SlideShare uma empresa Scribd logo
1 de 2
Learning Goals
                                              Chpt 12

1. Explain biological, social, and cognitive influences on gender.
    What is gender?
    How does biology influence gender?
    What are three social theories of gender?
    How do cognitive factors influence gender development?

2. Discuss gender stereotypes, similarities, and differences.
    What is gender stereotyping, and how extensive is it?
    What are some physical, cognitive, and socioemotional differences between men and women?

3. Describe the development of gender through the human life span.
    What are some developmental changes in gender in childhood?
    How does gender development change during adolescence?
    How does gender development change during adulthood?

4. Characterize influences on sexuality, the nature of sexual orientation, and some sexual problems.
    How do biology and culture influence sexuality?
    What is the nature of heterosexual and homosexual attitudes and behavior?
    What are some common sexually transmitted infections?
    What are some good strategies for protecting against STIs?
    What is the nature of forcible sexual behavior and sexual harassment?

5. Summarize how sexuality develops through the life span.
    What is the nature of child sexuality?
    How do adolescents develop a sexual identity?
    How does sexual behavior develop?
    What are some risk factors for sexual problems during adolescence?
    What are some patterns of behavior for emerging adults?
    How does sexuality change in middle adulthood?
    How does sexuality change in late adulthood?


                                              Key Terms

       AIDS                                          Menopause
       Androgens                                     Perimenopause
       Bisexual                                      Psychoanalytic theory of gender
       Climacteric                                   Rape
       Date or acquaintance rape                     Rapport talk
       Estrogens                                     Report talk
       Gender                                        Romantic script
       Gender-intensification hypothesis             Sexual harassment
       Gender role                                   Sexual scripts
       Gender schema theory                          Sexually transmitted infections (STIs)
       Gender stereotypes                            Social cognitive theory of gender
       Gender typing                                 Social role theory
Traditional religious script




                         Key People

Phyllis Bronstein   Carol Jacklin           Eleanor Maccoby
Laura Brown         Alfred Kinsey           Robert Michael
Alice Eagly         Harriet Lerner          Jean Baker Miller
Sigmund Freud       Ron Levant              Letitia Peplau
Janet Sibley Hyde   Simon LeVay             Joseph Pleck
                                            Deborah Tannen

Mais conteúdo relacionado

Mais de jhoegh

Santrock.dev psych.chpt 12.outline
Santrock.dev psych.chpt 12.outlineSantrock.dev psych.chpt 12.outline
Santrock.dev psych.chpt 12.outlinejhoegh
 
Santrock.dev psych.chpt 11.outline
Santrock.dev psych.chpt 11.outlineSantrock.dev psych.chpt 11.outline
Santrock.dev psych.chpt 11.outlinejhoegh
 
Santrock.dev psych.chpt 10.outline
Santrock.dev psych.chpt 10.outlineSantrock.dev psych.chpt 10.outline
Santrock.dev psych.chpt 10.outlinejhoegh
 
Santrock tls 5_ppt_ch07
Santrock tls 5_ppt_ch07Santrock tls 5_ppt_ch07
Santrock tls 5_ppt_ch07jhoegh
 
Santrock tls ppt ch06-1
Santrock tls ppt ch06-1Santrock tls ppt ch06-1
Santrock tls ppt ch06-1jhoegh
 
Chapter 9 learning goals
Chapter 9 learning goalsChapter 9 learning goals
Chapter 9 learning goalsjhoegh
 
Chapter 8 outline
Chapter 8 outlineChapter 8 outline
Chapter 8 outlinejhoegh
 
Chapter 8 learning goals
Chapter 8 learning goalsChapter 8 learning goals
Chapter 8 learning goalsjhoegh
 
Chapter 7 outline
Chapter 7 outlineChapter 7 outline
Chapter 7 outlinejhoegh
 
Chapter 7 learning goals
Chapter 7 learning goalsChapter 7 learning goals
Chapter 7 learning goalsjhoegh
 
Chapter 6 outline
Chapter 6 outlineChapter 6 outline
Chapter 6 outlinejhoegh
 
Santrock tls 5_ppt_ch09
Santrock tls 5_ppt_ch09Santrock tls 5_ppt_ch09
Santrock tls 5_ppt_ch09jhoegh
 
Santrock.dev psych.chpt4.outline
Santrock.dev psych.chpt4.outlineSantrock.dev psych.chpt4.outline
Santrock.dev psych.chpt4.outlinejhoegh
 
Dev Psych.ch1.studyguide
Dev Psych.ch1.studyguideDev Psych.ch1.studyguide
Dev Psych.ch1.studyguidejhoegh
 
Dev psych.ch5.studyguide
Dev psych.ch5.studyguideDev psych.ch5.studyguide
Dev psych.ch5.studyguidejhoegh
 
Dev psych.ch5.outline
Dev psych.ch5.outlineDev psych.ch5.outline
Dev psych.ch5.outlinejhoegh
 
Dev psych.ch3.studyguide
Dev psych.ch3.studyguideDev psych.ch3.studyguide
Dev psych.ch3.studyguidejhoegh
 
Dev psych.ch3.outline
Dev psych.ch3.outlineDev psych.ch3.outline
Dev psych.ch3.outlinejhoegh
 
Dev psych.ch2.studyguide
Dev psych.ch2.studyguideDev psych.ch2.studyguide
Dev psych.ch2.studyguidejhoegh
 
Dev psych.ch2.outline
Dev psych.ch2.outlineDev psych.ch2.outline
Dev psych.ch2.outlinejhoegh
 

Mais de jhoegh (20)

Santrock.dev psych.chpt 12.outline
Santrock.dev psych.chpt 12.outlineSantrock.dev psych.chpt 12.outline
Santrock.dev psych.chpt 12.outline
 
Santrock.dev psych.chpt 11.outline
Santrock.dev psych.chpt 11.outlineSantrock.dev psych.chpt 11.outline
Santrock.dev psych.chpt 11.outline
 
Santrock.dev psych.chpt 10.outline
Santrock.dev psych.chpt 10.outlineSantrock.dev psych.chpt 10.outline
Santrock.dev psych.chpt 10.outline
 
Santrock tls 5_ppt_ch07
Santrock tls 5_ppt_ch07Santrock tls 5_ppt_ch07
Santrock tls 5_ppt_ch07
 
Santrock tls ppt ch06-1
Santrock tls ppt ch06-1Santrock tls ppt ch06-1
Santrock tls ppt ch06-1
 
Chapter 9 learning goals
Chapter 9 learning goalsChapter 9 learning goals
Chapter 9 learning goals
 
Chapter 8 outline
Chapter 8 outlineChapter 8 outline
Chapter 8 outline
 
Chapter 8 learning goals
Chapter 8 learning goalsChapter 8 learning goals
Chapter 8 learning goals
 
Chapter 7 outline
Chapter 7 outlineChapter 7 outline
Chapter 7 outline
 
Chapter 7 learning goals
Chapter 7 learning goalsChapter 7 learning goals
Chapter 7 learning goals
 
Chapter 6 outline
Chapter 6 outlineChapter 6 outline
Chapter 6 outline
 
Santrock tls 5_ppt_ch09
Santrock tls 5_ppt_ch09Santrock tls 5_ppt_ch09
Santrock tls 5_ppt_ch09
 
Santrock.dev psych.chpt4.outline
Santrock.dev psych.chpt4.outlineSantrock.dev psych.chpt4.outline
Santrock.dev psych.chpt4.outline
 
Dev Psych.ch1.studyguide
Dev Psych.ch1.studyguideDev Psych.ch1.studyguide
Dev Psych.ch1.studyguide
 
Dev psych.ch5.studyguide
Dev psych.ch5.studyguideDev psych.ch5.studyguide
Dev psych.ch5.studyguide
 
Dev psych.ch5.outline
Dev psych.ch5.outlineDev psych.ch5.outline
Dev psych.ch5.outline
 
Dev psych.ch3.studyguide
Dev psych.ch3.studyguideDev psych.ch3.studyguide
Dev psych.ch3.studyguide
 
Dev psych.ch3.outline
Dev psych.ch3.outlineDev psych.ch3.outline
Dev psych.ch3.outline
 
Dev psych.ch2.studyguide
Dev psych.ch2.studyguideDev psych.ch2.studyguide
Dev psych.ch2.studyguide
 
Dev psych.ch2.outline
Dev psych.ch2.outlineDev psych.ch2.outline
Dev psych.ch2.outline
 

Último

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 

Último (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 

Santrock.dev psych.chpt 12.key terms

  • 1. Learning Goals Chpt 12 1. Explain biological, social, and cognitive influences on gender.  What is gender?  How does biology influence gender?  What are three social theories of gender?  How do cognitive factors influence gender development? 2. Discuss gender stereotypes, similarities, and differences.  What is gender stereotyping, and how extensive is it?  What are some physical, cognitive, and socioemotional differences between men and women? 3. Describe the development of gender through the human life span.  What are some developmental changes in gender in childhood?  How does gender development change during adolescence?  How does gender development change during adulthood? 4. Characterize influences on sexuality, the nature of sexual orientation, and some sexual problems.  How do biology and culture influence sexuality?  What is the nature of heterosexual and homosexual attitudes and behavior?  What are some common sexually transmitted infections?  What are some good strategies for protecting against STIs?  What is the nature of forcible sexual behavior and sexual harassment? 5. Summarize how sexuality develops through the life span.  What is the nature of child sexuality?  How do adolescents develop a sexual identity?  How does sexual behavior develop?  What are some risk factors for sexual problems during adolescence?  What are some patterns of behavior for emerging adults?  How does sexuality change in middle adulthood?  How does sexuality change in late adulthood? Key Terms AIDS Menopause Androgens Perimenopause Bisexual Psychoanalytic theory of gender Climacteric Rape Date or acquaintance rape Rapport talk Estrogens Report talk Gender Romantic script Gender-intensification hypothesis Sexual harassment Gender role Sexual scripts Gender schema theory Sexually transmitted infections (STIs) Gender stereotypes Social cognitive theory of gender Gender typing Social role theory
  • 2. Traditional religious script Key People Phyllis Bronstein Carol Jacklin Eleanor Maccoby Laura Brown Alfred Kinsey Robert Michael Alice Eagly Harriet Lerner Jean Baker Miller Sigmund Freud Ron Levant Letitia Peplau Janet Sibley Hyde Simon LeVay Joseph Pleck Deborah Tannen