[Feb 04, 2025] Prepare For The Ethics-In-Technology Question Papers In Advance [Q40-Q60]


给本帖评分

[Feb 04, 2025] Prepare For The Ethics-In-Technology Question Papers In Advance

Ethics-In-Technology PDF Dumps Real 2025 Recently Updated Questions

新问题 40
An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient’s ailment is. The nurse accesses the patient’s medical record and is subsequently flagged for unauthorized access.
Which law has the nurse violated?

 
 
 
 

新问题 41
A company notices a drift in model performance due to suspicious alterations of the source data. It hires a specialist to test the security of its information systems and look for vulnerabilities attackers might have exploited.
Which name describes this specialist?

 
 
 
 

新问题 42
What are two outcomes of adherence to a professional code of ethics for individuals, their profession, and society as a whole? Choose 2 answers.

 
 
 
 

新问题 43
A customer places an order for a product on an e*commerce site after reviewing the quantity and pricing on the online form. The customer then receives an email confirmation that displays different pricing than the order form. The customer reports the discrepancy to customer service.
Which security practice is this customer addressing?

 
 
 
 

新问题 44
An individualsoils a used television on an e-commerce website without knowing or disclosing that it is damaged Which two ethical problems is the seller engaged in? Choose 2 answers.

 
 
 
 

新问题 45
A team of game designers must decide if players whose game characters commit violent and unlawful acts should be rewarded. The team agrees that the acts are simul-ations, and the game will be rated for adult or mature audiences. One designer raises questions about how contributing to this work will reflect upon the team’s moral character.
Which ethical theory does this represent?

 
 
 
 

新问题 46
Which organization licenses software developers who implement safety and health software in the United States?

 
 
 
 

新问题 47
A company struggles to maintain project schedules with its current resource capacity. With a new set of corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to help fill the gap.
What is a disadvantage of using contingent workers to support the company’s goals?

 
 
 
 

新问题 48
A hospital is struggling with adverse patient outcomes caused by avoidable medication errors. Many of these errors are due to illegible writing by the prescribing physician or incomplete data (or the prescribed medication and dose.
Which technology system reduces these errors?

 
 
 
 

新问题 49
After Alliah Company and Quiet Flag Industries signed an exclusive data exchange deal, Alliah Company received a better offer from Endothon Company. Despite legal obligations. Alliah Company signs a deal with Endothon Company and immediately ceases activities with Quiet Flag Industries.
Which ethical issue is Alliah Company engaging in by signing the deal with Endothon Company and ceasing activities with Quiet Flag Industries?

 
 
 
 

新问题 50
A company is bidding on a website project for a prospective client. The company knows that the client is going to weigh the time to deliver the project as one of its primary decision factors. The client has advised all bidders that completion time should be no more than three months with a budget of S50.000.
The company knows that with its current resourcing, it cannot complete the project in less than four months.
However, it is confident that it will be able to deliver within four months to a high-quality standard and 20% under the set budget. The company advises the client that it would need four months but would be able to complete the project under budget.
What is this behavior considered?

 
 
 
 

新问题 51
An incident handler discovers an unauthorized change in the security key vault’s database file, which caused a disclosure of confidential information. Which ethical issue does this incident pose?

 
 
 
 

新问题 52
To gather data for improved customer profiles, a social media platform uses microphone data from its users in the United States. Which U.S. Constitulional amendment does this action violate?

 
 
 
 

新问题 53
An internet company develops a search engine to index websites and documents published online. The index displays short excerpts from search results in response to queries. Many of the indexed sites and documents are copyrighted.
Which doctrine covers the company’s employment and reproduction of these materials?

 
 
 
 

新问题 54
An organization plans to hire three external software engineers to build client software to connect its lightweight wireless devices to the cloud. It will do so according to specific terms and a specific duration defined in a legal document. The duration of the work will be six months.
Which workforce category should the organization hire within?

 
 
 
 

新问题 55
A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm’s project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.
Which factor might have mitigated the problem if the IT firm’s project leader had abided by a professional code of ethics?

 
 
 
 

新问题 56
What is the first step in ethical decision-making for an IT professional?

 
 
 
 

新问题 57
A tech worker’s computer acts abnormally shortly after the worker starts their shift. The computer is up-to- date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.
Which method of attack was used to compromise the worker’s machine?

 
 
 
 

新问题 58
A chief financial officer (CFO) at a major telecommunications company decides to replace a high number of its customer-facing stores with artificial intelligence-enabled telecom booths. The telecom booths will enable current or new subscribers to buy or replace SIM cards or mobile phones on the go. The CFO is concerned about a major reduction in the workforce but believes this move will help grow the company’s subscriber base, reduce customer churn, and increase overall company profits.
Which ethical theory does this approach represent?

 
 
 
 

新问题 59
The retail store manager of a telecommunications service provider has been manually entering the data record of device returns into the company’s device database every time a subscriber swaps their old phone for a new one. A recent internal audit revealed that several device records are missing from the device database.
Which aspect of data management should the store employ to avoid this situation?

 
 
 
 

新问题 60
A consulting company employs H-1B workers. Even though companies applying for H*1B visas must offer a wage that is at least 95% of the average salary for the occupation, a close review of salarieswithin the consulting firm suggests that its H-1B workers are often paid 20% less on average than those with similar skill sets.
Which loophole is the company using to avoid paying H-1B workers a fair wage?

 
 
 
 

Ethics-In-Technology Dumps and Practice Test (68 Exam Questions): https://www.dumpsmaterials.com/Ethics-In-Technology-real-torrent.html

         

发表回复

發佈留言必須填寫的電子郵件地址不會公開。 必填欄位標示為 *

输入下图中的文字