SlideShare a Scribd company logo
By Juan Rosales Torres & Victor Gonzalez Fuentes
1. Pre-Task: Clear instructions. The aim is mentioned.
2. Task: Ss work in pairs or groups. The T monitors.
3. Review :
• Planning: Preparation of an oral or written report.
• Report: Presentation to the T and Ss.
• Analysis: Highlight the language and relevant parts.
• Practice: Feedback based on the Ss’ needs.
-Information - gap activity.
-Opinion - gap activity.
-Reasoning - gap activity.
•Teacher: Monitors, Encourages, Facilitator.
•Students: Active, Interact, Center of attention, Engaged.
•System: Lexical
•Skills: Speaking, Listening, Writting, Reading.
• Advantages: Free Language control, Ss needs, Natural
Context, Enjoyable and motivational, Focused on Meaning

More Related Content

What's hot

powerpoint Whole language
powerpoint Whole languagepowerpoint Whole language
powerpoint Whole languageazharaan1
 
Communicative language teaching
Communicative language teachingCommunicative language teaching
Communicative language teachingMarisa Huaccho
 
Music Therapy for Reading Intervention
Music Therapy for Reading InterventionMusic Therapy for Reading Intervention
Music Therapy for Reading Intervention
Mimi Sinclair
 
Ch 9 communicative language teaching
Ch 9 communicative language teachingCh 9 communicative language teaching
Ch 9 communicative language teachingjcckao
 
Ls & cs
Ls & csLs & cs
Ls & cs
wajiha khan
 
GLOSSARY
GLOSSARYGLOSSARY
GLOSSARY
laurainfantil2
 
The definition of CLT By Alireza Sadeghiyan - www.academia.edu
The definition of CLT By Alireza Sadeghiyan - www.academia.eduThe definition of CLT By Alireza Sadeghiyan - www.academia.edu
The definition of CLT By Alireza Sadeghiyan - www.academia.edu
Alireza Sadeghian
 
Cll community language learning
Cll community language learningCll community language learning
Cll community language learning
Siwar Bdioui
 
Designer Or Humanist Methods
Designer Or Humanist MethodsDesigner Or Humanist Methods
Designer Or Humanist Methodsinakobass
 
Whole Language Approach
Whole Language ApproachWhole Language Approach
Whole Language ApproachBench Delima
 
Approaches in english language learning 1
Approaches in english language learning      1Approaches in english language learning      1
Approaches in english language learning 1Merve Özdemir
 
Community Language Learning ( CLL )
Community Language Learning ( CLL )Community Language Learning ( CLL )
Community Language Learning ( CLL )
Youngphilosopher
 
Suggestopedia Method of Teaching
Suggestopedia Method of TeachingSuggestopedia Method of Teaching
Suggestopedia Method of Teaching
Sabilla Ramadhani
 
Nyikos Strategy Presentation07
Nyikos Strategy Presentation07Nyikos Strategy Presentation07
Nyikos Strategy Presentation07Dr. Cupid Lucid
 
Communicative approach
Communicative approachCommunicative approach
Communicative approachcamimf
 
Reading Approach
Reading ApproachReading Approach
Reading ApproachStefy Angel
 
Communicative language teaching
Communicative language teachingCommunicative language teaching
Communicative language teaching
Valeria Roldán
 
Community language learning
Community language learningCommunity language learning
Community language learning
San Juan
 

What's hot (20)

powerpoint Whole language
powerpoint Whole languagepowerpoint Whole language
powerpoint Whole language
 
Communicative language teaching
Communicative language teachingCommunicative language teaching
Communicative language teaching
 
Music Therapy for Reading Intervention
Music Therapy for Reading InterventionMusic Therapy for Reading Intervention
Music Therapy for Reading Intervention
 
Ch 9 communicative language teaching
Ch 9 communicative language teachingCh 9 communicative language teaching
Ch 9 communicative language teaching
 
Ls & cs
Ls & csLs & cs
Ls & cs
 
GLOSSARY
GLOSSARYGLOSSARY
GLOSSARY
 
The definition of CLT By Alireza Sadeghiyan - www.academia.edu
The definition of CLT By Alireza Sadeghiyan - www.academia.eduThe definition of CLT By Alireza Sadeghiyan - www.academia.edu
The definition of CLT By Alireza Sadeghiyan - www.academia.edu
 
Whole language
Whole languageWhole language
Whole language
 
Natural approach ii
Natural approach iiNatural approach ii
Natural approach ii
 
Cll community language learning
Cll community language learningCll community language learning
Cll community language learning
 
Designer Or Humanist Methods
Designer Or Humanist MethodsDesigner Or Humanist Methods
Designer Or Humanist Methods
 
Whole Language Approach
Whole Language ApproachWhole Language Approach
Whole Language Approach
 
Approaches in english language learning 1
Approaches in english language learning      1Approaches in english language learning      1
Approaches in english language learning 1
 
Community Language Learning ( CLL )
Community Language Learning ( CLL )Community Language Learning ( CLL )
Community Language Learning ( CLL )
 
Suggestopedia Method of Teaching
Suggestopedia Method of TeachingSuggestopedia Method of Teaching
Suggestopedia Method of Teaching
 
Nyikos Strategy Presentation07
Nyikos Strategy Presentation07Nyikos Strategy Presentation07
Nyikos Strategy Presentation07
 
Communicative approach
Communicative approachCommunicative approach
Communicative approach
 
Reading Approach
Reading ApproachReading Approach
Reading Approach
 
Communicative language teaching
Communicative language teachingCommunicative language teaching
Communicative language teaching
 
Community language learning
Community language learningCommunity language learning
Community language learning
 

Viewers also liked

The poverty literacy connection
The poverty literacy connection The poverty literacy connection
The poverty literacy connection
Lindall Adams
 
Text 8 words-native_and_borrowed
Text 8 words-native_and_borrowedText 8 words-native_and_borrowed
Text 8 words-native_and_borrowedjarosalestorres
 
SotM US 2012 keynote
SotM US 2012 keynoteSotM US 2012 keynote
SotM US 2012 keynoteHenk Hoff
 
Text 5 sociolinguistic_patterns
Text 5 sociolinguistic_patternsText 5 sociolinguistic_patterns
Text 5 sociolinguistic_patternsjarosalestorres
 

Viewers also liked (8)

Presentación1
Presentación1Presentación1
Presentación1
 
The poverty literacy connection
The poverty literacy connection The poverty literacy connection
The poverty literacy connection
 
English culture
English cultureEnglish culture
English culture
 
Words borrowed
Words borrowedWords borrowed
Words borrowed
 
Text 8 words-native_and_borrowed
Text 8 words-native_and_borrowedText 8 words-native_and_borrowed
Text 8 words-native_and_borrowed
 
SotM US 2012 keynote
SotM US 2012 keynoteSotM US 2012 keynote
SotM US 2012 keynote
 
Text 5 sociolinguistic_patterns
Text 5 sociolinguistic_patternsText 5 sociolinguistic_patterns
Text 5 sociolinguistic_patterns
 
Famc3adlia
Famc3adliaFamc3adlia
Famc3adlia
 

More from jarosalestorres

Comparative essay final edition
Comparative essay final editionComparative essay final edition
Comparative essay final editionjarosalestorres
 
Teaching vocabulary to advanced students
Teaching vocabulary to advanced studentsTeaching vocabulary to advanced students
Teaching vocabulary to advanced studentsjarosalestorres
 
Words native and borrowed
Words native and borrowedWords native and borrowed
Words native and borrowedjarosalestorres
 
Text 9 teaching_vocabulary_to_advanced_students
Text 9 teaching_vocabulary_to_advanced_studentsText 9 teaching_vocabulary_to_advanced_students
Text 9 teaching_vocabulary_to_advanced_studentsjarosalestorres
 
Vocabulary to advanced students
Vocabulary to advanced studentsVocabulary to advanced students
Vocabulary to advanced studentsjarosalestorres
 
Sociolinguistic patterns
Sociolinguistic patternsSociolinguistic patterns
Sociolinguistic patternsjarosalestorres
 
Text 8 words-native_and_borrowed
Text 8 words-native_and_borrowedText 8 words-native_and_borrowed
Text 8 words-native_and_borrowedjarosalestorres
 

More from jarosalestorres (12)

Final extended version
Final extended versionFinal extended version
Final extended version
 
Comparative essay final edition
Comparative essay final editionComparative essay final edition
Comparative essay final edition
 
An inconvenient truth
An inconvenient truthAn inconvenient truth
An inconvenient truth
 
Teaching vocabulary to advanced students
Teaching vocabulary to advanced studentsTeaching vocabulary to advanced students
Teaching vocabulary to advanced students
 
Words native and borrowed
Words native and borrowedWords native and borrowed
Words native and borrowed
 
Text 9 teaching_vocabulary_to_advanced_students
Text 9 teaching_vocabulary_to_advanced_studentsText 9 teaching_vocabulary_to_advanced_students
Text 9 teaching_vocabulary_to_advanced_students
 
Vocabulary to advanced students
Vocabulary to advanced studentsVocabulary to advanced students
Vocabulary to advanced students
 
Global warming
Global warmingGlobal warming
Global warming
 
Sociolinguistic patterns
Sociolinguistic patternsSociolinguistic patterns
Sociolinguistic patterns
 
English language
English languageEnglish language
English language
 
Text 8 words-native_and_borrowed
Text 8 words-native_and_borrowedText 8 words-native_and_borrowed
Text 8 words-native_and_borrowed
 
Words borrowed
Words borrowedWords borrowed
Words borrowed
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Tba didactics ppt.docx

  • 1. By Juan Rosales Torres & Victor Gonzalez Fuentes
  • 2. 1. Pre-Task: Clear instructions. The aim is mentioned. 2. Task: Ss work in pairs or groups. The T monitors. 3. Review : • Planning: Preparation of an oral or written report. • Report: Presentation to the T and Ss. • Analysis: Highlight the language and relevant parts. • Practice: Feedback based on the Ss’ needs.
  • 3.
  • 4.
  • 5. -Information - gap activity. -Opinion - gap activity. -Reasoning - gap activity.
  • 6. •Teacher: Monitors, Encourages, Facilitator. •Students: Active, Interact, Center of attention, Engaged. •System: Lexical •Skills: Speaking, Listening, Writting, Reading. • Advantages: Free Language control, Ss needs, Natural Context, Enjoyable and motivational, Focused on Meaning