When a counselor uses a networked or shared computer for the storage of confidential information on clients, the counselor should

a. never let anyone else know or be able to access the password.
b. Store confidential records on a portable storage device rather than on the computer's hard drive.
c. only use computers that are kept behind locked doors.
d. have a manual lock placed on the computer that requires a key.
e. never print out confidential information because it might be read by others.


b

Counseling

You might also like to view...

Identify a recommendation by Brown (2006) regarding confirmatory factor analysis (CFA) for cross-validation of a factor structure

a. A researcher should use common factor analysis (CA) instead of confirmatory factor analysis (CFA)as it provides a real estimation of factor structure. b. A researcher should use consistent methods across exploratory factor analysis (EFA) and confirmatory factor analysis (CFA). c. A researcher should use confirmatory factor analysis (CFA) instead of common factor analysis (CA) as it provides a real estimation of factor structure. d. A researcher should use different estimation methodsfor the exploratory factor analysis (EFA) and confirmatory factor analysis (CFA).

Counseling

Professional counselors can use the same assessment for every client they encounter

Indicate whether the statement is true or false.

Counseling

Historically, the most outstanding work in integrative psychology is the synthesis of _________________ and ___________________ approaches

a. cognitive; behavioral b. psychoanalytical; cognitive c. behavioral; humanistic d. existential; cognitive e. psychoanalytical; behavioral

Counseling

To "prove" or enhance his manliness, a man is LEAST likely to

A. drive recklessly. B. take medication for sexual enhancement. C. work fewer hours. D. join a gang.

Counseling