Running head: BENCHMARK ASSESSMENT1
Benchmark Assessment
Robert T. Williams
Liberty University
Dr. Rick Bragg
2014 EDUC 672-Fall B04 – Curriculum Development
December 14, 2014
BENCHMARK ASSESSMENT2
Introduction
School systems throughout the nation use benchmark
assessments to administer short tests, which provide information
about students’ academic knowledge. Throughout the school year,
students are periodically tested. These assessments alert
district-level, school, and decision-making personnel about the
increase or decrease in students’ knowledge and skills
comparative to long-term learning goals. Data is obtained and
personnel uses it to determine if districts, schools, and
students are meeting specific year-end goals. With technological
advancements and the enactment of the No Child Left Behind Act of
2001, educational leaders hope students will meet the challenges
of the new global societal changes.
Assessments
Keyboarding
1. What is the importance for mastering keyboarding?
a. A person can think better, because he or she can have
his or her ideas recorded before they are forgotten.
BENCHMARK ASSESSMENT3
b. A larger job market is available for people with
keyboarding skills.
c. It is an important tool to have to participate in a
social media society.
d. All of the above.
2. 30 words per minute (WPM) and 90 percent accuracy are the
accepted minimum for eighth grade students. True/False
3. Describe touch keyboarding and proper keyboarding
techniques.
4. Where is the numeric keypad located on the keyboard?
5. Which are the home row keys?
a. QWERTYUIOP
b. ZXCVBNM,./
c. 1234567890
d. ASDFGHJKL;’
6. What is the standard type of layout for keyboards?
7. What are the purposes for using the three finger salute or
Ctrl-Alt-Delete function?
BENCHMARK ASSESSMENT4
8. Why is the UltraKey software most prevalent by school
districts nationwide?
9. How many types of keys are there on the keyboard? Give an
example of each.
10. Which are the anchor keys?
a. E and Y.
b. F and J.
c. Q and P.
d. G and H.
11. Handwriting skills affect the ability to learn
keyboarding. True/False
12. Users must change the __ to display another style of
lettering.
a. font
b. header
c. landscape
d. None of the above.
13. What is the function of the shift key?
a. It turns letters into numbers.
BENCHMARK ASSESSMENT5
b. It makes lower case letters into capital letters.
c. It allows the user to play video games.
d. B and C.
14. The user’s eyes should be viewing the data source or
monitor while typing. True/False
15. Describe the basic word processing formatting skills.
16. Identify the parts of letters, envelopes, faxes, and
electronic mails (e-mails). What is the difference between
a business letter and a personal letter?
17. Drills and timed writings will increase accuracy, but
not speed. True/False
18. Describe the editing process of a Word document.
19. From the answers given, the most important typing skill
to develop is __.
a. heading
b. spacing
c. accuracy
d. none of the above
20. What does the acronym GWAM mean?
BENCHMARK ASSESSMENT6
a. Gross words a minute.
b. Ghana West Africa Missions.
c. Gathering Weekly Audio Magazine.
d. Get Well Assessment Module.
Critical Thinking
1. To successfully learn, mistakes by adolescent students must
be immediately corrected and they must be challenged to
expand their minds by their teachers. They should be
inspired to set higher standards of learning for themselves.
Some students have positive responses to challenges,
whereas, others display a negative response. Teachers have
to maintain each student’s interest, while keeping academic
standards high. Often, students within the top 10
percentile of academics in their grade-level are ignored and
are not encouraged to strive for their full potential,
because of the independence they display. What is the
conclusion about teachers maintaining the interest of every
student?
BENCHMARK ASSESSMENT7
a. Top 10 percentile students should become lazy and wait
for the average students to catch up.
b. Teachers must give more homework to average students to
bring them up to the level of advanced students.
c. Teachers have to create a curriculum that provides
goals for every student to strive for and achieve.
d. Summer school should be the recommendation by teachers
for average students.
2. Gaming is very popular with young adolescents and many of
them are playing the violent video games every day. Parents
are opposing the manufacturers of these games, but the
number of users is growing each day and the companies are
making large profits. What is the conclusion about violent
video games?
a. More adolescents will play violent video games, despite
protests from parents.
b. Parents will stop their children from playing all video
games.
BENCHMARK ASSESSMENT8
c. Opposing parents will make companies stop producing
violent video games.
d. Adolescents will sway their parents to support their
playing violent video games.
3. Make this equation true using the addition, subtraction,
multiplication, and division symbols once.
900 _ 300 _ 200 _ 100 _ 400 = 700
4. Use the clues to solve the puzzle.
A female student, a male student, a female computer tech,
and a male teacher used a computer at different times one
day.
1) A male used the computer first.
2) A student used the computer before the teacher and the
computer tech.
3) The teacher used the computer before the female
student.
Who used the computer first?
5. Determine both solutions to get the answer.
Another word for stand,
BENCHMARK ASSESSMENT9
Families gather to eat using it;
Now, put a T at the end,
It is not a laptop.
What is it?
6. Determine the common phrase depicted in these verbal picture
puzzles.
a. T 1111
b. CHAPERSONRGE
7. What is the 12th number in this sequence?
Explain how the answer was derived.
2, 10, 14, 22, 26, ….
8. A student is given an unmarked 5-liter bottle and an
unmarked 16-liter bottle. The teacher wants the student to
provide the class with exactly 10 liters of water. Explain
how the student will produce 10 liters using a faucet.
9. Determine the common saying and food depicted in these
verbal picture puzzles.
a. ANOTHER ONE
b. BAN ANA
BENCHMARK ASSESSMENT10
10. What is the 21st number in this sequence?
Explain how the answer was derived.
6, 21, 36, 51, 66, …
11. A teacher asked a student to place an 800 byte
processor into the motherboard of an old computer the
computer science class was rebuilding. The student was
asked how many bits does the processor contains. What is
the student’s answer? Hint: 8 bits are in 1 byte.
a. 6,410 bits.
b. 6,200 bits.
c. 6,600 bits.
d. 6,400 bits.
12. Andrea likes to spend her summers in Beaumont, Texas
with her favorite person. They enjoy going to the movies,
swimming, and picking fruit. Andrea enjoys visiting the
daughter of her first cousin, James, who is older than she
is by 18 years. Who is her favorite person?
a. Her cousin.
b. Her sister.
BENCHMARK ASSESSMENT11
c. Her third cousin.
d. Her second cousin.
13. Determine both solutions to get the answer.
It is placed under the feet of users to aid posture,
People wipe the bottom of their shoes on it;
Put an E at the end,
It is the opposite of opponent.
What is it?
14. A trash can was knocked over during the night. The
owner of the trash can has been painting his house the color
blue for the past two days. Later that day, three dogs were
seen in the neighborhood with blue paws. What is suggested
by the reading?
a. The owner spilled paint on the trash can.
b. The dogs pushed the trash can over.
c. The dogs’ paws were painted blue by the owner of the
trash can.
d. The dogs walked through blue paint on another street.
BENCHMARK ASSESSMENT12
15. Tommy is in computer class. He is trying to create a
birthday card, but he is having difficulties. He looks over
to Jane’s work on the computer she is using and notices that
she is almost finished creating a fantastic Christmas card.
Tommy becomes disappointed and drops his head. The teacher
walks over to monitor Tommy’s progress and realizes that he
is discouraged and gives him some advice to make his work
better. From the following answers, which one concludes the
passage?
a. Tommy wants Jane’s aptitude for creating cards.
b. Tommy wishes he was at home.
c. Tommy wanted the teacher to finish his card.
d. All of the above.
16. What is the 16th number in this sequence?
Explain how the answer was derived.
8, 4, 12, 6, 18, …
17. Jeri is taking her piano lessons. She has become very
impatient, loses focus, and hears her brother and the boys
BENCHMARK ASSESSMENT13
in the neighborhood playing football in their yard. What is
Jeri probably thinking?
a. She wishes her lessons were already over.
b. She wants to be outside.
c. She wants her piano instructor to stay longer.
d. A and B.
e. A and C.
18. What is the 14th number in this sequence?
Explain how the answer was derived.
10, 5, 7.5, 5, 2.5, …
19. A computer science class starts and within five minutes
all computers in use by students cease to function. The
teacher is alarmed and goes around the classroom to check
every computer that is in use. He checks for loose cables,
because the computers are operating on an intranet network
not on the school system’s network and finds nothing out of
the ordinary and reboots each computer in use. The teacher
provided a written assignment for the students as an
alternate for the computer lab and called for technical
BENCHMARK ASSESSMENT14
support. On the way home, John boasts about introducing a
virus to the network and his classmate, Ron, is shocked and
keeps a worried look upon his face all day. Ron is
wondering if he will get into trouble when his friend’s deed
is discovered and he does not tell the teacher about John’s
confession. What conclusion is to be drawn after reading
this passage?
a. Ron is happy John sabotaged the school’s computers.
b. John will obtain great wealth when he becomes an adult.
c. Ron wants to tell his mother what John did in class.
d. Ron’s conscience is bothering him and he does not want
to get into trouble for knowing about John’s misdeed.
20. Make this equation true using the addition,
subtraction, multiplication, and division symbols once.
400 _ 200 _ 500 _ 1,000 _ 0 = 0
Problem Solving
1. A meteorologist needed data to forecast rain for the next
three days. Information that he already researched was
missing and he was due to present his forecast on TV within
BENCHMARK ASSESSMENT15
four hours. The meteorologist should __ to get new data in
time for his forecast?
a. call a station from another broadcast network to get
information
b. use the information from the previous forecast
c. collect data from the station’s database to create
another forecast
d. None of the above.
2. In their computer science class, a group of students built a
computer. When they turned it on and began to use it over
the classroom’s Intranet, the computer’s functions started
to freeze. They asked their teacher to check the computer.
He did not find any issues with the assembly and rebooted
the system. The students returned to the Intranet, sharing
pictures and video footage from their cell phones before the
computer froze, again. The students must find the cause of
the computer’s issues by __.
a. disassembling the computer and examine each piece of
hardware
BENCHMARK ASSESSMENT16
b. running a diagnosis of the system and determine if any
of the software and hardware are having problems
c. tell the teacher about the activities they performed
and he will use his professional expertise to find the
problem
d. B and C.
3. Mr. Jones, an architect and developer, promised the mayor of
Baltimore a live presentation with a model of the city’s new
development project. He could not get to the scheduled
meeting, due to an illness. Mr. Jones’ best solution to not
disappoint the mayor was __.
a. to go to the meeting
b. to call the mayor and reschedule the meeting
c. to create a 3-D simulation with voice-over and have it
delivered to the mayor prior to the day of the meeting
d. to call the mayor and talk about the model
4. A group of students had a project due and each member were
confused about the approach to its start. The project
entails a weekly grade board on the computer in the computer
BENCHMARK ASSESSMENT17
science class that automatically provides each student’s
grade point average (GPA). A female member suggested that
the group start with a spreadsheet. Is she correct?
Yes/No. Why or why not?
5. A student in the computer science class is learning about
databases. For her first test, she has to create a database
on the computer. She is confused about starting, because
she is not sure whether she should start by selecting a
background color or font or fields. Describe how the
student should approach the database and explain why this
approach is correct.
6. Jeff wants to create a catalog of all the compact discs
(CDs) he owns. He receives verbal instructions from a
classmate, but cannot remember everything and is confused
when he logs onto his personal computer at home. To create
this catalog, Jeff must __.
a. call his friend and ask for the instructions, again
b. go online and find instructions
BENCHMARK ASSESSMENT18
c. wait until he sees his classmate at school to get the
instructions, again
d. A and C.
e. All of the above.
7. Joan was given an assignment to create a fictitious
household budget. She asked her mother about their utility
bills, mortgage, and car note to get a general budget
ceiling. As Joan worked on her assignment, she realized
that she did more work than the assignment required by using
a Word document. Explain how Joan could have saved time and
avoided performing all of the calculations.
8. A classroom of students take five tests and have received
their scores. Six of the students get together to see which
person amongst of them has the highest average while they
gather at the computer on Suzie’s desk. With a spreadsheet,
which of the following should be used?
a. A calculator.
b. A simulation.
c. A handheld device.
BENCHMARK ASSESSMENT19
d. A formula.
9. Students were given information about the Ice Age and were
asked for their opinions about how the land in the northern
portion of North America was shaped. The teacher stated
that it took many centuries before an answer was accepted as
fact. She told the students how it was done. Which is the
best method to recreate this event?
a. A spreadsheet.
b. A simulation.
c. Clips from movies.
d. None of the above.
10. Terry completed a project, but he received a lower
grade on it than he is accustomed to earning with his work.
His presentation lacked imagery, the judges did not know
what the project was about, and certain data in one section
did not correlate with the other data. Explain how Terry
could have produced a better project.
Basic Accounting
1. What is considered a financial burden?
BENCHMARK ASSESSMENT20
a. Saving.
b. Expenses.
c. Borrowing.
d. Lending.
2. Income is monetary gain from products and/or services sales.
True/False
3. Is a debt or obligation known as liability? Yes/No. Why or
why not?
4. When entered, it increases assets. What is it called and
which side of the account it is documented?
a. Debit and right side.
b. Credit and right side.
c. Credit and left side.
d. Debit and left side.
5. What is the purpose of the Income Statement?
6. A Balance Sheet is __.
a. an official financial statement that includes assets
b. an official financial statement that includes debits
BENCHMARK ASSESSMENT21
c. an official financial statement that includes
liabilities
d. A and C
e. A and B
7. Cash can be converted into currency. True/False
8. A person’s possessions and cash are considered assets.
True/False
9. What is an initial investment and retained earnings?
a. Debits.
b. Assets.
c. Liabilities.
d. Owner’s equity.
10. What is entered on the right side of the account that
decrease the value of assets?
11. Match asset or liability with the appropriate account.
Cash - __
Line of Credit - __
Inventory - __
Accounts Payable - __
BENCHMARK ASSESSMENT22
Supplies - __
Appliances - __
Mortgage - __
Accounts Receivable - __
12. Describe how a Balance Sheet looks.
13. If Total Income is greater than Total Expenses on the
Income Statement, what is indicated by this financial
figure?
14. Match income and expense with the appropriate account.
Repairs - __
Sales - __
Interest Income - __
Rentals - __
Utilities - __
Advertising - __
Donations - __
Rent - __
BENCHMARK ASSESSMENT23
15. If Total Income is less than Total Expenses on the
Income Statement, what is indicated by this financial
figure?
16. Describe how an Income Statement looks.
17. Match Balance Sheet and Income Statement with the
appropriate accounting classification.
Income - __
Assets - __
Owner’s Equity - __
Expenses - __
Liabilities - __
18. What is financial leveraging?
a. The use of cash to acquire additional assets.
b. Trading on equity or the use of debt to acquire
additional assets.
c. Offering available money to settle greater debts.
d. A and B.
19. What is the formula for assets?
a. Assets = liabilities - equity
BENCHMARK ASSESSMENT24
b. Assets = equity ÷ liabilities
c. Assets = equity - liabilities
d. Assets = liabilities + equity
20. What is accounting?
a. A network facilitating computer data exchange.
b. A logical process that minimizes risk.
c. A process to work through problems in an orderly manner
to reach a solution.
d. A system that summarizes financial transactions by
analyzing, verifying, and reports results.
Basic Risk Management
1. How will a student eliminate or minimize the risk of
receiving a low grade on an assignment when citing and
referencing is required?
a. Copy and paste material from established authors.
b. Use material from websites without giving credit to the
source.
c. Provide credit to the source where the material was
taken.
BENCHMARK ASSESSMENT25
d. B and C.
2. Three months ago, a school bought 12 new routers from a
company with a good reputation. The school’s network has
been attacked and compromised eight times since making this
purchase. From a risk factor for the school, what is in
jeopardy?
a. The faculty’s and students’ sensitive information.
b. Vital school records.
c. The school’s operations are at risk.
d. All of the above.
3. When a school’s network fails or is compromised, what is at
risk?
a. The librarian’s job.
b. Student learning.
c. Money.
d. B and C.
4. Risk management is avoiding and/or minimizing the impact of
risk by implementing strategies. True/False
BENCHMARK ASSESSMENT26
5. Travis went into the computer science classroom during
lunchtime. He used the teacher’s computer to log onto a
social media site. A pop-up window appeared and Travis’
curiosity got the better of him. He opened it and a strange
page flashed and covered the screen. In a panic, Travis
tried to close the window, but it kept flashing. He tried
to reboot the computer, but he only made the situation
worse, because he allowed the virus to engage the operating
system (OS). Some students walked near the door and Travis
waited until they passed by and ran. Did Travis violate
school policy and put the school in jeopardy? Yes/No. Why
or why not?
Basic Networking
1. When no files available repeatedly appears after trying to access
system files, this is an indication of hardware issues.
True/False
2. A computer user has pressed print three times on the
keyboard, but network’s printer fails to respond. What must
the user do before calling for technical support?
BENCHMARK ASSESSMENT27
a. The user must reboot the computer.
b. Check the computer’s connection to the network printer.
c. Check the printer’s connection to the network.
d. Ask another user to run a diagnosis on the computer.
3. What are the most commonly used local area network (LAN)
topologies?
a. Star, Mesh, Bus, and Ring.
b. Bus, LAN, Tree, and Star.
c. Hybrid, Start, Vertex, and Bus.
d. Ring, router, Start, and Mesh.
4. What is a Mesh topology?
a. A topology that works with other topologies to form a
hybrid topology and it is not recommended to use with
Ethernet networks.
b. A topology that connects separate star topologies and
computers within individual segments will operate if
communication failure occurs.
c. A topology that uses an Ethernet network and is
inexpensive.
BENCHMARK ASSESSMENT28
d. A topology that connects each computer and if
communication fails, all computers will not
communicate.
5. What is wireless network technology (WiFi)?
6. What is the purpose of a router?
a. To store data and retrieve data, process information,
and execute calculations.
b. To exchange information over the Internet.
c. To allow data movement between devices and networks.
d. To initiate programs after the computer is turned on.
7. It is illegal to access a person’s computer without their
consent. True/False
8. What is a network?
a. It facilitates computer data exchange.
b. A logical process that minimizes risk.
c. A process to work through problems in an orderly manner
to reach a solution.
d. A system that summarizes financial transactions by
analyzing, verifying, and reports results.
BENCHMARK ASSESSMENT29
9. The firewall’s function is to allow access to all websites.
True/False
10. Of the most commonly used LAN topologies, which is used
most?
a. Ring.
b. Star.
c. Mesh.
d. Bus.
11. It is unethical to send spam over the Internet, which
are unsolicited messages. True/False
12. A code instructing Web pages in properly displaying
contents is called __.
a. File Transfer Protocol (FTP)
b. HyperText Markup Language (HTML)
c. HyperText Transfer Protocol (HTTP)
d. HyperText Transfer Protocol Secure (HTTPS)
13. A website that is not safe may transmit a computer
virus. True/False
BENCHMARK ASSESSMENT30
14. After surfing the Web, a student decides to save a
document from a site. The student has uploaded this
information. True/False
15. What is illegally gaining access to a computer and its
files called?
16. For security purposes, software protection is needed
when sensitive information is accessible by other users
through other computers and networks. True/False
17. What is unsafe practice when a user has accessed a
computer network?
a. Not logging out before leaving the computer.
b. Sharing personal information.
c. Sharing passwords.
d. All of the above.
18. In the Internet address www.su-shi.jp, what does .jp
indicate?
a. The language the site was developed.
b. The country where the site was created.
c. The purpose the site was created.
BENCHMARK ASSESSMENT31
d. A and B.
19. A student in the computer science class was on the
school’s approved website. She used caps for every word
while communicating with another student. What has the
student been doing?
20. Describe the Star topology.
Communication
1. When communicating with unknown people over the Internet, a
user must __.
a. use a virus protection program
b. provide personal information
c. download from attachments
d. All of the above.
2. Alfred received his graded homework assignment and was not
happy. The style of the text was wrong. Mrs. Jackson was
providing the instructions for the assignment, he was busy
talking with Tony and shooting rubber bands at Jimmy, who
was doing the same with him when the teacher was not
looking. Before the bell rang at the end of the class, Mrs.
BENCHMARK ASSESSMENT32
Jackson asked if everyone understood the assignment and the
instructions. A female student raised her hand and asked
for clarification about the assignment, but Alfred did not,
though he was confused. What was Alfred’s problem with his
homework?
a. He failed to ask about the assignment to get an
understanding of the instructions.
b. The font of the text was wrong.
c. He did not have enough pages.
d. A and B.
3. A mock interview was conducted and the student portraying
the applicant wore jeans and a tank top shirt. If this was
a real interview, explain how the employer would have
reacted and possibly told the applicant.
4. The last bell for school hours has rang and Pam grabs her
textbooks and struts out of the classroom, giving Mrs. Smith
a sharp look from the corner of her eyes. Mrs. Smith is
surprised by Pam’s behavior. What type of communication did
Pam exhibit?
BENCHMARK ASSESSMENT33
a. Written.
b. Verbal.
c. E-mail.
d. Non-verbal.
