COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Confidentiality of a participant is best exemplified in which of the following actions?
A
Asking the participant to write his or her name in the questionnaire
B
Not mentioning his or her name in the Participants of the Study section
C
Introducing himself or herself in an interview
D
Taking his or her picture and placing it in the appendix
Explanation: 

Detailed explanation-1: -Consent. Secondary Use of Existing Data. Identifiers. Data Storage.

There is 1 question to complete.