Creation of targeted learning activitives

Assignment Help Basic Computer Science
Reference no: EM132612166

Pre-assessments establish a starting point for the teacher. The data collected from the pre-assessment drives the creation of targeted learning activities. Pre-assessment data is then compared to data collected throughout the activity to determine if students are progressing towards mastery of the learning objectives.

Create a pre-assessment activity to collect data on the identified student's performance levels related to the objectives you created with your mentor teacher in your previous field experience.

With the cooperation of your mentor teacher, implement the pre-assessment activity to identify learning needs that can be included in your targeted teaching activity. Following the pre-assessment, meet with your mentor teacher to discuss the results and refine the activity you developed in the previous field experience that could be used to support the identified student's learning of at least one identified objective.

How the results of the pre-assessment affect the revision of the targeted teaching activity.

How formative assessments of the identified student's ongoing learning during an activity might be conducted.

How the pre-assessment and the learning objective are aligned.

How the student's interests were considered when designing the pre-assessment and the targeted teaching activity.

How you plan to implement what you observed in your future teaching practice.

Reference no: EM132612166

Questions Cloud

How useful was the cost information to the internal users : Based costing article, How useful was the cost information to the internal users in the organisation? Discuss with examples from your costing article.
Public administration and business administration : List and describe the major differences between public administration and business administration?
Prepare the cash receipts budget for the second quarter : Prepare the cash receipts budget for the second quarter. Prepare the cash payments budget for the second quarter. Prepare the cash budget for the second quarter
Characteristics of the market structure : Explain what can you do in the short run and what in the long run. Consider factors of production and law of diminishing marginal product to elaborate
Creation of targeted learning activitives : Pre-assessments establish a starting point for the teacher. How you plan to implement what you observed in your future teaching practice.
What is schizogony in malaria : What is schizogony in malaria and please give me an examples. Also, how can microbiome protect we humans against GI infections spread through contaminated food
What is optimal strategy if apply criterion of pessimism : XYZ company , What is the optimal strategy if you apply the criterion of pessimism? Consider the payoffs table is in both profit and cost.
Describe 3 methods used in the environment : Considering ways that we use them (not how they naturally have become part of our microflora),
Explain how death because of corona virus varies by age : Explain how death because of Corona virus varies by age? Give explanation of your answer

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Show that the time efficiency of solving coin-row problem

Apply the dynamic programming algorithm to find all the solutions to the change-making problem for the denominations 1, 3, 5 and the amount n = 9.

  Most common methods of protecting code

This exercise looks at reverse engineering and \cracking" applications. For this exercise you should log into the VM as user: dan, password: dan!dan. In Dan's home directory you will nd two jarles, two ELF executables, the tool JD-GUI and the eval..

  Introduced the impact of the global digital divide

Introduced the impact of the global digital divide. According to the authors, countries that lag behind the rest of the world's ICT capabilities encounter

  What programming language will you use for this app

1. What programming language will you use for this app? Explain why.

  You know you should have a good backup strategy

You know you should have a good backup strategy in place for your key data. Consider the following:

  The neo-luddite criticisms of electronic commerce

Describe one of the neo-Luddite criticisms of electronic commerce and give a real-life example.

  Characteristics about overall population of community

Is your privacy infringed if data mining reveals certain characteristics about the overall population of your community?

  Determines the potential distribution in the axisymmetric

Consider the finite cylindrical conductor held at V = 100 volts and enclosed in a larger grounded cylinder as in Fig. 3.57. Such a deceptively simple

  Determine the net radiation exchange between the surfaces

Calculate the net radiation transfer to surface A2 per unit length of the surface and determine the temperature of the insulated surface A3.

  Find significant features of the maintained configuration

For any open source project, try to find the configuration management system log. Find significant features of the maintained configuration system for the project. (You can find many open source projects at www.sourceforge.net.)

  Evaluate why cost is not one of the five core metrics

Evaluate why cost is not one of the five core metrics of the SLIM model and speculate on the consequences if cost served as one.

  How data travels from source to destination across

Explain how data travels from source to destination across the Internet. What are the different types of ISP connections and how do they differ?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd