100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D333 ETHICS IN TECHNOLOGY – INTENSIVE NCLEX-STYLE QUESTIONS WITH RATIONALES (QUESTIONS 1–332)

Puntuación
-
Vendido
-
Páginas
64
Subido en
10-01-2026
Escrito en
2025/2026

WGU D333 ETHICS IN TECHNOLOGY – INTENSIVE NCLEX-STYLE QUESTIONS WITH RATIONALES (QUESTIONS 1–332)

Institución
WGU D333
Grado
WGU D333











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D333
Grado
WGU D333

Información del documento

Subido en
10 de enero de 2026
Número de páginas
64
Escrito en
2025/2026
Tipo
Examen
Contiene
Desconocido

Temas

Vista previa del contenido

ESTUDYR




WGU D333 ETHICS IN TECHNOLOGY – INTENSIVE
NCLEX-STYLE QUESTIONS WITH RATIONALES
(QUESTIONS 1–332)

1. What is an Acceptable Use Policy (AUP)?

A. A document that defines hardware specifications for employees
B. A set of rules for ethical behavior in the workplace
C. A document that stipulates restrictions and practices that a user must agree to in order
to use organizational computing and network resources
D. A privacy policy for customer data

Rationale: An AUP defines what users can and cannot do when accessing company computing
resources. It helps protect both the organization and its users from misuse of technology.



2. What does it mean when an organization accepts a risk?

A. The organization eliminates the risk completely
B. The organization decides to accept a risk because the cost of avoiding it outweighs the
potential loss
C. The organization transfers the risk to another party
D. The organization ignores the risk

Rationale: Risk acceptance occurs when avoiding a risk is costlier than the potential loss, often
requiring judgment calls in high-stakes systems.



3. What is an Advanced Persistent Threat (APT)?

A. A malware program that deletes files randomly
B. A phishing scam targeting multiple users
C. A network attack in which an intruder gains access and remains undetected to steal data
over a long period
D. A temporary virus that infects a computer for a few hours

Rationale: APTs are long-term, stealthy cyberattacks aimed at stealing data over weeks or
months.

,ESTUDYR




4. Agile development is characterized by:

A. A rigid step-by-step software development process
B. Documentation-heavy software design
C. Iterative development cycles of 1–4 weeks allowing evolving requirements
D. Full specification of system requirements before coding

Rationale: Agile development embraces changing requirements and develops software
incrementally, unlike the waterfall model.



5. What does the Agreement on Trade-Related Aspects of Intellectual Property Rights
(TRIPS) enforce?

A. Free access to all intellectual property for developing countries
B. Enforcement of intellectual property rights with penalties for infringement
C. Limitations on patents for pharmaceuticals only
D. Trade agreements for agricultural products

Rationale: TRIPS ensures global enforcement of IP rights and deterrence against violations.



6. Which of the following is true about the American Recovery and Reinvestment Act
(ARRA)?

A. It primarily focused on environmental issues
B. It eliminated privacy protections for electronic health records
C. It provided $787 billion in spending with strong privacy provisions for health records
D. It was a military defense act

Rationale: ARRA included privacy protections, such as banning the sale of health info and
promoting encryption.



7. What does Annualized Loss Expectancy (ALE) calculate?

A. Total assets of a company
B. Cost of insurance premiums
C. Estimated loss from a potential risk event over a year (ALE = ARO × SLE)
D. Annual profits lost to taxes

,ESTUDYR


Rationale: ALE measures the expected yearly loss from a risk, factoring in probability (ARO)
and single loss value (SLE).



8. What is the Annualized Rate of Occurrence (ARO)?

A. The total revenue of a company in one year
B. The probability that a risk event will occur over the course of a year
C. The financial impact of a risk if it occurs
D. The legal liability associated with a risk

Rationale: ARO is a measure of risk frequency used in calculating ALE.



9. What defines anonymous expression?

A. Expressing opinions publicly under your real name
B. Sending emails through company servers only
C. Expression of opinions by people who do not reveal their identity
D. Posting on social media with a verified account

Rationale: Anonymity protects identity while allowing the expression of ideas or opinions.



10. An anonymous remailer service allows:

A. Tracking email origins for legal purposes
B. Securing email with encryption
C. Sending emails without revealing the sender's header or IP address
D. Automatic spam filtering

Rationale: Anonymous remailers strip identifying info to protect the sender’s identity online.



11. Anti-SLAPP laws are designed to:

A. Promote lawsuits against whistleblowers
B. Reduce frivolous lawsuits filed to intimidate public participation
C. Eliminate freedom of speech online
D. Protect corporate intellectual property

Rationale: Anti-SLAPP laws prevent entities from using legal action to silence critics.

, ESTUDYR




12. What is the main function of antivirus software?

A. Encrypts network traffic
B. Protects against phishing emails only
C. Scans for virus signatures to detect specific malware
D. Monitors employee computer usage

Rationale: Antivirus programs identify known malware by scanning for unique sequences (virus
signatures).



13. Artificial Intelligence (AI) systems include:

A. Only software that plays games
B. Only robots in factories
C. People, procedures, hardware, software, data, and knowledge to simulate human
intelligence
D. Only cloud-based machine learning models

Rationale: AI systems encompass all components needed to simulate learning, reasoning, and
self-correction.



14. An audit committee is responsible for:

A. Managing all IT operations
B. Creating marketing campaigns
C. Oversight of accounting, reporting practices, compliance, and internal/external audits
D. Writing company policies

Rationale: Audit committees ensure the integrity of financial reporting and compliance with
laws.



15. Avoidance in risk management means:

A. Transferring the risk to another organization
B. Ignoring the risk
C. Eliminating the vulnerability causing the risk altogether
D. Accepting the consequences of the risk
$17.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Estudyr Kaplan University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1159
Miembro desde
3 año
Número de seguidores
829
Documentos
10960
Última venta
3 días hace
ESTUDY

Get best related and owned assignment help online, this is your youngest Proffesor around.Be Smart! , I will be sharing all materials, Nclex, study guides, tests, Question ,Answers and Rationales , test banks, Hesi questions, etc. on my page for , All are based on my experiences with Nursing school.| Feel free to message me with any questions, happy to help!

3.9

209 reseñas

5
103
4
43
3
27
2
12
1
24

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes