• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Ethics in Technology practice questions

Latest WGU Jan 14, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Ethics in Technology practice questions (1 review) Students also studied Terms in this set (122) Western Governors UniversityD 333 Save D 333 Ethics in Technology Practice ...145 terms Ken_lester_Preview Section 3 Assessment Review 15 terms Lexine_HenryPreview Ethical Frameworks in Technology 11 terms dasblueeyeddevil Preview

D333 -

27 terms pwe Which entity provides a technology code of ethics to its constituents?1) The Federal Government 2) The State Government 3) A Technology Vendor 4) A Professional Organization 4 Person A uses Person B's social security number and Person B's mother's maiden name to reset the online password for Person B's cell phone account. Person A is then able to enter the account to review Person B's text messages and phone records from the past month of usage. - What is this action an example of?1) Misrepresentation 2) Software piracy 3) Fraud 4) Industrial espionage 1 What is the ethical issue concerning these posted images or videos of unsuspecting users?1) Identity theft 2) Defamation 3) Anonymous expression 4) Fight words 1

Person A uses Person B's social security number and Person B's mother's maiden name to reset the online password for Person B's cell phone account. Person A is then able to enter the account to review Person B's text messages and phone records from the past month of usage. - What is this action an example of?Misrepresentation Software piracy Fraud Industrial espionage Three years after this student graduates, she invites friends and business leaders to the launch of her startup.Halfway through the celebration, her two friends from school realize she implemented the business plan without asking them for permission or inviting them to be partners. She offers to pay them a set amount to walk away. - What are two ethical violations made by this business owner?1) Bribery 2) Fraud 3) Piracy 4) Breach of Contract

  • & 4
  • Which regulation is relevant to this video game company's actions with the children users?1) Children's Online Privacy Protection Act (COPPA) 2) Children and Young Persons Act 1933 3) Omnibus Crime Control and Safe Streets Act 4) The First Amendment 1 Which organization would offer more comprehensive training programs to support caregivers?1) Centers for Medicare & Medicaid Services (CMS) 2) Food and Drug Administration (FDA) 3) National Patient Safety Foundation (NPSF) 4) Association Society of Health‐System Pharmacists

(ASHP)

1

Three years after this student graduates, she invites friends and business leaders to the launch of her startup.Halfway through the celebration, her two friends from school realize she implemented the business plan without asking them for permission or inviting them to be partners. She offers to pay them a set amount to walk away.How should the actions of this business owner be described?1) Illegal but ethical 2) Illegal and unethical 3) Legal and ethical 4) Legal but unethical 2 An IT professional traveling for a work assignment decides to take a detour for personal business, and due to excessive speed, causes an auto accident.Who is responsible for damages?1) IT workers who breach the duty of care are accountable for injuries.2) The company owns the vehicle and is, thus, liable for negligence.3) Determination of liability is the responsibility of the police.4) Both the IT professional and the business must make reparations 1 What is a description of the threat to the customer data?1) Unintended release of sensitive data or the access of sensitive data by authorized individuals 2) Intended release of sensitive data or the access of sensitive data by authorized individuals 3) Unintended release of sensitive data or the access of sensitive data by unauthorized individuals 4) Intended release of sensitive data or the access of sensitive data by unauthorized individuals 2 What is a description of the threat to the data?1) Unintended release of sensitive data or the access of sensitive data by authorized individuals 2) Intended release of sensitive data or the access of sensitive data by authorized individuals 3) Unintended release of sensitive data or the access of sensitive data by unauthorized individuals 4) Intended release of sensitive data or the access of sensitive data by unauthorized individuals 4

What can organizations do to assist the sandwich generation in understanding the importance of protecting personal and financial information?1) Have IT, financial, and medical professionals conduct monthly information sessions for the community 2) Have IT, financial, and medical professionals conduct monthly information sessions for the employees 3) Have IT, financial, and medical professionals mail information to some of the community members 4) Have only IT professionals conduct monthly information sessions for the community 1 Which privacy law was violated by these pharmacy employees?

1) GLB

2) HIPAA

3) FERPA

4) PCI

2 What describes an employee's legal rights when an employer is using an auto-tracking device to monitor the employee's whereabouts?1) The employer must obtain employee consent before installing an auto-tracking device.2) Employees are legally bound to the company and cannot turn off the GPS device.3) It is a company-owned vehicle, and IT workers have no lawful recourse.4) State law prohibits employees from filing an invasion of privacy lawsuit.1 What may be a representation of data that may be inappropriately shared by an IT professional?1) Employee records 2) Benefits plans 3) Profit and loss 4) Directories 1 Which element states what actions will be taken against an individual who violates an acceptable use policy

(AUP)?

1) Scope 2) Sanctions 3) Purpose 4) Compliance 2

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document provided in-depth analysis, which helped me ace my presentation. Absolutely excellent!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 14, 2026
Description:

Ethics in Technology practice questions (1 review) Students also studied Terms in this set Western Governors UniversityD 333 Save D 333 Ethics in Technology Practice ... 145 terms Ken_lester_ Previ...

Unlock Now
$ 11.00