Updating search results...

Inside Your Classroom

249 affiliated resources

Search Resources

View
Selected filters:
Color Variation over Time in Rock Pocket Mouse Populations
Read the Fine Print
Educational Use
Rating
0.0 stars

This activity provides an introduction to natural selection and the role of genetic variation by asking students to analyze illustrations of rock pocket mouse populations (dark/light fur) on different color substrates in the Sonoran Desert (light/dark) over time. Based on this evidence, and what they learn about variation and natural selection in the accompanying short film, students use this evidence to explain the change in the rock pocket mouse populations on the lava flow (dark substrate) over time. This is one of several classroom activities, focusing on related topics and varying in complexity, built around the short film. This ten minute film shows adaptive changes in rock pocket mouse populations, demonstrating the process of natural selection and can be accessed at http://www.hhmi.org/biointeractive/making-fittest-natural-selection-and-adaptation. The film is also available as an interactive video with embedded questions, which test students’ understanding as they watch the film.

Subject:
Genetics
Life Science
Material Type:
Lesson Plan
Provider:
National Science Teachers Association (NSTA)
Provider Set:
NGSS@NSTA
Author:
Mary Colvard
Date Added:
10/20/2023
Combating Global Warming Mind Map
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

An attractive concept/mind map that illustrates various human strategies for responding to climate change. It was developed by a psychologist and not by an educator or scientist but can be used to inspire discussion and artistic representations of the human dimension to climate and energy issues.

Subject:
Agriculture and Natural Resources
Applied Science
Environmental Science
Environmental Studies
Physical Science
Material Type:
Activity/Lab
Provider:
CLEAN: Climate Literacy and Energy Awareness Network
Provider Set:
CLEAN: Climate Literacy and Energy Awareness Network
Date Added:
03/09/2023
Common Core Curriculum Grade 6 ELA
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Making Evidence-Based Claims ELA/Literacy Units empower students with a critical reading and writing skill at the heart of the Common Core: making evidence-based claims about complex texts. These units are part of the Developing Core Proficiencies Program. This unit develops students' €abilities to make evidence-based claims through activities based on a close reading of the Commencement Address Steve Jobs delivered at Stanford University on June, 2005.

Find the rest of the EngageNY ELA resources at https://archive.org/details/engageny-ela-archive .

Subject:
Arts and Humanities
Material Type:
Primary Source
Reading
Teaching/Learning Strategy
Unit of Study
Provider:
New York State Education Department
Provider Set:
EngageNY
Date Added:
06/29/2023
Common Sense Education - Let's Give Credit (Plagiarism and Citations)
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

With so much information at our fingertips, students learn what it means to "give credit" when using content they find online. Taking on the role of a detective, students learn why it's important to give credit and the right ways to do it when they use words, images, or ideas that belong to others.

In this introduction to plagiarism and good digital citizenship, second graders are encouraged to give credit to people whose work they reference when doing projects.

Although written for second grade, this lesson could be easily adapted to upper primary and even middle school levels.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
English Language Arts
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Common Sense Media
Date Added:
05/12/2023
Communicating Your Results
Read the Fine Print
Educational Use
Rating
0.0 stars

Students groups create scientific research posters to professionally present the results of their AQ-IQ research projects, which serves as a conclusion to the unit. (This activity is also suitable to be conducted independently from its unit—for students to make posters for any type of project they have completed.) First, students critically examine example posters to gain an understanding of what they contain and how they can be made most effective for viewers. Then they are prompted to analyze and interpret their data, including what statistics and plots to use in their posters. Finally, groups are given a guide that aids them in making their posters by suggesting all the key components one would find in any research paper or presentation. This activity is suitable for presenting final project posters to classmates or to a wider audience in a symposium or expo environment. In addition to the poster-making guide, three worksheets, six example posters, a rubric and a post-unit survey are provided.

Subject:
Career and Technical Education
Mathematics
Physical Science
Statistics and Probability
Material Type:
Activity/Lab
Provider:
TeachEngineering
Date Added:
04/12/2023
Completing the Circle: The Craft of Circular Plot Structure
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Students identify, explore and apply the elements of circle plot structures to their own stories by using graphic organizers, reading and writing stories, and using checklists to assess their work.

Subject:
English Language Arts
Material Type:
Activity/Lab
Lesson Plan
Provider:
ReadWriteThink
Provider Set:
ReadWriteThink
Date Added:
06/21/2023
Computer Science Midterm Paper
Unrestricted Use
CC BY
Rating
0.0 stars

The midterm represents the final week of working in Word. You will be asked to complete documents that demonstrate that you understand basic rules and best practices to ensure your online research is reliable as well as demonstrate skill in the proper use of Word features covered during the first 5 weeks of the course.

Skills & Knowledge Attained:
*Time management – You were asked to think about your midterm topic in week 1 and declare it in a post in week 2 and given several weeks to prepare and do the necessary research. Research document should demonstrate the time provided was used to spread out the work so that it was not done in a rush and/or at the last minute.
*Best practices on how to check a website for accuracy and truth as well as appropriateness as research source.
*Proper application of MLA requirements using Microsoft Word Reference features, such as adding footnotes, citations, and generating a bibliography from correctly added citations as well as placement and content of appropriate header and footer.
*The paper should be an original piece of writing based on properly cited online research, that demonstrates understanding of the topic researched and should explain in your own words, using proper spelling and grammar, what you have learned about your chosen topic.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Homework/Assignment
Module
Date Added:
04/11/2023
Course Review & Approval Tool (CRAT) Template (CC-BY 4.0) (v. 2021.06)
Unrestricted Use
CC BY
Rating
0.0 stars

This Course Review and Approval Tool (CRAT) is the “workbook” that faculty use to design and plan their course with best practice in mind that addresses: curricular alignment with objectives, learning activities, practice assignments and quizzes, and higher-stakes assessments. The 10-tabbed spreadsheet is a digital multitool that centralizes and aggregates the entire course development, review, and approval processes. This tool is used to plan the course prior to its build in the Learning Management System (LMS) as part of an eight-module LMS-based support course that steps faculty through the process and gives them a learner-based perspective on how the tools work together and the features available to them for use in their own courses.

In addition to facilitating communication with multiple stakeholders who may share the document, the process MODELS a self- and peer-reviewed authentic assessment strategy that adapts itself well to any curriculum, whether for training, orientation, or credit-bearing coursework. It supports and models features of an intersection of agile design, backward design, and reflective practice in addition to encouraging authentic and formative assessment strategies. Providing all necessary documents in one easily accessed and bookmarkable document facilitates the process of course development by providing both a model and a touchstone for faculty who are often overwhelmed with the complexity of the process of developing or redeveloping courses regardless of delivery modality. While most of our faculty came to the program because of requirements for online or hybrid learning, most have exclaimed happily that they now apply this process to all of their courses and their learners have shown appreciation for the clarity and consistency that the tool promotes and supports.

The document also includes a dynamic link to future updates for anyone who adopts it and wants to follow its evolution. Feel free to adapt!

Subject:
Applied Science
Arts and Humanities
Business and Communication
Career and Technical Education
Education
English Language Arts
History
Law
Life Science
Mathematics
Material Type:
Activity/Lab
Assessment
Lesson Plan
Teaching/Learning Strategy
Date Added:
04/08/2023
Creative Communication Frames: Discovering Similarities between Writing and Art
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Graphic organizers assist the development of comparative vocabulary and generate discussions of analogy and metaphor in art as students go on a real or virtual tour of an art gallery.

Subject:
Arts and Humanities
Visual Arts
Visual Arts and Design
Material Type:
Activity/Lab
Lesson Plan
Provider:
ReadWriteThink
Provider Set:
ReadWriteThink
Date Added:
03/30/2023
Criminal Law
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Criminal Law uses a two-step process to augment learning, called the applied approach. First, after building a strong foundation from scratch, Criminal Law introduces you to crimes and defenses that have been broken down into separate components. It is so much easier to memorize and comprehend the subject matter when it is simplified this way. However, becoming proficient in the law takes more than just memorization. You must be trained to take the laws you have studied and apply them to various fact patterns. Most students are expected to do this automatically, but application must be seen, experienced, and practiced before it comes naturally. Thus the second step of the applied approach is reviewing examples of the application of law to facts after dissecting and analyzing each legal concept. Some of the examples come from cases, and some are purely fictional. All the examples are memorable, even quirky, so they will stick in your mind and be available when you need them the most (like during an exam). After a few chapters, you will notice that you no longer obsess over an explanation that doesn’t completely make sense the first time you read it—you will just skip to the example. The examples clarify the principles for you, lightening the workload significantly.

Subject:
Criminal Justice
General Law
Hospitality, Tourism and Social Service Careers
Law
Material Type:
Textbook
Author:
Anonyous
Date Added:
01/01/2012
Cyberbullying And Impacts of Cyberbullying
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

CYBER BULLYING

Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyber bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyber bullying crosses the line into unlawful or criminal behavior.

The most common places where cyber bullying occurs are:

Social Media, such as Facebook, Instagram, Snapchat, and Twitter
SMS (Short Message Service) also known as Text Message sent through devices
Instant Message (via devices, email provider services, apps, and social media messaging features)
Email.

WHERE IS CYBERBULLYING OCCURING ?

Manuals to educate the public, teachers and parents summarize, "Cyberbullying is being cruel to others by sending or posting harmful material using a cell phone or the internet." Research, legislation and education in the field are ongoing. Research has identified basic definitions and guidelines to help recognize and cope with what is regarded as abuse of electronic communications.

Cyberbullying involves repeated behavior with intent to harm.
Cyberbullying is perpetrated through harassment, cyberstalking, denigration (sending or posting cruel rumors and falsehoods to damage reputation and friendships), impersonation, and exclusion (intentionally and cruelly excluding someone from an online group)
Cyberbullying can be as simple as continuing to send emails or text messages harassing someone who has said they want no further contact with the sender. It may also include public actions such as repeated threats, sexual remarks, pejorative labels (i.e., hate speech) or defamatory false accusations, ganging up on a victim by making the person the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and posting false statements as fact aimed a discrediting or humiliating a targeted person. Cyberbullying could be limited to posting rumors about a person on the internet with the intention of bringing about hatred in others' minds or convincing others to dislike or participate in online denigration of a target. It may go to the extent of personally identifying victims of crime and publishing materials severely defaming or humiliating them.

Cyberbullies may disclose victims' personal data (e.g. real name, home address, or workplace/schools) at websites or forums or may use impersonation, creating fake accounts, comments or sites posing as their target for the purpose of publishing material in their name that defames, discredits or ridicules them. This can leave the cyberbully anonymous which can make it difficult for the offender to be caught or punished for their behavior, although not all cyberbullies maintain their anonymity. Text or instant messages and emails between friends can also constitute cyber bullying if what is said or displayed is hurtful to the participants.
The recent use of mobile applications and rise of smartphones have yielded to a more accessible form of . It is expected that cyber bullying via these platforms will be associated with bullying via mobile phones to a greater extent than exclusively through other more stationary internet platforms. In addition, the combination of cameras and Internet access and the instant availability of these modern smartphone technologies yield themselves to specific types of cyber bullying not found in other platforms. It is likely that those cyber bullied via mobile devices will experience a wider range of cyber bullying types than those exclusively bullied elsewhere.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Homework/Assignment
Author:
Mounika
Date Added:
04/11/2023
Dancing Minds and Shouting Smiles: Teaching Personification Through Poetry
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Students learn about personification by reading and discussing poems and then brainstorm nouns and verbs to create personification in their own poems.

Subject:
English Language Arts
Material Type:
Activity/Lab
Lesson Plan
Provider:
ReadWriteThink
Provider Set:
ReadWriteThink
Date Added:
04/06/2023
Data Wrangling and Processing for Genomics
Unrestricted Use
CC BY
Rating
0.0 stars

Data Carpentry lesson to learn how to use command-line tools to perform quality control, align reads to a reference genome, and identify and visualize between-sample variation. A lot of genomics analysis is done using command-line tools for three reasons: 1) you will often be working with a large number of files, and working through the command-line rather than through a graphical user interface (GUI) allows you to automate repetitive tasks, 2) you will often need more compute power than is available on your personal computer, and connecting to and interacting with remote computers requires a command-line interface, and 3) you will often need to customize your analyses, and command-line tools often enable more customization than the corresponding GUI tools (if in fact a GUI tool even exists). In a previous lesson, you learned how to use the bash shell to interact with your computer through a command line interface. In this lesson, you will be applying this new knowledge to carry out a common genomics workflow - identifying variants among sequencing samples taken from multiple individuals within a population. We will be starting with a set of sequenced reads (.fastq files), performing some quality control steps, aligning those reads to a reference genome, and ending by identifying and visualizing variations among these samples. As you progress through this lesson, keep in mind that, even if you aren’t going to be doing this same workflow in your research, you will be learning some very important lessons about using command-line bioinformatic tools. What you learn here will enable you to use a variety of bioinformatic tools with confidence and greatly enhance your research efficiency and productivity.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Genetics
Information Science
Life Science
Mathematics
Measurement and Data
Material Type:
Module
Provider:
The Carpentries
Date Added:
04/11/2023
The Day Jimmy's Boa Taught Cause and Effect
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

This lesson introduces the concept of cause and effect with Trinka Hakes Noble's books about Jimmy and his boa constrictor. Each lesson begins with the teacher reading a new story about Jimmy and his boa and the chaos they bring to each place they visit. Class discussions about each event and its cause are followed by tasks for the students to help illustrate understanding of the concept. Students create cause-and-effect pictures, puzzles, and flow charts as they explore the genre. As a culminating activity, students write their own book with causes and effects, which are assessed with a rubric.

Subject:
English Language Arts
Material Type:
Activity/Lab
Lesson Plan
Provider:
ReadWriteThink
Provider Set:
ReadWriteThink
Author:
Vanessa Udry
Date Added:
03/30/2023
The Declaration of Independence: "An Expression of the American Mind"
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson plan looks at the major ideas in the Declaration of Independence, their origins, the Americans' key grievances against the King and Parliament, their assertion of sovereignty, and the Declaration's process of revision.

Subject:
History
Material Type:
Lesson Plan
Provider:
National Endowment for the Humanities
Provider Set:
EDSITEment!
Date Added:
04/05/2023
Design Step 4: Engineering Analysis
Read the Fine Print
Educational Use
Rating
0.0 stars

Engineering analysis distinguishes true engineering design from "tinkering." In this activity, students are guided through an example engineering analysis scenario for a scooter. Then they perform a similar analysis on the design solutions they brainstormed in the previous activity in this unit. At activity conclusion, students should be able to defend one most-promising possible solution to their design challenge. (Note: Conduct this activity in the context of a design project that students are working on; this activity is Step 4 in a series of six that guide students through the engineering design loop.)

Subject:
Applied Science
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Date Added:
09/18/2014
Desmos Classroom Activities
Read the Fine Print
Educational Use
Rating
0.0 stars

At Desmos, our mission is to help every student learn math and love learning math. With that in mind, we’ve assembled a collection of unique and engaging digital activities, which are free for you and your students. Access to most activities requires a free account.

Permitted use: a) as an end user, for your personal, non-commercial use or (b) as a teacher, for academic use by you and your students in individual classes

Subject:
Mathematics
Material Type:
Activity/Lab
Homework/Assignment
Interactive
Lesson
Lesson Plan
Date Added:
04/08/2023