• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Evaluate the evidence from throughout the course that there are two distinct modes of cognitive processing.

Extracts from this document...

Introduction

Evaluate the evidence from throughout the course that there are two distinct modes of cognitive processing. Models and experiments presented throughout the 'Cognitive Psychology' course indicate that within the 'Information Processing' framework, 2 distinct modes of cognitive processing exist. The first, concerned with low level cognition is characterised by processing which is parallel, automatic, bottom-up and not very limited by capacity. This is most clearly demonstrated by the number of things we can hear simultaneously, see simultaneously, smell, taste and feel simultaneously. This type of low level cognition, along with skills which have been proceduralised, can also be performed automatically; performed without conscious attention. Automatic tasks do not employ a great deal of mental effort. Automatic tasks such as swimming, driving, and peeling the potatoes can all be accomplished whilst holding a conversation. They can be performed in parallel without making heavy demands on the limited capacity of working memory. The second mode of processing, concerned with high-level cognition, is serial, attentional (within conscious control ), top-down, and a high consumer of working memory's limited capacity. It is usual to only be able to focus our attention (from one modality) on one thing at a time, for instance we can switch our attention from a piece of music to spoken words and back but we can't listen to both at the same time. ...read more.

Middle

and is conscious although some words are read automatically. A.F. Healy (1976) showed with her automatic recognition tests that subjects who were asked to circle all the letter 'T's on a page, often missed out the 'T' in the word 'The". The reading of the word 'The' was so automatic (it is one of the most common words in our language) that the reading of it could not be modified into single letter recognition. The 2 modes of cognitive processing are not then, distinct, when performing a reading task. The 2 modes of processing have been accounted for at levels of explanation higher than the topic-related theories discussed so far, three cognitive architectures have also been introduced, namely the Schema based architecture, the Production system architecture ACT* and the PDP architecture. An architecture is midway between a framework which is a general set of ideas at a high level, and a theory which is specific to an area within the framework and is both predictive and falsifiable. An architecture can also make predictions but is broader than a theory and tries to provide theoretical integration. Whereas both schema based and production system architectures are rule based, PDP reacts to stimuli by activating a pattern of strength across connections. ...read more.

Conclusion

Attentional tasks on the other hand, do not involve a great deal of training, it would not take long to show someone how to count out all the coins from a jar and arrange them in equal piles, but it would not be possible to perform any other tasks at the same time. The last characteristic described by Shiffrin & Schneider was that of consciousness. Although there are several differences between automatic and attentional processing, this is the characteristic that is probably the most easily identified. Attentional tasks are those we are consciously aware of doing. We are conscious of paying attention to that task and if our attention is attracted away, then processing of that task stops. Automatic processing is largely unconscious; we can drive a familiar route and arrive without having been conscious of the journey. The 2 modes of processing then, have been shown to exist, but they are not always distinct, rather they exist at either end of a dimension with lots of variation in between. It has been useful, however, to draw the distinction between the 2 extreme types of cognitive processing for clarity. Mode 1 describes the typical characteristics of conscious processing and mode 2 describes the typical characteristics of unconscious processing but in reality there is a complex relationship and interaction between the two. Cognitive Processing Linda Healy Page 1 08/05/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Computer Architecture

    Condition Code Register (CCR) - this takes a snapshot of the state of the ALU after each instruction has been executed and records the state of the carry, negative, zero, and overflow flag-bits. In the above diagram the flag-bits are H, I, N, Z, V & C.

  2. LAN & WAN Protocols

    IPv4 IPv4 is the data oriented protocol used on a packet switched internetwork such as Ethernet. It does not guarantee the delivery but avoids duplicate deliveries. IPv4 using packet checksums provides data integrity protection. It works at the data link layer.

  1. Signal Theory

    Use only maximum of 4 repeaters in a network and only 3 segments can be populated. Gateways - Very intelligent devices, they work at the Transport Layer protocol. This is higher than the Upper Layer protocol.

  2. Analysis of Johnson Music

    improve the speed of sales, minimise human error in your shop and help you keep track of stock easily. It is my belief that this will help you and your staff greatly in the long-term. In order to do this, I would need to conduct a series of interviews, questionnaires,

  1. Signalling Theory

    Digital data is not only easily compressed but has further security values involved. Encryption is used widely throughout and enables the signal to not be tampered with by any other outside source. With this in mind when sent as a secured, compacted, source it's clear to see that more data will be sent with a lot less interference.

  2. Smart Card System

    However, it also has some risks when the lock-and-key method is used. When lock-and-key is triggered, it creates a dynamic opening in the firewall by temporarily reconfiguring an interface to allow user access. While this opening exists, another host might spoof the authenticated user's address to gain access behind the firewall.

  1. Flexible Architectures in Communication Security Application

    The technique improved performance of secret-key ciphers through fast substitutions, general bit permutations, rotates, and modular arithmetic. We re-code the ciphers using these new instructions and then examine their performance on microarchitectural models with varying levels of support for fast cryptography.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    This involves the testing of; * Buttons - making sure they work correctly and execute the right procedures. * Manipulating files - making sure files work correctly and are writeable * Records - checking whether records work as planned and hold data required.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work