100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Resumen

Summary D333 Ethics in Technology QUESTIONS| WITH ALREADY SOLVED CORRECTLY ANSWERS!! | ASSURED SUCCESS

Puntuación
-
Vendido
-
Páginas
23
Subido en
17-05-2025
Escrito en
2024/2025

D333 Ethics in Technology QUESTIONS| WITH ALREADY SOLVED CORRECTLY ANSWERS!! | ASSURED SUCCESS

Institución
D333 Ethics In Technology Q
Grado
D333 Ethics in Technology Q










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
D333 Ethics in Technology Q
Grado
D333 Ethics in Technology Q

Información del documento

Subido en
17 de mayo de 2025
Número de páginas
23
Escrito en
2024/2025
Tipo
Resumen

Temas

Vista previa del contenido

D333 Ethics in Technology QUESTIONS|
WITH ALREADY SOLVED CORRECTLY
ANSWERS!! | ASSURED SUCCESS

Two programmers disagree about which philosophical theory is best suited for their autonomous
vehicles. One programmer suggests their vehicle should always choose the greatest good for the
greatest number of people.

Which philosophical theory encapsulates this stance? - CORRECT ANSWERS Utilitarianism



What is the difference between ethics and morals? - CORRECT ANSWERS Ethics reflect a societal
code of behavior, whereas morals reflect personal principles.



An IT company holds itself accountable for how its actions affect its shareholders, consumers,
employees, community, the environment, and suppliers. What is this company demonstrating? -
CORRECT ANSWERS Corporate social responsibility



A homeowners' association (HOA) installs license plate readers after an increase in reported crime in the
neighborhood. Two domestic workers petition the HOA, requesting that their data be deleted to protect
their privacy. The HOA considers this but denies their request, citing the greater need for security
protection for residents. Which ethical theory does this represent? - CORRECT ANSWERS
Consequentialism



A project team at an animal welfare agency is using predictive analytics to help take animals out of
abusive environments. The algorithm the team designed has a false positive rate that is higher than
zero, which means that some animals could be removed erroneously if the algorithm's
recommendations are followed. The project owner understands that pets may wrongfully be removed
from loving healthy homes but decides to use the algorithm anyway because it will happen only a small
percentage of the time. Which ethical theory does this represent? - CORRECT ANSWERS
Consequentialism

,A developer creates video games based on real war scenarios and designs characters that mimic real
people from world events. The video game has content perceived as excessively violent and rewards
players who inflict the most harm on other players' virtual characters. The developer knows that these
are simulated acts that depict real war scenarios to create an immersive experience for players but is
concerned about the impact on their moral character. Which ethical theory does this situation
represent? - CORRECT ANSWERS Virtue



A software sales company is currently struggling with low sales. The company is aware that one of its
competitor's senior sales managers is dissatisfied with the competitor due to having been overlooked
for a promotion to the position of a vice president (VP). The company approaches the sales manager and
offers them a position as VP for sales on the condition of bringing the manager's existing customer list
and contacts to the new role. The sales manager is bound by a noncompete clause. Which type of
decision-making process did the company follow? - CORRECT ANSWERS Unethical and illegal



An analyst at the technology firm receives written permission from management to take an additional
part-time job at an external consulting firm. The analyst is currently under a strict nondisclosure
agreement (NDA) with the technology firm and has made external consulting firm aware of the NDA
terms. When the analyst starts work on the first project, the external consulting firm asks for but does
not require the analyst to share details about a specific client project protected under the NDA that the
analyst previously worked on with the technology firm. Which type of decision-making process did
external consulting firm follow? - CORRECT ANSWERS Unethical and legal



The marketing department of a financial services institution asks data scientists to build a consumer
profile based on transaction data. Although company lawyers approve the request to explicitly signal
customers with potential gambling addiction problems, the data scientists refuse to build the profiles.
What describes this request? - CORRECT ANSWERS Unethical and legal



Which ethical concept is related to the right to use a person's or an organization's intangible creative
activities? - CORRECT ANSWERS Property



A data analyst at a credit reporting agency notices an issue with a quality assurance sampling of
consumer credit reports. The information is incomplete and, in some cases, entered incorrectly. This
often results in lower credit scores for consumers. Which ethical issue is the agency involved in? -
CORRECT ANSWERS Accuracy

, What is a reason for organizations to pursue corporate social responsibility (CSR) goals? - CORRECT
ANSWERS Gain goodwill



A police department employee has access to data related to an ongoing investigation. A local politician
whom the employee supports has come under investigation. The employee accesses the data relating to
the investigation and provides the file to the politician anonymously. How should this behavior be
classified? - CORRECT ANSWERS Industrial espionage



An IT manager implements security measures at the organization, network, application, and employee
levels. Which approach to security is the manager using? - CORRECT ANSWERS Layered



A new startup tech company plans to provide secure wireless access within its office for employees and
other trusted visitors. The company has concerns about competitors eavesdropping or compromising
the connections and obtaining unauthorized access to the company's intellectual property. The
company is considering using Wireless Protected Access 2 (WPA2) to secure data in transit. Which
protocol does this wireless protection implement? - CORRECT ANSWERS Advanced Encryption
Standard (AES)



A Federal Bureau of Investigation (FBI) agent monitors a telephone conversation between a 12-year-old
child and the child's stepfather. The monitoring is part of a criminal investigation. A warrant was not
obtained prior to commencement of the monitoring. Which law or regulation did the agent violate? -
CORRECT ANSWERS Wiretap Act



A U.S. company launched an e-commerce platform in the European Union (EU). The board of directors
raised concerns about compliance with applicable privacy regulations and the collection of customer
information. Which regulation applies to this scenario? - CORRECT ANSWERS General Data
Protection Regulation



A social media website collected personal information about consumers when they subscribed to the
service. Subscribers opted in or out before creating their online profiles. Which European Union Data
Protection Directive did the website follow? - CORRECT ANSWERS Choice
$18.89
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TOPTUTOR01 Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
29
Miembro desde
3 año
Número de seguidores
26
Documentos
2883
Última venta
6 meses hace

5.0

2 reseñas

5
2
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes