COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
The researchers should accept all comments and give considerations
|
Openness
|
|
Respect for Intellectual property
|
|
Non discrimination
|
|
Responsible mentoring
|
Explanation:
Detailed explanation-1: -The researchers should accept all comments and give considerations. When a paper is already submitted to a publication, no submission to another should be done. The researcher should be fully equipped with research skills when conducting the study.
Detailed explanation-2: -Three of the most influential and common purposes of research are exploration, description and explanation.
Detailed explanation-3: -The researcher must have the final say in his or her findings. A person’s opinion is acceptable and considered as an answer to the questions asked by the researcher. Any concern or issue by the students is researchable.
There is 1 question to complete.