Module 4 Application Essay

1080 words - 5 pages

PLAN: Criteria for a Student-Centered Exam
For PDSA cycle I chose to use data notebooks during the Fitnessgram testing. I chose these because they are engaging, interactive, and they promote sharing, trusting, teambuilding, reflection, and coaching. (Pitas, 2000) In physical education I am always looking for ways for students to reflect on their exercise habits in and set goals for their future. I want to educate students to be healthy for a lifetime and what better way than for them to tract their own exercise and reflect on how it’s working. They would be sharing their beliefs with me along with their goals. They would trust me to help them achieve their goals as well as their personal information on how they want to portray themselves physically. They would also reflect their own opinions on the class and help me devise strategies that would help them reach their goals and allow me to adapt my teaching to better serve them. I think the idea of using data notebooks to tract their growth and reflections is a great idea especially in my classroom setting.
PLAN: Student-Centered Assessment
For my student-centered assessment I chose to use something that I have never done before but our administration wants us to use which are data notebooks. Every day this week I had the students answer a question so they could self-reflect on the unit. After the closure of the lesson I had students go change out and write about the topic on the white board. My questions included:
1. What can I (the teacher) do to improve your PACER score?
2. What is the most difficult fitness test and what I can do to make it easier?
3. What are my goals for next Fitnessgram test? How can I achieve them?
4. What activities outside of school can help with improving my scores? What am I doing to help my scores?
5. What activities in class have most benefited our PACER score?
Every day I would have a few students share their writing with me. I collected them on Friday and reviewed everyone’s data notebooks. “The assessment information is about the students, yet often we have overlooked the control they have over their own learning.” (Stiggins, 2008) This quote helped me to recognize which activities they thought were most beneficial and it also allowed me to see how they developed their own goals. As a physical educator I always want my students thinking about how to stay healthy for a lifetime so that is how I went about designing my data notebook assessment. If I keep having them reflect and make goals for themselves that will benefit them later in life with their own personal health and well-being.
DO: Pilot Group
My pilot group for this cycle was my seventh grade physical education class. There are 28 people in my last hour class and they are one of my more active physical education classes. I have three students with IEP’s in this section. The gender break down is 16 boys to 12 girls with all but two students being Caucasian while the other two are of...

Find Another Essay On module 4 application

The Effect of Shading on Various Photo-Voltaic Systems

1638 words - 7 pages a distance of 50 cm towards the east of the last module in the array. Another obstacle shadow is a plastic pipe 4 inches in diameter, set in the lower right corner to another module in the array. Cylindrical obstruction rises above the bottom edge of the module by 35 cm. These shade barriers illustrated in Figure 1. Flat plate obstruction cast the shadow of a rectangular shape is almost completely covers the surface of the module. While

swager Essay

4130 words - 17 pages Student Worksheets Module 1 ................................................................................................................... 4 Module 2 ...................................................................................................................16 Module 3 ...................................................................................................................26 Module 4

Biometrics in security

1213 words - 5 pages salient features. Any unnecessary or extraneous information from the feature extraction stage will be discarded. 3 3. Matcher Module. The matcher module compares the feature set against the stored templates in the database to generate matching scores. 4. System Database Module. The system database module is used to store the biometric templates of the enrolled users. 6 Types of Biometric Characteristics Face. Face recognition is considered a non

MIS Initiation

14683 words - 59 pages -3. BRC DEPB Application & RegistrationProof of Realisation Prepared by Documentation Division as per information of realization given to themAttested by Bank -4 Custom Attested Invoice and Packing List Sales Tax Documentation Division -5. Credit Advice for Realisation, Drawback, DEPB Sale Funds Available Bank -NB: Details of DEPB Application

A Forensics Memory Study of Malware in Android Operating Systems

2744 words - 11 pages image extractor. This loadable kernel module can acquire the full memory address range from an Android system, either over the network or via an SdCard [10]. Along with various new Android specific Volatility plugins, and a custom built ARM architecture investigation profile for Volatility, these tools are used in our research to analyze running malware through the exploration of hidden processes, process structure, malicious APK activities

Distribution of Final Year Project: Communication and Components from the Sea

3661 words - 15 pages rate 19200, 8-bit data, 1-bit start bit, 1-bit stop bit. This I/O is input. PIN 4: TXD. Serial output, baud rate 19200, 8-bit data bits, 1-bit start bit, 1-bit stop bit. This I/O pin is input. PIN 5: ENABLES. This enables the port of module active high and low this pin is I/O pin is input pin. PIN 6: Busy. It output “busy” signal during transmission and receiving, active low. This pin is output. PIN 7: It is used for module of 433 MHz type. This

Accessing Persistent Data in a Relational Database

2345 words - 9 pages module relies on the internal workings or implementation of a data access module, or if the business module directly includes some aspects of the connectivity and data access code, a tight coupling is created between the business and data logic, directly affecting the portability of each. The following diagram illustrates the structure of a typical application which accesses persistent data stored in a relational database. The data logic and JDBC

My published work

5801 words - 23 pages incorrect answers until the entire group determined the content was understood. Upon completion of Module 4, it was necessary for students to individually display knowledge and com- prehension, as well as provide evidence of application, analysis, synthesis, and evaluating/critical thinking abilities (Bloom 1956) for each learning outcome. In order to assess the desired outcomes, each student was given a short quiz on the class session following the

my view on social networking

3862 words - 15 pages Research Journal of Applied Sciences, Engineering and Technology 5(4): 1238-1244, 2013 ISSN: 2040-7459; e-ISSN: 2040-7467 © Maxwell Scientific Organization, 2013 Submitted: June 23, 2012 Accepted: August 17, 2012 Published: February 01, 2013 Corresponding Author: Jiande Wu, Department of Information Engineering and Automation, Kunming University of Science and Technology, Kunming 650500, China 1238 Study and Design of Diaphragm Pump

Huffman Trucking Network Analysis

1320 words - 5 pages them into packets with a network layer header. This layer must also send messages to the data link layer for communication. Finally the network layer is responsible for error handling and diagnostics, meaning that devices that connected logically, exchange information about the status of the devices on the network.The fourth (4) layer known as the transport layer, "is responsible for delivering data to the appropriate application process on the

Analyzing HR System

2359 words - 9 pages , allowing for a core of functionality or framework, and then each component of the application will be plugged into the new system as a module. Next, the testing phase will commence and be completed as the modules are finished. Initial core framework will be completed first and testing done and the modules will be tested as they are completed. Testing processes will be developed when running tests on the code. These processes can be reused to test

Similar Essays

Biometric Technology In Verifying A Person's Identity

1774 words - 8 pages authentication. Decision Taking Module: It starts Verification Module to find the result. Verification Module returns successful match or mismatch. If it gets successful match then it removes the restriction to receive the call applied by Call Monitoring Module and receives the call. In case of mismatch it terminates the incoming call. 4. Testing Table 1 shows parameters to perform testing on the application. Camera image Size 640×480 pixels Colour

Software Applications Essay

1347 words - 5 pages frequency and the number of data points as well as filtering and averaging settings. DAQ GUI allowed observing the offset, phase, shape, amplitude and noise of the signal before a scanning procedure. Screenshot of the module user interface is shown in Figure 3.19. Figure 3.19: DAQ module GUI Some of the elements of this module were used in the other parts of the application where data recording or signal monitoring were required. The

Nissan Vss From Instrument Cluster Investigation Essay

1743 words - 7 pages application; Rostra and LPAS set out to determine whether or not the current input resistance in the 57A-02360 is appropriate for use with the new VSS signal. The major concern in this case is that the Signal/Noise ratio may be too low for reliable VSS pulse detection. An increase in input resistance would, theoretically, increase the Signal/Noise Ratio by dividing down the noise along with the signal. For testing, two module variants were selected

Multi Thread Intrusion Detection System (Mids) For I Pv6 Networks

2109 words - 8 pages architecture is more efficient and fast. It reduces the process overhead. Graph 3: Compression of process execution time The output and log file of proposed model are generated in following format as shown in figure 4. Report: 1 Queuing report On detection of threat the data packets are discarded by process module. The log report is generated for administrator in the form as in report 2. Report 2: Threat detection and