This article provides an overview of current research about attention deficit hyperactivity …
This article provides an overview of current research about attention deficit hyperactivity disorder as well as strategies to help students with ADHD with reading and writing.
This writer’s reference condenses and covers everything a beginning writing student needs …
This writer’s reference condenses and covers everything a beginning writing student needs to successfully compose college-level work, including the basics of composition, grammar, and research. It is broken down into easy-to-tackle sections, while not overloading students with more information than they need. Great for any beginning writing students or as reference for advanced students!
This resource is a google slide created to help students begin research …
This resource is a google slide created to help students begin research for an animal report. This will help them use the explora piece to Utah's Online Library
Students in Grades 4-8 activate prior knowledge and research information about a …
Students in Grades 4-8 activate prior knowledge and research information about a historic event through fiction and nonfiction literature and exploration of relevant websites.
The Big6 is a six-stage model to help anyone solve problems or …
The Big6 is a six-stage model to help anyone solve problems or make decisions by using information. Students can use this model to guide them through the research process. This resource is a packet to guide students through using the Big6 to research, write, and present a speech.
The Ute Mountain Ute people live in southeastern Utah and southwestern Colorado, …
The Ute Mountain Ute people live in southeastern Utah and southwestern Colorado, near the base of Wisuv Káruv, or Sleeping Ute Mountain. The Ute Mountain Ute tribal headquarters are located at Towaoc, Colorado. The Ute Mountain Ute Sun Dance is held there every year on Sleeping Ute Mountain. This Ute Mountain Ute booklet is part of the Native American Indian Literacy Project storybook series for the six main Utah Tribal Nations. The project was led by Shirlee A. Silversmith, American Indian education specialist for the Utah State Office of Education. There are five stories per Tribe, with a total of 30 booklets, plus an ABC book. The set of Indian Tribal stories may be utilized by elementary classroom teachers to (1) develop an understanding and appreciation of Native American culture and societal contributions (2) provide a genre of text for the application of reading strategies, and (3) facilitate the mastery of various Utah Core Content Curriculum objectives. The Native American Indian Literacy Project was made possible by funds from the Utah State Office of Education (USOE). It is a joint effort of the USOE and San Juan School District Media Center. The original set has 30 booklets, measuring 5.5” x 8.5” each, and illustrated by tribal members. The booklets were formatted to be printed and assembled. This version of the book has been updated to accommodate using a projector or smart board with pages appearing in order.
This resource is a Language Arts student activity that utilizes Utah's Online Library …
This resource is a Language Arts student activity that utilizes Utah's Online Library resources - specifically, the three Gale databases (Kids InfoBits Grades K-6, Research in Context Grades 6-8, and Reference Collection Grades 9-12), the Library of Congress (located in the section called General Resources), and eMedia - to help students research and read about Booker T. Washington.
To kick off the final unit of this course, students will do …
To kick off the final unit of this course, students will do some research into interesting innovations in computing. This lesson will expose students to wider variety of computing form factors (what a computer looks like) and fields that are impacted by computing. Later in this unit students will look back on the devices they encountered in this lesson as they develop their own physical computing devices.
The core idea of this lesson occurs in the unplugged activity that …
The core idea of this lesson occurs in the unplugged activity that kicks off the lesson, in which students try to keep track of IP addresses that had been randomly assigned to each student in the class, while at the same time the teacher occasionally changes students' addresses. This leads to identifying the need for an authoritative system for name-to-address mappings, known as the Domain Name System or [v DNS].
Students then briefly experiment with a DNS protocol in the Internet Simulator. The activity is similar, in that students will have to grapple with IP addresses changing in real time and use the built in DNS protocol to resolve the issues.
The lesson ends with students doing some rapid research about DNS and some of its vulnerabilities, particularly what are known as Denial of Service Attacks.
This lesson is a capstone to the Internet unit. Students will research …
This lesson is a capstone to the Internet unit. Students will research and prepare a flash talk about an issue facing society: either **[v Net Neutrality]** or **Internet Censorship**. Developing an informed opinion about these issues hinges on an understanding of how the Internet functions as a system. Students will prepare and deliver a flash talk that should combine forming an opinion about the issue and an exhibition of their knowledge of the internet.
This lesson is good *practice* for certain elements of the AP Explore Performance Task.1 The primary things practiced here are: doing a bit of research about impacts of computing (though here it’s specifically about the Internet), explaining some technical details related to ideas in computer science, and connecting these ideas to global and social impacts. Students will practice synthesizing information, and presenting their learning in a flash talk.
1**Note:** This is NOT the official AP® Performance Task that will be submitted as part of the Advanced Placement exam; it is a practice activity intended to prepare students for some portions of their individual performance at a later time.
This lesson sets the the stage for why we want to learn …
This lesson sets the the stage for why we want to learn about how the Internet works. First students share what they currently know about how the Internet works through a KWL activity.
Then students watch a short video the introduces Vint Cerf and the Internet at high level. Students then skim a memo written to the Internet Engineering Task Force (IETF) by Vint Cerf in 2002 entitled “The Internet is for Everyone,” which calls out a series of threats to the prospect that the Internet should be an open, easily and cheaply accessible resource for everyone on the planet.
Finally we foreshadow the practice PT at the end of the unit. Many of the questions and challenges raised by Vint Cerf still apply today, and students will be asked to research and present on one for the Practice PT.
In this lesson students are introduced to the standard units for measuring …
In this lesson students are introduced to the standard units for measuring the sizes of digital files, from a single byte, all the way up to terabytes and beyond. Students begin the lesson by comparing the size of a plain text file containing “hello” to a Word document with the same contents. Students are introduced to the units kilobyte, megabyte, gigabyte, and terabyte, and research the sizes of files they make use of every day, using the appropriate terminology. This lesson foreshadows an investigation of compression as a means for combatting the rapid growth of digital data.
Students learn the difference between lossy and lossless compression by experimenting with …
Students learn the difference between lossy and lossless compression by experimenting with a simple lossy compression widget for compressing text. Students then research three real-world compressed file formats to fill in a research guide. Throughout the process they review the skills and strategies used to research computer science topics online, in particular to cope with situations when they don't have the background to fully understand everything they're reading (a common situation even for experienced CS students).
In this lesson students will conduct a small amount of research to …
In this lesson students will conduct a small amount of research to explore a file format either currently in use or from history. Students will conduct research in order to complete a "one-pager" that summarizes their findings. They will also design a computational artifact (video, audio, graphic, etc.) that succinctly summarizes the advantages of their format over other similar ones.
This lesson is intended to be a quick, short version of a performance task in which students rapidly do some research and respond in writing. It might take 2 class days but should not take more. The goal is to develop skills that students will use when they complete the actual Explore PT later in the year.
Students learn about various types of cybercrimes and the cybersecurity measures that …
Students learn about various types of cybercrimes and the cybersecurity measures that can help prevent them. Then students perform a Rapid Research project investigating a particular cybercrime event with a particular focus on the data that was lost or stolen and the concerns that arise as a result. The Rapid Research activity features vocabulary, concepts, and skills that should help prepare them for the AP Explore PT, and also serves as a capstone for the sequence of lessons on encryption and security.
This lesson asks students to consider carefully the assumptions they make when …
This lesson asks students to consider carefully the assumptions they make when interpreting data and data visualizations. The class begins by examining how the Google Flu Trends project tried and failed to use search trends to predict flu outbreaks. They will then read a report on the Digital Divide which highlights how access to technology differs widely by personal characteristics like race and income. This report challenges a widespread assumption that data collected online is representative of the population at large. To practice identifying assumptions in data analysis, students are provided a series of scenarios in which data-driven decisions are made based on flawed assumptions. They will need to identify the assumptions being made (most notably those related to the digital divide) and explain why these assumptions lead to incorrect conclusions.
In this lesson students will conduct a small amount of research to …
In this lesson students will conduct a small amount of research to explore a computing innovation that leverages the use of data. Students will research a topic of personal interest and respond to questions about about how that innovation produces, uses, or consumes data. The lesson is intended to give students practice with doing research of this nature and provides a small amount of scaffolding to help students figure out what to look for.
This lesson is intended to be a quick, short version of a performance task in which students rapidly do some research and respond in writing. It might take 2 class days but should not take more. The goal is to generate ideas for exploration later when students complete the actual Explore PT later in the year.
By conducting interviews, sharing and assessing data, and writing papers based on …
By conducting interviews, sharing and assessing data, and writing papers based on their authentic research, students reach their own conclusions on the meaning of the American Dream.
This article profiles Linda Deegan, scientist with the Arctic Long-Term Ecological Research …
This article profiles Linda Deegan, scientist with the Arctic Long-Term Ecological Research site in the Kuparuk River region of Alaska, as she counts and tags Arctic grayling as they migrate from streams to lakes in the fall.
This video segment adapted from A Science Odyssey tells the story of …
This video segment adapted from A Science Odyssey tells the story of researcher Sir Alexander Fleming, whose luck and scientific reasoning led to the groundbreaking discovery of penicillin.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.