Ethics-In-Technology 無料問題集「WGU Ethics In TechnologyQCO1」

Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?

An organization plans to hire three external software engineers to build client software to connect its lightweight wireless devices to the cloud. It will do so according to specific terms and a specific duration defined in a legal document. The duration of the work will be six months.
Which workforce category should the organization hire within?

A company struggles to maintain project schedules with its current resource capacity. With a new set of corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to help fill the gap.
What is a disadvantage of using contingent workers to support the company's goals?

A software company continues to refine and update the predictive algorithm that makes its product the market leader. Although the company announces some changes, most are unannounced so that people and businesses remain unaware.
What is this company protecting?

Aninsurance company develops an artificial intelligence (Al) system to manage claims automatically.
Although this technology benefits most customers, people from neighborhoods associated with a low socioeconomic status find it harder to get their claims approved. The company decides to keep using the system.
Which ethical theory justifies the company to come to this decision?

A company needs to fill a specialized, long-term engineering role. The worker in this role needs to work on- site and use a company-provided laptop for security. The company's corporate code of ethics dictates that it should prioritize economic empowerment in its local community. The company has not been successful in sourcing local candidates.
Which type of worker should the company consider expanding its candtdate pool to include?

Employee A works as a developer for a software company. Their sibling is also a developer at a competitor company. Both companies are working on a similar application. The sibling's company struggles to get a feature to work, so the sibling copies the source code for the relevant sections of the application from Employee A's laptop after it was left unattended.
How should this behaviorbe classified?

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