Students pretend they are agricultural engineers during the colonial period and design …
Students pretend they are agricultural engineers during the colonial period and design a miniature plow that cuts through a "field" of soil. They are introduced to the engineering design process and learn of several famous historical figures who contributed to plow design.
Students rework their forgotten/abandoned drafts by cutting and covering up selected words. …
Students rework their forgotten/abandoned drafts by cutting and covering up selected words. By creatively manipulating text, they explore portal writing, a strategy for envisioning a new story or story direction.
Cyber ethics is a code when using the Internet. Because of the …
Cyber ethics is a code when using the Internet. Because of the nature of the Internet, however, there is no standard code of conduct. The individual user can choose what kind of websites to create, what comments they post, how they treat other users, and what files or information to download.
Research shows that there is a perceived anonymity on the Internet. This anonymity sometimes encourages young people to initiate or participate in negative behaviour when they normally would not. This behaviour includes: sending threating messages, posting rumors, posting fake or offensive profile, or submitting a negative image of someone. However, we are not as anonymous as we believe we are. Our "Digital Footprint" proves this.
This lesson for English Language Learners (ELLs) discusses a growing issue facing …
This lesson for English Language Learners (ELLs) discusses a growing issue facing young people in many parts of the world, cyberbullying. In this lesson, learners will practice reading, listening, speaking and writing. All activities are automatically graded with feedback provided to the learner upon submission.
Cybersecurity is a set of techniques to protect the secrecy, integrity, and …
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe.
The Folger Shakespeare Library provides the full searchable text of "Cymbeline" to …
The Folger Shakespeare Library provides the full searchable text of "Cymbeline" to read online or download as a PDF. All of the lines are numbered sequentially to make it easier and more convenient to find any line.
La ressource consiste en une fiche pédagogique portant sur une expérience de …
La ressource consiste en une fiche pédagogique portant sur une expérience de cytologie. Celle-ci propose des informations pratiques pour l’enseignant ainsi qu’une explication pédagogique de l’expérience. La ressource contient également une vidéo de l’expérience.
La ressource consiste en une fiche pédagogique portant sur une expérience de …
La ressource consiste en une fiche pédagogique portant sur une expérience de cytologie. Celle-ci propose des informations pratiques pour l’enseignant ainsi qu’une explication pédagogique de l’expérience. La ressource contient également une vidéo de l’expérience.
La ressource consiste en une fiche pédagogique portant sur une expérience de …
La ressource consiste en une fiche pédagogique portant sur une expérience de cytologie. Celle-ci propose des informations pratiques pour l'enseignant ainsi qu'une explication pédagogique de l'expérience. La ressource contient également une vidéo de l'expérience
La ressource consiste en une fiche pédagogique portant sur une expérience de …
La ressource consiste en une fiche pédagogique portant sur une expérience de cytologie; celle-ci propose des informations pratiques pour l'enseignant ainsi qu'une exploitation pédagogique de l'expérience. La ressource contient également une vidéo de l'expérience.
SÉRIE Célestin Célestin, un petit fantôme animé, sensibilise les jeunes enfants aux …
SÉRIE Célestin Célestin, un petit fantôme animé, sensibilise les jeunes enfants aux dangers de leur environnement quotidien tout en les amusant. À l’intérieur ou en plein air, il y a des règles d’or de la sécurité que les enfants ont besoin de connaître. Célestin vous charmera par ses nombreux conseils de sécurité.
Pour élèves de la 1ère à la 4e année. Vous trouverez 46 épisodes dans cette série.
DOSSIER THÉMATIQUE Célébrons Marie-Soleil Découvrez l'héritage musical et culturel de Suzanne Pinel, …
DOSSIER THÉMATIQUE Célébrons Marie-Soleil Découvrez l'héritage musical et culturel de Suzanne Pinel, aussi connue sous le nom de Marie-Soleil, une figure emblématique de la francophonie ontarienne.
DAREBEE is an online resource focused on fitness and wellness. It offers …
DAREBEE is an online resource focused on fitness and wellness. It offers a wide range of free workout programs, challenges, and resources designed for different fitness levels and goals.
DASHlink is a virtual laboratory for scientists and engineers to disseminate results …
DASHlink is a virtual laboratory for scientists and engineers to disseminate results and collaborate on research problems in health management technologies for aeronautics systems. Managed by the Integrated Vehicle Health Management project within NASA's Aviation Safety program, the Web site is designed to be a resource for anyone interested in data mining, IVHM, aeronautics and NASA.
Included are the support materials for Grade 2 Blended Learning Math - …
Included are the support materials for Grade 2 Blended Learning Math - Unit 1 Lesson 10 - Place Value:
YouTube video on using 10 frames and rods and cubes to represent numbers to 100 Manipulatives and Templates to support Unit 1 Assessment and Evaluation for Unit 1
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.