Menu

Who Am I ? Evaluating our Identity on Many Levels

0 Comment

Who Am I ? Evaluating our Identity on Many LevelsI am sure you have often heard the expressions in people’s speech… “I identify with…” “My identity is…” It is how we feel we belong to a certain group or how our belief system is connected with members of a certain group. Our identity forms a bridge between ourselves and culture and communication. Some say we convey our identity when we speak, we do but I also contend that we convey our personal metaphors which can be an identifier as well as unspoken intentions and desires. The metaphoric speech within cultures can lead to periods of confusion and unclear messaging as those metaphors are often subliminal communications. We know that someone has said something that perhaps warrants further investigation but it can also be more overt. For example, we know when a person identifies various groups simply by the way they speak, react to members of different groups, or even gain membership into groups. They can be inclusive or exclusive and you and I may not meet the criteria to be a select member for many reasons.It is important to understand how we form our personal identities. We need to understand who we are and where we come from. Without that personal depth and insight, we may have difficulty understanding where we belong. We have personal identities and social identities. There is our private side and social side. I am sure you have heard that people never really know who you are completely-that is simply because we have to constantly merge within groups on a daily basis. Perhaps people are more open in an office setting, but they go home and are very compartmentalized in their thinking. Stereotypes develop. We have stereotypes of ourselves and stereotypes given to us by others. But stereotypes seem to develop when communication is not clear.We need to evaluate our cultural identity, our individual identity, our spiritual identity, and our familial identity. Those are important foundational aspects, and the rest of the identities we possess originate from them.Please answer the following: 1. Evaluate or dissect your identities that are most prominent and dominant in your thinking. 2. Tell us how you got there. 3. Evaluate your American Individual Identity and what it means to you. 4. Do you find yourself comparing your own identity belief systems to that of your co-workers? 5. Do you talk about it? 6. How does it impact your relationship building with others?Instructions: please answer all 6 questions accordingly. Each answer should have the question re-typed following the answer. A minimum of 500 words in all excluding the re-typed questions. No reference is needed.Posted: 3 hours agoDue: 14/04/2020Budget: $6Tags: timely Answers 0Bids 93Discount AssignMichelle GoodManMusyokionesAmanda SmithProfRubbsProCastrol01Discount AnsPROF_TOMMYAmerican TutorPROF. ANNANN HARRISElprofessoriMiss LynnUrgent Tutoruniversity workRosie Septemberhassan0906Prof Bila ShakaBrainy BrianProf. KaylinlopezChrisProfPaula HogWendy LewisDr WillymartinsDexterMastersProf.MacQueenDrNicNgaoDr Candice_2547Agher Editorjuliusmu33Catherine Owensbrilliant answersEmily MichaelBrilliant GeekDr R Judy MarkKATHERINE BECKSAll Works solverJessica LuisSOPHIE BLAKEStano 001RESPECT WRITERJenny BoomansRohanMathStat GeniusProff work phd work solutionsNursing_MissLizluvwritersarapaul2013Casey CeliaUNDISPUTED GEEKSaburBProf. ClariseSuper ProffkatetutorTiny Chrissmart-tutorkim woodsTutor Cyrus KenperfectoAcademic MentorMiss ProfessorSaad Fahimphyllis youngMichelle OwensAngelina MayAbdullah AnwarCotton CandyMiss Emily BluntJen Tech1Clytemnestraprof avrilPROFJUMAAATutorJoeKimAshley Ellie Homework ProQuickMentorBestOfArizonaA-Grade WriterMiss Lily J.Parker123suniyaziaSteve JobsProfGladdy01seniorwriterAmelia IrisProf SolutttionsTop Notch AnswerDrAbbyKelsieKAINDEWRITERkatty_julietDr. Ellen RMsir juliusOther questions 10pathophysiology hwBI APPLICATION IN BUSINESDiscussion Questions- Contemporary Auditing 2one page Module 02 Business Capstone Project – Business Ethics Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to the development of a new cyber intrusion detection tool. The specifics of the tool (i.e. software or network hardware) are up to you. Week 2200-300 word short writing 51UNIT VII ESSAYPart 1Blog ArchiveCopyright © 2019 HomeworkMarket.com Read MoreApplied SciencesArchitecture and DesignBiologyBusiness & FinanceChemistryComputer ScienceGeographyGeologyEducationEngineeringEnglishEnvironmental scienceSpanishGovernmentHistoryHuman Resource ManagementInformation SystemsLawLiteratureMathematicsNursingPhysicsPolitical SciencePsychologyReadingScienceSocial Science window.__REDUX__STATE__ = ‘{“appMeta”:{“serverRendered”:true},”apiRequests”:{“pendingRequestCount”:0,”succeededRequestCount”:4,”failedRequestCount”:0,”requestCounters”:{“GET_FIELDS_PENDING”:0,”GET_ENTITY_PENDING”:0,”GET_FIELDS_SUCCESS”:1,”GET_ENTITY_SUCCESS”:1,”GET_SIMILAR_QUESTIONS_PENDING”:0,”GET_OTHER_QUESTIONS_PENDING”:0,”GET_OTHER_QUESTIONS_SUCCESS”:1,”GET_SIMILAR_QUESTIONS_SUCCESS”:1}},”currentUserMeta”:{“id”:0,”isGuest”:true,”isReceivingEmails”:null,”authMethod”:null,”approvalTicket”:null,”fees”:null,”disputesAmount”:null,”earningsStats”:{“questions”:{“totalPurchases”:0,”totalIncome”:0},”tutorials”:{“totalPurchases”:0,”totalIncome”:0}}},”modal”:{},”joyride”:{“steps”:[]},”users”:{“guest-0”:{“role”:”student”,”isGuest”:true}},”usersStatuses”:{},”usersThreads”:{},”usersReviews”:{},”usersQuestions”:{},”reviewsPage”:{“results”:[]},”reviews”:{},”answersReviews”:{},”threads”:{},”questions”:{“17625383”:{“body”:””,”id”:17625383,”title”:”Part 1″,”isTutorial”:false,”isEssay”:true,”due”:”2017-07-17T13:20:00.000Z”,”budget”:5,”fieldOfStudyId”:800,”userId”:671667,”published”:true,”newBids”:0,”createdAt”:”2017-07-13T17:23:18.000Z”,”fieldOfStudy”:{“id”:800,”name”:”History”,”anchor”:”History”,”createdAt”:”2017-09-06T03:15:16.000Z”,”path”:{“id”:5886155,”path”:”/fields/history”,”sitemap”:true,”amp”:false,”createdAt”:”2017-12-24T22:55:21.000Z”}},”path”:{“id”:1636658,”path”:”/content/part-1-17625383-2″,”sitemap”:true,”amp”:true,”createdAt”:”2017-09-06T03:23:07.000Z”}},”17626037″:{“body”:”Unit VII EssayDiabetesType II diabetes, also called noninsulin-dependent diabetes mellitus, accounts for approximately 90% of all cases of diabetes mellitus. In a …”,”id”:17626037,”title”:”UNIT VII ESSAY”,”isTutorial”:false,”isEssay”:true,”due”:”2017-07-16T00:00:00.000Z”,”budget”:15,”fieldOfStudyId”:6900,”userId”:235826,”published”:true,”newBids”:0,”createdAt”:”2017-07-13T18:18:01.000Z”,”fieldOfStudy”:{“id”:6900,”name”:”Nursing”,”anchor”:”Nursing”,”createdAt”:”2017-09-06T03:15:16.000Z”,”path”:{“id”:5886229,”path”:”/fields/nursing”,”sitemap”:true,”amp”:false,”createdAt”:”2017-12-24T22:55:21.000Z”}},”path”:{“id”:1636692,”path”:”/content/unit-vii-essay-17626037-2″,”sitemap”:true,”amp”:true,”createdAt”:”2017-09-06T03:23:07.000Z”}},”17627865″:{“body”:”please check the attachment for details.”,”id”:17627865,”title”:”200-300 word short writing 51″,”isTutorial”:false,”isEssay”:true,”due”:”2017-07-14T21:00:00.000Z”,”budget”:3,”fieldOfStudyId”:200,”userId”:606169,”published”:true,”newBids”:0,”createdAt”:”2017-07-13T19:56:22.000Z”,”fieldOfStudy”:{“id”:200,”name”:”English”,”anchor”:”English”,”createdAt”:”2017-09-06T03:15:16.000Z”,”path”:{“id”:5886117,”path”:”/fields/english”,”sitemap”:true,”amp”:false,”createdAt”:”2017-12-24T22:55:21.000Z”}},”path”:{“id”:1636792,”path”:”/content/200-300-word-short-writing-51″,”sitemap”:true,”amp”:true,”createdAt”:”2017-09-06T03:23:07.000Z”}},”17634895″:{“body”:””,”id”:17634895,”title”:”Week 2″,”isTutorial”:true,”isEssay”:false,”due”:”2017-07-17T01:00:00.000Z”,”budget”:3,”fieldOfStudyId”:100,”userId”:331843,”published”:true,”newBids”:0,”createdAt”:”2017-07-14T02:54:23.000Z”,”fieldOfStudy”:{“id”:100,”name”:”Mathematics”,”anchor”:”Mathematics”,”createdAt”:”2017-09-06T03:15:16.000Z”,”path”:{“id”:5886107,”path”:”/fields/mathematics”,”sitemap”:true,”amp”:false,”createdAt”:”2017-12-24T22:55:21.000Z”}},”path”:{“id”:1637180,”path”:”/content/week-2-17634895-2″,”sitemap”:false,”amp”:true,”createdAt”:”2017-09-06T03:23:07.000Z”}},”17636339″:{“body”:”Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to the development of a new cyberintrusiondetection tool. …14/04/20206socialscience