The Bedrock of Emotional Intelligence and Social Skills

In our rapidly digitizing landscape where screen time frequently overtakes meaningful human interactions, the imperative to cultivate emotional intelligence and social finesse in our young ones has never been more pressing. As a parent to my effervescent youngsters, Raven and Holden, and a loving partner to my ever-resilient wife, Liana, I find Social-Emotional Learning (SEL) an indispensable tool for modern upbringing.

SEL encompasses the multi-faceted journey of acquiring and adeptly utilizing the know-how, outlook, and competencies required to regulate emotions, foster […]

Plotting functions and planes in Microsoft Excel

Microsoft Excel is the leading spreadsheet program. Spreadsheets allow you to process numbers and text, set formulas and functions for automatic execution, forecast a budget based on a scenario, present data in the form of diagrams, publish worksheets on the Internet, etc. In this regard, the computer is one of the means of applying the most important of the principles of learning — visibility. The application of this program forms and develops imaginative, visual, spatial thinking, which facilitates the task […]

Malware: how to protect yourself 3.7

Previously, children were taught to wash their hands before eating and not to trust strangers, now — not to download dubious programs from the Internet and not to open spam. Digital hygiene in the modern world is even more important than a locked door at night. To commit a cybercrime, you do not need to get into the house, it is enough to get into a smartphone. Naked Science investigates what malware is and how to protect yourself from it.

The […]

Hackers have learned to use the touch screen at a distance of 5.3

Electromagnetic radiation allows you to simulate finger tapping and other commands for the touchscreen without approaching it.

Developers from the University of Florida demonstrated a prototype of the system, which they themselves compared to an “invisible finger”. In fact, it is able to remotely send commands to a smartphone, tablet or other device with a touch screen, using invisible electromagnetic waves. The novelty is being demonstrated at the Black Hat cybersecurity forum taking place in Las Vegas. Details about it are […]