Premium Essay

Doc Memory Summary

In:

Submitted By lewana722
Words 453
Pages 2
Memory Summary
Lewana Jackson
Essentials of Psychology/Psy-211
October 27, 2014
Mark Ammer

Memory Summary
Three Stages of Memory The first stage of memory is encoding. What is encoding? According to Miller (1956),
Encoding is “When information comes into our memory system it needs to be changed into a
Form that the system can cope with and understand so it can be stored.” Miller uses the example
Of changing money in a foreign country to explain encoding. According to Miller, there are three ways information can be encoded: 1. Visual (picture) meaning if one sees something they are more apt to remember the item or

Subject. An example is when children are taught how to count money. When they use play

Money and actually use the items they see and feel what coins and the dollar bill sizes mean.

2. Acoustic (sound) meaning if I only had hearing as that of a blind person, I would be able to

Recognize someone that I knew based on the sound of his or her voice including the pitch. I would be

Able to determine if they are happy or sad based on the sound of their voice.

3. Semantic (meaning) as in certain cultures and professions people have different meanings and

Nicknames for item and people. A prime example would be in the African American culture a

Light-skinned person is referred to as “Red Bone”.

Memory Storage

Memory is stored two ways according to Miller (1956):

1. Short Term Memory (STM). This is memory that is stored for a brief duration which

Could consist of 0-30 seconds.

2. Long Term Memory (LTM). This is memory that can last a lifetime and is thought to

Be unlimited. An example would be remembering something that happen at two years of

Age and through adulthood. Memory Retrieval

Memory retrieval refers to getting information out of storage. I would

Similar Documents

Free Essay

Routing Protocol Comparison

...EIGRP and OSPF Comparison For Client Sponsor Prepared By Scott Hogg Project Number 02 Date March 14, 2002 |Distribution List | |Name |Title/Duties |Company | |John Vogt-Nilsen |Manager – Network Operations | | |Sammy Hutton |Principal Systems Analyst | | |Scott Hogg |Principal Consultant |Lucent | |Phil Colon |Managing Consultant |Lucent | |Revision History | |Version |Date |Author |Comments | |1.0 |03/14/2002 |Scott Hogg |Initial Draft | | | | | | |...

Words: 8531 - Pages: 35

Free Essay

Routing Protocol

...EIGRP and OSPF Comparison For Client Sponsor Prepared By Scott Hogg Project Number 02 Date March 14, 2002 |Distribution List | |Name |Title/Duties |Company | |John Vogt-Nilsen |Manager – Network Operations | | |Sammy Hutton |Principal Systems Analyst | | |Scott Hogg |Principal Consultant |Lucent | |Phil Colon |Managing Consultant |Lucent | |Revision History | |Version |Date |Author |Comments | |1.0 |03/14/2002 |Scott Hogg |Initial Draft | | | | | | |...

Words: 8531 - Pages: 35

Free Essay

Journalism

...Below is a much briefer summary of the case study of Eve The aim of this case study was to provide an account of the treatment of a 25-year-old woman who was referred to Thigpen and Cleckley because of 'severe and blinding headaches'. The psychiatrists used a case study method. This consisted of interviews with the patient and her family, hypnosis, observation, EEG tests and a number of psychometric and projective tests including, memory tests, ink blot tests and intelligence tests. The patient (referred to as Eve White in the study) had been referred for therapy to one of the authors because of ‘severe and blinding headaches’. At the first interview she also complained of ‘‘blackouts’’ following her headaches. However they were puzzled that Eve White had no memory of a recent trip. The therapists used hypnosis and the amnesia was cleared. Several days after a visit to the therapists, a letter from Eve White appeared at the therapists’ office. The letter concerned her therapy and was written in her usual handwriting, but at the bottom of the page there was a paragraph that looked like a child had written it. On her next visit Eve White denied sending the letter, though she recalled having begun one, which she never finished and thought she had destroyed. During the interview, Eve White who was normally very self-controlled became distressed and asked whether hearing an occasional imaginary voice made her insane. She reported that she had on several occasions over the...

Words: 1059 - Pages: 5

Free Essay

Personal Perception of Organized Crime Paper

...Eyewitness Evidence Executive Summary Learning Team A CJA/364 February 17, 2015 Jeff Walters University of Phoenix Eyewitness Evidence Executive Summary Law enforcement officials have many resources and techniques to help apprehend suspects. The help of an eyewitness is one of the most beneficial resources they can receive. One way an eyewitness can help identify a suspect is by being involved in a police lineup. Another way an eyewitness can help capture a suspect is by getting involved in a composite image. The suspect lineup allows the witness a chance to help the police find the suspect in a crime. It is important for the police to maintain a good status when doing an eyewitness lineup because there have been many people falsely accused trough these lineups. The police believe with the witness present at the crime, he or she saw everything that happened and could possibly identify the suspect (Huff, 2002). The lineup consists of individuals that line up in a row that preferably look the same in gender, facial hair, ethnicity, age, and height (“Dallas Police Department”, n.d.). The witness should meditate back on the incident, and the officer must remind the eyewitness that the suspect may not be present. The police prefer the observer to use his or her memory when selecting from the police lineup, and during the lineup, the police should not coerce the witness in any form. The witness is assured by police of his or her security...

