D333 Ethics in Technology - Set 5 - Part 1

Test your knowledge of technical writing concepts with these practice questions. Each question includes detailed explanations to help you understand the correct answers.

Question 1: Which regulation mandates schools and libraries to implement filters to block inappropriate content for minors accessing the internet?

Question 2: Which ethical concern arises when an IT worker prioritizes personal gain over the company's or client's interest?

Question 3: What is the primary purpose of the Communications Assistance for Law Enforcement Act (CALEA)?

Question 4: Which ethical framework focuses on maximizing the greatest good for the greatest number of people?

Question 5: A company decides to implement machine learning for customer profiling but fails to obtain consent from customers. Which data privacy principle has been violated?

Question 6: Which organization is known for setting industry standards and providing certification in the field of cybersecurity?

Question 7: Which type of intellectual property protection can be used to protect the source code of a new software program?

Question 8: A developer intentionally writes malicious code into a program that activates on a specific date. What type of malware is this?

Question 9: Which law requires companies in the European Union to follow strict guidelines for the protection and processing of personal data?

Question 10: A company uses customer data without consent to target ads more effectively. What ethical issue does this practice raise?

Question 11: A company fails to encrypt sensitive financial data, leading to unauthorized access. Which regulation has likely been violated?

Question 12: Which ethical theory focuses on fulfilling moral duties regardless of the outcomes?

Question 13: What is the primary function of the CAN-SPAM Act?

Question 14: A manager asks an employee to engage in unethical behavior to meet a tight project deadline. Which ethical issue does this create?

Question 15: A company allows employees to access the company network remotely, but fails to implement two-factor authentication. What risk does this create?

Question 16: What is the ethical issue raised when a company reverse engineers a competitor’s software to gain a competitive advantage?

Question 17: A company uses its internal system to monitor employee emails without informing them. What ethical issue does this practice raise?

Question 18: Which type of malware disguises itself as a legitimate program in order to gain access to a system?

Question 19: A healthcare organization allows unauthorized access to patient records due to insufficient encryption. Which law has likely been violated?

Question 20: What is the main ethical concern with using biased data sets to train an AI system?


Complete the Captcha to view next question set.

Need Guaranteed Results?

Our exam support service guarantees you'll pass your OA on the first attempt. Pay only after you pass!

Get Exam Support