学习、能力、任务、需求和元认知的复杂关系(头脑风暴)rev#2 刘建文(http://blog.csdn.net/keminlau) 2009-11-14 13:51:43 学习、能力、任务、需求和元认知的复杂关系(头脑风暴) 2009-11-14 13:51:43 KEMIN:我们会一般人都会读报读文章,但不是每个人都
学习、能力、任务、需求和元认知的复杂关系(头脑风暴)rev#2
刘建文(http://blog.csdn.net/keminlau)
2009-11-14 13:51:43
学习、能力、任务、需求和元认知的复杂关系(头脑风暴)
2009-11-14 13:51:43
KEMIN:我们会一般人都会读报读文章,但不是每个人都能写文章,可见,会读与会写(不指被动抄写,指主动创写)不是一个能力层次;再又,会写的能力也可以根据写得如何再分能力层次。根据布卢姆的学习能力层次可得,会读属于领会能力层,会写属于运用能力层。
1# 学习结果与能力层次
布卢姆:知识(Knowlwdge)、领会 (Comprehension)、运用(Application)、分析(Analysis)、综合(synthesis)和评价 (Evaluation)。
加涅:言语信息、智慧技能、认知策略、态度和动作技能。
KEMIN:要理解学习目标,就离不开对学习的目的把握。如果学习是为了提高人的能力,那么问题转向,能力是什么?有多少种类?怎么评级能力强度?
他跳舞很棒,他唱功不错,他文笔很好,他很聪明,他很幽默,他很友好,
他是学生,他是硕士,他是博士,他是CEO,他是
2# 人的技能的表现
大脑:读、写、说、思
四肢:手、脚
3# 能力与任务
能力是一种做功机制,分先天和后天。
能力种类源于任务的种类,所以能力的分类转向任务的分类,那任务是什么?任务的其中一种分法是,分工作任务与创作任务,
由于对于大脑来说,工作是种很复杂的过程,是种很复杂的认识对象,所以必须把工作与创作分开研究,虽然在某些情境二者有联系
4# 工作任务与创作任务
工作是一种按步就班完成某种预定任务的过程,工作是为满足一定的需求(一般是静态的需求),并产生一定的效益和价值,比如维护系统良性运行;
工作过程就像一个多路分支流程,工作内容变量限定在有限的值域内。比如
START 选择输入(条件)变量 x
CASE A
工作处理A
CASE B
工作处理B
CASE C
工作处理C
CASE ELSE
忽略或转给上级处理
END
创作是一种特殊的工作,无明确的工作步骤,也无明确的预定任务目标,创作的特点是它有新东西新模式产生,新模式满足动态需求从而比一般的工作产生更大的价值,比如设计和创新;所以研究创作转为研究何为动态需求。
5# 创作任务与动态需求
动态需求是什么?
动态需求似乎是无时不有的,从我们每天在成长可以看出来,因此我们也无时不在在做自我“创作”,只是这种创作是无意识的,效率有限。
KEMIN:问题进一步转向,对创作的研究转向对自身发展需求来源的认识。
由我们一般人都是在无意识下被动地对外界进行认知可得,元认知的任务就是把这种随意的自我创作变为有意的自我创作,并强化。
6# 动态需求与机会
“流动性越强的地方机会越多,危机也越多,风险也越高”,什么叫流动性强?什么又叫机会呢?为什么机会与危机相伴相生的呢?
第一,从系统发展的角度看,流动性强意味系统与环境交换物质和能量越频繁,提高了成长的速率;
第二,机会是指系统与环境交换物质的事件的发生,并且交换的物质是假定有利系统发展的;
第三,因为无法预知交换物质的好与坏,所机会与危机相伴相生。
因此可得,如何提高学习效率,加速自我创作的速度的问题转向:
第一,如何提高系统与环境的流动性;
第二,如何清晰化系统自身性质;
第三,如何清晰化交换物质的性质,并对其有利于系统与否作出判断。
要解决这些“如何”,必须提供给具体个案的半自动策略参考
7# 元认知任务是工作任务还是创作任务?
元认知的任务是监控和调控学习过程,建立独立学习的能力。
独立学习的能力(元认知能力似乎与四肢能力和一般的思维能力不在一个层次上,元认知能力是一种特殊的思维能力?因为元认知任务的对象是学习过程)
|
唱功-阅读能力-写作能力-演说能力-思考能力
如何监控和调控学习过程?这就要看学习的过程是怎样的了。
8# 学习过程
学习必起始一种刺激,并对刺激进行分析,终于对学习对象的综合运用,包括创造或设计。学习过程中的操作和处理有,对具体事实的归纳和对归纳结果进行新情境的演绎;还有对事实材料进行[比较]和[分类]。
8#1 分析方法(种类)
定性分析与定量分析
系统分析与结构分析
8#2 综合方式
9# 学习复杂事物的策略
9#1 大脑一侧的策略
第一,情感干扰;第二,短时记忆容量小;第三,长时记忆淡忘;第三,未知结构(认知方式);第四,尚不具有操控的能力
9#2 客观事物一侧的策略
第一,空间性;第二,时间性;第三,未知结构
9#3 复杂事物经验材料的策略

MySQL index cardinality has a significant impact on query performance: 1. High cardinality index can more effectively narrow the data range and improve query efficiency; 2. Low cardinality index may lead to full table scanning and reduce query performance; 3. In joint index, high cardinality sequences should be placed in front to optimize query.

The MySQL learning path includes basic knowledge, core concepts, usage examples, and optimization techniques. 1) Understand basic concepts such as tables, rows, columns, and SQL queries. 2) Learn the definition, working principles and advantages of MySQL. 3) Master basic CRUD operations and advanced usage, such as indexes and stored procedures. 4) Familiar with common error debugging and performance optimization suggestions, such as rational use of indexes and optimization queries. Through these steps, you will have a full grasp of the use and optimization of MySQL.

MySQL's real-world applications include basic database design and complex query optimization. 1) Basic usage: used to store and manage user data, such as inserting, querying, updating and deleting user information. 2) Advanced usage: Handle complex business logic, such as order and inventory management of e-commerce platforms. 3) Performance optimization: Improve performance by rationally using indexes, partition tables and query caches.

SQL commands in MySQL can be divided into categories such as DDL, DML, DQL, DCL, etc., and are used to create, modify, delete databases and tables, insert, update, delete data, and perform complex query operations. 1. Basic usage includes CREATETABLE creation table, INSERTINTO insert data, and SELECT query data. 2. Advanced usage involves JOIN for table joins, subqueries and GROUPBY for data aggregation. 3. Common errors such as syntax errors, data type mismatch and permission problems can be debugged through syntax checking, data type conversion and permission management. 4. Performance optimization suggestions include using indexes, avoiding full table scanning, optimizing JOIN operations and using transactions to ensure data consistency.

InnoDB achieves atomicity through undolog, consistency and isolation through locking mechanism and MVCC, and persistence through redolog. 1) Atomicity: Use undolog to record the original data to ensure that the transaction can be rolled back. 2) Consistency: Ensure the data consistency through row-level locking and MVCC. 3) Isolation: Supports multiple isolation levels, and REPEATABLEREAD is used by default. 4) Persistence: Use redolog to record modifications to ensure that data is saved for a long time.

MySQL's position in databases and programming is very important. It is an open source relational database management system that is widely used in various application scenarios. 1) MySQL provides efficient data storage, organization and retrieval functions, supporting Web, mobile and enterprise-level systems. 2) It uses a client-server architecture, supports multiple storage engines and index optimization. 3) Basic usages include creating tables and inserting data, and advanced usages involve multi-table JOINs and complex queries. 4) Frequently asked questions such as SQL syntax errors and performance issues can be debugged through the EXPLAIN command and slow query log. 5) Performance optimization methods include rational use of indexes, optimized query and use of caches. Best practices include using transactions and PreparedStatemen

MySQL is suitable for small and large enterprises. 1) Small businesses can use MySQL for basic data management, such as storing customer information. 2) Large enterprises can use MySQL to process massive data and complex business logic to optimize query performance and transaction processing.

InnoDB effectively prevents phantom reading through Next-KeyLocking mechanism. 1) Next-KeyLocking combines row lock and gap lock to lock records and their gaps to prevent new records from being inserted. 2) In practical applications, by optimizing query and adjusting isolation levels, lock competition can be reduced and concurrency performance can be improved.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment