Protecting participants from the misuse of identifying data can be best accomplished by:
a. using codes for people instead of names
b. keeping a list of the code numbers with names in a locked cabinet
c. keeping identifying information on a password protected hard drive
d. doing all of the other answers simultaneously
ANS: d.
You might also like to view...
What do we call a menu that offers a variety of foods every day, is planned for a week or longer, and repeats itself?
A) Cycle menu. B) Repeat menu. C) Weekly menu. D) Standard menu.
Planning instruction begins with
a) reviewing the school curriculum b) assessing student strengths and needs c) conferring with colleagues d) reviewing standards
Differentiation as defined by Tomlinson (2005) includes a focus on ______, process, and product.
What will be an ideal response?
Several employees were asked to contribute ideas to solve a problem and arrive at a solution. They were asked to be receptive and nonthreatening. This process is called:
a. Collaboration b. Mentoring c. Networking d. Sensitivity training