation decides to go to court to intimidate them. Which threat is the corporation implementing? Strategic lawsuits against public participation (SLAPP) An organization wants to take steps against an anonymous person who posts inaccurate negative reviews about the organization on its website. Which tactic can the organization employ? File a John Doe lawsuit A healthcare company decides to adopt an artificial intelligence (AI) solution to help identify which doctors and drugs will provide the greatest value to patients. The data team is feeding four years of data into the system, including pharmacy and insurance claims. Based on this data, the AI will make recommendations based on which doctors and drugs should result in the best healthcare outcomes for patients. A data scientist is concerned about the disparate data sources and the fact that all information about a patient's medical history and ongoing treatment will be easily accessible. What should the data scientist provide to the AI to ensure a comprehensive data set? Electronic health record (EHR) A hospital wants to improve patient outcomes while reducing the amount of time it takes to send and receive a patient's treatment records to and from a neighboring hospital. The hospital engages a technology organization to create an electronic bridge to better facilitate faster data transfer while minimizing the threat of external parties compromising the data. Which type of technology solution does the hospital implement? Health information exchange A social media user discovers that a former romantic partner posted humiliating photos of the two together without obtaining the social media user's permission. The social media user suffers severe emotional distress as a result. Cyberharassment A newly founded IT startup has ambitious goals for the upcoming year and decides to rapidly onboard many contingent workers. What are two potential disadvantages of hiring contingent workers from the startup's perspective? Choose 2 answers. Employees feeling disconnected from the company/Ethical dilemmas from employment with no benefits A new tech startup in the U.S. is considering hiring a large group of workers to complete a new project. It has considered the pros and cons of hiring temporary foreign workers versus training full-time employees for this project. To lower costs, the company decides to hire H-1B workers. What is a potential risk the new company faces by hiring these H1-B workers? Lack of employee loyalty An employee of a large tech company notices that the company is not taking the proper steps to protect consumer information. The employee has raised concerns to management multiple times but has been ignored. The employee finds that the company is harming the CONTINUED..

Meer zien Lees minder
Instelling
D333 Pre-assessment Ethic In Technology
Vak
D333 Pre-assessment Ethic in Technology










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
D333 Pre-assessment Ethic in Technology
Vak
D333 Pre-assessment Ethic in Technology

Documentinformatie

Geüpload op
27 januari 2025
Aantal pagina's
19
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Allan100 Rasmussen College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
648
Lid sinds
5 jaar
Aantal volgers
605
Documenten
3226
Laatst verkocht
2 dagen geleden

3.5

92 beoordelingen

5
36
4
17
3
15
2
5
1
19

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen