Question 1
Question | What are the three main goals of data lifecycle management (DLM)? |
Your Answer | Confidentiality, availability, and integrity |
Result | Correct |
Comment | The first two goals of information protection, confidentiality and availability, entail that data access should be limited to authorized users, while ensuring that data are available to those who should have access. Maintaining the trustworthiness, or integrity, of the data is the third goal of DLM. |
Question 2
Question | Which of the following is true regarding data acquisition? |
Your Answer | Data acquisition should follow a detailed collection plan that is set in advance. |
Result | Correct |
Comment | Data acquisition planning should be detailed and set in advance. If adjustments are needed as the project unfolds, they should be carefully noted along with the reasons for the change. This responsibility should not be outsourced to others. |
Question 3
Question | In the research context, the term validity most commonly refers to: |
Your Answer | Whether operationalized terms actually measure what they purport to measure. |
Result | Correct |
Comment | In the research context, validity refers to the notion of whether operationalized terms actually measure what they purport to measure. |
Question 4
Question | Which of the following statements is true concerning data selection? |
Your Answer | Establishing a data selection strategy prior to collecting data decreases the chance of a biased outcome. |
Result | Correct |
Comment | The data selection strategy should be planned in advance to minimize bias. The selection strategy is an essential part of the research plan, but there is no federal mandate for it. |
Question 5
Question | Which of the following is true regarding data sharing and stewardship? |
Your Answer | Researchers who receive federal funding may have to adhere to a data sharing requirement. |
Result | Correct |
Comment | Data sharing requirements are common, especially when researchers are funded by federal agencies. Obligations to protect data can continue as long as the data are held. Researchers are not exempt from national security concerns. |