30 secrets of a good computer lesson

965 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
965
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

30 secrets of a good computer lesson

  1. 1. HYPERLINK "http://ourmalaysia.org/computer/30_secrets_of_a_good_computer_lesson.html" 30 Secrets Of A Good Computer Lesson<br />1. The lesson forms part of a unit which forms part of a scheme of work. 2. There is a good starter activity, one that gets the pupils settled down an in the right frame of mind to do the work you've planned for them. 3. The teacher spends time at the start letting pupils into the secret what the objectives (intended learning outcomes) of the lesson are, ie what is intended to be achieved by the end, and how this lesson fits in with the preceding and following lessons 4. Pupils are given open ended tasks (as far as possible), or at least not tasks with a glass ceiling. (Even lessons designed to impart a set of skills can still be more interesting than "drill & practice"). 5. There are plenty of resources for the pupils to use, enabling the teacher to give QUALITY guidance, ie not confined to explaining how to save the document! Such resources will include "how to' guides and posters, on screen help (which the pupils will have been taught how to use), and each other. 6. Ample time is allowed for the plenary, thereby allowing it to be somewhat more useful than the POLO model: Print Out and Log Off. The plenary is an ESSENTIAL part of the lesson, used to check what learning has taken place, consolidate learning, and prepare pupils for the next stage. In fact, a lesson might have two or three plenaries rather than just one at the end. 7. Homework is set at the START of the lesson, enabling the teacher to explain what needs doing, and for the pupils to understand what they need to have achieved by the end of the lesson in order to be able to make a good job of the homework; note that homework is ALWAYS given, regardless of so called homework timetables! (It doesn't always have to be written down. 8. Pupils are given plenty of time on the computers, with the teacher helping individuals and small groups. 9. Work is set at an appropriate standard, taking into account the pupils’ prior learning and attainment, and what is expected of their age group in terms of national standards. 10. There is a lot of questioning â€" PROBING questioning â€" and assessment for learning techniques in evidence. 11. There is a good range of material to provide for differentiation (higher attainers and children with special educational needs) and personalised learning. 12. The teacher is aware of individual pupils’ needs, such as their individual education plans â€" and makes use of the assessment and other data she has â€" remember: data only becomes information if you DO something with it! 13. Not all work takes place at the computer. 14. Pupils come in on time, prepared, and ready to start work. 15. There is a good buzz in the room pupils are talking about the work, not last night's TV programs. 16. Pupils organise themselves and, if working in groups, work collaboratively rather than competitively at least with other members of their own group! 17. Pupils don't keep asking the time, unless they are worried about not being able to complete the work (see below though) and don't notice the time going by. 18. Pupils don't understand the concept of finishing the work in the sense of having time left over to check email, play Solitaire etc. 19. Pupils, even normally poorly behaved ones, ask to be allowed to stay on, come back at lunchtime or come back early in the morning. 20. Pupils respect the equipment and the room. For example, they do not leave discarded print outs on the floor. 21. Pupils are happy and confident enough to try out things you haven't shown them: they ask help from each other or look at the posters and manuals that are available for them. 22. If you interrupt their work in order to announce or explain something, someone asks you to hurry up so that they can get back to their work. 23. Pupils do a greater amount work, say for homework, than you have asked them to. For example, instead of conducting a survey with 10 people they decide to ask 20. 24. Pupils do a wider range of work than you have asked them to. For example, instead of just writing about what the hospital of the future will be like, they canvass the views of others and carry out some research about current developments. 25. Pupils want to show off to you little tricks they have discovered, such as keyboard shortcuts. 26. Pupils talk to their friends about the lesson. 27. Pupils discuss with their friends the possibility of taking a particular ICT course in 3 years time. 28. Pupils not only want to assist at open evenings/days, but are able to look after and even create an ICT presentation on your behalf. 