Reference no: EM131097629
Details:
The use of educational technology should be seen as a window into the educational content. It is a means to an end.
After reviewing the Arizona Technology Integration Matrix, do the following:
In each cell of the matrix there are two videos. Find five videos in your target grade level and watch the videos. Be sure to scroll down and read the lesson plans that accompany them.
Part 1: Video Summaries
List the five video overviews you watched and write a summary of each lesson plan implementation.
Part 2: Lesson Plan Connections
Choose three of the lessons that you would most want to implement in your classroom. Summarize each of these videos. Be sure to include the following:
- Identify the title of the column, row, and lesson (i.e., Entry, Active, K-4 lesson)
- Identify why the lesson is so appealing to you, and what possible benefits would come from using this lesson in future classrooms.
Write a 200-250 word consideration of the ISTE standards for students and teachers for each video:
- How is technology being used to access the learning?
- What is the role of the teacher? What is the role of the student?
- What connections can be made to the ISTE for Students or Teachers at this grade level?
Prepare this assignment according to the GCU guidelines found in the GCU Style Guide, located in the Student Success Center.
Part 3: Reflection
Write a 200-250 word reflection with your overall reaction to how technology can be used in the classroom today.
Think about their revenue function
: After accepting your recommendation not to pursue the 2024 Olympics (hint, hint), Mayor Strange comes to you with another idea. The Jacksonville Jaguars are considering moving to Montgomery. They have said they will do so if the taxpayers of Montgome..
|
Define precautions database administrator take for database
: Discuss a total of ten (10) functions, responsibilities, and/or skill requirements of a database administrator. Describe precautions a database administrator may take for database security and protection of patient information. (A 1½ -page respons..
|
Detailed report on software engineering
: Write a detailed report on software engineering clearly stating its advantages and disadvantages. Your research paper should be more than 500 words in APA format
|
Defining what lockout-differs from other labor disputes
: Describe the 2011 NFL lockout . (including defining what a “lockout” is, and how that differs from other labor disputes). Define who was involved, and what their economic functions were (Hint: what kind of legal entity is the NFLPA? What kind of econ..
|
Arizona technology integration matrix
: The use of educational technology should be seen as a window into the educational content. It is a means to an end. After reviewing the Arizona Technology Integration Matrix, do the following:
|
Describe moral hazard problem
: Describe a moral hazard problem your company is facing. What is the source of the asymmetric information? Who is the less informed party? Are there any wealth-creating transactions not consummated as a result of the asymmetric information? If so, cou..
|
Discussing the film as an interpretation of the play
: Directions: For each question, write a one-page, single-spaced response, using quoted passages from the play (and, as needed, descriptions of parts of the film) to illustrate your answer. Each question is worth 50 points. You can also answer th..
|
Approach to gathering and structuring requirements
: With offshore and ERP in mind, outline your approach to gathering and structuring requirements for this new system, including which roles you plan to engage and how you plan to collect, validate, and represent the requirements you elicit.
|
What transactions are not being consummated
: Describe an adverse selection problem your company is facing. What is the source of the asymmetric information? Who is the less informed party? What transactions are not being consummated as a result of the information?
|