HUMS101
.docx
keyboard_arrow_up
School
Ivy Tech Community College, Indianapolis *
*We aren’t endorsed by this school
Course
101
Subject
Computer Science
Date
May 8, 2024
Type
docx
Pages
3
Uploaded by BrigadierStarPanther34 on coursehero.com
Kayla Hash
HUMS101
Community Project Part 4
5 May 2024
What is a typical day like in this role?
A typical day may involve overseeing the administration of the post, ensuring that the Constitution and By-Laws are adhered to, and directing activities as mandated by the membership. Commanders often engage in planning and executing programs that support veterans, active military, and their families. They may also represent the post at civic events, collaborate with other community organizations, and lead fundraising efforts for various initiatives. Additionally, commanders are responsible for maintaining the post's financial health, fostering a sense of camaraderie among members, and upholding the values of Americanism and patriotism that the Legion embodies.
What are the best and worst parts of this job?
Being a commander of an American Legion post is a role of significant responsibility and honor. One of the best aspects is the opportunity to lead and serve fellow veterans, their families, and the community, embodying the Legion's commitment to service and patriotism. Commanders have the unique privilege to influence and implement programs that support veterans' welfare, youth development, and national security initiatives. However, the role also comes with challenges. It demands a high level of decorum, leadership, and the ability to navigate complex organizational dynamics. Commanders must often balance the needs of their post with the expectations of the national organization, which can involve difficult decision-making and conflict resolution. The role is often seen as rewarding, offering a chance to make a lasting impact on the lives of many and to uphold the values that the American Legion stands for.
How do you practice confidentiality in this role?
Practicing confidentiality as a commander of an American Legion post is a critical responsibility that involves several key practices. Firstly, it is important to adhere to the organization's code of ethics and policies, which provide a framework for maintaining confidentiality. This includes respecting the privacy of members and safeguarding sensitive information. Commanders should ensure that all communications, especially those containing personal or confidential information,
are secure and shared only with authorized individuals. It is essential to be aware of and comply with any legal requirements related to confidentiality, such as those concerning personal data protection
Is client autonomy important at this agency? What does client autonomy look like here?
Client autonomy is a fundamental aspect of counseling and support services, including those provided by organizations like the American Legion. It involves respecting the dignity and rights of clients, allowing them the freedom to make their own decisions and to act on those decisions independently. In the context of the American Legion, client autonomy may manifest through the
provision of choices and support that honor veterans' self-autonomy, enabling them to remain integrated within their local communities. This approach aligns with the broader principles of self-determination and personal agency that are critical in social work and healthcare settings. The American Legion's commitment to client autonomy ensures that veterans receive care that not only meets their needs but also upholds their right to self-governance.
Describe your ideal traits for a professional human services worker.
An ideal professional in human services would exhibit a keen sense of empathy, allowing them to connect with clients on a personal level and understand their needs. They should possess excellent communication skills, both for listening to clients and for conveying information clearly and effectively. Patience and adaptability are also crucial, as they often work with diverse
populations and in situations that can change rapidly. A commitment to ethical practice and continuous learning would ensure they remain effective and responsive to the evolving field of human services.
What would be a typical salary range for human services professionals at this agency?
The typical salary range for human services professionals at the American Legion varies depending on the specific position and location. For instance, a Human Resources Specialist may
earn around $44,328 per year, while a Site Director's salary might be closer to $67,087 per year. These figures can fluctuate based on factors such as experience, education, and the cost of living in the area where the American Legion post is located. It is also worth noting that these salaries are accompanied by a range of benefits, which can include health insurance, paid time off, and retirement plans.
What does burnout mean to you? How do you work to prevent burnout?
Burnout is a state of emotional, physical, and mental exhaustion caused by excessive and prolonged stress. It occurs when one feels overwhelmed, emotionally drained, and unable to meet constant demands. Ways of preventing it, such as setting clear boundaries, taking regular breaks, practicing stress-reduction techniques, ensuring a healthy work-life balance, and seeking support when needed are a necessity. It is important to recognize the signs of burnout and take initiative-taking steps to manage stress.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Add a research method
Research MethodsHere you should describe the methodologies that you are employed in your project and the sources that you used. Basic to most projects will be online searches for materials such as web pages, articles, videos, and blogs. Social media such as Twitter or Facebook may play a role. Personal interviews with important people knowledgeable in your topic may be included. In some cases, it may be a good idea to do a survey. Include information on matchups between your sources and the stakeholders that you have identified and whose viewpoints are represented. Describe specifically how the researchmethods tie in with how you are advancing your project.
arrow_forward
Extreme Sports Web SiteExtreme sports encompasses certain activities perceived as having a high level of inherent danger such as BMX racing, skate boarding, mountain biking, ice climbing, and base jumping. You’ve always been a major fan and began selling caps and t-shirts with extreme sport themes, personalities, and inspirational sayings. As a result, over the past two years you have enjoyed traveling to many exotic venues around the world to sell your highly popular products at various events and competitions. You are thinking of starting a Web site to sell your products to extreme sports fans around the globe.
What information do you need to capture from a customer in order to accurately and completely fill an order?
arrow_forward
Extreme Sports Web SiteExtreme sports encompasses certain activities perceived as having a high level of inherent danger such as BMX racing, skate boarding, mountain biking, ice climbing, and base jumping. You’ve always been a major fan and began selling caps and t-shirts with extreme sport themes, personalities, and inspirational sayings. As a result, over the past two years you have enjoyed traveling to many exotic venues around the world to sell your highly popular products at various events and competitions. You are thinking of starting a Web site to sell your products to extreme sports fans around the globe.
What challenges can you expect in trying to set up and run a Web site with global appeal? How might you address these?
arrow_forward
Computer science What are the key factors that an evaluator consider while evaluating a research proposal?
arrow_forward
Project phishing
Topics of the review
Sub-topics
Project description: Outlines the objectives of your solution
Methodology: Discusses the techniques or processes used in designing your solution
Results: Overview of the solution, how the solution addresses the identified problem, limitations of the solution, challenges, recommendations for success
arrow_forward
Case study
A manufacturing company provides jobs for many people in a small town where employment is not easy to find. The company has stayed in the town even though it could find cheaper workers elsewhere, because workers are loyal to the company due to the jobs it provides. Over the years, the company has developed a reputation in the town for taking care of its employees and being a responsible corporate citizen.
The manufacturing process used by the company produces a by-product that for years has flown into the town river. The by-product has been considered harmless but some people who live near the river have reported illnesses. The by-product does not currently violate any anti-pollution laws.
Answer the following questions:
1. What are the issues of integrity, ethics and law posed in the case study?
arrow_forward
PROBLEM STATEMENTS:
"Because of the pandemic since it started in Wuhan in December 2019, most
countries have limited cross-border travel and have therefore had an impact on
the global tourism industry. Most countries have shut down the border to control
the spread of the virus. By early 2021, COVID-19 vaccines have been broadly
introduced and are effective and can reduce the risk of contracting and spreading
COVID-19. That has enabled people to cross the border and will give an
opportunity to the tourism industry."
In preparation for the opening of the border, the Government of Malaysia plans to develop an
Electronic COVID-19 passport information system (eCPIS) to store Malaysian immunization
information. You are required to develop this system to keep immunization information and
allow passport control officers to retrieve each individual immunization information, ECPIS
should contain the following information:
• Personal information (Name, passport no., age, and gender)
• Vaccination…
arrow_forward
What tasks do you think a “rescue robot” should be able to complete and why?
arrow_forward
Extreme Sports Web Site (Extreme Sports Web Site)
Extreme sports include activities that are considered to have a high degree of intrinsic risk, such as BMX racing, skate boarding, mountain biking, ice climbing, and base jumping, among others. As a lifelong enthusiast, you started selling hats and t-shirts with extreme sports themes, personalities, and inspiring sayings to raise money for charity. As a consequence, you have had the pleasure of travelling to many exotic locations across the globe over the last two years in order to sell your very successful goods at a variety of events and contests. When it comes to selling your goods to extreme sports enthusiasts all over the world, you're considering launching a Web site.
What difficulties could you encounter while attempting to distribute your goods to consumers in another country?
arrow_forward
It's hard not to second-guess your response when you witness pleas for aid from total strangers on social media, especially when those pleas are for money or medical treatment.
arrow_forward
About Pearson Charitable Foundation Pearson announced today that, to support and increase its efforts to maximise social impact, it will integrate its corporate responsibility activities and functions into its business and, as of 2015, will no longer fund the Pearson Charitable Foundation as the primary vehicle for its philanthropic and community activities. Having been informed of this change in its funding, the Foundation Board of Directors on November 17 passed a resolution to wind down its operations and close at the end of 2014. Since 2003, the Foundation has contributed more than $130 million to programs that improve learning opportunities for people throughout the United States and globally. Pearson Charitable Foundation Chief Executive, Mark Nieker, said: “The Foundation is proud of the contribution it has made for teachers and students around the globe in the course of our history, with the support of Pearson and our other funders. We would like to extend our thanks to the…
arrow_forward
CONFERENCE MANAGEMENT SYSTEM
AIM
To develop a project on Conference Management System.
PROJECT PLANNING
The Conference Management System is an online website where candidates can submit papers, register for the conference, and attend. There will be a review of the paper. The website will provide them with information about the conference, including the date and time. The candidate should submit the updated and camera-ready document after receiving the confirmation details. After that, the registration procedure will be completed.
PROBLEM STATEMENT
Candidates must first check in to the conference system before submitting their paper online. The reviewer then goes over the document and either accepts or rejects it, sending an acknowledgement to the candidate. The following are the steps in the Conference Management System process :
The candidate login to the conference management system.
The paper title is submitted.
The paper is been reviewed by the reviewer.
The reviewer…
arrow_forward
CONFERENCE MANAGEMENT SYSTEM
AIM
To develop a project on Conference Management System.
PROJECT PLANNING
The Conference Management System is an online website where candidates can submit papers, register for the conference, and attend. There will be a review of the paper. The website will provide them with information about the conference, including the date and time. The candidate should submit the updated and camera-ready document after receiving the confirmation details. After that, the registration procedure will be completed.
PROBLEM STATEMENT
Candidates must first check in to the conference system before submitting their paper online. The reviewer then goes over the document and either accepts or rejects it, sending an acknowledgement to the candidate. The following are the steps in the Conference Management System process :
The candidate login to the conference management system.
The paper title is submitted.
The paper is been reviewed by the reviewer.
The reviewer…
arrow_forward
CONFERENCE MANAGEMENT SYSTEM
AIM
To develop a project on Conference Management System.
PROJECT PLANNING
The Conference Management System is an online website where candidates can submit papers, register for the conference, and attend. There will be a review of the paper. The website will provide them with information about the conference, including the date and time. The candidate should submit the updated and camera-ready document after receiving the confirmation details. After that, the registration procedure will be completed.
PROBLEM STATEMENT
Candidates must first check in to the conference system before submitting their paper online. The reviewer then goes over the document and either accepts or rejects it, sending an acknowledgement to the candidate. The following are the steps in the Conference Management System process :
The candidate login to the conference management system.
The paper title is submitted.
The paper is been reviewed by the reviewer.
The reviewer…
arrow_forward
user stories
I need 5 user stories about Online Crime Management for my project
For example, user stories might look like that:As a police officer, i would like to be able to check for past records with an ID number(like a passport), so that I don’t have to use the name of the person
arrow_forward
Computer Science
Your supervisor has unveiled what she firmly believes is a great new plan that will improve what you do in your department (you may choose what type of business you are in based on your own career interests). After carefully studying the plan, however, you notice a number of potential pitfalls that are likely to make the plan fail (you choose the pitfalls). The problem is that your supervisor is extremely enthusiastic about the plan, and it appears that all of your colleagues are totally on board with it too. If you bring up your concerns, you are worried about being labeled as a negative person. At the same time, if you don't raise your concerns, there is a real chance that the plan will fail, causing real harm to your organization.
Your task is to write a message to your supervisor in the form of an email. In it, you will need to do all of the following.
Show appreciation for the hard work that went into the plan
Identify those aspects of the plan you believe…
arrow_forward
When reading articles about current events on a tablet computer, it is very necessary to be knowledgeable about the source or provenance of the material.
arrow_forward
Assigning group access controls eliminates individual accountability.
Select one:
O True
O False
arrow_forward
The Bright Light Academy The Bright Light Academy is a high school that is located in Midrand. The school opened its doors for enrolment of students in 2018. They enrol from Grade R to Grade 12. As of the last quarter of 2020, the school’s enrolment has grown tremendously to 400 students and they are anticipating that their enrolment will increase further. Since its inception, the school has been using Pastel Accounting to administer its finances. The school board of trustees has made a decision to develop an in-house integrated school management system. The school is hoping that the system will help in its blended learning strategy in the beginning of the second quarter of 2021. Source: Maodza, B. (2021)Question 4You have been hired as the Lead Architect of the school. Model a detailed use case diagram for the proposed integrated school management system.
arrow_forward
DRY infractions are those that fall outside of the guidelines.
Why do you think that is?
arrow_forward
– Ethical HackingLab #2 – Legal and Ethical
Overview
Write up a case that pertains to one of the laws mentioned in the course content or another law that is relevant to the cybersecurity landscape. Make sure to include your references. You should use what you learned about Google Hacking to find actual court documents that detail the case, the charges levied, and results of the case. Finding pertinent primary sources of information in this field can be quite a challenge.
Pick a case that has occurred in the last 7 years and summarize the main points of the case.
Explain which laws were cited in the case and go into detail about why they were applied. You may need to take a closer look at the law in question to describe this.
Explain the verdict of the case and your opinion of the ruling based on the law.
In your opinion, does the law need reform or will it still apply in the future. Why or why
arrow_forward
Please help, many have gotten wrong.
arrow_forward
If you're anxious during a presentation, list three particular techniques you may utilise.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Related Questions
- Add a research method Research MethodsHere you should describe the methodologies that you are employed in your project and the sources that you used. Basic to most projects will be online searches for materials such as web pages, articles, videos, and blogs. Social media such as Twitter or Facebook may play a role. Personal interviews with important people knowledgeable in your topic may be included. In some cases, it may be a good idea to do a survey. Include information on matchups between your sources and the stakeholders that you have identified and whose viewpoints are represented. Describe specifically how the researchmethods tie in with how you are advancing your project.arrow_forwardExtreme Sports Web SiteExtreme sports encompasses certain activities perceived as having a high level of inherent danger such as BMX racing, skate boarding, mountain biking, ice climbing, and base jumping. You’ve always been a major fan and began selling caps and t-shirts with extreme sport themes, personalities, and inspirational sayings. As a result, over the past two years you have enjoyed traveling to many exotic venues around the world to sell your highly popular products at various events and competitions. You are thinking of starting a Web site to sell your products to extreme sports fans around the globe. What information do you need to capture from a customer in order to accurately and completely fill an order?arrow_forwardExtreme Sports Web SiteExtreme sports encompasses certain activities perceived as having a high level of inherent danger such as BMX racing, skate boarding, mountain biking, ice climbing, and base jumping. You’ve always been a major fan and began selling caps and t-shirts with extreme sport themes, personalities, and inspirational sayings. As a result, over the past two years you have enjoyed traveling to many exotic venues around the world to sell your highly popular products at various events and competitions. You are thinking of starting a Web site to sell your products to extreme sports fans around the globe. What challenges can you expect in trying to set up and run a Web site with global appeal? How might you address these?arrow_forward