Words: 796 - Pages: 4

Free Essay

Physical Network

...automatically scale itself up and down depending on its needs. b. Completely Controlled—A person have complete control of instances. A person has root access to each one and a person can interact with them as the person may would at any machine. A person can stop their instance while retaining the data on you boot partition and then subsequently restart the same instance using the web service APIs. Instances can be rebooted remotely using the web service APIs. The person can also have access to console output of a person’s instances. c. Flexible Cloud Hosting Services—A person may have the choice of multiple instance types, operating systems, and software packages. Amazon EC2 will allow a person to select a configuration of memory, CPU, instance storage, and the boot partition size that is optimal for someone to choose an operating system and application. For an example, a person’s choice of an operating system includes numerous Linux distributions, and Microsoft Winders Server. d. Designed for use with other Amazon Web Services—Amazon EC2 works in conjunction with Amazon Simple Storage Service (Amazon S3), Amazon Relational Database Service (Amazon RDS), Amazon SimpleDB, and Amazon Simple Queue Service (Amazon SQS) to provide a complete solution for computing, query processing and storage across a wide range of applications. e. Reliable—Amazon EC2 offers a highly reliable environment where the replacement instances can be rapidly and predictably...

Words: 1713 - Pages: 7

Premium Essay

The Theme of Symbolism in Literary Works

...The Theme of Symbolism in Literary Works ENG 125: Introduction to Literature August 1, 2011 The Theme of Symbolism in Literary Works There are many literary works available to discover different themes, such as, symbolism. There are stories of death, love, racism, and much more, and not only that, but they are found in any form of literature from dramas to poems to short stories. However, the symbolism of the “journey of life” is most interesting because most people are drawn to stories that involve human nature, and knowing that they are able to connect to the story or people in the story, on a more emotional or personal level. The poem, The Road Not Taken, and the short story, Used To Live Here Once, are literary works that are both about viewing life from different perspectives. With both of these literary works, the reader is captivated by the mystery of the unknown future, and the challenges of the present from two very different perspectives. The Road Not Taken was written by Robert Frost in 1916, and is a poem about someone making a decision to go down one path versus another, and how taking the “path least traveled” is the best way (Clugston, Sec. 2.2: How Use of Persona Effects Your Response To Literature, para. 4). The symbolism that is being displayed in the poem is that of the literal and physical path that the storyteller is contemplating walking down, against the action of taking a path or making a choice in life. The poem is written in a first...

Words: 2255 - Pages: 10

Free Essay

Software Implementation Paper

...Internal Hardware upgrade to meet IT solution IFSM 310 SECTION Winston Compton 16 April 2016 Background As a Senior IT Specialist & Systems Analyst, some of my responsibilities are to interpret customer demands through provided business requirements and provide service needed with the right specifications. Also Develop design specifications for major components of an IT solution. Finally, as a senior member I need to be able to coordinate with other entities to provide individual components of IT developmental efforts. As a senior member of Upton, Martin Ulysses, & Clapper (UMUC) financial analysis firm specializing in conducting independent economics and market assessment for banks, insurance companies, mortgage lender, and government regulatory agencies, I have been tasked to refreshed 35 personal computer desktops. The Senior Manager of Revolving Debt Analysis has laid out for me the attributes for the new PCs. The new PCs will need to be able to run complex calculations based on statistical models that uses large amounts of data. Purpose of This Report The UMUC financial analysis firm is a medium sized firm utilized by many clients for market assessments, insurance queries, mortgage lenders, and other government regulatory agencies. In order to meet demands the firm is in dire need of an upgrade. The purpose of this report will identify the new components required to upgrade the 35 desktops to be able to perform the required IT solution attribute...

Words: 1552 - Pages: 7

Premium Essay

Don't Know

...Cloud computing: benefits, risks and recommendations for information security Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data storage and processing to software, such as email handling, are now available instantly, commitment-free and on-demand. Since we are in a time of belt-tightening, this new economic model for computing has found fertile ground and is seeing massive global investment. According to IDC’s analysis, the worldwide forecast for cloud services in 2009 will be in the order of $17.4bn1. The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6,005m in 2013 2. The key conclusion of ENISA’s 2009 paper on Cloud Computing: benefits, risks and recommendations for information security3 is that the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of view. The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defences can be more robust, scalable and cost-effective. ENISA’s paper allows an informed assessment of the security risks and benefits of using cloud computing - providing security guidance for potential and existing users of cloud computing. The new economic model has also driven technical change in terms of: Scale: commoditisation and the drive towards economic efficiency have led to massive concentrations of the hardware resources required to provide...

Words: 2434 - Pages: 10

Premium Essay

Sleep Deprivation

...SLEEP DEPRIVATION AND ITS EFFECT ON THE ACADEMIC PERFORMANCE OF STUDENTS UNDER THE PROGRAM B.S. INDUSTRIAL ENGINEERING OF THE UNIVERSITY OF SAN JOSE-RECOLETOS, ------------------------------------------------- S.Y. 2015-2016 A Research Presented to Engr. Nera Mae Puyo University of San Jose-Recoletos ------------------------------------------------- In Partial Fulfillment for the Requirements of IE 22A Angelei Mae R. Cape Lyndrian Shalom R. Baclayon Marc Lou S. Varquez ------------------------------------------------- Jan Kyle A. Lastimosa March 2016 CHAPTER 1 THE PROBLEM AND ITS SCOPE Rationale Sleep deprivation occurs when a person fails to get enough sleep (American Academy of Sleep Medicine, 2008). The amount of sleep a person is required to get varies. Some people can function even if they sleep below the recommended amount of sleep; however this is only a rare case and is only applicable to a handful of people. The recommended amount of sleep depends on the age group of each person, with toddlers and children needing 9 hours, teens and young adults alike need 7 to 9 hours. There are many possible causes as to why people lack sleep. It could either be external or internal causes. Internal problems in your body may cause you to lack sleep, such as illnesses, sleep disorders, and taking certain medications. External causes are the things that may influence you to lack sleep, like personal choice, work, poor sleeping hygiene, disturbances in your sleeping environment...

Words: 3088 - Pages: 13

Free Essay

Unix

...00.72314819 FM 10/24/00 9:55 AM Page i Sriranga Veeraraghavan Teach Yourself Shell Programming in 24 Hours A Division of Macmillan Computer Publishing 201 West 103rd St., Indianapolis, Indiana, 46290 USA 00.72314819 FM 10/24/00 9:55 AM Page ii Copyright  1999 by Sams Publishing All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. International Standard Book Number: 0-672-31481-9 Library of Congress Catalog Card Number: 98-89272 Printed in the United States of America First Printing: March 1999 01 00 99 4 3 2 1 EXECUTIVE EDITOR Jeff Koch ACQUISITIONS EDITOR Gretchen Ganser DEVELOPMENT EDITOR Hugh Vandivier TECHNICAL EDITOR Aron Hsiao MANAGING EDITOR Brice Gosnell PROJECT EDITOR Gretchen Uphoff COPY EDITORS Michael Dietsch Kelly Talbot Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Sams cannot attest to the accuracy...

Words: 112126 - Pages: 449

Premium Essay

Service Request Sr-Rm-001

...Service Request SR-RM-001 Paper CIS207 April 5, 2012 David J. Henry Service Request SR-RM-001 Riordan Manufacturing Company presents itself as a solutions provider of polymer materials. As with any large organization, oftentimes business executives seek the consult of external subject matter experts to help companies operate more efficiently. Riordan recently solicited the SHWS Consulting Group and its constituents to review Riordan’s current inventory and manufacturing systems and processes. After spending several weeks with Riordan and visiting each site, the consultants recognized opportunities to improve key areas of the company’s systems supporting its inventory and manufacturing process. Executive Summary SHWS Consultants met with Riordan Manufacturing to discuss the details of Riordan’s inventory and manufacturing processes. Riordan believes the company should reassess and possibly upgrade its existing inventory systems. The firm’s executives agree that re-evaluating the computer systems could grow revenue and drastically reduce or eliminate the opportunities for human errors in receiving, tracking, and managing inventory. Upgrading the systems also simplifies employees’ jobs, which directly affects morale and can lead to increased productivity. During the initial meeting to clarify and set Riordan’s expectations, SHWS Consultants agreed to provide Riordan documentation indicating the business processes needing improvement and the specified...

Words: 1813 - Pages: 8

Free Essay

Babc

...BABC001 Academic and Business Communication Assignment 3: Report Chinese and English Name:Student number:Class number:Contact number:Tutor’s name:Assignment due date: | Cheng Shixuan Jane Cheng | | 14901107 | | 10 | | Antonio | | week 9 class 1 | To be completed by the student upon submission: Word count (excluding TOC, Executive Summary and reference list): …………………….. Turnitin percentage: …………………. | | Table of contents Executive summary i 1. Introduction 1 2. Benefits of visual communication in business 2.1 Definition and value of visual communication 2 2.2 The brain prefers message in different form. 2 * 2.3 Visual communication makes information easily-understood. 2 3. Information visualization techniques in hospitality industry 3 3.1 An brief introduction of hospitality and two visualization techniques 3 3.2 Graphs 3 3.2.1 Use graphs to highlight key information in corporate...

Words: 1636 - Pages: 7

Free Essay

Wp7 for Android

... The Developer Tools 5 Windows Phone 7 Architecture 5 Comparing the Programming Stack of Windows Phone 7 with Android 7 Summary 11 Related Resources 11 Chapter 2: User Interface Guidelines 12 Designing the Application Interface 13 Application User Interface Design 14 Comparing Windows Phone 7 and Android Navigation 18 Windows Phone 7 Frame and Page Structure 19 Application Templates 21 Summary 21 Related Resources 21 Chapter 3: The Developer and Designer Tools 23 A Comparison of Android and Windows Phone 7 Tools 23 Development Life Cycle and Windows Phone 7 Developer Tools 24 The UI Design Tools 26 Building Applications 33 Debugging 34 Summary 38 Chapter 4: C# programming 39 Managed Programming 40 A Comparison between C# Features and Java Classes 41 A Comparison of Important Class Libraries 51 The New features of C# 54 Comparing API Documentation Tools 58 NDoc 58 NDocs vs. Javadoc 61 Summary 61 Related Resources 62 Chapter 5: A Comparison of Application Life Cycles in Windows Phone 7 and Android 63 Multitasking in Android and Windows Phone 7 63 Tombstoning of Applications in Windows Phone 7 64 Life Cycle of a Windows Phone 7 Application 64 Role of Handlers in an Application’s Life Cycle 66 Comparing Life-cycle Methods 68 Tombstoning and Windows Phone 7 Life Cycle 69 Summary 74 Related Resources 74 Chapter 6: Storing Data and Preferences 75 Isolated Storage in Windows Phone 7 75 Use Cases 78 ...

Words: 19181 - Pages: 77

Free Essay

Competency Matrix

... Tree, Graph, simple greedy and divide and conquer algorithms, is able to understand the relevance of the levels of this matrix. systems programming Doesn’t know what a compiler, linker or interpreter is Basic understanding of compilers, linker and interpreters. Understands Understands kernel mode vs. user mode, multi-threading, synchronization primitives and how they’re implemented, able to read what assembly code is and how things work at the hardware level. Some assembly code. Understands how networks work, understanding of network protocols and socket level programming. knowledge of virtual memory and paging. Able to recognize and code dynamic programming solutions, good knowledge of graph algorithms, good knowledge of numerical computation algorithms, able to identify NP problems etc. Understands the entire programming stack, hardware (CPU + Memory + Cache + Interrupts + microcode), binary code, assembly, static and dynamic linking, compilation, interpretation, JIT compilation, garbage collection, 2n (Level 0) n2 (Level 1)...

Words: 1812 - Pages: 8

Free Essay

Eng 221

...ENGLISH 221: Technical Writing Fundamentals PRINT OUT—PRINT OUT-- PRINT OUT—PRINT OUT-- PRINT OUT If you have any questions about the syllabus, please post them in the Main Classroom. Susan Colebank scolebank@email.phoenix.edu (University of Phoenix) susancolebank@gmail.com (back-up; do not CC this address when you e-mail me at my UOP address) COURSE NUMBER: ENG221 COURSE TITLE: Technical Writing Fundamentals COURSE START DATE: 1/17/12 COURSE END DATE: 2/20/2012 FACILITATOR AVAILABILITY I am in the Classroom five days of the week: Sunday, Monday, Wednesday, Thursday, and Friday. I am on in the morning and then again at night, with the afternoon set aside for telecommuting and taking care of my daughter. I provide you with these times to make it easier to communicate with me, and not to limit our contact. I want you to know that, should you need to contact me outside this timeframe, you should not hesitate to do so via my University of Phoenix e-mail. I HIGHLY RECOMMEND e-mailing me with your questions or concerns, since it is best to document our conversations with a paper trail. I have yet, in nine years of being a UOP instructor, found a student who has a question or concern that couldn’t best be discussed via e-mail. If you need to call me, then please e-mail me first to schedule a time and to leave your phone number. For emergencies, when you are not able to gain access to messages on the Online Learning System (OLS), please send a message to...

Words: 8583 - Pages: 35