Benchmark Assessment 672-Fall B04 – Curriculum Development

38
Running head: BENCHMARK ASSESSMENT 1 Benchmark Assessment Robert T. Williams Liberty University Dr. Rick Bragg 2014 EDUC 672-Fall B04 – Curriculum Development December 14, 2014

Transcript of Benchmark Assessment 672-Fall B04 – Curriculum Development

Running head: BENCHMARK ASSESSMENT1

Benchmark Assessment

Robert T. Williams

Liberty University

Dr. Rick Bragg

2014 EDUC 672-Fall B04 – Curriculum Development

December 14, 2014

BENCHMARK ASSESSMENT2

Introduction

School systems throughout the nation use benchmark

assessments to administer short tests, which provide information

about students’ academic knowledge. Throughout the school year,

students are periodically tested. These assessments alert

district-level, school, and decision-making personnel about the

increase or decrease in students’ knowledge and skills

comparative to long-term learning goals. Data is obtained and

personnel uses it to determine if districts, schools, and

students are meeting specific year-end goals. With technological

advancements and the enactment of the No Child Left Behind Act of

2001, educational leaders hope students will meet the challenges

of the new global societal changes.

Assessments

Keyboarding

1. What is the importance for mastering keyboarding?

a. A person can think better, because he or she can have

his or her ideas recorded before they are forgotten.

BENCHMARK ASSESSMENT3

b. A larger job market is available for people with

keyboarding skills.

c. It is an important tool to have to participate in a

social media society.

d. All of the above.

2. 30 words per minute (WPM) and 90 percent accuracy are the

accepted minimum for eighth grade students. True/False

3. Describe touch keyboarding and proper keyboarding

techniques.

4. Where is the numeric keypad located on the keyboard?

5. Which are the home row keys?

a. QWERTYUIOP

b. ZXCVBNM,./

c. 1234567890

d. ASDFGHJKL;’

6. What is the standard type of layout for keyboards?

7. What are the purposes for using the three finger salute or

Ctrl-Alt-Delete function?

BENCHMARK ASSESSMENT4

8. Why is the UltraKey software most prevalent by school

districts nationwide?

9. How many types of keys are there on the keyboard? Give an

example of each.

10. Which are the anchor keys?

a. E and Y.

b. F and J.

c. Q and P.

d. G and H.

11. Handwriting skills affect the ability to learn

keyboarding. True/False

12. Users must change the __ to display another style of

lettering.

a. font

b. header

c. landscape

d. None of the above.

13. What is the function of the shift key?

a. It turns letters into numbers.

BENCHMARK ASSESSMENT5

b. It makes lower case letters into capital letters.

c. It allows the user to play video games.

d. B and C.

14. The user’s eyes should be viewing the data source or

monitor while typing. True/False

15. Describe the basic word processing formatting skills.

16. Identify the parts of letters, envelopes, faxes, and

electronic mails (e-mails). What is the difference between

a business letter and a personal letter?

17. Drills and timed writings will increase accuracy, but

not speed. True/False

18. Describe the editing process of a Word document.

19. From the answers given, the most important typing skill

to develop is __.

a. heading

b. spacing

c. accuracy

d. none of the above

20. What does the acronym GWAM mean?

BENCHMARK ASSESSMENT6

a. Gross words a minute.

b. Ghana West Africa Missions.

c. Gathering Weekly Audio Magazine.

d. Get Well Assessment Module.

Critical Thinking

1. To successfully learn, mistakes by adolescent students must

be immediately corrected and they must be challenged to

expand their minds by their teachers. They should be

inspired to set higher standards of learning for themselves.

Some students have positive responses to challenges,

whereas, others display a negative response. Teachers have

to maintain each student’s interest, while keeping academic

standards high. Often, students within the top 10

percentile of academics in their grade-level are ignored and

are not encouraged to strive for their full potential,

because of the independence they display. What is the

conclusion about teachers maintaining the interest of every

student?

BENCHMARK ASSESSMENT7

a. Top 10 percentile students should become lazy and wait

for the average students to catch up.

b. Teachers must give more homework to average students to

bring them up to the level of advanced students.

c. Teachers have to create a curriculum that provides

goals for every student to strive for and achieve.

d. Summer school should be the recommendation by teachers

for average students.

