Learning expeditions are the signature EL Education curricular structure. They make standards …
Learning expeditions are the signature EL Education curricular structure. They make standards come alive for students. These long-term, in-depth studies offer real-world connections that inspire students toward higher levels of academic achievement. Learning expeditions involve students in original research, critical thinking, and problem solving, and they build character along with academic skills. All learning expeditions explicitly focus on building literacy skills particularly in reading and writing nonfiction text and writing from evidence.
To kick off the final unit of this course, students will do …
To kick off the final unit of this course, students will do some research into interesting innovations in computing. This lesson will expose students to wider variety of computing form factors (what a computer looks like) and fields that are impacted by computing. Later in this unit students will look back on the devices they encountered in this lesson as they develop their own physical computing devices.
The core idea of this lesson occurs in the unplugged activity that …
The core idea of this lesson occurs in the unplugged activity that kicks off the lesson, in which students try to keep track of IP addresses that had been randomly assigned to each student in the class, while at the same time the teacher occasionally changes students' addresses. This leads to identifying the need for an authoritative system for name-to-address mappings, known as the Domain Name System or [v DNS].
Students then briefly experiment with a DNS protocol in the Internet Simulator. The activity is similar, in that students will have to grapple with IP addresses changing in real time and use the built in DNS protocol to resolve the issues.
The lesson ends with students doing some rapid research about DNS and some of its vulnerabilities, particularly what are known as Denial of Service Attacks.
This lesson is a capstone to the Internet unit. Students will research …
This lesson is a capstone to the Internet unit. Students will research and prepare a flash talk about an issue facing society: either **[v Net Neutrality]** or **Internet Censorship**. Developing an informed opinion about these issues hinges on an understanding of how the Internet functions as a system. Students will prepare and deliver a flash talk that should combine forming an opinion about the issue and an exhibition of their knowledge of the internet.
This lesson is good *practice* for certain elements of the AP Explore Performance Task.1 The primary things practiced here are: doing a bit of research about impacts of computing (though here it’s specifically about the Internet), explaining some technical details related to ideas in computer science, and connecting these ideas to global and social impacts. Students will practice synthesizing information, and presenting their learning in a flash talk.
1**Note:** This is NOT the official AP® Performance Task that will be submitted as part of the Advanced Placement exam; it is a practice activity intended to prepare students for some portions of their individual performance at a later time.
This lesson sets the the stage for why we want to learn …
This lesson sets the the stage for why we want to learn about how the Internet works. First students share what they currently know about how the Internet works through a KWL activity.
Then students watch a short video the introduces Vint Cerf and the Internet at high level. Students then skim a memo written to the Internet Engineering Task Force (IETF) by Vint Cerf in 2002 entitled “The Internet is for Everyone,” which calls out a series of threats to the prospect that the Internet should be an open, easily and cheaply accessible resource for everyone on the planet.
Finally we foreshadow the practice PT at the end of the unit. Many of the questions and challenges raised by Vint Cerf still apply today, and students will be asked to research and present on one for the Practice PT.
In this lesson students are introduced to the standard units for measuring …
In this lesson students are introduced to the standard units for measuring the sizes of digital files, from a single byte, all the way up to terabytes and beyond. Students begin the lesson by comparing the size of a plain text file containing “hello” to a Word document with the same contents. Students are introduced to the units kilobyte, megabyte, gigabyte, and terabyte, and research the sizes of files they make use of every day, using the appropriate terminology. This lesson foreshadows an investigation of compression as a means for combatting the rapid growth of digital data.
Students learn the difference between lossy and lossless compression by experimenting with …
Students learn the difference between lossy and lossless compression by experimenting with a simple lossy compression widget for compressing text. Students then research three real-world compressed file formats to fill in a research guide. Throughout the process they review the skills and strategies used to research computer science topics online, in particular to cope with situations when they don't have the background to fully understand everything they're reading (a common situation even for experienced CS students).
In this lesson students will conduct a small amount of research to …
In this lesson students will conduct a small amount of research to explore a file format either currently in use or from history. Students will conduct research in order to complete a "one-pager" that summarizes their findings. They will also design a computational artifact (video, audio, graphic, etc.) that succinctly summarizes the advantages of their format over other similar ones.
This lesson is intended to be a quick, short version of a performance task in which students rapidly do some research and respond in writing. It might take 2 class days but should not take more. The goal is to develop skills that students will use when they complete the actual Explore PT later in the year.
Students learn about various types of cybercrimes and the cybersecurity measures that …
Students learn about various types of cybercrimes and the cybersecurity measures that can help prevent them. Then students perform a Rapid Research project investigating a particular cybercrime event with a particular focus on the data that was lost or stolen and the concerns that arise as a result. The Rapid Research activity features vocabulary, concepts, and skills that should help prepare them for the AP Explore PT, and also serves as a capstone for the sequence of lessons on encryption and security.
This lesson asks students to consider carefully the assumptions they make when …
This lesson asks students to consider carefully the assumptions they make when interpreting data and data visualizations. The class begins by examining how the Google Flu Trends project tried and failed to use search trends to predict flu outbreaks. They will then read a report on the Digital Divide which highlights how access to technology differs widely by personal characteristics like race and income. This report challenges a widespread assumption that data collected online is representative of the population at large. To practice identifying assumptions in data analysis, students are provided a series of scenarios in which data-driven decisions are made based on flawed assumptions. They will need to identify the assumptions being made (most notably those related to the digital divide) and explain why these assumptions lead to incorrect conclusions.
In this lesson students will conduct a small amount of research to …
In this lesson students will conduct a small amount of research to explore a computing innovation that leverages the use of data. Students will research a topic of personal interest and respond to questions about about how that innovation produces, uses, or consumes data. The lesson is intended to give students practice with doing research of this nature and provides a small amount of scaffolding to help students figure out what to look for.
This lesson is intended to be a quick, short version of a performance task in which students rapidly do some research and respond in writing. It might take 2 class days but should not take more. The goal is to generate ideas for exploration later when students complete the actual Explore PT later in the year.
The purpose of this lesson is to learn how to determine the …
The purpose of this lesson is to learn how to determine the main ideas from digital sources. on Cybersecurity.Students will identify the site content and information on bias.Students will synthesize their findings from three websites, cite examples, and provide their own analysis in a 5-minute speech.
The purpose of this lesson is to learn how to determine the …
The purpose of this lesson is to learn how to determine the main ideas from digital sources. on Cybersecurity.Students will identify the site content and information on bias.Students will synthesize their findings from three websites, cite examples, and provide their own analysis in a 5-minute speech.
This course has been designed as a seminar to give students an …
This course has been designed as a seminar to give students an understanding of how scientists with medical or scientific degrees conduct research in both hospital and academic settings. There will be interactive discussions with research clinicians and scientists about the career opportunities and research challenges in the biomedical field, which an MIT student might prepare for by obtaining an MD, PhD, or combined degrees. The seminar will be held in a case presentation format, with topics chosen from the radiological sciences, including current research in magnetic resonance imaging, positron emission tomography and other nuclear imaging techniques, and advances in radiation therapy. With the lectures as background, we will also examine alternative and related options such as biomedical engineering, medical physics, and medical engineering. We'll use as examples and points of comparisons the curriculum paths available through MIT's Department of Nuclear Science and Engineering. In past years we have given very modest assignments such as readings in advance of or after a seminar, and a short term project.
For this lesson, students will learn how to cite in-text in MLA. …
For this lesson, students will learn how to cite in-text in MLA. They will watch a video, be directed to an easy to understand web page with citation examples, and even be able to complete a worksheet on citing in-text in MLA. Once students are done with this lesson, they will be ready to cite in-text in their own research paper.
Seminar provides an overview of quantitative and qualitative research methods in the …
Seminar provides an overview of quantitative and qualitative research methods in the social sciences. Topics covered include: hypothesis formulation and theory construction; data collection techniques (experimental, survey, and observational); ethical issues in research; and how to prepare a research proposal. Goal is to provide students with the methodological skills to evaluate existing studies and to select appropriate methods for use in their own research.
Create a Superhero is a five-part lesson plan asking students to research …
Create a Superhero is a five-part lesson plan asking students to research a current global issue which impacts them, their family or their community. Based on their research they create a superhero to help solve the issue. The project follows an adapted inquiry model and uses the online tools of G Suite for Education.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.