PGCE Assignment 2: Planning a 12 week scheme of work.
Introduction
This assignment has been designed to plan and produce a twelve week scheme of work in association with Unit 1: BTEC ND e-Media Production course. The course is designed to develop learners’ skills and knowledge in reading, analysing and deconstructing of e-media.
Reece and Walker (2000) discuss, there are several building blocks to be considered when planning for effective learning. I will discuss the sections of the planning process that need to be considered planning for a lesson.
• Lesson content and building blocks of lesson planning.
• The methodology of Teaching and learning.
• The theories of learning and what influences planning.
• Assessment through the use of a self-evaluation pro-forma.
• Motivational and Equal Opportunities issues.
• Self –Evaluation.
Lesson content and building blocks of lesson planning
Benjamin Bloom developed an analysis of academic learning behaviours in the field of education, known as Bloom’s Taxonomy. These behaviours were categorized into three interrelated and overlapping learning domains; Cognitive, Affective, and Psychomotor domains. In this section I will describes in point each of these three learning domains.
The Cognitive Domain
The Cognitive Domain is a person’s intellectual ability. Cognitive learning behaviours are characterized by observable and unobservable skills such as comprehending information, organizing ideas, and evaluating information and actions. There are six levels of intellectual behaviour important in learning within the cognitive domain;
1. Knowledge is a starting point that includes both the acquisition of information and the ability to recall information when needed.
2. Comprehension is the basic level of understanding. It involves the ability to know what is being communicated in order to make use of the information.
3. Application is the ability to use a learned skill in a new situation.
4. Analysis separates information into part for better understanding.
5. Synthesis is the ability to combine existing ele...
... middle of paper ...
...es: Recommended Reading [http://www.ac.wwu.edu/~assess/slo.htm]
Other Sites: o Explorations in Learning & Instruction: The Theory Into Practice Database (Taxonomy) o Bloom's Taxonomy [The Teaching and Educational Development Institute] o Bloom Resources o http://www.reach.ucf.edu/~acg4401/Handouts/blooms.htm o http://www.stedwards.edu/cte/bloomtax.htm o http://www.aphs.sa.edu.au/soc_env/skills/bloom.html o http://its.foxvalley.tec.wi.us/iss/curric-assessment/COLUMN.html o http://www-ee.eng.hawaii.edu/~tep/EE367/Coop/bloom.html o http://www.utexas.edu/student/lsc/handouts/1414.html o http://www.cityu.edu/facultystaff/teachingtips.asp [Teaching Tips, City University (Bellevue, WA)] o Guide to Theories of Learning o Internet Resources for Higher Education Outcomes Assessment [http://www2.acs.ncsu.edu/UPA/assmt/resource.htm]
Lesson plans are very well organized including visuals for the materials being illustrated. Academic vocabulary is addressed in many ways. For example, key concept and vocabulary words will be introduced to the students at start of lesson using building background. Students will be provided a hard copy of anticipation guide and words will be displayed on the Smart Board, too. Students will be provided with
In early June 2013, Edward Snowden, a 29-year-old former defense contractor who had access to NSA database while working for an intelligence consulting company, leaked classified documents reports that the National Security Agency (NSA) is recording phone calls of millions of Americans along with gathering private data and spying foreign Internet activity. The Washington Post later broke the news disclosed PRISM, a program can collect data on Internet users. The leaked documents publicly stated a vast objection. Many people were shocked by the scale of the programs, even elected representatives were unaware of the surveillance range. A nationwide debate over privacy rights have been sparked. Although supporters claim that the NSA only does its best to protect the United States from terrorists as well as respecting Americans' rights and privacy, many civil rights advocates feel that the government failed to be clear about the limit of the surveillance programs, threatening Americans' civil...
Snowden's confession over exposing the confidential documents that reveals the NSA's surveillance program has influenced the public with different interpretation. In his interview, Snowden stated that “ The public needs to decide whether these programs, and polices are right or wrong.” The face-work of Edward Snowden provided to the public by using the free press is in a justice image of him. His stated that the disclosure of the U.S. government and NSA is to let people to see the truth and their life has been compromised. Some people perceive...
Utilitarianism is mainly about consequences and not about intent. Basically, it looks at the whole situation, takes note of all the advantages and pleasure, all the disadvantages and pain, and then compares them, in the end, whatever benefits the society as a whole is the winner. By applying this theory to the whistleblowing incident, Edward Snowden released the classified document to the general public, by doing this he had to flee his country, leave a comfortable lifestyle, leave his family and loved ones to seek asylum in another country. The chances of him being able to come back to America are slim. He risked all of this so that citizens of America would know the truth, how their rights are being violated. For Snowden, he would rather give up his country and his safety, so that Americans would know just how much the government has access to obtain their information. In the end, looking in terms of a society, utilitarianism plays in their favor since now they are aware of this situation. Now, looking at this situation with another ethical theory, Kant’s. Kant’s theory has two categorical imperatives, the first categorical imperative talks about where an individual should act in a way in where everyone else can do it all the time, that we should follow rules that can be applied everyone. The second
Mass surveillance is a word that has been thrown around every so often in the last few decades, especially ever since George Orwell’s book Nineteen Eighty-Four. Although this book was released over 60 years ago, some aspects of the book are seeming to become true in the United States, and other parts of the world today. The idea of mass surveillance isn’t so taboo anymore, as there are several programs ran by sovereign countries around the world which monitor their domestic citizens, as well as citizens and leaders of other foreign countries. With all of our technological communication advances since 1949, this age of information is only going to get more severe, and more tracking and monitoring will be done. The biggest offender of doing this is the NSA, shortened for National Security Agency. The NSA is an organization that was made by the US Government to monitor intelligence, and collect, translate and decode information. What’s important about the NSA, is that this most recent summer, a program named PRISM was revealed by a whistleblower, and in summary, PRISM monitors everything it can, including our own citizens in the United States. This “scandal” had a lot of air time for many months, and is still in the news today. The revelation of what the NSA is doing behind our backs is what made the basis of this essay, and made me think of how similar this entire situation is to Nineteen Eighty-Four.
The controversy surrounding Edward Snowden has been one of the most controversial whistleblowing stories regarding the United States. Snowden is a former technical contractor for the National Security Agency (NSA) and Central Intelligence Agency (CIA) employee, therefore he had access to a numerous amount of classified information. Working primarily with Glenn Greenwald, Snowden sent various government documents containing classified information. The top secret information that was leaked involved several ongoing mass surveillance programs of the United States government. These leaked documents exposed plans to seize and record all US and European telephone metadata as well as information from internet surveillance programs such as PRISM and Tempora. Consequently, this situation provoked many ethical dilemmas to surface. In this memo I will argue whether Edward Snowden
Each person has their own type of learning style. A learning style is a method in which each of us utilizes to better understand material. A preferred learning style is a style in which the person can learn best, reflecting their strengths and weaknesses of the individual. In order to understand material we take it all in with our senses, through sight, sound, touch, smell or taste. Multiple Intelligence theory maintains that there are at least seven learning styles (“intelligences”): interpersonal, intra-personal, body/kinesthetic, visual/spatial, mathematical/logical, verbal/linguistic and musical/rhythmic (Lazear, D.1991). For the purposes of this paper I will simplify the seven categories into three main categories in which people best learn information: auditory, visual and tactile/kinesthetic. Most people possess the ability to use all three learning styles but learn best using one specific learning style.
It is reasonable to argue that, governmental institutions or people with authority are subject to withhold a great deal of information from society. Many may argue that secrets are kept to ensure the safety of the nation. Thus, upholding the governmental duty of protecting the nation against possible threats. On the other hand, many believe that secrets may exist which violate our constitutional rights. Over the last year, Edward Snowden, has made headline news for leaking sensitive governmental information to the press. Edward Snowden is a 29-year-old high school drop-out, who was a tech specialist for the National Security Association. Snowden had discovered and later exposed the NSA for monitoring the nations e-mails, phone calls, and internet searches. As the allegations spread like wild fire, Edward Snowden sought asylum in Russia for one year. Snowden had a valid and justifiable reason to expose the NSA to the world because they were in violation of our fourth Amendment rights to unreasonable searches and seizures. The government called him a traitor, while others viewed him as a hero for exposing the government. Edward Snowden is a whistle blower because he felt that it is up to society to decide if governmental practices are just or unjust. Snowden does “express the highest respect for the law”, and he wanted to protect the right of privacy for American citizens.
Krause, K, Bochner, S, Duchesne, S & McNaugh, A 2010, Educational Psychology: for learning & teaching, 3rd edn, Cengage Learning Australia, Victoria
As teachers we plan our lessons and think to ourselves, "my students are going to love this lesson and will be able to understand what I am teaching", but sometimes that isn 't the case. You may plan a lesson in hopes that your students understand but it doesn 't go as planned. Every student learns differently and thinks differently and because of this we, as teachers must learn to differentiate our lessons. This may require us to change the way we deliver our lesson, change the activities for our lessons or even change the wording of our material so students understand. In this paper, I will be differentiating a lesson plan based on student readiness, student interest and student learning profile for content, process, and product.
Moore, Beverly. Situated Cognition Versus Traditional Cognitive Theories of Learning. Education, V119, N1, pgs 161-171, Fall 1998.
When I think about knowledge the first thing that comes to my mind is education. I believe that knowledge comes to people by their experiences in life. In other words, life is an instrument that leads me to gain knowledge. Many people consider that old people are wise because they have learned from good and bad experiences throughout their lives. Education requires work, dedication and faith to gain knowledge. We acquired knowledge through the guidance of from parents, role models, college/University teachers and life experiences.
For lesson planning purposes, what information do you need to know to help give you the greatest impact on instruction?
In the process of completing this coursework, I have realised that every teacher should be all-rounded and equipped with adequate skills of educating others as well as self-learning. As a future educator, we need make sure that our knowledge is always up-to-date and applicable in the process of teaching and learning from time to time. With these skills, we will be able to improvise and improve the lesson and therefore boost the competency of pupils in the process of learning. In the process of planning a lesson, I have changed my perception on lesson planning from the student’s desk to the teacher’s desk. I have taken the responsibility as a teacher to plan a whole 60-minutes lesson with my group members. This coursework has given me an opportunity
The second step in developing an engaging lesson is to focus on the instructional strategies used to help the students understand the material. It is at this point, the teacher decides what activities they will use to help address the “big ideas” or the “essential questions”.