Technology (GWO1) (PGWO) With complete solu on
Newest RAATED A+ 2025/2026
A student makes two copies of a so ware package that was just purchased and sells one to a
friend. How should this student's ac ons be described? - CORRECT ANSWERS Unethical and
illegal
What describes an employee's legal rights when an employer is using an auto-tracking device
to monitor the employee's whereabouts? - CORRECT ANSWERS The employer must obtain
employee consent before installing an auto-tracking device.
Many IT professionals feel their privacy is violated when employers use GPS-tracking devices.
What describes the employer's point of view? - CORRECT ANSWERS Legal and Ethical
The implementa on deadline for a highly visible IT project that will improve global client
services is going to be missed due to a data integrity issue. An IT team member from an
interna onal country is confident that he has the solu on code, but he does not have the
resources to the test code. The project leader is receiving a lot of pressure to complete the
project.
What should this project leader do? - CORRECT ANSWERS Accept the code, test it, and
implement the project late
How should Charlo1e's ac ons be characterized? - CORRECT ANSWERS illegal and unethical
How should Jim's ac ons be characterized? - CORRECT ANSWERS Illegal and unethical
How should the president's ac ons be addressed? - CORRECT ANSWERS Report to the
compliance officer
, Which regula on is relevant to this video game company's ac ons with the children users? -
CORRECT ANSWERS Children's Online Privacy Protec on Act (COPPA)
Which ac on should the programmer take to handle this situa on? - CORRECT ANSWERS
Contact and inform the FBI and the social media site of the company's ac vi es
A cell phone company is conduc ng a survey to learn more about the demographic and
preferences of its current customers. The IT professionals at the company design the survey to
be accessible through the customer's mobile phone. Customers can return to the survey data
mul ple mes to update or revise their responses un l the survey closes. To access the
previously entered data, the customer must enter a one- me log-in code provided by the cell
phone company, as well as answer individualized security ques ons on a secure mobile server.
What is this method of conduc ng a survey an example of? - CORRECT ANSWERS A mul stage
process to prevent unauthorized access to sensi ve data
To spy on his girlfriend, a man uses her social security number and her mother's maiden name
to reset the online password for her cell phone account. He is then able to enter the account to
review her text messages and phone records from the past month of usage.
What is this ac on an example of? - CORRECT ANSWERS misrepresenta on
Data collec on methods and processes con nue to emerge into more industries, fields, and
agencies. Meanwhile, the regula ons governing the use and sharing of this data con nue to
evolve. However, data collec on is s ll somewhat new, and there is a tangible gap in the
legisla on of ethical codes and guidelines to establish clear principles of collec on and use.
What may providing unrestricted access to consumers' data without protec ng each individual's
privacy or iden ty be considered? - CORRECT ANSWERS Unethical and risky