100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Ethics in Technology Exam Prep. || All Questions & Answers 100% Verified

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
22-05-2024
Written in
2023/2024

Ethics in Technology Exam Prep. || All Questions & Answers 100% VerifiedEthics in Technology Exam Prep. || All Questions & Answers 100% VerifiedEthics in Technology Exam Prep. || All Questions & Answers 100% VerifiedEthics in Technology Exam Prep. || All Questions & Answers 100% VerifiedWhich entity provides a technology code of ethics to its constituents? 1) The Federal Government 2) The State Government 3) A Technology Vendor 4) A Professional Organization - ANSWER - 4 Person A uses Person B's social security number and Person B's mother's maiden name to reset the online password for Person B's cell phone account. Person A is then able to enter the account to review Person B's text messages and phone records from the past month of usage. - What is this action an example of? 1) Misrepresentation 2) Software piracy 3) Fraud 4) Industrial espionage - ANSWER - 1 What is the ethical issue concerning these posted images or videos of unsuspecting users?

Show more Read less
Institution
Ethics In Technology
Course
Ethics in Technology










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Ethics in Technology
Course
Ethics in Technology

Document information

Uploaded on
May 22, 2024
Number of pages
22
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Ethics in Technology Exam Prep. || All Questions & Answers 100% Verified
Which entity provides a technology code of ethics to its constituents?
1) The Federal Government
2) The State Government
3) A Technology Vendor
4) A Professional Organization - ANSWER - 4
Person A uses Person B's social security number and Person B's mother's maiden name to reset the online password for Person B's cell phone account. Person A is then able to enter the account to review Person B's text messages and phone records from the past month of usage. - What is this action an example of?
1) Misrepresentation
2) Software piracy
3) Fraud
4) Industrial espionage - ANSWER - 1
What is the ethical issue concerning these posted images or videos of unsuspecting users?
1) Identity theft
2) Defamation
3) Anonymous expression
4) Fight words - ANSWER - 1
Person A uses Person B's social security number and Person B's mother's maiden name to reset the online password for Person B's cell phone account. Person A is then able to enter the account to review Person B's text messages and phone records from the past month of usage. - What is this action an example of?
Misrepresentation
Software piracy
Fraud
Industrial espionage - ANSWER - Three years after this student graduates, she invites friends and business leaders to the
launch of her startup. Halfway through the celebration, her two friends from school realize she implemented the business plan without asking them for permission or inviting them to be partners. She offers to pay them a set amount to walk away. - What are two ethical violations made by this business owner? 1) Bribery
2) Fraud
3) Piracy
4) Breach of Contract - ANSWER - 1 & 4
Which regulation is relevant to this video game company's actions with the children users?
1) Children's Online Privacy Protection Act (COPPA)
2) Children and Young Persons Act 1933
3) Omnibus Crime Control and Safe Streets Act
4) The First Amendment - ANSWER - 1
Which organization would offer more comprehensive training programs to support caregivers?
1) Centers for Medicare & Medicaid Services (CMS)
2) Food and Drug Administration (FDA)
3) National Patient Safety Foundation (NPSF)
4) Association Society of Health ‐System Pharmacists (ASHP) - ANSWER - 1
Three years after this student graduates, she invites friends and business leaders to the
launch of her startup. Halfway through the celebration, her two friends from school realize she implemented the business plan without asking them for permission or inviting them to be partners. She offers to pay them a set amount to walk away.
How should the actions of this business owner be described?
1) Illegal but ethical
2) Illegal and unethical
3) Legal and ethical
4) Legal but unethical - ANSWER - 2
An IT professional traveling for a work assignment decides to take a detour for personal business, and due to excessive speed, causes an auto accident.
Who is responsible for damages?
1) IT workers who breach the duty of care are accountable for injuries.
2) The company owns the vehicle and is, thus, liable for negligence.
3) Determination of liability is the responsibility of the police.
4) Both the IT professional and the business must make reparations - ANSWER - 1
What is a description of the threat to the customer data? 1) Unintended release of sensitive data or the access of sensitive data by authorized individuals
2) Intended release of sensitive data or the access of sensitive data by authorized individuals
3) Unintended release of sensitive data or the access of sensitive data by unauthorized individuals
4) Intended release of sensitive data or the access of sensitive data by unauthorized individuals - ANSWER - 2
What is a description of the threat to the data?
1) Unintended release of sensitive data or the access of sensitive data by authorized individuals
2) Intended release of sensitive data or the access of sensitive data by authorized individuals
3) Unintended release of sensitive data or the access of sensitive data by unauthorized individuals
4) Intended release of sensitive data or the access of sensitive data by unauthorized individuals - ANSWER - 4
What can organizations do to assist the sandwich generation in understanding the importance of protecting personal and financial information?
1) Have IT, financial, and medical professionals conduct monthly information sessions for the community
2) Have IT, financial, and medical professionals conduct monthly information sessions for the employees
3) Have IT, financial, and medical professionals mail information to some of the community members
4) Have only IT professionals conduct monthly information sessions for the community -
ANSWER - 1
Which privacy law was violated by these pharmacy employees?
1) GLB
2) HIPAA
3) FERPA
4) PCI - ANSWER - 2
What describes an employee's legal rights when an employer is using an auto-tracking device to monitor the employee's whereabouts?
1) The employer must obtain employee consent before installing an auto-tracking device.
2) Employees are legally bound to the company and cannot turn off the GPS device.
3) It is a company-owned vehicle, and IT workers have no lawful recourse.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NursingTutor1 West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1635
Member since
2 year
Number of followers
1073
Documents
18045
Last sold
2 days ago
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

447 reviews

5
212
4
76
3
89
2
21
1
49

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions