text
stringlengths
313
1.33M
# Japanese/Dialects ``` !A map of Japanese copula.{width="320"} Many learners of Japanese begin their studies thinking that the language is a single standard, spoken across the whole nation. While it is true that nearly all Japanese nationals can speak the standard language, it is by no means their every day language. This long and mountainous archipelago has over the centuries given rise to a great number of dialects with their own distinct accent, intonation and vocabulary. Before the Tokugawa Shogun (徳川将軍) moved to Edo (江戸, modern day Tokyo) in 1603, the main place of government was Kyoto (京都), and standard Japanese was the ancestor of today\'s Kyoto dialect. Modern standard Japanese, hyōjungo (標準語) is basically the dialect of Tokyo. This is used in schools and media throughout the country. Other varieties of Japanese are often considered provincial and like in every language, each bears connotations of archetypes. !A map of Japanese dialects.{width="320"} ## Eastern Japanese - Hokkaidō Dialect - Tōhoku Dialect - Northern - Tsugaru Dialect - Southern - Kantō Dialect - (Japanese/Dialects/Yokohama?) - Tōkai Dialect - (Japanese/Dialects/Mikawa) - Hokuriku Dialect - Japanese/Dialects/Ishikawa - Japanese/Dialects/Toyama ## Western Japanese - Hokuriku Dialect (Talk:Japanese/Dialects/Ishikawa?) - (Japanese/Dialects/Toyama) - Kinki (Kansai) Dialect - Japanese/Dialects/Osaka - Chūgoku Dialect - Umpaku Dialect - Shikoku Dialect - Kyūshū - Hōnichi Dialect - Hichiku Dialect - Satsugū Dialect ## Hachijō Island - Hachijō Dialect ## Ryūkyū - (Japanese/Dialects/Okinawa?)
# Japanese/Kana chart ---------------------------------------- ------------------------------ Base Kana *(clear sounds)* Compound sounds あ ***a*** ア い ***i*** イ か ***ka*** カ き ***ki*** キ さ ***sa*** サ し ***shi*** シ た ***ta*** タ ち ***chi*** チ な ***na*** ナ に ***ni*** ニ は ***ha*** ハ ひ ***hi*** ヒ ま ***ma*** マ み ***mi*** ミ や ***ya*** ヤ   ら ***ra*** ラ り ***ri*** リ わ ***wa*** ワ **ゐ** **\'\'wi**\'\' **ヰ** ん ***n*** ン   Voiced consonants *(turbid sounds)* Turbid compound sounds が ***ga*** ガ ぎ ***gi*** ギ ざ ***za*** ザ じ ***ji*** ジ だ ***da*** ダ ぢ ***ji*** ヂ ば ***ba*** バ び ***bi*** ビ Stop consonants *(half turbid sounds)* Half turbid compound sounds ぱ ***pa*** パ ぴ ***pi*** ピ ---------------------------------------- ------------------------------ : ひらがな - Romaji - カタカナ ------------- Miscellanea っ    ッ ------------- `<small>`{=html}The grayed kana are no longer applicable in standard Japanese, but still may be encountered within certain contexts, for example older names and works of fiction.`</small>`{=html} ## External Links - Kana Copybook (PDF) --- Memorize the Kana through handwriting.
# Japanese/Vocabulary ## Elementary vocabulary - /Colors/ - /Clothes and accessories/ - /Animals/ - /Numbers/ - /Time/ and dates - Directions - Food and drink - /Sushi/ - /Body parts/ - /Family and people/ - Weather and seasons - /Verbs/ - /Adjectives/ ## Proper - Countries and languages - Regions and prefectures of Japan ## Specialized - /Academic Subjects/ - /Astronomy/ - /Biology/ - /Chemistry/ - /Glaciology/ - /Mathematics/ - /Linguistics/ - /Law/ - /Aviation/ - /Business/ - /Banking/ - /Computing/ - /Health/ - Government and politics - /Punctuation/ - /Vocations/ - /Units/ ### Cultural - /Music/ - /Videogame/ ## By origin - /Gairaigo/ - /Onomatopoeia/ bn:জাপানি ভাষা শিক্ষা/অভিধান
# Japanese/Grammar ## Word order Japanese is a SOV (Subject-Object-Verb) language. English is typically SVO (Subject-Verb-Object). In Japanese, the verb *always* appears at the end of clauses and sentences. Japanese parts of speech are usually marked with words called \"particles\" that follow the word they modify. These particles identify the word\'s or phrase\'s function in the sentence---for example, topic, subject, direct/indirect object, location of action, etc. Japanese is flexible in terms of word-order due to use of particles. Sentences, however, generally have the following structure: : **Sentence Topic, Time, Location, Subject, Indirect Object, Direct Object, Verb.** ## Context sensitivity Japanese is highly *context-sensitive*. Words or phrases obvious to both the speaker and listener are often omitted. It could be considered a \"minimalist\" language. For example, the statement: \"I\'m going to watch a movie.\" could be translated as 「映画を見る。」 (*eiga o miru.*); literally, \"Movie watch.\" \[I\] is implied, as it is the speaker who is making the statement. Depending on the context, however, this phrase could also be translated as \"s/he is going to watch a movie\", \"we will watch a movie\", etc. Japanese has many levels of formality and depends not only on what is said, but also on who is saying it and to whom. The language is socially striated to the point that different forms of speech exist for men and women. ## Parts of speech Japanese parts of speech, although no more complicated than those of other languages, do not fit well into typical labels such as verb, noun, and adjective. Keep that in mind over the course of your studies. ### Nominals #### Nouns Nouns in Japanese are fairly immutable. They do not take definite or indefinite articles, gender, and do not change for number. Although there is no true plural in Japanese, a small number of nouns may take one of several collective suffixes. : *Tanaka-san (Mr. Tanaka), Tanaka-san-tachi (Mr. Tanaka and his group)* Certain nouns may take a prefix in polite speech. Most often, native Japanese words (和語) are preceded by \"o-\" (\"お\"), and Sino-Japanese words (漢語) are preceded with \"go-\" (\"ご\"). Both are readings of the kanji \"御\". Though primarily used for adding politeness or distance, some words more commonly appear with the prefix than others, and in some cases, never appear without it (e.g., お茶 \[*ocha*\], \"green tea\"). Many nouns may be converted into verbs simply by affixing 「する」 (*suru*) to the end. : *\"benkyō\" () is a noun meaning \"study/studies\" while \"benkyō-suru\" () is the verb \"to study\".* Nouns may also function as adjectives when the particle の (*no*) or な (\"na\") is appended. : *\"ki\" (木) means \"wood\" with \"ki no tatemono\" (の) meaning \"wooden building\".* #### Pronouns Unlike many other languages, Japanese has no true pronouns; since words that are clear from context are usually elided, there is less need for them. In general, natural-sounding Japanese tends to avoid the use of nouns that refer to people except when explicitly needed. This is often a point of confusion for beginners. Pronominals are not grammatically distinct from ordinary nominals: notably, they may take adjectives, which pronouns cannot. : *\"watashi\", \"boku\", \"ore\", \"watakushi\" all mean \"I\"; and \"anata\", \"kimi\" mean \"you\"* #### Na-adjectives A Na-adjective is a nominal that often precedes a copula (such as \'na\'). Due to the common occurrence of na-adjectives, many Japanese dictionaries write nominals with the \'na\' included. Na-adjectives are generally adjectival in meaning, as most cannot exist in context without a previously denoted subject; however, one might simply say \"げんき な (genki na)\" to describe a subject that is understood within the current conversation\'s context (this situation is limited to casual or somewhat informal conversation; using full sentences is almost always necessary when speaking to anyone of higher status). Examples of na-adjectives: \"heta na:\" unskilled, bad at; \"genki na:\" healthy, energetic; \"orijinaru na:\" original ### Verbals #### Verbs Verbs are where most of the action in Japanese sentences takes place. They are the primary means for controlling levels of politeness in speech,... Japanese verbs inflect directly for tense, negation, mood, aspect, politeness, and honorific speech. Unlike English, conjugation of Japanese verbs is extremely regular, with few exceptions. The system takes some getting used to, but once the kana have been learned, a uniform pattern emerges. Verbs are placed into one of three groups: 五段 (*godan*, aka Type I), 一段 (*ichidan*, aka Type II), and 不規則 (*fukisoku*, irregular). Only two verbs are generally considered irregular in the modern language, 来る (*kuru*, to come) and する (*suru*, to do). Despite being such, even they are somewhat regular in their irregularity. #### I-adjectives These inflect for tense, politeness, and honorific speech as well (although not aspect or mood, as they are all stative verbs); an -i adjective will always end in -ai, -ī, -ui, or -oi. (Note that there are also stative -u verbs.) : \'\'\"utsukushī\": beautiful; \"ī\": good; \"sugoi\": amazing; \"ureshī\": happy #### The copula Although the copula is not strictly a verb, most of its forms derive from \"de aru\", but inflects somewhat irregularly. It retains an \"attributive form\", na, used to modify the noun it stands before: however, this form is almost exclusively used after na-adjectives. ### Other **Particles**: Also called **postpositions** or *joshi*, particles show the case of nouns in Japanese: that is, they mark nouns as being the subject, object, indirect object, etc. (English typically uses word order or prepositions for the same effect.) Particles follow the noun they modify. - *wa* (**は**): topic - *ga* (**が**): subject - *o* (**を**): direct object - *no* (**の**): possession, apposition - *ni* (**に**): indirect object, direction \"to\", location of existence, etc. - *kara* (**から**): direction \"from\" - *made* (**まで**): \"until\", \"as far as\" - *de* (**で**): means, location of an action Some particles are used after sentences instead: - *ka* (**か**): question marker - *yo* (**よ**): marker for giving new information or showing emphasis or certainty - *ne* (**ね**): marker for seeking agreement - *tte* (**って**): informal quotation marker **Adverbs**: Adverbs typically modify the entire sentence, although most Japanese quantifiers (including numbers) are actually adverbs, rather than adjectives as in English. - *aikawarazu* as always; - *sukoshi* (**少し**) a little, few - *mō sugu* soon, before long; - *sō* thus, so **Conjunctions**: Japanese conjunctions typically either apply to nominals (like English \"except\") or to predicates (like English \"when\"), not both (like English \"and\"). - *mata wa* or (n.); - *soshite* (**そして**) and then, and also (pr.); - *ga* but (pr.) **Interjections**: Common to every language. - *wā!* \"wow!\" - *are?* \"huh?\", \"wha?\" - *ē to* \"um, er\" - *anō* \"um\" ## Sentence examples ------- 遅い Osoi. late ------- *\[You\'re\] late.* -------- ----- 綺麗 だ Kirei da. Pretty is -------- ----- : *\[It\] is pretty.* ------ --------- ------ ------- これ は 本 です Kore wa hon desu. This *topic* book is. ------ --------- ------ ------- : *This is a book.* ---------- --------- ------------ 富士山 は 美しい Fuji-san wa utsukushī. Mt. Fuji *topic* beautiful ---------- --------- ------------ : *Mt. Fuji is beautiful.* ------- --------- -------- ----------------- ------- 今日 は あまり 寒くない です Kyou wa amari samuku-nai desu. Today *topic* very cold-NEG-POLITE is ------- --------- -------- ----------------- ------- : *It\'s not very cold today. / Today isn\'t very cold.* ----- ---------- ---------------- 海 を 見ました Umi o mimashita. Sea *object* look at-*past* ----- ---------- ---------------- : *\[I\] gazed out at the ocean.* ---------- --------- ------- ---------------- ------------------ お母さん は 店 に 行きました Okāsan wa mise ni ikimashita. Mother *topic* store *place/method* went-PAST-POLITE ---------- --------- ------- ---------------- ------------------ : \'\'\[Her\] mother went to the store. -------- ----------- ------------------ 夏 が 来ました Natsu ga kimashita. Summer *subject* come-PAST-POLITE -------- ----------- ------------------ : *Summer has come.*
# XForms/Examples Wanted Here are some examples were are still looking for: ## Examples Wanted Here is list of the example progams we are looking for in rough order of priority (highest priority examples are first) 1. **Example to format currency** - We would like an example that formats based on numeric picture formats such as \"\$#,###.##\". 2. **Validate Field by Character Set** - We would like to validate a field base on a pattern character set. So for example we would like to mark a field invalid if it has special characters such as non-alpha or non-numerics. How do you specify this in a binding rule? Can you bind it to an XML Schema data type? 3. **Full CRUD Example on dynamic file** Demonstrate the full create, read, update delete (CRUD) cycle for some form data selected from a file local file system. The example load the form data from a file (use the upload control) into an instance document and (similar to using the src=\"\" attribute), view the data, edit the data and save the data back to a file using a submit to a file. For doing this on a static file see ../Read and write with get and put/ 4. **Display required elements from Schema** - A XML Schema file can tell you exactly what fields are required (if the minOccurs is not zero). Demonstrate how these fields can be automatically be displayed using CSS and the :required pseudo element 5. **Instance validation** - An example based on an external XML schema. Validate an instance using the XML Schema file. ../Validate/ 6. **XMLEvents** Demonstrate how XML Events work with event propagation. Show how events bubble up the event responder tree. 7. Use industry standard forms (IRS tax forms, ACORD insurance forms etc). 8. A XForms example incorporating XML Signing in XHTML preferably with digital filters too. 9. **Full CRUD Example using any Database** Demonstrate the full create, read, update delete (CRUD) cycle for some form data selected from a database. The example load the form data from a database into an instance document and (similar to using the src=\"\" attribute), view the data, edit the data and save the data back to a database using a submit ## Non FireFox Examples FireFox does not have Pseudo_element_support for `<b>`{=html}`::value``</b>`{=html}, `<b>`{=html}`::repeat-item``</b>`{=html}, and `<b>`{=html}`::repeat-index``</b>`{=html}. See Pseudo element support in FireFox Are their any other systems that will support this that we can get examples from? ## Finished Examples 1. Get information from an XHTML web page - use the instance src to extract a value from an XHTML file. See ../Read and write with get and put/ 2. Web Service Examples using REST - Examples of calling a web service using the simplified REST protocol where web service arguments are just passed in a URL. See ../Search flickr and ../Search Amazon 3. Call a web service from a form using the submit command. We would like an example that does not require the students to register to use a web service. See ../Web service/ 4. ../Load from XML Schema - Load an XML Schema and use the data types in the XML Schema to validate data types in a form. 5. ../Facet Validation/ - We would like to have a family of example programs that validate based on the facets of an XML Schema file but it appears that the FireFox extension does not yet support facet validation (restrictions based on length, minLength, maxLength, etc) so this is somewhat difficult to demonstrate easily in a classroom setting when the students are just running the FireFox browser. 6. Set textarea size. Use the CSS to set the area of a textarea size differently of many boxes. See ../Textarea with style/
# XForms/Conditional Actions ## Motivation You want to conditionally perform an action based on an XPath Expression. ## Method We will use the **if** attribute of an action that is part of the XForms 1.1 specification. We will set up an event that will be triggered every time an instance becomes empty. We will create an action and set the observer attribute to watch for changes in the people instance. Here is the code for the action itself: ``` xml <xf:action ev:event="xforms-delete" ev:observer="people" if="not(person)"> <xf:insert origin="instance('person-template')" context="."/> </xf:action> ``` This says to watch the **people** instance and if there is not a person in the people instance then insert one using the person-template instance. ``` xml <html xmlns="http://www.w3.org/1999/xhtml" xmlns:xf="http://www.w3.org/2002/xforms" xmlns:xsd="http://www.w3.org/2001/XMLSchema-datatypes" xmlns:ev="http://www.w3.org/2001/xml-events"> <head> <title>Test of populating a repeat if it becomes empty</title> <xf:model id="m"> <xf:instance id="people"> <people xmlns=""> <person> <name>John</name> <email>j...@example.org</email> </person> <person> <name>Bethany</name> <email>beth...@example.org</email> </person> </people> </xf:instance> <xf:instance id="person-template"> <person xmlns=""><name/> <email/></person> </xf:instance> </xf:model> </head> <body> <h1>Test of populating a repeat if it becomes empty</h1> <xf:group ref="instance('people')"> <xf:repeat nodeset="person"> <xf:input ref="name"><xf:label>Name: </xf:label></xf:input><br/> <xf:input ref="email"><xf:label>Email address: </xf:label></xf:input> <xf:trigger> <xf:label>Delete</xf:label> <xf:delete ev:event="DOMActivate" nodeset="."/> </xf:trigger> </xf:repeat> <xf:action ev:event="xforms-delete" ev:observer="people" if="not(person)"> <xf:insert origin="instance('person-template')" context="."/> </xf:action> </xf:group> </body> </html> ``` ## Acknowledgments This example was posted on the Mozilla XForms newsgroup by John L. Clark in December 10th of 2008.
# XForms/A Trigger for Inserting BBcode into a Textarea box ## Using Trigger to Add BBcode or Other Text to Input or Textarea Controls Here is a simple way to use a button (trigger) to add commonly used text to your xforms-input or xforms-textarea controls. This could be many things such as BBcode (bold/unbold codes), date-time stamps, frequently used formatted text such as a letterhead, signature blocks, special codes that aren\'t easy to remember\-- all depending on the purpose of your form and your specific needs. ## Link to working XForms Application Load Example XForms Application A more advanced example for inserting at the beginning or end of text (with some additional code inserts such as links and images) Load Example XForms Application ## Program Structure For simplification, we are using a single `<text/>`{=html} element in our model/instance to hold our example input. The style is not really necessary other than to give one a larger text area to test with. The real power, and simplicity, of the form is in the value attribute of the xforms-setvalue element which itself is placed inside an xforms-trigger: `  value="concat(//text,'whatever you desire goes here')"` ## Sample Program ``` html <html xmlns="http://www.w3.org/1999/xhtml" xmlns:xf="http://www.w3.org/2002/xforms" xmlns:ev="http://www.w3.org/2001/xml-events"> <head> <title>Insert BB code</title> <style type="text/css"> <!--mozilla specific style--> @namespace xf url('http://www.w3.org/2002/xforms'); xf|textarea .xf-value{ width:25em; height:20ex; } </style> <xf:model> <xf:instance> <data xmlns=""> <text/> </data> </xf:instance> </xf:model> </head> <body> <xf:trigger><xf:label>Bold</xf:label> <xf:action ev:event="DOMActivate"> <xf:setvalue ref="//text" value="concat(//text,'[b][/b] ')"/> <xf:setfocus control="textArea"/> </xf:action> </xf:trigger><br/> <xf:textarea id="textArea" ref="//text"> <xf:label>Post:</xf:label> </xf:textarea> </body> </html> ``` ## Discussion This solution will only append the inserted code/text to the end of the current text in the text box. To have it always at the beginning, simply change the order of the arguments in your concat function (see the second example link above). Limitation: This solution cannot insert code/text into the middle of the current text in the text box. You can use html entities to do complex formats like a letterhead (if you need to preserve space or bold etc..) (!!note: the ampersand-& is replaced by the percent-% as I couldn\'t figure out how to escape html entities in this wikibook) ``` xml <xf:setvalue ref="//text" value="concat(//text,' %lt;div xmlns=%quot;http://www.w3.org/1999/xhtml%quot;%gt; %lt;p%gt;%lt;b%gt;Testing insert with HTMLentities%lt;/b%gt; %lt;/p%gt; %lt;p%gt;%lt;i%gt;Testing Insertwith HTMLenitites%lt;/i%gt; %lt;/p%gt; %lt;pre%gt; Indent Here%lt;/pre%gt; %lt;/div%gt;')"/> ``` In such a case, make sure your xforms-output has a mediatype attribute like so: ``` xml <xf:output ref="//text" mediatype="application/xhtml+xml"/> ``` ## Discussion
# XForms/SVG ## Motivation You want to dynamically load and render SVG. ## Sample Program ``` html <html xmlns="http://www.w3.org/1999/xhtml" xmlns:ev="http://www.w3.org/2001/xml-events" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xf="http://www.w3.org/2002/xforms" xmlns:svg="http://www.w3.org/2000/svg"> <head> <title>SVG Browser</title> <style type="text/css"> #svgimg .xforms-value { width: 400px; min-width: 400px; height: 400px; min-height: 400px; } </style> <xf:model> <xf:instance id="current"> <current xmlns=""/> </xf:instance> <xf:instance id="names"> <names xmlns=""> <name fname="mozilla.svg">Mozilla</name> <name fname="wii.svg">Wii</name> <name fname="duke.svg">Duke</name> <name fname="git.svg">Git</name> <name fname="cartman.svg">Cartman</name> <name fname="tiger.svg">Tiger</name> <name fname="gcheck.svg">GCheck</name> <name fname="pencil.svg">Pencil</name> <name fname="python.svg">Python</name> <name fname="ietf.svg">IETF</name> <name fname="osgr_pie.svg">OSGR Pie</name> </names> </xf:instance> <xf:instance id="inlinesvg"> <svg xmlns='http://www.w3.org/2000/svg'/> </xf:instance> <xf:submission id="loadsvg" method="get" replace="instance" instance="inlinesvg" serialization="none" mode="synchronous"> <xf:resource value="concat('svg/',.)"/> </xf:submission> <xf:action ev:event="xforms-ready"> <xf:setvalue ref="." value="instance('names')/name[1]/@fname"/> <xf:send submission="loadsvg"/> </xf:action> </xf:model> </head> <body> <h1>SVG Browser</h1> <xf:select1 ref="." appearance="minimal" incremental="true"> <xf:label>Select SVG: </xf:label> <xf:itemset nodeset="instance('names')/name"> <xf:label ref="."/> <xf:value ref="@fname"/> </xf:itemset> <xf:send ev:event="xforms-value-changed" submission="loadsvg"/> </xf:select1> <xf:trigger> <xf:label>Next</xf:label> <xf:setvalue ev:event="DOMActivate" ref="." value="if( instance('names')/name[ preceding-sibling::name[1]/@fname = current() ], instance('names')/name[ preceding-sibling::name[1]/@fname = current() ]/@fname, instance('names')/name[1]/@fname)"/> </xf:trigger> <br/> <xf:output id="svgimg" value="xf:serialize(instance('inlinesvg'))" mediatype="image/svg+xml"/> </body> </html> ``` ## Credits This was created by Alain Couthures on the XSLTForms mailing list. A working copy can currently be found on the AgenceXML web site.
# XForms/FireFox Extension ## Motivation Your users all can run the FireFox browser on MS-Windows and you want very fast XForms loading. ## The Mozilla Firefox Plugin This plugin was developed over several years with the support of IBM and Novell. It is now obsolete and is no longer supported. The official version is available from addons.mozilla.org. Nightly and other (testing) builds are available at Philipp Wagner\'s Web Site ## References - Mozilla FireFox XForms page Note that this web page was last updated in April 14th, 2014. ## Discussion
# XForms/Picoforms ## Getting XForms to work with Picoforms Picoforms is commercial XForms client that is designed to work with mobile phones and IE 6.0 as a plugin. To get IE to see the forms you have to do the following: If your forms are stored in the server with an XHTML extension you must 1. Make sure that IE knows to render .XHTML files as html file types. This can be done by using the registry edit tool. 2. Add the following processing instruction for picoforms AFTER the html element ## IE 6.0 Registry MIME-Type Fix To change the IE registry to allow IE to know that .xhtml files should be rendered as html. To do this do the following. From the Windows start menu click Start/Run. Enter \"regedit\" and press enter. Use the Registry browser to navigate to the HKEY_CLASSES_ROOT folder and then find the MIME/Daatabase/Content Type folder. From their add the following: Binding for xhtml files: [HKEY_CLASSES_ROOT\MIME\Database\Content Type\application/xhtml+xml] "CLSID"="{25336920-03F9-11cf-8FD0-00AA00686F13}" "Extension"=".xhtml" "Encoding"=hex:08,00,00,00 Binding for xq files: [HKEY_CLASSES_ROOT\MIME\Database\Content Type\application/xhtml+xml] "CLSID"="{25336920-03F9-11cf-8FD0-00AA00686F13}" "Extension"=".xq" "Encoding"=hex:08,00,00,00 The CLSID above is for HTML rendering. You can copy this from the .htm MIME-type. If you want it to render in xml use the binding for XML files. ## Sample HTML Header ``` xml <html xmlns="http://www.w3.org/1999/xhtml" xmlns:xf="http://www.w3.org/2002/xforms" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:ev="http://www.w3.org/2001/xml-events" > <?import namespace="xf" implementation="#default#pxf"?> <head> ... ``` Note that if you are using eXist to generate your forms you need to put the PI inside braces and serialize as html. ``` xml declare option exist:serialize "method=html media-type=text/html indent=yes omit-xml-declaration=yes"; ... <html xmlns="http://www.w3.org/1999/xhtml" xmlns:xf="http://www.w3.org/2002/xforms" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:ev="http://www.w3.org/2001/xml-events" > {<?import namespace="xf" implementation="#default#pxf"?>} <head>... ``` Also, make sure if you make changes you should be sure to use SHIFT-reload to clear the IE cache. ## CSS Issues Note that IE6 does not recognize the \@namepsace directive in CSS files. These CSS files will need to be converted use **xf\\:** instead of the CSS **\|** standard. ## References Picoforms Web Site
# XForms/Best practice This cookbook identifies example programs that demonstrate best practices. An XForms Best Practice is a specific way of solving a general problem that has been selected from among posible solutions by various authors. There are a variety of reasons for best practices but in general best practices increase program modularity, maintainability and flexibility. The following logo will appear next to sample programs that constitute a best practice: ![](XForms-best-practice.jpg "XForms-best-practice.jpg"){width="50"}. These should also be some reason in each example why this solution is usually preferred by developers over other solutions as well as give some indication of why this may not be appropriate in some situations. Although a best practice is usually the preferred way of solving a given problem, it is not always the right choice for all circumstances. For example developers frequently put a style sheet in an external file but if you are doing training and want the example to contain the CSS file, there are good reasons to put the CSS file directly in the html header.
# XForms/Debugging Tips If you are a newcomer to XForms and you are having problems debugging XForms you are not alone. XForms debugging can be tricky especially for newcomers. If you follow the newsgroups on XForms you will see several problems come up frequently. ## Common Problems These problems, roughly sorted in terms of frequency include the following: 1. Make sure to name your files with the `<b>`{=html}`.xhtml``</b>`{=html} extension. Many browsers including FireFox do not look for XML tags in files with the .htm or .html extension. 2. Problems related to forgetting to associate instance data with a namespace or the default namespace. This can be fixed by adding the `xmlns=""` parameter to your instance variable 3. Incorrect or missing namespaces in the body of a document. For example, if the default namespace is html the tag `<input>`{=html} is valid but the browser will look at it as `<html:input>`{=html} not `<xf:input>`{=html}. This happens frequently when users copy XForms example code from places that use XForms as the default namespace. This is a good reason that tutorial and training developers should not use XForms as the default namespace. 4. Incorrect binding between the model and the view. This usually occurs because the \"ref\" or \"nodeset\" attributes are not correctly defined or that the group or repeat changes the path prefix of a data element. 5. Failure to bind to the form to the instance because the XForms processor cannot find one or more instance specific namespaces. If you have customised your XForm with an XSLT or an XQuery before streaming it to your user, the processor might relegated the declaration of some of your namespaces to the instance where they first occur because it treats the contents of the ref and bind attributes on your xform as just content. However, your XForms processor probably expects the definition of the namespaces in your ref attributes to be on the parent axis and may not look in the model instances for any declarations. When this happens you will need to manually construct the root xhtml:html node, explicitly declaring any namespaces that appear in your form. ## Using an XForms Validator Some people have found this XForms validator helpful: <http://xformsinstitute.com/validator> This program will find common errors in XForms examples. ## Using Eclipse to validate XPath There is a nice eclipse plugin for XSLT providing also an XPath validation \"view\". See: <http://wiki.eclipse.org/XSLT_Project> ## Debugging Tools for Firefox One of the most useful Firefox extensions is the XForms Buddy debugger. This tool allows you to visually inspect all of the instances in the model while the XForms are running in the Firefox browser. This is especially useful for ensuring that instance values that are dynamically configured are correctly set by the XForms. The link to the site is: here ## Printing your Bindings Using JavaScript There is also a way to visually view your binding from within your JavaScript code. These interfaces are documented here: nsIXFormsAccessors ## Mozilla Debugging Tips Here are some suggestions for people that are debugging XForms: Mozilla XForms Troubleshooting page ## Testing Submissions Sometimes when you are creating complex submissions to web services you need to make sure that what the XForms application is generating is exactly what the web service is expecting. Sometimes a web service vendor will provide a sample web forms client that correctly calls their service but the documentation on calling that service is somewhat lacking. One solution to this problem it to watch the HTTP packets leave the working application and compare them with the HTTP packets with your XForms. This can be done using an HTTP proxy tools such as Charles which also runs as a Firefox extension. The \"network\" tab of standard web development debuggers, like Firebug and Google Chrome Javascript Console can be used to watch incoming and outgoing network traffic to and from the browser, allowing you to verify that the content of submissions, their methods, and HTTP error codes are what would be expected. ## Using an HTTP Proxy With Firefox A Proxy is a tools that \"stands in\" for a web server. It puts itself in between your web browser and the server and tells you what the browser just sent to the web server. To do this you have to set your web browser to use the proxy (by telling it to forward everything to another IP address) and the proxy then forwards it to the service. When you are finished using the proxy, make sure you remember to disable the proxy by going to the Firefox Tools/Options/General/Connection Settings and click the Direction Connection to the Internet. If you do not your web browser will no longer function when Charles or Tamper Data shuts down. ## Debugging WebDAV and Subversion There are some XForms that are designed to use HTTP put, HTTP post and \[w:WebDAV:WebDAV\]. The WebDAV allows you to store not just the first version of a form but go back and see prior versions. Subversion FAQ 1 suggests you run the Wireshark packet sniffer and look at the data in the HTTP messages. ## Verifiying that a file is well-formed To verify that a data file is well formed, you can use the RUWF (Are you well-formed)? The XML Syntax Checker ## Setting Mime-type in Internet Explorer Version 6.0 Some versions of IE 6.0 do not have the correct mime-type set for IE6. TO fix this you must add an entry to the Microsoft Windows Registry: Open the Command Shell Enter the command \"regedit\" [HKEY_CLASSES_ROOT\MIME\Database\Content Type\application/xhtml+xml] "CLSID"="{25336920-03F9-11cf-8FD0-00AA00686F13}" "Encoding"=hex:08,00,00,00 "Extension"=".xhtml" ## Discussion
# Latin/How to study a language on the Internet and in your head How do you think about languages as you study them? Typically, you will consider every punctuation mark and letter, all the verbs and nouns, adverbs and adjectives, and study them in order to make connections. Ideally, you will have a teacher to point you in the right direction, and help you make those connections. But when you have no teacher, those connections are left for you to discover. They may be clear or hidden, but either way you will have to make them yourself. As you explore this Wikibook, it will require the skill of critical thinking. You can never go wrong studying a language if you remember that exposing yourself to a language, even if you stumble in practice, is itself learning it. Looking things up too much can sometimes impede progress. Stretch your memory, read slowly, and re-read. As you will soon discover, you are about to study a language that is rich and full of meaning, the ancestor of the Romance languages, such as Spanish, French, Portuguese, Italian, and Romanian, and an outsized influence on many other languages besides, including English. ## So do not assume that\... \...Latin is like any other language. Do not assume ancient Roman culture is entirely unlike other cultures, however. The Romans grappled with issues that are universally dealt with. We, the authors, endorse memorization, and after that, immersion. You must develop Latin muscles, and a willingness to write or type things out, or drill using software, or with a friend. Note the patterns after you have memorized the forms, not before. Allow yourself to be mesmerized by them. Similarly, seek out explanation only after you have memorized forms. Memorize forms, then make sentences, then use your knowledge to speak or to write the language. ## See also - How to learn a language
# Latin/Special consideration: How to use a Wikibook when progress may mean inaccuracy The current rule for dealing with inaccuracy in this book is: if you are skilled enough then simply delete or fix what you don\'t understand or you think is wrong (but then add a full description before committing your changes) else try to note your level of schooling and your country of origin writing (in the summary box) about what confused you . Also try to use the \"revert?\" keyword near the confusing text. In other words, do not tolerate inaccuracy!
# Latin/Chapter 1 Verse # Latin I prose +------------------------------------------------------------+ | `<b>`{=html}Lesson Vocabulary`</b>`{=html} | +============================================================+ | | +------------------------------------------------------------+ | `<font face="Arial" size="4">`{=html}Latin`</font>`{=html} | +------------------------------------------------------------+ | | +------------------------------------------------------------+ | **fulgeo, -ere** | +------------------------------------------------------------+ | **aperio, -ire** | +------------------------------------------------------------+ | **dormio, -ire** | +------------------------------------------------------------+ | **habeo, -ere** | +------------------------------------------------------------+ | **semper** | +------------------------------------------------------------+ | **tempto, -are** | +------------------------------------------------------------+ | **dico, -ere** | +------------------------------------------------------------+ | **femina** | +------------------------------------------------------------+ | **facio, -ere** | +------------------------------------------------------------+ | **ecce!** | +------------------------------------------------------------+ | **velle:**\ | | volo\ | | vis\ | | vult\ | | volumus\ | | vultis\ | | volunt | +------------------------------------------------------------+ | **turba** | +------------------------------------------------------------+ | **attonitus** | +------------------------------------------------------------+ | **tantus, -a, -um** | +------------------------------------------------------------+ | **susurro, -are** | +------------------------------------------------------------+ | **patefacio, -ere** | +------------------------------------------------------------+ | **rideo, -ere** | +------------------------------------------------------------+ The following is a nice easy short story for the Latin novice: ------------------------------------------------------------------------ ### Lucius ad forum it Sol fulget. Lucius oculos aperit. Videt uxorem suam, Octaviam. Octavia dormit. Ergo, Lucius ad forum it. Lucius multos amicos habet. Unus ex amicis Claudius est. Claudius semper in foro est. Claudius temptat dicere cum feminis, quod Claudius multas feminas amat. Multae feminae, tamen, Claudium non amant. Lucius ad forum ambulat. Multos Romanos videt. Unus Romanorum ad cives orationem facit. Est Claudius! \"Ecce! Ecce!\" dicit Lucius. Lucius vult dicere cum amico. Claudius, tamen, dicit ad turbam. \"Amicus meus, Lucius\" dicit, \"hominem necavit.\"^A^ Lucius anxius respondet, \"Quid dicis, amice?\" Claudius est attonitus. Dicit, \"Te non video, mi Luci\...\" Lucius respondet, \"hominem non necavi! Cur tanta dicis?\" Claudius susurrat, \"Volo videri^B^ fortissimus, amice. Feminae te amant. Me dolent^C^.\" Lucius omnia^D^ turbae^E^ patefacit. Multae feminae ad Claudium misserimum rident. Mox, etiam Claudius ad se ridet. ------------------------------------------------------------------------ - ^A^ *Necavit* is the perfect form of *necare*, meaning \"he killed.\" For more, check out the next chapter. ```{=html} <!-- --> ``` - ^B^ *Videri* means \"to appear,\" (or more literally, \"to be seen\") and is the passive infinitive of *video*. There is more on that in chapters 2-4. - ^C^ *Me dolet* means \"makes me suffer\". - ^D^ *Omnia* means \"everything\". - ^E^ *turbae* is the dative case of \"turba\", meaning \"to the crowd\".
# Latin/Lesson 4-Ablative ## The Ablative Case The ablative case in Latin has 9 main uses: 1. With certain prepositions, eg. in, cum, sub, ab 2. Instrumental ablative, expressing the equivalent of English \"by\", \"with\" or \"using\" 3. Ablative of manner, expressing `<b>`{=html}how`</b>`{=html} an action is done, only when an adjective is used alongside it. _Example_: `<i>`{=html}Magnā cūrā id scrīpsit: he wrote it with great care.`</i>`{=html} 4. Ablative of time `<b>`{=html}when`</b>`{=html} or `<b>`{=html}within which`</b>`{=html}. _note:_ not to be mistaken with the `<i>`{=html}accusative`</i>`{=html} of time which indicates `<b>`{=html}for how long a period of time`</b>`{=html} an action occurs. 5. Locative Ablative, using the ablative by itself to mean \"in\", locating an action in space or time 6. Ablative of separation or origin, expressing the equivalent of English \"from\" 7. Ablative of comparison; when the first element to be compared was in the nominative or accusative case, `<i>`{=html}quam`</i>`{=html} was often omitted and the second element followed in the ablative case. 8. Ablative with special deponents, which is technically the `<i>`{=html}instrumental ablative`</i>`{=html} but is used idiomatically with a few deponent verbs, such as ūtor, fruor, fungor, potior, vēscor 9. Ablative Absolute, which is a type of participial phrase generally consisting of a noun (or pronoun) and a modifying participle in the ablative case; usually set off by commas, the phrase describes some general circumstances under which the action of the sentence occurs. The different uses of the ablative will be dealt progressively. For a summary of all forms of the ablative, please consult the Appendix. ## Grammar Part 5: The Power of the Ablative Case Ablative generally indicates position in time and/or space (i.e. when and where). It can also indicate the idea of ways of getting to a location, abstractly or concretely. ### Ablative of Means #### Exercise How would you translate \"I made the toga by hand\"? - ***Hint:** You would not (and should not) use the genitive. The case you are studying right now can be used _by itself_ for this goal.* - ***Hint:** Remember that you won\'t need to use the pronoun \"I,\" since Latin is based not on word order, but on the endings!* - ***Glossary:*** : \"to make\" - *Facio* (\"I make\"), *facere* (\"to make\"), *feci* (\"I made\"), *factus* (\"made\") : \"toga\" - *Toga*, *togae* feminine : \"hand\" - *Manus*, *manus* feminine (This is fourth declension) ##### Answer Answer: *Togam manu feci*. In this case, the word \"manu\" is in the ablative (see fourth declension list) and thus means \"by hand.\" #### Exercise I have my wisdom by means of my teacher. - **\'Glossary**:\'\' : \"wisdom\" - *Sapientia, sapientiae* feminine : \"to have\" - *Habeo* (\"I have\"), *habere* (\"to have\"), *habui* (\"I had\"), *habitus* (\"had\") : \"teacher\" - *Magister, magistri* masculine (This is a second declension word, despite the \'r\' at the end, like puer.) ##### Answer Answer: *Habeo sapientiam magistro.* ### Ablative of Time How would you say: *I will arrive at the 5th hour.* \'at the 5th hour\' is indicating position of time. Thus, it can be put into the ablative case, giving: `<i>`{=html}adveniam quinta hora`</i>`{=html} In general, therefore, in order to say \"In the morning\", \"At nine O\'clock,\" or \"In the tenth year,\" use ablative. It is generally used to refer to a specific time in which something has, does, or will occur. Example: I will leave in the night. Hint: Future tense can be looked up in the appendices of this Wikibook! Hint: to leave- discedo, discedere; night- nox, noctis(This is a third declension word!) ##### Answer Answer: Discedam nocte. Note the simplicity in which Latin translates the six words into simply two. The ending based language completely negates the need for the words \"I,\" \"will,\" \"in,\" and \"the.\" ### Ablative of Place *Naves navigabant mari.* The ships were sailing on the sea. The ablative is also useful for showing the location of things, in general where you would use the words on, in, or at. There is an exception for the slightly more archaic locative, which is used with the words *domi* (from *domus, domus, f.*, home), *ruri* (from *rus, ruris, n.*, country \[as opposed to city\]), and *Romae* (from *Roma, Romae, f.*, Rome), as well as with the names of towns, cities and small islands. Latin has its own way of handling prepositions depending on the nouns and their cases in the sentence, including the versatile *in*, which can take many different meanings depending upon the case of the object. ## Ablative with prepositions Here are a few prepositions that can take the ablative (for a fuller list, see the lesson on adverbs and prepositions in the previous chapter): -------------------------------- ---------------------------------- `<B>`{=html}Latin`</B>`{=html} `<B>`{=html}English`</B>`{=html} *in*[^1] in, on *a/ab* from *de* down from, concerning *e/ex* out of, out from *cum* with *sine* without *pro* on behalf of, in front of *super*[^2] upon, above, beyond *sub*[^3] under, beneath -------------------------------- ---------------------------------- ```{=html} <references/> ``` As a general rule, when motion is implied, use the accusative instead. ### Example 3 *Servus ex agris venit.* : \"The slave came from the fields.\" Note: *Ager* (*ager, agri, m.*, field) must take an ablative suffix to match the preceding preposition, in this case *e*/*ex*. Incidentally, both *ager* and *campus* mean \"field,\" but *ager*, like its English derivative \"agriculture\", connotes a farming field, while *campus* (think \"camping\" or \"college campus\") means \"open field.\" The *Campus Martius* was a large field in Rome used for military training. ## The Vocative Case While you will rarely need to ask Lupus where the bathroom is in Latin, you may find yourself reading either quotes or letters in which a person is being directly addressed. The case it will be in is the vocative. For example, \"Hail, Augustus\" will appear in Latin as Ave Auguste, and not Ave Augustus. Each declension has its own form of the vocative singular and plural. They are listed in the table below. Furthermore, in all but the second declension, the nominative and vocative are exactly the same! ------------ ------- ------------------------ ------- -------- ------- Number First Second\* Third Fourth Fifth Singular a us-\>e, ius-\>i, r-\>r \-- us es Plural\*\* ae i es us es ------------ ------- ------------------------ ------- -------- ------- - In the second declension singular, there are three separate possibilities for the vocative, depending on its nominative ending. Hence, if it is a us word, it will become an e and so forth. #### Examples for different declensions in the second declension - **-us:** : Lupus -\>Lupe (given name, wolf) - **-ius:** : Filius -\> Fili (son) : Horatius-\> Horati (given name) - **-r:** : Puer-\> Puer (boy) : *In all cases, the plural vocative is exactly the same as the plural nominative. This extends to those words which are neuter, which always have an \'a\' for the nominative and vocative.* #### Examples 1. Hello, Sextus.(Hello= *Salve*)\* : Salve, Sext**e**. 2. Speak, girl! (Speak= *dico, dicere, dixi*)\* : Dic, puell**a**. 3. Knee, run!\*(Knee= *genu*; run= *curro, currere, cucurri*)\* : Gen**u**, curre! 4. Oh, heart, why do you lead me? (Oh-o; heart- cor, cordis-f.; lead-duco, ducere; : O, cor! Cur ducis tu me? - Note that the first three also require use of the imperative. The imperative is used when ordering or telling someone what to do, e.g.- \"Stop,\" or \"Get away from me.\" The basic form of the imperative is created by dropping the \"re\" off of the infinitive form of the verb, as in: Amare, which becomes Ama; at least in the singular active form, which is all that these exercises require. More can be found about this subject in the chapter on verbs. [^1]: Means \"into\" or \"against\" when used with the accusative [^2]: Has static meaning when used with the ablative but connotes motion when used with the accusative [^3]: Usually means \"up to\" or \"up to the foot of\" when used with the accusative
# Latin/Lesson 5-Declensions ## 3rd, 4th, and 5th Declension Nouns We have already seen the first two declensions: ------------ ---------------------- ---------------------- **1^st^ declension** **2^nd^ declension** **-a** **-us** **-um (neuter)** *SINGULAR* *PLURAL* *SINGULAR* nominative puell**-a** puell**-ae** accusative puell**-am** puell**-ās** genitive puell**-ae** puell**-ārum** dative puell**-ae** puell**-īs** ablative puell**-ā** puell**-īs** ------------ ---------------------- ---------------------- ------------------------------------------------------------------------ We will now complete the table of nouns with the 3rd, 4th, and 5th declensions. These declensions are more difficult to work with because their nominative and accusative plural forms are identical, as are their dative and ablative plural forms. To distinguish the cases, you must use a very simple key: context. Context will tell you the meaning. ### 3rd Declension Nouns 3rd declension nouns have two stems : The nominative and vocative singular stem and the stem used for all other cases. Both stems have to be memorized for each noun. Feminine and masculine forms are indistinguishable. #### 3rd Declension Masculine or Feminine, no *i*-stem: (each word has a set gender): *rēx*, m. 3rd Declension Singular Plural ---------------- ---------- ------------ nominative *rēx* *rēg-ēs* accusative *rēg-em* *rēg-ēs* genitive *rēg-is* *rēg-um* dative *rēg-ī* *rēg-ibus* ablative *rēg-e* *rēg-ibus* #### 3rd Declension Neuter, no *i*-stem: *litus* 3rd Declension Neuter Singular Plural --------------------------------------- ------------ -------------- `<I>`{=html}nominative\*`</I>`{=html} *litus* *litor-a* accusative *litus* *litor-a* genitive *litor-is* *litor-um* dative *litor-ī* *litor-ibus* ablative *litor-ī* *litor-ibus* #### 3rd Declension Masculine or Feminine, 2-consonant base *i*-stem: (each word has a set gender): *ars, artis*, f. *i*-stem nouns differ from other 3rd declension nouns in that some of the forms have endings changed to include *i*s. There are two main kinds of masculine/feminine *i*-stem nouns. The first kind has its usual stem end in two consonants; the example here, for instance, has its base *art-* end in *-rt-*. The last consonant of the nominative singular form always ends in either *-s* or *-x*. 3rd Declension Singular Plural ---------------- ---------- ------------ nominative *ars* *art-ēs* accusative *art-em* *art-ēs* genitive *art-is* *art-ium* dative *art-ī* *art-ibus* ablative *art-e* *art-ibus* #### 3rd Declension Masculine or Feminine, parisyllabic *i*-stem: (each word has a set gender): *nūbēs*, f. The other kind of masculine/feminine *i*-stem noun has the property that its nominative and genitive singular forms have the same number of syllables. They are therefore called parisyllabic. All nouns of this form have their nominative singular form end in either *-ēs* or *-is*. 3rd Declension Singular Plural ---------------- ---------- ------------ nominative *nūbēs* *nūb-ēs* genetive *nūb-is* *nūb-ium* dative *nūb-es* *nūb-es* accusative *nūb-ī* *nūb-ibus* ablative *nūb-e* *nūb-ibus* #### 3rd Declension Neuter *i*-stem: *mare* Neuter *i*-stem nouns have their nominative singular forms end with *-al*, *-ar*, or *-e*. 3rd Declension Neuter Singular Plural --------------------------------------- ---------- ------------ `<I>`{=html}nominative\*`</I>`{=html} *mare* *mar-ia* accusative *mare* *mar-ia* genitive *mar-is* *mar-ium* dative *mar-ī* *mar-ibus* ablative *mar-ī* *mar-ibus* #### List of common 3rd declension stem change patterns Singular Nominative Main stem Main gender Examples --------------------- ----------- ------------- ------------------------ -is -is masc/fem canis, navis, hostis -s -is masc/fem urbs, rex\*, matrix\* -s -tis masc/fem nox\*, mons, pons -o -onis masc/fem legio, auditio, statio -en -inis neuter carmen, flumen, examen -or -oris masc/fem amor, timor -us -oris neuter litus, corpus -us -eris neuter genus, vulnus - regs and matrics, respectively, but the gs and cs both compound into x. The c and g stay in the other cases, hence regis and matricis as their genitives. Nox (gen. noctis) works similarly. ### 4th Declension Nouns #### 4th Declension Masculine/Feminine (each word has a set gender) *gradus*, m. `<B>`{=html}4th Declension`</B>`{=html} Singular Plural ----------------------------------------- ----------- ------------- nominative *grad-us* *grad-ūs* accusative *grad-um* *grad-ūs* genitive *grad-ūs* *grad-uum* dative *grad-uī* *grad-ibus* ablative *grad-ū* *grad-ibus* #### 4th Declension Neuter: *cornū* 4th Declension Neuter Singular Plural ----------------------- ----------- ------------- nominative *corn-ū* *corn-ua* vocative *corn-ū* *corn-ua* accusative *corn-ū* *corn-ua* genitive *corn-ūs* *corn-uum* dative *corn-ū* *corn-ibus* ablative *corn-ū* *corn-ibus* ### 5th Declension Nouns The 5th declension has no neuter nouns. The masculine and feminine forms are again indistinguishable. #### 5th Declension Masculine/Feminine (each word has a set gender; most are feminine): *rēs*, f. 5th Declension Feminine/Masculine Singular Plural ----------------------------------- ---------- ---------- nominative *r-ēs* *r-ēs* vocative *r-ēs* *r-ēs* accusative *r-ēm* *r-ēs* genitive *r-ēī* *r-ērum* dative *r-ēī* *r-ēbus* ablative *r-ē* *r-ēbus* ## Exercises ### Exercise 1 ------------------------------------------------------------ `<font face="Arial" size="2">`{=html}Latin`</font>`{=html} **villa, -ae** **mittō, -ere, mīsī, missum** **nomen, nominis** **maledicō, -dicere, -dīxī, -dictum** **placeō, -ere, placui, placitum + dat** **quā rē** **iste, ista, istud** **interficiō, -ficere, -fēci, -fectum** **volō, velle, voluī** **mandō, mandere, mansī, mansum** ------------------------------------------------------------ ### Exercise 2
# Latin/Lesson 6-Irregular Verbs ## Irregular Verbs Irregular verbs do not fit in any particular conjugation. Irregular verbs conjugate but not in a predictable manner. An example of an irregular verb that you have met is \'esse\'. There are a few others which will be listed in the present indicate active tense below for you to memorise and refer to. <table> <tbody> <tr class="odd"> <td><p>Verb</p></td> <td><p>Meaning</p></td> <td><p>ego</p></td> <td><p>tu</p></td> <td><p>is/ea</p></td> <td><p>nos</p></td> <td><p>vos</p></td> <td><p>ei/eae</p></td> <td><p>Imperative sing.</p></td> <td><p>Imp. pl</p></td> </tr> <tr class="even"> <td><p>ire</p></td> <td><p>to go</p></td> <td><p>eo</p></td> <td><p>is</p></td> <td><p>it</p></td> <td><p>imus</p></td> <td><p>itis</p></td> <td><p>eunt</p></td> <td><p>i</p></td> <td><p>ite</p></td> </tr> <tr class="odd"> <td><p>esse</p></td> <td><p>to be</p></td> <td><p>sum</p></td> <td><p>es</p></td> <td><p>est</p></td> <td><p>sumus</p></td> <td><p>estis</p></td> <td><p>sunt</p></td> <td><p>es</p></td> <td><p>este</p></td> </tr> <tr class="even"> <td><p>fieri</p></td> <td><p>to become</p></td> <td><p>fio</p></td> <td><p>fis</p></td> <td><p>fit</p></td> <td><p>fimus</p></td> <td><p>fitis</p></td> <td><p>fiunt</p></td> <td><p>fi</p></td> <td><p>fite</p></td> </tr> <tr class="odd"> <td><p>velle</p></td> <td><p>to wish</p></td> <td><p>volo</p></td> <td><p>vis</p></td> <td><p>vult</p></td> <td><p>volumus</p></td> <td><p>vultis</p></td> <td><p>volunt</p></td> <td><p>(none)</p></td> <td><p>(none)</p></td> </tr> <tr class="even"> <td><p>malle</p></td> <td><p>to prefer</p></td> <td><p>malo</p></td> <td><p>mavis</p></td> <td><p>mavult</p></td> <td><p>malumus</p></td> <td><p>mavultis</p></td> <td><p>malunt</p></td> <td><p>(none)</p></td> <td><p>(none)</p></td> </tr> <tr class="odd"> <td><p>nolle</p></td> <td><p>to be unwilling</p></td> <td><p>nolo</p></td> <td><p>non vis</p></td> <td><p>non vult</p></td> <td><p>nolumus</p></td> <td><p>non vultis</p></td> <td><p>nolunt</p></td> <td><p>noli*</p></td> <td><p>nolite</p></td> </tr> <tr class="even"> <td><p>ferre*</p></td> <td><p>to carry</p></td> <td><p>fero</p></td> <td><p>fers</p></td> <td><p>fert</p></td> <td><p>ferimus</p></td> <td><p>fertis</p></td> <td><p>ferunt</p></td> <td><p>fer</p></td> <td><p>ferte</p></td> </tr> <tr class="odd"> <td><p><I>The imperatives noli and nolite are used to mean "don't", eg. "nolite ire" = "don't go!"</I><br /> <I>Sometimes ferre is considered to be an 'o' stem 3rd conjugation verb. For practical purposes ferre is irregular.</I></p></td> <td></td> <td></td> <td></td> <td></td> <td></td> <td></td> <td></td> <td></td> <td></td> </tr> </tbody> </table> ## Exercise 1 ## Exercise 2 1\. Decline the following five nouns in both singular and plural number in the five common cases (nominative, accusative, genitive, dative, ablative): ----------------------------------- `<B>`{=html}Singular`</B>`{=html} Nominative Accusative Genitive Dative Ablative `<B>`{=html}Plural`</B>`{=html} Nominative Accusative Genitive Dative Ablative ----------------------------------- 2\. Conjugate the verb \'servāre\' in both singular and plural number and all three persons. 3\. Conjugate the verb \'esse\', in both singular and plural number and all three persons. 4\. Translate: Nota Bene: Often Latin uses the present to indicate a \'vivid past\'. It would be suitable to translate the following passage in the past tense. ---------------------------------------------------------------------------------- `<span style="font-family:Arial; font-size:small;">`{=html}Latin`</span>`{=html} **heri** **taberna, -ae** **solea, -ae** **sic** **solus, -a, -um** **casa, -ae** **sto, stare, steti, statum** ---------------------------------------------------------------------------------- Heri, ad tabernam eō. In tabernā sunt trēs rēs quārum amō duas sōleās et unam mensam. Habeō trēs denariōs, sīc ego emeō mensam sōlum quod sum nōn dīvīnitās. Hodiē, mensa est in casā meā. In triclīnio stat.
# Latin/Lesson 8-Imperfect and Future # Imperfect and Future constructs Warning: Beyond the imperfect, this page is not entirely clear. Do not use it beyond the basic imperfect if you are a first time Latin student. See discussion for my thoughts on this. ## Imperfect Active Indicative The imperfect is a construct like: : **I was seeing.** In Latin it would look like this: : **Vidēbam.** English has a similar construct called progressive past. Actions seem incomplete, and so the imperfect label. For example, \"I was running,\" \"We were sailing,\" \"They were calling.\" Note that \'to be\' is always there. Latin, however, would sometimes use imperfect like simple past; accordingly, \"We were sailing\" could be translated as \"We sailed.\" Other translations of imperfect can be used to/kept such as \"We used to sail/We kept sailing.\" Regardless of language, the concept of an imperfect is important. Imperfect is called imperfect for a reason - in Latin, the verb \"perficere\" means to finish/complete, which is what perfect is from. Thus, imperfect, in the grammatical sense, means not finished - that the action could be or could not be completed. Perfect instead means it has been finished - I saw. You have already seen, and it is now completed. I was seeing implies that the action is not yet completed. The perfect tense, which we will learn later, is a more immediate reference to the past. The name, imperfect, helps you remember its use: in situations where you can\'t say when an event started or ended or happened, you must use the imperfect. In situations where you can know when an event started or ended or happened, use the perfect. You conjugate the imperfect tense this way: verb + -bā- + personal ending The endings for imperfect are: Sg. 1. **-bam** 2. **-bās** 3. **-bat** Pl. 1. **-bāmus** 2. **-bātis** 3. **-bant** Note that the only thing we add are ba + the personal endings (the same as in the present tense) to the infinitive stem. This gives us the imperfect conjugation. Note that in third and fourth conjugations, you will have to form it differently. There is \*no\* rule to explain this, it just is, although there are memorization techniques that can help. ven`<U>`{=html}i`</U>`{=html}re is 4th conjugation and is formed like: : veniēbam : veniēbās : veniēbat : veniēbāmus : veniēbātis : veniēbant For third conjugation -iō stem verbs, the imperfect is like so: capere (to capture or seize) : capiēbam : capiēbās : capiēbat : capiēbāmus : capiēbātis : capiēbant Note that it is easiest to think of what the endings -ere and `<U>`{=html}i`</U>`{=html}re lack. The imperfect -bā- + the personal ending, which we can call the imperfect conjugation, must be prefixed by -iē-. A few examples: : **amābam** - **I was loving** (A-conjugation\--1st) : **monēbātis** - **You were warning \[object/personage\]** (of something negative) (Pl.) (2nd Conjugation) : **vincēbāmus** - *\'We were defeating* (3rd conjugation) : **capiēbant** - **They were catching** (short I-conjugation\--3rd conjugation) : **pellēbat** - **She/he/it was propelling** (drive something (not a vehicle), propel something) (consonantic conjugation) (Wiki-reading tips: See discussion. Some of the above may be unclear, however the clarifying \'\--\' and \'/\' indicate verification. We may not know what the original author intended, but we know what conjugations the examples are.) ## Future I, Active Future active is a tense which, unsurprisingly, refers to something which has not yet happened. The endings are fairly basic, and follow fairly regular rules - however, the future endings used in 1st and 2nd conjugation differ from the endings of 3rd, 3rd-iō, and 4th. For example - \"amō, amāre\" (1st conjugation) would be : Amābō - I will love : Amābis - You will love : Amābit - He/She/It will love : Amaābimus - We will love : Amābitis - Y\'all will love : Amābunt - They will love NOTE: 1st person singular and 3rd person plural use -bō and -bunt, not -bi-. NOTE: the B and the BIs - the distinguishing feature of future tense in Latin. With \"veniō, venīre\" (4th conjugation), however, the endings are different. In future, this is what they look like: : Veniam - I will come : Veniēs - You will come : Veniet - He/She/It will come : Veniēmus - We will come : Veniētis - Y\'all will come : Venient - They will come \[deleted paragraphs go here. deleted to maintain rigorous accuracy, which we will go back to striving for.) To clarify: ven`<U>`{=html}ī`</U>`{=html}re, veniō.. we know it is 4th conjugation verb and if we look at its first person singular conjugation, we see that it is an -iō verb, because the conjugation of the first person singular is \"ven**i**o\". (an io category exists within 3rd and fourth conjugations and is a more general concept which we will briefly introduce here by using venire, venio as an example). Let\'s first identify what we know. We know it is 4th conjugation -io because it ends in `<U>`{=html}ī`</U>`{=html}re, which tells us that it is 4th conjugation, and io because its first person singular ends in io (venio). Because it is -iō, we leave the -i- in. So, when we are asked (as all textbooks should phrase these `<B>`{=html}new`</B>`{=html} questions): **What are the steps to form the future 2nd person conjugation?** We say: 1. It is better to know more than you need: check the infinitive nominative singular, we now know that it is 4th conjugation io. 2. We now know that we can form the stem: the stem is veni and can then add a personal ending\--leaving in the i. We leave in the i because it is io. Because it looks weird, we never leave the i in the future perfect. What is the form for venīre, in the future tense, in the 2nd person? The answer is veniēs. ## Future conjugation Example: **I will love**: : **amā*b*ō** The table at the end of this page tries to summarize the future tense, with both sets of personal endings. As the warning notes, this summary may confu panda As an aid to your understanding, this table only applies to the future tense. Do not assume the table is displaying a pattern that is somehow applicable to all of Latin. (Wiki-reading-tip: This is why they are in the future section, and were not discussed before.) The A- and the E- conjugation are (relatively) straight-forward. The others are more advanced, and as the warning notes, could confuse a first-time student. Commercial textbooks probably explain it better at this point, although laying their explanation in a table like the one below is well-advised. Leave items marked with a ? in until issues are resolved. Take a look at the following table: ----------------- ------------------ ---------------------------------- --------------- ----------------- **A** **E** \'\'\'long I (vincere/3rd conj.) **short I** **Consonantic** amā-**b**o monē-**b**o vinc-**a**m capi-**a**m pell-**a**m ama-**b***i*s mone-**b***i*s vinc-**e**s capi-**e**s pell-**e**s ama-**b***i*t mone-**b***i*t vinc-**e**t capi-**e**t pell-**e**t ama-**b***i*mus mone-**b***i*mus vinc-**e**mus capi-**e**mus pell-**e**mus ama-**b***i*tis mone-**b***i*tis vinc-**e**tis capi-**e**tis pell-**e**tis ama-**b***u*nt mone-**b***u*nt vinc-**e**nt capi-**e**nt pell-**e**nt ----------------- ------------------ ---------------------------------- --------------- ----------------- The vocabulary mostly consists of verbs, and can easily be looked up in a dictionary. We will give a limited translation below, and the rest, for those who are particularly adept at language learning, can be learned through immersion. : capere (3rd conjugation\--short ere): to seize, metaphorically or literally \[see dictionary for full explanation\] : amare (first conjugation -are): to love ## Exercises
# Latin/Chapter 2 Verse ## Using a Dictionary Foremost, Latin verbs are listed using the **present indicative first person singular active** construct of the verb. For example, to find the meaning of the verb *amāre*, you must find *amō* listed in the dictionary. Some verbs like *esse* and *ferre* are highly irregular and use different stems to form the perfect tenses. Nouns are usually much easier. They are always given in the nominative singular. If you see a noun such as *vōcem* and do not know what it is, do not fret. If you look for *voc-* in the dictionary, you will not find what you are looking for. The ending *-em* typically belongs to the third-declension accusative; thus, be aware that third-declension nouns have radically changing stems. Those that have the consonant *c* or *g* usually have the consonant *x* in the nominative singular. Thus the nominative singular of *vōcem* is *vōx*, and *rēx* becomes *rēgem* in the accusative singular. There are plenty of other simple rules which you will learn through experience. Words that do not conjugate or decline (like prepositions and particles) are listed under their only form. ## Exercise 1 ### Vocabulary 1. *affectus, -ūs, m.*, goodwill 2. *confessiō, -ōnis, f.*, confession 3. *dē*, from, about, concerning 4. *liber, librī, m.*, book 5. *malus -a -um*, evil, bad 6. *placeō -ēre* + dative, to please (*placuīsse* is a perfect infinitive) 7. *filia, -ae f.*, daughter 8. *puella, -ae f.*, girl ### Other Difficulties 1. *quod ad mē attinet*, as far as I\'m concerned 2. *cum scriberentur*, when they were written (imperfect passive subjuntive) 3. *quid sentiant*, what they think (present subjunctive in indirect question) 4. *ipsī viderint*, (loosely) they will see in their own way (future perfect) 5. *eōs placēre sciō*, accusative-infinitive construction for indirect statement: \"I know they \[the books\] please\" ### Passage
# Latin/Lesson 2-Active v Passive A verb\'s voice shows the relationship between the subject and the action expressed by the verb. Latin has two voices: active and passive. In the active voice, the subject of the clause performs the verb on something else (the object), e.g., \"The girl sees the boy.\" In the passive voice, the subject of the sentence receives the action of the verb, e.g., \"The boy is seen by the girl.\" The personal endings in the active voice are: **-ō**/**-m**, **-s**, **-t**, **-mus**, **-tis**, **-nt**. The personal endings in the passive voice (present, imperfect, future) are: **-r**, **-ris**, **-tur**, **-mur**, **-mini**, **-ntur**. Singular Plural ----- ---------- -------- 1st -ō/-m -mus 2nd -s -tis 3rd -t -nt : Personal Active Singular Plural ----- ---------- -------- 1st -r -mur 2nd -ris -mini 3rd -tur -ntur : Personal Passive In the perfect, pluperfect and future perfect, the passive voice is formed by the fourth principal part plus the proper forms of **sum, esse**. For the perfect tense, use the present forms of **esse**, for the pluperfect use the imperfect forms of **esse**, and for the future perfect use the future forms of **esse**. The fourth principal part, when used in a passive construction, acts as a first-second declension adjective and is declined accordingly. As stated before, when the passive voice is used, the subject receives the action of the verb from another agent. This agent, when it is a person, is expressed by the preposition **ā**/**ab** plus the ablative case. This construction is called the *ablative of personal agent*. The *ablative of cause* is used without a preposition when the agent is not a person. ## Examples: - Active: *Puella puerum videt.* (The girl sees the boy.) :\*Passive: *Puer ā puellā vidētur.* (The boy is seen by the girl.) : *Puella* takes *ā* and the ablative, as it is a personal agent. - Active: *Timor virum capit.* (Fear seizes the man.) :\*Passive: *Vir timore capitur.* (The man is seized by fear.) : *Timore* is ablative of cause. - Active: *Hostēs urbem oppugnābant.* (The enemies were attacking the city.) :\*Passive: *Urbs ab hostibus oppūgnābātur.* (The city was being attacked by the enemies.) ## Deponent verbs Some verbs are always passive in form, even though they have an active meaning. For example: - filius agricolam `<b>`{=html}sequitur`</b>`{=html} - The son follows the farmer - sol `<b>`{=html}ortus est`</b>`{=html} - The sun has risen - agricolae hostes `<b>`{=html}verentur`</b>`{=html} - The farmers fear the enemies - gladio `<b>`{=html}usus sum`</b>`{=html} - I used a sword Some, called semi-deponent verbs, take on a passive form on only in the perfect. For example: - colono `<b>`{=html}confido`</b>`{=html} - I trust the farmer - colono `<b>`{=html}confisus sum`</b>`{=html} - I trusted the farmer Note that some deponent and semi-deponent verbs take the accusative case (eg. vereor, vereri, veritus sum = I fear), some the ablative (eg. utor, uti, usus sum = I use) and some the dative (eg. confido, confidere, confisus sum = I trust). When you first encounter such a verb in Latin, be sure to remember the case of the object the verb is taking along with its spelling and meaning.
