15
30 Secrets Of A Good Computer Lesson 1. The lesson forms part of a unit which forms part of a scheme of work. 2. There is a good starter activity, one that gets the pupils settled down an in the right frame of mind to do the work you've planned for them. 3. The teacher spends time at the start letting pupils into the secret what the objectives (intended learning outcomes) of the lesson are, ie what is intended to be achieved by the end, and how this lesson fits in with the preceding and following lessons 4. Pupils are given open ended tasks (as far as possible), or at least not tasks with a glass ceiling. (Even lessons designed to impart a set of skills can still be more interesting than "drill & practice"). 5. There are plenty of resources for the pupils to use, enabling the teacher to give QUALITY guidance, ie not confined to explaining how to save the document! Such resources will include "how to' guides and posters, on screen help (which the pupils will have been taught how to use), and each other. 6. Ample time is allowed for the plenary, thereby allowing it to be somewhat more useful than the POLO model: Print Out and Log Off. The plenary is an ESSENTIAL part of the lesson, used to check what learning has taken place, consolidate learning, and prepare pupils for the next stage. In fact, a lesson might have two or three plenaries rather than just one at the end. 7. Homework is set at the START of the lesson, enabling the teacher to explain what needs doing, and for the pupils to understand what they need to have achieved by the end of the lesson in order to be able to make a good job of the homework; note that homework is ALWAYS given, regardless of so called homework timetables! (It doesn't always have to be written down.

30 secrets of a good computer lesson

Embed Size (px)

Citation preview

Page 1: 30 secrets of a good computer lesson

30 Secrets Of A Good Computer Lesson

1. The lesson forms part of a unit which forms part of a scheme of work.

2. There is a good starter activity, one that gets the pupils settled down an in the right frame of mind to do the work you've planned for them.

3. The teacher spends time at the start letting pupils into the secret what the objectives (intended learning outcomes) of the lesson are, ie what is intended to be achieved by the end, and how this lesson fits in with the preceding and following lessons

4. Pupils are given open ended tasks (as far as possible), or at least not tasks with a glass ceiling. (Even lessons designed to impart a set of skills can still be more interesting than "drill & practice").

5. There are plenty of resources for the pupils to use, enabling the teacher to give QUALITY guidance, ie not confined to explaining how to save the document! Such resources will include "how to' guides and posters, on screen help (which the pupils will have been taught how to use), and each other.

6. Ample time is allowed for the plenary, thereby allowing it to be somewhat more useful than the POLO model: Print Out and Log Off. The plenary is an ESSENTIAL part of the lesson, used to check what learning has taken place, consolidate learning, and prepare pupils for the next stage. In fact, a lesson might have two or three plenaries rather than just one at the end.

7. Homework is set at the START of the lesson, enabling the teacher to explain what needs doing, and for the pupils to understand what they need to have achieved by the end of the lesson in order to be able to make a good job of the homework; note that homework is ALWAYS given, regardless of so called homework timetables! (It doesn't always have to be written down.

8. Pupils are given plenty of time on the computers, with the teacher helping individuals and small groups.

9. Work is set at an appropriate standard, taking into account the pupils’ prior learning and attainment, and what is expected of their age group in terms of national standards.

10. There is a lot of questioning â€" PROBING questioning â€" and assessment for learning techniques in evidence.

11. There is a good range of material to provide for differentiation (higher attainers and children with special educational needs) and personalised learning.

12. The teacher is aware of individual pupils’ needs, such as their individual education plans â€" and makes use of the assessment and other data she has â€" remember: data only becomes information if you DO something with it!

Page 2: 30 secrets of a good computer lesson

13. Not all work takes place at the computer.

14. Pupils come in on time, prepared, and ready to start work.

15. There is a good buzz in the room pupils are talking about the work, not last night's TV programs.

16. Pupils organise themselves and, if working in groups, work collaboratively rather than competitively at least with other members of their own group!

17. Pupils don't keep asking the time, unless they are worried about not being able to complete the work (see below though) and don't notice the time going by.

18. Pupils don't understand the concept of finishing the work in the sense of having time left over to check email, play Solitaire etc.

19. Pupils, even normally poorly behaved ones, ask to be allowed to stay on, come back at lunchtime or come back early in the morning.

20. Pupils respect the equipment and the room. For example, they do not leave discarded print outs on the floor.

21. Pupils are happy and confident enough to try out things you haven't shown them: they ask help from each other or look at the posters and manuals that are available for them.

22. If you interrupt their work in order to announce or explain something, someone asks you to hurry up so that they can get back to their work.

23. Pupils do a greater amount work, say for homework, than you have asked them to. For example, instead of conducting a survey with 10 people they decide to ask 20.

24. Pupils do a wider range of work than you have asked them to. For example, instead of just writing about what the hospital of the future will be like, they canvass the views of others and carry out some research about current developments.

25. Pupils want to show off to you little tricks they have discovered, such as keyboard shortcuts.

26. Pupils talk to their friends about the lesson.

27. Pupils discuss with their friends the possibility of taking a particular ICT course in 3 years time.

28. Pupils not only want to assist at open evenings/days, but are able to look after and even create an ICT presentation on your behalf.

29. Pupils are able to help other (younger or older) pupils with confidence and enthusiasm.

Page 3: 30 secrets of a good computer lesson

30. Pupils ask you questions that you are unable to answer.

This article is (c) 2005 Terry Freedman

About the author:

Terry Freedman has nearly thirty years' experience in education, and nearly 20 years' experience as a writer. A member of the UK's Society of Authors, Terry has had around a dozen books published, and over 800 specialist articles in leading newspapers and magazines.

Written by: Terry Freedman

NAVIGATION

10 Easy Steps to Speed Up Your Computer Without Upgrading

10 Power Tips for Presentations with Computer Projection

10 PROVEN TIPS TO SURVIVE A COMPUTER CRASH

10 Secrets To A Healthy Computer And A Happier You

10 Tips on Computer Clutter Clean Up

14 Household Ways To Protect Your Computer From Viruses

3 Simple Ways To Save A Bunch Of Money When Buying A New Computer

3 Summer Computer Tips

4 Computer Money saving Tips

5 Critical Steps to Protecting Your Computer on the Internet

5 Simple Ways To Increase Your Computer Speed

5 Stress Reducing Computer Tips

Page 4: 30 secrets of a good computer lesson

5 Sure Fire Tips for Buying a New Computer

5 Tips For Buying The Right Laptop Computer

5 Tips to Color Code Your Way from Computer Chaos to Coherence

5 Ways To Make Night And Weekend Computer Life Rich

5th generation Computers Corporate infrastructure

6 Essential Steps to Protect Your Computer On the Internet For Free

6 tips for Keeping Aurora Away from your computer and 1 tip to Fix it if Aurora has Gotten You

7 Barebones Computer Buying Tips

A Guide to Computer Desks

A Hacker Inside Your Computer

A Look at Computer Desks for Children

Advancement in Computer Technology

Adware Are Your Business s Computers Secure

All About Computer Viruses

An eBay Computer Purchase

Are cyber criminals phishing your identity from your computer

Are You At The Mercy Of Computer Geeks

Are You Being Mislead By Your Current Computer Dealer

Are You Making Any Money With Your Computer Yet

Are You Saving Money With a Computer Support Plan

Avoiding Spam Scams and Computer Viruses

Back that Thang UP Insure the Data on Your Computer

Basic Computer Thermodynamics

Page 5: 30 secrets of a good computer lesson

Be Prepared in the Event Computer Disaster Strikes

Beat The Bugs Helpful Links That May Help You Combat Annoying Computer Viruses

Becoming a Computer Trainer

Beeps Your computer is telling you something

Broadcasting Mp3 Audio Via Computer The Looney Tune World Of Podcasting

Build your first computer from hardware scratches

Build Your Own Computer

Build Your Own Computer or Buy

Build Your Own Computer What to Look for in a Case

Buy a home through your home computer

Buying a computer Ask these 3 questions

Buying a Used Laptop Computer

Buying computers at a discount with peace of mind

Buying DDR memory for your computer

Buying Guide for Laptops Personal Computers Notebooks

Buying the Perfect Computer The FIRST Time

Career Track Computer Programmer

Career Track Computer Software Engineers

Choosing a Laptop Computer Based on Hardware and Software Needs

Classification of Computers

Combat Computer Spyware An AntiSpyware Program Isn t Enough

Computer Aided Design Contracting Tax Concerns In The UK

COMPUTER BACKUPS

Page 6: 30 secrets of a good computer lesson

Computer Business Opportunity Provide Huge Profit Potential

Computer Buying Advice For Novices

Computer Career

Computer Case Modding

Computer Cases The Basics

Computer Certification Anticipation vs Nervousness

Computer Certification Become A Utility Player

Computer Cleaning

Computer Cleaning May Be The Best Home Based Part time or Full time Business

Computer Components for Idiots

Computer Consulting 101 Hiring Tips Part 1 of 2

Computer Consulting Profit Secrets

Computer Controlled LED Signs

COMPUTER COURTESY

Computer Data Backup Data Backup Solution Will Give You A Peace Of Mind

Computer Data Backups Test Now or Cry Later

Computer Data Recovery Options

Computer Disposal Throwing Away Your Computer Money and Idenity

Computer Do s and Don ts

Computer Equipment Disposals and Recycling

Computer Geeks and Garden Gnomes

Computer Graphics They re Not All The Same

Computer Hacks Quacks Looking for Cracks

Page 7: 30 secrets of a good computer lesson

Computer Hardware Preventive Maintenance Software

Computer Help Desk Stupid Questions brought to you by Computer Service Now CSN

Computer Homeschooling the added advantage in african american children s education Part 1

Computer Hygiene Take Out The Trash

Computer In The Shop What Do You Do Now

Computer Insurance

Computer Loans An opportunity to have a computer of your own

Computer Loans Become Techno Savvy the Easier Way

Computer Maintenance and Improving PC Performance

Computer Monitor Buying Guide

Computer Network Designing

Computer Network Installation

Computer Profits From Home What s Right for You

Computer Rental Worth Your Money

Computer Rentals The Best Classroom Computer Training Solution

Computer Running Slow Here s One Reason

Computer Security What Exactly Is It

Computer software Excellent prices

Computer Software Genres That Help Students Think

Computer SOS Inc Release of Upgraded League Management Software Package

Computer Support London Network Support London Network Installation London

Computer Tips that Help Small Businesses Operate Profitably

Computer Traumas

Page 8: 30 secrets of a good computer lesson

COMPUTER VIRUS THREATENS MY HOME BUSINESS

Computer Virus Writer s A Few Bats In The Belfry

Computer Viruses are Bad Luck

Computer Viruses Worms and Hoaxes

Computers and Internet Inspiring Us to Create

Computers and Web Cams are Taking Communication to Levels Only Imagined in Sci Fi Novels

Computers Are Not Scary

Computers are Running My Life

Computers Freedom and Privacy

Computers Introverts and the Information Age

Computers You CAN Master Any Program

Coping with a Serious Data Loss from your Computer Hard Drive

Corporate infrastructure for Fifth generation Computers

Corporate Promotional Gifts The Fridge Magnet Is Dead Long Live the Computer Desktop

Countering the Spread of Spyware on your Computer

D BUST Your Computer Part 1 Instructions for Microsoft Users

D BUST Your Computer Part 2 for Microsoft users

D BUST Your Computer Part 3 for Microsoft users

D BUST Your Computer Part 4 a for Microsoft users

D BUST Your Computer Part 4 b

D BUST Your Computer Part 4 c

D BUST Your Computer Part 4 d

D BUST Your Computer Part 5

Page 9: 30 secrets of a good computer lesson

Definitions for Computer Modding and Form Factor

Dell Computer Corporation Recall of Latitude Inspiron Laptop AC Adapters

Detecting and Eliminating Computer Viruses at the Gateway

Did You Ever Want to Completely Erase Everything on Your Computer

Different Categories of Computer Games

Dirty Little Computer Viruses and How To Protect Yourself

Distance Learning and Elearning for Computer Techs

Do The Media Spread Computer Viruses

Do You Feel Used by Computers

Do You Know How To Remove Spyware From Your Computer

Do you know who is snooping around your computer right now

Do you need computer training

Dual core computer processors luxury or necessity

Dusting Your Computer Keeping it Cool

Expansion Slots Cards and Bays Choosing the right computer case

Extending the Life of Your Business or Personal Computer Printer

Finally An Understandable Introduction To Computers

Five Simple Steps to Speed up Your Computer

Focus On White Collar Crime Accounting Fraud and Computer Crimes Creates Need For Qualified Investigators

Gaming Computers and Computer Modding

Get Ahead When You Build Your Own Computer

Get Started in Computer Game Creation

Get Valuable Computer Based Training Online FREE

Page 10: 30 secrets of a good computer lesson

Getting Started In Information Technology Computer Consulting

Good News Bad News of Computer Security from a Keen Non Techie

Guide on How to Land Computer Jobs

Hackers Given Access to IRS Computers

Hardware for Computer Desks

Have You Invited A Spy Into Your Computer

Healthy Webmasters Choose Ergonomic Computer Products

Heliodisplay Computer Video With No Screen

Help Keep the Computers on Earth Clean and Healthy

Help Keep The Computers On Earth Clean And Healthy Protect Your Techno Friends From Viruses And Sickness

Help My Computer s Being Invaded

Help There s an Intruder in my Computer

Hidden information is stored on your computer about every url you ever visit

Home Computer Desks A Variety of Options

Home Office Tip 2 Computer Health Hazards

How a Computer Consulting Business Can Help Your Company

How Much Money would it cost you to regain the use of your computer after a serious virus infection

How Protected are You Safeguard Your Small Business from Computer Viruses

How Safe is Your Critical Business Data on Your Computer System

How Spyware Blaster Can Protect Your Computer From Harm

How to backup your computer data

How to Backup Your Computer Files

Page 11: 30 secrets of a good computer lesson

How to Become a Computer Consultant

How To Buy The Right Computer

How to choose a new hard drive for your computer

How to choose your computer

How To Deal With Computer Problems

How to Get a FREE Computer Scale Printer from DHL

HOW TO GET THE COMPUTER YOU WANT WITHOUT SPENDING A FORTUNE

How to Have Your Computer Cake and Keep Your Family Too

How To Keep Your Computer Virus Free

How To Optimize Your Online Time Through Efficient Computer Use

How to Prevent Computer Security Risk and How to Keep Your Small Business Safe

How To Prevent Spyware Attacking Your Computer

How To Recognize If Your Computer Has A Virus Or Trojan On It

How to reduce Computer problems

How to safeguard your computer

How To Save Big Bucks On A Laptop Computer

How To Stop The 1 Cause Of Computer Slow Downs And Crashes

How To Take Care Of Your Laptop Computer

How To Take Good Care Of Your Computer Even If You Are A Clueless Newbie

How To Work At Home Using Your Computer Even If You Can t Type

How Viruses and Spyware Get In to your computer

HR MANAGERS USE COMPUTER FORENSICS TO INVESTIGATE EMPLOYEE ALLEGATIONS

Page 12: 30 secrets of a good computer lesson

Hurricanes Wilma Katrina And Rita Force Businesses To Rethink Computer

I Spy Something Terribly Wrong In Your Computer

If You Had Problems in the Past with a Computer Virus Then You ll Want to Know How Easy it is to Setup Firewall Protection

Image conversion In Computers

Important Steps to Protect your Computer from Hurricanes