A hospital is struggling with adverse patient outcomes caused by avoidable medication errors. Many of these errors are due to illegible writing by the prescribing physician or incomplete data (or the prescribed medication and dose.
Which technology system reduces these errors?
A company notices a drift in model performance due to suspicious alterations of the source data. It hires a specialist to test the security of its information systems and look for vulnerabilities attackers might have exploited.
Which name describes this specialist?
Which organization licenses software developers who implement safety and health software in the United States?
A company struggles to maintain project schedules with its current resource capacity. With a new set of corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to help fill the gap.
What is a disadvantage of using contingent workers to support the company's goals?
A company builds a new artificial intelligence (Al) system that helps address drug and alcohol use disorders by developing an individualized plan to support people withone of these disorders. The system developers load nationwide information from the last 20 years to provide a baseline for the Al to analyze. Upon activating the system, the company receives complaints about bias against minorities with a drug or alcohol use disorder.
What introduced bias into the system?
An engineer is working on a project to manufacture radar processing equipment for the U.S. military. As part of the project contract, all devices must be new. The engineer discovers that the manufacturer has a policy of using refurbished parts. The engineer speaks to their manager about it and is ignored.
What should this engineer do?
An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information. Which ethical issue does this incident pose?
A group of hackers manipulated data to disable the national energy infrastructure for its political goals. Which type of attack did the group employ?
A company has used Its credit approval system for a long time. A risk evaluation director initiates an update of the data model to make sure it meets the highest ethical standards. Which Software Engineering Code of Ethics and Professional Practice principle does the director's action represent?
A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?
An organization is implementing a new computerized manufacturing system. The organization is concerned about proving the level of quality based on standards related to the system and associated processes.
Which International Organization for Standardization (ISO) standard certification should the organization seek to achieve this specific goal?
A company needs to fill a specialized, long-term engineering role. The worker in this role needs to work on-site and use a company-provided laptop for security. The company's corporate code of ethics dictates that it should prioritize economic empowerment in its local community. The company has not been successful in sourcing local candidates.
Which type of worker should the company consider expanding its candtdate pool to include?
A company wants to improve its chances of winning business with a prospective client. The company sends an expensive watch to the home address of each of the client's directors. Which ethical issue is the company engaging in?
A large telecommunications company pledged to adopt green computing in everything it does. The telecommunications company hired a consulting firm to help it evaluate, compare, and select supplies based on standard eco-friendly criteria.
What should the consulting firm use to help achieve this goal?
An internet company develops a search engine to index websites and documents published online. The index displays short excerpts from search results in response to queries. Many of the indexed sites and documents are copyrighted.
Which doctrine covers the company's employment and reproduction of these materials?
What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?