Premium Essay

5 Question Assessment Paper

In: Other Topics

Submitted By srfurlow
Words 311
Pages 2
5 Question Assessments

Chronological Life Events

• Ms. Shelly Skelton DOB 10/26/1985 Mother (PARAN) • Anthony Flores DOB 07/16/2002 Son (PIR) • Madison Flores DOB 07/17/2008 Daughter (PIR) • Family does not have any prior history with JCDHR, or any other county. • A report can in concerning the safety and well being of the children. The report stated that there is no working power, and the home is dirty. Also stated that there is a pit bull that use for fighting, and the dog poops all over the porch, and it’s rarely cleaned up. The report stated that Anthony is known for wearing dirty clothes to school, the mother Ms. Skelton is a “pill head” that abuses loratabs, opiates, and methadone. The report stated that Ms. Skelton allows her sister to smoke meth in the back room of the home, and that Ms. Skelton slaps and yells at Madison. The report also stated that there is never any food in the home for the children.

Area of Concern

• The safety of the children. • The potential for future maltreatment as it relates to no food in the home, no working power, and the house being excessively dirty. • The children not having food. • Anthony going to school dirty. • Ms. Skelton not performing parental duties and responsibilities. • Living arrangements seriously endanger a child’s physical health.

Potential Team Members/Projected Outcome

• Social worker • Social worker supervisor • Ms. Shelly Skelton • Anthony Flores • Madison Flores • Remain in the home.

Strengths/protective Capacities

• Family support • Protective capacity by mother and Father


• Is the power on, are has it been off recently. • Does Anthony go to school with dirty clothing? • Observed to see if the house appears to be dirty. • Ask about the drug use with mother and…...

Similar Documents

Free Essay

Lab 1 Assessment Questions

...Lab 1 Assessment Questions: 1. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA department LANs, departmental folders, and data. By establishing security principle within the Active Directory Domain. 2. Is it a good practice to include the account and user name in the password? Why or Why not? No it is not a good idea to include the account and user name in the password because there are Hackers out there who would use either a dictionary attack or brute force attacks which go though lists to find the correct combination of words, letters, numbers and characters in order to crack user names and passwords which depending on how simple or complex it is can take anywhere from 5 minutes or 5 months to decrypt, so it is a good practice to keep everything as unique as possible. 3. To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality? In this case the best way to ensure a strong password is to use 8 or more characters such as a mixture of Uppercase. Lowercase, numbers, and symbols in order to create a complex password that would be very difficult to crack. 4. Can a defined user in Active Directory access a shared drive if that user is not part of the domain? No they should not be able to access the shared folders unless they have authorized access. 5. Does Windows Server 2008 R2 require a user’s logon/password credentials prior...

Words: 469 - Pages: 2

Free Essay

Assessment Paper

...Name of Assessment: What’s My Jungarian 16 Type Personality? Individual Score: ENFP National Score: N/A Agree or Disagree?: Agree This assessment delves into the various personality traits that include Introverted or Extroverted (I or E), Sensing or Intuitive (S or iN), and Perceiving or Judging (P or J). These traits are the combined into a series of 4 letters that describe one’s personality. There are sixteen combinations of personality types that can be formed from this assessment. When deciding if one is Introverted or Extraverted, it is important to understand the flow of energy which essentially “defines how we receive the essential part of our stimulation.” If one receives their flow of energy from themselves, then they can be classified as Introverted but if they rely on external sources then they are Extraverted. How we take in information deals with our preferred way of absorbing. Does one rely on their five senses to absorb information? Then this individual would be characterized as Sensing! If the individual relies solely on their instincts then they can be classified as Intuitive. The last two categories deal with how an individual makes decisions. If the individual is prone to making decisions based on logic and objective considerations then they are classified as Thinking but if they make decisions based on one’s personal value system then they are classified as Feeling (BSM Consulting, 2012). These six categories presented me with the classification...

Words: 1884 - Pages: 8

Premium Essay

Ethical Self Assessment Paper

...Ethical Self Assessment Abstract * As Health care executives in this globally diverse world where cultural beliefs blends with societal ethics can one truly define ethics? What might be right to one person may not be right to another person. Ethics is one of the most important topics that should be addressed not just in this industry but in every aspects of the business world. But a major challenge with ethics is that it is a very relative term. After completing the American College of Healthcare Executives Ethical Self Assessment, the author found answers to questions included in this paper. Such this paper will address what I learn about my own ethical decision making from the self-assessments. The effect of professional ACHE standards to my ethical decision making will be discussed in this paper. How my individual ethics influence my decision making will be enumerated in this paper. Finally the strategies that I can adopt to improve my ethical decision making in the future will be enumerated in this paper. Ethical Self Assessment Paper As Hermans and Oles (1994) states, “The human person not only lives in a world of values but also is able to create values on a personal perspective” (p. 569). Value to me simply describes an individual or cultural belief system an individual may have. Values are viewed as objects or ideals important to an individual, called personal, or group of individuals, culture, or family. A personal value thus refers to an individual’s......

Words: 1418 - Pages: 6

Premium Essay

Heritage Assessment Paper

...Heritage Assessment Paper Grand Canyon University Family-Centered Health Promotion NRS 429 V Jen Costello October 6, 2013 Heritage Assessment Paper Because of the multicultural population dynamic existing in our country today as well as the increasing diversity of culture expected in the future, nurses need a streamlined means to determine both patients and families’ cultural history as well as current relative cultural practices to better meet the needs of the population they serve. The utilization of the health assessment tool serves to be an efficient means in which to accomplish this endeavor. This paper will explore and compare the cultural influences and views of three families of various cultural backgrounds to include their cultural beliefs of health maintenance, health protection, and health restoration. Additionally, this paper will also distinguish as well as evaluate their common health traditions and evaluate family traditions. Heritage Assessment Tool It is important that nurses have a framework to comprehensively and systematically assess a patent as well as a families’ heritage and cultural background in order to better understand the values, beliefs and attitudes they embrace toward health care. At the same time it is equally important that the nurse understand the specific considerations, approaches, and manners in which health care should......

Words: 1654 - Pages: 7

Premium Essay

Question Paper

... Section A: Short Answer Questions (total 15 marks) Answer all SIX (6) of the following questions (see individual questions for mark and word allocations). Question 1A. Select ONE concept in the theory of organisational culture and discuss how it informs what went wrong at Enron, as explained by Sherron Watkins in the Beenan and Pinto (2009) article (see Moodle). Do not simply describe the concept; the emphasis should be on discussion and application. (100 words; 5 marks) Question 2A. Given your knowledge of communication theory, what can you do to improve communication by email? (50 words; 2 marks) Question 3A. When you are leading a team or facilitating decision making, what will you do to prevent “groupthink”? (50 words; 2 marks) Question 4A. Why should managers care about job satisfaction? (50 words; 2 marks) Question 5A. Identify French and Raven’s five sources of power and group them according to the two categories of formal and personal power. Briefly comment on the significance of the two different categories. (50 words; 2 marks) Question 6A. Robbins and Judge (2013) state that agreeableness (one of the five traits in the Big Five Personality Model) is likely to result in lower levels of deviant behaviour. Briefly consider why “agreeableness” may not always be desirable. (50 words; 2 marks) Page 2 of 7 Section B: Compulsory Essay Questions (total marks = 45) Answer all parts of the following THREE (3) questions. Each question is compulsory, has......

Words: 1910 - Pages: 8

Free Essay

Assessment Questions It

...Lab #3 – Assessment Worksheet Identify & Classify Data for Access Control Requirements Course Name & Number: IS3230 ______________________________________________________________ Student Name: Heather Young ______________________________________________________________________ Instructor Name: MR. Gibbs _____________________________________________________________________ Lab Due Date: Jan. 2014 _______________________________________________________________________ Overview This lab provides the student with the opportunity to develop a data classification standard with procedures and guidelines to classify data access based on the job responsibilities – not an organizational position. In this lab, students aligned a data classification standard with the job function and roles that are required to access specific data. This alignment allows access controls policy definition to be properly implemented throughout the IT infrastructure to mitigate risk from unauthorized access. Lab Assessment Questions & Answers 1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications. Top Secret- highest level of information sensitivity Secret- information that would cause serious damage, most common classification level Confidential- Is the lowest of sensitivity. This information may only be handled by personnel with a clearance,......

Words: 993 - Pages: 4

Free Essay

Week 5 Assessment

...Lab #7 Assessment Questions 1. The Routing and Remote Access Services are need in Windows Server 2008 to provide remote access to clients. This service is important in a corporate environment because there is the potential to have several hundred or thousands of clients to manage and the IT personnel to support that many computer is limited and unable to provide hands on service to every client. 2. The IP host range for the remote VPN client pool is through 3. There are two encryption setting available from the remote access server, Microsoft Encrypted Authentication version 2 (MS-CHAPv2) and Microsoft Encrypted Authentication (MS-CHAP). MS-CHAPv2 is more secure and the best option to use but MS-CHAP does offer backwards compatibility. 4. During a Remote access session the client is only asked to provide it’s credentials once. This is an example of milt-factor authentication because the knowledge factor and the inherence factor used in the authentication of the user. 5. Strong encryption is important for both authentication and communication protocols because this is the connection used to communicate with the remote server. The weaker the authentication and communication protocol is then you are making it easier for unwanted user to gain access to your network. 6. MS Windows Server 2008 authentication protocols are EAP, MS-CHAPv2, MS-CHAP, and PAP. EAP is the strongest security by providing the most......

Words: 346 - Pages: 2

Premium Essay

Lab 1 & Assessment Questions

...IT255 Lab 1 & Assessment Questions Starting Nmap 5.21 ( ) at 2012-03-28 19:38 Eastern Standard Time Nmap scan report for Host is up (0.0054s latency). Not shown: 92 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1027/tcp open IIS MAC Address: 00:0C:29:99:40:7B (VMware) Skipping SYN Stealth Scan against because Windows does not support scanning your own machine (localhost) this way. Nmap scan report for Host is up. PORT STATE SERVICE 7/tcp unknown echo 9/tcp unknown discard 13/tcp unknown daytime 21/tcp unknown ftp 22/tcp unknown ssh 23/tcp unknown telnet 25/tcp unknown smtp 26/tcp unknown rsftp 37/tcp unknown time 53/tcp unknown domain 79/tcp unknown finger 80/tcp unknown http 81/tcp unknown hosts2-ns 88/tcp unknown kerberos-sec 106/tcp unknown pop3pw 110/tcp unknown pop3 111/tcp unknown rpcbind 113/tcp unknown auth 119/tcp unknown nntp 135/tcp unknown msrpc 139/tcp unknown netbios-ssn 143/tcp unknown imap 144/tcp unknown news 179/tcp unknown bgp 199/tcp unknown smux 389/tcp unknown ldap 427/tcp unknown svrloc 443/tcp unknown......

Words: 1062 - Pages: 5

Free Essay

Assessment Tools Paper

...Assessment Tools Paper Liberty University Online Abstract The paper covers six different assessment tools used to determine children’s learning profiles. This includes his or her interests, ability/intellectual level, achievement level, and personality type. Findings contain the Strong Interest Inventory, the Reynolds Intellectual Assessment Scales (RIAS), the Stanford-Binet Intelligence Scales, Fifth Edition (SB5), the National Assessment of Educational Progress (NAEP), the End-of-Course-Tests (EOCT), and the Myers-Briggs Type Indicator. Each section will answer key questions and give a short description of the given assessment tool. The goal of the paper is to understand the assessment tools available to discover the differences in students so that a teacher can adapt instruction to their needs. I. Interests A. Strong Interest Inventory The Strong Interest Inventory’s theoretical framework was developed in 1974 by John Holland. This theory is represented by a hexagon with the six themes that characterize most people. The order of the themes is called the R-I-A-S-E-C order and those most closely related are adjacent and those most dissimilar are across from each other. The Strong Interest Inventory assesses which theme or combination of themes characterizes an individual. The inventory contains 291 items that cover occupation, subject area,......

Words: 1203 - Pages: 5

Free Essay

Heritage Assessment Paper

...Heritage Assessment In 2012 the United States Census Bureau estimated there will be roughly 20 million new immigrants living in the U.S. over the next two decades (Plumer June, 2013). The results will be an increase of different cultures and traditions which healthcare workers will need to consider within their practice. The goal of this paper is to show the reader the usefulness of the Heritage Assessment tool when it is used to evaluate the individual’s needs in relation to culture and tradition. The author of the paper will share with the reader the interviews of families from three different cultures (the first being her own) and explore the common health traditions of their cultures and how the families subscribe to the traditions. Heritage Assessment tool The usefulness of the heritage assessment tool is to give the provider a way to understand the role of culture and traditions and how it affects the way a patient views health and illness. The tool uses simple questions regarding cultural background of an individual such as: the relationship of family members, religious beliefs, ethnic activities and language. At the end of the assessment the nurse will have a better idea of how the individual identifies with a particular culture and traditions. Mexican and Iraqi health culture and traditions The author......

Words: 1422 - Pages: 6

Free Essay

5 Research Questions for the Term Paper.

...5 Research Questions for the Term Paper. CIS-512 Andrew Dick Dr. Hamid Gooda 1. The first question of the five is about Advanced Micro Devices (AMD) processors. AMD is known for their processors, however, their line of products that they have stems even further now. In the microprocessors division they have the Athlon variety, X2, K10, X2, AMD Opteron (Miller, 2010), are the specific microprocessors that they have. They also offer servers. The processors of the Opteron are the processors that are available. AMD also offers motherboards to their users as well The AMD Crossfire series are available in this line along with many others. AMD recently acquired a leading video card manufacturer and is promising more advanced video capabilities coded into new versions of their motherboards. It also offers software and memory solutions for businesses. AMD is said to offer the same basic product as Intel, however, at a cheaper price. Intel is established as the market leader in producing motherboards and processing chips for personal computers, and their prices and development have influenced AMD from the start (Miller, 2010), AMD actually produces "clones" of Intel products as well as their own specific line of chips and motherboards as explained above. The AMD Athlon XP processor runs very close to an Intel 4 processor and it is about half the price (Miller, 2010). For example, if a side-by-side comparison is used between the AMD Athlon 64 X2(939) and the Intel Core 2......

Words: 1622 - Pages: 7

Premium Essay

Lab 5 Assessment Questions & Answers

...Training Policy? An acceptable use policy (AUP) is a document that outlines a set of rules to be followed by users or customers of a set of computing resources, which could be a computer network, website or large computer system. Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology. 4. Why is it important to prevent users from engaging in downloading or installing applications and software found on the Internet? There are hundreds of malicious programs that can cause damage to computers and information on the computers. They can also slow down machine, and they might even use the computer to spread themselves to entire organization. 5. When trying to combat software vulnerabilities in the Workstation Domain, what is needed most to deal with operating system, application, and other software installations? Perform windows update regularly, but checked those updates before installing. Install antivirus software and apply patches and quick scan once a day. Perform full scan on antivirus once a week. 6. Why is it important to educate users about the risks, threats, and vulnerabilities found on the internet and the World Wide Web? Users need to be aware of all the possible risks that come with dealing with internet and email. Such as pop ups, and also clicking on items that they should not be clicking on, which can cause significant damage to the company. 7. What are some......

Words: 717 - Pages: 3

Premium Essay

Chapter 5 Assessment

...Lab #4 - Assessment Worksheet Performing a Qualitative Risk Assessment for an IT Infrastructure Course Name and Number: CYBS 221 1001 Student Name: Kendall Watson Instructor Name: Dave Anderson Lab Due Date: September 20, 2015 at 11:59pm Overview In this lab, you defined the purpose of an IT risk assessment, you aligned identified risks, threats, and vulnerabilities to an IT risk assessment that encompasses the seven domains of a typical IT infrastructure, you classified the risks, threats, and vulnerabilities, and you prioritized them. Finally, you wrote an executive summary that addresses the risk assessment findings, risk assessment impact, and recommendations to remediate areas of noncompliance. Lab Assessment Questions & Answers 1. What is an IT risk assessment's goal or objective? Click here to enter text. The goal is to define how the risk to the system will be managed, controlled, and monitored. 2. Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure? A qualitative assessment is based on opinion than actual fact, and IT risk assessments need to be based on a quantitative analysis. 3. What was your rationale in assigning a "1" risk impact/risk factor value of "Critical" to an identified risk, threat, or vulnerability? The critical needs to be mitigated immediately. 4. After you had assigned the "1," "2," and "3" risk impact/risk factor values to the identified risks, threats, and......

Words: 428 - Pages: 2

Premium Essay

Assessment Tools Paper

...Assessment Tools Paper Student Name Liberty University EDUC 307 Date Look over the format of this sample paper. Note the comments along the left side of the paper that point out some of the expectations of the assignment. Look over the format of this sample paper. Note the comments along the left side of the paper that point out some of the expectations of the assignment. Abstract Assessment tools are used in classrooms, by teachers, to help them learn the many student differences. It is important for teachers to discover the different interests, ability/intellectual levels, achievement levels, and personality types of students so that they can effectively instruct students accordingly. Some assessment tools (tests) that have been found to help teachers discover these differences are Student Interest Survey for Career Clusters, Brigance Early Childhood Screen II K & 1, Woodcock-Johnson Tests of Cognitive Abilities, Kaufman Test of Educational Achievement, TerraNova/Cat 6 Test, and Millon Adolescent Personality Inventory. Interests 1. The Student Interest Survey for Career Clusters is a survey that is used for those exploring careers, or can be used by students for educational purposes only. The survey assesses students on their interests by having them answer questions by circling any and all of the given choices that best describe the student. This survey is fairly extensive, as the same 3 questions are asked 16 different times, but the list of answer......

Words: 1763 - Pages: 8

Premium Essay

Assessment Tool Analysis Paper

...Assessment Tool Analysis Paper Assessment is the first and most important element of the nursing process. Assessment tools are not merely designed to measure the physical nature of the illness. They can also measure the psychosocial, spiritual, and emotional well-being of the patient. Watson felt that addressing the patient's mind, body and spirit can promote health and individual or family growth. She felt that nursing was distinctive through the science of caring and medicine involved curing (Suliman, Welmann, Omer & Thomas, 2009). In this paper I will be discussing three assessment tools that can be used by nurses to verify better, organize, and interpret a patient's emotional and spiritual well-being. I will describe the purpose of each tool and the population it might be useful. I will give data such as; cost, length of time to complete, ease of using and intended population. I will also describe how this tool enhances the assessment phase of the nursing process and the quality of care delivered by the nurse. Lastly, I will apply these tools to the vulnerable older population chosen from my Self Awareness paper. The three assessment tools that I selected were: The Spiritual Well-Being Scale, Derogatis Stress Profile, and the Perceived Stress Scale. The Spiritual Well-Being Scale This Spiritual Well-Being Scale (SWBS) is an easy assessment tool, designed for adults to self-assess their perceived spiritual well-being. There are twenty questions answered by paper and......

Words: 1550 - Pages: 7