Portfolio


 * **Sources of Information** ||
 * //**Essential Standard**// || //**Clarifying Objectives**// || //**Evidence**// ||
 * **8.SI.1** **Evaluate information resources based on specified criteria.** || 8.SI.1.1 Evaluate resources for reliability. (Reliability can be determined by currency, credibility, authority, etc. depending on the curriculum topic). || 8.SI.1.1 ||
 * ^  || 8.SI.1.2 Evaluate content for relevance to the assigned task. || 8.SI.1.2 ||
 * ^  || 8.SI.1.3 Evaluate resources for point of view, bias, values, or intent of information. || 8.SI.1.3 ||
 * **Technology as a Tool** ||
 * //**Essential Standard**// || //**Clarifying Objectives**// || //**Evidence**// ||
 * **8.TT.1** **Use technology and other resources for assigned tasks.** || 8.TT.1.1 Use appropriate technology tools and other resources to access information (search engines, electronic databases, digital magazine articles). || 8.TT.1.1 ||
 * ^  || 8.TT.1.2 Use appropriate technology tools and other resources to organize information (e.g. graphic organizers, databases, spreadsheets, and desktop publishing). || 8.TT.1.2 ||
 * ^  || 8.TT.1.3 Use appropriate technology tools and other resources to design products to share information with others (e.g. multimedia presentations, Web 2.0 tools, graphics, podcasts, and audio files). || 8.TT.1.3 ||
 * **Research Process** ||
 * //**Essential Standard**// || //**Clarifying Objectives**// || //**Evidence**// ||
 * **8.RP.1** **Apply a research process to complete project-based activities.** || 8.RP.1.1 Implement a project-based activity collaboratively. || 8.RP.1.1 ||
 * ^  || 8.RP.1.2 Implement a project-based activity independently. || 8.RP.1.2 ||
 * **Safety and Ethical Issues** ||
 * //**Essential Standard**// || //**Clarifying Objectives**// || //**Evidence**// ||
 * **8.SE.1** **Analyze responsible behaviors when using information and technology resources.** || 8.SE.1.1 Analyze ethical behavior (copyright, not plagiarizing, netiquette) when using resources. || 8.SE.1.1. ||
 * ^  || 8.SE.1.2 Analyze safety precautions when using online resources (personal information, passwords, etc.). || 8.SE.1.2 ||