Exam 2018, questions and answers PDF

Title Exam 2018, questions and answers
Course Research Ethics
Institution National Chengchi University
Pages 34
File Size 832.9 KB
File Type PDF
Total Downloads 71
Total Views 120

Summary

Download Exam 2018, questions and answers PDF


Description

1.

Which of the following descriptions of the Belmont Report is incorrect? (1)It began with an incident involving human subject experiment. (2)The Belmont Report emphasizes the principle of protecting the test subject. (3)The vulnerable subjects: conducting the procedure of informed consent. (4)Systematic assessment of risks and expected benefits: exercising the principle of justice.

2.

Which of the following behaviors may have violated plagiarism in the academic field, but not necessarily copyright law? (1)Taking the test explanation of national examinations published by some cram schools and copying the content in a report without citing the reference. (2)Taking the press release drafted by administrative institutes and copying the content in a report without citing the reference. (3)Copying and translating a classmate's presentation preface from Chinese into English, all without acquiring consent from him. (4)Overhearing some ideas of classmates about the presentation and copying the ideas into another presentation.

3.

There are several circumstances under which self-plagiarism can occur. Which of the following is not a common cause for self-plagiarism? (1)The quantity of published works is insufficient for the assessment of academic promotion. (2)Concern about being accused of plagiarizing others' research content. (3)Hoping to strengthen the contribution of the research result. (4)Not having adequate time to write the paper.

4.

Which of the following descriptions of falsification is incorrect? (1)Falsification occurs when a researcher modifies or deletes research statistics, results, or graphs. (2)Falsification occurs when researchers modify their research data or equipment to verify the set research hypothesis.

(3)Falsification occurs when a researcher changes the analysis statistics to make them statistically significant and thereby support the research hypotheses. (4)Falsification occurs when a researcher enters random numbers for analysis to finish the research paper on time, because the submission deadline for a conference is approaching and there is no time to properly analyze the retrieved data. 5.

Mary's mother cleaned her room while she was away at school. By doing so, did Mary's mother invade Mary's privacy? (1)It depends whether Mary is of age . (2)If Mary feels upset, then her mother has invaded her privacy. (3)Mary's mother hasn't received consent to enter Mary's room, so she has invaded her privacy. (4)If Mary's mother does not touch any of Mary's private belongings, then she has not invaded Mary's privacy.

6.

Which of the following definitions does not entail falsification? (1)The researcher deliberately conceals research results that do not fit the research hypothesis. (2)The researcher fabricates data that does not exist. (3)The researcher over-beautifies existing pictures in the research. (4)The researcher unreasonably manipulates the research data.

7.

Johnny is writing a paper about Internet education. Which of the following texts is a quotation used by Johnny? (1)Wang (2006) considers that learners exchange their cultures with foreigners, using the Internet as a tool. This provides students with more opportunities to see the world and develop more positive attitudes toward different cultures. (2)The interviewed teacher of this research expressed the same view: I think that the Internet is very convenient and helps students of different nationalities to eliminate their cultural differences, which is nice. I think more and more people will learn by using the Internet in the future. (Teacher 1) (3)In conclusion, the researcher suggests that instantaneity and borderlessness may help students of different nationalities shorten their spatial and temporal distances as well as cultural differences.

(4)All of the above are quotations. 8.

Which of the following is not the basic principle that must be followed in the research process mentioned in the Belmont Report? (1)Respect personality. (2)Abide by the law. (3)Be beneficent. (4)Be righteous.

9.

Which of the following descriptions about privacy and the rights of privacy is incorrect? (1)Violation of privacy does not necessarily imply infringement upon the right to privacy. (2)The scope of the right to privacy is wider than privacy. (3)Anything that you wish to remain unknown is considered personal private information. (4)Privacy varies according to the feelings and thoughts of individuals.

10.

