Motivation and Learning Strategies for College Success : A Self-management Approach

(Greg DeLong) #1

 GI      $


LEARNING FROM TEXTBOOKS 197

“Taxation” in an economics textbook but have no specific idea as to
what about taxation the author will discuss. You read on and learn
how the federal government uses tax policy to allocate different
resources. You then go back to the heading and write: “How does the
government effect the allocation or resources through tax policy?”
You then go back to the text and underline the answer to the ques-
tion. Sometimes you can ask more than one question. For example,
if you find the heading “Gun Control” in a political science book,
you might want to know: What are the different views on gun con-
trol? What organizations support and oppose gun control? What leg-
islation currently exists regarding gun control?
The following are examples of headings in textbooks turned into
questions:

Headings Questions
Improving Listening Skills What methods can students use
to improve their listening skills?
Interest Groups How do interest groups influence
political elections?
Gender Identification What is gender identity? What are
the different theories of gender
identification?

The following are two excerpts from textbooks where a student has
turned the heading into a question and underlined relevant phrases in the
passage to answer the question. Notice the selective use of underlining:

What are the different types of computer crimes?
High-Tech Crime: The Criminal and the Computer
Technological change advances criminal opportunities as well as non-
criminal ones. Nowhere is this more in evidence than in the realm of
electronics. We live in an era of high technology, one in which elec-
tronic brains and silicon chips rule much of the behavior of people and
machines. The more computers we have and the more things we can
get them to do, the more opportunities there are for computer crime.
Estimates of the annual losses from computer-related crimes go as high
as $5 billion, and in all likelihood the figure will go much higher.
The range of computer crimes is vast and growing....Embezzlement,
industrial espionage, theft of services (for example, using a computer
that belongs to someone else for one’s private business), invasion of
privacy, copyright violations, destruction of information or programs,
falsification of data, and a host of fraudulent transactions are just a
few of the computer-related abuses that have come to light.
Free download pdf