- Computer science What are the key factors that an evaluator consider while evaluating a research proposal?arrow_forwardProject phishing Topics of the review Sub-topics Project description: Outlines the objectives of your solution Methodology: Discusses the techniques or processes used in designing your solution Results: Overview of the solution, how the solution addresses the identified problem, limitations of the solution, challenges, recommendations for successarrow_forwardCase study A manufacturing company provides jobs for many people in a small town where employment is not easy to find. The company has stayed in the town even though it could find cheaper workers elsewhere, because workers are loyal to the company due to the jobs it provides. Over the years, the company has developed a reputation in the town for taking care of its employees and being a responsible corporate citizen. The manufacturing process used by the company produces a by-product that for years has flown into the town river. The by-product has been considered harmless but some people who live near the river have reported illnesses. The by-product does not currently violate any anti-pollution laws. Answer the following questions: 1. What are the issues of integrity, ethics and law posed in the case study?arrow_forward
- PROBLEM STATEMENTS: "Because of the pandemic since it started in Wuhan in December 2019, most countries have limited cross-border travel and have therefore had an impact on the global tourism industry. Most countries have shut down the border to control the spread of the virus. By early 2021, COVID-19 vaccines have been broadly introduced and are effective and can reduce the risk of contracting and spreading COVID-19. That has enabled people to cross the border and will give an opportunity to the tourism industry." In preparation for the opening of the border, the Government of Malaysia plans to develop an Electronic COVID-19 passport information system (eCPIS) to store Malaysian immunization information. You are required to develop this system to keep immunization information and allow passport control officers to retrieve each individual immunization information, ECPIS should contain the following information: • Personal information (Name, passport no., age, and gender) • Vaccination…arrow_forwardWhat tasks do you think a “rescue robot” should be able to complete and why?arrow_forwardExtreme Sports Web Site (Extreme Sports Web Site) Extreme sports include activities that are considered to have a high degree of intrinsic risk, such as BMX racing, skate boarding, mountain biking, ice climbing, and base jumping, among others. As a lifelong enthusiast, you started selling hats and t-shirts with extreme sports themes, personalities, and inspiring sayings to raise money for charity. As a consequence, you have had the pleasure of travelling to many exotic locations across the globe over the last two years in order to sell your very successful goods at a variety of events and contests. When it comes to selling your goods to extreme sports enthusiasts all over the world, you're considering launching a Web site. What difficulties could you encounter while attempting to distribute your goods to consumers in another country?arrow_forward
- It's hard not to second-guess your response when you witness pleas for aid from total strangers on social media, especially when those pleas are for money or medical treatment.arrow_forwardAbout Pearson Charitable Foundation Pearson announced today that, to support and increase its efforts to maximise social impact, it will integrate its corporate responsibility activities and functions into its business and, as of 2015, will no longer fund the Pearson Charitable Foundation as the primary vehicle for its philanthropic and community activities. Having been informed of this change in its funding, the Foundation Board of Directors on November 17 passed a resolution to wind down its operations and close at the end of 2014. Since 2003, the Foundation has contributed more than $130 million to programs that improve learning opportunities for people throughout the United States and globally. Pearson Charitable Foundation Chief Executive, Mark Nieker, said: “The Foundation is proud of the contribution it has made for teachers and students around the globe in the course of our history, with the support of Pearson and our other funders. We would like to extend our thanks to the…arrow_forwardCONFERENCE MANAGEMENT SYSTEM AIM To develop a project on Conference Management System. PROJECT PLANNING The Conference Management System is an online website where candidates can submit papers, register for the conference, and attend. There will be a review of the paper. The website will provide them with information about the conference, including the date and time. The candidate should submit the updated and camera-ready document after receiving the confirmation details. After that, the registration procedure will be completed. PROBLEM STATEMENT Candidates must first check in to the conference system before submitting their paper online. The reviewer then goes over the document and either accepts or rejects it, sending an acknowledgement to the candidate. The following are the steps in the Conference Management System process : The candidate login to the conference management system. The paper title is submitted. The paper is been reviewed by the reviewer. The reviewer…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Information Technology Project ManagementComputer ScienceISBN:9781337101356Author:Kathy SchwalbePublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,