Selecting integerated learning experiences, Computer Engineering

Assignment Help:

Q. Selecting integerated learning experiences?

It is important that we select appropriate experiences for children, more so those that are from the child's world and emerge from their interest. The teacher can develop, and plan for experiences to be made available for children using their interest as the starting point. A variety of activities are then provided, which children and the teacher discuss jointly. For example, the experiences could relate to arrival of migratory birds because some children noticed them, harvesting season, because the whole community is busy at that time and the children are necessarily going to be influenced by it. It may even be festivals that are celebrated in the community like "Id".

"Diwali", "Pateti", "Christmas" etc. or a recent calamity like the floods, or an earthquake, a theft in a nearby locality or even a road, train or airplane accident. An experience may then develop into a project. This project can develop from something that the children bring up. Let us look at what happened in one school. At the beginning of the term, in a sixth grade class, children had come to school with new shoes and new bags!

Each child had a different type of shoe although each of them had white ones, some of the children had Velcro to tie up the shoes, others had laces while still others did not have anything to tie the shoes, and they wore ‘slip on' shoes. Children were then fascinated with shoes and the variety. The teacher took notice of that fascination and developed an entire project on shoes, dealing with all the aspects of the curriculum.

(The project details could be simplified, detailed or complex, in order to suit the curriculum of any class from pre-school to the 10th grade or even higher, depending on the developmental level of the children.)


Related Discussions:- Selecting integerated learning experiences

Illustrate the encryption and decryption methods, Illustrate the Encryption...

Illustrate the Encryption and Decryption methods One of the best method of ensuring security is to change the form of communication. Let the messages be encoded in such a patte

What is the function of a tlb, What is the function of a TLB (translation...

What is the function of a TLB (translation look-aside buffer)? A small cache called the TLB is interporated into MMU, which having of the page table entries that correspondi

Critical capabilities for superior firm performance, What are the critical ...

What are the critical capabilities for superior firm performance in e-commerce? Three firm capabilities which are critical for superior firm performance within e-commerce are:

Describe generic framework for electronic commerce, Describe generic framew...

Describe generic framework for electronic commerce Generic Framework for electronic commerce contains the Applications of EC   (like as banking, shopping in online stores and m

Define opcode and operands, Q. Define Opcode and Operands? The most com...

Q. Define Opcode and Operands? The most common fields which are found in instruction formats are: Opcode: (What operation to perform?)  An operation code field cal

Convert the decimal number to excess-3 code, Convert the decimal number 430...

Convert the decimal number 430 to Excess-3 code ? Ans. Excess  3  is  a  digital  code  acquired  from  adding  3  to  every  decimal  digit  and  after that converting the res

Function name or connective symbol, Function name or connective symbol: ...

Function name or connective symbol: Whether if we write op(x) to signify the symbol of the compound operator then predicate name and function name or connective symbol are the

Illustrate function of 4-input multiplexer using basic gates, Illustrate fu...

Illustrate functional diagram of digital multiplexer . Write the scheme of a 4- input multiplexer using basic gates (AND/OR/NOT) and explain its operation. Ans: Multiple

Power and energy, Ask questiPower and EnergyQuestion 4Consider a processor ...

Ask questiPower and EnergyQuestion 4Consider a processor that runs at 2.5 GHz and 1 Volt. When running a given CPU-bound program,the processor consumes 100 W, of which 20 W is leak

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd