1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
4 years ago
11

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.

Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by: Solely by the magnitude or severity of expected harm.
Computers and Technology
2 answers:
Sunny_sXe [5.5K]4 years ago
8 0

There are two important things that should be considered when assessing the risk of harm in a research study, the risk of the severity of harm and the probability of harm.  In the probability of harm, there is a possibility that not all harms are possible in the research study.

<h3>Further Explanation</h3>

However, the level of risk of harm in a study is determined by how these two elements occurred during the study. From the scenario painted in the research study, the probability that the subject in the research can be identified is very low while the probability that the research will poses a greater risk to the individual subject is very high.

A risk in a research can be described as the probability of harm that can happen to a research subject as a result of participation in a research study. Injury or harm could be physical, psychological, social or economic. The probability and magnitude of possible harm or injury vary. It can be from minimal to significant. However, the federal regulations only define Minimal risks.

Minimal Risks: a risk is said to be minimal when the probability or magnitude of harm or injury expected in a research study are not on the high side or not greater.  

LEARN MORE:

  • research study brainly.com/question/11656305

KEYWORDS:

  • research study
  • harm
  • injury
  • subject
  • minimal risks
finlep [7]4 years ago
5 0

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


You might be interested in
Which of these statements about the truck driving occupation in the U.S. are accurate?
Airida [17]

Answer:

I'm unsure 38373672823

8 0
3 years ago
Read 2 more answers
Write a c program that reprints input so that no line is longer than 50 characters. Specifically, for lines less than or equal t
Alex73 [517]

Using the knowledge in computational language in C++ it is possible to write a code that reprints prints input so that no line is longer than 50 characters.

<h3>Writting the code:</h3>

<em>#include<stdio.h></em>

<em />

<em>int main(int argc, char** argv){</em>

<em>    //creating pointer to read a file</em>

<em>    FILE * fp;</em>

<em>    char * line = NULL;</em>

<em>    size_t len = 0;</em>

<em>    ssize_t read;</em>

<em>    int i=0;</em>

<em>    //opening a file</em>

<em>    fp = fopen(argv[1], "r");</em>

<em>    //handling the error condition</em>

<em>    if (fp == NULL){</em>

<em>        printf("File not found..!!");</em>

<em>        return 0;</em>

<em>    }</em>

<em>    int moreThan50 =0;</em>

<em>    //reading a file line by line</em>

<em>    while ((read = getline(&line, &len, fp)) != -1) {</em>

<em>        i = 0;</em>

<em>        if(read >= 50){</em>

<em>            moreThan50++;</em>

<em>        }</em>

<em>        while(i < read){</em>

<em>            if(line[i]!='\n'){</em>

<em>                if(i%50 == 0){</em>

<em>                    printf("\n%c",line[i]);</em>

<em>                }else{</em>

<em>                    printf("%c",line[i]);</em>

<em>                }</em>

<em>            }</em>

<em>            i++;</em>

<em>        }</em>

<em>    }</em>

<em>    printf("\nTotal lines over 50 chars: %d\n",moreThan50);</em>

<em>    printf("Offending Lines: ");</em>

<em>    for(i=1;i<=moreThan50;i++)</em>

<em>        printf("%d, ",i);</em>

<em>    fclose(fp);</em>

<em>    return 0;</em>

<em>}</em>

See more about C++ at brainly.com/question/19705654

#SPJ1

4 0
2 years ago
A CPU scheduler that assigns higher priority to the I/O-bound processes than the CPU-bound processes causes:
Sholpan [36]

Answer:

Low CPU utilization and high I/O utilization

Explanation:

6 0
2 years ago
A(n) _______________ supplies one of the most critical aspects of docking stations, but in a smaller, more portable format: supp
baherus [9]

Answer:

A Port Replicators.

Explanation:

Port replicators are devices or extension. They are plugged into the laptop's usb port to provide extra ports to connect other external devices needed by the laptop.

Docking stations does the same thing, but the laptop is plugged into the docking station holding the needed devices, and meant for that laptop brand.

7 0
3 years ago
What do we call the two parts of lift that goes down a mine
Blababa [14]
The sheave wheel is a pulley wheel that sits above the mine shaft. The hoist cable passes over the sheave wheel and then down the shaft of the mine.
(copied from google)
4 0
3 years ago
Read 2 more answers
Other questions:
  • Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author'
    14·1 answer
  • Word 2013 in order to share a document online you must first
    10·1 answer
  • Computer program allowing the computer to communicate<br> with a hardware device
    13·1 answer
  • Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro
    5·1 answer
  • Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rath
    13·1 answer
  • It takes 2.5 yards of material to make a dress harleys clothing design estimates that they can produce 48 dresses each week.if t
    15·2 answers
  • A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
    15·1 answer
  • Submit your business presentation that clearly compares and contrasts three different cell phone service plans..
    14·2 answers
  • What is computer give definition ​
    14·2 answers
  • Please Answer ASAP!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!