100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C961 Ethics in Technology EXAM STUDY GUIDE COMPLETE QUESTIONS WITH CORRECT DETAILED ANSWERS || 100% GUARANTEED PASS <LATEST VERSION>

Rating
-
Sold
-
Pages
142
Grade
A+
Uploaded on
16-05-2025
Written in
2024/2025

WGU C961 Ethics in Technology EXAM STUDY GUIDE COMPLETE QUESTIONS WITH CORRECT DETAILED ANSWERS || 100% GUARANTEED PASS &lt;LATEST VERSION&gt; 1. Clinical Decision Support (CDS) - ANSWER A process and a set of tools designed to enhance healthcare related decision making through the use of clinical knowledge and patient-specific information to improve healthcare delivery. 2. Code of Ethics - ANSWER A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that ate important to the organization and its decision-making. 3. Community Decency Act (CDA) - ANSWER Title V of the Telecommunications Act, it aimed at protecting children from pornography, including imposing $250,000 fines and prison terms of up to two years for the transmission of "indecent" material over the internet. 4. Compliance - ANSWER To be in accordance with established policies, guidelines, specifications, or legislation. 5. Computer Forensics - ANSWER A discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law. 6. Computerized Provider Order Entry (CPOE) System - ANSWER A system that enables physicians to place orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient. 7. Conflict of Interest - ANSWER A conflict between a person's (or firm's) self interest and the interests of a client. 8. Contingent Work - ANSWER A job situation in which an individual does not have an explicit contract for long term employment. 9. Controlling the Assault of Non Solicited Pornography and Marketing (CANSPAM) Act - ANSWER A law that specifies that it is legal to spam, provided the messages meet a few basic requirements: spammers cannot disguise their identity by using a false return address, the email must include a label specifying that it is an ad or a solicitation, and the email must include a way for recipients to indicate that they do not want future mass mailings. 10. Electronic Product Environmental Assessment Tool (EPEAT) - ANSWER A system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria. 11. Fair use doctrine - ANSWER A legal doctrine that allows portions of copyrighted materials to be used without permission under certain circumstances. Title 17, section 107, of the U.S. Code established the following four factors that courts should consider when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty: 1) the purpose and character of the use (such as commercial use or nonprofit, educational purposes), 2) the nature of the copyrighted work, 3) the portion of the copyrighted work used in relation to the work as a whole, and 4) the effect of the use on the value of the copyrighted work. 12. False Claims Act - ANSWER A law enacted during the U.S. Civil War to combat fraud by companies that sold supplies to the Union Army; also known as the Lincoln Law. See also qui tam. 13. Foreign Corrupt Practices Act (FCPA) - ANSWER An act that makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office. 14. H-1B visa - ANSWER A temporary work visa granted by the U.S. Citizenship and Immigration Services (USGIS) for people who work in specialty occupations jobs that require a four-year bachelor's degree in a specific field, or equivalent experience. 15. Health information exchange (HIE) - ANSWER The process of sharing patient-level electronic health information between different organizations. 16. Health Information Technology for Economic and Clinical Health Act (HITECH Act) - ANSWER A program to incentivize physicians and hospitals to implement such systems. Under this act, increased Medicaid and Medicare reimbursements are made to doctors and hospitals that demonstrate "meaningful use" of electronic health record (EHR) technology. 17. Intrusion detection system (IDS) - ANSWER Software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment. 18. ISAE No. 3402 - ANSWER Developed to provide an international assurance standard for allowing public accountants to issue a report for use by user organizations and their auditors (user auditors) on the controls at a service organization that are likely to impact or be a part of the user organization's system of internal control over financial reporting. The international counterpart to SSAE No. 16. See also SSAE No. 16 audit report. 19. ISO 9001 family of standards - ANSWER A set of standards written to serve as a guide to quality products, services, and management. It provides a set of standardized requirements for a quality management system. 20. John Doe lawsuit - ANSWER A type of lawsuit that organizations may file in order to gain subpoena power in an effort to learn the identity of anonymous internet users who they believe have caused some form of harm to the organization through their postings. 21. Leahy-Smith America Invents Act - ANSWER An act that changed the U.S. patent system so that the first person to file with the U.S. Patent and Trademark Office will receive the patent, not necessarily the person who actually invented the item first. 22. Logic bomb - ANSWER A type of Trojan horse malware that executes when it is triggered by a specific event or at a predetermined time. 23. Managed security service provider (MSSP) - ANSWER A company that monitors, manages, and maintains computer and network security for other organizations. 24. Next-generation firewall (NGFW) - ANSWER A hardware- or software based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents. 25. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 - ANSWER An act that created the position of Intellectual Property Enforcement Coordinator within the Executive Office of the President. It also increased trademark and copyright enforcement and substantially increased penalties for infringement. 