WGU D773 TASK 2 | TECHNOLOGY AND
ETHICS: EMERGING TRENDS AND
SOCIETY | 2026 UPDATE 100% CORRECT
ALREADY GRADED A+
Which action should the programmer take to handle this situation? -
ANSWERS-Contact and inform the FBI and the social media site of the
company's activities
A cell phone company is conducting a survey to learn more about the
demographic and preferences of its current customers. The IT
professionals at the company design the survey to be accessible
through the customer's mobile phone. Customers can return to the
survey data multiple times to update or revise their responses until the
survey closes. To access the previously entered data, the customer
must enter a one-time log-in code provided by the cell phone company,
as well as answer individualized security questions on a secure mobile
server.
What is this method of conducting a survey an example of ? -
ANSWERS-A multistage process to prevent unauthorized access to
sensitive data
To spy on his girlfriend, a man uses her social security number and her
mother's maiden name to reset the online password for her cell phone
, account. He is then able to enter the account to review her text
messages and phone records from the past month of usage.
What is this action an example of ? - ANSWERS-misrepresentation
Data collection methods and processes continue to emerge into more
industries, fields, and agencies. Meanwhile, the regulations governing
the use and sharing of this data continue to evolve. However, data
collection is still somewhat new, and there is a tangible gap in the
legislation of ethical codes and guidelines to establish clear principles
of collection and use.
What may providing unrestricted access to consumers' data without
protecting each individual's privacy or identity be considered? -
ANSWERS-Unethical and risky
Which best practice should help reduce the different ethical problems
IT professionals face on a daily basis? - ANSWERS-Establishing and
implementing an acceptable use policy
A student makes two copies of a software package that was just
purchased and sells one to a friend. How should this student's actions
be described? - ANSWERS-Unethical and illegal
What describes an employee's legal rights when an employer is using
an auto-tracking device to monitor the employee's whereabouts? -
ANSWERS-The employer must obtain employee consent before
installing an auto-tracking device.
ETHICS: EMERGING TRENDS AND
SOCIETY | 2026 UPDATE 100% CORRECT
ALREADY GRADED A+
Which action should the programmer take to handle this situation? -
ANSWERS-Contact and inform the FBI and the social media site of the
company's activities
A cell phone company is conducting a survey to learn more about the
demographic and preferences of its current customers. The IT
professionals at the company design the survey to be accessible
through the customer's mobile phone. Customers can return to the
survey data multiple times to update or revise their responses until the
survey closes. To access the previously entered data, the customer
must enter a one-time log-in code provided by the cell phone company,
as well as answer individualized security questions on a secure mobile
server.
What is this method of conducting a survey an example of ? -
ANSWERS-A multistage process to prevent unauthorized access to
sensitive data
To spy on his girlfriend, a man uses her social security number and her
mother's maiden name to reset the online password for her cell phone
, account. He is then able to enter the account to review her text
messages and phone records from the past month of usage.
What is this action an example of ? - ANSWERS-misrepresentation
Data collection methods and processes continue to emerge into more
industries, fields, and agencies. Meanwhile, the regulations governing
the use and sharing of this data continue to evolve. However, data
collection is still somewhat new, and there is a tangible gap in the
legislation of ethical codes and guidelines to establish clear principles
of collection and use.
What may providing unrestricted access to consumers' data without
protecting each individual's privacy or identity be considered? -
ANSWERS-Unethical and risky
Which best practice should help reduce the different ethical problems
IT professionals face on a daily basis? - ANSWERS-Establishing and
implementing an acceptable use policy
A student makes two copies of a software package that was just
purchased and sells one to a friend. How should this student's actions
be described? - ANSWERS-Unethical and illegal
What describes an employee's legal rights when an employer is using
an auto-tracking device to monitor the employee's whereabouts? -
ANSWERS-The employer must obtain employee consent before
installing an auto-tracking device.