Forgetting that we have violated moral rules is associated with which cognitive bias?

A. overestimating our ethicality
B. favoring members of our own group
C. forgiving our own unethical behavior
D. implicit prejudice


C. forgiving our own unethical behavior

Business

You might also like to view...

Answer the following statements true (T) or false (F)

1. budget is a financial plan that managers use to coordinate a business's activities. 2. An objective of the budgeting process is to communicate a single, unified, comprehensive plan for the business. 3. All organizations use one standardized budgeting process. 4. Budgetary slack occurs when managers intentionally overstate expected revenues or understate expected expenses. 5. The most important part of a budgeting system is getting managers and employees to accept the budget.

Business

The Acme Global Corporation is looking to hire wind turbine engineers. Because of the field work, Acme Global wants to advertise for young and healthy workers who can work to repair giant turbines. If they do so, their advertisement would likely be a violation of the _________.

A. Americans with Disabilities Act B. Rehabilitation Act C. Age Discrimination in Employment Act D. Title VII of the Civil Rights Act E. None of the above

Business

Leslie and Jorge work in the Kohl's warehouse. In the warehouse goods are received, identified, sorted, dispatched for storage, held, recalled, picked and assembled, and dispatched for shipment. Jorge works in the section of the warehouse where goods are protected in storage until they are needed. Leslie is tasked with packaging goods and directing them to the proper transport vehicle after she has prepared the proper documents. What warehouse activity does Leslie perform?

A. Identifying goods B. Receiving goods C. Dispatching shipments D. Recalling, picking, and assembling goods

Business

Which of the following is true of the supervisor program of an operating system (OS)?

A) It controls compilers in the OS. B) It prioritizes tasks performed by the CPU. C) It transfers data among other parts of the computer system. D) It generates checksums to verify that data is not corrupted.

Business