In this lesson students explore a number of sources to create a …
In this lesson students explore a number of sources to create a biographical timeline about a selected person. Students collaboratively research and resolve conflicting information they find during their investigation.
Biology 2e is designed to cover the scope and sequence requirements of …
Biology 2e is designed to cover the scope and sequence requirements of a typical two-semester biology course for science majors. The text provides comprehensive coverage of foundational research and core biology concepts through an evolutionary lens. Biology includes rich features that engage students in scientific inquiry, highlight careers in the biological sciences, and offer everyday applications. The book also includes various types of practice and homework questions that help students understand—and apply—key concepts.
Health technology innovation in low- and middle-income countries (LMICs), including countries in …
Health technology innovation in low- and middle-income countries (LMICs), including countries in Africa, falls far short of meeting the healthcare needs of these settings. The result is a heavy reliance on products and technologies imported from industrialised countries that are often not suited to, or sustainable for, LMICs.
Appropriate healthcare products for LMICs are best developed in these countries, where local knowledge and understanding of needs, context and available resources may be incorporated into designs and implementation plans. The objectives for enabling health technology development in LMICs include: 1) expanding the base of expertise through research training programmes with a problem-solving focus; 2) stimulating new knowledge, approaches and solutions by enabling innovation; and 3) integrating research communities within and across institutions to build critical mass.
The field of biomedical engineering is central to health technology innovation. This book is a response to the need for biomedical engineering capacity in Africa. It is grounded in the African context. It serves as a resource for academics and students in biomedical engineering, for those interested in entering the field in any capacity and for practitioners at every stage of product development. University leaders intent on establishing new biomedical engineering programmes or departments, may draw on the content for guidance on structuring their offerings. The book reaches beyond Africa, as it is relevant to other LMIC settings, and provides insights to guide global health initiatives focused on technology innovation.
To kick off the final unit of this course, students will do …
To kick off the final unit of this course, students will do some research into interesting innovations in computing. This lesson will expose students to wider variety of computing form factors (what a computer looks like) and fields that are impacted by computing. Later in this unit students will look back on the devices they encountered in this lesson as they develop their own physical computing devices.
We are a group of volunteer CSD scientists and clinicians passionate about …
We are a group of volunteer CSD scientists and clinicians passionate about bridging the gap between scientific research and clinical practice. While there are many ways to increase research access and awareness, our 2020–2021 goal centers squarely on self-archiving and "green" open access options. WHY? Our field relies on high-quality, peer-reviewed research to support evidence-based practice. Yet, much of our work remains inaccessible to practitioners, researchers, and people in the community who are not affiliated with universities or national organizations. By teaching CSD scientists how to self-archive, and providing them with the support needed to make it happen, we can empower our colleagues to make research accessibility the norm in our field. Because when free, legal versions of our field's best research is made available to the public, it can improve the sustainable value of all of our work.
The core idea of this lesson occurs in the unplugged activity that …
The core idea of this lesson occurs in the unplugged activity that kicks off the lesson, in which students try to keep track of IP addresses that had been randomly assigned to each student in the class, while at the same time the teacher occasionally changes students' addresses. This leads to identifying the need for an authoritative system for name-to-address mappings, known as the Domain Name System or [v DNS].
Students then briefly experiment with a DNS protocol in the Internet Simulator. The activity is similar, in that students will have to grapple with IP addresses changing in real time and use the built in DNS protocol to resolve the issues.
The lesson ends with students doing some rapid research about DNS and some of its vulnerabilities, particularly what are known as Denial of Service Attacks.
This lesson is a capstone to the Internet unit. Students will research …
This lesson is a capstone to the Internet unit. Students will research and prepare a flash talk about an issue facing society: either **[v Net Neutrality]** or **Internet Censorship**. Developing an informed opinion about these issues hinges on an understanding of how the Internet functions as a system. Students will prepare and deliver a flash talk that should combine forming an opinion about the issue and an exhibition of their knowledge of the internet.
This lesson is good *practice* for certain elements of the AP Explore Performance Task.1 The primary things practiced here are: doing a bit of research about impacts of computing (though here it’s specifically about the Internet), explaining some technical details related to ideas in computer science, and connecting these ideas to global and social impacts. Students will practice synthesizing information, and presenting their learning in a flash talk.
1**Note:** This is NOT the official AP® Performance Task that will be submitted as part of the Advanced Placement exam; it is a practice activity intended to prepare students for some portions of their individual performance at a later time.
This lesson sets the the stage for why we want to learn …
This lesson sets the the stage for why we want to learn about how the Internet works. First students share what they currently know about how the Internet works through a KWL activity.
Then students watch a short video the introduces Vint Cerf and the Internet at high level. Students then skim a memo written to the Internet Engineering Task Force (IETF) by Vint Cerf in 2002 entitled “The Internet is for Everyone,” which calls out a series of threats to the prospect that the Internet should be an open, easily and cheaply accessible resource for everyone on the planet.
Finally we foreshadow the practice PT at the end of the unit. Many of the questions and challenges raised by Vint Cerf still apply today, and students will be asked to research and present on one for the Practice PT.
In this lesson students are introduced to the standard units for measuring …
In this lesson students are introduced to the standard units for measuring the sizes of digital files, from a single byte, all the way up to terabytes and beyond. Students begin the lesson by comparing the size of a plain text file containing “hello” to a Word document with the same contents. Students are introduced to the units kilobyte, megabyte, gigabyte, and terabyte, and research the sizes of files they make use of every day, using the appropriate terminology. This lesson foreshadows an investigation of compression as a means for combatting the rapid growth of digital data.
Students learn the difference between lossy and lossless compression by experimenting with …
Students learn the difference between lossy and lossless compression by experimenting with a simple lossy compression widget for compressing text. Students then research three real-world compressed file formats to fill in a research guide. Throughout the process they review the skills and strategies used to research computer science topics online, in particular to cope with situations when they don't have the background to fully understand everything they're reading (a common situation even for experienced CS students).
In this lesson students will conduct a small amount of research to …
In this lesson students will conduct a small amount of research to explore a file format either currently in use or from history. Students will conduct research in order to complete a "one-pager" that summarizes their findings. They will also design a computational artifact (video, audio, graphic, etc.) that succinctly summarizes the advantages of their format over other similar ones.
This lesson is intended to be a quick, short version of a performance task in which students rapidly do some research and respond in writing. It might take 2 class days but should not take more. The goal is to develop skills that students will use when they complete the actual Explore PT later in the year.
Students learn about various types of cybercrimes and the cybersecurity measures that …
Students learn about various types of cybercrimes and the cybersecurity measures that can help prevent them. Then students perform a Rapid Research project investigating a particular cybercrime event with a particular focus on the data that was lost or stolen and the concerns that arise as a result. The Rapid Research activity features vocabulary, concepts, and skills that should help prepare them for the AP Explore PT, and also serves as a capstone for the sequence of lessons on encryption and security.
This lesson asks students to consider carefully the assumptions they make when …
This lesson asks students to consider carefully the assumptions they make when interpreting data and data visualizations. The class begins by examining how the Google Flu Trends project tried and failed to use search trends to predict flu outbreaks. They will then read a report on the Digital Divide which highlights how access to technology differs widely by personal characteristics like race and income. This report challenges a widespread assumption that data collected online is representative of the population at large. To practice identifying assumptions in data analysis, students are provided a series of scenarios in which data-driven decisions are made based on flawed assumptions. They will need to identify the assumptions being made (most notably those related to the digital divide) and explain why these assumptions lead to incorrect conclusions.
In this lesson students will conduct a small amount of research to …
In this lesson students will conduct a small amount of research to explore a computing innovation that leverages the use of data. Students will research a topic of personal interest and respond to questions about about how that innovation produces, uses, or consumes data. The lesson is intended to give students practice with doing research of this nature and provides a small amount of scaffolding to help students figure out what to look for.
This lesson is intended to be a quick, short version of a performance task in which students rapidly do some research and respond in writing. It might take 2 class days but should not take more. The goal is to generate ideas for exploration later when students complete the actual Explore PT later in the year.
This course has been designed as a seminar to give students an …
This course has been designed as a seminar to give students an understanding of how scientists with medical or scientific degrees conduct research in both hospital and academic settings. There will be interactive discussions with research clinicians and scientists about the career opportunities and research challenges in the biomedical field, which an MIT student might prepare for by obtaining an MD, PhD, or combined degrees. The seminar will be held in a case presentation format, with topics chosen from the radiological sciences, including current research in magnetic resonance imaging, positron emission tomography and other nuclear imaging techniques, and advances in radiation therapy. With the lectures as background, we will also examine alternative and related options such as biomedical engineering, medical physics, and medical engineering. We’ll use as examples and points of comparisons the curriculum paths available through MIT’s Department of Nuclear Science and Engineering. In past years we have given very modest assignments such as readings in advance of or after a seminar, and a short term project.
The topic of this essay is the career and education that the …
The topic of this essay is the career and education that the students each wish to pursue after high school. This paper will give the students an end goal to focus on throughout high school and serve as a pretest at the beginning of the year for the teacher to base each student’s individual skills and areas of weakness. This essay is intended for students who may not be college bound.
The Center for Advanced Language Proficiency Education and Research (CALPER) at the …
The Center for Advanced Language Proficiency Education and Research (CALPER) at the University of Pennsylvania is one of the fifteen Language Resource Centers established under Title VI of the U.S. Department of Education. According to the website, CALPER's particular focus is to improve the environment of advanced-level foreign language teaching and learning and assessment. The center thus far has developed innovative teaching materials, created online professional development resources, offered workshops for educators, and more.
The mission of the Center for Advanced Research on Language Aquisition (CARLA) …
The mission of the Center for Advanced Research on Language Aquisition (CARLA) is to study multilingualism and multiculturalism, to develop knowledge of second language acquisition, and to advance the quality of second language teaching, learning, and assessment. Some of the ways in which the center aims to achieve this mission is by conducting research and action projects in order to share research-based forms of knowledge.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.