How to Develop Excellent Mathematic Students

There was a time that the United States of America had some of the highest mathematic scores in the world for students in grades k through 12. A lot has changes since those days, and in order to help children get back on the path to being good mathematical students parents need to play an important role. Parents can assist with developing a lot of the fundamental skills needed for children to succeed in math when they attend school. Parents can do things that will support the schools and hopefully the schools will do the rest.

In order to develop a student that has good math skills, a parent must play a key role in the learning process. In addition to parents, teachers and other family members are very important to a child’s mathematical development. Elementary teachers and parents play the biggest role in a child’s mathematical development, especially from Kindergarten through Fourth Grade. Time spent in school learning math or not learning math can never be replaced. Parents should make sure the elementary math teacher is knowledgeable and is a good teacher. Anything less could cause children to suffer a tremendous loss. The teacher that parents should be trusting to teach their child math is a person that will challenge their child regardless of their age. In addition to the challenges, the teacher should encourage children to try hard. Children need to know that their teacher cares about them and is not just trying to give them a lot of hard work. This teacher should believe in giving homework every night. Homework reinforces what was taught and learned in class and gives the parent and the teacher a chance to see if the child understands that information.

I have observed teachers who really challenge their students to achieve higher order thinking These teachers take their students as early as the Second Grade and teach them how to add, subtract, multiply and divide using only their bran. We call this Mental Math. When I observed a Second Grade Class that had their students mentally answering math computation questions, I put my own son in that class. Shortly after being enrolled, He, too, learned how to do Mental Math. From that point on, math was my son’s best subject. Teachers can really make a difference and parents can help affect change.

The parent’s role in their child’s math development is very important and should start as young as possible. Teaching young children how to count, add and subtract numbers in their head without pencil and paper can stimulate the brain to think mathematically. Parent s can start the process by teaching children how to count from one to one hundred. Teaching children how to mentally figure out math problems should also be part of this process. They can start with asking simple math questions and going on to harder questions, as the child gets older. Parents should continually ask children mathematical computation questions and give positive feedback when they respond. Children love to receive positive feedback and that encourages continues growth.

In addition to mental math activities, children should be given grade level mathematics workbooks to strengthen their math skills. Parents should have these books and other subject content books at home for additional practice and homework. These can be purchased from bookstores, teacher supply stores and multiple-purpose department stores where school or office supplies are sold. As children become more confident in their math skills, give them worksheets one grade level above their current grade. Help them if necessary, but when students become successful in the upper level workbooks; their confidence will really improve. The seed will be planted early and parents can watch as it grows.

A parent must know what level of math and any other subject, for that matter, that their child is performing at every school year. When children enter kindergarten and the school recommends that children know their ABC’s and know how to count to twenty or whatever number, it is the parent’s responsibility to make sure the child is prepared prior to enrolling in school. Also, when the child is in the second or third grade and their child can’t add simple two digit numbers, it is up to the parent to make sure that their child gets the extra help needed to become successful. Parents cannot wait on the school every time their child has an academic deficiency. Part of being a good parent is making sure that your child functions at the correct grade level throughout their academic career.

Another strategy involves allowing your child to spend some time on a computer playing math games. The computer can be a wonderful resource that supports math and other subject area skills. Software is available that will measure a child’s math skill level. Some of the software is developed in a game format. Children will think that they are playing a game, but in reality are actually learning math. Technology can be great, but I must warn parents to not allow children to spend a lot of unsupervised time on the computer.

Another recommendation for parents is to not allow children to utilize calculators at an early age. Children need to first develop their brains to be able to do mathematical computations on their own. Constantly using calculators at a young age can stunt the mathematical growth of children. If children develop math skills by mentally thinking of the answer to simple problems, they will be better prepared for everyday life, such as grocery shopping, balancing a checkbook, to name a few. For example, all children should learn their multiplication tables by the third grade. They should be able to repeat them, verbally, without using a calculator. Children in elementary school who rely on the calculator for the answers are creating math deficiencies, which could have a negative impact on their math development.

In addition to good teachers and involved parents, children should be involved in extracurricular activities that support math. In the state of Michigan, students can join a club at their school that plays a game called Academic Games. This form of gaming is challenging for children. It helps them to develop their academic skills as well as their math skills. Children can start playing these games as early as the second grade. This form of gaming will teach children how to play the game of Equations, a form of Algebra, at the age of seven. These skills are called Higher Order Thinking Skills. The children also compete locally, state wide, and on the national level. The experience is invaluable. There are also other mathematical games and clubs that children can join that will help develop skills and are fun. Parents should contact their local school district or state level office of Gifted and Talented Programs for this information.

Children can take classes from various organizations that will support their mathematical development. These organizations may offer classes in the summer or on the weekends. Some of the classes can teach children how to build robots, toy cars, toy airplanes, etc. These classes may be in the area of engineering, computer science or some other technical field. The classes can be taught at the various colleges or universities in the local area. This is a community outreach for the colleges and universities, but children will develop social and academic skills that will carry over to their classroom and on to adulthood.

When trying to develop good math students, all avenues should be tried. Parents can make additional progress by allowing children to visit work locations that utilize a lot of math. Children should be exposed to as many careers as possible. Careers in math and even science should be on their list of considerations. Parents should inform children which careers require them to have good math skills.

Parents who are positively involved with their children and want the best for them will make sure their children are keeping up with their math skills and are successful in school. The strategies utilized in this article are a sample of the many ways parents can make sure their child is developing strong mathematical skills. The number one way to help a child develop good math skills is to have their parents positively and actively involved with their educational journey.

Football Manager 2011 Tactics

Tactics in Football Manager 2011 are broken up into separate methods of instruction: Tactical Shape/Formation, Team Instructions, Player Duties, Player Roles, Player Instructions and Touchline Shouts. The immediate issues to deal with when building a tactic are your players. You need to decide how they’re going to fit into your tactics or if you’re going to build a tactic around what you have at the club. Sometimes, this decision is made for you, so it’s best to review the squad fully and see what attributes your players have and how effective they’d be in a specific role, then begin to piece your tactical shape together and if you need to, hit the transfer market for some reinforcements.

Formations

The starting point of any tactic requires you to firstly assess your players and see who and what you’re working with. After you’ve done that, you should have some idea of what kind of formation you’re going to play. Most people tend to opt for the dependable 442, the more attacking 433, or the more defensive 451. These three tactics are the more popular shapes, but none of them have to dictate the way you chose to play the game. You could, for example, go with the 451 which offers strong defensive numbers and overcrowds the middle of the pitch (at the expense of attacking support for the lone striker) and could opt to be overly attacking and push high up the pitch, you don’t necessarily need to sit back and counter-attack or play defensively just because your formation suggests it should be a more defensive tactic.

The overall thing to remember when selecting a formation is that you should take into account who you have in your team and the strength of those players. For example, if you don’t have strong wingers it’s obviously better to deploy your team to work through the middle of the pitch, solidify the midfield and look to get the stronger players on the field – although, not at the expense of playing players out of position. It’s highly inadvisable to play weaker players just because they fit your preferred formation – if you can’t replace the weak players, look to create a shape which has balance, but also potency; don’t give the weaker players a role which they’ll struggle to impress in, give them minimal duties and responsibilities and focus the tactic to get the better players more involved.

Philosophy

Philosophy is a hugely important aspect of the tactical setup. It defines the behaviour of the players. Basically a fluid style of play would have the players playing the game more to their specific personalities, defenders would attack more and attackers might come back more – much like the way Rooney plays in his free role at Manchester United – except the whole team would play in that manner. A rigid style of play would be the complete opposite to the fluid style, forcing the players to do exactly what you’ve told them – but this can have an effect on their creativity and improvisation. These settings will operate within the parameters of a player’s personality though, so don’t expect someone like Berbatov to start defending off the line during an opposition counter-attack, if you’re set to a more fluid setting; Their Mental attributes obviously still come into play.

Strategy

Strategy dictates the behaviour and mentality of the team, as well as the movement of the players and their positioning. It’s not an overly complex setup procedure, so it’s worth experimenting with in some friendly games so you can see first-hand how the setting affects the team’s approach to taking on the opposition. Strategy triggers the movement of the mentality and positioning sliders, which will create a different spacing system between each player – for example, if the players were very defensive, they’d be much closer together – hence less gaps in-between each player; if the players were very attacking, they’d be much further apart – hence wider gaps in-between each player.

A Closer Look at Cyber Crooks

I work from my home, the most peaceful workplace I can think of so far. As a Homemaker and part time Freelance Writer, I submit articles and subscribe to various respectable writing newsletters and do endless research online. But before signing up, I read privacy policies, some brief while others boringly lengthy.

I am just one among millions of unknown but honest Internet users. Why, to my mind, would I worry so much about anyone in the Internet community making me a target for nasty tricks or harassments?

Nonetheless, I feel safe just knowing that the websites that interest me run a committed sense of policy on security.

But when my computer screen started flashing as if gasping for air and slowly died down months ago, I blamed electric current fluctuations. But when my files disappeared and my computer turned alarmingly uncooperative, I referred the case to the expert, my husband.

For the first time, I was hit by a computer virus.

It was not as simple as unplugging the computer connection, sleeping on it for a few days while a computer surgeon works on the damage so everything could be good as new.

I saw months of hard work on research, completed manuscripts stashed in my hard disk, long hours spent online, time, money, and effort my spouse has invested in setting up the whole system, all go down the drain and turn into nothingness.

Going through the process of repair and reconstruction is painfully tedious, time consuming, and costly.

I was angry. I took it as an attack on my person. The perpetrator has no heart.

A series of disturbing yet quite interesting cyber intrusions that followed prodded me to quench my curiosity and do a personal research on what inspires the behavior behind the waste of skill, time and resources involved in these damaging cyber pursuits and other elctronic petty crimes that make life miserable for honest internet users.

CYBER OFFENDERS

Anyone who enters your home without your consent is committing an offense theoretically. Your computer system is an extension of your boundaries and must not be infringed. When someone gains unauthorized access to your computer in any manner or utilizes the computer technology in performing a felony, he/she commits a cyber crime.

The Hacker is always the first person that comes to mind in relation to cyberspace violations. After all, who else can be as knowledgeable and bold enough to break into someone else’s computer system?

Hackers used to have nobler objectives for their being. In the earlier days of the Computer technology, they were the computer experts/geniuses who tested computer systems, with the owners’ consent, for loopholes and recommended better programs or fixed the errors themselves to frustrate any effort to exploit the defective system by more dangerous ‘creatures.’ They even had the Hackers’ Code of Ethics.

There are two types of Hackers: The Ethical Pros, the highly skilled professionals who hire out their skills to organizations concerned about their own network’s safety. They represent Hackers of earlier generation. The other type is the CyberRambos or plain crackers-despised by the Elite Hackers, Crackers crack/break systems for superficial reasons. (UC San Diego Psycho. Dept.: Computer & Network Resources)

But by what many Hackers have become these days, it is difficult to ascribe their destructive behaviors to nobility instead of outright violation.

And by whatever name they are called, these cyber felons have become simply faceless and nameless ‘hackers’ to their victims.

ON MOTIVES

An online article by David Benton entitled: ‘What’s Inside a Cracker?’ from SANS (SysAdmin, Audit, Network, Security) Information Security Reading Room, states seven psychological profiles of malicious hackers as documented by Canadian Psychologist Marc Rogers M.A., Graduate Studies, Dept. of psychology, university of Manitoba and a former Police Computer Crimes Investigator:

Newbie/Tool Kit (NT): new to hacking, have limited computer/programming proficiencies; rely on ready-made pieces of software (tool kits) that are readily available in the Internet;

Internals (IT): disgruntled employees or ex-employees proficient in how the company’s internal systems work;

Coders (CD) and Virus Writers: programmers who’d like to see themselves as elite; they write codes but not for personal use. They have their own networks to experiment with “zoos.” They leave to others to introduce their codes into the “wild” or Internet. (Hacker Psych 101 by Jeremy Quittner);

Cyber-Punks (CP): antisocial geeks, the most visible, socially inept, and burdened with unresolved anger that they take into cyberspace; they relate better to computers than humans and have better computer skills and some programming capabilities; capable of writing their own software, they intentionally engage in malicious acts such as defacing web pages, spamming, credit card number theft, etc.;

Old Guard Hackers (OG): have no criminal intent in its real sense but display an alarming disrespect for personal property with great interest in intellectual endeavo;.

Professional Criminals (PC) and Cyber Terrorists (CT): most dangerous; They are professional criminals and ex-intelligence operatives who are guns for hire. They specialize in corporate espionage, are extremely well trained and have access to state of the art equipments;

Further, Rogers pointed out that not all Hackers are criminals. He has categorized them as follows: (Jeremy Quittner, Hacker Psych 101);

Old School Hackers: akin to the 1960s style computer programmers from Stanford MIT for whom it is an honor to be a hacker; interested in analyzing systems with no criminal intent; they believe the Internet was designed to be an open system;

Script Kiddies/ Cyber -Punks: wannabe hackers and crackers; use other Cracking programs carelessly with the intent to vandalize and corrupt systems; often caught red-handed because they brag their exploits online.

Professional Criminals: breaking into systems and selling information Is their livelihood; they get hire for espionage; often have ties with organized Criminal groups; not interested in disrupting systems but more on stealing intelligence data;

The list of motives is endless: boredom, illicit thrill, addiction, blackmail or low self esteem, and a desperate need for recognition from the hacker peer group, all cowardly performed under the protection of anonymity.

“Underlying the psyche of criminal hackers may be a deep sense of inferiority. The mastery of the computer technology or the shut down of a major site causing millions of dollars of damage is real power trip.” (J. Quittner, Hacker Psych 101, Hackers: Computer Outlaws)

Jarrold M. Post, a George Washington University Psychiatrist says: It’s (Hackers) a population that takes refuge in computers because of their problems sustaining real world relationships.”

The less information you share in the Internet the better. But as computer wizards, Hackers will always find ways to reconstruct your identity even with very little details in their possession.

However, there are varied ways by which you, a legitimate Internet user can be protected. Know the warning signs and get educated on how to thwart any attempt to victimize you. Don’t take the wired blows sitting down.

“Constant awareness and updating of knowledge is the best defense to any attack,” wrote Shayne Gregg, CA (NZ), CISA, CMC, in ‘A Response to Recent Cyber Attacks.’ (Information Systems Audit & Control Association InfoBytes)

I recommend The Complete Idiot’s Guide to: Protecting Yourself Online by Preston Gralla, Executive Editor, ZDNet. It is comprehensive, easy to understand, and a must for every Internet user’s library.

HACKERS, CYBERPUNKS, et al

Cyber Crime is not monopolized by hackers or crackers. The pedophile, thief or drug dealer in your community who hire computer experts to carry out their illegal activities online are as guilty and despicable.

Just like the criminals roaming out in the real world, Cyber felons are a bunch of psychologically imbalanced and misguided citizens who happen to have the dexterity to commit electronic transgressions or hire a computer expert to do the job and will never get enough despite their Cyber Glory and ‘conquests.’

Still the tendency to commit a crime lies hidden in wholesome images, while the unsuspecting is often caught by surprise. What you don’t see is sometimes what you get.

Hackers cannot be strictly stereotyped. Peter Shipley, Chief Security architect for the Big Five firm KPMG avers: “I know a lot of hackers, including one who spends an hour and a half in the gym everyday. He is built. I know of women who are knock-down gorgeous who are hackers.”

No Exceptions

Whenever high tech-crazed folks travel through your wires to make your computer system malfunction, steal your identity or get paid to give you trouble, it’s a sign that you do not take the needed precaution whenever you log in.

When I asked myself quietly back then “Why me?” I guess the reply would be “And why not?” As with most inventions, the Internet is being abused and mishandled. And as always, a helpless victim completes the drama.

Anyone can be a casualty at random regardless if one is honest, educated, high profile, residing at the far end of the globe or a Stay-at-Home- Mom working hard and peacefully from her abode.

Hackers won’t care how his/her prey will feel.

But I am still hoping that such an impressive brainwork will be put to good use by present day hackers, just how their predecessors intended Hacking to be used.