Position: Home page » Computing » The essential characteristic of view taking is de egocentrism

The essential characteristic of view taking is de egocentrism

Publish: 2021-04-30 13:09:37
1.

Decentralization is a form of social relations and content proction formed in the development of the Internet. It is a new type of network content proction process relative to "centralization"

decentralizing is not to do without the center, but to let the nodes freely choose and decide the center. In short, centralization means that the center determines the node. The node must depend on the center, and the node cannot survive without the center. In a decentralized system, anyone is a node, and anyone can be a center. Any center is not permanent, but phased, and no center is mandatory for nodes

extended data:

in a system with many nodes, each node has a high degree of autonomy. Nodes can connect freely to each other to form a new connection unit. Any node may become the stage center, but it does not have the mandatory central control function. The influence between nodes will form nonlinear causality through the network. This open, flat and equal system phenomenon or structure is called decentralization

with the deepening of the interaction between subject and object, the constant balance of cognitive function and the continuous improvement of cognitive structure, the indivial can be released from the egocentric state, which is called decentralization


2. Parents' first EQ class, the baby's cognition of the surrounding is self-learning ability, but parents' planned interaction is the best ecation at this time
please describe all kinds of emotions and emotions of the baby itself and other people in the environment with words
start from simple: happy, sad, afraid, calm, angry
then further understand the advanced emotions accurately: sadness, fear, friendly
finally, to some higher emotions: embarrassment, withdrawal, Anger, etc.
remember not to think that children are born with a lot of knowledge. The baby can judge and analyze self-learning either from family ecation or from TV and other social ecation
distraction is the best intervention method
children aged 2-3 have incomplete cognitive system, and the best way is to divert their attention when their emotions are out of control. Use other more attractive things to save the child from the boring and noisy mood
remember: don't be angry with your child, and reason with your child, it's all the performance of parents with low EQ
how to & quot; Egocentrism & quot; It is the main task of the baby at this stage
(tapping the blackboard, which is the source of future EQ)
let the child know & quot; You & quot& quot; I & quot& quot; He & quot; There are also differences between & quot; Your & quot& quot; My & quot& quot; His & quot; The difference
can start with sharing:
for example, a beautiful little sister came to the family, and the baby was very happy, and took a small apple to give to her sister.
many parents may immediately criticize their children for doing wrong or even for being selfish in the face of this situation
it's only after decades of life that I have accumulated my right and wrong ideas. How can I ask a two or three-year-old child to have the same right and wrong ideas as myself
what can we do
baby: if someone gives you an apple, do you want a big one or a small one
he replied without thinking: big
Yes, you see, you want to get a big one. Do you think Miss would like to receive a big one or a small one
he thought about it and replied, "big one
are you happy if someone gives you a little apple
the baby thinks: not happy
do you think little sister will be happy to receive the apple you gave him
the baby shakes his head thoughtfully: unhappy
do you want your little sister to be happy or unhappy
baby: I hope my little sister is happy
do you think you should give the teacher a big apple or a small one
baby: Big Apple
when I have similar conflicts, please describe the thoughts, feelings and expectations of people from different positions and angles as comprehensively as possible, so that the baby can realize that different people will have different thoughts, feelings and expectations from an early age
this kind of & quot; Decentralization & quot; Thinking training will be the foundation of EQ in the future
3. Egocentrism refers to children's thinking deficiencies e to their low level of thinking development. It means that indivials tend to know things from their own standpoint and point of view, but not from the objective and other people's standpoint and point of view. From being unable to distinguish the self from the outside world to getting rid of the dependence on action and direct perception, being able to distinguish the self from the outside world, representing other people's psychological world, and acquiring the ability of opinion selection. In the early stage of sensorimotor, the egocentrism of children's thinking is that they can't distinguish themselves from the outside world. They live in the "here and now" world completely and don't realize that there is a broader world besides their feelings. At the end of the sensorimotor stage, with the emergence of symbolic function, children can distinguish themselves from the outside world, which is a manifestation of de egocentrism. In the pre operation stage, children's egocentrism of thinking is reflected in the representation level. At this time, although children have formed a representation of things, they can't represent other people's psychological world. What they think and feel is always the same as what they think and feel, and they don't have the ability of opinion selection. After entering the specific operation stage, children's thinking is further de egocentric, which shows that they can understand things from multiple dimensions, and they can realize that different people often hold different views and attitudes towards the same thing, that is, they have the ability of opinion selection. Therefore, Piaget believes that the development of children's thinking from low level to high level is a process of de egocentrism.
4. Decentralization is a phenomenon or structure, which can only appear in a system with many users or nodes, and each user can connect and influence other nodes. Generally speaking, everyone is the center, and everyone can connect and influence other nodes. This flat, open-source and equal phenomenon or structure is called "decentralization"< Br > at the same time, "decentralization" is one of the typical features of blockchain, which uses distributed storage and computing power. The rights and obligations of the whole network nodes are the same, and the data in the system is jointly maintained by the whole network nodes, so that the blockchain no longer relies on the central processing node to realize the distributed storage, recording and updating of data. Each blockchain follows a unified rule, which is based on a cryptographic algorithm rather than a credit certificate, and the data update process needs to be approved by the user, so that the blockchain does not need the endorsement of intermediaries and trust institutions< The characteristics of br> de centralization:
centralization is first reflected in diversification. In the Internet world, there are no more than several portals has the final say. Various websites have begun to voice their own voice, express different choices and different hobbies, and these websites are distributed in every corner of the Internet world. Br > decentralisation is followed by the centralization of people, and decentralisation of content has become a trend, and people have become the key force to determine the survival of websites. It's a great change to build a website with indivials who lack interaction to gather talents and contribute their wisdom in the form of a circle. That is user-oriented, humanized< < br > decentralized content: < br > decentralization is the form of social relationship and content generation formed in the development of the Internet, which is a new network content proction process relative to "centralization"< Br > compared with the early Internet (Web1.0) era, today's Web (Web2.0) content is no longer proced by professional websites or specific groups of people, but is created by all Internet users with equal rights. Anyone can express their views or create original content on the Internet to proce information together< Br > with the diversification of network service forms, the decentralized network model is becoming clearer and more possible. After the rise of Web2.0, the services provided by Wikipedia, Flickr, blogger and other network service providers are decentralized. Any participant can submit content, and Internet users can create or contribute content together< After that, with the emergence of more simple and easy-to-use decentralized network services, the characteristics of Web2.0 became more and more obvious. For example, the birth of services more suitable for ordinary Internet users, such as twitter and Facebook, made it easier and more diversified to proce or contribute content to the Internet, thus enhancing the enthusiasm of Internet users to participate in the contribution and recing the threshold of procing content. Eventually, every netizen becomes a tiny and independent information provider, making the Internet more flat and content proction more diversified.
5. Key, that is, key, generally refers to all kinds of encryption technology applied in proction and life, which can effectively supervise personal information and enterprise secrets. Key management refers to the behavior of key management, such as encryption, decryption, cracking, etc. Mainly in the management system, management protocol and key generation, distribution, replacement and injection. For the military computer network system, e to the user's strong mobility, complex membership and cooperative command, higher requirements for key management are put forward
key management includes all aspects from key generation to key destruction. It is mainly manifested in management system, management protocol, key generation, key management, key distribution, key replacement and key injection. For the military computer network system, e to the user's strong mobility, complex membership and cooperative command, higher requirements for key management are put forward
process:
(1) key generation
the key length should be long enough. Generally speaking, the larger the length of the key, the larger the corresponding key space, and the more difficult it is for the attacker to guess the password exhaustively
choose a good key to avoid weak key. The random bit string generated by the automatic processing equipment is a good key. When choosing a key, we should avoid choosing a weak key
for public key cryptosystems, key generation is more difficult because the key must satisfy some mathematical characteristics
key generation can be realized through online or offline interactive negotiation, such as cryptographic protocol
(2) key distribution
symmetric encryption algorithm is used for secure communication, which needs to share the same key. Usually, a member of the system selects a secret key first, and then transmits it to another member or other members. X9.17 standard describes two kinds of keys: key encryption key and data key. Key encryption key encryption is other keys that need to be distributed; The data key only encrypts the information stream. Key encryption key is usually distributed by hand. In order to enhance the confidentiality, the key can be divided into many different parts and sent out in different channels
(3) verify the key
the key is attached with some error detection and correction bits for transmission. When an error occurs in the key transmission, it can be easily detected, and if necessary, the key can be retransmitted
the receiver can also verify whether the received key is correct. The sender encrypts a constant with the key, and then sends the first 2-4 bytes of the ciphertext together with the key. At the receiving end, do the same work. If the decrypted constant of the receiving end can match the constant of the sending end, the transmission is correct
(4) update key
when the key needs to be changed frequently, it is really difficult to distribute new keys frequently. An easier solution is to generate a new key from the old key, sometimes called key update. One way functions can be used to update the key. If both sides share the same key and operate with the same one-way function, they will get the same result
(5) key storage
key can be stored in brain, magnetic stripe card and smart card. The key can also be divided into two parts, half stored in the terminal, half stored in the ROM key. The key which is hard to remember can also be encrypted and saved by a method similar to key encryption key
(6) backup key
key can be backed up by key escrow, secret partition, secret sharing, etc
the simplest way is to use a key escrow center. Key escrow requires all users to give their own keys to the key escrow center, and the key escrow center will back up and keep the keys (such as locking them in a safe somewhere or encrypting them with the master key). Once the user's key is lost (such as the user forgets the key or the user dies accidentally), according to certain rules and regulations, The user's key can be obtained from the key escrow center. Another backup scheme is to use smart card as temporary key escrow. For example, Alice stores the key in the smart card and gives it to Bob when Alice is away. Bob can use the card to do Alice's work. When Alice comes back, Bob returns the card. Because the key is stored in the card, Bob doesn't know what the key is
Secret segmentation divides a secret into many pieces. Each piece does not represent anything, but if these pieces are put together, the secret will reappear
a better way is to use a secret sharing protocol. The key K is divided into n blocks, and each part is called its "shadow". Knowing that any m or more blocks can calculate the key K, knowing that any M-1 or less blocks can not calculate the key K, this is called (m, n) threshold (threshold) scheme. At present, many secret sharing schemes are proposed based on Lagrange interpolation polynomial method, projective geometry, linear algebra and Sun Tzu theorem
Lagrange interpolation polynomial scheme is an easy to understand secret sharing (m, n) threshold scheme
Secret Sharing solves two problems: first, if the key is accidentally or intentionally exposed, the whole system will be vulnerable to attack; Second, if the key is lost or damaged, all the information in the system can not be used
(7) key validity
the encryption key cannot be used indefinitely for the following reasons: the longer the key is used, the greater the chance of its leakage; If the key is leaked, the longer the key is used, the greater the loss; The longer the key is used, the more attractive it will be for people to spend their energy to decipher it; Cryptanalysis of multiple ciphertexts encrypted with the same key is generally easier
different keys should have different validity periods
the validity period of data key mainly depends on the value of data and the amount of encrypted data in a given time. The higher the value and data transfer rate, the more frequent the key change
key encryption keys do not need to be changed frequently because they are only used occasionally for key exchange. In some applications, the key encryption key is changed only once a month or a year
the encryption key used to encrypt and save data files cannot be changed frequently. Usually, each file is encrypted with a unique key, and then all the keys are encrypted with the key encryption key. The key encryption key is either remembered or stored in a safe place. Of course, losing the key means losing all the file encryption keys
the validity period of the private key in the application of public key cryptography varies according to different applications. The private key used for digital signature and identification must last for several years (even for life), and the private key used for coin toss protocol should be destroyed immediately after the protocol is completed. Even if the security of the key is expected to last for a lifetime, it is necessary to replace the key every two years. The old key still needs to be kept secret in case the user needs to verify the previous signature. However, the new key will be used as a new file signature to rece the number of signature files that can be attacked by cryptoanalysts
(8) destroy the key
if the key must be replaced, the old key must be destroyed and the key must be physically destroyed
(9) key management of public key
public key cryptography makes key management easier. No matter how many people are on the network, everyone has only one public key
using a public / private key pair is not enough. Any good implementation of public key cryptography needs to separate the encryption key from the digital signature key. But a single pair of encryption and signature keys is not enough. Like an ID card, a private key proves a relationship, while a person has more than one relationship. For example, Alice can sign a document in her personal name, vice president of the company, etc.
6. YSTAR is the flow pool of the blockchain world. It is a decentralized and threshold free key management platform. It has completed 14 million angel rounds of financing and 100000 daily users.
7. The image of Liu Haiping of iPhone X has been deeply rooted in the hearts of the people. The unique ultra-thin appearance also caused a high topic at that time. However, the fever problem of Apple iPhone x also brought us a bad experience. Now, Diaofeng has sorted out the cause analysis and improvement methods of the hot and hot iPhone X. Let's have a look
iPhone x battery scalding fault cases
iPhone x battery scalding fault cases

Where did the well-known digital bloggers get the real experience of using the machine? The feedback content is roughly as follows: when I just posted that microblog, my iPhone x began to burn for no reason, and the temperature was getting higher and higher, I can feel the temperature rising through the protective cover. It's a little hot when I take it off and touch my back. I quickly shut it down and restart it. Now the temperature is normal. I don't know if this is the reason for the IOS update or the problem with iPhone X

the same problem is also mentioned in the comments of bloggers: especially when playing "King's glory", it can be described as "extremely hot". There are also problems such as "long press skill to cut the screen" and "flash back to the desktop". In addition, this problem also exists when using tmall and fast charge. There are also complaints about the green around the screen and the serious lack of battery life
why does the iPhone x get hot
some people think it's the problem of IOS system, some think it's the problem of stacking technology of camera motherboard and processor, and some think it's related to Google. For these explanations, they are not specific enough and too objective. Xiao Bian thinks that the reason why the iPhone is hot and hot is like this. It's normal for the iPhone to get hot seriously. Because of the L-type battery, many components are jammed together, and the heat dissipation of the glass body is not good, so it will get hot. In addition, the thermal conctivity of the glass is not good, so the longer it is used, the more heat is accumulated. However, x will rece the frequency of intelligent control of heating, if the heating is very serious, it is recommended to play cold later
why does the iPhone x get hot

in addition, according to netizens' feedback, the battery power consumption of iPhone x is also very fast. The main points of user experience are as follows:
1. When the weather is hot, it will be hot and the screen brightness will be dim
2, the is critical, fever is too laggy.
3. A little video chat will get hot, mainly in the rear camera
4. If you beat the king's glory or eat chicken, you get a high fever. I'm afraid of explosion. This iPhone x is really ordinary. It would crash before, but now it can't make a phone call occasionally
why does the iPhone x get hot

for how to thoroughly solve the problem of iPhone x fever, Xiaobian's suggestion is: the main reason for iPhone x fever is the internal structure design problem. The best answer is to use the mobile phone as little as possible and pay more attention to battery maintenance at ordinary times. Mobile phone battery aging phenomenon is serious, you can consider to replace the mobile phone battery. Of course, we can also pay attention to Apple's official news in real time. Can we alleviate the problem of iPhone X's hot and hot by upgrading the system? You can wait until the local apple repair point for repair service with your warranty card and purchase invoice.
8.

In the pre operation stage (2-7 years old)

on the issue of cognitive development, Piaget thinks that cognitive development is a process of construction, which is realized in the interaction between the indivial and the environment, thus showing four stages in constant order. Each stage has its main behavior pattern. Among them, each stage is a unified whole. Piaget puts forward the theory of cognitive development, and divides indivial cognitive development into the following four stages< br />

9.

Features:

1. Animism. Children can't distinguish between living and inanimate things. They often extend people's conscious motivation and intention to inanimate things

2. Egocentrism. Children are lack of the ability to choose views. They only look at the world from their own point of view, and it is difficult to understand the views of others

The relationship between the whole and the part could not be straightened out. By asking children to examine the relationship between the whole and the part, it is found that children can grasp the whole and distinguish two different categories. However, when they are asked to consider the relationship between the whole and the two components of the whole at the same time, most children give the wrong answer

This shows that their thinking is limited by the obvious perceptual features in front of their eyes, and they are not aware of the relationship between the whole and the part. Piaget called it the lack of hierarchical class concept (class inclusion relationship)

The irreversibility of thinking. Reversibility of thinking refers to the operation of thinking in the mind

5, lack of conservation. Conservation refers to mastering the essential characteristics of a concept, which is not changed by the change of some non essential characteristics. Children in the pre operation stage do not realize that the essential characteristics of things do not change when the surface characteristics of things change. Nonconservation is an important feature of pre operational children

Piaget believes that in the process of indivial development from birth to maturity, cognitive structure is constantly reconstructed in the interaction with the environment, thus showing different stages with different qualities. He divides the development of children's thinking into the following four stages, and not all children complete the same stage at the same age

however, their order through each stage is consistent. The former stage is the premise to reach the latter stage. The development of the stage is not a discontinuous jump, but a graal and continuous change

10.

adventure and mining demonize Lubu attribute guide

Quality: shining gold

race: human

gender: male

Title: crazy soldier

character lines: I am the strongest

character description: lost reason because of rage, degenerated into a real crazy soldier. At the same time, it also has unstoppable power

initial combat power: 933

growth coefficient: 1.71

adventure and mining magic Lvbu skill / treasure

name first attack defense dodge King effect

true · great God unparalleled 0.010 17% probability to cause critical hit, 175% damage when critical hit and the other party can't dodge. Level of King increased by 10

halberd 450 5

5 break attribute bonus

4-dimensional bonus (max value) 450 15

summary: Diao Chan + Lv Bu is also a good combination in the early stage, Diao Chan can take it for 1 yuan, and the combination skill is also easy to use violence, such as this kind of martial generals can quickly dismantle customer service, the biggest problem of customer service is the skill of eating excrement, It can be regarded as the artifact of turning the table over

I hope this answer will help you

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750