# Latin/Lesson 7-Future and Past Perfect ## Future perfect The future perfect tense is used for an action that will have been completed in the future by the time something else has happened. English example: \"I **will have seen** the movie by the time it comes out.\" To form the future perfect, take the perfect stem and add the future perfect endings: ```{=html} <table border="1" cellpadding="5"> ``` ```{=html} <tr> ``` ```{=html} <td> ``` *-erō* ```{=html} </td> ``` ```{=html} <td> ``` *-erimus* ```{=html} </td> ``` ```{=html} </tr> ``` ```{=html} <tr> ``` ```{=html} <td> ``` *-eris* ```{=html} </td> ``` ```{=html} <td> ``` *-eritis* ```{=html} </td> ``` ```{=html} </tr> ``` ```{=html} <tr> ``` ```{=html} <td> ``` *-erit* ```{=html} </td> ``` ```{=html} <td> ``` *-erint* ```{=html} </td> ``` ```{=html} </tr> ``` ```{=html} </table> ``` Note the similarities to the future tense of *sum*, except for the third person plural ending *-erint*[^1] in place of *-erunt*, which serves as the perfect ending instead. Hence: **amāverō**, I will have loved; **vīderitis**, you (pl.) will have seen ```{=html} <references/> ``` ## Pluperfect The pluperfect tense is used to describe something in the past that happened before another event in the past. English example: \"I **had graduated** by the time I applied for a job.\" To form the pluperfect, take the perfect stem and add the pluperfect endings: ```{=html} <table border="1" cellpadding="5"> ``` ```{=html} <tr> ``` ```{=html} <td> ``` *-eram* ```{=html} </td> ``` ```{=html} <td> ``` *-erāmus* ```{=html} </td> ``` ```{=html} </tr> ``` ```{=html} <tr> ``` ```{=html} <td> ``` *-erās* ```{=html} </td> ``` ```{=html} <td> ``` *-erātis* ```{=html} </td> ``` ```{=html} </tr> ``` ```{=html} <tr> ``` ```{=html} <td> ``` *-erat* ```{=html} </td> ``` ```{=html} <td> ``` *-erant* ```{=html} </td> ``` ```{=html} </tr> ``` ```{=html} </table> ``` Hence: **amāveram**, I had loved; **vīderātis**, you (pl.) had seen ## Examples *De Acutiliano autem negotio quod mihi **mandaras** (**mandaveras**), ut primum a tuo digressu Romam veni, **confeceram**.* (Cicero, *Ad Atticum* 1.5) : \"But as to the business of Acutilius that you had entrusted with me, I had already taken care of it when I came to Rome first thing after your departure.\" Note the relationship of the pluperfect verbs *mandaras* (*-aras* is a common contraction for *-averas*) and *confeceram* to the perfect verb *veni*. *Ego certe meum officium **praestitero**.* (Caesar, *De Bello Gallico* IV) : \"I certainly will have prevailed in my duty.\" [^1]: *-int* as an ending is rare; *-erint* and *sint* are two of the most common
# Latin/Lesson 8-Ablative Absolute and Accusative Infinitive ## Ablative Absolute The ablative absolute construction is used in a sentence to provide a background for the main action in the sentence. An ablative absolute is formed with a noun and an adjective or participle in the ablative case. `<i>`{=html}`<b>`{=html}convivis ingressis`</b>`{=html} ille cenam parat`</i>`{=html} `<b>`{=html}With the guests having entered`</b>`{=html}, he prepares dinner. `<i>`{=html}`<b>`{=html}domino convivanti`</b>`{=html} servi diligenter laborabant`</i>`{=html} `<b>`{=html}With the master feasting`</b>`{=html}, the slaves were working diligently. `<i>`{=html}`<b>`{=html}omnibus ieiunis`</b>`{=html} multos panes parare debuit`</i>`{=html} `<b>`{=html}With everyone (being) hungry`</b>`{=html}, he had to prepare lots of bread. ## Accusative Infinitive The accusative infinitive construction is used to indirectly report speech or thoughts. An accusative infinitive construction is formed by taking the indirect clause and putting the subject in the accusative and the verb in the infinitive. `<i>`{=html}ille credit `<b>`{=html}pueros stultos esse`</b>`{=html}`</i>`{=html} He believes the boys to be fools = He believes `<b>`{=html}that the boys are fools`</b>`{=html}. `<i>`{=html}magister parentibus dicit `<b>`{=html}pueros stultos esse`</b>`{=html}`</i>`{=html} The teacher says to the parents `<b>`{=html}that the boys are fools`</b>`{=html}. `<i>`{=html}colonus uxori dicit `<b>`{=html}se confectum esse`</b>`{=html}`</i>`{=html} The farmer says to his wife `<b>`{=html}that he is exhausted`</b>`{=html}. In this sentence, note how the reflexive `<i>`{=html}se`</i>`{=html} refers to the main subject of the sentence. `<i>`{=html}colonus uxori `<b>`{=html}dixit`</b>`{=html} se confectum esse`</i>`{=html} The farmer said to his wife that he `<b>`{=html}was`</b>`{=html} tired. Note how esse, despite being a present infinitive, is translated into the past tense. This is because the infinitive uses the action of the main verb, in this case `<i>`{=html}dixit`</i>`{=html} as a reference point instead of the present. But what about sentences such as \"the farmer `<b>`{=html}says`</b>`{=html} to his wife that he `<b>`{=html}worked`</b>`{=html} diligently\"? For those, you need to use the `<b>`{=html}past infinitive`</b>`{=html}. ### Overview of infinitives in all tenses Tense Active Passive Active Passive Active Passive Active Passive --------- ------------------------ ---------------------- ------------------------- ----------------------- ------------------------ ---------------------- ------------------------- ----------------------- Present amare amari monere moneri regere regi audire audiri Past amavisse amatus, -a, -um esse monuisse monitus, -a, -um esse rexisse rectus, -a, -um esse audivisse auditus, -a, -um esse Future amaturus, -a, -um esse amatum iri moniturus, -a, -um esse monitum iri recturus, -a, -um esse rectum iri auditurus, -a, -um esse auditum iri The sentence \"The farmer says to his wife that he worked diligently\" would thus translate as: `<i>`{=html}colonus uxori dicit se diligenter laboravisse`</i>`{=html} The following examples show how different infinitives with the main verb in the past and present would appear in English: - colonus uxori dixit se diligenter laboravisse = The farmer said to his wife that he `<b>`{=html}had worked`</b>`{=html} diligently. - colonus uxori dixit se diligenter laborare = The farmer said to his wife that he `<b>`{=html}was working`</b>`{=html} diligently. - colonus uxori dixit se diligenter laboraturum esse = The farmer said to his wife that he `<b>`{=html}would work`</b>`{=html} (or `<i>`{=html}was going to work`</i>`{=html}) diligently. - colonus uxori dicit se diligenter laboraturum esse = The farmer said to his wife that he `<b>`{=html}will work`</b>`{=html} (or `<i>`{=html}is going to work`</i>`{=html}) diligently. - nuntius mihi dixit urbem deletam esse = The messenger told me that the city `<b>`{=html}had been destroyed`</b>`{=html} - nuntius mihi dixit urbem deleri = The messenger told me that the city `<b>`{=html}was being destroyed`</b>`{=html} - nuntius mihi dixit urbem deletum iri = The messenger told me that the city `<b>`{=html}would be destroyed`</b>`{=html} (or `<i>`{=html}was going to be destroyed`</i>`{=html}) - nuntius mihi dicit urbem deletum iri = The messenger told me that the city `<b>`{=html}will be destroyed`</b>`{=html} (or `<i>`{=html}is going to be destroyed`</i>`{=html}) ### Translation Exercises
# Latin/Chapter 3 Verse The following poem is written in Hendecasyllabic. It is an introductory, dedication poem written by the poet Gaius Valerius Catullus. It is commonly referred to as \"Catullus 1\" or by its first line. : Cui dono lepidum novum libellum : arida modo pumice expolitum? : Corneli, tibi: namque tu solebas : meas esse aliquid putare nugas. : Iam tum, cum ausus es unus Italorum : omne aevum tribus explicare cartis\... : Doctis, Iuppiter, et laboriosis! : Quare habe tibi quidquid hoc libelli--- : qualecumque, quod, o patrona virgo, : plus uno maneat perenne saeclo!
# Latin/Lesson 1-Subjunctive ## Subjunctives The Subjunctive is one of the three different moods a Latin verb can take. The two other moods are the Indicative and the Imperative. The subjunctive is perhaps the most common and also most difficult to grasp, and there are a great number of different subjunctive uses. The subjunctive mainly expresses doubt or potential and what could have been. Whereas the indicative declares \"this happened\" or \"that happened,\" the imperative is called \'jussive,\' which is from \'iubere\' - to command, bid. Examples - \"Let me go\" and \"May I go?\" are statements of potential; the speaker is not entirely certain his/her command will be followed. - \"Were I a king, I would have a golden throne.\" -this expresses what could be true, but is not. Speaker is not a king, and so will not get the throne. - \"May the force be with you!\" expresses the hope/potential that the force (Star Wars) will be with you. The essential word here is \'may\' - \"*May* the force be with you.\" \"*If* this *were* to happen,\" or \"May this happen!\" or \"I ask you to make this happen\" are all possible uses of the subjunctive. There are four subjunctives: present, imperfect, perfect, and pluperfect. There are no subjunctives in the future tense, which already incorporates an element of doubt. ### The Present Subjunctive The present subjunctive is similar to the present indicative, except marked by a change of the theme vowel. *present stem* + *theme vowel change* + *ending* #### Form In the present subjunctive, the theme vowel for every conjugation changes; in effect, the first conjugation masquerades as the second conjugation and all the other conjugations take on the appearance of the first. ----------------- ----- --------- ------ 1st Conjugation *a* becomes *e* 2nd Conjugation *e* becomes *ea* 3rd Conjugation *e* becomes *a* 3rd -io and 4th *i* becomes *ia* ----------------- ----- --------- ------ Some ways to remember this are in the following collapsed table. +------------------------------------------------+ | Show | +================================================+ | Sh**e** w**ea**rs **a** g**ia**nt d**ia**mond | | | | W**e** b**ea**t **a** l**ia**r. | | | | W**e** b**ea**t **a**ll l**ia**rs. | | | | W**e** **ea**t **a** fr**ia**r | | | | W**e** **ea**t **a** F**ia**t | | | | N**e**ver F**ea**r **a** L**ia**r | | | | L**e**t\'s **ea**t **a** d**ia**per. | | | | L**e**t\'s **ea**t c**a**v**ia**r. | | | | Sh**e** w**ea**rs **a** d**ia**mond. | | | | W**e** **ea**t c**a**v**ia**r | | | | W**e** f**ea**r **a** l**ia**r | | | | Sh**e** w**ea**rs **a** t**ia**ra | | | | W**e** b**ea**t **a** g**ia**nt. | | | | Sh**e** r**ea**ds **a** d**ia**ry. | | | | Sh**e** w**ea**rs **a** d**ia**mond t**ia**ra. | | | | L**e**t\'s b**ea**t th**a**t g**ia**nt. | | | | F**e**w F**ea**r F**a**t Fr**ia**rs. | | | | H**e**r br**ea**sts **a**re g**ia**nt. | | | | Cl**e**m St**ea**ms Cl**a**ms in S**ia**m | +------------------------------------------------+ ### Example Conjugation *porto, port**a**re, portavi, portatus* (1st conjugation - to carry) #### Present Indicative This is the present active indicative form of *portāre*, which has already been covered. Remember the join vowels. #### Present Subjunctive The present active subjunctive of *portare* would be conjugated as follows: Notice: - The *-ā-* vowel stem has changed to an *-ē-*. - The personal endings *-m, -s, -t, -mus, -tis, -nt* are used, as is done for regular indicative verbs. #### Present Subjunctive of Esse The present active subjunctive of *sum, esse*, the verb \"to be\", is conjugated as follows: Unlike the conjugation of the present active indicative form, the present subjunctive is regular. The same personal endings are affixed to *si-*. ##### Present Subjunctive of Posse Translates as \"May I/you/he/we/you/they be able\" ### Imperfect Subjunctive The imperfect subjunctive is formed by adding the personal endings *-m, -s, -t, -mus, -tis, -nt* or the passive endings *-r, -ris, -tur, -mur, -mini, -ntur* to the present infinitive active (often the second principal part). In other words, for *vocō, vocāre, vocāvī, vocātum* The imperfect subjunctives are formed thus: For deponent verbs, whose second principal part is the passive infinitive (e.g., cōnārī, verērī, patī, expedīrī) a pseudo present infinitive is used (e.g, cōnāre, verēre, patere, expedīre; although these forms do not exist as stand-alone infinitives, they actually ARE the singular imperatives for these deponent verbs) The imperfect subjunctive of the verb to be (sum, esse) is conjugated regularly, as are ALL irregular verbs, e.g.: possem, vellem, nollem, ferrem, irem) ## Uses of the Subjunctive Verbs in the subjunctive mood may assume special meaning in specific constructions. ### Volitive or Optative Clauses Subjunctives in independent clauses are often translated as volitive/optative (that is, as a wish). Volitives/optatives show an intention for an action to occur; e.g. \"amet\" may be translated in volitive/optative context as \"may he love\" #### Hortatory A suggestion or command in first person (most often plural); e.g. \"cedamus\" as an hortatory subjunctive is \"let us depart\" #### Jussive A suggestion or command in third person; e.g. \"cedat\" as a jussive subjunctive is \"let her depart\"; \"deprehendatur\"= \"Let him be seized\" #### Potential The potential or possibility of something happening, in any person: (Fortasse) te amem. \"Perhaps I may love you.\" **All of these Subjunctive types can be used in an independent (main) clause.** Note that all can be translated with \"let\" or \"may\"; the differences lie in how English will represent the subjunctive verb: - Volitive (Wish): May we be friends forever! - Hortatory (Suggestion): Let us be friends! - Jussive (Command): Let them be friends! - Potential (Possibility): They may be friends; we may be friends; you may be friends. ### Purpose Clauses A purpose clause is a dependent clause used, as the name shows, to show purpose. Often initiated by an indicative verb, the clause contains a subjunctive verb in either the present or imperfect tense. Present and imperfect verbs in purpose clauses should be translated with the auxiliary verbs \"may\" and \"might,\" respectively. For example, \"Marcus urbem condidit ut regeret\" should be translated as \"Marcus built the city so that he would rule.\" These appear frequently in Latin. ### Relative Clauses A relative clause is an independent clause introduced by a relative pronoun. When the verb of a relative clause is in the subjunctive mood the clause may express result, purpose, or characteristic. - Result: The field is so large that he could not plow it in one day. - Purpose: He sent envoys who would pacify the city. - Characteristic: Who is so ill-prepared who would fight without a shield?
# Latin/Lesson 2-Subjunctive Use .The subjunctive mood has several uses in Latin, the most notable of which are: - First Person Exhortations - Purpose Clauses - Result Clauses - Indirect Commands ## First Person Exhortations (Hortatory Subjunctive) ### Definition, Common Usage and Expression in Latin An exhortation is a statement which expresses a wish. In English, the most common exhortation is \"let\'s go\". Other possibilities are \"would go\", \"should go\" and \"may go\". In Latin, these statements are equally as often used and are expressed in the present subjunctive active tense. ### Examples - - - - - ## Purpose Clauses ### Definition, Common Usage and Expression in Latin A purpose clause is a clause which expresses that someone did something in order that something else might happen. In English they usually contain the words **in order to** or **so that**. In Latin this concept is expressed by the words **ut** and **ne** followed by a verb in the subjunctive mood. *Ut* means \"so that\" or \"in order to\" and *ne* means \"lest.\" In purpose clauses, only forms of the imperfect (following the secondary sequence of tenses) and present (for the primary sequence) are used. ### Examples - - - ## Result Clauses ### Definition, Common Usage and Expression in Latin Result clauses state that something occurred as a result of something else happening. For a positive result, use *ut*. For a negative result, use *ut\... non*. Result clauses are normally recognisable by a signpost word in the main clause: tam = so (with adjective or adverb) tantus, -a, -um = so big, tot (indecl) = so many talis, -e = such, of such a sort adeo = so much, to such an extent (with verb) ita = so, in such a way (with verb) totiens = so often, so many times (with verb) ### Examples - - - - ## Indirect Commands ### Definition, Common Usage and Expression in Latin An indirect command is a statement like the following: \"He ordered her to do x\". The English equivalent words are \"**to**\" or \"**that they should**\" It can also take the form of \"I am ordering you to do x\", as opposed to the imperative \"DO X!\". Several verbs in Latin take the subjunctive mood with indirect commands: 1. rogo, rogare, rogavi, rogatum - to ask 2. persuadeo, persuadere, persuasi, persuasum - to persuade 3. impero, imperare, -imperavi, imperatum - to order 4. peto, petere petivi, petitum - to seek, ask for These verbs use an ut/ne + the subjunctive construction. ### Examples - - - ## Indirect questions ### Definition, Common Usage and Expression in Latin The subjunctive is used in indirect questions. For example, the question \'What are you doing?\' is direct, while \"He asked what I was doing\" is indirect. In Latin, the verb in the clause containing the indirect question must be in the subjunctive. ### Examples - *Imperator milites rogat si castra ceperent*\ The general asks the soldiers if they captured the camp. - *Eum rogo quid faciat*\ I am asking him what he is doing. - *Magister pueros rogat utrum laborent an ludant*\ The teacher asks the boys whether they are working or playing. ## Notā bene! ```{=html} <references/> ```
# Latin/Lesson 6-The Subjunctive Perfect Passive # Subjunctive Passive Verbs ## Subjunctive Passive Perfect Subjunctive passive verbs form from the 4th principle part as shown in the example below. The verb\'s third principle part, e.g. in the word impedire(to obstruct): impedio, impedire, **impedivi**, impeditus; gains the passive ending for the appropriate person. This is an example of the Subjunctive Passive in the perfect tense. muto, mutare, mutavi, mutatum \-- to change To make the verb into a perfect passive, take the fourth principle part, make it agree with the subject in gender, number, and case, and then add in the appropriate form of esse. In the perfect, we use the present form of esse, and specifically the subjunctive present(sim, sis, sit, simus, sitis, sint.) For example, Do you know *what has been done to him?* would be made into: scis quid eum factum sit? `            `*`Singular`* `           mutatus sim      `**`I have been changed.`**\ `           mutatus sis      `**`You have been changed.`**\ `           mutatus sit      `**`He has been changed.`** `             `*`Plural*`* `           mutati simus     `**`We have been changed.`**\ `           mutati sitis     `**`You have been changed.`**\ `           mutati sint      `**`They have been changed.`** - Note well that in the plural, the word \"mutatus\" becomes \"mutati,\" thus taking on the plural nominative. Remember that the perfect passive verbs require the fourth participle to agree in gender and number! ### Exercises **In this section, it is only truly necessary to translate the italicized portion. The rest exists in order to make the subjunctive necessary.** the children were so bad that they *have been scolded.* (Children- Liberi; To scold- vitupero, vituperare, vituperavi) He asked how *I was tricked.*(trick-ludo, ludere, lusi, lusus) My parents drove to town so that now *I have been born in a hospital.*(born- cresco, crescere, crevi, cretus; Hospital- valetudinarium, valetudinarii-n.) ## Subjunctive Passive Pluperfect The subjunctive passive pluperfect is very similar to the perfect, with the major difference being the way esse is conjugated. In specific, the word esse is simply given the active endings(m,s,t,mus,tis, nt) mutavi + **isse** \--\> *Singular* ```{=html} <!-- --> ``` \*mutatus essem **I had been changed.**\ \*mutatus esses **You had been changed.**\ \*mutatus esset **He had been changed.** ```{=html} <!-- --> ``` *Plural\** ```{=html} <!-- --> ``` \*mutati essemus **We had been changed.**\ \*mutati essetis **You had been changed.**\ \*mutati essent **They had been changed.** ### Exercises In these exercises, only the italicized parts require translation. The rest exist to make the subjunctive necessary. Remember, the subjunctive is not used in any but complex sentences or other rare circumstances. Ovid wrote so much in the Metamorphoses that *his hand had been changed into stone.*
# Latin/Lesson 7-The Gerund and Participles # Participles **Participles** are verbs which function grammatically like adjectives. English, aided by auxiliary participles, is able have participle phrases in many tenses. Latin has participles that do not have auxiliary supplementary participles. This limits the usage of the participle in Latin, according to some wiki-scholars of Classical Studies. ------------------------------------------------------------- `<B>`{=html}`<I>`{=html}Example 1`</I>`{=html}`</B>`{=html} `<B>`{=html}English`</B>`{=html} `<B>`{=html}Latin`</B>`{=html} ------------------------------------------------------------- ## Present Active Participles Present participles are formed by adding -ns to the stem of the verb. ------------------------------------------------------------------- `<B>`{=html}Forming the Present Imperfect Participle`</B>`{=html} 1st Conjugation 2nd Conjugation 3rd Conjugation 4th Conjugation ------------------------------------------------------------------- Present Participles are declined like 3rd declension adjectives. In cases besides the nominative, the -s becomes -t. Examples: 1\. ferens, ferentis 2. capiens, capientis 3. ens, entis ### Exercises Form the Present Participle and translate of the following Latin verbs: - meto, messui, messum, ere - metuo, metum, ui, ere - milito, avi, atum, are - postulo, avi, atum, are - sulco, avi, sulcum, are - iacio, ieci, iactum, ere ### Uses The examples will show participles of the verb *amo, amare, amavi, amatum* (to love). - **present active**: base + \'ns.\' This forms a two-termination 3rd declension adjective. In the case of *amare*, the participle is *amans, amantis* (loving). - **perfect passive**: fourth principle part, with appropriate first or second declension endings: *amatus, -a, -um*. - **future active**: fourth principle part, minus \'m\', add \'rus, -a, -um\' This forms a 1st-2nd declension adjective: *amaturus, -a, -um* (about to love). In deponent verbs, the perfect passive participle is formed in the same way as in regular verbs. However, since the nature of the deponent verb is passive in form and active in meaning, the participle is translated actively. Remember that participles are adjectives, and therefore must be declined to agree with the noun which they modify in case, number and gender. ## Gerund The gerund is a verbal noun which is used to refer to the **action** of a verb. For example: ars **scribendi** = the art of **writing**. The gerund is declined as a second declension neuter noun. It is formed by taking the present stem and adding -ndum. ------------ ------------ --------------- -------------- --------------- --------------- **Verb** amo, amare video, videre rego, regere capio, capere audio, audire **Gerund** amandum videndum regendum capiendum audiendum ------------ ------------ --------------- -------------- --------------- --------------- \ ==== Meanings of the gerund ==== - Genitive: ars legendi - The art of reading / to read - Accusative: ad puniendum - to punish, for punishing - Ablative: saepe canendo - through frequently singing; in legendo: while reading - Genitive with *causa*: puniendi causa - in order to punish ## Gerundive The gerundive is a 1st/2nd declension adjective formed the same way as the gerund, and its function overlaps somewhat with the gerund, but otherwise differs. The literal translation of the gerundive is with \"to be\", eg. defendendus, -a, -um = \"to be defended\". - Accusative: ad ludos fruendos - to the games to be enjoyed - to enjoy the games (Note that if this were a gerund construction, it would be ad lud**is** fruend**um** since *fruor, -i* takes the ablative case. In the gerundive construction, both noun and gerundive are governed by the preposition *ad*) - Gerundive of obligation, which is constructed with the verb \'est\' or \'sunt\', according to the subject\'s number: Carthago delenda est - Carthage is to be destroyed - Carthage must be destroyed. Note that if there is an object (eg. Carthage is to be destroyed **by us**), it goes into the dative case (eg. Carthago delenda **nobis** est). # Exercises 1\. Convert the following subjunctive purpose clauses into gerund or gerundive clauses with the same meaning. For example: militabat ut patriam defenderet → militabat ad patriam defendendum *or* militabat patriam defendendi causa *or* militabat ad patriam defendendam. Try to use each construction twice. - casam exit ut patrem adiuvet - mater in casam rediit ut cenam pararet - hostes vincebant ergo scutum abieci (*I threw away my shield*) ut celerius fugerem - in silvas currimus ut nos celemus - hostes in silvas ineunt ut nos invenirent - Brutus Iulium Caesarem occidit ut Romam liberaret 2\. Translate into Latin. For example: I must see the temple -\> templum mihi videndum est - We must build a large city. - Julius Caesar must lead an army into Greece. - Scipio (*Scipio, -ionis*) must defeat Hannibal.
# Latin/Lesson 8-Conditional Clauses ## Conditional Clauses Conditional clauses in English and Latin have the general form: `<b>`{=html}if`</b>`{=html} (condition clause) (result clause) Or: (result clause) `<b>`{=html}if`</b>`{=html} (condition clause) For example: 1. If I see anyone, I\'ll tell you. 2. If he was sleeping, you should not have knocked. 3. I cannot hear you if I\'m sleeping. 4. I would have been sad if I had not won. There are 3 types of conditional clauses in Latin: 1. Simple Fact (Present or Past) 2. Contrary to Fact (Present or Past) 3. Future (More or Less Vivid) ### Simple Fact Conditionals Simple fact conditionals in Latin have the general form: si (condition clause in the present indicative) (result clause in the present indicative) Or: si (condition clause in the imperfect/perfect indicative) (result clause in the imperfect/perfect indicative) =====For <example:=====> `<i>`{=html}si diligenter laboras, bonus puer es`</i>`{=html} If you are working diligently, you are a good boy. `<i>`{=html}si dominum adiuvabas, bonus servus eras`</i>`{=html} If you were helping your master, you were a good slave. ### Contrary to Fact Conditionals Contrary to fact conditionals are used if the condition clause is known to be false. For example: If you weren\'t playing during class, you would be a good boy (but you were playing, so you aren\'t a good boy). Contrary to fact conditionals have the general form: si (condition clause in the imperfect subjunctive) (result clause in the imperfect subjunctive) Or: si (condition clause in the pluperfect subjunctive) (result clause in the pluperfect subjunctive) =====For <example:=====> `<i>`{=html}si matrem adiuvaret, cena parata esset`</i>`{=html} If he were helping his mother, the dinner would be ready. `<i>`{=html}si patrem adiuvisset, pater matrem adiuvare potuisset`</i>`{=html} If he had helped his father, his father would have been able to help his mother. Note how English uses `<b>`{=html}would`</b>`{=html} and `<b>`{=html}would have`</b>`{=html} for result clauses, while Latin uses the same tense as in the condition clauses. ### Future Conditionals Future conditionals are, of course, used to express conditions in the future. For example: If you help me, I will be done faster. Future conditionals take the following general form: si (condition clause in the future or future perfect) (result clause in the future) Or: si (condition clause in the present subjunctive) (result clause in the present subjunctive) =====For <example:=====> `<i>`{=html}si fortiter pugnaveritis, urbs non delebitur`</i>`{=html} If you fight bravely, the city will not be destroyed. Note how English uses the present tense for the condition clause, while Latin uses the future or future perfect. `<i>`{=html}si diligenter laboretis, vobis meridie domum dimittam`</i>`{=html} If you were to work diligently, I would dismiss you at noon. This type of clause, known as the future less vivid (as opposed to the future more vivid which uses the future and future perfect), is used to express more improbable conditions in the future.
# Latin/Chapter 4 Verse Haec est fabula De Faciebus Iani. Ianus, ut dicebatur, erat unus deorum, cui facies duae erant. Altera earum enim in futura et altera in praeterita prospiciebat. Apollo ei olim sic dixit: \"Nonne tibi facies est, qua tempus praesens spectes?\" Et paulo post Ianus ita respondit: \"Mundus - orbis terrarum cyclus est similiter ac tempus est cyclicum. Et initium omnium et finem video. Omnia prospicio aeternusque sum, neque opus est porro videre, quae palam iaceant.\" Diu cogitavit Apollo de verbis Iani hominesque acutissimā mente in omni orbe terrarum conquaesivit eo consilio, ut ipse tam sapiens ut Ianus fieret. Postea cum quibusdam illustrissimis viris collocutus est, quo sapientior esset. Eo facto tamen unus eorum, cui Minervus nomen, Apollinem monuit, ne summam quaereret sapientiam, quam novisse nullum alium quam Ianum oportebat. Revenit autem Apollo ad Ianum eumque, ut veritatem cognosceret, ea summa rogavit. \"Intellegisne omnino quid roges?\" inquit Ianus, \"Si dis par fueris, omnibus iuribus privari possis.\" Itaque Apollo cognovit sapientissimum omnium fuisse, a quo monitus est. Translation below: This is the story of the faces of Janus. Janus, as it used to be said, was one of the gods who had two faces. It was that one spied into the future while the other into the past. Apollo once had said to him, \"Have you not a face with which to see the present?\" After a few moments, thus spoke Ianus: \"The world is a circle. Time is a circle. I see both the beginning and end of all living things. I am foreseeing and eternal; therefore, it is not necessary for me to see that which is lying out of sight.\" Apollo thought about these words for a very long time, and thus, that he might become wise like Janus, he sought the keenest minds of the land. He then was speaking with some great men that he might become wiser. However, one, whose name was Minervus, warned him not to seek the ultimate/highest truth because it may only be known by Janus. But he returned again to ask Janus that he might obtain the truth. \"Do you even know for what you\'re asking? If you enter onto the same level (of the Gods), all your rights might be snatched from you,\" said Janus. And so Apollo knows now that the same man who had warned him was the wisest of all.
# Latin/Chapter 5 Verse \< Latin ## A Verse From the Gospel of St. Luke Respondens Simon dixit: \"Aestimo quia is, cui plus donavit\". At ille dixit ei: \"Recte iudicasti\". Et conversus ad mulierem, dixit Simoni: \"Vides hanc mulierem? Intravi in domum tuam: aquam pedibus meis non dedisti; haec autem lacrimis rigavit pedes meos et capillis suis tersit. Osculum mihi non dedisti haec autem, ex quo intravi non cessavit osculari pedes meos. Oleo caput meum non unxisti; haec autem unguento unxit pedes meos. Propter quod dico tibi: Remissa sunt peccata eius multa, quoniam dilexit multum: cui autem minus dimittitur, minus diligit.\" Dixit autem ad illam: \"Remissa sunt peccata tua\". Et coeperunt, qui simul accumbebant, dicere intra se: \"quis est hic, qui etiam peccata dimittit?\". Dixit autem ad mulierem: Fides tua te salvam fecit; vade in pace!\".
# Latin/Lesson 9-Poem **_A Poem by Catullus_** I. ad Cornelium `<poem>`{=html} cui dono lepidum nouum libellum arida modo pumice expolitum. Corneli tibi namque tu solebas meas esse aliquid putare nugas iam tum cum ausus es unus Italorum omne aeuum tribus explicare cartis doctis Iuppiter et laboriosis. quare habe tibi quidquid hoc libelli qualecumque quidem est. patroni et ergo plus uno maneat perenne saeclo. `</poem>`{=html} 1. to Cornelius `<poem>`{=html} To whom do I send this fresh little book of wit, lately polished dry with pumice stone? To you, Cornelius: since you were accustomed to consider my trifles worth something even then, when you alone of Italians dared to explain all the ages, in three learned works, by Jupiter, and with the greatest labour. Then take this little book for your own: whatever it is, and is worth: virgin Muse, patroness, let it last, for more lives than one. `</poem>`{=html} **_Notes_** Title: ad Cornelium Ad is a Preposition meaning \"to\" and therefore never changes case. The name Cornelius is a second declension masculine noun. Names are declined the same as any other noun. You need only decline the singular since there is only one Cornelius.\ Nom. Cornelius\ Voc. Corneli\ Acc. Cornelium\ Gen. Cornelii\ Dat. Cornelio\ Abl. Cornelio\ The translation is \"To Cornelius\". The Preposition \"ad\" is only used with the Accusative Case. The Accusative Case is the same as the English Object Case. Second declension male names ending 'ius' have the double 'ii' form in the genitive. Line One: Cui dono lepidum nouum libellum?
