• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Evaluate the evidence from throughout the course that there are two distinct modes of cognitive processing.

Extracts from this document...

Introduction

Evaluate the evidence from throughout the course that there are two distinct modes of cognitive processing. Models and experiments presented throughout the 'Cognitive Psychology' course indicate that within the 'Information Processing' framework, 2 distinct modes of cognitive processing exist. The first, concerned with low level cognition is characterised by processing which is parallel, automatic, bottom-up and not very limited by capacity. This is most clearly demonstrated by the number of things we can hear simultaneously, see simultaneously, smell, taste and feel simultaneously. This type of low level cognition, along with skills which have been proceduralised, can also be performed automatically; performed without conscious attention. Automatic tasks do not employ a great deal of mental effort. Automatic tasks such as swimming, driving, and peeling the potatoes can all be accomplished whilst holding a conversation. They can be performed in parallel without making heavy demands on the limited capacity of working memory. The second mode of processing, concerned with high-level cognition, is serial, attentional (within conscious control ), top-down, and a high consumer of working memory's limited capacity. It is usual to only be able to focus our attention (from one modality) on one thing at a time, for instance we can switch our attention from a piece of music to spoken words and back but we can't listen to both at the same time. ...read more.

Middle

and is conscious although some words are read automatically. A.F. Healy (1976) showed with her automatic recognition tests that subjects who were asked to circle all the letter 'T's on a page, often missed out the 'T' in the word 'The". The reading of the word 'The' was so automatic (it is one of the most common words in our language) that the reading of it could not be modified into single letter recognition. The 2 modes of cognitive processing are not then, distinct, when performing a reading task. The 2 modes of processing have been accounted for at levels of explanation higher than the topic-related theories discussed so far, three cognitive architectures have also been introduced, namely the Schema based architecture, the Production system architecture ACT* and the PDP architecture. An architecture is midway between a framework which is a general set of ideas at a high level, and a theory which is specific to an area within the framework and is both predictive and falsifiable. An architecture can also make predictions but is broader than a theory and tries to provide theoretical integration. Whereas both schema based and production system architectures are rule based, PDP reacts to stimuli by activating a pattern of strength across connections. ...read more.

Conclusion

Attentional tasks on the other hand, do not involve a great deal of training, it would not take long to show someone how to count out all the coins from a jar and arrange them in equal piles, but it would not be possible to perform any other tasks at the same time. The last characteristic described by Shiffrin & Schneider was that of consciousness. Although there are several differences between automatic and attentional processing, this is the characteristic that is probably the most easily identified. Attentional tasks are those we are consciously aware of doing. We are conscious of paying attention to that task and if our attention is attracted away, then processing of that task stops. Automatic processing is largely unconscious; we can drive a familiar route and arrive without having been conscious of the journey. The 2 modes of processing then, have been shown to exist, but they are not always distinct, rather they exist at either end of a dimension with lots of variation in between. It has been useful, however, to draw the distinction between the 2 extreme types of cognitive processing for clarity. Mode 1 describes the typical characteristics of conscious processing and mode 2 describes the typical characteristics of unconscious processing but in reality there is a complex relationship and interaction between the two. Cognitive Processing Linda Healy Page 1 08/05/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Ink jet printers, which produce output by spraying ink on to the paper could not produce the two copies that the dot matrix can, but it can produce much better quality and in colour, at low cost. This makes ink jet printers ideal for home use.

  2. Computer Architecture

    Instruction Register (IR) - this divides the information it receives into two fields. One field in the IR contains the operation code that tells the CPU what operation is to be carried out. The other field, called the operand field, contains the address of the data to be used by the instruction.

  1. Signal Theory

    Use only maximum of 4 repeaters in a network and only 3 segments can be populated. Gateways - Very intelligent devices, they work at the Transport Layer protocol. This is higher than the Upper Layer protocol.

  2. LAN & WAN Protocols

    This the current way of deploying portable broadband internet to devices. You would normally find Wi-Fi connections in hotels, cafes & airports. People have started to use it at home aswell. Nearly all personal computer operating systems, game consoles, laptops, smart phones, printer and other peripherals support Wi-Fi.

  1. Analysis of Johnson Music

    Closed questions are the multiple choice questions, where the user has to choice one of a number of given choices. This is the type of questions where statistics can be gathered. Analysis of documentation Recent documents to do with sales and other things within the company can be looked at and analysed.

  2. Signalling Theory

    Digital data is not only easily compressed but has further security values involved. Encryption is used widely throughout and enables the signal to not be tampered with by any other outside source. With this in mind when sent as a secured, compacted, source it's clear to see that more data will be sent with a lot less interference.

  1. Smart Card System

    Two examples of when we might use lock-and-key are as follows: 1. When we want a specific remote user (or group of remote users) to be able to access a host within our network, connecting from their remote host(s) via the Internet.

  2. Flexible Architectures in Communication Security Application

    For a 32k session length, secret-key processing overheads rise to 48% of overall run time. Given that a single session will be composed of many web objects, cryptographic processing will be quickly dominated by secret-key cipher execution. To further reduce the cost of public-key authentication, SSL allows the use of

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work