Skip to main content

Home/ educators/ Group items matching "samples" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Jeff Johnson

FiveThirtyEight.com: Electoral Projections Done Right - 0 views

  •  
    There are several ways that the FiveThityEight methodology differs from other poll compilations. Firstly, we assign each poll a weighting based on that pollster's historical track record, the poll's sample size, and the recentness of the poll. More reliable polls are weighted more heavily in our averages. Secondly, we include a regression estimate based on the demograhics in each state among our 'polls', which helps to account for outlier polls and to stabilize the results. Thirdly, we simulate the election 10,000 times for each site update in order to provide a probabilistic assessment of electoral outcomes.
Vicki Davis

CAST UDL Lesson Builder: Learn About Universal Design for Learning (UDL) - 0 views

  •  
    Excellent Universal Design for Learning Lesson Building and samples from the CAST website.
  •  
    UDL is an important method for designing lessons that includes all learners.
Dave Truss

Math and the Movies Resource List - 17 views

  •  
    Throughout our years of teaching we have used (and continue to use) movie clips in our classrooms to enhance content and engage our students. This listing is a sample of the types of movies we find useful. The accompanying worksheets are our mathematical interpretations and applications of information presented in these clips.
Jason Heiser

Copy / Paste by Peter Pappas: The Reflective Principal: A Taxonomy of Reflection (Part IV) - 8 views

  •  
    The Reflective Principal: A Taxonomy of Reflection (Part IV) Reflection can be a challenging endeavor. It's not something that's fostered in school - typically someone else tells you how you're doing! Principals (and instructional leaders) are often so caught up in the meeting the demands of the day, that they rarely have the luxury to muse on how things went. Self-assessment is clouded by the need to meet competing demands from multiple stakeholders. In an effort to help schools become more reflective learning environments, I've developed this "Taxonomy of Reflection" - modeled on Bloom's approach. It's posted in four installments: 1. A Taxonomy of Reflection 2. The Reflective Student 3. The Reflective Teacher 4. The Reflective Principal It's very much a work in progress, and I invite your comments and suggestions. I'm especially interested in whether you think the parallel construction to Bloom holds up through each of the three examples - student, teacher, and principal. I think we have something to learn from each perspective. 4. The Reflective Principal Each level of reflection is structured to parallel Bloom's taxonomy. (See installment 1 for more on the model) Assume that a principal (or instructional leader) looked back on an initiative (or program, decision, project, etc) they have just implemented. What sample questions might they ask themselves as they move from lower to higher order reflection? (Note: I'm not suggesting that all questions are asked after every initiative - feel free to pick a few that work for you.) Bloom's Remembering : What did I do? Principal Reflection: What role did I play in implementing this program? What role did others play? What steps did I take? Is the program now operational and being implemented? Was it completed on time? Are assessment measures in place? Bloom's Understanding: What was
yc c

Google Code University - Google Code - 16 views

  •  
    This website provides tutorials and sample course content so CS students and educators can learn more about current computing technologies and paradigms. In particular, this content is Creative Commons licensed which makes it easy for CS educators to use in their own classes. The Courses section contains tutorials, lecture slides, and problem sets for a variety of topic areas: AJAX Programming Algorithms Distributed Systems Web Security Languages In the Tools 101 section, you will find a set of introductions to some common tools used in Computer Science such as version control systems and databases.
Dave Truss

CI-portfolio - Creating Your UNI Teacher Ed e-Portfolio - 14 views

  •  
    Below you will find a set of instructional materials that should make your creation easier. You can begin by reviewing some samples of e-Portfolios created in the Educational Technology and Design class in C&I.
David Wetzel

Science Discrepant Events and Critical Thinking: Using Surprising Phenomena to Focus Students' Attention in Science | Suite101.com - 7 views

  •  
    Sample discrepant events are used to cause contradictions in students' prior knowledge and experiences in support of their better understanding of science concepts.
Claude Almansi

The Power of Educational Technology: New York Times edtech article fails the test! - 0 views

  •  
    Liz B Davis Sep. 4, 2011 "The front page of today's New York Times boasted an article about the "failure" of technology in the classroom. Titled, In Classroom of the Future, Stagnant Scores , the article describes a school in Arizona where, despite a huge investment in technology, there hasn't been an increase in test scores. The article is based on one school in one town in Arizona, hardly a statistically significant sample. Larry Cuban, an outspoken critic of technology in schools since the early 1990s, is quoted multiple times. Not one of the many experts in the field of educational technology, whom we know and love, was interviewed (or at least quoted) in the article."
Vicki Davis

National Punctuation Day - 0 views

  •  
    Just got this in my inbox - English teachers listen up and plan to celebrate national punctuation day. "HOW TO CELEBRATE NATIONAL PUNCTUATION DAY What can you do to participate in National Punctuation Day on September 24! 1. Go to www.NationalPunctuationDay.com and become familiar with punctuation rules and issues. 2. Organize punctuation activities at your school, library, or office. 3. Share punctuation peeves with founder Jeff Rubin at Jeff@NationalPunctuationDay.com. 4. Send photos of incorrectly punctuated signage to Jeff Rubin at Jeff@NationalPunctuationDay.com 5. Forward this news as a way to spread the importance of proper punctuation. - Entrants must send a recipe and a sample of their cookie, cake, pastry, doughnut, or bread baked in the shape of a punctuation mark to National Punctuation Day, 1517 Buckeye Court, Pinole, CA 94564. - Entrants must send two print photos ‹ one putting the item in an oven before baking and the other taking it out when it¹s done. Make sure we can see the baked goods clearly. - First-, second-, and third-place winners will receive a box of non-edible NPD goodies, and all entrants¹ photos and recipes will be published on the National Punctuation Day website (www.NationalPunctuationDay.com). - All entries must be received by September 30, 2009. This looks like a lot of fun
Suzie Nestico

Teaching Emerging Technologies - resource Wiki - 18 views

  •  
    Melanie Wisount's resource wiki for teaching an Emerging Technologies course. Includes sample parent permission forms for student cell phone use in classroom, etc.
Martin Burrett

LGBQ adolescents at much greater risk of suicide than heterosexual counterparts - 0 views

  •  
    "Adolescents who identify as gay, lesbian, bisexual or questioning are much more likely to consider, plan or attempt suicide than their heterosexual peers, according to research from the University of Pennsylvania, the University of California, San Diego, and San Diego State University published this week in the Journal of the American Medical Association. Specifically, of a nationally representative sample of 15,624 high-school age participants, 40 percent of sexual-minority adolescents seriously considered suicide compared to 15 percent of their heterosexual counterparts. Nearly a quarter attempted suicide compared to approximately 6 percent of those in the sexual majority."
Vicki Davis

Digital Permission Form (1).doc - Google Drive - 8 views

  •  
    This permission form has many different tools including weebly, Google dlocs, voicethread, YouTube, Glogster, Xtranormal, Toondoo, and others. I'm not sure that Audacity has to be included as it is a program on the local machine, however. I do like how the teacher asks for permission "I agree to allow my student's work to be used as  a positive example of published work for demonstration or promotional purposes." Some parents are afraid their child will be made to look bad in online examples, this covers that concern although it puts the onus on the teacher to make sure he/she vets examples that are published.
Vicki Davis

Artsonia sample permission form - 0 views

  •  
    This is an online art museum for student work. This permission form is used by artsonia, a student online art museum. It is a great place to participate and share artwork. Also, I like how artsonia allows parents to moderate the comments left on their child's artwork. This form also asks for parent volunteers. This is a nice way to share your student's best work.
Vicki Davis

English Class Permission form - 3 views

  •  
    This is a fascinating permission form hybrid because it incorporates blogs, wikis, permission to read certain novels and watch certain videos ALL in one permission form. It would be one that high school literature teachers would want to look at using. I like how it discloses how students are identified. I may adapt something like this.
Vicki Davis

Final Project: Political Cartoon Analysis | Web 2.0 Morton - 4 views

  •  
    This teacher's lesson plan fully discloses the tools that are being used, the standards, and required permissions. This is a very detailed example, but one that you may have to use for large projects to get approval in your district.
Vicki Davis

Permission Forms - Google Apps Support - 1 views

  •  
    These are the permission forms for the Beaverton School District and Google Apps with specific disclosures about how usernames and passwords will be set up and downloadable permission forms. 
TCY Online

CAT 2010 Tips - 4 views

  •  
    cat 2010 tips: Students who are appearing in CAT 2010 exam must have follow the Tips of CAT Experts, CAT 2010 tips helps to increase the speed of exam, know how to attempt all the sections.
Eloise Pasteur

Doing Digital Scholarship: Presentation at Digital Humanities 2008 « Digital Scholarship in the Humanities - 0 views

  • My session, which explored the meaning and significance of “digital humanities,” also featured rich, engaging presentations by Edward Vanhoutte on the history of humanities computing and John Walsh on comparing alchemy and digital humanities.
  • I wondered: What is digital scholarship, anyway?  What does it take to produce digital scholarship? What kind of digital resources and tools are available to support it? To what extent do these resources and tools enable us to do research more productively and creatively? What new questions do these tools and resources enable us to ask? What’s challenging about producing digital scholarship? What happens when scholars share research openly through blogs, institutional repositories, & other means?
  • I decided to investigate these questions by remixing my 2002 dissertation as a work of digital scholarship.  Now I’ll acknowledge that my study is not exactly scientific—there is a rather subjective sample of one.  However, I figured, somewhat pragmatically, that the best way for me to understand what digital scholars face was to do the work myself. 
  • ...6 more annotations...
  • The ACLS Commission on Cyberinfrastructure’s report points to five manifestations of digital scholarship: collection building, tools to support collection building, tools to support analysis, using tools and collections to produce “new intellectual products,” and authoring tools. 
  • Tara McPherson, the editor of Vectors, offered her own “Typology of Digital Humanities”: •    The Computing Humanities: focused on building tools, infrastructure, standards and collections, e.g. The Blake Archive •    The Blogging Humanities: networked, peer-to-peer, e.g. crooked timber •    The Multimodal Humanities: “bring together databases, scholarly tools, networked writing, and peer-to-peer commentary while also leveraging the potential of the visual and aural media that so dominate contemporary life,” e.g. Vectors
  • My initial diagram of digital scholarship pictured single-headed arrows linking different approaches to digital scholarship; my revised diagram looks more like spaghetti, with arrows going all over the place.  Theories inform collection building; the process of blogging helps to shape an argument; how a scholar wants to communicate an idea influences what tools are selected and how they are used.
  • I looked at 5 categories: archival resources as well as primary and secondary books and journals.   I found that with the exception of archival materials, over 90% of the materials I cited in my bibliography are in a digital format.  However, only about 83% of primary resources and 37% of the secondary materials are available as full text.  If you want to do use text analysis tools on 19th century American novels or 20th century articles from major humanities journals, you’re in luck, but the other stuff is trickier because of copyright constraints.
  • I found that there were some scanning errors with Google Books, but not as many as I expected. I wished that Google Books provided full text rather than PDF files of its public domain content, as do Open Content Alliance and Making of America (and EAF, if you just download the HTML).  I had to convert Google’s PDF files to Adobe Tagged Text XML and got disappointing results.  The OCR quality for Open Content Alliance was better, but words were not joined across line breaks, reducing accuracy.  With multi-volume works, neither Open Content Alliance nor Google Books provided very good metadata.
  • To make it easier for researchers to discover relevant tools, I teamed up with 5 other librarians to launch the Digital Research Tools, or DiRT, wiki at the end of May.
  •  
    Review of digital humanities scholarship tools
Vicki Davis

Mrs. Eubanks's Website - 0 views

  •  
    Jennifer Eubank's Class Blog. She is in Taylor County (just spent some time there) and is really on fire! She used a google form this week. There are so many great ways to use these tools and NO ONE has the monopoly. (No, not me either!) It is so important to keep looking at what teachers are doing and share what we think works and doesn't. I expect great things out of Jennifer!
  •  
    Teacher blog sample.
Maureen Tumenas

Online Predators and Their Victims - 1 views

  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
    • Vicki Davis
       
      This is an important point to make to parents! It is about RELATIONSHIPS not abduction, usually!
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
    • David Donica
       
      There tends to be a focus on the negative - no matter what percentage of the actual story is being discussed. Our news from "normal" channels follows the old "if it bleeds it leeds" mentality. The potential of the web towards "good" is highly underated - in my humble oppion
  • ...23 more annotations...
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
    • Vicki Davis
       
      Remember that we may start annotating articles and extracting this information together as well.
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
    • Vicki Davis
       
      This tells us what we need to know about courses on digital citizenship and safety -- discuss these issues probably beginning around 11 -- before soliciation happens -- then have focused programs probably starting age 12-13 -- as with everything -- these ages tend to get lower over time -- what will happen w/ the Webkinz generation is anyone's guess.
    • Kristin Hokanson
       
      I see this more and more...as the parent of webkinz kids...in the past..you had the "don't talk to strangers" talk with them. Now the strangers are coming into our homes and at much younger ages.
    • David Donica
       
      I think we need to be aware that not all "unknown people" are wanting to commit crimes, fraud, etc. Talking to someone you don't know might be the introduction to your new best friend. The content of discussion is important. Not knowing someone, I would not give them personal information. Friendship is built over time.
    • Michelle Krill
       
      A nice way I've heard to describe this is that even though kids think they're tech savvy, they are not relationship savvy. It's this age group that doesn't recognize the complexity of relationships.
    • Vicki Davis
       
      @David - I think, however, that we should be very careful about teaching HOW to make friendships -- friend of a friend and building relationships OVER TIME is often how these things happen. Children want the romance and don't realize the "gentle" stranger they've met wants to harm them. This is a tricky one -- one of my dearest friends is Julie Lindsay who I met online. But that conversation was totally OK, as youwould guess. Teaching them about this is tricky. We'll have to think on this one AND look at the research.
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
    • Vicki Davis
       
      Again, this reinforces my thoughts of NOT having computers in the bedroom! Period. Have family computers w/ screens viewable by everyone!
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
    • Vicki Davis
       
      Safe IM practice -- that is a key element of an online safety program.
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
    • Vicki Davis
       
      At risk teenagers are at risk online AND offline!
    • Kristin Hokanson
       
      But I think they are MORE at risk now that they have new outlets...THIS is what teachers / school faculty NEED to understand!
    • Vicki Davis
       
      Yes, Kristin! -- what we saw in Florida this week tells us that -- these students have now found a new way to have life in prison! And it relates to YOutube!
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
    • Vicki Davis
       
      Posting personal information is NOT what puts students at risk -- interactive BEHAVIORS! Do! This is one criticism we've had of online projects. At risk behaviors from AT RISK students cause things to happen!!! Listen up!
    • Kristin Hokanson
       
      and your students are lucky that they have you to guide them. Way too many schools are not involving their students in these activities so they don't have these "appropriate" models
    • Vicki Davis
       
      Exactly, kristin -- MORE SCHOOLS have got to do this. It is a travesty that these kids are being victimized when the schools can do something about it. Completely a travesty. I hope we can all get fired up again about this topic, especially with the good research coming out now!
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
    • Vicki Davis
       
      Safety habits and teaching students how to interact safely. Learning to interact with people you KNOW in safe ways will keep our students safe. It is NOT about pulling the plug.
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
    • Vicki Davis
       
      Unfortunately, teaching boys to beware of men is something we have to do because that seems to be who is preying on the young boys.
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
    • Vicki Davis
       
      Again -- behaviors. Teaching children not to take pictures of themselves and post them w/out parental approval is important, particularly for younger kids.
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
    • Vicki Davis
       
      "If you wouldn't say it face to face, you shouldn't say it anyplace," should be our new saying to our students. (Yes, I coined it but it iwhat I will teach to my children.)
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
    • Vicki Davis
       
      The fact that the victims don't have a great relationship with their parents mean that we must have other outlets for teenagers such as with teachers, counselors, and others who are involved in these discussions!
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • Vicki Davis
       
      This recommendation is VERY important!
    • Vicki Davis
       
      Yes, this is a gross mischaracterization. We are afraid of the unknown scary boogeman who isn't who we think he is, when it is the person who is up front that we must worry about. We want someone to blame instead of realizing it is the behavior of kids.
  • Youths need candid, direct discussions about seduction
    • Diane Hammond
       
      The hard part is finding comfortable places to have these discussions. Where is the best place?
    • Vicki Davis
       
      I believe that the Http://digiteen.wikispaces.com project is the best thing I've got going in my classroom with 9th graders in Qatar & Austria. We're having great conversations -- third person looking at things happening and working through what they think is a good way to do it, I believe. I truly think that everyone working with students should be educated to watch for the "signs" -- and we should also have individual programs.
    • Maureen Tumenas
       
      Is this an accurate statistic?
    • Vicki Davis
       
      We can look back at the reference in this study -- the hyperlink is at the top of the page -- I'm not sure of the sample size for this but it looks like this is what the New Jersey study found.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  • ...3 more comments...
  •  
    Great article!
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
‹ Previous 21 - 40 of 50 Next ›
Showing 20 items per page