Theme Statements - Freshmen Happenings in Ms. Tsai's Class

Theme Statements - Freshmen Happenings in Ms. Tsai's Class

Theme Statements Developing theme through topics Warm-up activity (nonot the PE kind) Look at the two questions for homework last night. Share with your partner the

theme you have. Are your themes similar? How are they similar or how are they different? Be prepare to share your responses. Topic vs. Theme Theme statements come from topic words, such as

love acceptance betrayal envy friendship Topic Topics may be the same for different

stories, but the authors messages about the topic word may be different For example, compare the topic of cruelty in Most Dangerous Game and in The Cask of Amontillado. How is cruelty different in these two stories? What is each of the author trying to say

about cruelty in the stories? Theme Statements Therefore, theme statements cannot be just one word, but a complete sentence. Theme = the authors central idea or message of a work.

Simply Think of topics as the what. What are the big ideas in the story? Themes are the so what. So what about the topic word? So what is the author trying to say?

Lets practice! Take out your agenda Homework for tonight: Read The Sniper on page 211 Come up with 5 topic words Choose 1 topic word and come up with a theme based on that topic word.

Write the 5 topic words and theme in the writing section (pg 66+) in your notebook.

Recently Viewed Presentations

  • Adolescence - Weebly

    Adolescence - Weebly

    Commit to school, career Daniel levenson's seasons of life Early adult transition (17-early 40s) Focus: leave behind adolescence and live in an adult life structure Education and work Enter adult world: (22-28) Form a dream Choose an occupation Find love...
  • MOHAWK WARRIOR FOOTBALL - Mohawk High School

    MOHAWK WARRIOR FOOTBALL - Mohawk High School

    Allows us to compete up front with smaller, athletic linemen by use of zone and angle blocking. Allows us to be simple but multiple. We use a handful of blocking schemes for multiple plays. Creates conflict in defense by use...
  • Adjectives and Adverbs - Warren Hills Regional School District

    Adjectives and Adverbs - Warren Hills Regional School District

    Adjectives and Adverbs spices of life sprinkles on the vanilla cone accessories of fashion flowers and shrubs bells and whistles Adjectives Adjectives modify nouns or pronouns Adjectives answer: What kind?
  • Tips & experiences to improve the learning experience and ...

    Tips & experiences to improve the learning experience and ...

    They must cite all the information necessary to let you confirm the three conditions [below]. Even a brief news report can cite the method of selection (such as "nationwide telephone sample obtained by random digit dialing, on October 5-6, 1996"),...
  • Soldier Systems Center 3D Circuit Integration Technology for

    Soldier Systems Center 3D Circuit Integration Technology for

    Times New Roman Arial Helvetica Arial Narrow Symbol Arial Narrow Special G1 Blank Presentation.pot Microsoft Excel Chart Microsoft Excel Worksheet No Slide Title No Slide Title N1 Test Reticle Layout N1 3D Photodiode Active Pixel 3D Transfer/Via SEMs - 9/98...
  • Is the Foreign Supplier All In? Service and

    Is the Foreign Supplier All In? Service and

    Words, Phrases and Concepts . Territorial limits. Traditional notions of fair play and substantial justice . ... related to a product fortuitously ending up in the forum state. Personal Jurisdiction in 30 Minutes. Ins. Corp. of Ireland (1982) Insurance Corp....
  • Writing software or writing scientific articles? Maria Grazia

    Writing software or writing scientific articles? Maria Grazia

    Introduction of noise: background evaluation to be refined Manual scan for paper classification In many cases no other way to evaluate the pertinence of papers Some degree of subjective evaluation (1-10%) Conservative bias: assign to software in case of sw/hw...
  • Computer Security: Principles and Practice, 1/e

    Computer Security: Principles and Practice, 1/e

    A number of network security algorithms based on cryptography make use of. random numbers. For example, • Generation of keys for the RSA public-key encryption algorithm (described. in Chapter 21) and other public-key algorithms. • Generation of a stream key...