Premium Essay

Reflective Log

In:

Submitted By zehra
Words 612
Pages 3
Scenario
Maria a recently divorced mother of three children desperately needs to return to work but nursing jobs in her area are scare there is one opening at a women’s health clinic that performs abortion the job which has excellent salary and benefits including on site child care looks great to Maria except that abortion are against her religious and personal belief.
Before we start to reflect on above scenario it’s necessary to reflect on what’s reflective thinking is according to “Dewey “contends that the purpose of this type of thinking is to achieve a goal and that the thought process is active and purposeful. Gardner’s (2001) research also found that reflective writing is indeed effective to students, increasing their ability to recognize and articulate their own values and attitudes and exposing them to new ideas, new knowledge, new avenues of critical thought, and new ways to critically problem solve. Firstly my feeling and perceptions regarding above scenario is ,Maria was in trouble as her value are destroying which she was learn from her child hood and she was passing from pain full process its very difficult to crush your value . According to Besjes-de, et al, (2011) values are derived from one’s personal life experiences and as a result they end up affecting an individual either in a positive or negative way.
Moreover, Christie (2005) argues that ethics is an important engagement since it helps one understand the complexities of life and relate to life’s experiences. Further if u looks up above scenario, if she overwhelms her value and went for the job because her need is very important at that time she turn up in negative way. Maria will go to be unhappy with her job if she joins because it didn't gratify her values .It is not easy to make that decision. When you know that your values are destroy The most important or significant aspects

Similar Documents

Free Essay

Reflective Log

...Reflective Log Hofstede’s 4 dimensions Power distance: Society can accept and expect that power is distributed unequally in the organizations and institutions. Power distance has different between large and small. People with large power distance will great acceptance of unequal power, but people with a small power distance want power to be shared equally. Some Asian countries are large power distance and western countries are small power distance. Uncertainty Avoidance: When a society has threat from ambiguous and uncertain situations, they try to through providing a safe job, setting up more formal rules and beveling experts’ assessment to avoid uncertain situations. Using weak or strong to describe uncertainty avoidance. Strong uncertainty avoidance is characterized by intolerance for behaviours and ideas that deviate from the norm. Collectivism vs Individualism: The extent to which people define themselves as autonomous individuals or members of groups. An individualist society is a loose organization of social structure. People just care about themselves and their immediate families. Collectivism societies are characterized by a strict social structure. People have their own group and want to get help from group, at same time members put emphasis on groups and be loyal to group. Femininity vs Masculinity: The distribution of emotional roles between the genders. A masculine society has social values such as competitiveness, assertiveness, self-confident materialism...

Words: 1615 - Pages: 7

Premium Essay

Reflective Log

...What I understood is that postmodern point of view is not easy to understand, but even more, it is difficult to take in marketing practices. However, as a philosophy, it has a lot to clarify the current trends. I am a student living in a foreign land called Ankara, which is a capital of Turkey. I really am in love with this country, but from time to time, I have a homesick. I miss my family, my relatives, my city with its atmosphere and Central Asian cuisine. Luckily, there is a small restaurant in Kizilay, which reminds me home and makes me relax. The whole restaurant is made up with a Central Asian style – the walls with paintings of steppe and eastern beauty, the mighty mountains with snow and with the pearl of Central Asia – horses. Fabric sofas with beautiful and exotic patterns, decors, like souvenirs made from leather and most importantly the smell from the kitchen, which create the light and cozy atmosphere of a Central Asian entertainment. Honestly, I was very happy looking to the menu, two years without home food is a big issue. It had most of dishes from Central Asian cuisine – starting from crunchy “samsy” to the oiled Uzbek “plov” served with a “shakarap” salad. After eating, we shifted to another ritual – drinking green tea. Surprisingly, the staff have served us tea in special Central Asian “pialats” with our national pattern. Pialat – is a round, expanding up a cup without a handle. I believe that fresh tea becomes much tastier if it served in pialat. All these...

Words: 294 - Pages: 2

Premium Essay

Reflective Log Tips

...Tips for Writing a Reflective Learning Log for an Assignment What is a reflective log? This kind of log is a record of your learning experiences, thoughts, feelings and reflections. It is not just a diary of what you have done, but a critical assessment of how you have progressed. It is less formal than other kinds of assignments - for example you should write in the first person. To be truly reflective you need to ask yourself some questions: • • • • • • What have I achieved? Have I made progress? Have I developed new skills? How might I use these skills in the future (at university or in the workplace)? How have I changed my learning style? What would happen if I continued to practice this new skill? Think about the last assignment you did.... • • • • • Were you satisfied with the result? How could you improve the process of planning, research or writing? How could you improve your marks? What new things did you try? How did you overcome any difficulties? The advantages of being a reflective learner Students who successfully keep learning logs often notice changes associated with reflection Accepting becomes questioning Information for this handout and presentation was taken from: Pulman, A. (2009) Blogs wikis podcasts and more. Basingstoke: Palgrave Macmillan Intolerant becomes tolerant Murphy, S. (2011)Wiki etiquette for students [online] Available at: Doing becomes thinking http://education.pbworks.com/w/page/ Descriptive becomes analytical 18697893/Wiki%20%Etiquette%20%for%20students...

Words: 493 - Pages: 2

Free Essay

Water Derivative Plot

...ANALYTICAL PLOTS FOR ANALYSING CONING & CHANNELING IN DIFFERENT RESERVOIRS OF UPPER INDUS BASIN OF PAKISTAN Muhammad Osama Jafri (NED University), Hafiz Haleem ud Din Farooqi (NED University), Waleed Anwar Saleem (NED University) Abstract Water and gas drive mechanisms pose different problems for a petroleum engineer. The most common tribulations encountered are water and gas coning, high permeability layer breakthrough and near wellbore water channeling. In order to identify and differentiate between these tribulations different techniques can be applied. In this extended abstract, the characteristic trends of log-log plots of WOR (Water Oil Ratio) vs. Time will be analyzed for different mechanisms on the basis of proposed techniques by K.S. Chan (SPE Paper No. 30775). The derivatives of the plots show different trends for coning and channeling which makes it easier to interpret the situation. The identification of the problems will contribute to optimize water/gas coning treatments and other encountered problems. This technique has been applied on the wells of Upper Indus Basin (Potwar region) of Pakistan for the identification of coning or channeling in the wells. Introduction In a hydrocarbon reservoir, water is the most abundant fluid existing in the pores with the oil and as a separate phase in an aquifer. Broadly, the produced water can be classified as good water and bad water. Good water is the water which sweeps or displaces the oil and is produced within the economic...

Words: 1149 - Pages: 5

Premium Essay

Welco Lumber Case Analysis

...size of 365 logs being processed. However, actual data provided proved that it was a true sample size of only 362 logs, as data for logs # 30, 123, and 127 are missing from his report. He videotaped 3 operators, April, Sid, and Jim, marking the logs, how each log was broken down and the degree to which the cants were properly centered. Gene then did a comparison of what the cost was of the log in its current condition (actual value), to what would have been the correct value of the log if the cut had been accurate (potential value). This allowed him to see the potential revenue that Welco Lumber Company is losing out on their business (profit gain). Question 1: How much profit is lost on imperfect board cuts? During the processing of 362 logs, it was found that exactly half (181) or fifty percent were processed without error. The remaining 181 logs were found to have undergone some type of error in the breakdown process—excessive log breakdown, off center cant, reduced value cut. As a result, the Welco Lumber Company missed out on $735.14 in potential profit. Taking these results one step further, the potential amount of money lost on each of the 181 logs with errors was broken down into ranges of value lost as shown below. From the graph we can see the nominal value that was lost the most fell between the $1.51 to $4.50 ranges. Question 2: How does performance vary among operators? Below is a table that shows the analysis of each operator by log size, log volume, and...

Words: 663 - Pages: 3

Premium Essay

Microsoft Server 1 Lab 6.1

... 1.What headings are available in the right-handed pane?montor tools,data collector ,and reports 2.What is monitored by% idle time? 3.What instances are available in the instances osf slected object section? 4.What is the average value of% idle time of the w2k839 computer?95.418 5.What is the average value of processor queue length on the W2kzzcomputer? 0.700 6.What subheading are available in the system stability report selection? Software unitalls, application failure, hardware failure, windows and miscellaneous 7.Waht logs are available by default? Application,security,setup,system and forward event 8.What is most recent Event id logged to the Application log? Application,security,setup,system,forward events 9.What is the most recent Event ID logged to security log? 4634 10.What is most recent event id logged to setup log? 1610 11. What is most recent event id logged to system log? 7036 12.How many events are displayed in this custom view? 52 13.What is the keyboard shortcut to begin a network capture? F5 14.What appears in the Capture Filter pane? 15.Does anything appear in the Network Conversations pane? no 16.Does anything appear in the Network Conversations pane? All traffic,my traffic, 17.Where will WSUS downloads be stored by default? (c:/wsus) 18.What database does WSUS use by Default? MSDE 19.What types of updates does WSUS download by default? Automatic updates 20.What...

Words: 260 - Pages: 2

Premium Essay

Business Level 3 Unit 5 M1

...M1: Discuss the importance of keeping fault logs Fault logs are used to record the occurrence of danger and faults on a computer, these faults can then be used in the future if the problem happens again so the technician can decide the problem quickly without having to troubleshoot it again. These faults can be problems such as hardware or software errors that require a certain technique to fix this can be listed in the notes in the fault log for the technician to quickly fix the problem. Due to a number of faults that will be recorded a day it is a good idea to keep records on servers so they can be accessed from different locations such as mobile devices and desktop computer with multiple users connected at one time which means that multiple technicians can fix multiple problems simultaneously....

Words: 639 - Pages: 3

Premium Essay

Reflective Review

...20 Self-Reflection As they are intervening in complex human systems, capacity-development practitioners need to be flexible, adaptable and willing to learn from what they do. An important source of learning in real time is the processes and results of monitoring and evaluation (M&E). Bruce Britton explains M&E activities as they are commonly pursued and explores creative ways in which practitioners can use them for personal learning and selfreflection. He also provides suggestions on how this can be done under non-conducive organizational conditions. Monitoring and Evaluation for Personal Learning Bruce Britton By three methods we may learn wisdom: first, by reflection, which is noblest; second, by imitation, which is easiest; and third by experience, which is the bitterest. (Confucius) Introduction Capacity development practitioners collaborate in efforts to improve the capabilities of complex human systems that operate and connect at different levels. First and foremost, capacity development is a process based on the assumption that better understanding and knowledge will bring about change. Also, the planning for capacity development interventions typically rely on variations of the Logical Framework Approach (LFA), which encourage careful thinking about expected outcomes and impacts. By its very nature LFA assumes that intended results of an initiative can be established in advance because the path that a capacity development process will take can be adequately...

Words: 6167 - Pages: 25

Premium Essay

Assignment 1- Reflective Learning Log (Rll)

...RLL NURS1101 Week 3: Nursing as an Art & Science Week 3’s NURS1101 class commenced with a DVD lecture on seizures & the different type’s people could succumb to. The level & seriousness is determined by the seizure classification indicator. First it is divided into being a partial or generalised activity, a partial seizure is one originating in one part of the brain & is diagnosed as simple or complex, whereas a generalised seizure’s activity involves the entire brain & diagnosed as absence, myoclonic, tonic clonic, tonic or atonic. The information is set out in a table for on the website: www.epilepsy.org.au/aboutepilepsy/understandingepilepsy/seizuretypeclassification. Discussion about the different types of seizures people can have is included in the opening tasks of this week’s tutorial. Displayed for students information & awareness on the room display boards is “Maslow’s Hierarchy of Needs”, students are asked to interpret this information, discuss & describe how a nurse needs to apply it as professional activity during working hours, keeping in mind OH&S & the level of safety & security. Included in Maslow’s Hierarchy & displayed as a pyramid connecting on thing to the one above are self actualisation, esteem, belongingness & love, safety & physiological needs. For the first case study you have to apply Maslow’s Hierarchy of Needs to Mrs Wall the 80 year old with history of MRSA, diagnosed early dementia & dysphagia. Also discuss the risks for the attending nurse, the...

Words: 2270 - Pages: 10

Premium Essay

Reflection in Management

...Critically discuss the importance of reflection in the practice of management Student ID:20583416 Course: The reflective manager (MD4046) Lecturer: Dr. Elias Hadjielias Fall 2012 Assignment no. 1 Table of Contents Introduction Page 1.1 General Introduction to Reflection 3 1.2 Objectives and Purpose of the essay 3 Main Body 1.3-1.6 Review of Literature 3-4 1.7 Personal opinion of the writer 4 1.8 A practical example of Reflection in a certain case 4 1.9 Recommendations from the writer 5 Conclusion 2.0 Summary pg.3 5 2.1 References ...

Words: 1730 - Pages: 7

Free Essay

Creating Data Guard

...Step-by-Step Instructions for Creating a Physical Standby Database using SQL commands 1. General Overview : The purpose of this document is to create a step by step guideline for using the Oracle Dataguard a High available mechanism. I spent about 7 days investigating about a problem faced from my first dataguard experience. Both primary and standby servers are on linux redhat : same version of OS. - Primary DB : 10.2.0.1 - Standby DB : 10.2.0.3 - Host Name of Primary DB : arcdb01.es.egwn.lan - Host Name of Standby DB : x06.d15.lan I m trying to setup oracle dataguard for 10G ; both primary and standby databases are in 10GR2. Configuring Oracle DataGuard using SQL commands – Creating a physical standby database ; I can’t get the log files or Archive logs on my StandBy db. Checking v$archive_dest_status view on PRIMARY DB, I found the error below : FROM PRIMARY DB : I getting an error Oracle not available SELECT * FROM v$archive_dest_status DEST_ID 2 DEST_NAME LOG_ARCHIVE_DEST_2 STATUS ERROR TYPE PHYSICAL DATABASE_MODE UNKNOWN RECOVERY_MODE UNKNOWN PROTECTION_MODE MAXIMUM PERFORMANCE DESTINATION X06.D15.LAN STANDBY_LOGFILE_COUNT 0 STANDBY_LOGFILE_ACTIVE 0 ARCHIVED_THREAD# 0 ARCHIVED_SEQ# 0 APPLIED_THREAD# 0 APPLIED_SEQ# 0 ERROR ORA-01034: ORACLE not available SRL NO DB_UNIQUE_NAME STANDBY SYNCHRONIZATION_STATUS CHECK CONFIGURATION SYNCHRONIZED NO Logfiles were not applied on my standby DB even I thougth all confirgurations were succesfully done, until I realized...

Words: 2998 - Pages: 12

Free Essay

Class Title

...Access Card takes its obligations regarding privacy very seriously, and it wants to ensure users are fully informed about the Information they are providing to it. Collection of Information. In connection with the Site, First Access Card may collect Information in the following ways: through registration forms filled out by a user on the Site, through Information provided by a user in connection with the purchase of products or services on the Site, through the maintenance and analysis of web server logs, via e-mail sent by a user to First Access Card, through the use by First Access Card of third-party databases from which user information is extracted and combined with Information obtained by First Access Card through other means. First Access Card may also collect non-personally identifiable information from users via "cookies" (small text files placed by First Access Card on user computers), single-pixel GIF image files (also called “Web beacons”), Web server log analysis and other similar technological means. Such non-personally identifiable information may be used to track site trends and enhance the user experience, and may be shared with third parties. To the extent third parties may place advertising on the Site, such third parties may utilize cookies or other technological means within the advertising to collect and utilize non-personally identifiable information. First Access Card is not responsible for information collected by third parties in this...

Words: 1040 - Pages: 5

Premium Essay

Qwert

...accesses the relevant sources to answer the user’s query efficiently. Most organizations are familiar with Penetration Testing (often abbreviated to, “pen testing”) and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files. However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially undetectable. Very little information has been publicly discussed about arguably one of the least understood, and most significant stages of penetration testing – the...

Words: 284 - Pages: 2

Free Essay

Introducing Transaction Log Files

...Introducing Transaction Log Files Each SQL Server 2000 database has at least one transaction log file and can have multiple transaction log files spread across a number of disks. Each transaction log file is a separate operating system file and is used by only one database. Each transaction log file generally has the .ldf filename extension (this extension is not required). Each transaction log has a logical filename that is used in Transact-SQL statements and a physical filename that is used by the Windows operating system. Additional file properties include the file ID number, initial file size, file growth increment (if any), and maximum file size. Unlike data files that contain pages, transaction log files contain a series of transaction log records. A sequential log sequence number (LSN) identifies each transaction log record. Regardless of the number of physical log files, SQL Server 2000 treats the transaction log as one continuous log. SQL Server 2000 logically divides each physical transaction log file into a number of virtual log files (VLFs). The number and size of virtual log files are determined dynamically based on the size of each transaction log file. Each transaction log file has at least two VLFs. Each growth increment (if any) is treated as a separate physical file with its own VLFs. The number or size of VLFs cannot be configured or set directly by the database administrator. SQL Server 2000 tries to maintain a small number of virtual file logs because it operates...

Words: 2158 - Pages: 9

Free Essay

Database Management Improvement Strategies

...Tasks improve the quality of datasets According to (Shankaranarayan & Even, 2009) specific tasks that could be performed to improve the quality of datasets using SDLC are: Auditing. Quality defects occur during data processing (e.g., due to miscalculation, or mismatches during integration across multiple sources), or after data is stored (e.g., due to changes in the real-world entity that the data describes). Addressing these defects requires auditing records, monitoring processes, and detecting the existence of defects. Correction. It is often questionable whether the detected defects are worth correcting. Correction might be time consuming and costly (e.g., when a customer has to be contacted, or when missing content has to be purchased). One might hence choose to avoid correction if the added value cannot justify the cost. Prevention. Certain methods can prevent data defects or reduce their occurrences during data acquisition, for example, improving data acquisition user interfaces, disallowing missing values, validating values against a value domain, enforcing integrity constraints, or choosing a different (possibly, more expensive) data source with inherently cleaner data Data Refinement: Datasets are refined at regular intervals and database is checked for the orphan accounts if any in the system. Orphan accounts may result into dangerous issues so it should be handled carefully. Data Governance implementation: Data Governance Maturity model can be implemented....

Words: 743 - Pages: 3