Friday, 14 December 2012

NEXT POST
Educational Strategies To follow, the results of the research with the strategies of education are presented used by the professors observed and analyzed the excellent contextual condicionantes for the learning, in accordance with the ideas of Alonso Tapia (1999), observing the moments of a lesson: at the beginning of the lesson, organization of the activities, interaction professor and pupils and evaluation. 3 PRESENTATION AND QUARREL OF the DATA Through the comment of the strategies of education used by the professor in room of lesson, evidenced that how much to the motivation goals, the professors obtain to attract the attention of the pupils. The curiosity and the interest are despertados through the establishment of connections with the reality and the local peculiarities, motivating them for the learning. The curiosity ' ' it is an attitude, manifest in the exploratria behavior, activated for the characteristics of the information such as its newness, complexity, unexpected character, ambiguity and variabilidade' ' (ALONSO TAPIA, 1999, P. 38-39). When the professor does not look for to awake the curiosity, the pupils can consider that the objective is to memorize, what can influence negative in the form to face the difficulties. The interest says respect to keep the attention centered in the explanation of the activity for the professor, occasion where it relates with what already it knows. That is, it deals with ' ' to direct the attention for new, uncertain, surprising or incongruous a phenomenon, followed of an activity guided for the exploration of it that it facilitates its knowledge and compreenso' ' (ALONSO TAPIA, 1999, P. 40). When he does not have interest can have gaps in the understanding. Therefore, the cohesion in the progression of the presentation of the contents facilitates to the hierarquizao and the understanding of the ideas; also the rhythm of the...
PREVIOUS POST
Store Online In the previous article we talked about the need to use secure protocols to make economic transactions in the online store. We also mentioned the need to consider a few basic requirements to choose a secure payment system: authentication, integrity and non-repudiation. We'll see how difficult it is to meet the three requirements at the same time. With SSL, Secure Sockets Layer, the information travels encrypted so that it cannot be interfered or performed by third parties. SHTTP we have similar characteristics. They are probably most widely used by online stores security protocols. To use either of the two protocols to our shop online has to be installed on a secure server. The merchant's online store you need certified keys but the client does not. It is a user-friendly method for the customer by its simplicity, but the merchant can come up with the repudiation to the not guaranteed in the process the identity of who makes the purchase online. In some cases and in accordance with which company will install the SSL system, customer may at any time verify the validity of the certificate of the online store domain security, the owner of this certificate and the geographical location of both (web hosting). With SET, Secure Electronic Transaction, is necessary to obtain a Digital certificate issued by a certification authority that will be responsible for certifying that whoever buys it online is who they claim to be. This is a complex system that does not have many followers. The SET Root CA certifies the Brands SET between those American Express Company, Cyber-Comm, JBC Company l., MasterCard International, Nippon Shinpan C.L., PBS International, ASDankort and Visa International found. These entities are responsible for issuing the certificates online stores proprietary traders and proprietary cards customers. The certifications have a cost attached...