Premium Essay

Sq1 Unit 6 Study Guide

Submitted By
Words 642
Pages 3
Lesson 6:
PACING LEARNING TASK MATERIALS AND SOURCES

40 minutes • Evidence based writing
• Providing Feedback 5. Completed Research Organizers
10. Guided Speech Outline
10a. Less Guided Speech Outline
11. Congressional Hearing Feedback Form SUPPORTING QUESTION
SQ1: What democratic principles can be found in the U.S. Constitution?
SQ2: How do democratic principles strengthen the U.S. government?
SQ3: What are the limitations of these democratic principles?
(Varies based on group role)
OBJECTIVE FORMATIVE ASSESSMENT
Students will be able to construct a one minute speech based on the findings of their research. Students will produce two paragraphs (about 175 words) that explain their bullet point for their team’s topic.
ENGAGE – Capture …show more content…
“Thomas Jefferson once said, ‘I have great confidence in the common sense of mankind in general.’”
d. “History influences our every move, our every choice. Past events help shape the future.”
e. “If one country is a state, how can a country with 50 different states actually work?
2. Give students time to read the opening statements.
3. Instruct the students to select which style they like the most with an explanation as to why they chose that particular style. Differentiation: The guided speech outline provides sentence stems for students. It also provides an overall structure for their portion of the speech. If you have students that require less scaffolding, there is a 10a. Less guided speech outline available in the Cornerstone materials.

Facilitation Notes: Teachers should use their discretion on how many scaffolds to use during speech writing. A UDL outline has been provided in the material for this cornerstone. The teacher should encourage the students to use the organizer; however, remind them that all the groups have this outline, so if they want their speech to stand out they may want to reword it after they have filled out the …show more content…
Similar to the way the research was divided into parts, the speech is as well. To increase the collaborative experience and streamline the writing process each pair will contribute to the speech. Since each pair specialized in a particular aspect of the team’s topic, they are best to write that portion of the speech. This also allows each student to have a personal investment in the group’s speech. Even if they are not the best writer they get to contribute the idea that gets used and the wordsmithing will be worked out during the feedback phase.
EXPLORE – Guided inquiry of sources to investigate the answer to a question with embedded UDL strategies
1. Students will need to have all their 5. Research organizers. The students will be working with their research partner to construct one minute of their team’s speech.
2. Provide students with the 10. Guided Speech Outline. Students will focus on writing about the bullet point they research for their team. Working with their partner, the will complete the outline to have about a 175 word explanation of their bullet point.
EXPLAIN – Clarify understanding through reading/discussion, speaking and listening with embedded UDL strategies
1. Groups reconvene and share their speeches with each

Similar Documents

Premium Essay

User Authentication for Network Environment

...CHAPTER ONE INTRODUCTION 1. BACKGROUND OF THE STUDY User authentication for network or internet based environment posed a challenging task for system and network administrator. This statement is true and is still very much applicable till these days as it is a well known fact that authentication is being widely incorporated as part of access control for most systems. Authentication has been the catalyst for business organization in information protection and security. Implementation of access control policies, standards or procedures involves the identification of appropriate authentication mechanism whereby the criticality of the information being protected are being used as justification for having a more refined authentication mechanism as compared to a more simple approach. Without the appropriate authentication mechanism in place, attacker could easily gain access to systems or applications by utilizing personal information, gained through various means, including but not limited to social engineering. Conventional textual passwords are the most common mechanism used in authentication. This method requires a user to enter their username and password, either in alphabet or numeric, or more commonly, a mixture of both forms as authentication tokens to gain access to systems or applications. Two recent surveys have shown that users choose short, simple passwords that are easily guessable, for example, “password”, personal names of family members, names...

Words: 17307 - Pages: 70

Premium Essay

Frank Wood’s Business Accounting Tenth Edition

...FRANK WOOD’S business accounting TENTH EDITION 1 FRANK WOOD & ALAN SANGSTER Additional student support at www.pearsoned.co.uk/wood FRANK WOOD’S business accounting 1 Visit the Business Accounting, tenth edition Companion Website at www.pearsoned.co.uk/wood to find valuable student learning material including: l l l l l l Learning objectives for each chapter Multiple choice questions to help test your learning Review questions and answers Links to relevant sites on the web Searchable online glossary Flashcards to test your knowledge of key terms and definitions Frank Wood 1926–2000 FRANK WOOD’S business accounting TENTH EDITION 1 FRANK WOOD BSc (Econ), FCA and ALAN SANGSTER BA, MSc, Cert TESOL, CA Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE and Associated Companies throughout the world. Visit us on the World Wide Web at www.pearsoned.co.uk First edition published in 1967 Second edition published under the Longman imprint in 1972 Third edition published in 1979 Fourth edition published in 1984 Fifth edition published in 1989 Sixth edition published in 1993 Seventh edition published in 1996 Eighth edition published under the Financial Times Pitman Publishing imprint in 1999 Ninth edition published in 2002 Tenth edition published 2005 © Frank Wood 1967 © Longman Group UK Limited 1972, 1979, 1984, 1989, 1993 © Pearson Professional Limited 1996 © Financial Times Professional Limited 1999 © Pearson Education Limited...

Words: 217335 - Pages: 870