5. Jan saw Nikki crying and approached her. Jan was informed
why her friend was crying. A male classmate posted a flame
on Nikki’s locker. What is a flame?
a. A birthday wish.
b. An insult.
c. A letter breaking up with her.
d. A rejection for a date.
6. When soliciting information by communicating with websites
using search engines, the use of AND, OR, and NOT increases
chances for users to accurately narrow or expand searches.
True/False
7. Mr. Lewis is known for his written commentary. He puts the
same comment on every students’ assignments after grading
them. Some of the students were wondering if he actually
graded the assignments or glanced over each one and placed a
BENCHMARK ASSESSMENT34
grade he thought was fitting to its look. The written
communication by Mr. Lewis and the inference of non-verbal
communication the students feel from Mr. Lewis’ comment
makes them uneasy. Should the students directly ask Mr.
Lewis why he writes the same comment on everyone’s
assignments, though the grades vary? Yes/No. Why or why
not?
8. Ted was on his home computer and communicating with his
friend, using Yahoo!’s instant messaging (IM). During their
session, Ted notices that he has received some E-mail. He
opens one of them and realizes that it contains
advertisement of a matter he does not want to participate.
He deletes it and continues to chat with his friend. Ted
received spam and wants it to stop coming to his E-mail
address. Spam is legal, but unethical. True/False
9. What type of written communication informs potential
employers about the work history of an applicant?
a. A resignation letter.
b. A birthday card.
BENCHMARK ASSESSMENT35
c. A cover sheet.
d. A resume.
10. Can a screen name provide negative communication?
Yes/No. Explain.
11. Many young adolescents are carefree concerning
communicating with strangers, and especially, with friends
over the Internet. Safety must be used at all times when
chatting or sending and receiving E-mail. Should an
adolescent have a parent or an adult with him or her if he
or she meets a friend from the Internet for the first time?
Yes/No. Why or why not?
12. When adolescents communicate using the Internet, which
site is the safest?
a. A peer network.
b. Facebook.
c. YouTube.
d. B and C.
e. None of the above.
BENCHMARK ASSESSMENT36
13. Anthony was previously harassed online by another
student. The other student continued to harass Anthony
three day later. What should he do?
a. Tell the principal.
b. Tell his parents.
c. Tell the other student’s parents.
d. All of the above.
14. The computer in Karl’s workstation has been showing an
error message since morning. The message is indicating that
his computer is not connecting to the printer. He tried
correcting the issue, but his effort rendered no success.
Karl is an advertising agent and has an account with a
client, whose portfolio he has to present to his supervisor
before the end of the day. He received a call from his
boss, but he was not honest about not being ready to meet
with him, due to the problem with the printer. Later that
week, Karl lost his job. How could he have saved his job?
a. Karl’s great relationship with his supervisor cost him
employment.
BENCHMARK ASSESSMENT37
b. Karl’s poor communication with his supervisor and the
lie he told put his job in jeopardy.
c. Karl was the best advertising agent and his supervisor
was jealous.
d. A and C.
15. Barry was communicating with some friends through a
popular website. His computer became infected with malware
and he thought he removed it, but often saw signs of it
affecting his computer’s functions. Barry did not access
that site for a week, but he did use another one. He
wondered how this was still happening. How can malware
affect Barry’s computer, again, without him using the site
he suspected was the cause of infection?
a. Barry’s computer had shown signs of infection, because
he kept the Ethernet cable connected.
b. Barry thought he removed all of the malware.
c. Cookies are headers transmitted between a Web browser
and a server, in which hackers can monitor a user
and/or inject a virus.
BENCHMARK ASSESSMENT38
d. A and B.
16. Russell told his classmates that he wants to be in the
communications business when he becomes an adult. Sara
laughed and shouted, “Hey everybody, Russell wants to be a
TV newsman.” A grimaced look appeared upon Russell’s face
and he said, “I want to work with people making the Global
Positioning System (GPS). I want to be able to help the
police track people down bad people.” Is communication the
most vital element known to society? Yes/No. Why or why
not?
Conclusion
After struggling students are recognized, measures are put
in place to deliver extra support and resources. Educators must
guard against excessive testing, in which unnecessary burdens are
placed upon students. Benchmark assessments have to be carefully
chosen and utilized, not to aggravate each student’s learning
process. Teachers will have greater maneuverability when these
assessments are in correlation with state standards and to
monitor every student’s performance with district standards.