1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
4 years ago
11

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.

Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by: Solely by the magnitude or severity of expected harm.
Computers and Technology
2 answers:
Sunny_sXe [5.5K]4 years ago
8 0

There are two important things that should be considered when assessing the risk of harm in a research study, the risk of the severity of harm and the probability of harm.  In the probability of harm, there is a possibility that not all harms are possible in the research study.

<h3>Further Explanation</h3>

However, the level of risk of harm in a study is determined by how these two elements occurred during the study. From the scenario painted in the research study, the probability that the subject in the research can be identified is very low while the probability that the research will poses a greater risk to the individual subject is very high.

A risk in a research can be described as the probability of harm that can happen to a research subject as a result of participation in a research study. Injury or harm could be physical, psychological, social or economic. The probability and magnitude of possible harm or injury vary. It can be from minimal to significant. However, the federal regulations only define Minimal risks.

Minimal Risks: a risk is said to be minimal when the probability or magnitude of harm or injury expected in a research study are not on the high side or not greater.  

LEARN MORE:

  • research study brainly.com/question/11656305

KEYWORDS:

  • research study
  • harm
  • injury
  • subject
  • minimal risks
finlep [7]4 years ago
5 0

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


You might be interested in
As data travels further over a wavelength or frequency, what goes down?
LUCKY_DIMON [66]

As data travels further over a wavelength or frequency, the radiation type goes down.

<h3>What is an electromagnetic spectrum?</h3>

An electromagnetic spectrum can be defined as a range of frequencies and wavelengths into which an electromagnetic wave is distributed into.

In Science, the electromagnetic spectrum consist of the following types of energy from highest to lowest frequency and shortest to longest wavelength:

  • Gamma rays
  • X-rays
  • Ultraviolet radiation
  • Visible light
  • Infrared radiation
  • Microwaves
  • Radio waves

In this context, we can infer and logically deduce that as data travels further over a wavelength or frequency within the electromagnetic spectrum, the radiation type goes down.

Read more on electromagnetic spectrum here: brainly.com/question/23423065

#SPJ1

5 0
2 years ago
What will cloud cumputing offer
seropon [69]
Cloud computing allows computers from all around the world that are not being used to be able to do extra computations. This removes many of the limitations of a single computer and lets the user calculate things much faster.
6 0
4 years ago
When you are making multiples of a brownie recipe, you cannot - without great difficulty - use a fraction of an egg. The calcula
Lera25 [3.4K]
The answer is one ☝️ question for the poll of a vote
5 0
3 years ago
What is the output of the following code? stackList stack; int x, y; x = 2; y = 3; stack.push(8); stack.push(x); stack.push(x +
Sunny_sXe [5.5K]

Stack is LIFO data structure (Last In First Out) where the last element entered in stack will be the last one to be out of stack. It has three operations: push() : used to insert an element in stack, pop() : used to delete an element from the stack, top() : used to return the top of the stack i.e. the newest member of the stack. All these operations will take place at the top.

<u>Explanation:</u>

Now, looking at the program, x and y are initialized the values of 2 and 3 respectively. The stack pushes 8 onto the stack making it the first member of the stack. Then the value of x which is 2 is pushed onto the stack. Next, (x+5) = (2+5) = 7 is pushed onto the stack.

Pop() is used to delete hence 7 is popped out from the stack. top() is assigned to y which is 2 in this case and again 2 is popped out from the stack. Now, (x+y) = (2+2) = 4 is pushed onto the stack. And the top() is assigned to x which is 4. 4 is again popped out from the stack. Hence the value of x is 4.

3 0
4 years ago
What is the error in the following pseudocode?
kykrilka [37]
I do not know the answers sorryy
4 0
2 years ago
Other questions:
  • Which activity represents a violation of the licensing agreement
    7·2 answers
  • Which company provides the Loki Wi-Fi mapping service?
    10·1 answer
  • Consider the following method.
    13·1 answer
  • If you have a database with birthdates, and you would like to find everyone who was born before June 16, 1967, what would you en
    15·2 answers
  • The picture that graphically represents the items you use in Windows is called a/an
    15·1 answer
  • User-system interaction is?
    11·1 answer
  • PLEASE  HELPPPP!!!!!
    14·1 answer
  • A class defined by a user (i.e., you, the programmer programmer) ... Group of answer choices might contain no data members -- on
    13·1 answer
  • What will be the value of x after the following loop terminates?
    13·1 answer
  • A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!