Premium Essay

Unit 6 Discussion Of Chaining

Submitted By
Words 558
Pages 3
ABA 1 Unit 6 Discussion
Chaining is a specific sequence of discrete responses, each associated with a particular stimulus condition. Each discrete response and the associated stimulus condition serve as an individual component of the chain (Cooper). A completion of one specific behavior in the chain leads to the next specific action in the chain. All steps have to be completed correctly in order to move forward and gain mastery of the behavior.
• Define target behavior
• Reinforce successive elements of the chain
• Monitor the results
Shaping is the process of systematically and differentially reinforcing successive approximations to a terminal behavior (Cooper). Shaping helps the person get closer to mastery by providing reinforcements along

Similar Documents

Free Essay

Dsc340

...DSC 340 Study Guide Mick McQuaid Spring 2014 Following is a study guide for DSC 340. It’s a living document to be updated by the instructor every week during the term based on readings, contributions from students, and updates in the rapidly changing world of business information systems. 1. PERSONAL INFORMATION SYSTEMS Extensive research over the past twenty years, some of it by Tom Malone at MIT and Susan Dumais at Microsoft Research, has explored how people organize personal information. One example that helps people understand the problem of personal information is the knife analogy, described below. One important finding about personal information management has been that people are prone to do one or some combination of these two things: filing and piling. After reviewing the following topics, conclude the study of personal information systems by doing the share best practices exercise. 1.1 Knives In the Home Suppose you have just won a complete set of knives for your home. Where should you put them? You could have a single cabinet to store all knives, but it is more likely that you will distribute the knives to different rooms, placing them near where they will be used: steak knives in a buffet in the dining room, cooking knives in the kitchen, handyman knives in a garage workshop. When you need a particular knife, it will be in the context of a current task, such as preparing food, setting a table, or cutting a length of rope for a clothesline. In each...

Words: 8643 - Pages: 35

Free Essay

Programming

...TeamLRN Robert Lafore Teach Yourself Data Structures and Algorithms in 24 Hours 201 West 103rd St., Indianapolis, Indiana, 46290 USA Sams Teach Yourself Data Structures and Algorithms in 24 Hours Copyright © 1999 by Sams Publishing All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. International Standard Book Number: 0-672-31633-1 Library of Congress Catalog Card Number: 98-83221 Printed in the United States of America First Printing: May 1999 01 00 99 4 3 2 1 EXECUTIVE EDITOR Brian Gill DEVELOPMENT EDITOR Jeff Durham MANAGING EDITOR Jodi Jensen PROJECT EDITOR Tonya Simpson COPY EDITOR Mike Henry INDEXER Larry Sweazy PROOFREADERS Mona Brown Jill Mazurczyk TECHNICAL EDITOR Richard Wright Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Sams Publishing cannot attest to the accuracy of this information. Use of a term in this...

Words: 10065 - Pages: 41

Free Essay

Bank Robbery Usa

...prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of Pearson plc Prentice Hall® is a registered trademark of Pearson Education, Inc. Merrill® is a registered trademark of Pearson Education, Inc. Instructors of classes using Cooper, Heron, and Heward, Applied Behavior Analysis, Second Edition, may reproduce material from the instructor’s manual with test items for classroom use. 10. 9 8 7 6 5 4 3 2 1 [pic] ISBN-13:...

Words: 75129 - Pages: 301

Premium Essay

Unix

...Unit Outline | Supply Chain Management| MKTG3308| | | Semester 1Crawley| | Sharon Purchase| Business School www.business.uwa.edu.au Insert document version showing unit code/location/your initials/date, eg Statistics 160 on-campus, prepared by Jane Smith on Sep-21 would become 530160/Crawley/JS/20.11.08.| | All material reproduced herein has been copied in accordance with and pursuant to a statutory licence administered by Copyright Agency Limited (CAL), granted to the University of Western Australia pursuant to Part VB of the Copyright Act 1968 (Cth).Copying of this material by students, except for fair dealing purposes under the Copyright Act, is prohibited. For the purposes of this fair dealing exception, students should be aware that the rule allowing copying, for fair dealing purposes, of 10% of the work, or one chapter/article, applies to the original work from which the excerpt in this course material was taken, and not to the course material itself.| © The University of Western Australia 2009| Contents UNIT DESCRIPTION 1 Introduction 1 Unit content 1 Learning outcomes 1 CONTACT DETAILS 1 TEACHING AND LEARNING RESPONSIBILITIES 2 Teaching and learning strategies 2 Charter of student rights and responsibilities 2 Teaching and learning evaluation 2 ASSESSMENT MECHANISM 3 Assessment mechanism summary 3 Assessment details 3 Standard of Assessment 6 Special Consideration and Deferred Exams 7 Supplementary Assessment 8 Ethical...

Words: 4639 - Pages: 19

Premium Essay

Even If All Rebates Were Redeemed, Why Might Manufacturers Still Want to Offer Rebates Rather Than Decrease Wholesale Prices?

...Unit Outline | Supply Chain Management| MKTG3308| | | Semester 1Crawley| | Sharon Purchase| Business School www.business.uwa.edu.au Insert document version showing unit code/location/your initials/date, eg Statistics 160 on-campus, prepared by Jane Smith on Sep-21 would become 530160/Crawley/JS/20.11.08.| | All material reproduced herein has been copied in accordance with and pursuant to a statutory licence administered by Copyright Agency Limited (CAL), granted to the University of Western Australia pursuant to Part VB of the Copyright Act 1968 (Cth).Copying of this material by students, except for fair dealing purposes under the Copyright Act, is prohibited. For the purposes of this fair dealing exception, students should be aware that the rule allowing copying, for fair dealing purposes, of 10% of the work, or one chapter/article, applies to the original work from which the excerpt in this course material was taken, and not to the course material itself.| © The University of Western Australia 2009| Contents UNIT DESCRIPTION 1 Introduction 1 Unit content 1 Learning outcomes 1 CONTACT DETAILS 1 TEACHING AND LEARNING RESPONSIBILITIES 2 Teaching and learning strategies 2 Charter of student rights and responsibilities 2 Teaching and learning evaluation 2 ASSESSMENT MECHANISM 3 Assessment mechanism summary 3 Assessment details 3 Standard of Assessment 6 Special Consideration and Deferred Exams 7 Supplementary Assessment 8 Ethical...

Words: 4639 - Pages: 19

Premium Essay

Csun vs. Fcc Home Game

...Unit Outline | Supply Chain Management| MKTG3308| | | Semester 1Crawley| | Sharon Purchase| Business School www.business.uwa.edu.au Insert document version showing unit code/location/your initials/date, eg Statistics 160 on-campus, prepared by Jane Smith on Sep-21 would become 530160/Crawley/JS/20.11.08.| | All material reproduced herein has been copied in accordance with and pursuant to a statutory licence administered by Copyright Agency Limited (CAL), granted to the University of Western Australia pursuant to Part VB of the Copyright Act 1968 (Cth).Copying of this material by students, except for fair dealing purposes under the Copyright Act, is prohibited. For the purposes of this fair dealing exception, students should be aware that the rule allowing copying, for fair dealing purposes, of 10% of the work, or one chapter/article, applies to the original work from which the excerpt in this course material was taken, and not to the course material itself.| © The University of Western Australia 2009| Contents UNIT DESCRIPTION 1 Introduction 1 Unit content 1 Learning outcomes 1 CONTACT DETAILS 1 TEACHING AND LEARNING RESPONSIBILITIES 2 Teaching and learning strategies 2 Charter of student rights and responsibilities 2 Teaching and learning evaluation 2 ASSESSMENT MECHANISM 3 Assessment mechanism summary 3 Assessment details 3 Standard of Assessment 6 Special Consideration and Deferred Exams 7 Supplementary Assessment 8 Ethical...

Words: 4639 - Pages: 19

Premium Essay

Mamgt

.......................................................................2 2.1 Lexical cohesion and discourse organization................................................2 2.1.1 Introduction.............................................................................................2 2.1.2 Lexical cohesion and genre.....................................................................2 2.1.3 Lexical cohesion and coherence .............................................................3 2.2 The role of lexical cohesion in the segmentation and centrality of discourse units......................................................................................................................5 2.2.1 Introduction.............................................................................................5 2.2.2 Discourse segmentation ..........................................................................6 2.2.3 Central discourse units............................................................................8 2.2.4 Conclusion ..............................................................................................8 3 Lexical cohesion analysis....................................................................................9 3.1 The patterns of lexical cohesion: chains and networks .................................9 3.2 Classification of lexical cohesive relations .................................................12 3.3 Elements forming lexical...

Words: 14120 - Pages: 57

Premium Essay

Basic Concepts of Dss

...Decision Support Systems The material has been prepared by considering the prescribed textbook, internet and assignments given by the students (BBM 2011-2014 Batch). The material can be further improved by adding more insightful examples and explanation. The material may not be exhaustive and should be taken as a guide to help in better learning of the subject. ALL THE BEST Unit – I: 1. What is DSS? Explain the Characteristics, Benefits and Limitations of DSS. Definition: A decision support systems is a system under the control of one or more decision makers that assist in the activity of decision making by providing set of tools intended to impose structure to the decision making situation and improve the effectiveness of the decision outcome. Characteristics of DSS: * Employed in semistructured or unstructured decision contexts * Intended to support decision makers rather than replace them * Supports all phases of the decision-making process * Focuses on effectiveness of the process rather than efficiency * Is under control of the DSS user * Uses underlying data and models * Facilitates learning on the part of the decision maker * Is interactive and user-friendly * Is generally developed using an evolutionary, iterative process * Can support multiple independent or interdependent decisions * Supports individual, group or team-based decision-making Situation of Certainty Structured Unstructured Situation...

Words: 15342 - Pages: 62

Premium Essay

Summary Management Information System

...MIS Summary chapter 5 ‘’IT infrastructure and emerging technologies’’ -IT infrastructure: shared technology resources that provide the platform for firm’s specific information system applications. (Including investments) Service platform (Figure 5.1, page 196) 1. Computing platforms that connect employees customers and suppliers in an digital environment. 2. Telecommunication services (provide data, voice and video connectivity) 3. Data management services that store and manage corporate data 4. Application software services (that provide enterprise-wide capabilities) 5. Physical facilities management services that develop and manage physical installations 6. IT management services that plan and develop infrastructure, coordinate with business units for IT services, manage accounting and provide project management services 7. IT standard services that that provides information which system to be used 8. IT education services that provide training in how to use systems for employees 9. IT research and development services Evolution era’s IS (Figure 5.2!, page 198) 1. General purpose mainframe and minicomputer era (1959- present) =IBM mainframes run by professionals. Changed by minicomputers which was cheaper and decentralized computing. 2. Personal computer era (1981- now) =First real computer. Wintel PC became standard desktop. 3. Client server era (1983- now) =laptops (Clients) are networked to server computer that provides client computer with...

Words: 5045 - Pages: 21

Free Essay

Hll Case

...Environmental Pollution at Hindustan Lever’s Kodaikanal Plant In mid-2004, Hindustan Lever Ltd (HLL) executives looked back at the events of the past three years at their mercury thermometer factory in Kodaikanal in the south Indian state of Tamil Nadu. After mercury leakage from the plant had been reported in March 2001, heavy expenditure had been incurred in environmental risk assessment, waste disposal and health monitoring. The expenditure had exceeded the total profits generated by the plant since its inception. But the pressure from NGOs, led by Greenpeace , who had been protesting since March 2001 had not subsided. The NGOs had indulged in novel ways of keeping the issue alive. These included chaining themselves to the HLL branch office in Chennai on 15th November 2002, disrupting the Annual General Meetings (AGMs) of HLL held on 13th June 2003 and 29th June 2004, shouting slogans and brandishing placards and enlisting sympathy from ex-workers and the general public. Greenpeace also maintained the pressure on HLL through its website, photoalbums, posters, persistent media briefing and seminars. The NGOs had most recently attacked HLL in April 2004 in a seminar in Chennai. Even as they waited anxiously for the regulator, Tamil Nadu Pollution Control Board’s (TNPCB) nod to start decontamination of equipment and remediation of soil, HLL’s senior managers believed they had discharged their duties conscientiously. They wondered what more was needed to be done...

Words: 5949 - Pages: 24

Premium Essay

It255

...2. Cryptography: Overview An overview of the main goals behind using cryptography will be discussed in this section along with the common terms used in this field. Cryptography is usually referred to as "the study of secret", while nowadays is most attached to the definition of encryption. Encryption is the process of converting plain text "unhidden" to a cryptic text "hidden" to secure it against data thieves. This process has another part where cryptic text needs to be decrypted on the other end to be understood. Fig.1 shows the simple flow of commonly used encryption algorithms. Fig.1 Encryption-Decryption Flow As defined in RFC 2828 [RFC2828], cryptographic system is "a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context." This definition defines the whole mechanism that provides the necessary level of security comprised of network protocols and data encryption algorithms. 2.1 Cryptography Goals This section explains the five main goals behind using Cryptography. Every security system must provide a bundle of security functions that can assure the secrecy of the system. These functions are usually referred to as the goals of the security system. These goals can be listed under the following five main categories[Earle2005]: Authentication: This means that before sending and receiving data using the system, the receiver and sender identity should be verified...

Words: 6825 - Pages: 28

Free Essay

Behaviorism Still Alive and Kicking

...Unit 1 Discussion Board Applying Learning Theories EDU622-1304C-02 Regina Dzwonar Most records acknowledged formal education as existing as least as far back as ancient Greece. The big three names universally known are Socrates, Plato and Aristotle. Education at this time was concerned mainly with reason, logic and philosophy. Socrates, Plato and Aristotle differed in preferences of extremes. Socrates is infamous for pushing limits while Aristotle preached balance. Many historians consider Plato the most sophisticated of the three; Socrates taught on the streets of Athens. Sources, such as the American Psychological Association, credit Plato, with founding the first formal institution of education, “After returning to Athens, Plato set up his own school, which was called the Academy. Philosophy and other subjects were taught there, and the Academy continued to produce scholars for many centuries after Plato died.” (Downey, 2006, para. 6). Aristotle, according to legend, was the teacher of Alexander the Great. The most notable theory from this time the Socratic Method, which consists of posing probing questions to students rather than espousing a hierarchy of knowledge. Brief History of its Founding Modern theories such as behaviorism, founded in the early twentieth century, are associated with theorists including Watson, Skinner, Pavlov and Thorndike. Watson known as the father of behaviorism proposed an alternative to the views of Wilhelm Wundt the founder of...

Words: 35907 - Pages: 144

Premium Essay

Globe

...entitled Towards New Education where it denoted a holistic view of human experience in education.[8] A related term, corporate giants, was coined by Charles Taze Russell in 1897[9] to refer to the largely national trusts and other large enterprises of the time. By the 1960s, both terms began to be used as synonyms by economists and other social scientists. It then reached the mainstream press in the later half of the 1980s. Since its inception, the concept of globalization has inspired competing definitions and interpretations, with antecedents dating back to the great movements of trade and empire across Asia and the Indian Ocean from the 15th century onwards.[10] Due to the complexity of the concept, research projects, articles, and discussions often...

Words: 4697 - Pages: 19

Premium Essay

Harvard

...Inclusive Services: University Library, 1st floor, or Student Information Centre (SIC) ground floor, Ormskirk Tel: 01695 584372 / 584190 E-mail: inclusiveservices@edgehill.ac.uk We will do our best to accommodate your requirements. 2 Contents Section 1: General Questions Harvard Referencing Citing Bibliography Reference list Bibliographic details More than one book by the same author in the bibliography More than one report from the same author, written in one year Appendix Plagiarism Avoiding plagiarism Quoting Referencing a long quote Quoting parts from a long paragraph Paraphrasing Ibid Op.cit. Et al. Edition Author who cites another author (secondary citation) Summarising several authors Bibliographic management tools Page 5 5 5-6 6 6 7 7 7 7 7-8 8 9 9-10 10 10 10 11 11 11 12 12 13-14 14 14 14-15 15 15 16 16 16 16 17 17 17 18 18 18 18 18 19 19 19 20 20 20 20 3 Section 2: Hard copy texts: books, journals, reports, etc. Conventions for titles Book with one author Book with two authors Book with three or more authors Chapter in an edited book Fictitious author Book review Translated book Foreign language book Diary or book of letters Dictionary Encyclopaedia Journal Article Art image from a book Newspaper article Report Government report Act of Parliament Exhibition catalogue Leaflet Pamphlet PhD or dissertation Conference paper Interview (face-to-face) Letter Section 3: Electronic Resources Website E-book Book review (online) Journal (online) Newspaper (online)...

Words: 8041 - Pages: 33

Premium Essay

Computer Organization and Architecture Designing for Performance 8th Edition

...COMPUTER ORGANIZATION AND ARCHITECTURE DESIGNING FOR PERFORMANCE EIGHTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 Library of Congress Cataloging-in-Publication Data On File Vice President and Editorial Director: Marcia J. Horton Editor-in-Chief: Michael Hirsch Executive Editor: Tracy Dunkelberger Associate Editor: Melinda Haggerty Marketing Manager: Erin Davis Senior Managing Editor: Scott Disanno Production Editor: Rose Kernan Operations Specialist: Lisa McDowell Art Director: Kenny Beck Cover Design: Kristine Carney Director, Image Resource Center: Melinda Patelli Manager, Rights and Permissions: Zina Arabia Manager, Visual Research: Beth Brenzel Manager, Cover Visual Research & Permissions: Karen Sanatar Composition: Rakesh Poddar, Aptara®, Inc. Cover Image: Picturegarden /Image Bank /Getty Images, Inc. Copyright © 2010, 2006 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of...

Words: 239771 - Pages: 960