To establish an expectation among consumers that a professional will behave ethically, a nonprofit society publishes a professional code of ethics. Which benefit can be directly derived from this effort?
A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.
Aninsurance company develops an artificial intelligence (Al) system to manage claims automatically. Although this technology benefits most customers, people from neighborhoods associated with a low socioeconomic status find it harder to get their claims approved. The company decides to keep using the system.
Which ethical theory justifies the company to come to this decision?
A new IT employee has questions about how the organization determines resolutions to issues that impact its values and overarching principles. What should the employee refer to first for guidance?
A large telecommunications company pledged to adopt green computing in everything it does. The telecommunications company hired a consulting firm to help it evaluate, compare, and select supplies based on standard eco-friendly criteria.
What should the consulting firm use to help achieve this goal?
A company struggles to maintain project schedules with its current resource capacity. With a new set of corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to help fill the gap.
What is a disadvantage of using contingent workers to support the company's goals?
Which legislation provides a safe harbor for internet service providers (ISPs) whose customers violate intellectual property rights?
An organization creating a new consumer-profiling software tool has concerns about the software's ability to accurately capture and process data. The team decides to use an iterative approach to write the code, allowing for continuous testing and adjustment of requirements. The organization believes this will help ensure the software's data collection capabilities are both efficient and accurate.
Which methodology has the organization employed?
A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.
Which ethical theory does this approach represent?
An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.
Which security practice has been violated?
A consulting company employs H-1B workers. Even though companies applying for H*1B visas must offer a wage that is at least 95% of the average salary for the occupation, a close review of salarieswithin the consulting firm suggests that its H-1B workers are often paid 20% less on average than those with similar skill sets.
Which loophole is the company using to avoid paying H-1B workers a fair wage?
A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.
Which method of attack was used to compromise the worker's machine?
A malicious hacker takes over several computers via the internet and causes them to flood a target site with high volumes of data queries and other small tasks. Which type of attack is the hacker performing against the target site?
Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?
What is the first step in ethical decision-making for an IT professional?
A team of game designers must decide if players whose game characters commit violent and unlawful acts should be rewarded. The team agrees that the acts are simul-ations, and the game will be rated for adult or mature audiences. One designer raises questions about how contributing to this work will reflect upon the team's moral character.
Which ethical theory does this represent?
An auto manufacturer is developing a new line of autonomous vehicles. Multiple accidents, including fatalities, involving competitors' autonomous vehicles have already occurred. Management is concerned about potential liability, reputational damage, and financial loss. In response, the system safety engineer conducts a review at each stage of the software development process to record, assess, and account for detected issues.
Which type of log is the system safety engineer using?
A bank customer recently received a mailer from a third party affiliated with the customer's bank. The customer is concerned because the mailer includes information about the customer's remaining mortgage amount.
What is a rule or provision of the Gramm-Leach-Bliley Act (GLBA) that provides a process for the customer to control this type of information?
Which piece of legislation outlines who may access a person's credit data?