2. Gaming is very popular with young adolescents and many of

them are playing the violent video games every day. Parents

are opposing the manufacturers of these games, but the

number of users is growing each day and the companies are

making large profits. What is the conclusion about violent

video games?

a. More adolescents will play violent video games, despite

protests from parents.

b. Parents will stop their children from playing all video

games.

BENCHMARK ASSESSMENT8

c. Opposing parents will make companies stop producing

violent video games.

d. Adolescents will sway their parents to support their

playing violent video games.

3. Make this equation true using the addition, subtraction,

multiplication, and division symbols once.

900 _ 300 _ 200 _ 100 _ 400 = 700

4. Use the clues to solve the puzzle.

A female student, a male student, a female computer tech,

and a male teacher used a computer at different times one

day.

1) A male used the computer first.

2) A student used the computer before the teacher and the

computer tech.

3) The teacher used the computer before the female

student.

Who used the computer first?

5. Determine both solutions to get the answer.

Another word for stand,

BENCHMARK ASSESSMENT9

Families gather to eat using it;

Now, put a T at the end,

It is not a laptop.

What is it?

6. Determine the common phrase depicted in these verbal picture

puzzles.

a. T 1111

b. CHAPERSONRGE

7. What is the 12th number in this sequence?

Explain how the answer was derived.

2, 10, 14, 22, 26, ….

8. A student is given an unmarked 5-liter bottle and an

unmarked 16-liter bottle. The teacher wants the student to

provide the class with exactly 10 liters of water. Explain

how the student will produce 10 liters using a faucet.

9. Determine the common saying and food depicted in these

verbal picture puzzles.

a. ANOTHER ONE

b. BAN ANA

BENCHMARK ASSESSMENT10

10. What is the 21st number in this sequence?

Explain how the answer was derived.

6, 21, 36, 51, 66, …

11. A teacher asked a student to place an 800 byte

processor into the motherboard of an old computer the

computer science class was rebuilding. The student was

asked how many bits does the processor contains. What is

the student’s answer? Hint: 8 bits are in 1 byte.

a. 6,410 bits.

b. 6,200 bits.

c. 6,600 bits.

d. 6,400 bits.

12. Andrea likes to spend her summers in Beaumont, Texas

with her favorite person. They enjoy going to the movies,

swimming, and picking fruit. Andrea enjoys visiting the

daughter of her first cousin, James, who is older than she

is by 18 years. Who is her favorite person?

a. Her cousin.

b. Her sister.

BENCHMARK ASSESSMENT11

c. Her third cousin.

d. Her second cousin.

13. Determine both solutions to get the answer.

It is placed under the feet of users to aid posture,

People wipe the bottom of their shoes on it;

Put an E at the end,

It is the opposite of opponent.

What is it?

14. A trash can was knocked over during the night. The

owner of the trash can has been painting his house the color

blue for the past two days. Later that day, three dogs were

seen in the neighborhood with blue paws. What is suggested

by the reading?

a. The owner spilled paint on the trash can.

b. The dogs pushed the trash can over.

c. The dogs’ paws were painted blue by the owner of the

trash can.

d. The dogs walked through blue paint on another street.

BENCHMARK ASSESSMENT12

15. Tommy is in computer class. He is trying to create a

birthday card, but he is having difficulties. He looks over

to Jane’s work on the computer she is using and notices that

she is almost finished creating a fantastic Christmas card.

Tommy becomes disappointed and drops his head. The teacher

walks over to monitor Tommy’s progress and realizes that he

is discouraged and gives him some advice to make his work

better. From the following answers, which one concludes the

passage?

a. Tommy wants Jane’s aptitude for creating cards.

b. Tommy wishes he was at home.

c. Tommy wanted the teacher to finish his card.

d. All of the above.

16. What is the 16th number in this sequence?

Explain how the answer was derived.

8, 4, 12, 6, 18, …

17. Jeri is taking her piano lessons. She has become very

impatient, loses focus, and hears her brother and the boys

BENCHMARK ASSESSMENT13

in the neighborhood playing football in their yard. What is

Jeri probably thinking?

a. She wishes her lessons were already over.

b. She wants to be outside.

c. She wants her piano instructor to stay longer.

d. A and B.

e. A and C.

18. What is the 14th number in this sequence?

Explain how the answer was derived.

10, 5, 7.5, 5, 2.5, …

19. A computer science class starts and within five minutes

all computers in use by students cease to function. The

teacher is alarmed and goes around the classroom to check

every computer that is in use. He checks for loose cables,

because the computers are operating on an intranet network

not on the school system’s network and finds nothing out of

the ordinary and reboots each computer in use. The teacher

provided a written assignment for the students as an

alternate for the computer lab and called for technical

BENCHMARK ASSESSMENT14

support. On the way home, John boasts about introducing a

virus to the network and his classmate, Ron, is shocked and

keeps a worried look upon his face all day. Ron is

wondering if he will get into trouble when his friend’s deed

is discovered and he does not tell the teacher about John’s

confession. What conclusion is to be drawn after reading

this passage?

a. Ron is happy John sabotaged the school’s computers.

b. John will obtain great wealth when he becomes an adult.

c. Ron wants to tell his mother what John did in class.

d. Ron’s conscience is bothering him and he does not want

to get into trouble for knowing about John’s misdeed.

20. Make this equation true using the addition,

subtraction, multiplication, and division symbols once.

400 _ 200 _ 500 _ 1,000 _ 0 = 0

Problem Solving

1. A meteorologist needed data to forecast rain for the next

three days. Information that he already researched was

missing and he was due to present his forecast on TV within

BENCHMARK ASSESSMENT15

four hours. The meteorologist should __ to get new data in

time for his forecast?

a. call a station from another broadcast network to get

information

b. use the information from the previous forecast

c. collect data from the station’s database to create

another forecast

d. None of the above.

2. In their computer science class, a group of students built a

computer. When they turned it on and began to use it over

the classroom’s Intranet, the computer’s functions started

to freeze. They asked their teacher to check the computer.

He did not find any issues with the assembly and rebooted

the system. The students returned to the Intranet, sharing

pictures and video footage from their cell phones before the

computer froze, again. The students must find the cause of

the computer’s issues by __.

a. disassembling the computer and examine each piece of

hardware

BENCHMARK ASSESSMENT16

b. running a diagnosis of the system and determine if any

of the software and hardware are having problems

c. tell the teacher about the activities they performed

and he will use his professional expertise to find the

problem

d. B and C.

3. Mr. Jones, an architect and developer, promised the mayor of

Baltimore a live presentation with a model of the city’s new

development project. He could not get to the scheduled

meeting, due to an illness. Mr. Jones’ best solution to not

disappoint the mayor was __.

a. to go to the meeting

b. to call the mayor and reschedule the meeting

c. to create a 3-D simulation with voice-over and have it

delivered to the mayor prior to the day of the meeting

d. to call the mayor and talk about the model

4. A group of students had a project due and each member were

confused about the approach to its start. The project

entails a weekly grade board on the computer in the computer

BENCHMARK ASSESSMENT17

science class that automatically provides each student’s

grade point average (GPA). A female member suggested that

the group start with a spreadsheet. Is she correct?

Yes/No. Why or why not?

5. A student in the computer science class is learning about

databases. For her first test, she has to create a database

on the computer. She is confused about starting, because

she is not sure whether she should start by selecting a

background color or font or fields. Describe how the

student should approach the database and explain why this

approach is correct.

6. Jeff wants to create a catalog of all the compact discs

(CDs) he owns. He receives verbal instructions from a

classmate, but cannot remember everything and is confused

when he logs onto his personal computer at home. To create

this catalog, Jeff must __.

a. call his friend and ask for the instructions, again

b. go online and find instructions

BENCHMARK ASSESSMENT18

c. wait until he sees his classmate at school to get the

instructions, again

d. A and C.

e. All of the above.

7. Joan was given an assignment to create a fictitious

household budget. She asked her mother about their utility

bills, mortgage, and car note to get a general budget

ceiling. As Joan worked on her assignment, she realized

that she did more work than the assignment required by using

a Word document. Explain how Joan could have saved time and

avoided performing all of the calculations.

8. A classroom of students take five tests and have received

their scores. Six of the students get together to see which

person amongst of them has the highest average while they

gather at the computer on Suzie’s desk. With a spreadsheet,

which of the following should be used?

a. A calculator.

b. A simulation.

c. A handheld device.

BENCHMARK ASSESSMENT19

d. A formula.

9. Students were given information about the Ice Age and were

asked for their opinions about how the land in the northern

portion of North America was shaped. The teacher stated

that it took many centuries before an answer was accepted as

fact. She told the students how it was done. Which is the

best method to recreate this event?

a. A spreadsheet.

b. A simulation.

c. Clips from movies.

d. None of the above.

10. Terry completed a project, but he received a lower

grade on it than he is accustomed to earning with his work.

His presentation lacked imagery, the judges did not know

what the project was about, and certain data in one section

did not correlate with the other data. Explain how Terry

could have produced a better project.

Basic Accounting

1. What is considered a financial burden?

BENCHMARK ASSESSMENT20

a. Saving.

b. Expenses.

c. Borrowing.

d. Lending.

2. Income is monetary gain from products and/or services sales.

True/False

3. Is a debt or obligation known as liability? Yes/No. Why or

why not?

4. When entered, it increases assets. What is it called and

which side of the account it is documented?

a. Debit and right side.

b. Credit and right side.

c. Credit and left side.

d. Debit and left side.

5. What is the purpose of the Income Statement?

6. A Balance Sheet is __.

a. an official financial statement that includes assets

b. an official financial statement that includes debits

BENCHMARK ASSESSMENT21

c. an official financial statement that includes

liabilities

d. A and C

e. A and B

7. Cash can be converted into currency. True/False

8. A person’s possessions and cash are considered assets.

True/False

9. What is an initial investment and retained earnings?

a. Debits.

b. Assets.

c. Liabilities.

d. Owner’s equity.

10. What is entered on the right side of the account that

decrease the value of assets?

11. Match asset or liability with the appropriate account.

Cash - __

Line of Credit - __

Inventory - __

Accounts Payable - __

BENCHMARK ASSESSMENT22

Supplies - __

Appliances - __

Mortgage - __

Accounts Receivable - __

12. Describe how a Balance Sheet looks.

13. If Total Income is greater than Total Expenses on the

Income Statement, what is indicated by this financial

figure?

14. Match income and expense with the appropriate account.

Repairs - __

Sales - __

Interest Income - __

Rentals - __

Utilities - __

Advertising - __

Donations - __

Rent - __

BENCHMARK ASSESSMENT23

15. If Total Income is less than Total Expenses on the

Income Statement, what is indicated by this financial

figure?

16. Describe how an Income Statement looks.

17. Match Balance Sheet and Income Statement with the

appropriate accounting classification.

Income - __

Assets - __

Owner’s Equity - __

Expenses - __

Liabilities - __

18. What is financial leveraging?

a. The use of cash to acquire additional assets.

b. Trading on equity or the use of debt to acquire

additional assets.

c. Offering available money to settle greater debts.

d. A and B.

19. What is the formula for assets?

a. Assets = liabilities - equity

BENCHMARK ASSESSMENT24

b. Assets = equity ÷ liabilities

c. Assets = equity - liabilities

d. Assets = liabilities + equity

20. What is accounting?

a. A network facilitating computer data exchange.

b. A logical process that minimizes risk.

c. A process to work through problems in an orderly manner

to reach a solution.

d. A system that summarizes financial transactions by

analyzing, verifying, and reports results.

Basic Risk Management

1. How will a student eliminate or minimize the risk of

receiving a low grade on an assignment when citing and

referencing is required?

a. Copy and paste material from established authors.

b. Use material from websites without giving credit to the

source.

c. Provide credit to the source where the material was

taken.

BENCHMARK ASSESSMENT25

d. B and C.

2. Three months ago, a school bought 12 new routers from a

company with a good reputation. The school’s network has

been attacked and compromised eight times since making this

purchase. From a risk factor for the school, what is in

jeopardy?

a. The faculty’s and students’ sensitive information.

b. Vital school records.

c. The school’s operations are at risk.

d. All of the above.

3. When a school’s network fails or is compromised, what is at

risk?

a. The librarian’s job.

b. Student learning.

c. Money.

d. B and C.

4. Risk management is avoiding and/or minimizing the impact of

risk by implementing strategies. True/False

BENCHMARK ASSESSMENT26

5. Travis went into the computer science classroom during

lunchtime. He used the teacher’s computer to log onto a

social media site. A pop-up window appeared and Travis’

curiosity got the better of him. He opened it and a strange

page flashed and covered the screen. In a panic, Travis

tried to close the window, but it kept flashing. He tried

to reboot the computer, but he only made the situation

worse, because he allowed the virus to engage the operating

system (OS). Some students walked near the door and Travis

waited until they passed by and ran. Did Travis violate

school policy and put the school in jeopardy? Yes/No. Why

or why not?

Basic Networking

1. When no files available repeatedly appears after trying to access

system files, this is an indication of hardware issues.

True/False

2. A computer user has pressed print three times on the

keyboard, but network’s printer fails to respond. What must

the user do before calling for technical support?

BENCHMARK ASSESSMENT27

a. The user must reboot the computer.

b. Check the computer’s connection to the network printer.

c. Check the printer’s connection to the network.

d. Ask another user to run a diagnosis on the computer.

3. What are the most commonly used local area network (LAN)

topologies?

a. Star, Mesh, Bus, and Ring.

b. Bus, LAN, Tree, and Star.

c. Hybrid, Start, Vertex, and Bus.

d. Ring, router, Start, and Mesh.

4. What is a Mesh topology?

a. A topology that works with other topologies to form a

hybrid topology and it is not recommended to use with

Ethernet networks.

b. A topology that connects separate star topologies and

computers within individual segments will operate if

communication failure occurs.

c. A topology that uses an Ethernet network and is

inexpensive.

BENCHMARK ASSESSMENT28

d. A topology that connects each computer and if

communication fails, all computers will not

communicate.

5. What is wireless network technology (WiFi)?

6. What is the purpose of a router?

a. To store data and retrieve data, process information,

and execute calculations.

b. To exchange information over the Internet.

c. To allow data movement between devices and networks.

d. To initiate programs after the computer is turned on.

7. It is illegal to access a person’s computer without their

consent. True/False

8. What is a network?

a. It facilitates computer data exchange.

b. A logical process that minimizes risk.

c. A process to work through problems in an orderly manner

to reach a solution.

d. A system that summarizes financial transactions by

analyzing, verifying, and reports results.

BENCHMARK ASSESSMENT29

9. The firewall’s function is to allow access to all websites.

True/False

10. Of the most commonly used LAN topologies, which is used

most?

a. Ring.

b. Star.

c. Mesh.

d. Bus.

11. It is unethical to send spam over the Internet, which

are unsolicited messages. True/False

12. A code instructing Web pages in properly displaying

contents is called __.

a. File Transfer Protocol (FTP)

b. HyperText Markup Language (HTML)

c. HyperText Transfer Protocol (HTTP)

d. HyperText Transfer Protocol Secure (HTTPS)

13. A website that is not safe may transmit a computer

virus. True/False

BENCHMARK ASSESSMENT30

14. After surfing the Web, a student decides to save a

document from a site. The student has uploaded this

information. True/False

15. What is illegally gaining access to a computer and its

files called?

16. For security purposes, software protection is needed

when sensitive information is accessible by other users

through other computers and networks. True/False

17. What is unsafe practice when a user has accessed a

computer network?

a. Not logging out before leaving the computer.

b. Sharing personal information.

c. Sharing passwords.

d. All of the above.

18. In the Internet address www.su-shi.jp, what does .jp

indicate?

a. The language the site was developed.

b. The country where the site was created.

c. The purpose the site was created.

BENCHMARK ASSESSMENT31

d. A and B.

19. A student in the computer science class was on the

school’s approved website. She used caps for every word

while communicating with another student. What has the

student been doing?

20. Describe the Star topology.

Communication

1. When communicating with unknown people over the Internet, a

user must __.

a. use a virus protection program

b. provide personal information

c. download from attachments

d. All of the above.

2. Alfred received his graded homework assignment and was not

happy. The style of the text was wrong. Mrs. Jackson was

providing the instructions for the assignment, he was busy

talking with Tony and shooting rubber bands at Jimmy, who

was doing the same with him when the teacher was not

looking. Before the bell rang at the end of the class, Mrs.

BENCHMARK ASSESSMENT32

Jackson asked if everyone understood the assignment and the

instructions. A female student raised her hand and asked

for clarification about the assignment, but Alfred did not,

though he was confused. What was Alfred’s problem with his

homework?

a. He failed to ask about the assignment to get an

understanding of the instructions.

b. The font of the text was wrong.

c. He did not have enough pages.

d. A and B.

3. A mock interview was conducted and the student portraying

the applicant wore jeans and a tank top shirt. If this was

a real interview, explain how the employer would have

reacted and possibly told the applicant.

4. The last bell for school hours has rang and Pam grabs her

textbooks and struts out of the classroom, giving Mrs. Smith

a sharp look from the corner of her eyes. Mrs. Smith is

surprised by Pam’s behavior. What type of communication did

Pam exhibit?

BENCHMARK ASSESSMENT33

a. Written.

b. Verbal.

c. E-mail.

d. Non-verbal.

