When a counselor uses a networked or shared computer for the storage of confidential information on clients, the counselor should
a. never let anyone else know or be able to access the password.
b. Store confidential records on a portable storage device rather than on the computer's hard drive.
c. only use computers that are kept behind locked doors.
d. have a manual lock placed on the computer that requires a key.
e. never print out confidential information because it might be read by others.
b
You might also like to view...
Identify a recommendation by Brown (2006) regarding confirmatory factor analysis (CFA) for cross-validation of a factor structure
a. A researcher should use common factor analysis (CA) instead of confirmatory factor analysis (CFA)as it provides a real estimation of factor structure. b. A researcher should use consistent methods across exploratory factor analysis (EFA) and confirmatory factor analysis (CFA). c. A researcher should use confirmatory factor analysis (CFA) instead of common factor analysis (CA) as it provides a real estimation of factor structure. d. A researcher should use different estimation methodsfor the exploratory factor analysis (EFA) and confirmatory factor analysis (CFA).
Professional counselors can use the same assessment for every client they encounter
Indicate whether the statement is true or false.
Historically, the most outstanding work in integrative psychology is the synthesis of _________________ and ___________________ approaches
a. cognitive; behavioral b. psychoanalytical; cognitive c. behavioral; humanistic d. existential; cognitive e. psychoanalytical; behavioral
To "prove" or enhance his manliness, a man is LEAST likely to
A. drive recklessly. B. take medication for sexual enhancement. C. work fewer hours. D. join a gang.