Вы находитесь на странице: 1из 9

1.Which of the following descriptions of the Belmont Report is incorrect?

(1)It began with an incident


involving human subject experiment.(2)The Belmont Report emphasizes the principle of protecting the
test subject.(3)The vulnerable subjects: conducting the procedure of informed consent. (4)Systematic
assessment of risks and expected benefits: exercising the principle of justice.2.Which of the following
behaviors may have violated plagiarism in the academic field, but not necessarily copyright law?
(1)Taking the test explanation of national examinations published by some cram schools and copying the
content in a report without citing the reference.(2)Taking the press release drafted by administrative
institutes and copying the contentin a report without citing the reference.(3)Copying and translating a
classmate's presentation preface from Chinese into English, all without acquiring consent from him.
(4)Overhearing some ideas of classmates about the presentation and copying the ideas into another
presentation.3.There are several circumstances under which self-plagiarism can occur. Which of the
following is not a common cause for self-plagiarism?(1)The quantity of published works is insufficient for
the assessment of academic promotion.(2)Concern about being accused of plagiarizing others' research
content.(3)Hoping to strengthen the contribution of the research result.(4)Not having adequate time to
write the paper.4.Which of the following descriptions of falsification is incorrect?(1)Falsification occurs
when a researcher modifies or deletes research statistics, results,or graphs.(2)Falsification occurs when
researchers modify their research data or equipment to verify the set research hypothesiS

(3)Falsification occurs when a researcher changes the analysis statistics to make them statistically
significant and thereby support the research hypotheses. (4)Falsification occurs when a researcher
enters random numbers for analysis to finish the research paper on time, because the submission
deadline for a conference is approaching and there is no time to properly analyze the retrieved
data.5.Mary's mother cleaned her room while she was away at school. By doing so, did Mary's mother
invade Mary's privacy?(1)It depends whether Mary is of age .(2)If Mary feels upset, then her mother has
invaded her privacy.(3)Mary's mother hasn't received consent to enter Mary's room, so she has invaded
her privacy.(4)If Mary's mother does not touch any of Mary's private belongings, then she has not
invaded Mary's privacy.6.Which of the following definitions does not entail falsification?(1)The
researcher deliberately conceals research results that do not fit the research hypothesis.(2)The
researcher fabricates data that does not exist.(3)The researcher over-beautifies existing pictures in the
research.(4)The researcher unreasonably manipulates the research data.7.Johnny is writing a paper
about Internet education. Which of the following texts is a quotation used by Johnny?(1)Wang (2006)
considers that learners exchange their cultures with foreigners, using the Internet as a tool. This provides
students with more opportunities to see the world and develop more positive attitudes toward different
cultures.(2)The interviewed teacher of this research expressed the same view: I think that the Internet is
very convenient and helps students of different nationalities to eliminate their cultural differences, which
is nice. I think more and more people will learn by using the Internet in the future. (Teacher 1)(3)In
conclusion, the researcher suggests that instantaneity and borderlessness may help students of different
nationalities shorten their spatial and temporal distances as well as cultural differences
(4)All of the above are quotations.8.Which of the following is not the basic principle that must be
followed in the research process mentioned in the Belmont Report?(1)Respect personality.(2)Abide by
the law.(3)Be beneficent.(4)Be righteous.9.Which of the following descriptions about privacy and the
rights of privacy is incorrect?(1)Violation of privacy does not necessarily imply infringement upon the
right to privacy.(2)The scope of the right to privacy is wider than privacy.(3)Anything that you wish to
remain unknown is considered personal private information.(4)Privacy varies according to the feelings
and thoughts of individuals.10.Which of the following is not necessary to keep in mind when
summarizing?(1)The wording should be neutral, and the meaning of words should be precise.(2)Avoid
using too many sentences from the original text.(3)The order of the sentences in the original text should
be readjusted.(4)If a sentence from the original author's text is being used, it should be quoted.11.The
Personal Information Protection Act protects which of the following behaviors toward personal
information: (a) use, (b) process, (c) collection, (d) translation, and (e) adaptation?(1)(a) (c) (2)(a) (b) (c)
(3)(b) (d) (e)(4)(b) (c) (e

12.Which of the following groups are vulnerable subjects: (a) minors, (b) students, (c) military personnel,
(d) ill people, (e) homeless people, and (f) senior citizens?(1)(a) (b) (c) (d) (e) (f)(2)(b) (c) (d) (e) (f)(3)(a)
(c) (d) (e) (f)(4) (a) (b) (d) (e) (f)13.Shawn is writing a paper about Internet education. He is using
paraphrasing and summarizing to quote from others' texts and avoid plagiarism. Which of the following
texts is a summary by Shawn?(1)Wang (2006) considers that learners exchange their cultures with
foreigners, using the Internet as a tool. This provides students with more opportunities to see the world
and develop more positive attitudes toward different cultures.(2)The interviewed teacher of this
research expressed the same view: I think that the Internet is very convenient and helps students of
different nationalities eliminate their cultural differences, which is nice. I think more and more people
will learn by using the internet in the future. (Teacher 1)(3)All of the above are paraphrased texts.(4)All
of the above are summarized texts.14.Polly is a researcher in a medical factory. She is currently working
on a new medicine and is about to carry out a clinical trial on human subjects. Which of the following
research ethic codes has a direct impact on Polly's research?(1)The Animal Welfare Act(2)Statement on
Academic Ethics by the Ministry of Science and Technology(3)Law on Research Using Human
Subjects(4)Principles on the Application and Review of Academic Ethic Cases15.According to the
principles of conflicts of interest, which of the following is false?(1)The duty of the researcher is to
prevent secondary interests from having an undue influence over the primary interest.

(2)Researchers must not accept corporate sponsorship.(3)An IRB member must honestly disclose any
relationship with the applicant.(4)The conflict of interest review committee has the authority to review
any conflict of interest in the research.16.According to the Personal Information Protection Act, which
way of obtaining personal information requires preliminary notice of the source of the information be
provided to the party? (1)The manager obtains the contact information of an employee from the Office
of Personnel.(2)The carrier obtains the members' mobile phone numbers from online shopping sites.
(3)The reporter obtains the name of the wanted person from the police station.(4)The principal
investigator obtains the list of subjects from the research assistant.17.Which of the following
descriptions about in faculty–student collaborations are incorrect?(1)The thesis advisor is usually also
the corresponding author, who assists in communication and answers questions from the reader.(2)The
thesis advisor must be listed as the coauthor of the journal paper with their student as the first author.
(3)Before authoring the paper, there should be adequate communication between the faculty awnd the
student about the publication and authorship orders. (4)The faculty and the student should respect each
other's contribution to the research and the paper, and list the authors in the appropriate order.18.What
is the difference between the Academic Ethics Guidelines for Researchers and Guidelines for Handling
and Investigating Research Misconduct proposed by Ministry of Science and Technology?(1)The former is
a code of conduct, while the latter is a trial procedure.(2)The former is a review point, while the latter is
a code of conduct.(3)The former is a review point, while the latter is a description of criminal
responsibility. (4)The former is a code of conduct, while the latter is a description of criminal

responsibility.19.Which of the following descriptions is correct regarding the factors of fair use?(1)The
quotation must only be used for the purpose of writing academic papers.(2)If the quoted content is not
distinguished, then it might be considered plagiarism.(3)The quoted text must be completely the same
as the original text or it would be considered to be adaptation.(4)The quoted words must not have been
dictated because there is very likely to be a mistake.20.If the researcher fails to abide by the Personal
Information Protection Act while using personal information, several punishments can be incurred.
Which of the following is most unlikely to happen? (1)Being punished for a criminal code offense.
(2)Being punished for a civil code offense.(3)A negative effect on academic reputation.(4)Effects on
academic validity.21.According to the "Definition of research misconduct" unit, which of the following
does not belong to research misconduct?(1)Over-modification of research data.(2)Improper handling of
research equipment.(3)Intentionally failing to publish the research results.(4)Separating the research
results into too many publishing units.22.Which of the following descriptions regarding academic writing
styles and publishing styles across different research fields and journals is incorrect?(1)Following
academic writing styles and submitting in accordance with regulations are considered to be ethical
research practices.(2)Establishing academic writing styles and submission regulations stifles researchers’
freedom of speech and is therefore not appropriate to ethical research.

(3)The writing styles of different research fields and journals might differ, but the mainpurpose is similar.
(4)The purpose of establishing writing styles and regulations is to prevent inappropriate quotations and
plagiarism, and thereby ensure publishing quality.23.In determining whether a copied work violates the
Copyright Act, besides whether it complies with the provisions of Articles 44 through 65, or other
conditions of fair use, what other factor shall be taken into account?(1)The factor of being "seen or
heard."(2)The factor of "substantial similarity."(3)All of the above are correct.(4)All of the above are
incorrect.24.Which of the following is the correct way to cite a source?(1)Put the quoted content in
quotation marks in the text and italicize the original text.(2)Put the quoted content in the text and
quotation marks before and after the original text.(3)Put the quoted content in a separate paragraph and
quotation marks before and after the original text.(4)Put the quoted content in a separate paragraph and
a dash before and after the original text.25.The graduate school Guang attends mandates that its
graduates publish at least one periodical article before they graduate. Guang realizes that there is not
much time left before graduation after he finishes his article. Unsure if he can have his article published
in time, hedecides to submit his article to three journals simultaneously to increase the chance of getting
his work published. He also tells himself that he will drop out other submissions and only submit to one
journal if his article is accepted by multiple journals. Does Guang's behavior constitute research
misconduct?(1)No. Since he will select only one journal to submit to, his behavior is legitimate.(2)No.
Duplicate submission is a common practice among the academic community because it increases the
visibility of articles.(3)Yes. Submitting his article to multiple journals simultaneously is not wrong.
However, for him to withdraw from multiple journals after his work has been accepted

(3)Falsification occurs when a researcher changes the analysis statistics to make them statistically
significant and thereby support the research hypotheses. (4)Falsification occurs when a researcher
enters random numbers for analysis to finish the research paper on time, because the submission
deadline for a conference is approaching and there is no time to properly analyze the retrieved
data.5.Mary's mother cleaned her room while she was away at school. By doing so, did Mary's mother
invade Mary's privacy?(1)It depends whether Mary is of age .(2)If Mary feels upset, then her mother has
invaded her privacy.(3)Mary's mother hasn't received consent to enter Mary's room, so she has invaded
her privacy.(4)If Mary's mother does not touch any of Mary's private belongings, then she has not
invaded Mary's privacy.6.Which of the following definitions does not entail falsification?(1)The
researcher deliberately conceals research results that do not fit the research hypothesis.(2)The
researcher fabricates data that does not exist.(3)The researcher over-beautifies existing pictures in the
research.(4)The researcher unreasonably manipulates the research data.7.Johnny is writing a paper
about Internet education. Which of the following texts is a quotation used by Johnny?(1)Wang (2006)
considers that learners exchange their cultures with foreigners, using the Internet as a tool. This provides
students with more opportunities to see the world and develop more positive attitudes toward different
cultures.(2)The interviewed teacher of this research expressed the same view: I think that the Internet is
very convenient and helps students of different nationalities to eliminate their cultural differences, which
is nice. I think more and more people will learn by using the Internet in the future. (Teacher 1)(3)In
conclusion, the researcher suggests that instantaneity and borderlessness may help students of different
nationalities shorten their spatial and temporal distances as well as cultural differences.

(4)All of the above are quotations.8.Which of the following is not the basic principle that must be
followed in the research process mentioned in the Belmont Report?(1)Respect personality.(2)Abide by
the law.(3)Be beneficent.(4)Be righteous.9.Which of the following descriptions about privacy and the
rights of privacy is incorrect?(1)Violation of privacy does not necessarily imply infringement upon the
right to privacy.(2)The scope of the right to privacy is wider than privacy.(3)Anything that you wish to
remain unknown is considered personal private information.(4)Privacy varies according to the feelings
and thoughts of individuals.10.Which of the following is not necessary to keep in mind when
summarizing?(1)The wording should be neutral, and the meaning of words should be precise.(2)Avoid
using too many sentences from the original text.(3)The order of the sentences in the original text should
be readjusted.(4)If a sentence from the original author's text is being used, it should be quoted.11.The
Personal Information Protection Act protects which of the following behaviors toward personal
information: (a) use, (b) process, (c) collection, (d) translation, and (e) adaptation?(1)(a) (c) (2)(a) (b) (c)
(3)(b) (d) (e)(4)(b) (c) (e)

(4)All of the above are quotations.8.Which of the following is not the basic principle that must be
followed in the research process mentioned in the Belmont Report?(1)Respect personality.(2)Abide by
the law.(3)Be beneficent.(4)Be righteous.9.Which of the following descriptions about privacy and the
rights of privacy is incorrect?(1)Violation of privacy does not necessarily imply infringement upon the
right to privacy.(2)The scope of the right to privacy is wider than privacy.(3)Anything that you wish to
remain unknown is considered personal private information.(4)Privacy varies according to the feelings
and thoughts of individuals.10.Which of the following is not necessary to keep in mind when
summarizing?(1)The wording should be neutral, and the meaning of words should be precise.(2)Avoid
using too many sentences from the original text.(3)The order of the sentences in the original text should
be readjusted.(4)If a sentence from the original author's text is being used, it should be quoted.11.The
Personal Information Protection Act protects which of the following behaviors toward personal
information: (a) use, (b) process, (c) collection, (d) translation, and (e) adaptation?(1)(a) (c) (2)(a) (b) (c)
(3)(b) (d) (e)(4)(b) (c) (e

12.Which of the following groups are vulnerable subjects: (a) minors, (b) students, (c) military personnel,
(d) ill people, (e) homeless people, and (f) senior citizens?(1)(a) (b) (c) (d) (e) (f)(2)(b) (c) (d) (e) (f)(3)(a)
(c) (d) (e) (f)(4) (a) (b) (d) (e) (f)13.Shawn is writing a paper about Internet education. He is using
paraphrasing and summarizing to quote from others' texts and avoid plagiarism. Which of the following
texts is a summary by Shawn?(1)Wang (2006) considers that learners exchange their cultures with
foreigners, using the Internet as a tool. This provides students with more opportunities to see the world
and develop more positive attitudes toward different cultures.(2)The interviewed teacher of this
research expressed the same view: I think that the Internet is very convenient and helps students of
different nationalities eliminate their cultural differences, which is nice. I think more and more people
will learn by using the internet in the future. (Teacher 1)(3)All of the above are paraphrased texts.(4)All
of the above are summarized texts.14.Polly is a researcher in a medical factory. She is currently working
on a new medicine and is about to carry out a clinical trial on human subjects. Which of the following
research ethic codes has a direct impact on Polly's research?(1)The Animal Welfare Act(2)Statement on
Academic Ethics by the Ministry of Science and Technology(3)Law on Research Using Human
Subjects(4)Principles on the Application and Review of Academic Ethic Cases15.According to the
principles of conflicts of interest, which of the following is false?(1)The duty of the researcher is to
prevent secondary interests from having an undue influence over the primary interEst
(2)Researchers must not accept corporate sponsorship.(3)An IRB member must honestly disclose any
relationship with the applicant.(4)The conflict of interest review committee has the authority to review
any conflict of interest in the research.16.According to the Personal Information Protection Act, which
way of obtaining personal information requires preliminary notice of the source of the information be
provided to the party? (1)The manager obtains the contact information of an employee from the Office
of Personnel.(2)The carrier obtains the members' mobile phone numbers from online shopping sites.
(3)The reporter obtains the name of the wanted person from the police station.(4)The principal
investigator obtains the list of subjects from the research assistant.17.Which of the following
descriptions about in faculty–student collaborations are incorrect?(1)The thesis advisor is usually also
the corresponding author, who assists in communication and answers questions from the reader.(2)The
thesis advisor must be listed as the coauthor of the journal paper with their student as the first author.
(3)Before authoring the paper, there should be adequate communication between the faculty awnd the
student about the publication and authorship orders. (4)The faculty and the student should respect each
other's contribution to the research and the paper, and list the authors in the appropriate order.18.What
is the difference between the Academic Ethics Guidelines for Researchers and Guidelines for Handling
and Investigating Research Misconduct proposed by Ministry of Science and Technology?(1)The former is
a code of conduct, while the latter is a trial procedure.(2)The former is a review point, while the latter is
a code of conduct.(3)The former is a review point, while the latter is a description of criminal
responsibility. (4)The former is a code of conduct, while the latter is a description of criminal

responsibility.19.Which of the following descriptions is correct regarding the factors of fair use?(1)The
quotation must only be used for the purpose of writing academic papers.(2)If the quoted content is not
distinguished, then it might be considered plagiarism.(3)The quoted text must be completely the same
as the original text or it would be considered to be adaptation.(4)The quoted words must not have been
dictated because there is very likely to be a mistake.20.If the researcher fails to abide by the Personal
Information Protection Act while using personal information, several punishments can be incurred.
Which of the following is most unlikely to happen? (1)Being punished for a criminal code offense.
(2)Being punished for a civil code offense.(3)A negative effect on academic reputation.(4)Effects on
academic validity.21.According to the "Definition of research misconduct" unit, which of the following
does not belong to research misconduct?(1)Over-modification of research data.(2)Improper handling of
research equipment.(3)Intentionally failing to publish the research results.(4)Separating the research
results into too many publishing units.22.Which of the following descriptions regarding academic writing
styles and publishing styles across different research fields and journals is incorrect?(1)Following
academic writing styles and submitting in accordance with regulations are considered to be ethical
research practices.(2)Establishing academic writing styles and submission regulations stifles researchers’
freedom of speech and is therefore not appropriate to ethical research.
(3)The writing styles of different research fields and journals might differ, but the mainpurpose is similar.
(4)The purpose of establishing writing styles and regulations is to prevent inappropriate quotations and
plagiarism, and thereby ensure publishing quality.23.In determining whether a copied work violates the
Copyright Act, besides whether it complies with the provisions of Articles 44 through 65, or other
conditions of fair use, what other factor shall be taken into account?(1)The factor of being "seen or
heard."(2)The factor of "substantial similarity."(3)All of the above are correct.(4)All of the above are
incorrect.24.Which of the following is the correct way to cite a source?(1)Put the quoted content in
quotation marks in the text and italicize the original text.(2)Put the quoted content in the text and
quotation marks before and after the original text.(3)Put the quoted content in a separate paragraph and
quotation marks before and after the original text.(4)Put the quoted content in a separate paragraph and
a dash before and after the original text.25.The graduate school Guang attends mandates that its
graduates publish at least one periodical article before they graduate. Guang realizes that there is not
much time left before graduation after he finishes his article. Unsure if he can have his article published
in time, hedecides to submit his article to three journals simultaneously to increase the chance of getting
his work published. He also tells himself that he will drop out other submissions and only submit to one
journal if his article is accepted by multiple journals. Does Guang's behavior constitute research
misconduct?(1)No. Since he will select only one journal to submit to, his behavior is legitimate.(2)No.
Duplicate submission is a common practice among the academic community because it increases the
visibility of articles.(3)Yes. Submitting his article to multiple journals simultaneously is not wrong.
However, for him to withdraw from multiple journals after his work has been accepted

(3) (a) (b) (c) (d)(4) (a) (b) (c) (d) (e) 7.Which of the following is not the behavior that a responsible
researcher must exhibit when writing a research paper and achieving successful submission?(1)Learning
about the academic writing format in your field of research.(2)Following the writing format to ensure
aspects such as reasonable quotation, charting, and arrangement of references.(3)Reading the
requirements for submission to academic research journals to avoid misconduct behavior such as
duplicate submission, plagiarism, or infringement upon other authors’ copyright.(4)Using graphs and
tables at least once to summarize the results in the paper.8.Properly managing conflicts of interest can
ensure the “integrity of scientific research.” Which of the following behaviors would not affect the
integrity of scientific research?(1)Falsifying research findings.(2)Propagating industry–academic
cooperation.(3)Assigning authorship credit to people with no contribution.(4)Participating in dishonest
promotions.9.Which of the following is a case of information fabrication?(1)Professor Dunkirk duplicating
a postgraduate student's research content without citing references. (2)Professor Dunkirk being involved
in unusual relationships with one of his female students.(3)Professor Dunkirk using a fake academic CV
to apply for a research grant from the Ministry of Science and Technology.(4)Professor Dunkirk modifying
original research data for his postgraduate student.10.Party A medical institute is conducting research on
special diseases and thus performing a human subject experiment on Party B. Who

(3)There is a basic format for quoting, but it is also necessary to clearly indicate the reference at the end
of the text.(4)When using quotations in a text, quotation marks are not necessary to avoid confusing the
reader.25.Professional research ethics guidelines can help researchers practice which of the following
research principles: (a) Being honest, (b) Being subjective, (c) Being correct, (d) Being efficient, (e) Being
objective, (f) Protecting the subject?(1)(a) (c) (d) (e) (f)(2)(a) (b) (c) (d) (e)(3)(a)(b) (c) (d) (f)(4)(a) (b) (c)
(e) (f)

research value.32.Based on the Nuremberg principles, the Declaration of Helsinki, and the Belmont
Report, which of the following basic principles of research ethics can be derived? (1)The fair treatment
principle, researchers' responsibility to inform participants, the participants' right to informed consent,
the protection of participants' privacy.(2)The equal opportunity principle, the peaceful communication
principle, the sensible negotiation principle, and the confidential principle.(3)The efficiency principle, the
fair treatment principle, the universal principle, and specified rights and obligations.(4)The confidential
principle, protecting researchers’ and participants' privacy, the fair treatment principle, and the
efficiency principle. 33.Graduate student A always records his experiments using notes, including
information such as his reflections on the experiment, aspects to be improved, and the result of the
experiment. These notes are not published and are only used for his own reference. Subsequently, A
lends these notes to his friend B from the same lab and emphasizes not to share the notes to a third
party and not to expose the content in any manner. However, because B has a habit of keeping an online
blog, he puts some of the content from A's notes onto his own blog after reading them. B's blog serves
as a future reference for himself, and although it is open to the public, almost no one views the blog,
except for some close friendsof B.(1)B only posted the notes on his own blog, which does not contain
any advertisementsand thus has no commercial purpose. Therefore, B's behavior hasn't violated any of
A'srights.(2)If A discovers what B has done only a day after he posted the notes online and has B delete
them immediately, then B has not violated any of A's rights because the blog has not been viewed by
anyone yet. (3)If B has clearly cited the references of the notes and used them within reasonable areas,
then he can propose fair use of the content.(4)Although B has clearly stated the references and used the
content reasonably, B cannot propose fair use of the content.1.Liu is a teacher at Happy Elementary
School and a graduate student at Happy University. Her research instructor, Professor Huang, hopes that
Liu can let him observe the students in the back of the class she teaches for the benefit of his research—
with the permission from the students and their parents. Does Professor Huang's behavior fully accord
with the idea
that the subject must participate in the research voluntarily?(1)Yes, because Professor Huang does not
force Liu to agree to his request.(2)Yes, because Professor Huang and the subjects (students) do not
share an interest in the same matter.(3)No. The students' voluntariness may be affected because they
are worried about their personal academic performance.(4)No. The students have no right to decide
whether to participate in the research or not because they are persons who have a limited capacity to
make juridical acts.2.Min does not want others to know his fingerprints, sex life, and the content of his
medical records. Which of the above belongs to personal privacy protected by the law?(1)Fingerprints.
(2)Sex life.(3)Medical records.(4)All the above.3.Which of the following descriptions about improper
definition or authorship is incorrect?(1)The unfair ranking of an author might be the possible cause of
the improper definition or authorship.(2)Ghostwriting belongs to improper definition or authorship.
(3)Becoming a coauthor with the consent of the original author does not conform to theimproper
definition or authorship.(4)Incorrectly naming the author conforms to the improper definition or
authorship.4.Which of the following is a case of information fabrication?(1)Professor Dunkirk duplicating
a postgraduate student's research content without citing references. (2)Professor Dunkirk being involved
in unusual relationships with one of his female students.(3)Professor Dunkirk using a fake academic CV
to apply for a research grant from the Ministry of Science and Technology

Вам также может понравиться