Primary and Secondary Sources of Information

Primary sources of information allow the learner to access original and unedited information. A primary source requires the learner to interact with the source and extract information. Secondary sources are edited primary sources, second-hand versions. They represent someone else's thinking.

Advertisements

    Graphic Organizers

    Primary Sources

  • Person
  • Interview
  • E-Mail contact
  • Event
  • Discussion
  • Debate
  • Community Meeting
  • Survey
  • Artifact
  • Observation of object (animate and inanimate)
    Secondary Sources
  • Reference Material
  • Book
  • CD Rom
  • Encyclopedia
  • Magazine
  • Newspaper
  • Video Tape
  • Audio Tape
  • TV
    Primary or Secondary
  • Internet Web Site
  • Graph, chart, diagram, table
Privacy Policy:

This privacy policy is reviewed and revised from time to time. You may wish to revisit it regularly.
This site does not collect or store data from you with the purpose of selling or renting the data or sending marketing emails. We collect no more data about each visitor than most other websites.
When posting a comment, a name and email address are required. You do not have to select your real name. Your email address will not published.
Comments, trackbacks, pingbacks and forms submitted here will be identified by your IP address. It's sometimes possible to use these numbers to trace/identify someone or the ISP or employer / educational institution the IP address is registered to. Your IP address could potentially be used in conjunction with other data to identify you. If this is a concern please use an anonymous browsing service (see http://tor.eff.org).
Some of the facilities on this site are usable only if you have cookies enabled. Some advertising networks like Google also store cookies. You may wish to clear these cookies and the browser cache if you wish to refrain from revealing any identifying information, especially if you are using a public or shared computer.
Any time you visit a page on the internet, you send quite a bit of information to the server. The web servers that host this site maintain access logs with the information that you send. These servers are owned by third parties and this information is used to provide site statistics and to get an idea of popular pages and what sites link here. We do not intend to use these logs to identify legitimate users. The data logged may be used by us to solve technical problems with the site and, in cases of abuse of this site, to investigate the abuse.
Again, if you are concerned about attempts to match your IP address to your identity, you may wish to use an anonymous browsing service or attempt some means to obfuscate your real IP address.
In general, it is not our practice to disclose personal information to third parties. We may share personal information we collect in the following circumstances:
* As required by law, such as in response to a valid request from law enforcement.
* To designated third parties to resolve or investigate abuse complaints or to enhance, add or maintain functionality of this site
* When the information is related to spiders or bots, usually when investigating technical issues.
* For abusive users, we may release information to assist in attempting to block the abusive user or to complain to that userís Internet Service Provider.
* If necessary to defend legal claims against us by third parties.
* When we deem it necessary to protect the property or rights of the user community, or this website.
You are required to give your email address when you post a comment. We will not sell information collected via this site, such as your email address, to third parties. If you are concerned, you may wish to get a free email account or attempt to use a remail service.
We implement reasonable security measures to protect against unauthorized access to or interception of personal information that we store or control. However, no site can fully eliminate security risks and we make no guarantee that the information that you provide us cannot be unlawfully intercepted / accessed. Please notify us if any such security breach occurs.
Added: Google, as a third party vendor, uses cookies to serve ads on your site. Google's use of the DART cookie enables it to serve ads to your users based on their visit to your sites and other sites on the Internet. Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy (google.com/privacy_ads.html.