AT+Brown+Ruth

Samples of unit [|assessment timeline]. No preparation || Students read a list of objectives. If they feel they know the objective, they put a check mark in the before column. || At the end of the unit, students will place check marks in the after column. Students will feel confident about what they know. || Create Wiki Page || On a daily basis, at the end of each class, students will reflect and log what they accomplished that day and what they learned that day. || In real life, computer technicians need to keep documentation logs so their employers can accurately bill customers and document problems and solutions. At the end of the unit, students will feel a sense of accomplishment for their hard work. || Jigsaw Activity Review Vocabulary || Students will divide the objectives of the lesson and have an opportunity to teach their section to the class. || Students will gain knowledge of Computer Security and analyzing threats, as well as gaining experience working as part of the team. || No preparation || Students will install antivirus software, anti-spyware software, and clean a PC from malware. || Students will gain hands-on experience cleaning a PC of malware, and documenting the process. || Download & install Jing || Students will have the opportunity to document how to clean a PC with screenshots and teach the process to someone else. || Students will reinforce their knowledge of how to clean a PC from malware using screenshots, and sharing teaching this important skill to a relative or friend that is not part of the class. || Life Preview Software || Students will have the opportunity to analyze the perspective of a hacker. || Students will have an opportunity to get creative using Comic Life to explore the thought process of a hacker. || Preview Software || Students will have an opportunity to demonstrate empathy about computer security by using Xtranormal. || Students will have the opportunity to experience writing a script before their major project. They will also have an opportunity to reflect about exactly what computer security entails. || No Preparation || Students will write a security policy for a computer repair business. || Students will be able to have empathy for business owners and employees. They will also realize why employers need to have computer security policies in the workplace. Students will realize that there are activities that employees should not engage in at work. || Preview Software || Students will create a video about computer security and how to analyze threats. || Students will demonstrate their knowledge about computer security and how to analyze the threats in a video. || Assessment No preparation || 20 question multiple choice/multiple answer assessment || Students will learn about real world assessments to demonstrate knowledge. ||
 * Assessment Timeline **
 * Select the appropriate level - Elementary or Secondary
 * Select a sample unit and scroll down to the assessment timeline.
 * Use the information from your Stages 2 and 3 and create your assessment timeline using the tables below.
 * **Before project will begin** || **Students work on projects and complete tasks** || **After project work is completed** ||
 * Anticipation Guide
 * Journal/Log
 * PowerPoint/
 * Lab Report
 * Jing Assignment
 * Comic
 * Xtranormal
 * Security Policy
 * iMovie
 * Cisco On-line

Retake || Cisco will gain experience with work place third party assessments. || Summative || Quantitative || 50 pts. || Quantitative || 100 pts. ||
 * **Assessment** || **Process and Purpose of Assessment** || **Formative/Summative** || **Qualitative/Quantitative** || **Value** ||
 * PowerPoint || Students will create a powerpoint over a few objectives of the lesson. Then, students will export to Word and create a copy of slides and lines for classmates to take notes. Students will share information from the uploaded powerpoint slide that have been uploaded to a class Wiki. This is a jigsaw activity and students will be working cooperatively in pairs.(Explain) || Summative || Quantitative || 50 pts. ||
 * Lab Report || Students will gain hands-on experience removing malware from a PC. (Apply) || Summative || Quantitative || 50 pts. ||
 * ScreenShots || Students will create a series of screenshots and use them to teach a relative or peer not in the class how to remove malware. (Interpret) || Summative || Quantitative || 25 pts. ||
 * Xtranormal Video || Students will create a video demonstrating their knowledge of computer security and analyzing threats. (Empathy) || Summative || Quantitative || 50 pts. ||
 * Acceptable Use Policy || Students will learn what employers expect from employees in reference to computer security. What would make an employer fire someone for an activity on a computer. (Self-Knowledge) || Summative || Quantitative || 50 pts. ||
 * Cisco Assessment || Students will gain experience with work related third party assessments for computer technicians. || Formative || Quantitative || N/A ||
 * Comic Life Artifac || Students will think like a hacker and demonstrate acquired knowledge with a cartoon created in comic life. (Perspective) || Summative || Quantitative || 50 pts. ||
 * iMovie || Students will demonstrate expertise with a high quality video produced for You Tube, the local access channel or adult ed. || Summative || Quantitative || 175 pts. ||
 * Cisco Assessment
 * Journal/Log || Students will reflect on learning and document what they are doing. Excellent practice for Computer Repair Technicians because employers often lose money because technicians are not trained to document their work. || Formative || Qualitative