Free Essay

Research 2.1

In: Philosophy and Psychology

Submitted By Ppunk88
Words 399
Pages 2
Buck Buleza
SP 2750
Research 2.1

Applicability of the Functionalist Theory

* Which type of group interaction does this theory talk about? * This theory speaks of how each member of a group is responsible for the function of the group. There must be a balance from each member for the group to function properly. If one member of the group does not hold up their end of the workload then it throws off the rest of the group. Communication is key here. * How does this theory assist in the functioning of groups?
Functionalism in a group setting should help with the balance of the group. All members would take on their own responsiblities/workload to match that of the other members. This allows the group as a whole to progress forward toward their goal. If any member starts slacking though it will throw off the rest of the members. The group would then need to meet and figure out a way to rebalance. * State a hypothetical scenario that depicts how this theory applies to a group.
“For example, the government, or state, provides education for the children of the family, which in turn pays taxes on which the state depends to keep itself running. The family is dependent upon the school to help children grow up to have good jobs so that they can raise and support their own families. In the process, the children become law-abiding, taxpaying citizens, who in turn support the state. If all goes well, the parts of society produce order, stability, and productivity. If all does not go well, the parts of society then must adapt to recapture a new order, stability, and productivity.” (Crossman) * Write a short, critical analysis on the four functions stressed by this theory. 1. Adaptation – How the group adapts to the problem they are facing so they can achieve their goal. 2. Goal Attainment – The group plans out the goal, how it will achieve this goal, and will follow through to success. 3. Integration – For the group to be successful they must integrate and accept all members equally. 4. Latency – Group members need to motivate each other and keep group morale up.


Crossman, Ashley. (n.d.) Functionalist Theory: An Overview. Retrieved from

Functionalism and Parsons (2002, November 15) Retrieved from…...

Similar Documents

Premium Essay

Assignment 2.1

...Quality Assurance Test Plan (QATP) for SugarCRM .......... Table of Contents 1 Introduction 2 1.1 Purpose 2 1.2 Scope 2 1.3 Overview 2 1.4 Definitions, Acronyms, and Abbreviations 2 1.5 References 3 2 Scope of Testing 3 2.1 Product Overview 3 2.2 Scope of Testing 4 2.2.1 Within Scope of Testing 4 2.2.2 Out of Scope of Testing 5 2.3 Requirement Criticality Classification Guideline 5 2.4 Functional Requirements 5 2.5 Non Functional Requirement 6 3 Assumption and Risk 7 3.1 Assumptions and Dependencies 7 3.2 Risk Management 7 4 Test Deliverables and Schedule 8 4.1 Test Design 8 4.2 Reporting 8 4.3 Escalation 9 4.3.1 Results 9 4.3.2 Deliverables 9 4.3.3 Configuration management 9 4.4 Test Phases 9 4.5 Testing Activities 10 5 Testing Approach 11 5.1 Testing Activities 11 Smoke Testing 13 5.1.1 Objective 13 5.1.2 Entry Criteria 13 5.1.3 Exit Criteria 13 5.1.4 Test suspension resumption criteria 13 5.2 User Interface Testing 13 5.2.1 Objective 13 5.2.2 Entry Criteria 13 5.2.3 Exit Criteria 14 5.2.4 Test suspension resumption criteria 14 5.2.5 Special Considerations 14 5.3 Functional Testing 14 5.3.1 Objective 14 5.3.2 Entry Criteria 14 5.3.3 Exit Criteria 14 5.3.4 Test suspension resumption criteria 14 5.3.5 Special Considerations 14 5.4 Regression Testing 14 5.4.1 Objective 14 5.4.2 Entry......

Words: 5688 - Pages: 23

Premium Essay

It220 Assignment 2.1

...Assignment 2.1 Chapter 5 1-37 odd | | | | * What are the four layers of the TCP/IP model? Application layer, Transport layer, Internet layer, and Network Interface layer. * What are well-known ports? Ports reserved by ICANN (1 – 1023) * Define the purpose of a connection oriented protocol. It establishes a connection, manages the delivery of data, and terminates the connection. * What is the purpose of a sequence number (SEQ=) in TCP data packets? The sequence number is used to keep track of the data packets being transferred from host A to host B. * Describe how a TCP connection is terminated. The Host B sends a FIN (finish) packet to host A. Host A then sends an ACK packet acknowledging the reception of the FIN packet. Host A sends a FIN packet, then Host B responds with an ACK packet. * What is the purpose of the Internet layer in the TCP/IP protocol suite? Defines the protocol used for addressing and routing data packets. * What is the purpose of an ARP reply? The protocol that contains the hardware address for the destination host. * When is IGMP used? It’s used to control the flow of data in the network, for reporting errors, and for preforming diagnostics. * Convert the following 8-bit binary number to decimal: 10010011. 147. * Convert the following 8-bit number to decimal: 1111100. 252. * Convert the number 192 to its binary equivalent. 11000000. * Convert the number 96 to its binary equivalent.......

Words: 343 - Pages: 2

Premium Essay

Case 2.1

...A. Case 2.1: To recruit the CEO from the inside seems to work well for Intel. Do you believe this is a sound policy? Why? I have to say I do agree with Intel’s philosophy to grow and groom its own CEOs and leaders. This way there is continuity with projects that are being developed. This philosophy also permits for the person being groomed to have a better understanding of many levels and job tasks within the organization. By allowing the future CEO to observe and perform tasks with the current CEO will facilitate a smooth transition when the time comes for the change. On the other hand, by recruiting an external candidate for the CEO position, an accommodation period is inevitable. As much as you try to find the right candidate with the desirable traits for the position of a CEO, this candidate has not lived the culture and you run the risk of this candidate never fitting in. How can a non-technically oriented leader like Paul Otellini succeed as CEO in a technical company such as Intel? Although Mr. Otellini did not have the technical background that most of his predecessors had, he obviously possessed the business acumen, not easily taught, required to succeed as a CEO of this company. Besides, because of Intel’s philosophy of grooming its own candidates, Mr. Otellini had the chance to acquire the necessary technical knowledge for such position. Why do some firms fail to plan effectively for executive succession? Evidently not every company has the same......

Words: 329 - Pages: 2

Premium Essay

Homework Assignment 2.1

...partitions are supported on computers that still conform to the standard established by MS-DOS? How many total partitions can a standard computer disk [Integrated Drive Electronics (IDE)/Serial Advanced Technology Attachment (SATA)] support? How many does the Small Computer System Interface (SCSI) support? MS-DOS = 4 IDE/SATAA = Maximum 15 SCSI = has nothing to do with drive partitions, you can have unlimited 10. What directories are often stored on their own partitions? Root, home, boot and swap. /usr, /home, /var 11. Instead of a page file –such as in Windows—what type of partition does Linux use when it does not have enough memory to hold all the data that it is processing. Linux uses the swap partition 12. 13. Assignment 2.1 1. The two predominant Linux desktops currently in use are GNOME and KDE. GNOME is a desktop environment and graphical user interface (GUI) that runs on top of a computer operating system. It is composed entirely of free and open source software and is developed by both volunteers and paid contributors, the largest corporate contributor being Red Hat. KDE is an international free software community producing an integrated set of cross-platform applications designed to run on Linux, FreeBSD, Solaris, Microsoft Windows, and OS X systems. It is known for its Plasma Desktop, a desktop environment provided as the default working environment on many Linux distributions, such as Kubuntu, Pardus, and openSUSE. 2. Panel – these are the bars at......

Words: 1165 - Pages: 5

Premium Essay

Assingment 2.1

...Assignment 2.1 E5-1 Assumed a firm makes a $2,500 deposit into its money market account. If this account is currently paying 0.7% (yes, that’s right, less than 1%!), what will the account balance be after 1 year? The answer is $2,517.5 E5-2 If Bob and Judy combine their savings of $1,260 and $975, respectively, and deposit this amount into an account that pays 2% annual interest, compounded monthly, what will the account balance be after 4 years? The answer is $2,419.2358 E5-3 Gabrielle just won $2.5 million in the state lottery. She is giving the option of receiving a total of $1.3 million now, or she can elect to be paid $100,000 at the end of each of the next 25 years. If Gabrielle can earn 5% annually on her investments, from a strict economic point of view which option should she take? If Gabrielle decided to take the lump sum of $1.3 million and invest it all for 1 year she would have $13,650,000. If Gabrielle decides to take the $100,000 at the end of each year and invest it for the next 25 years she could have at the end $3,386,354. I would invest the lump sum of $1.3 million for one year and make $13,650,000. E5-4 Your firm has an option of making an investment in new software that will cost $130,000 today and is estimated to provide savings shown in the following table over its 5-year life: year Savings estimate 1 $35,000 2 ...

Words: 806 - Pages: 4

Premium Essay

Ilm Level 5 Lead and Develop Teams Assignment 2.1 2.1

...Be able to develop and lead teams 2.1 Critically review own ability to develop and lead teams to achieve organisational objectives. To be a an effective leader I need to build the trust my team have in me, I need to create an environment of trust and respect and engage my team. I have been working with the team within the team for a year before being promoted and becoming the manager. I have had to lead the team through a difficult period of change, conflict and at times very stressful situation. In their research Schindler and Thomas 1993 identified the 5 dimensions that make up the concept of trust To be able to develop the trust I had to show integrity by consistently demonstrating honesty and truthfulness show competency by demonstrating I have the right technical expertise the knowledge and good interpersonal skills show consistency by having a string credibility exercising good judgement when handling any situation and operating with a degree of predictability show loyalty by demonstrating a willingness to represent my team show openness by showing a willingness to share ideas and information openly and freely. Kouze and Posner 1993 suggest that employees who believe their manager to be honest competent and inspiring were significantly more likely to have a strong sense of teamwork and commitment to their organisation. Creating this environment of trust and respect requires me to adopt behaviours such as: being open being fair speaking openly about......

Words: 388 - Pages: 2

Premium Essay

Analysis 2.1

...Analysis 2.1 Problem Solving Theory 9/29/2014 Situation Appraisal The situation is that there is contaminated water being distributed to North America and Australia. The contaminate that is in the water is said to be benzene. This contaminated water is distributed from France. The problem is generated from an increase in the demand for the water. With the high demand for the water this caused the shipments to be delayed. In addition, this has caused a decrease in scheduled maintenance causing further delays in shipment. After loss of shipment at sea, reserve springs were then used to help keep up with supply of the water. These reserves springs were also used because of the high demand for the water. The availability of the water is delayed due to the remote location of the reserve springs, causing ongoing negotiations with contracts that are going quite badly, leading to strikes at the bottling plants. The units that were affected are shipments to North America and Europe. Authorities have begun to recall the product in Europe causing the company Bubbles Inc to also issue recalls as a precaution. Due to the high demand in water and Bubbles trying to accommodate for this demand it has caused delays in shipments to Australian and North American tank farms causing them to reschedule shipments. There is then a larger demand on the spring that supplies the mineral water for the process. Further this causes a drought in the springs along with a......

Words: 253 - Pages: 2

Free Essay

Nt1230 Analysis 2.1

...Sean Davis NT 1230 01-06-16 Analysis 2.1 There could be many problems in this scenario. He has purchased a graphic driver which is giving him problems on his computer. He’s taken precautions of updating the drivers from the manufacturer’s site and restarting is computer. Now, since those steps have been taken, his display is replaced by an incomprehensible noise. Problems from this point could be that there could be some loose wiring, faulty hardware from the manufacturer, incompatibility issues, or etc. The list could go on. From this point you would have to check everything for a diagnosis. Before you open the computer up and become a technician, you would want to see if there are any software issues that could resolve the problem first. See if all drivers are correct and compatible with your system. Check the manufacturer website to make sure the graphic adapter is compatible with your system. You could run the Start Menu>Settings>Control Panel. You could also run Systems>Hardware>Device Manager>Display Adapters to see if there is a problem with the adapter through the device manager. In most cases, a question mark would appear on the name of your adapter. Afterwards, you would double click the adapter driver, click on the General Tab, then proceed to click the Troubleshooting tab. You also have four options with the driver also. Obtain the driver details, Update the driver, Roll Back the driver, or uninstall the driver....

Words: 487 - Pages: 2

Premium Essay

2.1 Theories of Communication

...2.1 Theories of Communication One-to-One Communication One-to-one communication is used within my placement in teaching disabled individuals to swim because it is the most constructive and effective way to communicate important information to the individual being taught, who requires a safe environment, which only one to one communication can provide. The theory of communication that is applied to one-to-one communication is Argyle. Argyle’s theory of communication is the Communication Cycle. Michael Argyle developed his theory in 1972. He believed that interpersonal communication skills were something that you are able to learn and develop over time –just like learning to drive a car. Argyle thought that interpersonal interaction skills was a cycle which included decoding what the other person has said. The stages of the communication cycle: • Ideas occur – when you think of an idea of what you want to talk about/say. • Message coded – this is the process when you think about what you want to say and you put it into words. • Message sent – when you say what you are thinking about or wanting to say. • Message perceived – this is when the other person hears what you are saying. • Message decoded – when the other person interprets what you have said to them. • Message understood – this is when the other person understands what’s just been said to them. I use Argyle’s communication cycle within my placement when talking to the instructor on how to approach a......

Words: 1720 - Pages: 7

Premium Essay

En1320 Lab 2.1 Drafting an Essay

... ------------------------------------------------- Lab 2.1 Drafting an Essay June 25, 2015 EN1320 Duane Seneschal June 25, 2015 EN1320 Duane Seneschal Ever feel like you are in a dead end job, your life is at the bottom of a pit? That is how I felt before I decided to go back to school. I realized that without a college education that my life was going nowhere. I had no future. I had to break out of this pit that had become my life and chosen job. Without a college degree I was going nowhere had no future. Deciding to get a degree is all good and well, but what degree what path? How does one go about making a decision of this magnitude? It is an overwhelming task that can be frightening. It’s like looking up from the bottom of a hundred foot deep pit and trying to figure out how to get out of the pit and back into the sunlight, it’s scary. Well I know that I enjoyed working with and building computers, and I enjoyed the security field. I started searching to see if combining these 2 fields was feasible or possible. To my delight and pleasure there was a degree program that did cover both of these fields together it was called Cybersecurity. After reading up on Cybersecurity I felt it was a field that I would enjoy. But what exactly is Cybersecurity? After much research what I discovered is that Cybersecurity is different technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access...

Words: 689 - Pages: 3

Premium Essay

Case 2.1

...Case 2.1 Interesting Idea- But Will Doctor and Pharmacies Sign On? Kanisha Bell In this chapter, an opportunity is defined as being attractive, durable, timely, and anchored in a product or service that creates value for its buyer or end user. To what extent does Script Pad meet each of these tests of an opportunity? * I think there are plenty of opportunities when coming to the Script Pad. The opportunities that they have are that it always comes in handy when wanting to know how much or what you were prescribed by the doctor. It’s very attractive because if it works well for others then they can spread the word to others and to their doctors and maybe investors. I saves time by allowing the doctor to put all the info in the Script Pad and not having to right it on paper, we all know how we always have to wait for the doctor to come back to the room to talk to you about the prescription but the doctor can talk to you right there and send it to the pharmacy as soon as possible instead of you having to take it there. It’s something that you can rely on for your own good. What environmental trends are working in Script Pads favor? If Script Pad has uncovered a promising business opportunity, what environment trends have made Script Pad possible? Put yourself in the shoes of a family physician that’s part of a small practice (containing five doctors). If you were that doctor and were being pitched on Script pad’s method for writing prescriptions, how would you......

Words: 576 - Pages: 3

Premium Essay

Critical Thinking 2.1

...Assignment 2.1 Rodolfo Vargas University of the Potomac Business 202: Critical Thinking and Decision Making 7 February 2016 Professor Garetino Assignment 2.1 Part I 1.) Receptivity, immersion, seeing questions, utilization of errors, and detached devotion are necessary for creative insight because they allow one to open their mind, think deeply on the issue while at the same time taking a step back so what they see will stay fresh. This allows the person to find errors and question what they have found so eventually they can either solve the problem or find new ideas about the problem. 2.) Grace, accident, association, cognitive, and personality perspectives are consistent with each other because they are all some sort of action. With grace, creativity is something that occurs naturally to you, while creativity by accident is something you do by accident. Creativity by association happens because one connects two points together and cognitive creativity happens when one gains empirical knowledge on a subject and is able to form their own ideas from it through deep thought. Creativity through personality is something that can be learned through practice. 3.) Cognitive creativity is a process when one thinks of ideas or solves problems through their deep thought of a subject. The index metaphor takes this approach deeper by using “creative problem-solving aids to help ideas emerge” (Greenberg 2013). The creative problem-solving aid that is referred......

Words: 480 - Pages: 2

Free Essay

Essay 2.1

...Marie Foard EN1320 Comp 1 Professor Patnode Module 2 Shaping Ideas Essay 2.1 Drafting an Essay April 4, 2016 As a young person I wanted to try different things. I knew that I did not want to be a clown, comedian and I did not want to be a cashier for the rest of my life. So I really had to take a minute to think about different things I would be into to doing for the rest of my life. Deciding what to do for the rest of my life is the biggest decision I ever had to make. My thoughts were to try out photography, accounting and computers. All of this sounded interesting even though I did not know much about any of them. The first major I thought about taking up was photography. I wanted to learn how to take good pictures. Taking pictures is a lot of fun and it is a way of making memories last for a long time. It is good to have pictures to look at to help remember the good times. Photography has its pros and cons just like anything else. In order to be good at taking pictures you should know how to hold and adjust the camera just right. If you know how to do this your pictures will turn out just right. When purchasing a camera you should think about the different types. You have your professional and non-professional cameras. Professional cameras cost more but take better pictures. After you purchase a camera you should also buy care products to keep your camera in good condition. Keeping your camera in good condition means keeping it clean and storing it in a safe......

Words: 706 - Pages: 3

Premium Essay

Reserch Assignment 2.1

... Research Assignment 2.1 Kyle McGraw ITT Technical Institute IT302 Linux Mr. Gort April 14, 2012 In this paper I will go over 3 different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted......

Words: 938 - Pages: 4

Premium Essay

2.1 Research Paper

...Reason being millions of people have fallen victim to identity theft associated with computer security and how the issue are related. There are three security technologies that are required to be researched in this paper referring to security and what organization. SELinux, chroot jail, and iptables are part of this research paper. In addition this paper must include how each technology changes the operating system to enforce security and if the security measure can be easily bypassed. Finally describe the types of threats each of the technologies is designed to eliminate. First, SELinux which stands for Security-Enhanced Linux As part of its Information Assurance mission, the National Security Agency has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. Recognizing the critical role of operating system security mechanisms in supporting security at higher levels, researchers from NSA's National Information Assurance Research Laboratory, been investigating an architecture that can provide the necessary security functionality in a manner that can meet the security needs of a wide range of computing environments. End systems must be able to enforce the separation of information based on confidentiality and integrity requirements to provide system security. Operating system security mechanisms are the foundation for ensuring such separation. Unfortunately,......

Words: 263 - Pages: 2