ITE302C EXAM
QUESTIONS
AND ANSWERS
Which of the following defines the AI black box problem?
A. A dangerous machine intelligence put in a digital prison
B. Machine intelligence making something illusory, like pulling a rabbit from a hat
C. The challenge of understanding the inner workings of opaque systems
D. Not being able to know how something crashed or failed - Answers -C
Which of the following elements are important aspects of ethical integrity with regards to
data? (Select two.)
A. If the holders of data are trustworthy entities.
B. If the data is commercially viable or monetarily valuable.
C. Whether the data was gathered in an ethical manner.
D. What type of data (audio, visual, etc.) is being collected and/or utilized. - Answers -A
C
Which of the following best describes why data is sometimes compared to oil? (Select
two.)
A. Data can be monetarily valuable.
B. Data can damage the environment.
C. Data can be easily monopolized.
D. Data can fuel algorithmic technologies. - Answers -A D
At what point should ethical consideration ideally be applied to emerging technologies?
A. Upon delivery, with appropriate warranties where necessary.
B. During periodic reviews, with ongoing customer feedback solicited.
C. From its inception, through maintenance, to applying foresight regarding its
decommissioning.
D. Once an ethical issue has received negative feedback in public media. - Answers -C
,Why are groups like race and religion considered protected classes?
A. These groups have been used as the basis for wholesale discrimination.
B. These groups can be used to personally identify someone.
C. People use these groups as the basis for their identities.
D. Organizations are legally not allowed to collect information about these groups. -
Answers -A
Which of the following describes an opt-out policy in regards to the collection of private
data?
A. Data about the user is always collected, regardless of the user's consent.
B. Data about that user isn't collected until that user explicitly states you are allowed to.
C. Data about the user is never collected, regardless of the user's consent.
D. Data about the user is automatically collected unless that user explicitly states that
you should not do so. - Answers -D
Which of the following are key principles of privacy by design? (Select two.)
A. Organizations must incorporate privacy protections throughout the project lifecycle.
B. Organizations must keep the focus of privacy protections on the business rather than
the user.
C. Organizations must not expose the operational practices and technologies used to
protect user privacy.
D. Organizations must be proactive in protecting against privacy risks, not reactive. -
Answers -A D
What is the purpose of differential privacy?
A. To only allow certain parties to access certain portions of the data.
B. To enable parties to share private data without revealing individuals represented in
the data.
C. To remove the direct identifiers that can be used to identify individuals.
D. To ensure the data is completely confidential and cannot be read by unauthorized
parties. - Answers -B
Differential privacy is a mathematical framework for ensuring the privacy of individuals
in datasets. It can provide a strong guarantee of privacy by allowing data to be analyzed
without revealing sensitive information about any individual in the dataset.
Differential privacy works by adding noise to the data in a controlled way. This noise
makes it difficult to tell whether a particular individual's information was used in the
computation. This means that even if an attacker has access to the output of the
computation, they cannot be sure which individual's data was used.
Which of the following describes the concept of liability?
A. Answering for one's actions to an authority figure.
B. Taking ownership of an assigned task.
C. The legal responsibility for one's actions.
D. The moral duty one has to take action. - Answers -C
,What does it mean to call a click-through agreement a "contract of adhesion"?
A. Both parties are equally responsible for ensuring the agreement is adhered to.
B. One party is forced into a "take-it-or-leave-it" situation.
C. One party is forced into using the service after agreeing.
D. Both parties are legally bound by the agreement. - Answers -B
A contract of adhesion is a type of contract where one party has substantially more
bargaining power than the other party. This means that the weaker party has no real
choice but to accept the terms of the contract as they are presented. Click-through
agreements are often considered to be contracts of adhesion because the user is
typically presented with a long list of terms and conditions that they must agree to in
order to use the service. The user often does not have the opportunity to negotiate the
terms of the agreement, and they are essentially forced to take it or leave it.
Which of the following is a type of technology contract that establishes the goals of both
parties and describes how those goals will be achieved?
A. Software as a Service (SaaS)
B. Service-level agreement (SLA)
C. Terms of Service (ToS)
D. End-user license agreement (EULA) - Answers -B
Option A, Software as a Service (SaaS), is a type of cloud computing service. It is not a
contract.
Option C, Terms of Service (ToS), is a legal agreement that outlines the terms and
conditions of using a website or online service. It is not a contract that establishes the
goals of both parties.
Option D, End-user license agreement (EULA), is a legal agreement that grants a user
the right to use software. It is not a contract that establishes the goals of both parties.
How does a smart contract differ from a traditional contract?
A. Smart contracts eliminate the need for a central authority.
B. Smart contracts guarantee that all parties are anonymous.
C. Smart contracts serve a different purpose than traditional contracts.
D. Smart contracts are more effective than traditional contracts. - Answers -A
How can a visual contract be easier to understand than a written contract?
A. The use of pictures is more accessible to all people, whereas a written contract may
be difficult for someone with a reading disability to understand.
B. The use of pictures without any text makes it easier for most people to comprehend
the details of a contract.
C. The use of pictures with simple text makes it easier for the layperson to understand
the details of a contract.
D. The use of pictures explains the contract in greater detail than a written contract,
making it easier for anyone to understand the particulars. - Answers -C
What causes bias?
, A. Biases are caused by the opinions of our families.
B. Bias is biological, we are born with it.
C. Bias is caused by the media.
D. Biases are learned from our families, our social groups, and the media. - Answers -D
What is the fundamental attribution error?
A. When you believe your chances of experiencing something negative are lower and
your chances of experiencing something positive are higher than others.
B. When you believe your ideas are normal and that the majority of people agree with
you.
C. When you say your bad behavior is caused by the situation, but when other people
display the same bad behavior, it is caused by a personality trait.
D. When you incorrectly assume a cause and effect relationship for two correlated
variables. - Answers -C
Which of the following are actions that can help combat implicit bias? (Select three.)
A. Interacting with diverse groups of people.
B. Surrounding yourself with others who have similar experiences.
C. Cultivating awareness of your own biases.
D. Exposing yourself to "counter-stereotypical" examples.
E. Obtaining your information from the same one or two media sources that your family
and friends access. - Answers -A C D
When conducting an opinion poll, which of the following biases do you need to guard
against the most when collecting your data?
A. Correlation bias
B. Modeling bias
C. Misclassification bias
D. Sampling bias - Answers -D
Which of the following is an example of a cognitive bias?
A. Correlation bias
B. Modeling bias
C. Misclassification bias
D. Anchoring bias - Answers -D
Anchoring bias is a cognitive bias that occurs when people rely too heavily on the first
piece of information they are given when making a decision. This can lead to people
making inaccurate judgments or decisions.
Other examples of cognitive biases include:
Confirmation bias: The tendency to seek out information that confirms our existing
beliefs and to ignore information that contradicts them.
Availability heuristic: The tendency to make judgments based on information that is
easily available to us, even if it is not the most accurate information.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Greaterheights. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.89. You're not tied to anything after your purchase.