100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D333 Ethics in Technology (Chp 1-10) Exam Questions & Answers Latest Update A+ Scored.pdf

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
22-02-2025
Geschreven in
2024/2025

WGU D333 Ethics in Technology (Chp 1-10) Exam Questions & Answers Latest Update A+ S

Instelling
WGU D333 Ethics In Technology
Vak
WGU D333 Ethics In Technology









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU D333 Ethics In Technology
Vak
WGU D333 Ethics In Technology

Documentinformatie

Geüpload op
22 februari 2025
Aantal pagina's
6
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU D333 Ethics in Technology (Chp 1-10) Exam Questions
& Answers Latest Update A+ Scored

Terms in this set (330)

A document that stipulates restrictions and practices that a user must agree in
acceptable use policy (AUP)
order to use organizational computing and network resources.

When an organization decides to accept a risk because the cost of avoiding the
risk outweighs the potential loss of the risk. A decision to accept a risk can be
extremely difficult and controversial when dealing with safety-critical systems
acceptance because making that determination involves forming personal judgments about
the value of human life, assessing potential liability in case of an accident,
evaluating the potential impact on the surrounding natural environment, and
estimating the system's costs and benefits.

A network attack in which an intruder gains access to a network and stays there—
advanced persistent threat (APT) undetected—with the intention of stealing data over a long period of time (weeks
or even months).

A software development methodology in which a
system is developed in iterations lasting from
one to four weeks. Unlike the waterfall system
agile development development model, agile development accepts
the fact that system requirements are evolving
and cannot be fully understood or defined at the
start of the project.

An agreement of the World Trade Organization that requires member
Agreement on Trade-Related Aspects of governments to ensure that intellectual property rights can be enforced under
Intellectual Property Rights (TRIPS) their laws and that penalties for infringement are tough enough to deter further
violations.

A wide-ranging act that authorized $787 billion in spending and tax cuts over a 10-
year period and included strong privacy provisions for electronic health records,
American Recovery and Reinvestment Act
such as banning the sale of health information, promoting the use of audit trails
and encryption, and providing rights of access for patients.

The estimated loss from a potential risk event over the course of a year. The
following equation is used to calculate the annual loss expectancy: ARO × SLE =
annualized loss expectancy (ALE) ALE. Where ARO is the annualized rate of occurrence, an estimate of the
probability that this event will occur over the course of a year and SLE is the single
loss expectancy, the estimated loss that would be incurred if the event happens.

annualized rate of occurrence (ARO) An estimate of the probability that a risk event will occur over the course of a year.

anonymous expression The expression of opinions by people who do not reveal their identity.

A service that allows anonymity on the Internet by using a computer program that
anonymous remailer service strips the originating header and/or IP address from the message and then
forwards the message to its intended recipient.

Laws designed to reduce frivolous SLAPPs (strategic lawsuit against public
participation (SLAPP), which is a lawsuit filed by corporations, government
anti-SLAPP laws
officials, and others against citizens and community groups who oppose them on
matters of concern).

Software that scans for a specific sequence of bytes, known as a virus signature,
antivirus software
that indicates the presence of a specific virus.

, The people, procedures, hardware, software, data, and knowledge needed to
develop computer systems and machines that can simulate human intelligence
processes, including learning (the acquisition of information and rules for using
artificial intelligence systems
the information), reasoning (using rules to reach conclusions), and self-correction
(using the outcome from one scenario to improve its performance on future
scenarios).

A group that provides assistance to the board of directors in fulfilling its
responsibilities with respect to the oversight of the quality and integrity of the
organization's accounting and reporting practices and controls, including financial
audit committee statements and reports; the organization's compliance with legal and regulatory
requirements; the qualifications, independence, and performance of the
company's independent auditor; and the performance of the company's internal
audit team.

The elimination of a vulnerability that gives rise to a particular risk in order to avoid
avoidance the risk altogether. This is the most effective solution but often not possible due to
organizational requirements and factors beyond an organization's control.

The moral corruption of people in power, which is often facilitated by a tendency
Bathsheba syndrome
for people to look the other way when their leaders act inappropriately.

A method or technique that has consistently shown results superior to those
best practice achieved with other means and that is used as a benchmark within a particular
industry.

The first 10 amendments to the United States Constitution that spell out additional
Bill of Rights
rights of individuals.

A type of dynamic testing that involves viewing the software unit as a device that
black-box testing has expected input and output behaviors but whose internal workings are
unknown (a black box).

A sophisticated threat that combines the features of a virus, worm, Trojan horse,
blended threat
and other malicious code into a single payload.

An agreed-upon sets of skills and abilities that all licensed professionals must
body of knowledge
possess.

A large group of computers, which are controlled from one or more remote
botnet
locations by hackers, without the knowledge or consent of their owners.

breach of contract The failure of one party to meet the terms of a contract.

breach of the duty of care The failure to act as a reasonable person would act.

breach of warranty When a product fails to meet the terms of its warranty.

The act of providing money, property, or favors to someone in business or
bribery
government in order to obtain a business advantage.

A business policy that permits, and in some cases, encourages employees to use
their own mobile devices (smartphones, tablets, or laptops) to access company
bring your own device (BYOD)
computing resources and applications, including email, corporate databases, the
corporate intranet, and the Internet.

A trade group that represent the world's largest software and hardware
BSA | The Software Alliance
manufacturers.

A risk-based strategy that includes an occupant emergency evacuation plan, a
continuity of operations plan, and an incident management plan with an active
business continuity plan governance process to minimize the potential impact of any security incident and
to ensure business continuity in the event of a cyberattack or some form of
disaster.

A set of interrelated components—including hardware, software, databases,
business information system networks, people, and procedures—that collects and processes data and
disseminates the output.
€5,22
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
Epitomizer

Maak kennis met de verkoper

Seller avatar
Epitomizer Exam
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1
Lid sinds
11 maanden
Aantal volgers
0
Documenten
74
Laatst verkocht
1 maand geleden

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen