This website serves as a clearinghouse of information concerning the ways adolescents …
This website serves as a clearinghouse of information concerning the ways adolescents use and misuse technology. It is intended to be a resource for parents, educators, mental health professionals, law enforcement officers, counselors, and others who work with youth (as well as for youth themselves!). Here you will find facts, figures, and detailed stories from those who have been directly impacted by online aggression. In addition, the site includes numerous resources to help you prevent and respond to cyberbullying incidents. All of the information on this site is informed by over fifteen years of research.
This is a collaborative task that can be modified to be accomplished …
This is a collaborative task that can be modified to be accomplished by students in both the face to face and the virtual environment. The task involves researching chronic medical conditions and evaluating data provided in a case study in order to make conclusions about potential disease diagnosis, prognosis, and treatment.
This lesson reimagines an existing instructional resource, "The Grapes of Wrath by …
This lesson reimagines an existing instructional resource, "The Grapes of Wrath by John Steinbeck" created by Franky Abbott, Digital Public Library of America.
.
In this remix, "The Grapes of Wrath" and the related primary source documents are exchanged for "Farewell to Manzanar" and related primary sources accessed through secondary open-source databases.
Discussion questions ask students to consider the memoir in light of its historical context and students gain experience reading and evaluating visual sources including political cartoons and propaganda posters to understand how elements of rhetorical can shape and/or reflect cultural values.
In the engage section of the 5Elesson, students are introduced to the …
In the engage section of the 5Elesson, students are introduced to the role of fossils as evidence of evolution and evolutionary relationships by watching a videos about the discovery of Lucy and Ardi and consider what type of information that they can gain from skull fossils. Students will then explore features of skulls from human ancestors and the modern day Homo sapien. After measuring skull to cheekbone ratios, students will create a graph to compare various species. Several interactives are provided to explain fossils, skeletal evidence for human evolution, and phylogenetic trees. Then, students will apply their skills of analyzing data about anatomical similarities and genetic information to depict evolutionary relationships between organisms using cladograms. To evaluate student understanding, students will complete an evolutionary relationships CER.
If you have found yourself searching for, adapting or creating materials for …
If you have found yourself searching for, adapting or creating materials for your heritage classes because of a lack of readily available commercial resources, this site is for you!
offers educators Park Service resources that help teach about our nation's cultural …
offers educators Park Service resources that help teach about our nation's cultural heritage, and which look at how the NPS is protecting and preserving them. Subjects include archaeology, historic buildings and structures, mapping, military history, and national historic landmarks. The resources may be in the form of learning programs, case studies, lesson plans, teachers' handbooks, and more.
As technology becomes ever integrated into our food system and everyday life, …
As technology becomes ever integrated into our food system and everyday life, our food industry and supply become ever more vulnerable to attack. Cyber attacks continue to threaten large and small companies, government agencies, individuals, and food and agriculture. This module, ‘Securing the Food Industry,’ aims to introduce the idea of cyberbiosecurity through a lecture format along with three case studies allowing students to interact and think through the concepts and materials. This module was built for implementation into college level courses with connection or interest in the food industry, food science, and agriculture as well as and technology courses focused on real world applications. The lecture starts by introducing the amount of technology in food science and the food industry then transitions into concerns about security. After discussing multiple subtypes of security already integrated into the food industry, cyberbiosecurity is introduced. The term and definition are discussed before the categories of cyber attacks are introduced. The lecture relates these ideas back to the food industry before sharing a few real-life examples of detrimental cyber-attacks. The lecture concludes are explain the impact a cyber attack can cause, who is responsible for preventing and recovering from these attacks, as well as suggested practices to reduce vulnerabilities. Three theoretical but realistic case studies with discussion questions follow the lecture. These studies were written to act as small group discussion starters but could be used for whole class discussion, individual writing assignments, or other applications. A list of additional resources can be found with the course material. This list provides a small sampling of additional documents which discuss cyberbiosecurity. The resources listed at the end of the lecture are not included in the additional resources document but also provide helpful information in the exploration and understanding of cyberbiosecurity. Food science resources are also included in this document to provide additional background around the food industry portion of this course material.
Securing the Food Industry is an open educational resource (OER). Instructors reviewing, adopting, or adapting the module should indicate their interest at https://forms.gle/orFRGhYs8owBP7gD6.
This lesson encourages students to study a variety of documents to understand …
This lesson encourages students to study a variety of documents to understand the impact of a particular piece of legislation and relates to the powers granted to Congress in Article I, Section 8 , of the Constitution, related to making laws. It correlates to the National History Standards and the National Standards for Civics and Social Sciences. It also has cross-curricular connections with with history, government, global studies, and music.
Students will participate in a 5E lesson. To ENGAGE, students will connect …
Students will participate in a 5E lesson. To ENGAGE, students will connect their understanding of the characteristics of life to the fundamental molecule of life: DNA. To EXPLORE, students will extract DNA from fruit in a hands on (or video of a) lab, and then, students will act as Watson and Crick and use clues to discover the structure of DNA. In the EXPLAIN section, students will use slides to fill out guided notes on the structure of DNA and RNA. To ELABORATE on their understanding of DNA, students can participate in the CRISPR-Cas9 interactive and the Regulation of the Lactase Gene click and learn. Formative evaluations of students's ability to model DNA include (1) using an online interactive, (2) using their bodies as a class, and (3) using a cut and paste model. Finally, the summative EVALUATE is a DNA Model FlipGrid in which students use various materials to construct and explain the structure of DNA.
Bullying reports, investigation documentation and evidence, written findings, and records of any …
Bullying reports, investigation documentation and evidence, written findings, and records of any responsive actions should be maintained in accordance with applicable law, local school board policy and procedures, and the school district’s record retention manual. A school district should consult with its legal counsel regarding recordkeeping requirements and practices. All reports should be documented on the school form(s) and appropriate records kept in a consistent and confidential location.
This brochure is offered as a tool for science, technology, engineering and …
This brochure is offered as a tool for science, technology, engineering and mathematics educators who are working with students with disabilities. Some activity descriptions are supplemented with case study examples addressing a particular disability.
eComma is a social reading tool teachers can install in their Learning …
eComma is a social reading tool teachers can install in their Learning Management System (LMS). It allows students and teachers to read and annotate texts together, pooling their knowledge and perspectives for a deeper understanding and analysis of what they are reading. The eComma website linked here explains how to explain the tool in an LMS and has a user guide and case studies with ideas for how to use it in a class.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.