Understanding the core functions and essential services of public health

 Understanding the core functions and essential services of public health are extremely important for public health officials when promoting health in the community or trying to implement a policy.As a public health official, you will be expected to give a variety of presentations about your work or topics that currently affect your work in public health.For this assignment, imagine that you are the public health director for a local public health agency and you have been asked to give a presentation to a local board of county commissioners that is deciding whether to increase or decrease funding for your public health agency. It is your task to influence and educate the county commissioners regarding the importance of core public health services, recent policies and legislation that may affect public health services in your community, and your role as the health director in providing adequate public health protections and policy development.Please include at least the following information in your presentation:

  1. Explain the core functions and essential services and how they impact the social determinants of health. Provide examples from your local community.
  2. Identify a current public health policy or legislative action and how it has positively affected your community.
  3. Provide an example of a public health policy in history, and how it has paved the way for a current public health policy that has positively affected your community.
  4. Explain the role of public health officials in program and policy development, management, and implementation. Provide examples.

For this presentation, you will need to create a logical and succinct PowerPoint presentation with a minimum of eight slides (not counting the title and reference slides). You may use the textbook, the American Public Health Association website, the Centers for Disease Control and Prevention website, the National Association of County and City Health Officials website, and other academic sources as you see fit. Remember, be sure to create a title slide and a reference slide that cites all sources using APA format.Please make sure to use the notes section within PowerPoint to create the dialogue or script that you would use when speaking to the audience about the information presented on your slide. Your PowerPoint presentation should be constructed using a serif-type font. A serif-type font is for high-resolution media in principle and is easier to read than a sans-serif font because the individual characters differ more from each other. The standard is Times New Roman.Adhere to APA Style when creating citations and references for this assignment. APA formatting, however, is not necessary. 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Watch the documentary, Growing Up with Gadgets, in its entirety.

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Using the SEC 10-K for your company, answer the following

  Using the SEC 10-K for your company, answer the following questions. Do not cut and paste from your company SEC report. Notice line items, if they appear, for Right of Use Assets and Lease Liabilities as well as other changes in Property, Plant and Equipment (PPE) and Liabilities. Long

Police Operations Presentation

 Create a 10- to a 12-slide presentation on police operations in which you address the following: What are the various functions of police agencies? Under what authority are officers able to make arrests, conduct searches, and interrogate people? Provide a minimum of two examples of police corruption or other police

Research the key characteristics of the Zika virus in a

  Research the key characteristics of the Zika virus in a one to two pages Include the hallmarks of a Zika infection in many different demographics of human hosts Determine if Zika is unique in pathogenesis or if there are other viruses like it If so, include what they are

oday, there are various “stake holders,” people who have an

  oday, there are various “stake holders,” people who have an interest, in our federal, state, and local governments.  This was not obviously the case before our 1787 Founders met at their Constitutional Convention in Philadelphia.  They thought of politics rather simplistically, seeing the need for only a legislature, executive,

This is a group activity. Find at least one interesting

  This is a group activity.  Find at least one interesting example of a policy in your (local) area that is intergovernmental in nature (i.e., it reflects local, state, or federal government relations around an issue). Share your ideas and receive feedback in a small group. In your post, include the

Combine the presentation you developed from Phase 3 and Phase

Combine the presentation you developed from Phase 3 and Phase 4 into a single team development presentation. Using all of your materials from phase 3 and 4 (assignments), review all of the comments and recommendations provided from your instructor and peers to help you finalize your presentation. Include all of

In this course, we discussed how several companies such as

In this course, we discussed how several companies such as Ford (Learning from Mistakes opening incident) and Coca-Cola (Strategy Spotlight 7.4) adopted a localized international strategy. Interview a manager in an organization with foreign market exposure and ask the following questions: (1) what are the main benefits of localizing products

Catatonia in a patient with Bipolar disorder. Case study

You are required to identify an appropriate case study related to your current practice placement/area of practice. In your essay you will need to: Clearly define and outline the service users physiological presenting condition 1. Critically analyse the Patho-physiological changes that occur during the related illness 2. Analyse how the

Facebook and Google Privacy 1. Do people who use Facebook

Facebook and Google Privacy 1. Do people who use Facebook have a legitimate claim to privacy when they themselves are posting information about themselves? 2. How can using the sharing privacy controls help preserve your privacy on Facebook? In what ways is the sharing control ineffective? 3. Why would Google

Research the personality profile of a typical cybercriminal. Then, respond

Research the personality profile of a typical cybercriminal. Then, respond to the following in discussion: Provide some details about your findings.  What are some of the specific sort of crimes that cyber criminals commit?  Formulate a policy over what society should do about cyber criminals who operate from foreign countries

process recording

Process Recording Project Guidelines: Choose a classmate(s) o work with and create a scenario between a nurse and a client. The scenario does not have to be about a client in a mental health setting. Video tape yourselves acting out the scenario. Once you have the videotape, write a transcript

Hello, I have a project I need to make for

Hello, I have a project I need to make for school with IntelliJ. (mySQL, kotlin, ..). It should be simple data and code that gets shown only in terminal. Its about being able to track how many cars are parked etc.. pushing things in arrays and getting them out basically.

HCP 210 Week 7 DQ 2

In this paperwork of HCP 210 Week 7 Discussion Question 2 you will find the answers on the next questions: Search the Internet for job descriptions or career opportunities within the pharmaceutical field. You may want to use the Occupational Outlook Handbook Web site at as a resource (type pharmacy

Firewall Management

 There are many recommendations, guidelines, and best practices for firewall management. Some argue that an operating system’s host firewall software may offer sufficient security. Therefore, they suggest, all options should be evaluated before discounting the operating system’s host firewall software. •List and explain five typical firewall guidelines or practices. Select