Which of the following is not necessary to keep in mind when summarizing? (1)The wording should be neutral, and the meaning of words should be precise. (2)Avoid using too many sentences from the original text. (3)The order of the sentences in the original text should be readjusted. (4)If a sentence from the original author's text is being used, it should be quoted.

11.

The Personal Information Protection Act protects which of the following behaviors toward personal information: (a) use, (b) process, (c) collection, (d) translation, and (e) adaptation? (1)(a) (c) (2)(a) (b) (c) (3)(b) (d) (e) (4)(b) (c) (e)

12.

Which of the following groups are vulnerable subjects: (a) minors, (b) students, (c) military personnel, (d) ill people, (e) homeless people, and (f) senior citizens? (1)(a) (b) (c) (d) (e) (f) (2)(b) (c) (d) (e) (f) (3)(a) (c) (d) (e) (f) (4) (a) (b) (d) (e) (f)

13.

Shawn is writing a paper about Internet education. He is using paraphrasing and summarizing to quote from others' texts and avoid plagiarism. Which of the following texts is a summary by Shawn? (1)Wang (2006) considers that learners exchange their cultures with foreigners, using the Internet as a tool. This provides students with more opportunities to see the world and develop more positive attitudes toward different cultures. (2)The interviewed teacher of this research expressed the same view: I think that the Internet is very convenient and helps students of different nationalities eliminate their cultural differences, which is nice. I think more and more people will learn by using the internet in the future. (Teacher 1) (3)All of the above are paraphrased texts. (4)All of the above are summarized texts.

14.

Polly is a researcher in a medical factory. She is currently working on a new medicine and is about to carry out a clinical trial on human subjects. Which of the following research ethic codes has a direct impact on Polly's research? (1)The Animal Welfare Act (2)Statement on Academic Ethics by the Ministry of Science and Technology (3)Law on Research Using Human Subjects (4)Principles on the Application and Review of Academic Ethic Cases

15.

According to the principles of conflicts of interest, which of the following is false? (1)The duty of the researcher is to prevent secondary interests from having an undue influence over the primary interest.

(2)Researchers must not accept corporate sponsorship. (3)An IRB member must honestly disclose any relationship with the applicant. (4)The conflict of interest review committee has the authority to review any conflict of interest in the research. 16.

According to the Personal Information Protection Act, which way of obtaining personal information requires preliminary notice of the source of the information be provided to the party? (1)The manager obtains the contact information of an employee from the Office of Personnel. (2)The carrier obtains the members' mobile phone numbers from online shopping sites. (3)The reporter obtains the name of the wanted person from the police station. (4)The principal investigator obtains the list of subjects from the research assistant.

17.

Which of the following descriptions about in faculty–student collaborations are incorrect? (1)The thesis advisor is usually also the corresponding author, who assists in communication and answers questions from the reader. (2)The thesis advisor must be listed as the coauthor of the journal paper with their student as the first author. (3)Before authoring the paper, there should be adequate communication between the faculty awnd the student about the publication and authorship orders. (4)The faculty and the student should respect each other's contribution to the research and the paper, and list the authors in the appropriate order.

18.

What is the difference between the Academic Ethics Guidelines for Researchers and Guidelines for Handling and Investigating Research Misconduct proposed by Ministry of Science and Technology? (1)The former is a code of conduct, while the latter is a trial procedure. (2)The former is a review point, while the latter is a code of conduct. (3)The former is a review point, while the latter is a description of criminal responsibility. (4)The former is a code of conduct, while the latter is a description of criminal

responsibility. 19.

Which of the following descriptions is correct regarding the factors of fair use? (1)The quotation must only be used for the purpose of writing academic papers. (2)If the quoted content is not distinguished, then it might be considered plagiarism. (3)The quoted text must be completely the same as the original text or it would be considered to be adaptation. (4)The quoted words must not have been dictated because there is very likely to be a mistake.

20.

If the researcher fails to abide by the Personal Information Protection Act while using personal information, several punishments can be incurred. Which of the following is most unlikely to happen? (1)Being punished for a criminal code offense. (2)Being punished for a civil code offense. (3)A negative effect on academic reputation. (4)Effects on academic validity.

21.

According to the "Definition of research misconduct" unit, which of the following does not belong to research misconduct? (1)Over-modification of research data. (2)Improper handling of research equipment. (3)Intentionally failing to publish the research results. (4)Separating the research results into too many publishing units.

22.

Which of the following descriptions regarding academic writing styles and publishing styles across different research fields and journals is incorrect? (1)Following academic writing styles and submitting in accordance with regulations are considered to be ethical research practices. (2)Establishing academic writing styles and submission regulations stifles researchers’ freedom of speech and is therefore not appropriate to ethical research.

(3)The writing styles of different research fields and journals might differ, but the main purpose is similar. (4)The purpose of establishing writing styles and regulations is to prevent inappropriate quotations and plagiarism, and thereby ensure publishing quality. 23.

In determining whether a copied work violates the Copyright Act, besides whether it complies with the provisions of Articles 44 through 65, or other conditions of fair use, what other factor shall be taken into account? (1)The factor of being "seen or heard." (2)The factor of "substantial similarity." (3)All of the above are correct. (4)All of the above are incorrect.

24.

Which of the following is the correct way to cite a source? (1)Put the quoted content in quotation marks in the text and italicize the original text. (2)Put the quoted content in the text and quotation marks before and after the original text. (3)Put the quoted content in a separate paragraph and quotation marks before and after the original text. (4)Put the quoted content in a separate paragraph and a dash before and after the original text.

25.

The graduate school Guang attends mandates that its graduates publish at least one periodical article before they graduate. Guang realizes that there is not much time left before graduation after he finishes his article. Unsure if he can have his article published in time, he decides to submit his article to three journals simultaneously to increase the chance of getting his work published. He also tells himself that he will drop out other submissions and only submit to one journal if his article is accepted by multiple journals. Does Guang's behavior constitute research misconduct? (1)No. Since he will select only one journal to submit to, his behavior is legitimate. (2)No. Duplicate submission is a common practice among the academic community because it increases the visibility of articles. (3)Yes. Submitting his article to multiple journals simultaneously is not wrong. However, for him to withdraw from multiple journals after his work has been accepted

is considered a waste of resources. It is legitimate for him to accept all of the publications. (4)Yes. Although he will ultimately select only one journal to publish with, his act of duplicate submission violates academic ethics. 26.

Which of the following descriptions about paraphrasing is incorrect? (1)Re-express the content of the source of the data. (2)Collate articles with different origins. (3)Render the rewritten paragraph substantially semantically different from the original text. (4)Try to use your own words to derive meanings from the original work.

27.

Which of the following descriptions about self-plagiarism is correct? (1)Feng: Using parts of the content from an in-class presentation from last semester in the presentation for this semester does not constitute self-plagiarism because the course contents are different. (2)Yun: Using charts from previously-published periodical articles with a rewritten description for the chart does not constitute self-plagiarism. (3)Ray: Selecting content from a previously published article to use in an article that will be published soon does not constitute self-plagiarism if the latter article is based on the former one. (4)Dian: Submitting a previously published article with revised content, a new topic, and proper citation to other journals does not constitute self-plagiarism.

28.

In addition to creating a more harmonious research culture, what are the other primary reasons for a researcher and research agency to properly manage conflicts of interest? a. to protect test subjects; b. to be socially responsible; c. to establish authority; d. to lay the foundation for academic research (1)a. d. (2)a. b. (3)a. b. d. (4)a. b. c. d.

29.

Which of the following is not the reason for using quotation marks or double quotation marks? (1)To inform the readers that the sentence does not include the author's own opinion. (2)It looks more academic to use quotation marks or double quotation marks. (3)To separate the sentence from the rest of the text written by the author himself. (4)To inform the reader that the sentence uses original text from other authors.

30.

In principle, when does an author obtain the copyright for his work? (1)The author obtains the copyright when the work is registered. (2)The author obtains the copyright when the work is completed. (3)The author obtains the copyright at the approval of the government authorities. (4)The author obtains the copyright when the work is kept on file for reference.

31.

Which of the following descriptions is correct regarding privacy? (1)Eavesdropping on private conversations among family members does not invade their privacy. (2)Exposing computational secrets is a privacy offense in the civil code (3)The Constitutional Law of Taiwan protects the basic rights to privacy. (4)The invasion of privacy is harder to define than other violations, therefore conviction is more difficult.

32.

The director of Research Institute A leading a research team in cell growth research was requested by Private Company B to use their products in the experiments and to embellish the product effect. A team member, C, later realizes that the product was not correctly described in the published research findings. What kind of conflict of interest is C presently in? (1)IRB conflict of interest (2)Environmental conflict of interest. (3)Organizational conflict of interest.

(4)Personal conflict of interest. 33.

Medical Institute A is planning to conduct a human subject experiment on B (a major with will capacity), but has failed to clearly inform B about related information concerning the experiment. B has already given written consent for A to conduct the human body experiment. Which of the following research ethics has A violated? (1)The researcher has the obligation to fully inform participants about the research, and participants have the right to give informed consent. Both of the preceding principles have been violated. (2)The researcher has the obligation to fully inform participants about the research, and participants have the right to give informed consent. Only the former principle has been violated. (3)The researcher has the obligation to fully inform participants about the research, and participants have the right to give informed consent. Only the latter principle has been violated. (4)The researcher has the obligation to fully inform participants about the research, and participants have the right to give informed consent. None of the above principles have been violated.

1.

Authors are entitled to the moral rights and economic rights subsisting in a completed work. Which of the following is not protected by the Copyright Act? (1)Right of public release. (2)Right of public broadcast. (3)Right of public recitation. (4)Right of public performance.

2.

In principle, coauthoring does not have which of the following impacts on the coauthor? (1)Academic prestige raised for the coauthor. (2)Academic responsibility enhanced for the coauthor. (3)Increase in research expenditure. (4)More research pressure.

3.

The prerequisite for effectively handling conflicts of interest is that the researcher must first

recognize that he could be affected by secondary interests. For a researcher facing a conflict of interest, which of the following should be included in the conflict management plan? a. disclose; b. recuse; c. permit; d. prohibit; e. protect; f. review. (1)a. b. c. d. e. f. (2)a. b. c. d. f. (3)a. c. d. f. (4)c. d. e. f. 4.

Mr. Smith confiscates Tom and Dicks’ exchange diary, which they were passing to each other in class, and reads the content during recess. Which of the following types of privacy has Mr. Smith violated? (1)Social contact privacy. (2)Protection of one's private life. (3)Right to be let alone. (4)Privacy of correspondence.

5.

Which of the following descriptions accords with the justice principle of the Belmont Report? (1)Not including a patient who meets the research requirements in a beneficial human subject test due to personal issues . (2)Using a particular indigenous group as a research subject due to stereotypical impressions about the group. (3)Using material incentives to attract underprivileged groups to participate in research. (4)After careful assessment of the risks and burdens of the research, ensuring that the tested subjects enjoy the maximum possible benefits from the research results.

6.

Which of the following will be impacted if the Personal Information Protection Act does not exist: (a) personality, (b) privacy, (c) safety, (d) autonomy, (e) the right to benefit? (1) (b) (c) (d) (2)(b) (c) (d) (e)

(3) (a) (b) (c) (d) (4) (a) (b) (c) (d) (e) 7.

Which of the following is not the behavior that a responsible researcher must exhibit when writing a research paper and achieving successful submission? (1)Learning about the academic writing format in your field of research. (2)Following the writing format to ensure aspects such as reasonable quotation, charting, and arrangement of...


Similar Free PDFs