26. Qui tam - ANSWER A provision of the False Claims Act that allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds. See also False Claim Act. 27. Section 230 of the CDA - ANSWER A section of the Communications Decency Act that provides immunity to an Internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider. 28. Software & Information Industry Association (SIIA) - ANSWER A trade group that represents the world's largest software and hardware manufacturers. 29. SSAE No. 16 audit report - ANSWER An auditing standard issued by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA). It demonstrates that an outsourcing firm has effective internal controls in accordance with the Sarbanes Oxley Act of 2002. 30. Strategic lawsuit against public participation (SLAPP) - ANSWER A lawsuit filed by corporations, government officials, and others against citizens and community groups who oppose them on matters of concern. The lawsuit is typically without merit and is used to intimidate critics out of fear of the cost and effort associated with a major legal battle. 31. Transport Layer Security (TLS) - ANSWER A communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet. 32. U.S. Computer Emergency Readiness Team (US-CERT) - ANSWER Established in 2003 to protect the nation's Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics. 33. Uniform Trade Secrets Act (UTSA) - ANSWER An act drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law. 34. Copyright - ANSWER The exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work; granted to creators of original works of authorship. 35. Copyright Infringement - ANSWER A violation of the rights secured by the owner of a copyright; occurs when someone copies a substantial and material part of another's copyrighted work without permission. 36. Corporate Compliance Officer - ANSWER See Corporate Ethics Officer 37. Corporate Ethics Officer - ANSWER A senior-level manager who provides an organization with vision and leadership in the area of business conduct. 38. Cost Per Click (CPC) - ANSWER One of the two common methods of charging for paid media in which ads are paid for only when someone actually clicks on them. 39. Cost Per Thousand Impressions (CPM) - ANSWER One of the two common methods of charging for paid media in which ads ate billed at a flat rate per 1,000 impressions, which is a measure of the number of times an ad is displayed whether it was actually clicked or not. 40. Cyberabuse - ANSWER Any form of mistreatment or lack of care, both physical and mental, using an electronic communications device that causes harm and distress to others. 41. Cyberespionage - ANSWER The deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms. 42. The Fourth Amendment cannot be used to limit how a private employer treats its employees, and private-sector employees must seek legal protection against an invasive employer under various state statues. - ANSWER True 43. A recent study revealed that between ________________ percent of workers' time online has nothing to do with work. - ANSWER 60 and 80 44. Beginning with the model year 2011 vehicles, the National Highway Safety Administration defined a minimum set of 15 data elements that must be captured for manufacturers who voluntarily install Electronic Data Recorders on their vehicles. - ANSWER True 45. China has more surveillance cameras per person than Great Britain. - ANSWER False 46. ______________________________ is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest. - ANSWER Whistleblowing 47. The mission of the Software & Information Industry Association and the Business Software Alliance is to ___________________. - ANSWER stop the unauthorized copying of software produced by its members. 48. __________________ occurs when a party fails to perform certain express or implied obligations, which impairs or destroys the very essence of a contract - ANSWER Material breach of contract 49. Under the Foreign Corrupt Practices Act (FCPA), it is permissible to pay an official to perform some official function faster (for example, to speed customs clearance). - ANSWER True 50. ______________________ is the process established by an organization's board of directors, managers, and IT systems people to provide reasonable assurance for the effectiveness and efficiency of operations, the reliability of financial reporting, and compliance with applicable laws and regulations. - ANSWER Internal control 51. A (An) __________________________ states the principles and core values that are essential to the work of a particular occupational group. - ANSWER professional code of ethics or code of ethics 52. Unlike certification, which applies only to people and is required by law, licensing can also apply to products. - ANSWER False 53. An IT worker cannot be sued for professional malpractice unless he or she is licensed. - ANSWER True 54. The core ______________ for any profession outlines agreed-upon sets of skills and abilities that all licensed professionals must possess. - ANSWER body of knowledge 55. Professionals who breach the duty of care are liable for injuries that their negligence causes. This liability is commonly referred to as ____________. - ANSWER professional malpractice 56. ______________________ is one in which two employers have legal rights and duties with respect to the same employee or group of employees. - ANSWER Coemployment relationship 57. A _________________ hires the employees of its clients and then assumes responsibility for all human resource functions. If this arrangement is terminated, the workers continue to be employed by the client company. - ANSWER professional employer organization (PEO) 58. Which of the following is not an advantage for organizations that employ contingent workers? - ANSWER The contingent worker's experience may be useful to the next firm that hires him or her. 59. Which of the following statements indicate that the worker is not an independent contractor? - ANSWER The worker is protected by workplace safety and employment antidiscrimination laws. 60. The National Labor Relations Act, Civil Rights Act, Air Labor Standards, and Employee Retirement Income Security Act each have a uniform, consistent definition of employees and independent contractors. - ANSWER False 61. Which group of foreign workers is not exempt from the annual cap on the number of H-1B visas granted? - ANSWER Programmers and engineers hired to work at private technology companies. 62. What can the nonbreaching party do when there is a material breach of contract? - ANSWER -Continue keeping the contract in effect and sue the breaching party to recover damages -Rescind the contract, seek restitution of any compensation paid under the contract to the breaching party, and be discharged from any further performance under the contract 63. There are several frequent causes of problems in IT projects. Which cause is not a frequent cause? - ANSWER -Misrepresentation: is the misstatement or incomplete statement of a material fact that is an unethical act and not a frequent cause of IT project problems. 64. What is an example of a conflict of interest? - ANSWER After a few weeks of analysis, the consulting firm gave a poor rating for the client's existing IT strategic plan and insisted that the firm's proprietary products and services are required to develop a new strategic plan. 65. What is an example of a fraud crime? - ANSWER Concealing and negligently failing to disclose material facts is an example of fraud. (In 2013 Bridgestone Americas, Inc. v. International Business Machines Corporation case, Bridgestone contended that IBM concealed or negligently failed or both to disclose material facts regarding the implementation of the system that will have resulted in different decisions regarding the project.) 66. What is an example of a breach of contract? - ANSWER Oracle had breached its contract with HPE by dropping support for all Oracle database software being run on HP systems using Intel's Itanium processor chip. (Hewlett-Packard Enterprise (HPE) contractually uses Oracle database software for its systems that run on a specific Intel processor chip. Oracle quit supporting its software for that specific processor.) 67. What are the benefits generated with a good working relationship between IT workers and their suppliers? - ANSWER The flow of useful communication and the sharing of ideas are benefits of the relationship between IT workers and their suppliers. 68. What is a kickback? - ANSWER A supplier sales representative offering money to another company to get business 69. With proper _____, fraud would then require the collusion of two or more parties. - ANSWER separation of duties A fundamental concept of good internal controls is the careful separation of duties associated with any process that involves the handling of financial transactions so that different aspects of the process are handled by different people. 70. What is the maximum fine for any individual found in violation of Foreign Corrupt Practices Act (FCPA)? - ANSWER $100,000 Penalties for violating the FCPA are severe with individual violators being fined up to $100,000 and imprisoned for up to 5 years. 71. Acceptable use policy (AUP) - ANSWER A document that stipulates restrictions and practices that a user must agree in order to use organizational computing and network resources. 72. Advanced persistent threat (APT) - ANSWER A network attack in which an intruder gains access to a network and stays there—undetected— with the intention of stealing data over a long period of time (weeks or even months). 73. Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) - ANSWER An agreement of the World Trade Organization that requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations. 74. Anti-SLAPP laws - ANSWER Laws designed to reduce frivolous SLAPPs (strategic lawsuit against public participation [SLAPP], which is a lawsuit filed by corporations, government officials, and others against citizens and community groups who oppose them on matters of concern). 75. Bathsheba syndrome - ANSWER The moral corruption of people in power, which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately. 76. Blended threat - ANSWER A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload. 77. Bring your own device (BYOD) - ANSWER A business policy that permits, and in some cases, encourages employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet. 78. BSA | The Software Alliance (BSA) - ANSWER A trade group that represent the world's largest software and hardware manufacturers. 79. CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - ANSWER Software that generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot. 80. Child Online Protection Act (COPA) - ANSWER An act signed into law in 1998 with the aim of prohibiting the making of harmful material available to minors via the internet; the law was ultimately ruled largely unconstitutional. 81. Children's Internet Protection Act (CIPA) - ANSWER An act passed in 2000; it required federally financed schools and libraries to use some form of technological protection (such as an internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors. 82. CIA security triad - ANSWER Refers to confidentiality, integrity, and availability. 83. Clinical decision support (CDS) - ANSWER A process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patient-specific information to improve healthcare delivery. 84. Communications Decency Act (CDA) - ANSWER Title V of the Telecommunications Act, it aimed at protecting children from pornography, including imposing $250,000 fines and prison terms of up to two years for the transmission of "indecent" material over the internet. 85. Computerized provider order entry (CPOE) system - ANSWER A system that enables physicians to place orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient. 86. Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) - ANSWER A law that specifies that it is legal to spam, provided the messages meet a few basic requirements—spammers cannot disguise their identity by using a false return address, the email must include a label specifying that it is an ad or a solicitation, and the email must include a way for recipients to indicate that they do not want future mass mailings. 87. Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) Act - ANSWER A law that specifies that it is legal to spam,

Show more Read less
Institution
WGU C961 Ethics In Technology
Course
WGU C961 Ethics in Technology











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C961 Ethics in Technology
Course
WGU C961 Ethics in Technology

Document information

Uploaded on
May 16, 2025
Number of pages
142
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C961 Ethics in Technology EXAM STUDY
GUIDE COMPLETE QUESTIONS WITH CORRECT
DETAILED ANSWERS || 100% GUARANTEED PASS
<LATEST VERSION>



1. Clinical Decision Support (CDS) - ANSWER ✓ A process and a set of tools
designed to enhance healthcare related decision making through the use of
clinical knowledge and patient-specific information to improve healthcare
delivery.

2. Code of Ethics - ANSWER ✓ A statement that highlights an organization's
key ethical issues and identifies the overarching values and principles that
ate important to the organization and its decision-making.

3. Community Decency Act (CDA) - ANSWER ✓ Title V of the
Telecommunications Act, it aimed at protecting children from pornography,
including imposing $250,000 fines and prison terms of up to two years for
the transmission of "indecent" material over the internet.

4. Compliance - ANSWER ✓ To be in accordance with established policies,
guidelines, specifications, or legislation.

5. Computer Forensics - ANSWER ✓ A discipline that combines elements of
law and computer science to identify, collect, examine, and preserve data
from computer systems, networks, and storage devices in a manner that
preserves the integrity of the data gathered so that it is admissible as
evidence in a court of law.

6. Computerized Provider Order Entry (CPOE) System - ANSWER ✓ A
system that enables physicians to place orders (for drugs, laboratory tests,
radiology, physical therapy) electronically, with the orders transmitted
directly to the recipient.

,7. Conflict of Interest - ANSWER ✓ A conflict between a person's (or firm's)
self interest and the interests of a client.

8. Contingent Work - ANSWER ✓ A job situation in which an individual does
not have an explicit contract for long term employment.

9. Controlling the Assault of Non Solicited Pornography and Marketing
(CANSPAM) Act - ANSWER ✓ A law that specifies that it is legal to
spam, provided the messages meet a few basic requirements: spammers
cannot disguise their identity by using a false return address, the email must
include a label specifying that it is an ad or a solicitation, and the email must
include a way for recipients to indicate that they do not want future mass
mailings.

10.Electronic Product Environmental Assessment Tool (EPEAT) - ANSWER ✓
A system that enables purchasers to evaluate, compare, and select electronic
products based on a total of 51 environmental criteria.

11.Fair use doctrine - ANSWER ✓ A legal doctrine that allows portions of
copyrighted materials to be used without permission under certain
circumstances. Title 17, section 107, of the U.S. Code established the
following four factors that courts should consider when deciding whether a
particular use of copyrighted property is fair and can be allowed without
penalty: 1) the purpose and character of the use (such as commercial use or
nonprofit, educational purposes), 2) the nature of the copyrighted work, 3)
the portion of the copyrighted work used in relation to the work as a whole,
and 4) the effect of the use on the value of the copyrighted work.

12.False Claims Act - ANSWER ✓ A law enacted during the U.S. Civil War to
combat fraud by companies that sold supplies to the Union Army; also
known as the Lincoln Law. See also qui tam.

13.Foreign Corrupt Practices Act (FCPA) - ANSWER ✓ An act that makes it a
crime to bribe a foreign official, a foreign political party official, or a
candidate for foreign political office.

,14.H-1B visa - ANSWER ✓ A temporary work visa granted by the U.S.
Citizenship and Immigration Services (USGIS) for people who work in
specialty occupations jobs that require a four-year bachelor's degree in a
specific field, or equivalent experience.

15.Health information exchange (HIE) - ANSWER ✓ The process of sharing
patient-level electronic health information between different organizations.

16.Health Information Technology for Economic and Clinical Health Act
(HITECH Act) - ANSWER ✓ A program to incentivize physicians and
hospitals to implement such systems. Under this act, increased Medicaid and
Medicare reimbursements are made to doctors and hospitals that
demonstrate "meaningful use" of electronic health record (EHR) technology.

17.Intrusion detection system (IDS) - ANSWER ✓ Software and/or hardware
that monitors system and network resources and activities and notifies
network security personnel when it detects network traffic that attempts to
circumvent the security measures of a networked computer environment.

18.ISAE No. 3402 - ANSWER ✓ Developed to provide an international
assurance standard for allowing public accountants to issue a report for use
by user organizations and their auditors (user auditors) on the controls at a
service organization that are likely to impact or be a part of the user
organization's system of internal control over financial reporting. The
international counterpart to SSAE No. 16. See also SSAE No. 16 audit
report.

19.ISO 9001 family of standards - ANSWER ✓ A set of standards written to
serve as a guide to quality products, services, and management. It provides a
set of standardized requirements for a quality management system.

20.John Doe lawsuit - ANSWER ✓ A type of lawsuit that organizations may
file in order to gain subpoena power in an effort to learn the identity of
anonymous internet users who they believe have caused some form of harm
to the organization through their postings.

21.Leahy-Smith America Invents Act - ANSWER ✓ An act that changed the
U.S. patent system so that the first person to file with the U.S. Patent and

, Trademark Office will receive the patent, not necessarily the person who
actually invented the item first.

22.Logic bomb - ANSWER ✓ A type of Trojan horse malware that executes
when it is triggered by a specific event or at a predetermined time.

23.Managed security service provider (MSSP) - ANSWER ✓ A company that
monitors, manages, and maintains computer and network security for other
organizations.

24.Next-generation firewall (NGFW) - ANSWER ✓ A hardware- or software-
based network security system that is able to detect and block sophisticated
attacks by filtering network traffic dependent on the packet contents.

25.Prioritizing Resources and Organization for Intellectual Property (PRO-IP)
Act of 2008 - ANSWER ✓ An act that created the position of Intellectual
Property Enforcement Coordinator within the Executive Office of the
President. It also increased trademark and copyright enforcement and
substantially increased penalties for infringement.

26.Qui tam - ANSWER ✓ A provision of the False Claims Act that allows a
private citizen to file a suit in the name of the U.S. government, charging
fraud by government contractors and other entities who receive or use
government funds. See also False Claim Act.

27.Section 230 of the CDA - ANSWER ✓ A section of the Communications
Decency Act that provides immunity to an Internet service provider (ISP)
that publishes user-generated content, as long as its actions do not rise to the
level of a content provider.

28.Software & Information Industry Association (SIIA) - ANSWER ✓ A trade
group that represents the world's largest software and hardware
manufacturers.

29.SSAE No. 16 audit report - ANSWER ✓ An auditing standard issued by the
Auditing Standards Board of the American Institute of Certified Public
Accountants (AICPA). It demonstrates that an outsourcing firm has effective
internal controls in accordance with the Sarbanes Oxley Act of 2002.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BenjaminsStudyHub Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
11
Member since
6 months
Number of followers
0
Documents
248
Last sold
2 weeks ago
BENJAMIN STUDY HUB

Welcome to this platform! Here, you'll find a wide range of carefully curated study resources, including in-depth documents, all-inclusive bundles, and professionally designed flashcards—all provided by BenjaminsStudyHub. These materials are thoughtfully created to enhance your learning experience and help you prepare for exams with confidence and ease. I'm available to assist you with any academic questions or support you might need. Feel free to reach out—I'm always happy to help you succeed in your studies. Thank you for choosing these resources, and I wish you a productive and fulfilling learning journey!

Read more Read less
3.0

3 reviews

5
0
4
1
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions