Premium Essay

Pdf Folder

In:

Submitted By sm138
Words 1432
Pages 6
1 Learning through reflection

2 Reflection is an active process whereby the professional can gain an understanding of how historical, social, cultural and personal experiences have contributed to professional knowledge and practice (Wilkinson, 1996).

Duffy (2007) believes that reflective practice is an active deliberate process of critically examining practice where an individual is challenged and enabled to undertake the process of self-enquiry to empower the practitioner to realize desirable and effective practice within a reflexive spiral of personal transformation.

Learning is derived from experience but it doesn’t just happen. For it to take place you not only need to engage in reflection you must also record it. By thinking about what you are doing and why you are doing it is what turns your experiences into meaningful learning. If you are to become a reflective practitioner you have to use that learning to increase your professional knowledge and skills to the benefit of not only yourself but also to your patients / clients.

Why Reflect

Reflection is really a process that begins with looking back on a situation, pondering over it, learning from it and then using the new knowledge to help you in future similar situations. Reflection, which is learning through experience, is not a new concept. As humans, we naturally reflect on our surroundings and experiences. However, the conscious, deliberate and ordered process of using reflection as a learning tool in our professional practice is much more challenging. It is a complex activity that requires the individual to develop a set of skills required for problem solving (Moon, 1999).

Reflection, therefore, encourages us to become aware of our thoughts (intellectual) and feelings (affective) which relate to a particular learning experience or area of our practice.

Students and

Similar Documents

Free Essay

Sistemas

...4. Case 2 Salesforce.com: SFA on the iPhone and iPod Touch (caso de vídeo). Aplicaciones del Iphone y ipad que se usan enlos negocios: 1.Salesforce.com : El desarrollo de aplicaciones de negocio con software tradicional ha sido siempre demasiado complejo, demasiado lento y demasiado caro. Un nuevo modelo denominado Cloud Computing ha emergido la última década para solucionar estos problemas. Las aplicaciones que se ejecutan en la “nube” se entregan como un servicio de modo que las compañías no tienen que comprar y mantener hardware y software para ejecutarlo, o inmensos equipos de TI para gestionar y mantener complicadas implementaciones. Salesforce.com ha sido pionera en Cloud Computing con nuestro conjunto integral de aplicaciones de CRM. Recientemente hemos abierto nuestra infraestructura de modo que todos puedan usarla para el desarrollo de aplicaciones personalizadas. Con la plataforma en la Nube de salesforce.com, Force.com, puede construir cualquier aplicación de negocio y ejecutarla en nuestros servidores. Salesforce.com ha sido pionera en Cloud Computing con nuestro conjunto integral de aplicaciones de CRM. Recientemente hemos abierto nuestra infraestructura de modo que todos puedan usarla para el desarrollo de aplicaciones personalizadas. Con la plataforma en la Nube de salesforce.com, Force.com, puede construir cualquier aplicación de negocio y ejecutarla en nuestros servidores. 2. FedEx Mobile: esta aplicación está disponible para iphone, ipad. Blackberry...

Words: 577 - Pages: 3

Free Essay

Outlook Backup

...list, click "Personal Folder File (.pst)", and then click Next. 4. Click the folder that contains the messages you want to back up. If the folder contains a subfolder that you want to include, select the "Include Subfolders" check box, and then click Next. 5. Under "Save exported file as", click Browse, and then specify a name and location for your backup file, for example, Mail Backup. 6. If you back up a .pst file that you have backed up to before, click one of the following: * Replace duplicates with items exported. Existing data will be overwritten with the information in the file being exported. * Allow duplicate items to be created. Existing data will not be overwritten, and duplicate information will be added to the backup file. * Do not export duplicate items. Existing data will be kept, and the duplicate information in the folder will not be copied to the backup file. 1. Click Finish. Restore a backup .pst email file 1. On the File pull-down menu, point to Open, and then click Outlook Data File. 2. Click the .pst file you want to open, and then click OK. The name of the folder associated with the data file appears in the Folder List (Folder List: Displays the folders available in your mailbox. To view subfolders, click the plus sign (+) next to the folder. If the Folder List is not visible, on the Go pull-down menu, click Folder List.). By default, the folder will be called Personal Folders...

Words: 287 - Pages: 2

Free Essay

Walmart Case

...This is a very straight forward case to me. When she had to leave for about ten minuets, the first thing that Kelly should have done is to put all of the bids which she had received from other companies away. Whether that meant that they should be locked up or taken with her, either would have been preferable to what she did. Leaving the file folder with all of the other companies' bids right in front of Bob was very unethical. Kelly was violating the Clients' rights by leaving their offers out. In that she did not leave every offer on the table, she probably took it upon herself to only leave out the best offers. The other businesses she was working with all have the right of confidentiality. She might have intentionally left the folder out so Ben would look and make a better offer, or she simply might have forgotten about it. In leaving the folder out she was violating the trusts between her and the business that had made those offers. Bob could use the competitors quote to requote, or even rethink or rebid their offer to get the business. My business opinion for Ben is to sit back and think about the offer he is going to make Kelly. He should focus on what to say and do if she says certain things concerning the business offer. Kelly should simply have locked the other company's offers up or put them out of site so they would not be a temptation for Bob. I believe the right course of action if Kelly truthfully had things to do would be to reschedule when she was available...

Words: 295 - Pages: 2

Free Essay

The Warcraft Iii Adventure

...The Warcraft III Adventure June 7, 2013 PROLOGUE: The Adventure Begins When this homework was assigned last Saturday, I knew then that this was going to be an adventure. I have never played Warcraft-DOTA before but, I am aware that it is an addictive game. I know this because my 20-year old nephew, still a third year industrial engineering student up to this day, was an excessively avid player. Two years of his college life were wasted because of his addiction with the game. He could have been graduating this year if not for the addiction. Thus, when I heard from Professor Nicart that the game has been lauded by no less than The Harvard School of Business because of its contribution in developing management skills, I was intrigued. Then, she said we have to play the game at least 30 minutes a day for the next 5 to 6 days, I was amused and thought to myself that my nephew would have a blast when he hears about this. Hence, the adventure for me began even before I would play the game. CHAPTER ONE: Acquiring The Warcraft-DOTA File I had a very busy schedule ahead of me this week. I thought that in order to have this homework done, I had to finish it as soon as possible. So, as soon as I got back home last Saturday, which was about 7:30 PM because electricity in our area only came back around that time, I immediately searched if the “Warcraft-DOTA” file was installed in our computer. It was not. I also searched the other laptops we had at home and I didn’t...

Words: 3715 - Pages: 15

Free Essay

Lyt2 - Simple Getaways

...OVERVIEW Due to several years of growth, Simple Getaways, Inc. (SGI) has expanded from a single California office to twelve offices distributed throughout the western United States with approximately 270 employees. Methods of communication and data storage that are currently being used were adequate for a single office but are no longer sufficient to meet the needs of Simple Getaways, Inc. This proposal will address the requirements for file storage and management, collaborative communication, information sharing within and between offices and the automation of administrative workflow. CHALLENGES AFFECTING KEY STAKEHOLDERS The processes currently being used at Simple Getaways for communication and the distribution of information are no longer suitable for the organization. Documents from each office are stored onsite on a Microsoft Windows file server, making it difficult for other offices to access and use the information they contain. Currently the method used to share files with other offices is via email. This results in multiple copies of the same document residing on various computers at multiple office locations. The duplicate versions are not updated when the original document is modified which leads to different versions of the same document being used. Some business decisions are being made using information from the outdated documents. For example, a document containing airline ticket pricing may be used when creating price quotes for customer travel, but...

Words: 1612 - Pages: 7

Free Essay

Itt222

...Name: Date: IT222 Week 9 1. These type of GPOs do not support folder redirection or Group Policy software installation. a. Multiple Local b. Local B c. Domain d. Starter 2. When Active Directory is installed, these two domain GPOs are created automatically: a. Default computer template policy, default domain policy b. Default Domain Controller Policy, Default Computer Template Policy c. Default Administrative Template, Default Domain Controller Policy d. Default Domain Policy, Default Domain Controller Policy D 3. In what order are group policies processed: a. Site, Domain, OU, Local b. Local, Site, Domain, OU B c. Domain, site, OU, local d. Local, Domain, OU, Site 4. Which will block all policies from parent containers from flowing down to a container object like a site domain?: e. Enforce A f. Loopback Processing g. Asynchronous Processing h. Block Policy Inheritance 5. On an Individual GPO link, which will force a particular GPO’s settings to flow down through the AD without being blocked by any child OUs? i. Enforce j. Loopback Processing k. Asynchronous Processing l. Block Policy Inheritance D 6. The two options available for Loopback Processing when set to Enabled are: m. Combine, Enforce n. Override, Replace o. Merge, Replace C p. Enforce, Merge 7. Which command line tool is...

Words: 308 - Pages: 2

Free Essay

Time

...My concern classmate informed me that National Bookstore Inc. is looking for Interns so I grab it. I started my OJT on July 29, 2013 at National Bookstore Inc. I really amazed and glad because we all know that National Bookstore Inc. is a well known company in our company. I was assigned at the HR Department because the Assistant HR Manager their said that they need OJT’s on their department. I accept it because I wanted to assign there. At first, It was hard to understand what I was going to do maybe because I still don’t know the process or the flow of my work and that I am pressured because I didn’t know those people on my surrounding. The first task they gave to me is fill plastic cover those 201 file folder of some regular employees to avoid unclean folder, I find it...

Words: 968 - Pages: 4

Free Essay

Photoshop

...connection 2.Patch Hosts file Double click to launch "AdobeCS6PatchHostsFile" to patch hosts file to block outgoing connections, this will patch then open the hosts file to show you. You will need to enter you admin password. 3.Install Adobe CS6 Master Collection as a trial 4.IMPORTANT After install, launch each application then close it before you apply the specific application patch. This will ensure Photoshop is the Extended version 5.Apply application specific patch Double click the application specific patches to apply the "amtlib.framework patch", this also archives the original amtlib.framework folder in the application specific Frameworks. 6.Run "IllustratorTryoutSplashFix" This rewrites the files so the correct splash screen shows Also makes archives of originals You must only use this on a fresh copy of Illustrator Otherwise use the files in the folder • Disconnect from the Internet (or block outgoing connections) and install the trial version. • When installing, select "Trial"! • After installation, launch and complete the application once, blocking any outgoing connections. • Replace (keep a copy of the original just in case) amtlib.framework located in Application_Name.app / Contents / Frameworks / with [k'ed] one. • Block outgoing connections:   Open the hosts file and add the following lines: 127.0.0.1 192.150.14.69 127.0.0.1 192.150.18.101 127.0.0.1 192.150.18.108 127.0.0.1 192.150.22.40 127.0.0.1 192.150.8.100 127.0.0.1 192.150...

Words: 713 - Pages: 3

Premium Essay

Final Paper

...quiz 1. 1. A computerized equivalent of a ledger which contains rows and columns of data is called a: (Points: 4) a. document b. presentation c. spreadsheet d. workbook 2. 2. A single file that contains many worksheets is a: (Points: 4) a. work folder b. work book c. directory d. file folder 3. 3. A worksheet can contain many workbooks. (Points: 3) True False 4. 4. A column is identified by the numbers down the left side of the window. (Points: 2) True False 5. 5. What ribbon tab contains the charting function? (Points: 2) a. home b. formula c. page layout d. insert 6. 6. A formula is a function that you can use to: (Points: 2) a. set the font b. insert a chart c. conduct a mathematical calculation d. apply a style to the worksheet 7. 7. The Excel window will contain all of the elements except: (Points: 2) a. name box b. row heading c. formula bar d. select none button 8. 8. What is the intersection of a row and column called? (Points: 2) a. a place in the spreadsheet b. a cell c. where the cursor is d. a macro 9. 9. The maximum number of rows a spreadsheet can contain is: (Points: 2) a. 100 b. 1,350 c. 1,048,576 d. it is unlimited 10. 10. Autocomplete and autofill are the same thing. (Points: 2) True False 11. 11. Formulas must always begin with a: (Points: 2) a. $ sign b. = sign c. * sign d. no sign 12. 12. What determines the sequence in which arithmetic operations are...

Words: 943 - Pages: 4

Free Essay

Internet Browsing

...This tutorial will discuss on How to get back the original installer from GAOTD set up files for future use. The following steps will show you how to back up the original installer for future installation. Firstly Download the Software from Giveaway of the day ( GAOTD ) page . *   Now  Unzip the package you’ve downloaded and extract the contents to a folder on your computer . *  Run ( double click ) the  Setup.exe you had downloaded . It will connect to the internet to verify that the giveaway period is still on and enter activation details . Do not close the installation window . * Go to the temporary folder in your system.  which is normally  C:\Users\yourusername\AppData\Local\Temp . (Replace yourusername with your own name) Or Go to Start —> Run .  Now type %temp% in the box and click OK . *  On the windows explorer menu on top , Go to Tools –> Folder options –> View . Under Hidden files and folders , select ” Show Hidden files and folders ” , then click Apply and OK . * Now  in  the Temp folder  ,  look for a file similar to the name shown below . weXXXXX.tmp . for example we23.tmp , we24.tmp , we28.tmp etc . ( This will be a hidden file ). *  Copy this wexxxx.tmp  file to another place in your computer . Rename this file to  Software name.exe  . ( that days software name ). Right click on the file and go to Properties and uncheck “Hidden“. Thats All ….You are done now . You can use this new setup.exe to install the software at any time...

Words: 351 - Pages: 2

Premium Essay

Organizing Law Firm

...Plan for Organizing the Law Firm of Boggs & Buggs There are many actions to be taken when organizing a law firm. First, I will detail all of the equipment needed to operate the law firm to provide adequate representation to all clients. Then, I will detail the procedures and policies that will be put in place to make the law office operate efficiently and effectively. Throughout the Plan, I will detail how the policies and equipment work together to aid the law firm in serving its clients. I. Equipment a. Computer Equipment, including Phones, Fax, and Printers In organizing the law office of Boggs & Buggs, I would first acquire state-of-the-art computers equipped with Microsoft Office, Adobe Acrobat, Internet Explorer and other vital applications. I would make sure that the computers have enough permanent memory and temporary memory to run efficiently using various software packages. I would also acquire the fastest internet available for business because I would want to keep all business processes efficient. Therefore, the firm would not endure delays due to slow or mediocre internet connections. Furthermore, I would establish a multiple-line phone system. The phone system will be able to transfer calls within the law office and from the law office to the attorneys' cell phone and house phone. In addition, the phone system would allow for calls to be redirected to other phone numbers for certain instances when no person is available...

Words: 1808 - Pages: 8

Free Essay

Nstp

...sure it will fit the CD/DVD). Print the picture in a bond paper. Include only the members who participated in making the portfolio and place your group name and NSTP section below the pictures. Example: Folder 1: Group Profile (5 points) Accomplish this form                             Group Name: NSTP Section: 2 x 2 formal shot picture | Name | Email Address | Mobile Number |   |   |   |   |  2. Leaders Narrative – rate the members according to their participation in all group activities (1 – lowest; 10 – highest). Give a short description on how she/he became part of your NSTP experience (1-2 sentences only). Save the file in word, make sure to put a password (Save As, look for tools, select general options, password to open.) Send the password through MESSAGES in eLEAP to your facilitator. 3. Members Narrative – rate your leader according to his role in the group (1 – lowest; 10 – highest). The documentation officer will collate all data and get the average rating. Each member will write a 1-2 sentence description on how the leader became a part of their NSTP experience, this will be collected by the Documentation Officer as well. Place in one Word file with password. Send the password through MESSAGES in eLEAP to your facilitator. Folder 2: Files and data forms place the CDP assignment submitted during the first semester and the...

Words: 473 - Pages: 2

Premium Essay

Data

...building blocks of information which is the bedrock of knowledge • Information - processing raw data to reveal meaning , Information produced by processing data • Field -A character or a group of characters (numeric or alphanumeric) that describes a specific characteristic. A field may define a telephone number, a date, or other specific characteristics that the end user wants to keep track of • Record - A logically connected set of one or more fields that describes a person, place, event, or thing. For example, a CUSTOMER record may be composed of the fields CUST_NUMBER, CUST_LNAME, CUST_FNAME, CUST_INITIAL, CUST_ADDRESS, CUST_CITY, CUST_STATE, CUST_ZIPCODE, CUST_AREACODE, and CUST_PHONE. • File - Historically, a collection of file folders, properly tagged and kept in a filing cabinet. Although such manual files still exist, we more commonly think of a (computer) file as a collection of related records that contain information of interest to the end user. For example, a sales organization is likely to keep a file containing customer data. Keep in mind that the phrase related records reflects a relationship based on function. For example, customer data are kept in a file named CUSTOMER. The records in this customer file are related by the fact that they all pertain to customers. Similarly, a file named PRODUCT would contain records that describe products – the records in this file are all related by the fact that they all pertain to products. You would not expect to find customer...

Words: 260 - Pages: 2

Premium Essay

Answers to Review Questions

...following terms: a. Data: Raw facts from which the required information is derived. Data have little meaning unless they are grouped in a logical manner. b. Field: A character or a group of characters (numeric or alphanumeric) that describes a specific characteristic. A field may define a telephone number, a date, or other specific characteristics that the end user wants to keep track of. c. Record: A logically connected set of one or more fields that describes a person, place, event, or thing. For example, a CUSTOMER record may be composed of the fields CUST_NUMBER, CUST_LNAME, CUST_FNAME, CUST_INITIAL, CUST_ADDRESS, CUST_CITY, CUST_STATE, CUST_ZIPCODE, CUST_AREACODE, and CUST_PHONE. d. File: Historically, a collection of file folders, properly tagged and kept in a filing cabinet. Although such manual files still exist, we more commonly think of a (computer) file as a collection of related records that contain information of interest to the end user. For example, a sales organization is likely to keep a file containing customer data. Keep in mind that the phrase related records reflects a relationship based on function. For example, customer data are kept in a file named CUSTOMER. The records in this customer file are related by the fact that they all pertain to customers. Similarly, a file named PRODUCT would contain records that describe products – the records in this file are all related by the fact that they all pertain to products. You would not expect to find customer...

Words: 1189 - Pages: 5

Premium Essay

Environment Friendly Office

...Save the environment Many people who use computers whether it's for their home or business are moving toward a "paperless" office. Individuals are becoming overwhelmed by scraps of paper, and unorganized file folders, we are simply looking for ways to reduce clutter. Many organizations and institutions have at least made a partial move to a paperless office. They are doing so by; using scanners instead of copying machines, sending electronic faxes instead of paper faxes, and storing information electronically instead of in filing cabinets. It would be a myth if most people believed it was possible to go completely "paperless". Technology is available now to make a paperless office a reality, but it will require a cultural change and a change in work habits to be fully realized. There are numerous obstacles and attitudes which needs to change, prior to your home office or business can go green. One major obstacle is ensuring that your files are properly backed up. In the past, we would typically make a photocopy of a document and place it in a folder so that it can be easily retrieved from a filing cabinet. Now, many businesses have developed an electronic filing system utilizing software such as Microsoft Word, or even customized programs for storing documents. Unfortunately, those files can't just be created; they are required to be backed up as well. There are numerous solutions on the market which can assist individuals and corporations to safely backup...

Words: 875 - Pages: 4