To maintain confidentiality of research data, the researcher should
a. remove names from any data and replace with a code.
b. make certain no unauthorized individuals have access to the data.
c. provide secure storage of all research data.
d. All of these are true.
ANS: D
You might also like to view...
This error is when the researcher infers there is a significant intervention effect when, in fact, there is not one ____________
A. type I error B. type II error C. type effect error D. type criterion error
Describe how a child might use the Compatible Numbers strategy to estimate the solution to the problem 372 รท 9
What will be an ideal response?
Spacing learning over time, helping students allocate study time efficiently and quizzing to promote learning are all types of what?
A. Tier 1 Interventions B. Tier 2 Interventions C. Tier 3 Interventions D. Study practices
The phenomenon by which children are able to understand the meaning of a new word after only a few exposures to it and without explicit instruction is referred to as
a. fast mapping b. lexical facility c. language activation d. rapid semantic linking