In this interactive activity, learners build computer models of atoms by adding …
In this interactive activity, learners build computer models of atoms by adding or removing electrons, protons, and neutrons. It presents the orbital model of an atom: a nucleus consisting of protons and neutrons with electrons surrounding it in regions of high probability called orbitals. Guided tasks are provided, such as constructing a lithium atom and a carbon-12 atom in the fewest possible steps. The activity concludes with a model for building a charged hydrogen atom (an ion). Within each task, students take snapshots of their work product and answer probative questions. This item is part of the Concord Consortium, a nonprofit research and development organization dedicated to transforming education through technology.
Description Overview: Conduct Competency - Based Assessment is an approach to evaluating an individual's skills, …
Description Overview: Conduct Competency - Based Assessment is an approach to evaluating an individual's skills, knowledge, and abilities based on specific competencies or behavioral indicators. It focuses on assessing an individual's performance and achievements in relation to predetermined standards or criteria. Subject: Assessment in Learning 2 Level: 2nd Year College - Tertiary Level Material: Assessment, Student Guide Author: Clarissa A. Herbias Date Added: June 15, 2023 License: Creative Commons, Attribution Non - Commercial Language: English Media Format: Downloadable Docs
A high speed video clip of a roller coaster is used as …
A high speed video clip of a roller coaster is used as an example of conservation of mechanical energy. Students use the video to determine whether mechanical energy is conserved while the roller coaster rolls up, and then back down a hil.
This activity describes the construction and use of a pneumatic cannon and …
This activity describes the construction and use of a pneumatic cannon and free falling target used to teach the concepts of projectile motion in introductory physics.
This video from NASA features the Cosmic Origin Spectrograph (COS), which allows …
This video from NASA features the Cosmic Origin Spectrograph (COS), which allows scientists to use spectrographic analysis to assess the composition of intergalactic material.
In this lesson, students will explain CRaTER's purpose and how it works. …
In this lesson, students will explain CRaTER's purpose and how it works. They will also design (using paper and pencil) a cosmic ray detector to answer their own questions. CRaTER's purpose is to identify safe landing sites for future human missions to the moon; discover potential resources on the Moon; and characterize the radiation environment of the Moon. The lesson includes background information for the teacher, questions, and information about student preconceptions. This is lesson 4 of 4 from "The Cosmic Ray Telescope for the Effects of Radiation."
This article introduces a free online collection of images, video clips, and …
This article introduces a free online collection of images, video clips, and animations that teachers can use in creating resources for use with students. The four steps in creating a video clip, an animation, or other resource are presented.
In this activity students make biodiesel from waste vegetable oil and develop …
In this activity students make biodiesel from waste vegetable oil and develop a presentation based on their lab experience. Parts of the activity include creation of bio-diesel from clean vegetable oil, creation of bio-diesel from waste vegetable oil, chemical analysis of biodiesel, purification of biodiesel, and creation of soap from glycerin.
Este decomento basica mente es una clase que explica lo que se …
Este decomento basica mente es una clase que explica lo que se debe de hacer y las razones por las cuales se debe de hacer respecto al mantenimiento menor de un motor de combustion interna.
This book on Cybersecurity is written for beginners. No college degree is …
This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.
It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.
Have you ever felt uneasy or even dreadful after losing a USB …
Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?
This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.
Attendees will learn about the following topics: - A brief introduction to data encryption. - A few encryption tools for a novice user. - Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB flash drive. - Pros and cons of encryption/decryption technology.
Today many small businesses benefit from QuickBooks (Desktop and Online) as a …
Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.
What can small business owners do in QuickBooks to manage these security risks?
Attendees to this webinar will learn about the following topics: - Introduce a security architectural approach to QuickBooks data protection. - Learn about the default data integrity protections built into QuickBooks. - Practice stronger authentication into QuickBooks. - Practice role-based access on QuickBooks accounting. - Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.
Presentation Time: 50 minutes plus 10 minutes on Q&A.
This module gives a comprehensive overview about daily living assistive technologies for …
This module gives a comprehensive overview about daily living assistive technologies for people with disabilities as well as the latest smart technologies.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.