Friday, December 27, 2019

Student Mentorship Program For The Community College Essay

Student Mentoring in the Community College Student Population Served Student Success is now considered a vital element in the community college role. We must teach our students, and equipped them with skills to achieve their educational goal, as well as their career goals thereby, surviving in the workplace. Therefore, I am proposing a student mentorship program that targets all students enrolling at Mohave Community College (MCC). The program will encourage participation from the concurrent enrolled high school students, as well as students that are classified within the â€Å"at-risk† category. Each student at registration will receive information regarding the program, and encourage to participate when attending orientation. Identified Need The implementation and formulation of the program are highly informed by the fact that certain groups of students desperately need interventions to enhance their academic performance and increase their retention rates (Stromel, 2000). The program has identified six types of students who require mentor consisting of the nontraditional adults; students in remedial studies; students exhibiting low classroom participation; learners with low campus or community involvement; anyone who lacks positive role models, and students complaining about time. Therefore, with the tremendous increase of nontraditional and remedial students at MCC which, exhibit low motivation skills, time management abilities, and failure to socialize (Campbell, Smith,Show MoreRelatedCollege Is Not Just About Receiving Good Grades842 Words   |  4 PagesCareer Development College is not just about receiving good grades. It is just as valuable for students to get involved in student support programs and extracurricular activities such as internships, community involvement and leaderships. The reason why it s important for students to get involved is so they can apply what they learn in the classroom into practice, gain social skills, develop leadership skills and learn time management skills. Moreover, what make it more respected is the skillsRead MoreGraduation Gap Between Minority Students And White Students Essay1311 Words   |  6 Pagesdiverse students entering and graduating from post-secondary institutions is increasing at rapid rates (Education Trust, 2015; Georgetown University Center, 2012). Between the years 2003 and 2013, 77% of public institutions improved graduation rates for underrepresented groups, including African-American, Hispanic, and Native American students (Education Trust, 2015). Despite this increase, there continues to be a graduation gap between underrepresented minority students and White students. NationallyRead MoreEvaluation Of A Program For A Team810 Words   |  4 Pagesteacher was sadden by the stories her students shared about the hopelessness felt in their community to attend college or even graduate from high school. It is more likely; they would become a product of their environment. Instead of her standing idly by believing she alone could not make a difference, she started a mentorship program for girls. The mentorship program was first started with a couple of her colleagues which were also her closest friends. The program has grown to ten professional womenRead MoreBeing A First Generation Latina Essay1357 Words   |  6 PagesAs a first-generation Latina in college, I could not be where I am without the help of multiple individuals. My parent’s sacrificed so much coming into this country. They left behind their family, their home, in order to one day provide a better future f or me. Initially, my parents planned on staying in America for five years then they would go back to Ecuador. However plans changed once my mom became pregnant with me. The decision to stay in order to give me the best future possible greatly affectedRead MoreGraduation Speech : College Program Essay1179 Words   |  5 PagesUCAN is a program that weekly, visits local high schools providing them college mentorships. As part of college mentorship, we aid students, in college applications, financial aid, college essays and college preparation. The program is efficiently split into three parts, so mentees and mentors can take most from it. The three parts consist mainly of helping seniors in the college application process, teaching and mentoring sophomores and juniors about college preparation, preparing for next yearRead MoreEducation Programs Should Be Better Than Those Who Are Not Met With The Same Opportunity799 Words   |  4 Pages2011). By offering accelerated learning opport unities that allow students to achieve college placement, bridge programs can help to correct this trend in higher education (Wallington, Petlow, Mitchell, 2011). Programs should be realistic about their goals because the argument is made that significant progress in academic support is difficult to achieve in only a few months (Kezar, 2000). Studies show that students in retention programs perform better than those who are not met with the same opportunityRead MoreEssay On Access Program1395 Words   |  6 Pagesspent volunteering for the Office of College Access Programs (OCAP) is both informative and fulfilling. This organization has numerous programs aimed at aiding disadvantaged young children with preparing for college. Anyone who has been thrown into the overwhelming life of a first time college student knows that early preparation is not only necessary, but essential to success. By providing both students and their parents’ education on how to apply for college, test preparation, and tutoring servicesRead MoreThe State Of The Teaching Profession Essay1281 Words   |  6 Pagesa group, we decided on our three debate topics: te acher residency programs, teacher shortage related to mentorship, and the Common Core State standards. In relation to teacher residencies, I am pro teacher residency programs. When I started doing more research, I noticed these programs were becoming popular and were established as a way to help with teacher retention. Teacher residences are modeled after medical residency programs. The novice teacher is given a mentor teacher and accompanies thatRead MoreAn Evaluation Of A School Program798 Words   |  4 Pagesbetween both the school and community. Schools and communities should work hand and hand to meet the goals of the students that’s within the community. Therefore, the purpose of this assignment is to create an operationalize policy statement that includes the goals, objective, strategies planning and tactics to effectively implement the communication policy with academic expectations community and parental involvement and culture and school climate to the community . Goal The goal is to createRead MoreThe State Of The Teaching Profession Essay1304 Words   |  6 Pagestopics were teacher residency programs, teacher shortage related to mentorship, and the Common Core State standards. In relation to teacher residencies, I am pro teacher residency programs. Before any initial research, I have never heard of these programs. When I started doing more research, I noticed these programs were becoming popular and were established as a way to help with teacher retention. First of all, teacher residences are modeled after medical residency programs. The novice teacher is given

Thursday, December 19, 2019

Firewalls And Infrastructure Security - 1201 Words

Firewalls and Infrastructure Security A firewall is a network device, hardware, software, or a combination of the two, whose purpose is to enforce a security policy across its connections. It is comparable to a wall that has a window where the wall serves to keep things out, except those permitted through the window. A security policy acts like the glass in the window; it permits some things to pass, light, while blocking others, air. The heart of a firewall is the security policy that it enforces. Security policies are a series of rules that define what traffic is permissible and what traffic is to be blocked or denied. These are not universal rules, and there are many different sets of rules for a single company with multiple†¦show more content†¦Advanced firewalls employ stateful packet filtering to prevent several types of undesired communications. Should a packet come from outside the network, in an attempt to pretend that it is a response to a message from inside the network, the firewall will have no record of its being requested and can discard it, blocking access. As many communications will be transferred to high ports, above 1023, stateful inspection will enable the system to determine which sets of high communications are permissible and which should be blocked. The disadvantage to stateful inspection is that it takes significant resources and processing to do this type of inspection and this reduces efficiency and requires more robust and expensive hardwa re. This type of inspection is essential in todays comprehensive networks. As they are in routers, switches, servers, and other network devices, Access control lists are a cornerstone of security in firewalls. Just as you must protect the device from physical access, Access control lists do the same task for electronic access. Firewalls can extend the concept of Access control lists by enforcing them as well at a packet level when packet-level stateful filtering is performed. This can add an extra layer of protection, making it more difficult for an outside attacker to breach a firewall. Some high-security firewalls also employ application layer proxies. As the nameShow MoreRelatedA Brief Note On Firewalls And Network Security954 Words   |  4 PagesJoshua Theophilus Jacqueline Stanton ITSA 255-4121 23 November 2015 Firewalls and Network Security The cyberspace has become a major concern to all stakeholders in view of persistent threats and attacks to IT infrastructures around the globe. Individuals, corporate entities and even governments have become victims of anonymous attacks in one form or the other. As a result of these, security professionals have continued to design and implement policies that can help protect valuable assets and vitalRead MoreDuke Energy Plan And Address The Security Aspects Of Its Network1712 Words   |  7 PagesFirewall Application Introduction Duke Energy should carefully plan and address the security aspects of its network by implementing appropriate firewalls. Duke Energy should implement appropriate security management practices and controls when maintaining and operating a secure network. It is imperative to ensure that the architecture of its network complies with industry standard security requirements. Duke Energy s IT organizations should commit to the ongoing process of maintaining the securityRead MoreSecurity Assessment - Aircraft Solutions Essay examples1349 Words   |  6 PagesCourse Project: Security Assessment and Recommendations – Phase I amp; II Aircraft Solutions Table of Contents Executive Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..1 Company Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..1 Hardware Vulnerability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...2 Policy Vulnerability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..3 Hardware Solution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 Policy Solution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...5 Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 Executive Summary The purpose of this paper is to explore and assessRead MoreProtecting Information with a Secure Network Essay687 Words   |  3 PagesAlternative Solution? Protecting information and critical infrastructure in a cohesive way that quantifies policies and procedures is imperative for implementing a proactive privacy risk management plan. In doing so, you gain the necessary framework and principals to share essential operational data for use in cybersecurity while focusing on policy cohesiveness between intra government agencies, the private sector, and securing critical infrastructures. (Claffy Kenneally, 2010). Accountability andRead MoreCloud Computing : A Solution For Resources Management1341 Words   |  6 PagesAbstract Cloud computing has rapidly increased their services for IT infrastructures solutions in the last years, reducing cost of investment of supplies and maintenance becoming a promising concept in the business and IT industry. The cloud provides shared data center, automatic upgrades, security and performance. However, cloud’s safety and standardization have been a challenge when different types of clouds need to be connected. Resource management issues as Quality of service (QoS) and the increasingRead MoreIS3220 Project Network Design Chris Wig Essay1226 Words   |  5 Pagesï » ¿ IS3220 Project Part 2: Network Design Chris Wiginton, Jose Rosado ITT Technical Institute, Tampa FL Instructor: Sherman Moody 28 October, 2014 The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public. The private-public network edge is considered particularly vulnerable to intrusionsRead MoreCommunication Networks Linking Smart Grid1364 Words   |  6 Pages SCADA vulnerabilities Increased communication: Communication networks linking smart grid or any other critical infrastructure devices and systems is creating more access points to the devices, hence chances of being attacked are increasing, Increased complexity: The systems are becoming more complex to understand hence establishing a strong security in the system is becoming a difficult task. Use of shared technology: The SCADA systems are using a major portion of common technologies, these technologiesRead MoreA Comprehensive Suite Of Managed Security Services827 Words   |  4 Pagessuite of managed security services, providing you with 24/7/365 management and monitoring of your security systems. Our globally available services are managed by a recognized team of experts, bringing years of experience into the equation when delivering secure solutions to your business. A steadfast firewall is one of the key elements of your network’s infrastructure. Without a secure firewall, hackers can easily infiltrate your most critical data. MACCIUS’ managed security services shield youRead MoreReview Of Tools Of The Trade1483 Words   |  6 PagesInformation Technology (IT) infrastructure, however, the tools specifically to manage a firewall and scan a network, and the universally reliable knowledge bases are the three decisive requisites (Davis, Schiller, Wheeler, 2011). In this critical thinking report an assessment has been provided for one predominant tool from each of these essential categories. The first tool highlighted is SecureTrack developed by Tufin Software Technologies Ltd. is one of the principal firewall management solutions (TufinRead MoreCritical Infrastructure Protection ( Cip )898 Words   |  4 PagesAmerican Transmission Corporation, WI. Dec ‘14 – Oct ‘15 Critical Infrastructure Protection (CIP) Consultant †¢ Responsible for ensuring ATC’s ability to remain compliant with NERC CIP standards, working with functional area teams to ensure that they have the necessary information to ensure compliance. †¢ Lead project for Role based training with functional areas to develop content in support for CIP requirements. †¢ Support the development and roll out of Core CIP training requirements. †¢ Worked

Tuesday, December 10, 2019

Accountability on the Report of Performance in the Presentation

Question: Write accountability report on performance in the presentation? Answer: I would like to write this letter about the feedback of LIGHT the team has earned from the members during performance of the presentation on the date 25th November. A lot of issues have been recognized that shows the lack of motivation of the team members, but the prime issue that I have identified is: poor performance of the team. Being a leader of the team firstly I would like to identify the issues that cause this problem and also I would like to highlight the relevant theories. Secondly I would like to highlight the actions to taken to solve those issues. Thirdly I will go for the justification of the action that has been adopted to solve the problem. The further step that I would like to do is discuss the expected results and in the final stage I will show the importance of the action on how this action became helpful in order to solve the problem. Teamwork can be defined as a work in which the individual works in coordination with each other in order to achieve the common goal (Gaynor, 2015). Likewise, the members of a light team had same focus during formation of the group. The goal of our team was to work in coordination with each other in a helping manner so that the team can give a very nice presentation in order to achieve good grades after the presentation. With the continuation of the preparation, it has been seen that some of our team members have lost their focus on the presentation (Hawkes, 2015). They became unwilling to cooperate with each other. The prime causes that have been identified for the poor performance of the team were: Attitude and Behaviour: The behaviour and attitude of team members were considered to be the main reason for the poor performance of the team members. The goal and objective of the team were unclear (Holten and Brenner, 2015). So the team members got confused about their roles in the team. Some of the team members had seemed to be hesitant and unwilling towards the work in the early stages of the preparation. There was a lack of common goals, working plan, and a good leader at this point of time. This kind of issues can be seen in the forming stage of Trackmans theory. According to Trackman, during formation of the team there are so many types of confusion about the objective, identification as a team member, and team leader. As a team leader, I was scared in this stage about the lack of certainty in the goals and objective of the team. Being a team leader, I was unable to identify the problem, developing an alternate solution to the problem, evaluating the alternative solutions and finally selecting the most suitable solution (Liu, 2015). I was also stressed about the confusion of roles and task assignment of the team. Because of non-cooperation among the team members there was a lack of motivation which prevents the team members to attend any scheduled meeting. It was not possible to clarify any task. I could not encourage the team members to be involved in the preparation of the presentation. I was leading the team according to laissez-faire style where the team got the freedom to work because my effort was not enough for making a success of the presentation (Kabalo, 2015). The leadership style chosen by me was considered to be low productivity by the researchers. It is like a challenge for the team leader to effectively manage the team to perform according to the best of their ability. From the poor performance of the team, I have learned some new strategy to manage the team effectively. This strategy will help me to guide the team perfectly, and it will also help me in the elimination of bad behaviour in future projects. For managing a team, perfectly Belbin has suggested some strategy. He suggested that by understanding the individual role in a team, one team member can increase his strength to make best if his effort. When all the team members of a same team are assigned with the same task, it creates a lack of motivation to achieve that task (Lekka, 2015). They feel low self-esteemed which reduces productivity. But when the team members of a team are assigned different task it will increase the self- esteem of any team member. The team member will feel valued and respected, in this case, and this will in turn increase the productivity of the team (jibhhk and Wank, 2015). This strategy also helps to manage weakness of a team member. It helps a team member to contribute more towards achieving the common goal. This strategy has been proposed in the team so that this can be applied during the formation of the team. I will not avoid the warning of the management. I have observed that there is a lack of motivation among the team members because their roles were not clear. Being a team leader I have learned that there is a great need to assign a specific task to each and every member of the team before forming a team. Bad behaviour of the team could destroy the performance of a team and may cause low self-esteem of the members of the team. Assigning specific and unique task will help to develop the self-esteem of the members. The leadership style that had adopted was not considered to a perfect style to manage the team. I was bound to adopt that style because of my inability to manage the team. But the laisse- fairy type of leadership was not perfect for the team. Being democratic was not a good option for the team (Kabalo, 2015). The autocratic style of leadership would be beneficial for this team. Democratic Style would be beneficial for the team if the members are experienced, and having full of knowledge about the task (Liu, 2015). This presentation had to finish in a short time frame. So in this case autocratic style of leadership would be beneficial to complete the presentation within the defined time frame and to get maximum profit from it. For this, I will dictate policies and procedures to the team members. I will also direct and control the Task of the team members. One of the major reasons that result in the inability of our team to work together in achieving the goal was the conflicts among the team member. Conflict arose due to many reasons. Unequal division of work among the team members may cause conflicts among the team members. Some of the team members of our team were seemed to be as on- cooperative, and unwilling to perform their task efficiently (Lockhart, 2015). This also results in conflict among the members, and poor performance of the team. According to Trackman, this kind of problem can see in the storming stage of team building. In the storming stage, there is a great confliction among the team members about roles, leadership, and task. The team members in this stage are concerned about whether they are valued by the organization or not. As a leader of the team, I should organize the work efficiently and assign it to the team members. I would ensure that the members of the team have got a scope to know each other. For the best pe rformance of the team, the members should not see each other as a competitor. It is a common belief that when people work together it inevitably creates conflict among the team members. As a team leader, I was unable to solve the confliction among the team members. I found a very useful model at Monmouth, which helps me to suggest the strategy in order to solve the confliction among the team members. The focus of this model was to train the team members that have a positive result. The training helps to identify the cases of the conflict and the measures to be taken to solve the problem. I will take some corrective measure at the start of the preparation on how the team members will behave in the team and will also decide which type of behaviour will not be permitted in the team. The team will also develop some agreed rules (Smith, 2015). This will help me to resolve the conflict of the team. I would also suggest the team members to behave in the agreed way to avoid conflicts. The training should suggest the team members give value and respect to each other. They member would understand the feeling and behaviour of others. The team members of the team will learn by the training about the perception of each other on the action and behaviour taken by them. As a team leader of the team, I would assess the team members in a perfect manner (Tubin and Pinyan-Weiss, 2014). I will make the member feel valued and aware of the task. When the team members become self-aware of themselves, it will motivate them to work towards the achieving the common goal of the team. I believe that by identifying the causes of the problem and accordingly taking action and implementing them will help me in future to guide the team to work in the productive way. Reference List Gaynor, G. (2015). Building an innovation team.IEEE Engineering Management Review, 43(2), pp.7-9. Hawkes, N. (2015). Clinical leadership team of the year.BMJ, 350(apr08 7), pp.h1888-h1888. Holten, A. and Brenner, S. (2015). Leadership style and the process of organizational change.Leadership Org Development J, 36(1), pp.2-16. Kabalo, P. (2015). David Ben-Gurion's leadership as a "two-way interaction process".Leadership. Lekka, N. (2015). Acute Inpatient Mental Health Services: Building Foundations for Team Effectiveness.European Psychiatry, 30, p.1022. Liu, H. (2015). Reimagining ethical leadership as a relational, contextual and political practice.Leadership. Lockhart, L. (2015). The art of team building.Nursing Made Incredibly Easy!, 13(3), pp.51-52. Smith, C. (2015). Exemplary leadership.Nursing Management (Springhouse), 46(3), pp.47-51. Special Issue of Leadership Gender and Leadership Editors: Claire Leitch and Valerie Stead. (2015).Leadership, 11(1), pp.126-127. Tubin, D. and Pinyan-Weiss, M. (2014). Distributing positive leadership: The case of team counseling.Educational Management Administration Leadership, 43(4), pp.507-525. Winans, M. (2015). Leading With Grace: Building an Accountable Team.Nurse Leader, 13(3), pp.35-38. Zacher, H. and Rosing, K. (2015). Ambidextrous leadership and team innovation.Leadership Org Development J, 36(1), pp.54-68. , Ã… ¾. and , . (2015). Division model of team-building alternatives for IT-companies.TAPR, 3(5(23), p.11

Tuesday, December 3, 2019

Understanding Behavior Essays - Mundo Moy Akin,

Understanding Behavior The behavior of a person can usually be explained by that person's state of mind. The external conduct is almost always directly linked to internal emotions. Knowing this fact is very beneficial to someone like a guidance counsellor because it lets him or her almost "read" the physchlogical state of a student based entirely on their behavior. In Darlene's case her behavior has been very well documented making the task of phsycological assesment a much easier job. There are many facets to Dralene's behavior, each revealing a different part of her state of mind. Judging from the way she dresses and is groomed it appears as if she comes from a family less wealthy than most of the other children at her school. This has probably been a factor in her sullen behavior. Because she can't afford more expensive clothes, she has been put into a different social class than most of her peers. It is known that all humans have an emotional need to be "accepted" by their peers but unfortunat for Darlene, being accepted is a need that she has not satisfied due to her lack of wealth. Darlene also expressed that this form "classism" against her was apparent at sunday school. It was so great in fact that she actually quit the classes to get away from the sunday school "snobs". It should come as no surprise that Darlene has also expressed a desire to quit highschool as well. This may also explain her reluctance to join any clubs and the way she anticipates unfriendly reactions from people she meets. Darlene's teachers agree that although Darlene has an above average intellect, she still only aquires average marks. I believe this problem can be traced to her parents. It si known that Darlene's parents keep Darlene in 6 days of the week, and when they do let her out she must be home at ten. It is also known that Darlene must do alot of housework on the weekends if she wants to get her weekly allowance and that her parents do not approve of her friends. Darlene's poor pe nce in school may very well be Darlene's way of "getting back" at her parents. By getting average marks she is trying to tell her parents that keeping her in and being so restrictive of her social activities won't help her school work, it will only make it worst. I will assume that Darlene also feels like her parents don't pay enough attention to her. Both her parents probably work, explaining why Darlene has so many responsibilities at home, and neither of them likely have much time to spend with their daughter. Darlene would also like more freedom to do go out and choose friends. The physological needs Darlene lacks are social acceptance, attention from her parents and freedom. If I were to advise Darlene on a course of action it would be to discuss the problem with her parents and not to try and hurt them by doing poorly in school because that is not hurting her parents, it is only hurting her. I would tell her that the only person in the world Darlene can change is herself. I would also tell Darlene that any peer that does not like her based solely on how much money she has is not worth having as a friend. I would tell her to ignore people who treat her badly becuase of her lack of wealth and eventually they will stop annoying her because they will not get any reaction from her. Darlene will have to work on her attitude though, so she can be more sociable and more accepted.