5. Jan saw Nikki crying and approached her. Jan was informed

why her friend was crying. A male classmate posted a flame

on Nikki’s locker. What is a flame?

a. A birthday wish.

b. An insult.

c. A letter breaking up with her.

d. A rejection for a date.

6. When soliciting information by communicating with websites

using search engines, the use of AND, OR, and NOT increases

chances for users to accurately narrow or expand searches.

True/False

7. Mr. Lewis is known for his written commentary. He puts the

same comment on every students’ assignments after grading

them. Some of the students were wondering if he actually

graded the assignments or glanced over each one and placed a

BENCHMARK ASSESSMENT34

grade he thought was fitting to its look. The written

communication by Mr. Lewis and the inference of non-verbal

communication the students feel from Mr. Lewis’ comment

makes them uneasy. Should the students directly ask Mr.

Lewis why he writes the same comment on everyone’s

assignments, though the grades vary? Yes/No. Why or why

not?

8. Ted was on his home computer and communicating with his

friend, using Yahoo!’s instant messaging (IM). During their

session, Ted notices that he has received some E-mail. He

opens one of them and realizes that it contains

advertisement of a matter he does not want to participate.

He deletes it and continues to chat with his friend. Ted

received spam and wants it to stop coming to his E-mail

address. Spam is legal, but unethical. True/False

9. What type of written communication informs potential

employers about the work history of an applicant?

a. A resignation letter.

b. A birthday card.

BENCHMARK ASSESSMENT35

c. A cover sheet.

d. A resume.

10. Can a screen name provide negative communication?

Yes/No. Explain.

11. Many young adolescents are carefree concerning

communicating with strangers, and especially, with friends

over the Internet. Safety must be used at all times when

chatting or sending and receiving E-mail. Should an

adolescent have a parent or an adult with him or her if he

or she meets a friend from the Internet for the first time?

Yes/No. Why or why not?

12. When adolescents communicate using the Internet, which

site is the safest?

a. A peer network.

b. Facebook.

c. YouTube.

d. B and C.

e. None of the above.

BENCHMARK ASSESSMENT36

13. Anthony was previously harassed online by another

student. The other student continued to harass Anthony

three day later. What should he do?

a. Tell the principal.

b. Tell his parents.

c. Tell the other student’s parents.

d. All of the above.

14. The computer in Karl’s workstation has been showing an

error message since morning. The message is indicating that

his computer is not connecting to the printer. He tried

correcting the issue, but his effort rendered no success.

Karl is an advertising agent and has an account with a

client, whose portfolio he has to present to his supervisor

before the end of the day. He received a call from his

boss, but he was not honest about not being ready to meet

with him, due to the problem with the printer. Later that

week, Karl lost his job. How could he have saved his job?

a. Karl’s great relationship with his supervisor cost him

employment.

BENCHMARK ASSESSMENT37

b. Karl’s poor communication with his supervisor and the

lie he told put his job in jeopardy.

c. Karl was the best advertising agent and his supervisor

was jealous.

d. A and C.

15. Barry was communicating with some friends through a

popular website. His computer became infected with malware

and he thought he removed it, but often saw signs of it

affecting his computer’s functions. Barry did not access

that site for a week, but he did use another one. He

wondered how this was still happening. How can malware

affect Barry’s computer, again, without him using the site

he suspected was the cause of infection?

a. Barry’s computer had shown signs of infection, because

he kept the Ethernet cable connected.

b. Barry thought he removed all of the malware.

c. Cookies are headers transmitted between a Web browser

and a server, in which hackers can monitor a user

and/or inject a virus.

BENCHMARK ASSESSMENT38

d. A and B.

16. Russell told his classmates that he wants to be in the

communications business when he becomes an adult. Sara

laughed and shouted, “Hey everybody, Russell wants to be a

TV newsman.” A grimaced look appeared upon Russell’s face

and he said, “I want to work with people making the Global

Positioning System (GPS). I want to be able to help the

police track people down bad people.” Is communication the

most vital element known to society? Yes/No. Why or why

not?

Conclusion

After struggling students are recognized, measures are put

in place to deliver extra support and resources. Educators must

guard against excessive testing, in which unnecessary burdens are

placed upon students. Benchmark assessments have to be carefully

chosen and utilized, not to aggravate each student’s learning

process. Teachers will have greater maneuverability when these

assessments are in correlation with state standards and to

monitor every student’s performance with district standards.