The Copyless Classroom
Participate and share : Interactive lecture
Wednesday, June 27, 9:00–10:00 am
Katherine Leatherman Jason Mammano
The “paperless classroom” is a fallacy that both sets the teacher up for failure and has been shown to be detrimental to student learning. Instead, the goal should be to have a classroom free from copies. A combination of digital tools and notetaking strategies for your students will be discussed.
|Attendee devices:||Devices useful|
|Attendee device specification:||Laptop: Chromebook, Mac, PC
|Participant accounts, software and other materials:||G Suite for Education compatible applications will be a focus.|
|Focus:||Digital age teaching & learning|
|Topic:||BYOD/1:1 instructional programs|
|ISTE Standards:||For Educators:
Participants will be able to articulate the importance of paper/pencil notetaking, and three methods to introduce to their students. Participants will be able to identify methods of teacher input during instruction with tools such as Google Classroom, EdPuzzle, and Quizlet. Participants will be able to identify methods of student output using tools such as Adobe Spark, Google Sites, and other creation tools.
Fallacies to the paperless classroom (2 min.)
Why paper/pencil notetaking? (5 min.)
Experience sketchnoting! (15 min.; sketchnote 5 tips for sketchoting)
Teacher input tools - giving your students content (15 min.; optional device-based activities)
Student output tools - allowing students to produce and create content (20 min.; optional device-based activities)
Closing/Reflection (3 min.)
Mueller, Pam A., & Oppenheimer, Daniel M. (2014). The Pen is Mightier than the Keyboard. DOI: 10.1177/0956797614524581
May, Cindy. (2014). A Learning Secret: Don’t Take Notes with a Laptop. Scientific American.
Instructional Technology Facilitator, Google Certified Trainer, Unabashed geek and outdoor enthusiast.
Every Child, Every Day: Making Access a Priority Despite the Odds
Green Screen Playground: Creative Kids Go Beyond 'Reporting Live'
Snap1A: Technology Planning, Safety and Security: The Spectrum Approach