A company struggles to maintain project schedules with its current resource capacity. With a new set of
corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to
help fill the gap.
What is a disadvantage of using contingent workers to support the company's goals?
Employee A works as a developer for a software company. Their sibling is also a developer at a competitorcompany. Both companies are working on a similar application. The sibling's company struggles to get afeature to work, so the sibling copies the source code for the relevant sections of the application fromEmployee A's laptop after it was left unattended.How should this behaviorbe classified?
Which principle, according to the Organisation for Economic Co-operation and Development's (OECD)
privacy guidelines, states that people have the right to review their data, challenge its correctness, and have
incorrect data changed?
A chief financial officer (CFO) at a major telecommunications company decides to replace a high number ofits customer-facing stores with artificial intelligence-enabled telecom booths. The telecom booths will enablecurrent or new subscribers to buy or replace SIM cards or mobile phones on the go. The CFO is concernedabout a major reduction in the workforce but believes this move will help grow the company's subscriberbase, reduce customer churn, and increase overall company profits.Which ethical theory does this approach represent?
An organization is concerned about its cybersecurity after identifying unauthorized records in its payrolldatabase. The organization hires a consultant to test its cyberdefenses. The consultant executes several testattacks on the organization's software and successfully demonstrates that by using Structured Query Language(SOL) injection, the consultant can add rows to the payroll database without obtaining the proper permissions.Which hacker classification does the consultant fall under?