29. Pupils are able to help other (younger or older) pupils with confidence and enthusiasm. 30. Pupils ask you questions that you are unable to answer. This article is (c) 2005 Terry Freedman About the author:Terry Freedman has nearly thirty years' experience in education, and nearly 20 years' experience as a writer. A member of the UK's Society of Authors, Terry has had around a dozen books published, and over 800 specialist articles in leading newspapers and magazines. Written by: Terry Freedman<br />NAVIGATION<br />10 Easy Steps to Speed Up Your Computer Without Upgrading10 Power Tips for Presentations with Computer Projection10 PROVEN TIPS TO SURVIVE A COMPUTER CRASH10 Secrets To A Healthy Computer And A Happier You10 Tips on Computer Clutter Clean Up14 Household Ways To Protect Your Computer From Viruses3 Simple Ways To Save A Bunch Of Money When Buying A New Computer3 Summer Computer Tips4 Computer Money saving Tips5 Critical Steps to Protecting Your Computer on the Internet5 Simple Ways To Increase Your Computer Speed5 Stress Reducing Computer Tips5 Sure Fire Tips for Buying a New Computer5 Tips For Buying The Right Laptop Computer5 Tips to Color Code Your Way from Computer Chaos to Coherence5 Ways To Make Night And Weekend Computer Life Rich5th generation Computers Corporate infrastructure6 Essential Steps to Protect Your Computer On the Internet For Free6 tips for Keeping Aurora Away from your computer and 1 tip to Fix it if Aurora has Gotten You7 Barebones Computer Buying TipsA Guide to Computer DesksA Hacker Inside Your ComputerA Look at Computer Desks for ChildrenAdvancement in Computer TechnologyAdware Are Your Business s Computers SecureAll About Computer VirusesAn eBay Computer PurchaseAre cyber criminals phishing your identity from your computerAre You At The Mercy Of Computer GeeksAre You Being Mislead By Your Current Computer DealerAre You Making Any Money With Your Computer YetAre You Saving Money With a Computer Support PlanAvoiding Spam Scams and Computer VirusesBack that Thang UP Insure the Data on Your ComputerBasic Computer ThermodynamicsBe Prepared in the Event Computer Disaster StrikesBeat The Bugs Helpful Links That May Help You Combat Annoying Computer VirusesBecoming a Computer TrainerBeeps Your computer is telling you somethingBroadcasting Mp3 Audio Via Computer The Looney Tune World Of PodcastingBuild your first computer from hardware scratchesBuild Your Own ComputerBuild Your Own Computer or BuyBuild Your Own Computer What to Look for in a CaseBuy a home through your home computerBuying a computer Ask these 3 questionsBuying a Used Laptop ComputerBuying computers at a discount with peace of mindBuying DDR memory for your computerBuying Guide for Laptops Personal Computers NotebooksBuying the Perfect Computer The FIRST TimeCareer Track Computer ProgrammerCareer Track Computer Software EngineersChoosing a Laptop Computer Based on Hardware and Software NeedsClassification of ComputersCombat Computer Spyware An AntiSpyware Program Isn t EnoughComputer Aided Design Contracting Tax Concerns In The UKCOMPUTER BACKUPSComputer Business Opportunity Provide Huge Profit PotentialComputer Buying Advice For NovicesComputer CareerComputer Case ModdingComputer Cases The BasicsComputer Certification Anticipation vs NervousnessComputer Certification Become A Utility PlayerComputer CleaningComputer Cleaning May Be The Best Home Based Part time or Full time BusinessComputer Components for IdiotsComputer Consulting 101 Hiring Tips Part 1 of 2Computer Consulting Profit SecretsComputer Controlled LED SignsCOMPUTER COURTESYComputer Data Backup Data Backup Solution Will Give You A Peace Of MindComputer Data Backups Test Now or Cry LaterComputer Data Recovery OptionsComputer Disposal Throwing Away Your Computer Money and IdenityComputer Do s and Don tsComputer Equipment Disposals and RecyclingComputer Geeks and Garden GnomesComputer Graphics They re Not All The SameComputer Hacks Quacks Looking for CracksComputer Hardware Preventive Maintenance SoftwareComputer Help Desk Stupid Questions brought to you by Computer Service Now CSNComputer Homeschooling the added advantage in african american children s education Part 1Computer Hygiene Take Out The TrashComputer In The Shop What Do You Do NowComputer InsuranceComputer Loans An opportunity to have a computer of your ownComputer Loans Become Techno Savvy the Easier WayComputer Maintenance and Improving PC PerformanceComputer Monitor Buying GuideComputer Network DesigningComputer Network InstallationComputer Profits From Home What s Right for YouComputer Rental Worth Your MoneyComputer Rentals The Best Classroom Computer Training SolutionComputer Running Slow Here s One ReasonComputer Security What Exactly Is ItComputer software Excellent pricesComputer Software Genres That Help Students ThinkComputer SOS Inc Release of Upgraded League Management Software PackageComputer Support London Network Support London Network Installation LondonComputer Tips that Help Small Businesses Operate ProfitablyComputer TraumasCOMPUTER VIRUS THREATENS MY HOME BUSINESSComputer Virus Writer s A Few Bats In The BelfryComputer Viruses are Bad LuckComputer Viruses Worms and HoaxesComputers and Internet Inspiring Us to CreateComputers and Web Cams are Taking Communication to Levels Only Imagined in Sci Fi NovelsComputers Are Not ScaryComputers are Running My LifeComputers Freedom and PrivacyComputers Introverts and the Information AgeComputers You CAN Master Any ProgramCoping with a Serious Data Loss from your Computer Hard DriveCorporate infrastructure for Fifth generation ComputersCorporate Promotional Gifts The Fridge Magnet Is Dead Long Live the Computer DesktopCountering the Spread of Spyware on your ComputerD BUST Your Computer Part 1 Instructions for Microsoft UsersD BUST Your Computer Part 2 for Microsoft usersD BUST Your Computer Part 3 for Microsoft usersD BUST Your Computer Part 4 a for Microsoft usersD BUST Your Computer Part 4 bD BUST Your Computer Part 4 cD BUST Your Computer Part 4 dD BUST Your Computer Part 5Definitions for Computer Modding and Form FactorDell Computer Corporation Recall of Latitude Inspiron Laptop AC AdaptersDetecting and Eliminating Computer Viruses at the GatewayDid You Ever Want to Completely Erase Everything on Your ComputerDifferent Categories of Computer GamesDirty Little Computer Viruses and How To Protect YourselfDistance Learning and Elearning for Computer TechsDo The Media Spread Computer VirusesDo You Feel Used by ComputersDo You Know How To Remove Spyware From Your ComputerDo you know who is snooping around your computer right nowDo you need computer trainingDual core computer processors luxury or necessityDusting Your Computer Keeping it CoolExpansion Slots Cards and Bays Choosing the right computer caseExtending the Life of Your Business or Personal Computer PrinterFinally An Understandable Introduction To ComputersFive Simple Steps to Speed up Your ComputerFocus On White Collar Crime Accounting Fraud and Computer Crimes Creates Need For Qualified InvestigatorsGaming Computers and Computer ModdingGet Ahead When You Build Your Own ComputerGet Started in Computer Game CreationGet Valuable Computer Based Training Online FREEGetting Started In Information Technology Computer ConsultingGood News Bad News of Computer Security from a Keen Non TechieGuide on How to Land Computer JobsHackers Given Access to IRS ComputersHardware for Computer DesksHave You Invited A Spy Into Your ComputerHealthy Webmasters Choose Ergonomic Computer ProductsHeliodisplay Computer Video With No ScreenHelp Keep the Computers on Earth Clean and HealthyHelp Keep The Computers On Earth Clean And Healthy Protect Your Techno Friends From Viruses And SicknessHelp My Computer s Being InvadedHelp There s an Intruder in my ComputerHidden information is stored on your computer about every url you ever visitHome Computer Desks A Variety of OptionsHome Office Tip 2 Computer Health HazardsHow a Computer Consulting Business Can Help Your CompanyHow Much Money would it cost you to regain the use of your computer after a serious virus infectionHow Protected are You Safeguard Your Small Business from Computer VirusesHow Safe is Your Critical Business Data on Your Computer SystemHow Spyware Blaster Can Protect Your Computer From HarmHow to backup your computer dataHow to Backup Your Computer FilesHow to Become a Computer ConsultantHow To Buy The Right ComputerHow to choose a new hard drive for your computerHow to choose your computerHow To Deal With Computer ProblemsHow to Get a FREE Computer Scale Printer from DHLHOW TO GET THE COMPUTER YOU WANT WITHOUT SPENDING A FORTUNEHow to Have Your Computer Cake and Keep Your Family TooHow To Keep Your Computer Virus FreeHow To Optimize Your Online Time Through Efficient Computer UseHow to Prevent Computer Security Risk and How to Keep Your Small Business SafeHow To Prevent Spyware Attacking Your ComputerHow To Recognize If Your Computer Has A Virus Or Trojan On ItHow to reduce Computer problemsHow to safeguard your computerHow To Save Big Bucks On A Laptop ComputerHow To Stop The 1 Cause Of Computer Slow Downs And CrashesHow To Take Care Of Your Laptop ComputerHow To Take Good Care Of Your Computer Even If You Are A Clueless NewbieHow To Work At Home Using Your Computer Even If You Can t TypeHow Viruses and Spyware Get In to your computerHR MANAGERS USE COMPUTER FORENSICS TO INVESTIGATE EMPLOYEE ALLEGATIONSHurricanes Wilma Katrina And Rita Force Businesses To Rethink ComputerI Spy Something Terribly Wrong In Your ComputerIf You Had Problems in the Past with a Computer Virus Then You ll Want to Know How Easy it is to Setup Firewall ProtectionImage conversion In ComputersImportant Steps to Protect your Computer from Hurricanes<br />

×