Which of the following defines the AI black box problem?
Machine intelligence making something illusory, like pulling a rabbit from a hat
Not being able to know how something crashed or failed
The challenge of understanding the inner workings of opaque systems
A dangerous machine intelligence put in a digital prison
The challenge of understanding the inner workings of opaque systems
Which of the following elements are important aspects of ethical integrity with regards to data? (Select two.)
Whether the data was gathered in an ethical manner.
What type of data (audio, visual, etc.) is being collected and/or utilized.
If the data is commercially viable or monetarily valuable.
If the holders of data are trustworthy entities.
Whether the data was gathered in an ethical manner.
If the holders of data are trustworthy entities.
Which of the following best describes why data is sometimes compared to oil? (Select two.)
Data can be easily monopolized.
Data can damage the environment.
Data can fuel algorithmic technologies.
Data can be monetarily valuable.
Data can fuel algorithmic technologies.
Data can be monetarily valuable.
At what point should ethical consideration ideally be applied to emerging technologies?
During periodic reviews, with ongoing customer feedback solicited.
Upon delivery, with appropriate warranties where necessary.
Once an ethical issue has received negative feedback in public media.
From its inception, through maintenance, to applying foresight regarding its decommissioning.
From its inception, through maintenance, to applying foresight regarding its decommissioning.
Which of the following describes dual-use or multipurpose data?
Data that can be used in multiple devices or formats, such as a video on a Smart TV, tablet, and computer.
Data that can be easily shared with a partner or family member for mutual enjoyment.
Data collected for one application that could also be applied to another application in a different domain.
Data that can be transformed into multiple forms, e.g. extracting audio from a video file.
Data collected for one application that could also be applied to another application in a different domain.
Which of the following are important ethical elements to safeguard within ethical AI systems? (Select two.)
The number of layers, tensors, or parameters used in a model.
Performance and optimization.
Transparency and explainability, balanced with privacy.
Accountability and management of bias.
Transparency and explainability, balanced with privacy.
Accountability and management of bias.
Which of the following is the generally agreed upon current state of the art of AI?
Perceptrons
Superintelligence
Narrow AI
Strong AI
Narrow AI
Which of the following describe important aspects of why emerging technologies are so capable and powerful? (Select two.)
They can automate very complex operations.
They can displace workers by performing their jobs more efficiently.
They may be able to self-improve by learning from data.
They are exciting and captivating to many people.
They can automate very complex operations.
They may be able to self-improve by learning from data.
Management asks someone to do a data-related task. Which of the following would likely be ethically problematic? (Select two.)
Aggregate data together.
Manipulate data or alter its interpretation.
Delete any erroneous data.
Change data to another format.
Manipulate data or alter its interpretation.
Delete any erroneous data.
Which of the following describe important aspects in the role of an ethical AI engineer? (Select two.)
Writing new equations to express intelligence.
Building and maintaining computational hardware.
Keeping up with the latest developments and vulnerabilities.
Cleaning and sorting data, and auditing for bias.
Keeping up with the latest developments and vulnerabilities.
Cleaning and sorting data, and auditing for bias.
Which of the following, by itself, qualifies as personally identifiable information (PII)?
A user's customer ID in an online ordering system
System events added to a log
Temperature readings for an office building
A user's home address
A user's home address
Why are groups like race and religion considered protected classes?
These groups have been used as the basis for wholesale discrimination.
These groups can be used to personally identify someone.
Organizations are legally not allowed to collect information about these groups.
People use these groups as the basis for their identities.
These groups have been used as the basis for wholesale discrimination.
Which of the following describes an opt-out policy in regards to the collection of private data?
Data about the user is never collected, regardless of the user's consent.
Data about the user is automatically collected unless that user explicitly states that you should not do so.
Data about that user isn't collected until that user explicitly states you are allowed to.
Data about the user is always collected, regardless of the user's consent.
Data about the user is automatically collected unless that user explicitly states that you should not do so.
Which of the following are key principles of privacy by design? (Select two.)
Organizations must incorporate privacy protections throughout the project lifecycle.
Organizations must be proactive in protecting against privacy risks, not reactive.
Organizations must keep the focus of privacy protections on the business rather than the user.
Organizations must not expose the operational practices and technologies used to protect user privacy.
Organizations must incorporate privacy protections throughout the project lifecycle.
Organizations must be proactive in protecting against privacy risks, not reactive.
What is the purpose of differential privacy?
To remove the direct identifiers that can be used to identify individuals.
To only allow certain parties to access certain portions of the data.
To ensure the data is completely confidential and cannot be read by unauthorized parties.
To enable parties to share private data without revealing individuals represented in the data.
To enable parties to share private data without revealing individuals represented in the data.
Which of the following describes the concept of liability?
Taking ownership of an assigned task.
The moral duty one has to take action.
The legal responsibility for one's actions.
Answering for one's actions to an authority figure.
The legal responsibility for one's actions.
What does it mean to call a click-through agreement a "contract of adhesion"?
One party is forced into using the service after agreeing.
Both parties are legally bound by the agreement.
One party is forced into a "take-it-or-leave-it" situation.
Both parties are equally responsible for ensuring the agreement is adhered to.
One party is forced into a "take-it-or-leave-it" situation.
Which of the following is a type of technology contract that establishes the goals of both parties and describes how those goals will be achieved?
Terms of Service (ToS)
Service-level agreement (SLA)
Software as a Service (SaaS)
End-user license agreement (EULA)
Service-level agreement (SLA)
How does a smart contract differ from a traditional contract?
Smart contracts serve a different purpose than traditional contracts.
Smart contracts are more effective than traditional contracts.
Smart contracts guarantee that all parties are anonymous.
Smart contracts eliminate the need for a central authority.
Smart contracts eliminate the need for a central authority.
How can a visual contract be easier to understand than a written contract?
The use of pictures without any text makes it easier for most people to comprehend the details of a contract.
X The use of pictures is more accessible to all people, whereas a written contract may be difficult for someone with a reading disability to understand.
X The use of pictures explains the contract in greater detail than a written contract, making it easier for anyone to understand the particulars.
The use of pictures with simple text makes it easier for the layperson to understand the details of a contract.
The use of pictures with simple text makes it easier for the layperson to understand the details of a contract.
What causes bias?
Biases are learned from our families, our social groups, and the media.
Biases are caused by the opinions of our families.
Bias is caused by the media.
Bias is biological, we are born with it.
Biases are learned from our families, our social groups, and the media.
What is the fundamental attribution error?
When you say your bad behavior is caused by the situation, but when other people display the same bad behavior, it is caused by a personality trait.
When you incorrectly assume a cause and effect relationship for two correlated variables.
When you believe your chances of experiencing something negative are lower and your chances of experiencing something positive are higher than others.
When you believe your ideas are normal and that the majority of people agree with you.
When you say your bad behavior is caused by the situation, but when other people display the same bad behavior, it is caused by a personality trait.
Which of the following are actions that can help combat implicit bias? (Select three.)
Cultivating awareness of your own biases.
Exposing yourself to "counter-stereotypical" examples.
Surrounding yourself with others who have similar experiences.
Interacting with diverse groups of people.
Obtaining your information from the same one or two media sources that your family and friends access.
Cultivating awareness of your own biases.
Exposing yourself to "counter-stereotypical" examples.
Interacting with diverse groups of people.
When conducting an opinion poll, which of the following biases do you need to guard against the most when collecting your data?
Modeling bias
Sampling bias
Correlation bias
Misclassification bias
Sampling bias
Which of the following is an example of a cognitive bias?
Misclassification bias
Anchoring bias
Modeling bias
Correlation bias
Anchoring bias
Are criminal justice risk assessments race-neutral?
No, the data is biased as it reflects historical bias.
Yes, algorithms replace human judgement and they are unbiased.
No, it is designed with intention to be unfair.
Yes, technology in itself is not racist.
No, the data is biased as it reflects historical bias.
Which type of bias causes people to trust an automated decision-making system (ADS) over a human's decision?
Automation bias
Implicit bias
Complacency bias
Confirmation bias
Automation bias
How can confirmation bias impact us socially? (Select two.)
It can prevent us from being social with other people.
It can impede socio-political cooperation.
It can lead to groupthink, which can in turn halt forward progress.
It can lead to a diverse set of friends.
It can impede socio-political cooperation.
It can lead to groupthink, which can in turn halt forward progress.
Which of the following describes an illusory-correlation bias?
When you incorrectly assume a cause and effect relationship because two variables are correlated.
When you incorrectly assume a correlation because there is an illusory confounding variable.
When you correlate variables that do not exist in your data set.
When you correlate a variable with a confounding variable.
When you incorrectly assume a cause and effect relationship because two variables are correlated.
Which of the following is one explanation for why cognitive biases exist?
They are taught to us in school.
We use them to help remember things.
They help us think logically instead of emotionally.
We receive too much information and are overloaded.
We receive too much information and are overloaded.
Which of the following is a formative ethics theory that states that maximizing happiness is the primary standard for determining what is right or wrong?
Utilitarianism
Deontology
Categorical imperative
Virtue ethics
Utilitarianism
Which of the following statements are promoted by the categorical imperative? (Select three.)
Act in such a way that your actions may become a universal law.
Don't treat people as a means to an end; treat them always as an end.
Each person must use reason to will moral laws.
You have a moral duty to choose your actions based on their potential outcomes.
Act in such a way that your actions may become a universal law.
Don't treat people as a means to an end; treat them always as an end.
Each person must use reason to will moral laws.
Which of the following statements accurately describes the philosophical concept of predeterminism?
All events are predestined to happen by a supernatural force.
Human beings are able to make choices whose outcomes are not already determined.
All future events are determined by preceding events, as in a chain, but human beings may still be able to interfere with this chain of events.
All events, past, present, and future, are determined in advance.
All events, past, present, and future, are determined in advance.
How do norms differ from morals?
Norms form the basis for morals.
Norms are universal to all cultures; morals are not.
Morals involve value judgments; norms do not.
Morals are collective; norms are more personal.
Morals involve value judgments; norms do not.
Which of the following are consequences of saying that someone or something has moral agency? (Select two.)
The moral agent follows a deontological code of ethics.
The moral agent can be held responsible for their actions.
The moral agent is capable of determining right and wrong.
The moral agent acts in a morally correct manner.
The moral agent can be held responsible for their actions.
The moral agent is capable of determining right and wrong.
Why is deciding how to act using moral reasoning not always a feasible goal for human beings?
Human decision making is often influenced by emotion and not logic.
Most people are not educated on normative ethical theories and therefore cannot perform true moral reasoning.
Moral reasoning has few tangible benefits for most people.
Moral reasoning is too complicated to apply to a real-world situation.
Human decision making is often influenced by emotion and not logic.
Which of the following statements are true regarding the purpose of moral psychology? (Select two.)
Moral psychology seeks to understand how the human mind develops morality.
Moral psychology seeks to understand what the best way to act morally is.
Moral psychology seeks to understand why people act morally or immorally.
Moral psychology seeks to understand the nature of what it means to be moral.
Moral psychology seeks to understand how the human mind develops morality.
Moral psychology seeks to understand why people act morally or immorally.
Which of the following is an example of applied ethics?
Virtue ethics
Moral relativism
Pluralism
Professional ethics
Professional ethics
Your organization has developed an AI system that recommends treatments for hospital patients. Some questions have been raised about the ethics of how these treatments are determined. What applied ethics domain do these concerns fall under?
Business ethics
Engineering ethics
Environmental ethics
Bioethics
Bioethics
What does it mean to say that human rights are inalienable? (Select two.)
Inalienable rights cannot be taken away except in extreme circumstances.
Inalienable rights are inherent in all human beings.
Inalienable rights are conditional.
Inalienable rights are derived from tradition.
Inalienable rights cannot be taken away except in extreme circumstances.
Inalienable rights are inherent in all human beings.
What does "ethics by design" mean?
A reference to the framework set forth by IEEE's Ethically Aligned Design.
A creative design approach as the focus for ethics.
A reference to one of the tenets of engineering activism.
An approach in which ethics is considered from the initial design stage.
An approach in which ethics is considered from the initial design stage.
Which of the following describes why explainability is important?
It provides accountability and trust.
It enables you to explain a system for shareholder purposes.
It provides interpretations of a system's actions.
It is necessary so that internal stakeholders can understand how a system works.
It provides accountability and trust.
Which of the following describes personhood?
Personhood is a concept that applies to narrow AI.
Personhood is often used to dictate how something is treated.
Personhood is an individual's right to freedom.
Personhood is the legal protection provided to AI systems.
Personhood is often used to dictate how something is treated.
Which of the following describe how adopting ethical practices can be a strategic differentiator? (Select three.)
It will build customer trust.
It will encourage applicants to apply for your company.
It will support the development of strategic partnerships.
It will reduce your business obligations toward customers and business partners.
It will ensure you comply with regulations.
It will build customer trust.
It will encourage applicants to apply for your company.
It will support the development of strategic partnerships.
Which of the following best describes beneficence?
Beneficence is a term coined by IBM that relates to their Green Horizons initiative in 2014.
Beneficence is the promotion of well-being, not just for moral agents like humans, but of animals, the environment, and societies.
Beneficence is the promotion of efficient systems that perform rapidly and benefit companies.
Beneficence is the promotion of well-being for moral agents like humans.
Beneficence is the promotion of well-being, not just for moral agents like humans, but of animals, the environment, and societies.
What is the difference between beneficence and non-maleficence?
Beneficence refers to "do only good" and non-maleficence refers to "do no harm."
Non-maleficence refers only to malevolent artificial general intelligence (AGI), while beneficence can refer to any "good" emerging technology.
Beneficence is a less important goal for the field of AI than non-maleficence.
Beneficence and non-maleficence are quite similar and often interchangeable.
Beneficence refers to "do only good" and non-maleficence refers to "do no harm."
Which of the following are valid concerns regarding electronic personalities? (Select two.)
That they would create unfair advantages, as not everyone has access to the same rights.
That individuals would start applying for electronic personalities.
That they will make it more difficult to access information.
That they would absolve manufacturers of liability.
That they would create unfair advantages, as not everyone has access to the same rights.
That they would absolve manufacturers of liability.
Which of the following are ways to participate in engineering activism? (Select two.)
Follow a code of ethics.
Perform all tasks required of you.
Engage with the public.
Follow ethics by design.
Follow a code of ethics.
Engage with the public.
How can AI uphold justice?
The more AI-based products being used in the justice system, the more justice can be upheld.
AI systems can be designed from the start to help promote fairness and minimize bias.
AI systems can replace human judges, who are often biased.
AI can automate many of the clerical tasks involved in the justice system.
AI systems can be designed from the start to help promote fairness and minimize bias.
Which of the following are examples of how AI can limit human autonomy? (Select two.)
Weapon systems can limit human autonomy as humans may not have decision-making capability or understand the decision making.
AI systems might impact certain vulnerable groups such as the elderly and children differently than the rest of the population, which could limit those groups' autonomy.
AI systems can assist individuals with automated, repetitive, or dangerous tasks.
AI systems can perform tasks that humans cannot, such as processing millions of data records in a matter of seconds.
Weapon systems can limit human autonomy as humans may not have decision-making capability or understand the decision making.
AI systems might impact certain vulnerable groups such as the elderly and children differently than the rest of the population, which could limit those groups' autonomy.
Which school of philosophical thought primarily advocates for the greatest good for the greatest amount of people?
Virtue ethics
Kantian ethics
Deontology
Utilitarianism
Utilitarianism
Which type of entity are the OECD Principles on Artificial Intelligence mostly geared towards?
National governments
Private corporations
Individuals
Municipal governments
National governments
Which of the following principles are most commonly cited in AI-based ethical frameworks?
Happiness and spiritual contentment
Transparency and explainability
Human control and autonomy
Fairness and non-discrimination
Transparency and explainability
Which of the following frameworks primarily promotes human rights?
The Toronto Declaration
The Asilomar AI Principles
The Beijing AI Principles
The Montreal Declaration
The Toronto Declaration
Which of the following best describes capability caution as referenced in the Asilomar AI Principles?
Given a lack of consensus, we should avoid strong assumptions regarding upper limits on future AI capabilities.
We should keep limits on on what artificial general intelligence (AGI) is capable of.
If there is no understanding of the internal mechanisms of AI, then AI development should be halted.
Should there be a greater reliance on AI, measures should be taken to ensure that humans are still capable of finding work.
Given a lack of consensus, we should avoid strong assumptions regarding upper limits on future AI capabilities.
Which of the following describes the principle of transparency in the context of AI systems?
Transparency enables human observers to understand the decision-making process of an AI system.
Transparency enables human observers to tweak the decision-making process of an AI system.
Transparency enables human observers to reproduce the decision-making process of an AI system.
Transparency enables human observers to see inside the decision-making process of an AI system.
Transparency enables human observers to see inside the decision-making process of an AI system.
Which of the following is a case study that best represents the principle of professional responsibility?
The IEEE Ethically Aligned Design's discussion on classical ethics
The Beijing AI Principles' tenets about the use of AI
The Asilomar AI Principles' definition of capability caution
The American Medical Association's definition of AI as augmented intelligence
The American Medical Association's definition of AI as augmented intelligence
If you are attempting to build a new framework for the research and development (R&D) of AI, which of the following frameworks might you look at first for its emphasis in this area?
The G20 AI Principles
The Beijing AI Principles
The American Medical Association's definition of artificial intelligence
The Montreal Declaration for a Responsible Development of Artificial Intelligence
The Beijing AI Principles
In AI, the principle of privacy is most commonly referred to in the context of which of the following concepts?
Personal protection
Data protection
Human control
Transparency
Data protection
Which of the following describes an ethical framework?
Ethical frameworks consolidate regulatory requirements for an industry.
Ethical frameworks apply meta-ethical theories to everyday business operations.
Ethical frameworks raise timeless ethical questions that are not easily put into action.
Ethical frameworks seek to mitigate ethical concerns by creating actionable steps.
Ethical frameworks seek to mitigate ethical concerns by creating actionable steps.
Why does the trolley problem pose an ethical predicament?
The moral responsibility is split between you and the person controlling the trolley.
You have to make a choice between two scenarios where choosing one leads to loss of life in the other.
There are so many potential outcomes that it becomes difficult to choose one that is most ethical.
You as the actor don't have sufficient control over the circumstance.
You have to make a choice between two scenarios where choosing one leads to loss of life in the other.
Which of the following ethical considerations should have priority in an emergency situation like the use of contact-tracing solutions during a pandemic? (Select two.)
Explainability
Privacy
Accountability
Bias
Privacy
Accountability
In using AI-enabled solutions within the context of medical imaging analysis, which of the following is the most important ethical consideration?
Bias
Security
Privacy
Explainability
Explainability
If an AI-enabled system enables addictive behavior, which of the following makes for the most compelling argument to stop development work on that system?
The system, as designed, acts counter to the well-being of the users.
The user will share more data with the system because of increased use.
There is a lack of accountability on the part of the user since they overuse the service.
The process for obtaining consent has not been made transparent to the user.
The system, as designed, acts counter to the well-being of the users.
Why do smart toys raise additional ethical concerns over those that are raised in the course of other products and services that use AI?
They are used in the privacy of homes rather than in public settings, like other products or services.
The smart toys store personal data on the device, which can be stolen.
Children are more susceptible to manipulation and therefore need extra protective measures.
It is difficult to obtain informed consent for the use of the smart toy.
Children are more susceptible to manipulation and therefore need extra protective measures
Which of the following software development principles is essential in the real-world deployment of AI-enabled software applications in critical scenarios like self-driving cars?
Architectural design analysis
Robustness to adversarial examples
Continuous integration and deployment of patch updates
Version control of the AI models deployed
Robustness to adversarial examples
Which of the following is the most important argument in favor of content moderation in online platforms?
It creates adequate incentives for everyone to share their opinions.
It prevents the spread of disinformation that can cause harm to vulnerable populations.
It prevents the development of monopolies in terms of content creators.
It helps uphold freedom of expression for everyone and doesn't give anyone special rights.
It prevents the spread of disinformation that can cause harm to vulnerable populations.
Why is the question of robot rights and emancipation one that isn't as important as addressing issues of bias, privacy, transparency, and other principles discussed in the various ethical frameworks?
These rights necessitate that robots become sentient entities, which is currently not feasible.
Robots are mechanical instruments and therefore don't deserve to have rights.
Humans are anthropocentric and don't want to extend rights to other sentient entities.
There is no legal precedent for granting rights to entities that are not humans.
These rights necessitate that robots become sentient entities, which is currently not feasible.
Which of the following is the most important ethical consideration regarding technical developments like deepfakes?
They usurp a person's likeness and can then be weaponized against them.
They are built on technological progress made by a third-party organization.
They take away monetization opportunities, leaving individuals unfairly compensated for their data.
They violate data sharing agreements in many jurisdictions.
They usurp a person's likeness and can then be weaponized against them.
Why are anonymization and pseudonymization insufficient protection measures against breaches of data privacy and security?
They can be broken by combining this data with other publicly available data.
They don't integrate well into data science and machine learning workflows.
They only work in scenarios with particular kinds of personal information.
They destroy the usefulness of the data.
They can be broken by combining this data with other publicly available data.
Which of the following are ways that regulations differ from ethical frameworks? (Select two.)
Regulations are often industry led.
Regulations provide a clear basis for potential litigation.
Regulations are flexible in their implementation.
Regulations have legal enforcement behind them
Regulations provide a clear basis for potential litigation.
Regulations have legal enforcement behind them
Your business handles the personal data of California residents. Which of the following regulations would enable a resident to request that their data be deleted from your company's files?
PCI DSS
CCPA
COPPA
OECD Privacy Guidelines
CCPA
Which of the following does the Brazilian General Data Protection Act (LGPD) mandate? (Select two.)
Data protection analysts
Data protection officers
Data protection audits
Data protection impact assessments
Data protection officers
Data protection impact assessments
Which of the following is a standard or regulation that focuses on ensuring the implementation of strong cybersecurity techniques like network security and cryptography to protect data?
POPI
PCI DSS
PIPEDA
FERPA
PCI DSS
Which of the following are requirements set forth by the Biometric Information Privacy Act (BIPA)? (Select two.)
Organizations must obtain consent from individuals regarding the collection and use of biometric data.
Organizations must store biometric data in local, on-premises databases.
Organizations must destroy biometric data in a timely fashion.
Organizations must not transmit biometric data across an unsecured network like the Internet.
Organizations must obtain consent from individuals regarding the collection and use of biometric data.
Organizations must destroy biometric data in a timely fashion.
The Children's Online Privacy Protection Act (COPPA) safeguards the privacy of which age group's personal information?
Anyone between 13 and 18 years old
Anyone under 13 years old
Anyone under 18 years old
Anyone between 5 and 13 years old
Anyone under 13 years old
Which of the following are advantages to adopting standards frameworks like ISO 27000? (Select two.)
Formal certification processes that provide competitive advantage
International support, recognition, and involvement
Regulatory weight and legal enforcement
Technology-specific focus and precise implementation instructions
Formal certification processes that provide competitive advantage
International support, recognition, and involvement
Which of the following is a notable aspect of the Personal Information Protection and Electronic Documents Act (PIPEDA) when compared to similar laws and regulations?
Its nationwide scope and specific national focus
A stipulation to continue providing service even if data usage is denied
The early date of its inauguration
Its exclusive focus on a single domain rather than a breadth of domains
A stipulation to continue providing service even if data usage is denied
Which of the following resources does the National Institute of Standards and Technology (NIST) provide to organizations?
Industrial configurations
Security tools
Reference materials
Measurement technologies
Reference materials
Which of the following ethical domains does the IEEE 7000 series explore? (Select two.)
Machine-readable privacy terms
Fair competition
Personnel safety
Emulated empathy
Machine-readable privacy terms
Emulated empathy
Which of the following are important elements of the data minimization principle? (Select two.)
Only compress data that needs to be kept as small as possible
Only collect data that is strictly necessary
Only delete data that can be easily replaced
Only keep data for as long as it is needed
Only collect data that is strictly necessary
Only keep data for as long as it is needed
Which of the following are logical arguments in favor of an organization maintaining compliance? (Select two.)
Avoidance of reputational damage
Reduced time to deployment
Reduced costs of development
Long-term cost savings due to avoiding fines
Avoidance of reputational damage
Long-term cost savings due to avoiding fines
How does increasing AI performance often conflict with the desire for explainability?
Increasing AI performance sometimes removes human-in-the-loop (HITL) methods, making it more difficult to explain decision-making processes.
Increasing AI performance sometimes leads to greater model complexity, making it more difficult to explain decision-making processes.
Increasing AI performance sometimes reduces the transparency of input data used in training, making it more difficult to explain decision-making processes.
Increasing AI performance sometimes leads to certain evaluation metrics no longer being useful, making it more difficult to explain decision-making processes.
Increasing AI performance sometimes leads to greater model complexity, making it more difficult to explain decision-making processes.
Which of the following explains why efficiency can sometimes incur systemic fragility?
Efficiency benefits may lead to complex second-order costs
Increased efficiency tends to compound over time
Increased efficiency tends to create cost savings
High-efficiency machines often require more maintenance
Efficiency benefits may lead to complex second-order costs
Which of the following are possible benefits of a human-in-the-loop (HITL) architecture? (Select two.)
Mitigating excessive scope or potential collateral damage
Improving the speed of autonomous decision making
Balancing the negative effects of an AI system on people with the effects on environments and objects
Eliminating the potential for human error in decision making
Mitigating excessive scope or potential collateral damage
Balancing the negative effects of an AI system on people with the effects on environments and objects
How does the "virtuous cycle" that benefits Big Tech operate?
Data-driven algorithms improve solutions, leading to new customers, and better data.
Organizations write algorithms with fewer biases, which leads to fairer outcomes.
Better classes of customers lead to richer and more refined data for algorithmic systems.
By acting virtuous, the public respects Big Tech more and more.
Data-driven algorithms improve solutions, leading to new customers, and better data.
Which of the following is often in opposition to moral relativism?
Cultural mores
Subjective perspectives
Evidence-based policy
Customs and conventions
Evidence-based policy
Which of the following are important aspects of resolving complex and confounding business pressures? (Select two.)
Prioritizing ethical and safety concerns over business desires in all cases and situations
Engaging with multiple stakeholders to understand their particular needs
Assuring everyone that their desires can be accommodated without compromise
Managing expectations that not everyone can get what they want, when they want it
Engaging with multiple stakeholders to understand their particular needs
Managing expectations that not everyone can get what they want, when they want it
You plan on streamlining your company's product experience, but you also want to uphold the agency and autonomy of your users. Which of the following actions would uphold these principles? (Select two.)
Refraining from guiding users into something they didn't wish for or intend
Enabling government agencies to have a personalized interface with software
Applying machine intelligence to simulate customer behavior
Respecting the right of the user to choose and customize their experiences
Refraining from guiding users into something they didn't wish for or intend
Respecting the right of the user to choose and customize their experiences
Which of the following describe corporate hegemony? (Select two.)
Spending large sums on corporate branding and marketing
Consolidating interests through mergers and acquisitions
Making multiple investments in a similar space to improve the outcomes of success
Locking out smaller players, leading to monopolies or cartels
Consolidating interests through mergers and acquisitions
Locking out smaller players, leading to monopolies or cartels
Which of the following are tasks in the overall risk management process? (Select three.)
Analysis
Mitigation
Deployment
Identification
Elimination
Analysis
Mitigation
Identification
Which of the following risk analysis methods use words like "likely," "unlikely," and "rare" to describe the likelihood of risk, and words like "low," "medium," and "high" to describe the impact of risk? (Select two.)
Semi-quantitative analysis
Qualitative analysis
Quantitative analysis
Semi-qualitative analysis
Semi-quantitative analysis
Qualitative analysis
Which of the following is not a valid risk response technique?
Accept
Ignore
Avoid
Transfer
Ignore
Which of the following statements are correct about a variable that is normally distributed? (Select two.)
The variable's distribution, when graphed, exhibits a symmetrical bell shape.
The mean, median, and mode of all measurements is the same, and all are located at the center of the distribution.
The tails of a normal distribution are denser than the center.
Less than half of all measurements fall within one standard deviation of the mean.
The variable's distribution, when graphed, exhibits a symmetrical bell shape.
The mean, median, and mode of all measurements is the same, and all are located at the center of the distribution.
Which of the following statements accurately describes variance?
Variance measures the error between predicted values and actual values.
Variance measures how much a variable's distribution differs from a normal distribution.
Variance measures the shape of the tails in a distribution relative to the center.
Variance measures how far a data example is from the mean.
Variance measures how far a data example is from the mean.
In the following scatter plot, the GrossIncome variable is plotted against the Revenue variable. What type of correlation does this plot suggest?
There is a strong negative correlation between both variables.
There is a weak positive correlation between both variables.
There is a weak negative correlation between both variables.
There is a strong positive correlation between both variables.
There is a strong positive correlation between both variables.
How do AI and other data-driven technologies use probability?
By providing a model of belief about the likelihood of some event happening
By guaranteeing that some event will occur with 100% likelihood
By determining the objective likelihood of some event happening
By estimating the likelihood of some event happening without input data
By providing a model of belief about the likelihood of some event happening
You have a dataset of customers that includes each customer's gender, location, and other personal attributes. The label you are trying to predict is how much sales revenue each customer is likely to generate for the business based on these attributes. What type of machine learning outcome is this problem suited for?
Regression
Clustering
Classification
Dimensionality reduction
Regression
You're training a model to classify whether or not a bridge is likely to collapse given several factors. You have a dataset of thousands of existing bridges and their attributes, where each bridge is labeled as having collapsed or not collapsed. Only a handful of bridges in the dataset are labeled as having collapsed—the rest are labeled as not collapsed. Given your goal of minimizing bridge collapse and the severe harm it can cause, which of the following metrics would be most useful for evaluating the model?
Recall
Confusion matrix
Precision
Accuracy
Recall
Which of the following metrics is used to evaluate a linear regression machine learning model?
Accuracy
Goodhart's Law
Cost function
Receiver operating characteristic (ROC)
Cost function