100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D333 Ethics in Technology- WGU Exam Questions & Correct Answers Updated 2025 /2025.

Puntuación
-
Vendido
-
Páginas
54
Grado
A+
Subido en
14-04-2025
Escrito en
2024/2025

WGU D333 Ethics in Technology- WGU Exam Questions & Correct Answers Updated 2025 /2025.

Institución
WGU D333 Ethics In Technolog
Grado
WGU D333 Ethics in Technolog











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D333 Ethics in Technolog
Grado
WGU D333 Ethics in Technolog

Información del documento

Subido en
14 de abril de 2025
Número de páginas
54
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D333 Ethics in Technology- WGU Exam
Questions & Correct Answers Updated 2025 /2025.


Terms in this set (332)

acceptable use policy A document that stipulates restrictions and practices that a
(AUP) user must agree in order to use organizational computing and
network resources.


When an organization decides
to accept a risk because the
cost of avoiding the risk
outweighs the potential loss of
the risk. A decision to accept a
risk can be extremely difficult
and controversial when dealing
with safety-critical systems
because making
acceptancethat determination involves forming personal
judgments about the value of
human life, assessing potential
liability in case of an accident, evaluating the potential impact on
the surrounding natural environment, and estimating the system's
costs and benefits.

A network attack in which an intruder gains access to a
advanced persistent threat network and stays there—undetected—with the intention
(APT) of stealing data over a long period of time (weeks or even
months).

,agile development A software development methodology
in which a system is developed in
iterations lasting from one to four
weeks. Unlike the waterfall system
development model, agile development
accepts the fact that system requirements are evolving and
cannot be fully understood or defined at the start of the
project.




Agreement on Trade- An agreement of the World Trade Organization that
Related Aspects of requires member governments to ensure that intellectual
property rights can be enforced under their laws and that
Intellectual Property
penalties for infringement are tough enough to deter
Rights (TRIPS) further violations.


American Recovery and A wide-ranging act that authorized $787 billion in spending
Reinvestment Act and tax cuts over a 10-year period and included strong
privacy provisions for electronic health records, such as
banning the sale of health information, promoting the use
of audit trails and encryption, and providing rights of access
for patients.




annualized loss The estimated loss from a potential risk event over the
expectancy (ALE) course of a year. The following equation is used to calculate
the annual loss expectancy: ARO × SLE = ALE. Where ARO is
the annualized rate of occurrence, an estimate of the
probability that this event will occur over the course of a
year and SLE is the single loss expectancy, the estimated loss
that would be incurred if the event happens.




annualized rate of An estimate of the probability that a risk event will occur over
occurrence (ARO) the course of a year.

,anonymous expression The expression of opinions by people who do not reveal their
identity.

anonymous remailer A service that allows anonymity on the Internet by using a
service computer program that strips the originating header and/or
IP address from the message and then forwards the message
to its intended recipient.


anti-SLAPP laws Laws designed to reduce frivolous SLAPPs (strategic lawsuit
against public participation (SLAPP), which is a lawsuit filed
by corporations, government officials, and others against
citizens and community groups who oppose them on
matters of concern).


antivirus software Software that scans for a specific sequence of bytes, known
as a virus signature, that indicates the presence of a specific
virus.

artificial intelligence The people, procedures, hardware, software, data, and
systems knowledge needed to develop computer systems and
machines that can simulate human intelligence processes,
including learning (the acquisition of information and rules
for using the information), reasoning (using rules to reach
conclusions), and selfcorrection (using the outcome from
one scenario to improve its performance on future
scenarios).




A group that provides assistance to the board of directors in
fulfilling its responsibilities with respect to the oversight of
the quality and integrity of the organization's accounting and
reporting practices and controls, including financial
audit committee statements and reports; the organization's compliance with
legal and regulatory requirements; the qualifications,
independence, and performance of the company's
independent auditor; and the performance of the company's
internal audit team.

, avoidance The elimination of a vulnerability that gives rise to a
particular risk in order to avoid the risk altogether. This is
the most effective solution but often not possible due to
organizational requirements and factors beyond an
organization's control.


Bathsheba syndrome The moral corruption of people in power, which is often
facilitated by a tendency for people to look the other way
when their leaders act inappropriately.

best practice A method or technique that has consistently shown results
superior to those achieved with other means and that is used
as a benchmark within a particular industry.



Bill of Rights The first 10 amendments to the United States Constitution
that spell out additional rights of individuals.



black-box testing A type of dynamic testing that involves viewing the software unit
as a device that has expected input and output behaviors but
whose internal workings are unknown (a black box).



blended threat A sophisticated threat that combines the features of a virus,
worm, Trojan horse, and other malicious code into a single
payload.

body of knowledge An agreed-upon sets of skills and abilities that all licensed
professionals must possess.

botnet A large group of computers, which are controlled from
one or more remote locations by hackers, without the
knowledge or consent of their owners.

breach of contract The failure of one party to meet the terms of a contract.



breach of the duty of care The failure to act as a reasonable person would act.

breach of warranty When a product fails to meet the terms of its warranty.
$23.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
StuviaRead Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
3640
Miembro desde
1 año
Número de seguidores
12
Documentos
1152
Última venta
1 mes hace

4.5

1013 reseñas

5
594
4
330
3
70
2
15
1
4

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes