{"id":2231,"date":"2016-03-02T07:04:27","date_gmt":"2016-03-02T12:04:27","guid":{"rendered":"http:\/\/iblog.dearbornschools.org\/lichocki\/?p=2231"},"modified":"2016-03-02T07:04:27","modified_gmt":"2016-03-02T12:04:27","slug":"2231","status":"publish","type":"post","link":"https:\/\/iblog.dearbornschools.org\/lichocki\/2016\/03\/02\/2231\/","title":{"rendered":""},"content":{"rendered":"<ul>\n<li><span style=\"text-decoration: underline;\">SLOT<\/span>-Referencing Article of the Week #3, read and annotate for\u00a0<em><span style=\"text-decoration: underline;\">Audience<\/span><\/em> and\u00a0<em><span style=\"text-decoration: underline;\"> Purpose<\/span><\/em>.\n<ul>\n<li>Highlight textual evidence<\/li>\n<li>Label and explain through annotation\n<ul>\n<li>Reasoning Practice\n<ul>\n<li><u><b>Claim<\/b><\/u>&#8211; Apple should have to assist the United States government\u00a0 in gaining access to private information.\n<p><u><b>Evidence<\/b><\/u>&#8211; \u201cThanks to Apple\u2019s encryption software and additional security features, terrorists can conspire to commit another 9\/11 attack with little fear of discovery\u201d (McKenzie 2).<\/p>\n<p><u><b>Reasoning<\/b><\/u><b><i>&#8211; <\/i><\/b><b>Explain how the evidence proves the claim.<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"text-decoration: underline;\">SSR<\/span>-Read novel for 10 minutes.<\/li>\n<li><span style=\"text-decoration: underline;\">Argumentative Research Paper<\/span>-Outline due. Begin typing\/MLA set-up. Assignment is posted in Google Classroom. Make sure to view the rubric.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>SLOT-Referencing Article of the Week #3, read and annotate for\u00a0Audience and\u00a0 Purpose. Highlight textual evidence Label and explain through annotation Reasoning Practice Claim&#8211; Apple should have to assist the United States government\u00a0 in gaining access to private information. Evidence&#8211; \u201cThanks to Apple\u2019s encryption software and additional security features, terrorists can conspire to commit another 9\/11 [&hellip;]<\/p>\n","protected":false},"author":1139,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2231","post","type-post","status-publish","format-standard","hentry","category-class-news"],"_links":{"self":[{"href":"https:\/\/iblog.dearbornschools.org\/lichocki\/wp-json\/wp\/v2\/posts\/2231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iblog.dearbornschools.org\/lichocki\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iblog.dearbornschools.org\/lichocki\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/lichocki\/wp-json\/wp\/v2\/users\/1139"}],"replies":[{"embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/lichocki\/wp-json\/wp\/v2\/comments?post=2231"}],"version-history":[{"count":0,"href":"https:\/\/iblog.dearbornschools.org\/lichocki\/wp-json\/wp\/v2\/posts\/2231\/revisions"}],"wp:attachment":[{"href":"https:\/\/iblog.dearbornschools.org\/lichocki\/wp-json\/wp\/v2\/media?parent=2231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/lichocki\/wp-json\/wp\/v2\/categories?post=2231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iblog.dearbornschools.org\/lichocki\/wp-json\/wp\/v2\/tags?post=2231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}