X X X X X X X
AM 2024 WITH ACTUAL CORRECT QUESTIONS AND VERIFIEDDET
X X X X X X X X
AILED ANSWERS BY EXPERTS |FREQUENTLY TESTED
X X X X X
QUESTIONS AND SOLUTIONS |ALREADY GRADED A+ |NEWEST X X X X X X
|GUARANTEED PASS |LATEST UPDATE X X X
10. Which ethical concept is related to the right to use a
X X X X X X X X X X X X Property
person's or an organization's intangible creativeac
X X X X X X
tivities?
11. An IT company that specializes in software develop-
X X X X X X X X
XChief ethics officer ment has an organizational structure that consists of a chie
X X X X X X X X X X X X
f executive officer, chief ethics officer, chief finance officer, and chief operati
X X X X X X X X X X X
ng officer.
X
Which of these executives provides the company withvi
X X X X X X X X
sion and leadership in business conduct?
X X X X X
12. What is a reason for organizations to pursue corpo-
X X X X X X X X X Gain goodwill X
rate social responsibility (CSR) goals?
X X X X X
13. A police department employee has access to data Corruption rela
X X X X X X X X X
ted to an ongoing investigation. A local politician whom theempl
X X X X X X X X X X
oyee supports has come under inves-
X X X X X
tigation. The employee accesses the data relating to the investi
X X X X X X X X X X
gation and provides the file to the politician anonymously.
X X X X X X X X
How should this behavior be classified?
X X X X X
14. An IT manager implements security measures at the Layered
X X X X X X X X
organization, network, application, and employee lev- els. X X X X X X
Which approach to security is the manager using?
X X X X X X X
15. A new startup tech company plans to provide secure Advanced E
X X X X X X X X X X
n-
wireless access within its office for employees and cryption Stan
X X X X X X X X X X
dard other trusted visitors. The company has concerns(AES) ab
X X X X X X X X X
1X/X42
,out competitors eavesdropping or compromising the
X X X X X
2X/X42
, WGU D333 ETHICS IN TECHNOLOGY OA EXAM 2024 VERSION 165 QU
X X X X X X X X X X
ESTIONS WITH DETAILED VERIFIED ANSWERS /A+ GRADE ASSURED
X X X X X X X
connections and obtaining unauthorized access to thecompany'
X X X X X X X
s intellectual property. The companis considering using Wireles
X X X X X X X
s Protected Access 2 y
X X X X
(WPA2) to secure data in transit.
X X X X X
Which protocol X X
does this wireless protection imple- ment?
X X X X X
1. Two programmers disagree about which philosophi- Utilitarianism
X X X X X
cal theory is best suited for their autonomous vehi-
X X X X X X X X X
cles. One programmer suggests their vehicle should
X X X X X X X X
always choose the greatest good for the greatest nu
X X X X X X X X
mber of people. X X
Which philosophical theory encapsulates this
X X X X X
stance?
2. What is the difference between ethics and morals?
X X X X X X X Ethics reflect
asocietal X
code
ofbehavi X
or, whereas
X
moralsref X
lect per- sonal
X XX
principles.
3. An IT company holds itself accountable for how its a Corporate social
X X X X X X X X X X X
ctions affect its shareholders, consumers, employ-
X X X
responsibility X X
ees, community, the environment, and suppliers.
X X X X X X
What is this company demonstrating?
X X X X
3X/X42
, WGU D333 ETHICS IN TECHNOLOGY OA EXAM 2024 VERSION 165 QU
X X X X X X X X X X
ESTIONS WITH DETAILED VERIFIED ANSWERS /A+ GRADE ASSURED
X X X X X X X
4. A homeowners' association (HOA) installs license
X Consequentialism X X X X XXXXXXXX
plate readers after an increase in reported crime in th
X X X X X X X X X
e neighborhood. Two domestic workers petition the
X X X X X X X
HOA, requesting that their data be deleted to protect t
X X X X X X X X X
heir privacy. The HOA considers this but denies their
X X X X X X X X
request, citing the greater need for security protec-
X X X X X X X
Xtion for residents.X X
Which ethical theory does this represent?
X X X X X
5. A developer creates video games based on real war Virtue scenarios a
X X X X X X X X X X X
nd designs characters that mimic real people from world events. Thevi
X X X X X X X X X X X
deo game has con-
X X X
tent perceived as excessively violent and rewards players who inflict t
X X X X X X X X X X X
he most harm on other players' virtual characters. The developer kno
X X X X X X X X X X
ws that these are simulated acts that depict real war scenarios to creat
X X X X X X X X X X X X
e an immersive experience forplayers but is
X X X X X X X
concerned about the impact on their moral character. X X X X X X X
Which ethical theory does this situation represent?
X X X X X X
6. A project team at an animal welfare agency is us-
X X X X X X X X X
Consequentialism ingpredictive analytics to help take animals out of ab
X X X X X X X X X X X
usive environments. The algorithm the team de-
X X X X X X
Xsigned has a false positiverate that is higher thanzero, which means th
X X X X X X X X X X X X
at some animals could bere-
X X X X X
Xmoved erroneously if the algorithm's recommenda-
X X X X X
Xtions are followed. The project owner understands that pets may wrongf
X X X X X X X X X X
ully be removed from loving healthy homes but decides to use the algo
X X X X X X X X X X X X
rithmany- X
Xway because it will happen only a small percentage of the time.
X X X X X X X X X X X
Which ethical theory does this represent?
X X X X X
4X/X42