Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A large telecommunications company pledged to adopt green computing in everything it does. The telecommunications company hired a consulting firm to help it evaluate, compare, and select supplies based on standard eco-friendly criteria.

What should the consulting firm use to help achieve this goal?

A.

Electronic Product Environmental Assessment Tool (EPEAT).

B.

Environmental impact assessment (EIA).

C.

Professional employer organization (PEO)

D.

Restriction of Hazardous Substances Directive (RoHS)

What are two outcomes of adherence to a professional code of ethics for individuals, their profession, and society as a whole? Choose 2 answers.

A.

Standardized business practices

B.

Consistent decision-making

C.

Assured employer integrity

D.

Faster career advancement

How can organizations differentiate between ethical decision-making and legal decision-making frameworks?

A.

Legal decision-making frameworks provide a complete guide to ethical decision-making but go beyond to encompass decision-making tools to employ in situations where the ethical code is not clearly defined or easily applied.

B.

Ethical decision-making frameworks help an organization uphold a code of behavior generally agreed upon by the members of the larger society which the organization operates in. Legal decision-making frameworks help an organization to navigate a set of rules that convey what people can and cannot do.

C.

Ethical decision-making frameworks help an organization navigate a set of rules that convey what people can and cannot do. Legal decisionmaking frameworks help an organization uphold a code of behavior generally agreed upon by members of the larger society which the organization operates in.

D.

Ethical decision-making frameworks provide a complete guide to legal decision-making but go beyond to encompass decision-making tools to employ in situations where the law is not clearly defined or easily applied.

Which act prohibits U.S. government agencies from concealing the existence of personal data record-keeping systems?

A.

Electronic Communications Privacy Act

B.

Family Educational Rights and Privacy Act

C.

Privacy Act

D.

Right to Financial Privacy Act

A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.

Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?

A.

Minimizing scope creep requests from the customer

B.

Improving decision-making around agreeing to additional scopes

C.

Avoiding the delivery of an incompatible solution

D.

Understanding the legal implications of noncontractual agreements

A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.

Which ethical theory does this approach represent?

A.

Deontology

B.

Relativism

C.

Virtue

D.

Consequentialism

What is the first step in ethical decision-making for an IT professional?

A.

Choose an alternative

B.

Develop a problem statement

C.

Implement a solution

D.

Identify alternatives

An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.

Which security practice has been violated?

A.

Availability

B.

Accessibility

C.

Integrity

D.

Confidentiality

An organization plans to hire three external software engineers to build client software to connect its lightweight wireless devices to the cloud. It will do so according to specific terms and a specific duration defined in a legal document. The duration of the work will be six months.

Which workforce category should the organization hire within?

A.

Full-time employees

B.

In-house expertise

C.

Part-time salaried workers

D.

Independent contractors