COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The researchers should accept all comments and give considerations
A
Openness
B
Respect for Intellectual property
C
Non discrimination
D
Responsible mentoring
Explanation: 

Detailed explanation-1: -The researchers should accept all comments and give considerations. When a paper is already submitted to a publication, no submission to another should be done. The researcher should be fully equipped with research skills when conducting the study.

Detailed explanation-2: -Three of the most influential and common purposes of research are exploration, description and explanation.

Detailed explanation-3: -The researcher must have the final say in his or her findings. A person’s opinion is acceptable and considered as an answer to the questions asked by the researcher. Any concern or issue by the students is researchable.

There is 1 question to complete.