**4.5 Computer constructor of tests & exmination for knowledge verification**

The software platform is designed as a tool for educational to be used by managers, tutors and learners, to facilitate the construction of tests for testing concepts and the generation of an intellectually demanding action space, allowing interaction of the various actor involved in the process. The constructor in with the general functional model of the project, through the following agents: Professor: individual or object that provides the system of disciplinary knowledge, ponders the complexity of knowledge, design tests with which to assess learning, provides the answers and lead the process of cognitive apprenticeship. Student: Is the person on which rests the teaching institution and who is responsible for the quantity and quality of knowledge acquired. The system serve as coach potentiates cognitive skills, accredited skills and explore their results critically. Manager: individual or object that performs the monitoring and feedback of student progress, uses statistical information on academic performance, monitors the implementation of curriculum plans and ensures compliance with the institutional offer.

#### **4.5.1 Operationality**

The system must control access to the authorized players through verification of the validity of a login and a password and only allows access to certain information service in accordance with the privileges of that user as a certain level it. In the same vein should give special attention to the process designed to protect from an unauthorized access over the network and safeguarding the integrity and confidentially of information.

#### **4.5.2 Security**

The system must control access to the players authorized through verification of the validity of a login and password and only allows access to certain information services in accordance with the privileges of that user as a certain level it. In the same vein should give special attention to the processes designed to protect from unauthorized access over the network and safeguarding the integrity and confidentiality of information.

Fig. 14. iCOACH Architecture
