Thursday, June 18, 2020

Instruction for the Vulnerable Reader: Assessment


In order to help a child become better at reading, a teacher needs to have a handle on what the child knows and is able to do. All learning builds on prior learning, so a good clear idea of a child's understanding at the point where instruction begins is clearly a priority. This information is not readily available from standardized tests, inventories, checklists, speed reading trials, nonsense word lists, or anything else that purports to tell us what students know about reading. This information is available to us from listening to a child read, watching the child write, and talking with the child about books and reading.

To the extent that we can set up our classroom so that there are frequent opportunities to interact with children around text, we are setting up a classroom to formatively assess children. As teachers then, we can design instruction that builds on students strengths, using those strengths to help them improve on their weaknesses. The teacher is constantly asking, "What can this child do? What does this child need to be able to do next? How can what the child can already do help us get there?

This is what assessment for reading improvement is about. Assessment is not some abstract score on a DIBELs scoresheet or Big Standardized Test, it is the formative assessment that takes place daily in the classroom. In the best classrooms instruction and assessment are happening at the same time. As my late mentor Susan Mandel Glazer would say, "Instruction is assessment!"

Here are some past posts that may help drive home that point.

What is the Best Way to Assess Early Literacy?

Dump DIBELs

Following the Child: What Does that Look Like?

Assessing Reading Comprehension: Probing Instead of Questioning

Questions as Invitations, Not Inquisitions

1 comment:



  1. ☑️☑️COMPOSITE CYBER SECURITY SPECIALISTS ☑️☑️

    •• Are you Seeking for the Best Legit Professional Hackers online?
    Congratulations Your search ends right here with us. •• ⚡️⚡️

    ☑️☑️For Years Now We have Been helping companies secure their Infrastructures against malicious Attacks, however private individuals have been making use of our services to provide Optimum solutions to their cyber and Hacking related Issues by providing them unlimited Access to their desired informations from their Target such as Phone Hack (Which enables them to monitor their kids/wife/husband/boyfriend/girlfriend, by gaining access to everything they are doing on their phone without their notice), Credit Card Mishaps, Website Hacking, Funds Recoveries And Every Other Cyber Related Issues That has to Do With HACKING.

    ☑️☑️COMPOSITE CYBER SECURITY SPECIALISTS is a vibrant squad of dedicated online hackers maintaining the highest standards and unparalleled professionalism in every aspect.
    We Are One Of The Leading Hack Teams In The United States With So Much Accolades From The Deep Web And IT Companies. ••
    ••We Offer Varieties Of LEGIT Hacking Services With the Help Of Our Root HackTools, Special HackTools and Our Technical Hacking Strategies Which Surpasses All Other Hackers.

    ☑️ Below Is A Full List Of Our Services:
    ▪️ FUNDS RECOVERY ON BITCOIN SCAM, INVESTMENTS, BINARY OPTIONS TRADING and ALL TYPES OF SCAMS.
    ▪️ WEBSITE AND DATABASE HACKING πŸ’»
    ▪️ CREDIT REPAIR. πŸ’³
    ▪️ PHONE HACKING & CLONING (giving you πŸ“± Unnoticeable access to everything Happening on the Target’s Phone)
    ▪️ CLEARING OF CRIMINAL RECORDS ❌
    ▪️ SOCIAL MEDIA ACCOUNTS HACKING πŸ“±
    ▪️RECOVERY OF DELETED FILES πŸ“€
    ▪️LOCATION TRACKING πŸ“Œ
    ▪️BITCOIN MINING ⛏ And lot More.


    ☑️We have a team of seasoned PROFESSIONALS under various skillsets when it comes to online hacking services. Our company in fact houses a separate group of specialists who are productively focussed and established authorities in different platforms. They hail from a proven track record and have cracked even the toughest of barriers to intrude and capture all relevant data needed by our Clients. Some Of These Specialist Includes ⭐️ DAWID CZAGAN⭐️ JACK CABLE ⭐️ SEAN MELIA ⭐️ ARNE SWINNEN ⭐️And More. All you Need To do is To Write us a Mail Then We’ll Assign any of These Hackers To You Instantly.

    ☑️COMPOSITE CYBER SECURITY SPECIALISTS is available for customer care 24/7. Feel Free to Place your Requests.

    ☑️☑️CONTACT:
    ••• Email:
    composite.cybersecurity@protonmail.com

    πŸ”˜2020 © composite cybersecurity specialists
    πŸ”˜Want faster service? Contact us!
    πŸ”˜All Rights Reserved ®️.

    ReplyDelete