Create a self-analysis portfolio for assignment

Assignment Help English
Reference no: EM133459946

Directions Project:

Create a Self-Analysis Portfolio For this assignment, you will apply many of the theories and psychological concepts you learned about throughout the term to yourself.

This is meant to be fun, creative, and meaningful, so I encourage you to allow enough time for deep reflection and a creative representation of your assignment (include images for each section and a title for your portfolio!) Be sure to include a title page and references; create your portfolio using the final project template. My Personality Take this free personality test. In a written response, share your results and your opinion of the accuracy of the assessment (400-600 words + citations of course material). Do your personality traits reflect the influence of nature, nurture, or both?

Explain in detail. Based on the theories of personality development that you learned about (psychodynamic, trait, humanistic, biological, etc.) select one and analyze your own personality through the lens of this perspective. What impact has your culture had on your personality? Explain.

Remember to support your answers with specific evidence from the course content. My Learning Review our work in Module 3. Behaviorists argue that we are a product of our environment. Share examples of how operant conditioning (B.F. Skinner) and social learning (Bandura) have shaped you to become who you are in this present moment (250-300 words + citations of course material). Remember to support your answers with specific evidence from the course content.

My Intelligences Review your self-ratings of Gardner's Multiple Intelligences from Module 2. Take the feedback your instructor provided to you to make relevant changes and write about your multiple intelligences in this section of your portfolio (250-300 words). Which of Gardner's multiple intelligences do you rate the highest? Include more than one. To what do you attribute these strengths? Nature? Nurture? Both? Explain. How do you use these intelligences in a meaningful way?

And how can you apply these intelligences to enhance your future personal and professional life? Remember to support your answers with specific evidence from the course content. Me, Self-Actualized Review Maslow's Hierarchy of Needs from this module, and watch this video summary. Then, in a written response, share your response (250-300 words + citations of course material): What do you need in order to achieve self-actualization?

Based on your current goals and aspirations, what will self-actualization look like for you? Remember to support your answers with specific evidence from the course content.

Reference no: EM133459946

Questions Cloud

Communications manager at major corporation : Imagine you are a communications manager at a major corporation. One of your new team members has sent out an email to a diverse group of project managers
What functions does the security analyst perform : What functions does the security analyst perform? What rationale should an aspiring information security professional use in acquiring professional credentials
How to align choices to business objectives : Risk mitigation and response options and how to align choices to business objectives Parameters for risk response and mitigation selection
How the cyber threat models are used to identify : Describe the diamond model of intrusion analysis and how the cyber kill chain model works. Explain how these two models differ. Describe approaches individuals,
Create a self-analysis portfolio for assignment : Create a Self-Analysis Portfolio For assignment, you will apply many of the theories and psychological concepts you learned about throughout the term
What is the difference between smartart and wordart : What is the difference between SmartArt and WordArt? Give examples how you would use each for a workplace project.
Sharing various digital media impulsively : Sharing various digital media impulsively can lead to embarrassment and worse.
What is privacy in an information security context : What is privacy in an information security context? What is another name for the Kennedy-Kassebaum Act (1996), and why is it important to organizations
Compare and contrast opportunities for risk prevention : Compare and contrast opportunities for risk prevention in light of current best practices. Discuss communication practices that are necessary for prevention

Reviews

Write a Review

English Questions & Answers

  Convention expands the boundaries of the specified genre.

Interpret at least two genre conventions exhibited in your chosen feature-length film that help classify it in the selected genre. Be sure to provide a specific example of each convention (e.g., a particular scene or plot component). Provide an examp..

  How should replacement for obamacare proceed

How should replacement for Obamacare proceed and what are the dangers or preplacing it? Should insurance companies be able to do business across state lines?

  Identify and apply one ethical theory

In your first post in this discussion, you will identify and apply one ethical theory of your choosing to a current problem in business, also of your choosing.

  Assignment 41 academic writingthis assignment supports the

assignment 4.1 academic writingthis assignment supports the following lesson objectivedescribe academic writing and

  Write about any aspect of the given article

write about any aspect of this story that you choose. Like the other assignments, you should write a 450-500 word essay with a clear, focused thesis supported with examples, details, and/or quotes from the story.

  What are the challenges face the evaluator to collect data

How the evaluators track teachers candidates after they graduated and what are the challenges face the evaluator to collect data about the students who are graduated.

  Explain what clifford is saying here in your own words

Our words, our phrases, our forms and processes and modes of thought, are common property, fashioned and perfected from age to age; an heirloom which every succeeding generation inherits as a precious deposit and a sacred trust to be handled on to..

  Give an example of each type of epistemic injustice

Give an example of each type of epistemic injustice and explain why you think your examples are of the type of epistemic injustice you have identified.

  Communication privacy management

COMM 300 - which of the seven communication traditions does this theory belong? Define the term that you use in your answer and explain why this theory belongs

  Discussion about ethical considerations

Discussion about Ethical Considerations.Ethical considerations can become complex, particularly within the many careers in which psychology graduates

  Directionsnbsp be sure to usenbspcorrect english spelling

directionsnbsp be sure to usenbspcorrect english spelling and grammar.nbsp sources must be cited in apa format.nbsp

  Conversation be different in light of a person''s age?

How would this conversation be different in light of a person's age?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd