Students conduct an energy audit to determine how much carbon dioxide their family is releasing into the atmosphere and then make recommendations for minimizing their family's carbon footprint. Students are specifically asked to understand the units of power and energy to determine the cost of running various household appliances. Finding the amount of carbon dioxide emitted for different types of energy and determining ways of reducing carbon dioxide output is the outcome of the lesson.
In this activity, student teams research and develop a proposal to decrease the carbon footprint of their city's/town's public transportation system and then prepare a report that explains why their transportation plan is the best for their community.
This is an activity in which students take the role of either a car seller or a car buyer to learn about transportation energy options. Car sellers are challenged to pitch to buyers about cars with a particular fuel type while car buyers each have a specified personal and socio-economic background that must be considered when buying a car.
This board game, designed for middle school students, introduces the concepts of energy use in our lives and the real impact that personal choices can have on our energy consumption, energy bills, and fuel supply.
This Energy Flow Charts website is a set of energy Sankey diagrams or flow charts for 136 countries constructed from data maintained by the International Energy Agency (IEA) and reflects the energy use patterns for 2007.
This video provides an introduction to benefits and limitations of many sources of energy including fossil fuels, nuclear, hydro, wind, solar, geothermal, and biomass. It also discusses hydrogen and hybrid cars.
This video segment highlights how the U.S. military is the single largest user of energy in the nation, but it is also trying to reduce its carbon bootprint. Scenes taped at Fort Irwin and Camp Pendleton show the Army and Marines experimenting with wind and solar in order to reduce the number of fuel convoys that are vulnerable to attack.