1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
15

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.

Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by:
Both the magnitude (or severity) and the probability (or likelihood) of harm. T/F
Computers and Technology
1 answer:
Brilliant_brown [7]3 years ago
7 0

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

You might be interested in
The binary number represented by the voltage graph below is
Delicious77 [7]

Answer:

4

Explanation:

5 0
3 years ago
If you get musicilly can your parents see
Tresset [83]
I wouldn't think so unless they have access to your phone or account. But I don't believe this is school related.
6 0
4 years ago
Read 2 more answers
Unlike a virtual image, a real image
IRINA_888 [86]
C.cannot be viewed on a screen
4 0
3 years ago
Ok so another weird question! So if you know what google drive is and how to upload a video why does it keep adding hours! it ke
lesya [120]

Answer:Your video may be too long and you may not have that much storage left.

Explanation:

5 0
3 years ago
1. What is wrong with the following code?
uranmaximum [27]

Answer:

Aye dog I don't know nothing about code, yes its true, but I hope that you get an answer for you!

Explanation:

Facts...

5 0
3 years ago
Other questions:
  • Encryption is the process of:
    12·1 answer
  • When inside a closed work environment, its okay to openly talk with co-workers about PII
    6·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • This program has some errors in it that are needed to be checked import java.io.*;
    13·1 answer
  • What is the main difference between a search engine and a web browser?
    6·2 answers
  • What is the full meaning of Internet and WiFi
    6·2 answers
  • Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how th
    13·1 answer
  • Answer all of the questions,
    7·1 answer
  • What are the basic data types supported in C programing language?
    10·1 answer
  • I watched an ad but the im button done is no where in sight, has anyone else experienced this recently. it was fine a few days a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!