100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D333 ETHICS IN TECHNOLOGY, OBJECTIVE ASSESSMENT EXAM QUESTIONS WITH VERIFIED ANSWERS /A+ GRADE ASSURED (LATEST 2026/2027)

Puntuación
-
Vendido
-
Páginas
35
Grado
A+
Subido en
01-01-2026
Escrito en
2025/2026

WGU D333 ETHICS IN TECHNOLOGY, OBJECTIVE ASSESSMENT EXAM QUESTIONS WITH VERIFIED ANSWERS /A+ GRADE ASSURED (LATEST 2026/2027) 1. A philosophical theory stating that the best action is the one that maximizes overall happiness or pleasure for the greatest number of people. Utilitarianism 2. A moral theory that judges the rightness or wrongness of actions based solely on their outcomes or consequences. Consequentialism 3. A trait or quality deemed to be morally good and thus is valued as a foundation of good moral being. In ethical philosophy, it is a central concept that signifies human excellence and righteous action. Virtue 4. The doctrine that knowledge, truth, and morality exist in relation to culture, society, or historical context, and are not absolute. Relativism 5. The selfless concern for the well-being of others without expecting any reward, recognition, or return. It involves acting out of a desire to help others, often at a cost or sacrifice to oneself. Altruism 6. A theory that posits an individual's self-interest is the foundation of morality and the primary motivation of human actions. Egoism 8. A moral philosophy where the morality of an action is based on whether that action itself is right or wrong under a series of rules, rather than based on the consequences of the action. Deontology 2 / 35 9. An approach to ethics that emphasizes an individ- ual's character as the key element of ethical thinking, rather than rules about the acts themselves or their consequences. Virtue Ethics 10. A ethical theory asserting that the morality of actions Kantian Ethics is determined by whether they fulfill our duty and respect the autonomy of individuals, guided by uni- versal maxims. 13. A business model that helps a company be socially Corporate Soaccountable—to itself, its stakeholders, and the pub- cial Responsibility lic. By practicing this, companies can be conscious (CSR) of the kind of impact they are having on all aspects of society, including economic, social, and environmen- tal. 14. Ethical concept regarding how personal information Privacy is collected, used, and protected by, a hypothetical entity or organization. It focuses on the rights of indi- viduals to control access to their personal data. 15. Ethical concept to ensure information is correct, Accuracy truthful, and reliable, avoiding harm caused by mis- information or misrepresentation of data. 16. Ethical issues related to the rights and responsibili- Property ties concerning the ownership, use, and distribution of resources or information, including intellectual property and users' data.

Mostrar más Leer menos
Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
1 de enero de 2026
Número de páginas
35
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D333 ETHICS IN TECHNOLOGY, OBJECTIVE ASSESSMENT
EXAM QUESTIONS WITH VERIFIED ANSWERS /A+ GRADE
ASSURED (LATEST 2026/2027)
1. A philosophical theory stating that the best action is Utilitarianism
the one that maximizes overall happiness or pleasure
for the greatest number of people.

2. A moral theory that judges the rightness or wrong- Consequentialism
ness of actions based solely on their outcomes or
consequences.

3. A trait or quality deemed to be morally good and thus Virtue
is valued as a foundation of good moral being. In eth-
ical philosophy, it is a central concept that signifies
human excellence and righteous action.

4. The doctrine that knowledge, truth, and morality exist Relativism
in relation to culture, society, or historical context,
and are not absolute.

5. The selfless concern for the well-being of others with- Altruism
out expecting any reward, recognition, or return. It
involves acting out of a desire to help others, often
at a cost or sacrifice to oneself.

6. A theory that posits an individual's self-interest is the Egoism
foundation of morality and the primary motivation of
human actions.




8. A moral philosophy where the morality of an action is Deontology
based on whether that action itself is right or wrong
under a series of rules, rather than based on the
consequences of the action.




,9. An approach to ethics that emphasizes an individ- ual's Virtue Ethics
character as the key element of ethical thinking,
rather than rules about the acts themselves or their
consequences.

10. A ethical theory asserting that the morality of actions Kantian Ethics
is determined by whether they fulfill our duty and respect the
autonomy of individuals, guided by uni- versal maxims.


11. reflect a societal code of behavior. Ethics

12. reflect personal principles. Morals



13. A business model that helps a company be socially Corporate So-
accountable—to itself, its stakeholders, and the pub- cial
Responsibility
lic. By practicing this, companies can be conscious (CSR)
of the kind of impact they are having on all aspects of
society, including economic, social, and environmen- tal.

14. Ethical concept regarding how personal information Privacy is
collected, used, and protected by, a hypothetical entity or
organization. It focuses on the rights of indi- viduals to control
access to their personal data.

15. Ethical concept to ensure information is correct, Accuracy
truthful, and reliable, avoiding harm caused by mis- information
or misrepresentation of data.

16. Ethical issues related to the rights and responsibili- Property ties
concerning the ownership, use, and distribution of resources or
information, including intellectual property and users' data.

17. Ethical considerations regarding the ease with which Accessibility
all users, including those with disabilities, can use services and
access information equitably.



,18. A comprehensive data protection law in the EU that General Data
Pro- strengthens and unifies data protection for individu- tection
Regulation als within the European Union, providing control over
(GDPR) personal data and simplifying the regulatory environ-
ment for international business.

7. The practice among those with power or influence of Nepotism
favoring relatives or friends, especially by giving
them jobs.




19. U.S. legislation that prohibits the intentional intercep- Wiretap Act
tion, use, or disclosure of any wire, oral, or electronic
communication without consent, except as otherwise provided
by the law or court order.

20. A U.S. law enacted in 1978 that establishes proce- Foreign Intelli-
dures for the physical and electronic surveillance and gence
Surveil- collection of "foreign intelligence information" be- lance
Act (FISA) tween "foreign powers" and "agents of foreign pow-
ers" suspected of espionage or terrorism.
21. A U.S. law that amended the Foreign Intelligence Foreign Intelli-
Surveillance Act, allowing the government to con- gence Surveil-
duct surveillance without a warrant on foreign tar- lance Amend-
gets, even if the communication passes through or ments Act of 2008
involves U.S. persons, under certain conditions.
22. A U.S. federal statute that significantly changed Leahy-Smith patent law,
switching the U.S. patent system from a America Invents
"first to invent" to a "first inventor to file" system, and Act
introducing new procedures for patent review and challenges.


23. A U.S. law that requires financial institutions to ex- Gramm-Leach-Bliley
plain their information-sharing practices to their cus- Act (GLBA)
tomers and to safeguard sensitive data.




, 24. A United States federal law passed in 1996 that makes Economic Espi-
the theft or misappropriation of a trade secret a feder- onage Act (EEA)
al crime. This law is primarily aimed at protecting in- dustrial and
commercial secrets from foreign entities that might engage in
espionage.

25. A U.S. federal law that protects the confidentiality Right to Financial of
personal financial records by limiting government Privacy Act access
to such records without proper authorization, notification, or a search
warrant.


26. A regulation adopted by the EU to protect individuals' European Union
personal data privacy and to regulate the processing Data Protection
of personal data within the EU, ensuring free flow of Directive data
among member states.

27. A U.S. law that gives the public the right to request Freedom of Infor-
access to records from any federal agency, promoting mation Act
(FOIA) transparency and accountability in government.

28. A U.S. legislative act passed in 1994 that requires Communications
telecommunications carriers and manufacturers of Assistance for
telecommunications equipment to modify and design Law Enforcement
their equipment, facilities, and services to ensure Act (CALEA) they
have built-in surveillance capabilities, allowing federal agencies to
wiretap any telephone conversa- tionsto aid carriedlaw enforcement
out over its in networks.conducting It lawfulwas enacted intercep -
tions of communications.

29. A law passed by the U.S. Congress in 2009 to stimu- American Recov-
late the economy during the recession by increasing ery and Reinvest-
federal spending and cutting taxes. It also included ment Act
provisions for enhancing the infrastructure, including health
information technology.

30. An international legal agreement between all the Agreement on member
nations of the World Trade Organization Trade-Related As- (WTO),
which sets down minimum standards for pects of Intellectu- many forms
of intellectual property regulation. It cov- al Property Rights
$15.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
ExcelAcademia2026 Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2094
Miembro desde
4 año
Número de seguidores
1650
Documentos
8354
Última venta
1 día hace
EXCEL ACADEMIA TUTORS

At Excel Academia Tutoring, You will get solutions to all subjects in both assignments and major exams. Contact me for assistance. Good luck! Well-researched education materials for you. Expert in Nursing, Mathematics, Psychology, Biology etc. My Work has the Latest & Updated Exam Solutions, Study Guides and Notes (100% Verified Solutions that Guarantee Success)

3.7

343 reseñas

5
141
4
77
3
62
2
20
1
43

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes