A conflict of interest can also be known as ‘competing interest’. A conflict of interest can occur when you, or your employer, or sponsor have a financial, commercial, legal, or professional relationship with other organizations, or with the people working with them, that could influence your research.
When you submit your paper to a journal, full disclosure is required. The journal editor will firstly use this information to inform their editorial decisions. Then they will publish such disclosures to assist readers in evaluating the article. Or, the editor may instead decide not to publish your article on the basis of any declared conflict of interest.
You can declare the conflict of interest in your cover letter or on the manuscript submission form in the journal’s online peer-review system.
Conflict of interests can be financial or non-financial in nature. To maintain transparency, any associations which can be perceived by others as a conflict of interest must also be declared.
What are the benefits of open access publishing?
There’s increasing pressure on researchers to show the societal impact of their research. Open access can help your work reach new readers, beyond those with easy access to a research library.
Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (32)
If a programmer tries to add decimal numbers 14 and 15 using a binary system with only four bits, what will the result be?
An overflow error will occur because 4 bits is not large enough to represent either of the values 14 or 15.
Which of the following actions is most likely to raise legal or ethical concerns?
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
Which of the following is an advantage of a lossless compression algorithm over a lossy compression
algorithm?
A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.
Which of the following is NOT an advantage of using open-source software?
The original developer of open-source software provides free or low-cost support for users installing and running the software.
What is the hexadecimal (base 16) number 56 in the decimal system?
86
What is the decimal number equivalent to the binary number 1001010?
74
A researcher wants to publish the results of a study in an open access journal. Which of the following is a direct benefit of publishing the results in this type of publication?
The researcher can allow the results to be easily obtained by other researchers and members of the general public.
What are the three binary numbers equivalent to 75, 0, and 130 respectively?
1001011, 0, and 10000010
What are the decimal numbers equivalent to 1111-1111, 1111-1111, and 1111-0000
255, 255, 240
An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?
2 times as many items can be uniquely identified.
Can 8 different patterns of bits be represented by 4 bits?
yes
In a certain computer program, two positive integers are added together, resulting in an overflow error. Which of the following best explains why the error occurs?
The program can only use a fixed number of bits to represent integers; the computed sum is greater than the maximum representable value.
A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs?
Compressing the file using a lossless compression algorithm before uploading it
Is replacing repeating characters with single symbols and creating a mapping that pairs each pattern to the symbol a form of lossy or lossless compression and why?
Loss transformation because an encoded string can be restored to its original version.
A user reads reviews of a popular artist's new album and then downloads the album from the Web site of a licensed online music seller. Which of the following is LEAST likely to be a consequence of this action?
The user will be in violation of the Digital Millennium Copyright Act (DMCA).
Which of the following best describes the impact of Creative Commons?
Creative Commons gives creators of digital content the ability to indicate how their works can be legally used and distributed, enabling broad access to digital information.
Why would an author get a Creative Commons license for a book that they wrote?
To make it free to the public as well as allow others to use and modify the book for their own purposes.
Which of the following is a true statement about data compression?
There are trade-offs involved in choosing a compression technique for storing and transmitting data.
Which of the following can be represented by a sequence of bits?
An integer, an alphanumeric character, and a machine language instruction.
Which of the following are true statements about the data that can be represented using binary sequences?
They can be used to represent strings of characters, colors, and audio recordings.
What are the decimal equivalents of the binary numbers 0011, 0110, and 1111?
3, 6, and 15
The position of a runner in a race is a type of analog data. The runner's position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?
The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sample.
How many times bigger is a 128-bit address than a 32-bit address?
2^96
A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?
A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.
A media librarian at a movie studio is planning to save digital video files for archival purposes. The movie studio would like to be able to access full-quality videos if they are needed for future projects. Which of the
following actions is LEAST likely to support the studio's goal?
Using lossy compression software to reduce the size requirements of the data being stored
A musician is creating a song using audio samples. Which of the following actions will minimize the risk of a copyright violation when creating sample-based music?
Using samples published with a no-rights-reserved Creative Commons license
Each student that enrolls at a school is assigned a unique ID number, which is stored as a binary number. The ID numbers increase sequentially by 1 with each newly enrolled student. If the ID number assigned to the last student who enrolled was the binary number 1001 0011, what binary number will be assigned to the next student who enrolls?
1001 0100
A programmer created a piece of software and wants to publish it using a Creative Commons license. Which of the following is a direct benefit of publishing the software with this type of license?
The programmer can specify the ways that other people are legally allowed to use and distribute the software.
List the following numbers in order from least to greatest:
-Binary 1011
-Binary 1101
-Decimal 5
-Decimal 12
Decimal 5,
binary 1011,
decimal 12,
binary 1101
A computer evaluates 2/3 as 0.6666667. What explains this result?
The precision of the result is limited due to the constraints of using a floating-point representation.
If a photographer is manipulating a digital image, but still wants to be able to reconstruct the image later, what can he do to to the image that is a lossless transformation of the digital image.
Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed.
Come up with a string that cannot be shortened using byte pairing.
EX: "LEVEL_UP"
As long as the string didn't have any repeating pairs of characters, the answer is correct.
Sets with similar termsap csp mc
51 terms
m_fish007
APCSP final exam review 18
89 terms
lilbyrne86
Sets found in the same folderComputer Science Principles Midterm
30 terms
sofiawesome14_
AP CSP Unit 2
27 terms
Lily_E777
APCSP Unit 4
24 terms
JLau-MATEACHER
Compsci Review
49 terms
RyanD658
Other sets by this creatorEcon Unit 1 Study Guide
22 terms
Tenzin_Tsult
Trig Ratios - Complete Set
96 terms
Tenzin_Tsult
Gatsby Deep Dive Qs: Chs 3-6
23 terms
Tenzin_Tsult
Qualitative Analysis and Chemical Bonding
19 terms
Tenzin_Tsult
Verified questions
COMPUTER SCIENCE
Assume a color display using 8 bits for each of the primary colors (red, green, blue) per pixel and a frame size of 1280 x 1024. a. What is the minimum size in bytes of the frame buffer to store a frame? b. How long would it take, at a minimum, for the frame to be sent over a 100 Mbit/s network?
Verified answer
COMPUTER SCIENCE
Write a function named times_ten. The function should accept an argument and display the product of its argument multiplied times 10.
Verified answer
COMPUTER SCIENCE
What is a local variable? What statements are able to access a local variable?
Verified answer
COMPUTER SCIENCE
Suppose a stack is implemented using a singly linked list. Where in the list would it be best to have the push and pop operations take place? $$ \begin{matrix} \text{push} & \text{pop}\\ \text{a. head of list} & \text{head of list}\\ \text{b. head of list} & \text{tail of list}\\ \text{c. tail of list} & \text{head of list}\\ \text{d. tail of list} & \text{tail of list}\\ \text{e. All choices would be equally correct and efficient.}\\ \end{matrix} $$
Verified answer
Recommended textbook solutionsFundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Introduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Other Quizlet setsSocial Studies Praxis
101 terms
ashkashbagash
Chapter 3 Section 3
13 terms
Brianna-Farrish
Methods Practice Questions
15 terms
ChezzyWezzy2x4
Chapter 72
15 terms
Tierra_Bivens
Related questionsQUESTION
Eric's computer slows down when he opens several computer programs. Why does this happen?
15 answers
QUESTION
Which statement is correct about subroutines and functions in VB?
3 answers
QUESTION
A Rules-based artificial intelligence system is designed based on the rules the human brain uses to function.[True or False]
3 answers
QUESTION
Used inside method definitions or even smaller blocks of statements within a method ..you can use them only while the method or block is being executed by the java interpreter.they cease to exist afterward
8 answers