How this will support other evaluation instrument areas

Assignment Help Computer Engineering
Reference no: EM133673177

Assignment: Post-observation Conference with Field Supervisor

TCAP Components. Analysis of Student Work

Post Observation Conference- not later than 3-4 days after the Formal Lesson Observation.

I. Submit the same Students Achievement Chart from pre-observation but now with post-assessments results

II. Submit lesson plan with revisions based on what you and your students did during the lesson that you taught. (Add questions you asked, the classroom management strategies you applied, timing for each section, feedback you provided, and etc.)

III. Submit Students' Work (at least three examples from three different levels) with meaningful feedback

IV. Review the student work:

1. what revision or what scaffolding would you provide to ensure the work is meeting the standards

V. Clearly outline how this revision provides students with opportunities to push their thinking

1. Complete and submit

a. Student Work Analysis_Math.docx
b. Student Work Analysis_ELA.docx

VI. Submit self-evaluation with evedence from low-inference notes (JUST DOMAIN 3).

VII. Contact your Field Supervisor to schedule your Post-Observation Conference not later than 3-4 days after the Formal Lesson Observation

During this meeting you will discuss the following:

I. Identify your self-selected glow/reinforcement area (using the lens of the HLP/Danielson domain)

II. Justify the glow/reinforcement selection with evidence

III. Identify your self-selected grow/refinement area

IV. Justify the grow/refinement selection with evidence

V. Name actionable next steps to improve the grow/refinement and:

1. How this will positively impact student achievement

2. How this will support other evaluation instrument areas

3. Identify actionable next-steps for sustaining performance

4. Identify actionable next-steps for improving performance.

Reference no: EM133673177

Questions Cloud

Child swallows product by mistake : What should you do if a child swallows a product by mistake? What does the U.S. law on labeling mean on hazardous materials regarding art supplies?
Analyze a dark side communication or conflict challenge : Analyze a dark side communication or conflict challenge people experience in the development of relationships, using interpersonal communication theories.
What would be said if giving the presentation in person : What would be said if giving the presentation in person. Expand upon the information included in the slide and do not simply restate it.
Role of doctoral dispositions-doctoral expectations : Based on what one knows now after studying writing skills, the Role of a researcher, doctoral dispositions, doctoral expectations, literature reviews.
How this will support other evaluation instrument areas : How this will support other evaluation instrument areas. Identify actionable next-steps for sustaining performance.
What constraints rising out of procrastination will you face : What constraints rising out of procrastination will you face? How will your audience resist your attempt at persuasion?
Should abortion be legal : How did I do? Am I on the right track? Did I miss anything? What else should I add?"
Explain the assumptions and risks of the project : Explain the quality issues within the project. Explain the assumptions and risks of the project. Provide definitions of any important terminology.
Discuss basic network components and how they are used today : Discuss common forms of attack on Microsoft systems using the Internet, and/or your job. Discuss three basic network components and how they are used today.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create circuits that realize specified digital functions

DIGITAL SYSTEMS DESIGN AND VLSI TECHNOLOGY-NATIONAL COUNCIL FOR HIGHER EDUCATION-Explain the core concepts in microelectronics and VLSI technology.

  Write the xhtml to configure a password form control

Write the XHTML to configure a password form control with the name of pword. Write the XHTML to configure a form tag to invoke server-side processing.

  Compared and contrasted the mis in place in two distinctly

compared and contrasted the mis in place in two distinctly different organizations. compared each organizations use of

  What makes social engineering so successful

What makes social engineering so successful? Demographically speaking, list in order the people most susceptible to least susceptible affected by social

  What are differences between primary and secondary storage

What are the differences between primary and secondary storage? How does a workstation differ from a PC?

  How an ips/ids can protect user information

Discuss how an IPS/IDS can protect user information on a Windows system or any computing device that is connect to a network. What other security controls can.

  Discuss about the security in remote access

Is it secure to connect and access data of any organization using remote access? How vulnerable does it leave the organization to cyber-attacks?

  What drawbacks might occur from using the waterfall model

What differences between IT and non-IT projects make each more appropriate for a different project management model? Are there exceptions?

  Discuss how net neutrality will affect data networks

Base on your article review and the assigned reading, discuss how net neutrality will affect data networks and the availability of information to businesses.

  What are computer information transactions

Computer information transactions involve licenses, not sales.Small companies play a more important role in the computer information industry than many other industries.

  Create the method contract for getcoursebycourseid method

Create the method contract for the GetCourseByCourseID() method of the CourseList class. Explain your work and the decisions you made to arrive at your proposed solution.

  What is an advantage of using ip spoofing along with the tcp

What is an advantage of using IP spoofing along with the TCP SYN flood attack? What are some ways in which this type of attack could be detected?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd