Pass the WGU Courses and Certificates Ethics-In-Technology Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

A new Al-driven software package helps schools determine the best type of online learning support based on the current racial segments of students. The developer selected zip codes as a method for identifying specific groups.

Which source of bias does this approach introduce into the system?

Options:

A.

Tainted examples


B.

Skewed sample


C.

Proxy discrimination


D.

Limited features


Expert Solution
Questions # 12:

An individual soils a used television on an e-commerce website without knowing or disclosing that it is damaged Which two ethical problems is the seller engaged in? Choose 2 answers.

Options:

A.

Negligence


B.

Breach of contract


C.

Conflict of interest


D.

Misrepresentation


Expert Solution
Questions # 13:

A company builds a new artificial intelligence (Al) system that helps address drug and alcohol use disorders by developing an individualized plan to support people with one of these disorders. The system developers load nationwide information from the last 20 years to provide a baseline for the Al to analyze. Upon activating the system, the company receives complaints about bias against minorities with a drug or alcohol use disorder.

What introduced bias into the system?

Options:

A.

Size disparity


B.

Skewed sample


C.

Proxy data


D.

Limited features


Expert Solution
Questions # 14:

The retail store manager of a telecommunications service provider has been manually entering the data record of device returns into the company's device database every time a subscriber swaps their old phone for a new one. A recent internal audit revealed that several device records are missing from the device database.

Which aspect of data management should the store employ to avoid this situation?

Options:

A.

Encryption


B.

Collection


C.

Availability


D.

Accuracy


Expert Solution
Questions # 15:

A cloud computing company uses machine learning software to screen the resumes of job seekers. The company's aim is to reduce potential human prejudice in the hiring process. To set up the software and train the machine learning model, the company provides information from its hiring decisions over the past five years. After several months of using the software, the company runs an audit and finds that the software screens out minority job seekers at a much higher rate.

Which behavior is the trained machine learning model displaying?

Options:

A.

Exposing bias that exists in the data


B.

Acting fairly toward candidates


C.

Exhibiting intent to harm applicants


D.

Scoring low humility measurement


Expert Solution
Questions # 16:

Employee A works as a developer for a software company. Their sibling is also a developer at a competitor company. Both companies are working on a similar application. The sibling's company struggles to get a feature to work, so the sibling copies the source code for the relevant sections of the application from Employee A's laptop after it was left unattended.

How should this behavior be classified?

Options:

A.

Nepotism


B.

Conflict of interest


C.

Industrial espionage


D.

Corruption


Expert Solution
Questions # 17:

A bank customer recently received a mailer from a third party affiliated with the customer's bank. The customer is concerned because the mailer includes information about the customer's remaining mortgage amount.

What is a rule or provision of the Gramm-Leach-Bliley Act (GLBA) that provides a process for the customer to control this type of information?

Options:

A.

Financial privacy


B.

Pretexting


C.

Consumer protection


D.

Safeguards


Expert Solution
Questions # 18:

A customer places an order for a product on an e*commerce site after reviewing the quantity and pricing on the online form. The customer then receives an email confirmation that displays different pricing than the order form. The customer reports the discrepancy to customer service.

Which security practice is this customer addressing?

Options:

A.

Availability


B.

Integrity


C.

Accessibility


D.

Confidentiality


Expert Solution
Questions # 19:

Which act prohibits U.S. government agencies from concealing the existence of personal data record-keeping systems?

Options:

A.

Electronic Communications Privacy Act


B.

Family Educational Rights and Privacy Act


C.

Privacy Act


D.

Right to Financial Privacy Act


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions