WGU Ethics In Technology QCO1
Last Update Nov 30, 2025
Total Questions : 66
We are offering FREE Ethics-In-Technology WGU exam questions. All you do is to just go and sign up. Give your details, prepare Ethics-In-Technology free exam questions and then go for complete pool of WGU Ethics In Technology QCO1 test questions that will help you more.
What is the unintended source of bias in artificial intelligence (Al) algorithms?
Aninsurance company develops an artificial intelligence (Al) system to manage claims automatically. Although this technology benefits most customers, people from neighborhoods associated with a low socioeconomic status find it harder to get their claims approved. The company decides to keep using the system.
Which ethical theory justifies the company to come to this decision?
A credit reporting agency collects personally identifiable information (Pll) from customers. The agency appoints a data protection officer (DPO), who is responsible for overseeing the agency's data protection strategy and enforcing data compliance requirements.
Which legislation should the DPO use as the basis for governing the collection and disclosure of Pll?
A software development company's executive management team recently met to review its progress on ethical and social responsibility goals. After the review, the team planned a new set of goals for the upcoming year. The team shared the results of this review and the new goats with the employees and the board of directors.
Which process did the team complete?
An individualsoils a used television on an e-commerce website without knowing or disclosing that it is damaged Which two ethical problems is the seller engaged in? Choose 2 answers.
A company needs to fill a specialized, long-term engineering role. The worker in this role needs to work on-site and use a company-provided laptop for security. The company's corporate code of ethics dictates that it should prioritize economic empowerment in its local community. The company has not been successful in sourcing local candidates.
Which type of worker should the company consider expanding its candtdate pool to include?
A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.
A company is bidding on a website project for a prospective client. The company knows that the client is going to weigh the time to deliver the project as one of its primary decision factors. The client has advised all bidders that completion time should be no more than three months with a budget of S50.000.
The company knows that with its current resourcing, it cannot complete the project in less than four months. However, it is confident that it will be able to deliver within four months to a high-quality standard and 20% under the set budget. The company advises the client that it would need four months but would be able to complete the project under budget.
What is this behavior considered?
A hospital is struggling with adverse patient outcomes caused by avoidable medication errors. Many of these errors are due to illegible writing by the prescribing physician or incomplete data (or the prescribed medication and dose.
Which technology system reduces these errors?
Which legislation provides a safe harbor for internet service providers (ISPs) whose customers violate intellectual property rights?
An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.
Which security practice has been violated?
An IT company adopts a professional cod© of ethics suggested by a nationally recognized IT professionals organization. Which benefit to the company can be directly derived from adopting a professional code of ethics?
A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.
Which method of attack was used to compromise the worker's machine?
What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?
A company has used Its credit approval system for a long time. A risk evaluation director initiates an update of the data model to make sure it meets the highest ethical standards. Which Software Engineering Code of Ethics and Professional Practice principle does the director's action represent?
The retail store manager of a telecommunications service provider has been manually entering the data record of device returns into the company's device database every time a subscriber swaps their old phone for a new one. A recent internal audit revealed that several device records are missing from the device database.
Which aspect of data management should the store employ to avoid this situation?
A company builds a new artificial intelligence (Al) system that helps address drug and alcohol use disorders by developing an individualized plan to support people withone of these disorders. The system developers load nationwide information from the last 20 years to provide a baseline for the Al to analyze. Upon activating the system, the company receives complaints about bias against minorities with a drug or alcohol use disorder.
What introduced bias into the system?
A large telecommunications company pledged to adopt green computing in everything it does. The telecommunications company hired a consulting firm to help it evaluate, compare, and select supplies based on standard eco-friendly criteria.
What should the consulting firm use to help achieve this goal?
An internet company develops a search engine to index websites and documents published online. The index displays short excerpts from search results in response to queries. Many of the indexed sites and documents are copyrighted.
Which doctrine covers the company's employment and reproduction of these materials?