Updating search results...

Search Resources

605 Results

View
Selected filters:
  • inside-your-classroom
Create and Curate: Mindful Learning for the 21st Century
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Academic artist Enrique Legaspi grew up singing, skateboarding, and creating. As a teacher, one day he realized, "I'm doing everything I can, I'm staying up late, but I'm producing the same results. What's going on?" Now that he's begun to modify and adapt his teaching to his students' interests, Enrique's students are creating, curating and sharing their work using video and social media -- and it's made all the difference.

Subject:
Arts and Humanities
Material Type:
Lecture
Provider:
ISKME
Provider Set:
Big Ideas Fest
Author:
Enrique Gabriel Legaspi
Date Added:
12/05/2011
Creating a Caring School: Toolkit Unit 5 - Good nutrition for learning
Unrestricted Use
CC BY
Rating
0.0 stars

The purpose of this toolkit is to provide a helpful, detailed checklist for SMTs to plan and manage their school nutrition programme.

Subject:
Education
Life Science
Nutrition
Material Type:
Reading
Provider:
OER Africa
Author:
Christina Randell
Gisela Winkler
Liora Hellmann
Maryla Bialobrzeska
Date Added:
02/27/2012
Creating a Google Classroom
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

ISTE Standards for Educators - Standard 6: Facilitator     b. Manage the use of technology and student learning straategies in digital platforms, virtual environments, hands on makerspaces or in the field.This lesson is an introduction to Google Classroom for teachers.  The Google Classroom app is a digital tool that allows teachers and students to learn and create in a paperless environment. 

Subject:
Educational Technology
Material Type:
Lesson Plan
Author:
Joan Walton
Date Added:
11/14/2017
Creating and Implementing a Family Partnership Plan
Unrestricted Use
CC BY
Rating
0.0 stars

Designing a Family Partnership Plan helps teachers to explore the assets that families bring to the table and the qualities of ideal partnerships. Learning about what it takes to develop effective partnerships will provide you with the support you need to create your own partnership plan. Strong partnerships with students' families can help teachers to optimize student achievement. This strategy will help you to assess your level of family-school partnership and provide you with the opportunity to focus on asset-based narratives as you explore critical considerations when engaging with families. Recognizing that parent involvement is a key factor in student success and considering the perspectives of your students' families about their involvement will make you a more effective partner.

Subject:
Education
Material Type:
Teaching/Learning Strategy
Provider:
BetterLesson
Author:
Afrika Afeni Mills
Date Added:
05/05/2022
Creative Communication Frames: Discovering Similarities between Writing and Art
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Graphic organizers assist the development of comparative vocabulary and generate discussions of analogy and metaphor in art as students go on a real or virtual tour of an art gallery.

Subject:
Arts and Humanities
Visual Arts
Material Type:
Activity/Lab
Lesson Plan
Provider:
ReadWriteThink
Provider Set:
ReadWriteThink
Date Added:
09/30/2013
Criminal Law
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Criminal Law uses a two-step process to augment learning, called the applied approach. First, after building a strong foundation from scratch, Criminal Law introduces you to crimes and defenses that have been broken down into separate components. It is so much easier to memorize and comprehend the subject matter when it is simplified this way. However, becoming proficient in the law takes more than just memorization. You must be trained to take the laws you have studied and apply them to various fact patterns. Most students are expected to do this automatically, but application must be seen, experienced, and practiced before it comes naturally. Thus the second step of the applied approach is reviewing examples of the application of law to facts after dissecting and analyzing each legal concept. Some of the examples come from cases, and some are purely fictional. All the examples are memorable, even quirky, so they will stick in your mind and be available when you need them the most (like during an exam). After a few chapters, you will notice that you no longer obsess over an explanation that doesn’t completely make sense the first time you read it—you will just skip to the example. The examples clarify the principles for you, lightening the workload significantly.

Subject:
Career and Technical Education
Criminal Justice
General Law
Law
Material Type:
Textbook
Author:
Anonyous
Date Added:
01/01/2012
Curriculum Curation
Unrestricted Use
CC BY
Rating
0.0 stars

Collection development, a foundational component of the library program, is the formal, professional process of selecting, with the aid of appropriate evaluation tools and knowledge of the school, comprehensive and balanced materials to meet the diverse needs of the community.Rather than using a comprehensive and balanced acquisitions procedure, curriculum curation is a tightly targeted selection process to meet the knowledge and/or cognitive goals of instruction in service of student learning. Rather than generalized pointers to resources, curation will identify a specific section or element within each resource. Therefore, curriculum curation requires co-planning with faculty and using professional discernment, adding value to the chosen resources. Dialogue between librarian and instructor must be part of the curation process In order to surface student learning goals. Such negotiated curation shines a light on the expertise that each educator brings to the conversation about the thinking tasks and relevant experiences that will augment student learning. This module scaffolds and models curating an interdependent set of OER sources and tools to support the instructional core of a unit.Granite State Learning Outcomes3. Demonstrate the ability to facilitate developmentally appropriate and challenging learning experiences based on the unique needs of each learner (and) make the discipline(s) accessible and meaningful for learners;6. Design and implement instructional strategies that engage students’ interests and develop their ability to: inquire; think both critically and creatively; and ethically gain and share knowledge;15. Complete a narrative reflection on the course and personal growth.AASL CompetenciesAASL Standard 1.2 a: Implement the principles of effective teaching and learning that contribute to an active, inquiry-based approach to learning.AASL Standard 1.2 b: Make use of a variety of instructional strategies and assessment tools to design and develop digital-age learning experiences and assessments in partnership with classroom teachers and other educators.AASL Standard 1.3 a: Model, share, and promote effective principles of teaching and learning as collaborative partners with other educators.AASL Standard 1.4 c: Integrate the use of technologies as a means for effective and creative teaching and to support P-12 students' conceptual understanding, critical thinking and creative processes.PSEL Standard 4 a: Implement coherent systems of curriculum, instruction, and assessment that promote the mission, vision, and core values of the school, embody high expectations for student learning, align with academic standards, and are culturally responsive.PSEL Standard 4 e: Promote the effective use of technology in the service of teaching and learning.

Subject:
Education
Material Type:
Teaching/Learning Strategy
Provider:
OER Commons
Author:
Debbie Abilock
Date Added:
01/10/2016
Curriculum Design for Inclusive Arts Teaching and Learning (Part 4): Educationally Interpretive Exhibitions and Educative Cases
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This module of the course focuses on organizing curricular documentation and student learning evidence into a reflective exhibition or narrative that explains student learning and what inclusive educational practice supported that learning. During the module you will use a scoring rubric to help analyze some sample cases and give constructive feedback to improve the educative value of the cases or exhibitions for other educators.

Subject:
Arts and Humanities
Material Type:
Activity/Lab
Teaching/Learning Strategy
Provider:
VSA - The International Organization on Arts and Disability
Provider Set:
Curriculum Design for Inclusive Arts Teaching and Learning
Author:
Don Glass
Date Added:
08/22/2011
Cyberbullying And Impacts of Cyberbullying
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

CYBER BULLYING

Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyber bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyber bullying crosses the line into unlawful or criminal behavior.

The most common places where cyber bullying occurs are:

Social Media, such as Facebook, Instagram, Snapchat, and Twitter
SMS (Short Message Service) also known as Text Message sent through devices
Instant Message (via devices, email provider services, apps, and social media messaging features)
Email.

WHERE IS CYBERBULLYING OCCURING ?

Manuals to educate the public, teachers and parents summarize, "Cyberbullying is being cruel to others by sending or posting harmful material using a cell phone or the internet." Research, legislation and education in the field are ongoing. Research has identified basic definitions and guidelines to help recognize and cope with what is regarded as abuse of electronic communications.

Cyberbullying involves repeated behavior with intent to harm.
Cyberbullying is perpetrated through harassment, cyberstalking, denigration (sending or posting cruel rumors and falsehoods to damage reputation and friendships), impersonation, and exclusion (intentionally and cruelly excluding someone from an online group)
Cyberbullying can be as simple as continuing to send emails or text messages harassing someone who has said they want no further contact with the sender. It may also include public actions such as repeated threats, sexual remarks, pejorative labels (i.e., hate speech) or defamatory false accusations, ganging up on a victim by making the person the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and posting false statements as fact aimed a discrediting or humiliating a targeted person. Cyberbullying could be limited to posting rumors about a person on the internet with the intention of bringing about hatred in others' minds or convincing others to dislike or participate in online denigration of a target. It may go to the extent of personally identifying victims of crime and publishing materials severely defaming or humiliating them.

Cyberbullies may disclose victims' personal data (e.g. real name, home address, or workplace/schools) at websites or forums or may use impersonation, creating fake accounts, comments or sites posing as their target for the purpose of publishing material in their name that defames, discredits or ridicules them. This can leave the cyberbully anonymous which can make it difficult for the offender to be caught or punished for their behavior, although not all cyberbullies maintain their anonymity. Text or instant messages and emails between friends can also constitute cyber bullying if what is said or displayed is hurtful to the participants.
The recent use of mobile applications and rise of smartphones have yielded to a more accessible form of . It is expected that cyber bullying via these platforms will be associated with bullying via mobile phones to a greater extent than exclusively through other more stationary internet platforms. In addition, the combination of cameras and Internet access and the instant availability of these modern smartphone technologies yield themselves to specific types of cyber bullying not found in other platforms. It is likely that those cyber bullied via mobile devices will experience a wider range of cyber bullying types than those exclusively bullied elsewhere.

Subject:
Applied Science
Computer Science
Material Type:
Homework/Assignment
Author:
Mounika
Date Added:
11/12/2017
Damien Hirst, The Physical Impossibility of Death in the Mind of Someone Living
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Beth Harris, Sal Khan and Steven Zucker discuss the Damien Hirst sculpture, The Physical Impossibility of Death in the Mind of Someone Living, and issues of interpretation. Created by Beth Harris, Steven Zucker, and Sal Khan.

Subject:
Art History
Arts and Humanities
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Smarthistory
Author:
SmartHistory
Date Added:
11/16/2012
Dancing Minds and Shouting Smiles: Teaching Personification Through Poetry
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Students learn about personification by reading and discussing poems and then brainstorm nouns and verbs to create personification in their own poems.

Subject:
English Language Arts
Material Type:
Activity/Lab
Lesson Plan
Provider:
ReadWriteThink
Provider Set:
ReadWriteThink
Date Added:
10/02/2013
Data Wrangling and Processing for Genomics
Unrestricted Use
CC BY
Rating
0.0 stars

Data Carpentry lesson to learn how to use command-line tools to perform quality control, align reads to a reference genome, and identify and visualize between-sample variation. A lot of genomics analysis is done using command-line tools for three reasons: 1) you will often be working with a large number of files, and working through the command-line rather than through a graphical user interface (GUI) allows you to automate repetitive tasks, 2) you will often need more compute power than is available on your personal computer, and connecting to and interacting with remote computers requires a command-line interface, and 3) you will often need to customize your analyses, and command-line tools often enable more customization than the corresponding GUI tools (if in fact a GUI tool even exists). In a previous lesson, you learned how to use the bash shell to interact with your computer through a command line interface. In this lesson, you will be applying this new knowledge to carry out a common genomics workflow - identifying variants among sequencing samples taken from multiple individuals within a population. We will be starting with a set of sequenced reads (.fastq files), performing some quality control steps, aligning those reads to a reference genome, and ending by identifying and visualizing variations among these samples. As you progress through this lesson, keep in mind that, even if you aren’t going to be doing this same workflow in your research, you will be learning some very important lessons about using command-line bioinformatic tools. What you learn here will enable you to use a variety of bioinformatic tools with confidence and greatly enhance your research efficiency and productivity.

Subject:
Applied Science
Computer Science
Genetics
Information Science
Life Science
Mathematics
Measurement and Data
Material Type:
Module
Provider:
The Carpentries
Author:
Adam Thomas
Ahmed R. Hasan
Aniello Infante
Anita Schürch
Dev Paudel
Erin Alison Becker
Fotis Psomopoulos
François Michonneau
Gaius Augustus
Gregg TeHennepe
Jason Williams
Jessica Elizabeth Mizzi
Karen Cranston
Kari L Jordan
Kate Crosby
Kevin Weitemier
Lex Nederbragt
Luis Avila
Peter R. Hoyt
Rayna Michelle Harris
Ryan Peek
Sheldon John McKay
Sheldon McKay
Taylor Reiter
Tessa Pierce
Toby Hodges
Tracy Teal
Vasilis Lenis
Winni Kretzschmar
dbmarchant
Date Added:
08/07/2020
The Day Jimmy's Boa Taught Cause and Effect
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

This lesson introduces the concept of cause and effect with Trinka Hakes Noble's books about Jimmy and his boa constrictor. Each lesson begins with the teacher reading a new story about Jimmy and his boa and the chaos they bring to each place they visit. Class discussions about each event and its cause are followed by tasks for the students to help illustrate understanding of the concept. Students create cause-and-effect pictures, puzzles, and flow charts as they explore the genre. As a culminating activity, students write their own book with causes and effects, which are assessed with a rubric.

Subject:
English Language Arts
Material Type:
Activity/Lab
Lesson Plan
Provider:
ReadWriteThink
Provider Set:
ReadWriteThink
Author:
Vanessa Udry
Date Added:
08/27/2013
The Declaration of Independence: "An Expression of the American Mind"
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson plan looks at the major ideas in the Declaration of Independence, their origins, the Americans' key grievances against the King and Parliament, their assertion of sovereignty, and the Declaration's process of revision.

Subject:
History
Material Type:
Lesson Plan
Provider:
National Endowment for the Humanities
Provider Set:
EDSITEment!
Date Added:
09/06/2019
Deep Dive into Open Scholarship: Data, Materials, and Code Transparency
Unrestricted Use
CC BY
Rating
0.0 stars

In this deep dive session, Dr. Willa van Dijk discusses how transparency with data, materials, and code is beneficial for educational research and education researchers. She illustrates these points by sharing experiences with transparency that were crucial to her success. She then shifts gears to provide tips and tricks for planning a new research project with transparency in mind, including attention to potential pitfalls, and also discusses adapting materials from previous projects to share.

Subject:
Education
Material Type:
Lesson
Author:
Willa van Dijk
Date Added:
03/15/2021
Defining Accessibility
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

An explanation of what it means to say educational materials are "accessible" and why accessibility is important.

Subject:
Education
Educational Technology
Material Type:
Reading
Provider:
CAST
Author:
National AEM Center at CAST
Date Added:
07/22/2020
A "Defining Moment" in Editorial Writing
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be introduced to the definition mode of writing. Students will learn to define a particular subject by responding in an editorial format. Students will first compose an editorial graphic organizer, which will aid in composing a completed editorial using the writing process.

Subject:
Arts and Humanities
Material Type:
Lesson Plan
Provider:
University of North Carolina at Chapel Hill School of Education
Provider Set:
LEARN NC Lesson Plans
Author:
Susan Brooks and Carrie Mabry
Date Added:
06/15/2004
Dependability Checklist
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The Dependability Checklist is a tool to help students evaluate resources for their assessments. Students answer ten 'yes' or 'no' questions about a resource and then generate a score indicating how trustworthy or dependable that resource is. Working through the Checklist introduces students to indicators of reliability. As students become more confident in evaluating sources, they won't need to rely on the Checklist. This tool is used as part of teaching evaluation in first year units at Deakin University. It can be used as part of assessment or activities where students evaluate resources providing the dependability score.

Subject:
Applied Science
Education
Higher Education
Information Science
Material Type:
Activity/Lab
Interactive
Provider:
Deakin University
Author:
Deakin University Library
Date Added:
11/07/2021