SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Scientific Method
Scientific Method ,[object Object],[object Object]
ScientificMethod ,[object Object],[object Object],[object Object],[object Object],[object Object],It has to be something you can test!
Step 2:  Research ,[object Object],[object Object],[object Object],[object Object]
Step 3:Make a hypothesis. After you have researched your topic, you can form a hypothesis about it.
Hypothesis ,[object Object],[object Object],[object Object]
Step 4: Procedure ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Control A  control  is a  part of the experiment that is used to compare your results to . For example:  The control could be a piece of bread that is just left in a ziploc bag in the room (not in a window or dark cabinet, no drops of water added).
Variable ,[object Object],[object Object],[object Object]
Controlled Variable ,[object Object],[object Object],[object Object]
Step 5: Results ,[object Object],[object Object]
This analysis of your data will help you come to your… Conclusion (Step 6) Your  conclusion  is  what you have decided based on your experiment .  Your conclusion  states whether or not your hypothesis was right .
For example: “ Because the bread in the dark cabinet grew a lot of mold, my hypothesis that mold does not need light to grow is correct.” Remember:   Just because your hypothesis was incorrect, does not mean that you have made a mistake .  It actually means that you conducted an objective, scientific investigation.  Congratulations!  You just learned something new and probably taught someone else something new.
Let’s review… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Ähnlich wie Scientific Method

Scientific method procedures (Teach)
Scientific method procedures (Teach)Scientific method procedures (Teach)
Scientific method procedures (Teach)Moira Whitehouse
 
The scientific investigation
The  scientific investigationThe  scientific investigation
The scientific investigationDee Bayn
 
G7 Science Q1- Week 1-Scientific Investagation.ppt
G7 Science Q1- Week 1-Scientific Investagation.pptG7 Science Q1- Week 1-Scientific Investagation.ppt
G7 Science Q1- Week 1-Scientific Investagation.pptLaArmmieTradio
 
G7 Science Q1- Week 1-Scientific Investagation.ppt
G7 Science Q1- Week 1-Scientific Investagation.pptG7 Science Q1- Week 1-Scientific Investagation.ppt
G7 Science Q1- Week 1-Scientific Investagation.pptKristalRylOiga
 
Module 1 scientific method ppt
Module 1 scientific method pptModule 1 scientific method ppt
Module 1 scientific method pptGena Barnhardt
 
Introduction to Scientific Method.pptx
Introduction to Scientific Method.pptxIntroduction to Scientific Method.pptx
Introduction to Scientific Method.pptxLedelanePantilo1
 
Scienceprocesses and scientific method
Scienceprocesses and scientific methodScienceprocesses and scientific method
Scienceprocesses and scientific methodDee Bayn
 
Scientific method
Scientific methodScientific method
Scientific methodMLFGarcia
 
Scientific method
Scientific methodScientific method
Scientific methodkapitanbasa
 
Scientific method ok
Scientific method okScientific method ok
Scientific method okpmoles
 
Scientific method
Scientific methodScientific method
Scientific methodmsnancy
 
Scientific method
Scientific methodScientific method
Scientific methoderspencer
 
Scientific method
Scientific methodScientific method
Scientific methodjkentner
 
Scientific method
Scientific methodScientific method
Scientific methodKayla Jones
 

Ähnlich wie Scientific Method (20)

Scientific method procedures (Teach)
Scientific method procedures (Teach)Scientific method procedures (Teach)
Scientific method procedures (Teach)
 
The scientific investigation
The  scientific investigationThe  scientific investigation
The scientific investigation
 
G7 Science Q1- Week 1-Scientific Investagation.ppt
G7 Science Q1- Week 1-Scientific Investagation.pptG7 Science Q1- Week 1-Scientific Investagation.ppt
G7 Science Q1- Week 1-Scientific Investagation.ppt
 
G7 Science Q1- Week 1-Scientific Investagation.ppt
G7 Science Q1- Week 1-Scientific Investagation.pptG7 Science Q1- Week 1-Scientific Investagation.ppt
G7 Science Q1- Week 1-Scientific Investagation.ppt
 
Scientific method
Scientific methodScientific method
Scientific method
 
Module 1 scientific method ppt
Module 1 scientific method pptModule 1 scientific method ppt
Module 1 scientific method ppt
 
Introduction to Scientific Method.pptx
Introduction to Scientific Method.pptxIntroduction to Scientific Method.pptx
Introduction to Scientific Method.pptx
 
Scientific Method
Scientific MethodScientific Method
Scientific Method
 
Scientific Method
Scientific MethodScientific Method
Scientific Method
 
Scienceprocesses and scientific method
Scienceprocesses and scientific methodScienceprocesses and scientific method
Scienceprocesses and scientific method
 
Scientific method
Scientific methodScientific method
Scientific method
 
Scientific method
Scientific methodScientific method
Scientific method
 
Scientific method
Scientific methodScientific method
Scientific method
 
Scientific method
Scientific methodScientific method
Scientific method
 
Scientific method ok
Scientific method okScientific method ok
Scientific method ok
 
Scientific method
Scientific methodScientific method
Scientific method
 
Scientific method
Scientific methodScientific method
Scientific method
 
Scientific method
Scientific methodScientific method
Scientific method
 
Scientific method
Scientific methodScientific method
Scientific method
 
Scientific method
Scientific methodScientific method
Scientific method
 

Mehr von ewingj

Rainshadow
RainshadowRainshadow
Rainshadowewingj
 
Energy Web Version
Energy Web VersionEnergy Web Version
Energy Web Versionewingj
 
Energy
EnergyEnergy
Energyewingj
 
Writing Assessment97
Writing Assessment97Writing Assessment97
Writing Assessment97ewingj
 
Holocaust Concentration Camps
Holocaust Concentration CampsHolocaust Concentration Camps
Holocaust Concentration Campsewingj
 
Box Turtles
Box TurtlesBox Turtles
Box Turtlesewingj
 
Anne Frank’S Life
Anne Frank’S LifeAnne Frank’S Life
Anne Frank’S Lifeewingj
 

Mehr von ewingj (8)

Rainshadow
RainshadowRainshadow
Rainshadow
 
Energy Web Version
Energy Web VersionEnergy Web Version
Energy Web Version
 
Energy
EnergyEnergy
Energy
 
Writing Assessment97
Writing Assessment97Writing Assessment97
Writing Assessment97
 
Gavin
GavinGavin
Gavin
 
Holocaust Concentration Camps
Holocaust Concentration CampsHolocaust Concentration Camps
Holocaust Concentration Camps
 
Box Turtles
Box TurtlesBox Turtles
Box Turtles
 
Anne Frank’S Life
Anne Frank’S LifeAnne Frank’S Life
Anne Frank’S Life
 

Kürzlich hochgeladen

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 

Kürzlich hochgeladen (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

Scientific Method

  • 2.
  • 3.
  • 4.
  • 5. Step 3:Make a hypothesis. After you have researched your topic, you can form a hypothesis about it.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Control A control is a part of the experiment that is used to compare your results to . For example: The control could be a piece of bread that is just left in a ziploc bag in the room (not in a window or dark cabinet, no drops of water added).
  • 11.
  • 12.
  • 13.
  • 14. This analysis of your data will help you come to your… Conclusion (Step 6) Your conclusion is what you have decided based on your experiment . Your conclusion states whether or not your hypothesis was right .
  • 15. For example: “ Because the bread in the dark cabinet grew a lot of mold, my hypothesis that mold does not need light to grow is correct.” Remember: Just because your hypothesis was incorrect, does not mean that you have made a mistake . It actually means that you conducted an objective, scientific investigation. Congratulations! You just learned something new and probably taught someone else something new.
  • 16.