Working Memory Lab (1)
.docx
keyboard_arrow_up
School
Brooklyn College, CUNY *
*We aren’t endorsed by this school
Course
7738G
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by animaksimyan
Name:
Working Memory
Directions:
For this lab, you will do
TWO
short experiments and compare your results.
1.
Navigate to the following website and follow the instructions:
https://www.psytoolkit.org/experiment-library/digitspan.html
2.
Click the “Click here to run a demo” link to begin the experiment. Pay careful attention to
the instructions that follow.
3.
Following the last trial, the program will present you your reaction time data .
DO NOT
HIT THE SPACEBAR.
Take a screenshot of that summary (numbers in the black square
window) and paste it here.
4.
Repeat steps 1-3 with the following link:
https://www.psytoolkit.org/experiment-library/corsi2.html
5.
Answer the questions below!
Copy
BOTH
Sets of Data Below on the Next Page:
Copy Data Below:
Digit Span
Corsi Blocks
Questions
1.
Look at your individual data. Were you scores within the “typical” range for these
tasks (see experiment page for more information about “typical” ranges for each)?
Discuss how this compares to how you view your own memory (e.g., did you expect to
be above or below average and were you right?).
2. What part of working memory is being relied on for the digit span task? What part of
working memory is being relied on for the Corsi blocks task? Be sure to define each part
of working memory you use and explain how it fits the task.
3. Choose one of the following encoding strategies we discussed in class: visual
imagery, self-reference, or organization. How could this strategy be used to improve
performance in ONE of these experiments? (your choice!)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
First you should ask for the number of tasks to perform.
Then you should create a list of tasks with that many entries.
Ask the user if they have completed each task.
Report the tasks that have yet to be completed.
arrow_forward
LABView
Draw by hand the diagram for a program that displays a count that increments 4 times per seconduntil the user pushes a stop button. Turn on a boolean light when the count is even. Thecount starts at 0 and goes until the user pushes the stop button.
arrow_forward
Directions: The column on the left tells what to search for. On the second column, you
will write on the search box what will you type to achieve the task. Apply the use of
symbols and tip you've learned. The first one is done for you. Write your answer on a
separate sheet of paper.
Task
Search Term
Find web pages
Google Atlantis continent
that have...
all these words:
Atlantis continent
Google Atlantis continent –shuttle -film –movie
But don't show pages
that have..any of
these unwanted
words: shuttle film
movie
Find web pages
Google
that have...
all these words:
| Atlantis
Find web pages
Google
that have...
all these words:
Waterbury
But don't show pages
that have... any of
Google
these unwanted
words: Connecticu t
CT
Find web pages
Google
that have..
all these words:
Waterbury
this exact wording or
Google
phrase: San Diego
State University
Find web pages
Google
that have..
the song title of this
lyrics: Mama
"something'
arrow_forward
please use google collab and screenshot
arrow_forward
1-Flick is the name of a moving body
2-Use python.
arrow_forward
After you have read the required chapters from the text for this unit, visit and read the following website to learn more about Gestalt Psychology.http://en.wikipedia.org/wiki/Gestalt_psychology
Now, consider at least one interface that you use at least several times a week. Think outside of the box - this doesn't have to be your computer - in fact, I would prefer it NOT be - it can be your phone, your television, or some other electronic interface. Describe concisely (no fluff, please!) how at least TWO of the "Laws of Grouping" were applied to the design of the interface that you chose.
arrow_forward
Background and formula:
Ellipse has two types of axis - Major Axis and Minor Axis. The longest chord of the ellipse is the
major axis. The perpendicular chord to the major axis is the minor axis, which bisects the major axis
at the center as shown in Figure 1. Ellipse is different with circle which has only one radius. There is
no simple formula to calculate the exact or accurate value of perimeter of an ellipse. Therefore, we use
approximation formulas to calculate the approximate value of an ellipse's perimeter. One of the
approximation methods is called Ramanujan Formula as follows:
p zn[3(a+b) –
Г(За + b) (а + зь)|
where a is the semi major axis and b is the semi minor axis of the ellipse, respectively, as shown in
Figure 1.
be
major axis
Figure 1. Ellipse
The problem
An input file, data.txt has the following information:
data.txt
4
3
8
4
3
2
7
Write a complete C++ program that read the values of major axis and minor axis from input file,
data.txt; and then compute its perimeter…
arrow_forward
Please look at attached photos. It needs to pass all of the simulations. Thanks in advance
Cryptography is the practice of encryption. Information Security uses cryptography techniques to encrypt and decrypt data. A simple encryption method might take plaintext and mix up the letters using some predetermined pattern and then use that pattern to decrypt the data for reading.
Ciphers are the algorithms used to put the data into its secret pattern and then systematically decrypt it for reading. This script is going to use a famous simple cipher called the Caesar Cipher. It is a substitution cipher where each letter in the text is 'shifted' in a certain number of places. It uses the alphabet as the primary pattern and then based on the shift number, it would shift all the letters and replace the alphabet with our pattern.
For example, if our shift number was 3, then A would be replaced with D, if we performed a right shift. As an example:
Text = "THE CAT IS VISIBLE AT MIDNIGHT" Ciphertext…
arrow_forward
Subject Name: Software Engineering
Question: From the following Scenario, Draw Sequence Diagram?
Scenario: FIND THE TREASURE
V The player starts playing the game. When he/she opens the game, he/she finds
three options in the main menu from which he/she can select any one. The
options are:
i, How to play
- It displays the instructions on how to play the game and which keys to use.
* "Back" button will move the player back to the main menu.
r "Exit" button will close the game.
ii. Start game
r It starts the first level of game.
iii. Exit
r It cancels playing the game.
V Note that there are 5 levels with different difficulties.
V In each level the player may take gifts and key.
- Gift will add the score of player.
- Key will move the player to next level.
V For each level the player is given 3 lives.
V If all the lives are finished, the level will be closed and the player has to again
start playing that level.
V The player can collect the key if he/she has collected minimum 3 gifts.
V The…
arrow_forward
MULTIPLE CHOICE -The answer is one of the options below please solve carefully and circle the correct option Please write clear .
arrow_forward
Please explain the steps
arrow_forward
The Problems - contains only problems from the last 2 contests
Separate Un-Attempted, Attempted and All cards Problem Difficulty Rating - The
Featured drop-down menu has different difficulty ranges so you can try problems that
best suit your experience.
Popular topics and brands Like most users, Chef didn't know that he could add
problems to his personal to-do list by clicking the magic "+" symbol in the upper
right corner of each problem page. But once he found out about it, he went crazy and
added a lot of problems to his to-do list without looking at their difficulty rating.
Rajesh is a beginner and ideally should only try to solve problems strictly below
10001000. Given the difficulty rating list of problems in Chef's to-do list, please help
him determine how many of these problems Chef should remove from his to-do list
so he is left with only problems with a difficulty rating of less than 10001000.
Note: Please answer the question in Python only:
Input
1
4
999 1000 1001 1002…
arrow_forward
Task 1
You can execute commands by entering them in the
command window after the MATLAB prompt (>) and
pressing the Enter key.
TASK
Multiply the numbers 3 and 5 together with the
command 3*5.
arrow_forward
1. Come and Get Sum
by CodeChum Admin
You think you're smart huh? I bet you cant add even add
two numbers together! Prove me wrong and I might just
back off.
Input
1. The first integer
Constraints
This is a whole number.
2. The second integer
Constraints
This is a whole number.
Output
The first line will contain a message prompt to input the
first integer.
The second line will contain a message prompt to input
the second integer.
The last line will contain the whole equation with the
sum.
Enter the first - number: 1
Enter the second- number: 2
1.+23
arrow_forward
Active buzzer project.
Write a code in C language to make an active buzzer make a sound. After writing the code , write an algorithm for the code you wrote.
arrow_forward
METHOD:
Put on gloves and place one piece of bread in a re-sealable plastic bag using a gloved hand. Label this first bag “controlled”.
QUESTION:
What will be the result and write your conclusion
arrow_forward
TEST II: PROTOTYPING
INSTRUCTION: Create a storyboard that depicts how to fill a car with gas
(petrol) using the tables provided below.
NOTE: Prototyping is a successful and simple way to prototype an
interaction, and is used quite commonly when developing websites. Each
box represents one screen or one element of a task.
Description 1:
Description 2:
Description 3:
Description 4:
Description 5:
Description 6:
arrow_forward
Watch the video below about how sets are used in computer programming. Write a brief response about what you saw in the video.
Give another example of how sets are used in your life.
https://www.youtube.com/watch?v=S0InSH_TgaI
arrow_forward
How do I solve this using swift code?
arrow_forward
OpenGL Programming Help (please provide a screenshot that it works)
Write a program that creates a three-dimensional captial "i" that animates. In response to the menu selection,
1.spin the "i" vertically
2. stop spinning
When the user clicks on the right mouse button and selects the menu option to spin the"i" it should spin in the letter.
arrow_forward
Skydiving
Bibi is a skydiving instructor. Before carrying out skydiving
activities, Bibi will always ask the name, height, and age
of the participants. Bibi's participants is always 2 people.
To make it easier to remember their identities, Bibi gave
them a paper to write down their identity. But because
they are very enthusiastic in doing skydiving, they write
their identity in a single line only (for both of the
participants), so it wasn't quite neat and it made difficult
for Bibi to see it, and resulted in the skydiving process
being disturbed. As one of the organizer committee, you
do not want this activity to be disturbed and plan to
provide a program that provides their identity neatly to
Bibi.
Format Input
Input consists of 1 line. It contains the identity of 2 people
in a row Ni, Ti, Ui - the name, height, and age of the i-th
participant.
Format Output
The output consists of 6 lines. The first line, "Name 1: N1".
The second line, "Height 1: T1". The third line, "Age: U1".
For…
arrow_forward
[ 21st_ITEM ] Instructions: This is a multiple choice. Choose the right option/s. I won't like it if it is incomplete and incorrect.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- First you should ask for the number of tasks to perform. Then you should create a list of tasks with that many entries. Ask the user if they have completed each task. Report the tasks that have yet to be completed.arrow_forwardLABView Draw by hand the diagram for a program that displays a count that increments 4 times per seconduntil the user pushes a stop button. Turn on a boolean light when the count is even. Thecount starts at 0 and goes until the user pushes the stop button.arrow_forwardDirections: The column on the left tells what to search for. On the second column, you will write on the search box what will you type to achieve the task. Apply the use of symbols and tip you've learned. The first one is done for you. Write your answer on a separate sheet of paper. Task Search Term Find web pages Google Atlantis continent that have... all these words: Atlantis continent Google Atlantis continent –shuttle -film –movie But don't show pages that have..any of these unwanted words: shuttle film movie Find web pages Google that have... all these words: | Atlantis Find web pages Google that have... all these words: Waterbury But don't show pages that have... any of Google these unwanted words: Connecticu t CT Find web pages Google that have.. all these words: Waterbury this exact wording or Google phrase: San Diego State University Find web pages Google that have.. the song title of this lyrics: Mama "something'arrow_forward
- please use google collab and screenshotarrow_forward1-Flick is the name of a moving body 2-Use python.arrow_forwardAfter you have read the required chapters from the text for this unit, visit and read the following website to learn more about Gestalt Psychology.http://en.wikipedia.org/wiki/Gestalt_psychology Now, consider at least one interface that you use at least several times a week. Think outside of the box - this doesn't have to be your computer - in fact, I would prefer it NOT be - it can be your phone, your television, or some other electronic interface. Describe concisely (no fluff, please!) how at least TWO of the "Laws of Grouping" were applied to the design of the interface that you chose.arrow_forward
- Background and formula: Ellipse has two types of axis - Major Axis and Minor Axis. The longest chord of the ellipse is the major axis. The perpendicular chord to the major axis is the minor axis, which bisects the major axis at the center as shown in Figure 1. Ellipse is different with circle which has only one radius. There is no simple formula to calculate the exact or accurate value of perimeter of an ellipse. Therefore, we use approximation formulas to calculate the approximate value of an ellipse's perimeter. One of the approximation methods is called Ramanujan Formula as follows: p zn[3(a+b) – Г(За + b) (а + зь)| where a is the semi major axis and b is the semi minor axis of the ellipse, respectively, as shown in Figure 1. be major axis Figure 1. Ellipse The problem An input file, data.txt has the following information: data.txt 4 3 8 4 3 2 7 Write a complete C++ program that read the values of major axis and minor axis from input file, data.txt; and then compute its perimeter…arrow_forwardPlease look at attached photos. It needs to pass all of the simulations. Thanks in advance Cryptography is the practice of encryption. Information Security uses cryptography techniques to encrypt and decrypt data. A simple encryption method might take plaintext and mix up the letters using some predetermined pattern and then use that pattern to decrypt the data for reading. Ciphers are the algorithms used to put the data into its secret pattern and then systematically decrypt it for reading. This script is going to use a famous simple cipher called the Caesar Cipher. It is a substitution cipher where each letter in the text is 'shifted' in a certain number of places. It uses the alphabet as the primary pattern and then based on the shift number, it would shift all the letters and replace the alphabet with our pattern. For example, if our shift number was 3, then A would be replaced with D, if we performed a right shift. As an example: Text = "THE CAT IS VISIBLE AT MIDNIGHT" Ciphertext…arrow_forwardSubject Name: Software Engineering Question: From the following Scenario, Draw Sequence Diagram? Scenario: FIND THE TREASURE V The player starts playing the game. When he/she opens the game, he/she finds three options in the main menu from which he/she can select any one. The options are: i, How to play - It displays the instructions on how to play the game and which keys to use. * "Back" button will move the player back to the main menu. r "Exit" button will close the game. ii. Start game r It starts the first level of game. iii. Exit r It cancels playing the game. V Note that there are 5 levels with different difficulties. V In each level the player may take gifts and key. - Gift will add the score of player. - Key will move the player to next level. V For each level the player is given 3 lives. V If all the lives are finished, the level will be closed and the player has to again start playing that level. V The player can collect the key if he/she has collected minimum 3 gifts. V The…arrow_forward
- MULTIPLE CHOICE -The answer is one of the options below please solve carefully and circle the correct option Please write clear .arrow_forwardPlease explain the stepsarrow_forwardThe Problems - contains only problems from the last 2 contests Separate Un-Attempted, Attempted and All cards Problem Difficulty Rating - The Featured drop-down menu has different difficulty ranges so you can try problems that best suit your experience. Popular topics and brands Like most users, Chef didn't know that he could add problems to his personal to-do list by clicking the magic "+" symbol in the upper right corner of each problem page. But once he found out about it, he went crazy and added a lot of problems to his to-do list without looking at their difficulty rating. Rajesh is a beginner and ideally should only try to solve problems strictly below 10001000. Given the difficulty rating list of problems in Chef's to-do list, please help him determine how many of these problems Chef should remove from his to-do list so he is left with only problems with a difficulty rating of less than 10001000. Note: Please answer the question in Python only: Input 1 4 999 1000 1001 1002…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education