Hi, what do you want to do?
Curated Video
Organizing an Expository Text
In this video, the process of organizing an expository text is outlined step by step. It emphasizes the importance of pre-writing, drafting, revising, editing, and publishing. The use of an outline is highlighted as a helpful tool to...
Curated Video
Why Do Some Names Fall Out of Fashion
When linguists in Georgia published a study showing that young Georgians have different accents than their parents, headlines sprung up all over declaring that the drawls and y’alls of the Southern American dialect are on their way out....
Curated Video
How Cult Leaders Use Language
What do Gandhi, Martin Luther King, Jr., and Hitler have in common? They were all obsessively studied by Jim Jones, the cult leader who convinced and coerced more than 900 members of his "People's Temple" to commit suicide in the...
Curated Video
Is Body Language Really A Language?
Verbal communication covers what we say,, the words we’re saying, whether spoken or signed. So, is body language a language? Short answer: no. Body language is not a standalone language in the linguistic sense, however it is an important...
Curated Video
Why Is English Awash in Sailors Jargon?
The English language is chock full of sailing jargon like even the term “chock full’ but why is that?
Curated Video
A Brief History of the Reading Wars?
When we read our eyes skim the print, we notice the length of the word and maybe the first letter, then our brains use context clues to deduce what the word should be.But is that really how reading works? Believe it or not, this question...
Curated Video
Is English a Creole?
We already know that English borrows from everybody, but can it really be considered a Creole language?
Curated Video
Is Bluey Giving Your Kid Australian Accent
In 2019, when the children’s show Bluey hit American tv and streaming services, parents started noticing something strange. Their kids were suddenly looking for the “rubbish bin", asking what’s for “brekky”, and getting excited about...
Curated Video
Using Narrative Techniques in Writing
Dialogue, pacing, description, reflection, and incorporating multiple plot lines are narrative techniques writers use to add detail and depth to their stories. Understand each of these techniques and learn how to use them effectively in...
Curated Video
How to Write a Strong Conclusion
A strong conclusion restates the key points of your essay but in a new way. This video explains the elements to include in a conclusion and how to structure a strong conclusion paragraph, with examples.
Curated Video
Demystifying Programming Languages: The Backbone of Technology
This video provides an overview of programming languages and their significance in the digital world. It explains how programming languages are essential for creating software, websites, apps, and other technological advancements. The...
Oxford Comma
How to Write a Better Hook
In this video we'll look at famous opening lines from great works of nonfiction that you can use to write better essays.
Curated Video
Decoding Persuasive Language: Unveiling the Truth Behind Media Messages
This video transcript explores the power of persuasive language in media, emphasizing the importance of critical thinking and discernment. It highlights common tactics such as storytelling, evidence presentation, attacks, flattery, and...
Curated Video
Embracing Failure: A Path to Self-Improvement
This video emphasizes the importance of embracing failure as a learning opportunity in creative endeavors. Through personal experiences of setbacks and growth, the speaker highlights how failures can lead to self-improvement and...
Curated Video
Embracing Creativity: Rediscovering Your Childlike Impulses
This video explores the concept of rediscovering childhood creativity by embracing impulses and free-flowing ideas. It suggests techniques like free writing and adopting a "Yes and" mindset to tap into creative potential and overcome...
Curated Video
Breaking the Infinite Scroll: Understanding the Psychology Behind Social Media Consumption
This video explores the similarities between the behavior of mice in a Skinner box and our scrolling habits on social media. It highlights how the repetitive behavior of seeking rewards through scrolling can lead to excessive time spent...
Curated Video
Understanding Online Trolling: Don't Take the Bait
This video explains the concept of trolling in online behavior, likening it to fishing with bait to provoke and upset others. Trolls seek negative social rewards by causing mischief and watching others react. The key to dealing with...
Curated Video
The Power and Impact of the Internet: Connecting the World
The Internet is a global network of billions of computers that allows people to share information in various ways through physical cables and wireless connections. When you visit a website, your computer sends a request to a server where...
Curated Video
The Rise of the Internet of Things: Connecting Everyday Objects to the Web
The Internet of Things is a network of everyday objects connected to the Internet, gathering and sharing data to enhance functionality and provide convenience. From smart shoes tracking fitness metrics to city infrastructure monitoring,...
Curated Video
Unveiling the World of Digital Tracking: How Websites Know Your Every Move
This video explores how websites track your browsing habits to create targeted advertisements through methods like tracking cookies and probabilistic matching. While this raises privacy concerns, it also enables personalized...
Curated Video
Democracy: Understanding the Power of the People
This video explores the concept of democracy, its origins, and how it functions in modern society. It discusses the challenges and complexities of democratic systems, emphasizing the importance of citizen participation through voting and...
Curated Video
Protecting Your Computer: Steps to Remove Viruses and Prevent Future Attacks
This video provides a step-by-step guide on what to do if your computer gets a virus, including running a virus scan with antivirus software, updating all software regularly, and practicing safe browsing habits to prevent future attacks....