# Latin/Spoken This chapter\'s purpose is to demonstrate hands-on spoken latin using dialogues, word lists, colloquial expressions and all that is needed to grasp spoken latin. It is recommended that you cover all verb, adjective and noun endings and have read through the rest of the Latin book, or at least the revision pages, before you embark on this. Subjunctive, infinitive and indicative all need to be well understood in order to complete this course. At the end of every exercise there will be a show-hide exercise and sometimes an English-Latin translation. There will often be referenced footnotes showing where there have been quotes from original Latin authors and tips to usage of sentences. ## Introduction Latin as a language was spoken from its earliest origins all through the middle ages to the renaissance and beyond by numerous students, scholars and the educated nobility. Like all spoken languages, Latin evolved in vocabulary and form. Often the vernacular languages influenced how Latin was spoken. While there were many attempts to stay true to Ciceronian form in speech and writing by scholars, most when they spoke the Latin tongue used forms and vocabulary often derived from their mother tongue which would have been incomprehensible to Classical speakers. Latin grammar has remained fixed and unchanged for centuries. The two most controversial issues about the living use of Latin (living Latin) are pronunciation and the introduction of new words. Regarding modern vocabulary, many schools exist, and there is no consensus as yet. The Roman Catholic Church publishes a lexicon (*Lexicon Recentis Latinitatis*) with an exhaustive number of modern words translated into Latin; often this is done through cumbersome periphrases (e.g. a hippie is 'osor conformitatis') and other times by arbitrary coinage of new words. ### Pronunciation When speaking Latin, the choice is usually between **'ecclesiastical' pronunciation** and **'classical' pronunciation**. The **'ecclesiastical' pronunciation** nowadays usually refers to the Italian pronunciation of ecclesiastical or 'Church' Latin, which is still the official liturgical language of the Catholic Church. Desiring uniformity, this Italian pronunciation is often encouraged as the standard for Masses celebrated in the Latin language. It is however only one of many regional systems of pronunciation. An example of the Italian pronunciation can be found in this video. **'Classical' pronunciation**, like the Italian pronunciation, offers consistency of sound across national borders. It also aims to be a scholarly reconstruction of how ancient Romans spoke, or at least educated speakers of the late Republican/early imperial period. It is described in books such as the paradigmatic Allen\'s Vox Latina. An example of classical Latin pronunciation can be found in this video. The sound of the classical pronunciation, in particular the replacement of the 'v' sound with the 'w' sound, has been the subject of controversy. It is, however, the clear favorite of the 'Living Latin' movement, which has the fastest growing number of new speakers of the language. ## Lessons - Basic conversations - Telling people where you\'re from and what language you speak ## Revisions - /Revision 1/ - /Revision 2/ - /Revision 3/ ## Assessments - /Test 1/ de:Latein/ Gesprochenes Latein
# Latin/Verb Synopsis Here The Verb Amo, Amare, Amavi, Amatus Is Conjugated In The Second Plural ------------------------------------------------------------------------ **Active Indicative** Amatis Amavistis Amabatis Amaveratis Amabitis Amaveritis **Passive Indicative** Amamini Amati Estis Amabamini Amati Eratis Amabimini Amati Eritis **Active Subjunctive** Ametis Amemini Amaretis Amaremini Amaveritis Amati Sitis Amavissetis Amati Essetis **Positive Imperative** Ama (Active singular) Amate (Active plural) Amare (Passive singular) Amamini (Passive plural) **Negative Imperative** Noli Amare (Singular) Nolite Amare (Plural) **Participles** Amans (Present Active) Amatus (Perfect Passive) Amaturus (Future Active) Amandus (Future Passive) **Infinitives** Amare Amari Amavisse Amatus esse Amaturus esse Amatum iri **Supines** Amatum (To Show Purpose) Amatu (Used With Adj. Like An Infinitive) ------------------------------------------------------------------------
# Latin/Index II `<big>`{=html}***This Page is incomplete***`</big>`{=html}\ For explanations of terms used in these grammar tables, check the Glossary. ## Declension of Nouns ### 1st Declension Masculine (each word has a set gender) puella 1st Declension Singular Plural ---------------- ---------- ------------ nominative puell-a puell-ae vocative puell-a puell-ae accusative puell-am puell-as genitive puell-ae puell-arum dative puell-ae puell-is ablative puell-a puell-is ### 2nd Declension Masculine/Feminine (each word has a set gender): servus 2nd Declension Masculine Singular Plural -------------------------- ---------- ----------- nominative serv-us serv-i vocative serv-e serv-i accusative serv-um serv-os genitive serv-i serv-orum dative serv-o serv-is ablative serv-o serv-is ### 2nd Declension Neuter: bellum 2nd Declension Neuter Singular Plural ----------------------- ---------- ----------- nominative bell-um bell-a vocative bell-um bell-a accusative bell-um bell-a genitive bell-i bell-orum dative bell-o bell-is ablative bell-o bell-is ### 2nd Declension Masculine: puer 2nd Declension Masculine Singular Plural -------------------------- ---------- ----------- nominative puer puer-i vocative puer puer-i accusative puer-um puer-os genitive puer-i puer-orum dative puer-o puer-is ablative puer-o puer-is ### 2nd Declension Masculine: ager 2nd Declension Masculine Singular Plural -------------------------- ---------- ---------- nominative ager agr-i vocative agr-e agr-i accusative agr-um agr-os genitive agr-i agr-orum dative agr-o agr-is ablative agr-o agr-is ### 3rd Declension Masculine or Feminine (each word has a set gender): rex 3rd Declension Singular Plural ---------------- ---------- ---------- nominative rex reg-es vocative rex reg-es accusative reg-em reg-es genitive reg-is reg-um dative reg-i reg-ibus ablative reg-e reg-ibus ### 3rd Declension Neuter: mare 3rd Declension Neuter Singular Plural ----------------------- ---------- ---------- nominative mar-e mar-ia vocative mar-e mar-ia accusative mar-e mar-ia genitive mar-is mar-ium dative mar-i mar-ibus ablative mar-i mar-ibus ### 4th Declension Masculine/Feminine (each word has a set gender) gradus 4th Declension Singular Plural ---------------- ---------- ----------- nominative grad-us grad-us vocative grad-us grad-us accusative grad-um grad-us genitive grad-us grad-uum dative grad-ui grad-ibus ablative grad-u grad-ibus ### 4th Declension Neuter: cornu 4th Declension Neuter Singular Plural ----------------------- ---------- ----------- nominative corn-u corn-a vocative corn-u corn-a accusative corn-u corn-a genitive corn-us corn-uum dative corn-ui corn-ibus ablative corn-u corn-ibus ### 5th Declension Masculine/Feminine (each word has a set gender): res 5th Declension Feminine/Masculine Singular Plural ----------------------------------- ---------- -------- nominative r-es r-es vocative r-es r-es accusative r-em r-es genitive r-ei r-erum dative r-ei r-ebus ablative r-e r-es : **m** = masculine\ : **f** = feminine\ : **n** - neuter **NOTES** 4/5th declensions are modified 3rd declensions, thus behave similarily. 3rd declension is either M/F/N, 4th declension is either M/F/N and 5th declension is either M/F. So for 3rd, 4th, and 5th declension is of most importance to memorise the gender because the adjective will still need to agree (ie have the same) with the noun in both case, gender, and number. The Vocative only changes for the 2nd declension masculine singular (however not for the nouns that leave the -us suffix when in nominative). There are a few exceptions in the 1st declension which are not feminine. Such nouns are poet-a (1st declension masculine, so to agree you need to use -us on the adjective) and naut-a. There are a few second declension nouns with irregularities. It is of most importance that you memorise them. When memorising a noun\'s meaning, make sure that you also memorise any irregularities the noun has, the gender, and the declension. Without doing this you may have trouble translating. For example, 2nd declension masculines have -us in the nominative singular; however, 4th declension masculines have -us in the nominative singular, nominative plural and accusative plural. This may get you confused if you do not memorise the declension of each noun. ## Single Declension Theory If you look at the above list of declensions, you may feel that you are going to be overcome if you have to memorize all of it. Memorization is indeed the key, but it will be easier than you think. Each word in Latin has three parts: the root, the stem vowel, and the ending. There are five vowels in Latin, so there are five stem vowels: A,O,I,U,E. Any word not really having a stem vowel naturally was given to I. If you study the declension patterns enough you will see that there are many similarities in the declensions. All accusative singulars end in \"m\" except neuters that sometimes still do. All accusative plurals end in \'s\' except neuters that always end in *a*. All genitive plurals end in \"um\", be it *ium, rum, uum* or whatever else. If you read enough Latin you will actually find that authors would switch a declension of a word at will if it made the sentence clearer. Thus many words that are of the 4th declension were sometimes written as if 2nd, and 5th declension as if 3rd and vice versa. Some ending patterns that we use for one declension may also be used in another, again to make the sentence clearer. Thus \"filiabus\" would be used in any sentence where we want to make it clear that we are talking about the Daughters and specifically not the Sons. We also see examples of this in *animabus*. Some think that the *IS* used in the first and second declensions was actually an abbreviation of *bus*. Some students find the ablative difficult since it sometimes looks like the nominative singular, dative plural or neither. All you really need to do to get the hang of this is to know that in the plural, the ablative always looks like the dative. If there is no preposition in front of it then it is probably a dative, unless it is being used in an ablative construction that would likely be apparent. If there is a preposition and it looks like a dative, just remember that no preposition takes a dative, only ever ablative and sometimes accusative. Dative plural plus preposition equals ablative. The ablative singular is really just the root plus the stem vowel with no ending to speak of, since the preposition tells you the grammar of the word. Some students also get confused by words that are the same in the nominative singular and plural. Don\'t worry about that; the verb will tell you which it is since the verb always agrees with the nominative. It is thought that originally there was only one declension, but during the task of applying it to every word in natural speech it was found that some words naturally changed the way the basic sounds of the original declension worked. Here is one idea of the original basic declension. Case Root Stem Vowel Singular Plural ------------ ------- ------------ ---------- -------- nominative puell a None es genitive puell a is rum dative puell a i bus accusative puell a m s ablative puell a none bus When speaking in everyday conversation, Latin speakers would shorten the word in their pronunciation so long as it still made sense. If you go to New Orleans you will likely hear someone say \'prowly\'. This is not a new dish at a restaurant or a new new code name for the police, it is actually the local pronunciation of the word *probably*. It is ok to shorten this word because when it is shortened everyone can still understand it. The Latins did the same thing. It is known that *I* can change to *E* and vice versa, so we can see that pattern in the dative singular of all declensions. The *IS* of the genitive was kept in the 3rd declension, shortened in the 1st, 2nd, and 5th and slightly altered in the 4th. The \'add *M*\' rule of the accusative singular is seen in the altering of the stem vowel in the 2nd and 3rd declensions. The *ES* of the nominative plural became *E* in 1st, *I* in 2nd, and *US* in 4th. The *RUM* of the genitive plural was shortened in the 3rd and 4th declensions. The accusative plural as a rule never changes, but keep in mind that neuter words followed a different pattern of using *A* for the accusative plural, and all neuters took the accusative singular or plural for the nominative of the same number. The *BUS* of the dative/ ablative plural was shortened to *IS* in the 1st and 2nd declensions but kept in the others. The 4th declension has a tendency to copy the *IBUS* of the 3rd in some authors but retain the *UBUS* in others. When studying Latin declensions you really should strive to memorize the patterns, but also look to see how they are similar to other patterns in the language as it will help you to remember. Also note that the *IS* of the genitive singular is what eventually gave us the word *HIS* and the \'add \'s\'\" rule of English. Latin also gave us the \'add \'s\'\" to make a plural by way of the accusative plural. If you study other inflexive languages related to Latin, such as Greek, you will notice even similarities across languages.
# Latin/Accents and Scansion All latin syllables are either long or short and stressed or unstressed. The metre of Latin poetry, unlike English poetry, is dependent on the length of the syllables rather than their accent. ### Length The two different lengths for syllables are long (indicated by a macron ˉ ) and short (indicated by a breve ˇ ). All syllables are either one or the other. A syllable's length is determined by both its nature and its position. If a syllable is long by nature that means that the vowel sound is long and pronounced differently to its short counterpart (e.g.). ---------------------------- ā is pronounced as in cart ă is pronounced as in cut ---------------------------- On the other hand, if a syllable is long by position, the consonants around the vowel sound determine the syllables length, rather than the syllable itself. If a vowel is followed by two consonants, then the syllable will be long irrespective of the nature of the vowel. The following line is from Poem 1 by Catullus in hendecasyllables. --------------------------------- cuī dōnō lĕpĭdūm nŏvūm lĭbēllŭm --------------------------------- The long syllable at the end of novum is caused by the two consonants (m and l) following it whereas the long syllable at the end of dono has to be long by nature as there is only one consonant following it. ### Stress As well as long and short syllables Latin also has a stress accent, like English. This is where the natural emphasis goes when speaking. The stress accent is determined by the length of the syllables but not the same as it. Unlike English there are fairly consistent rules to work out where the stress accent is placed in Latin words. ------------------------------------------------------------------------------------------------------------------------------- 1\) For words of two syllables, the accent usually goes on the second last syllable. 2\) For words of more than two syllables where the second last syllable is long, the accent goes on the second last syllable. 3\) For words of more than two syllables where the second last syllable is short, the accent goes on the third last syllable. ------------------------------------------------------------------------------------------------------------------------------- These rules are demonstrated in the following words taken from the extract above:\ ------------------ 1\) **nŏ**vūm 2\) lĭ**bē**llŭm 3\) **lĕ**pĭdūm ------------------ ### Poetic Meter As mentioned, Latin poetry depends on the length of syllables rather than their stress accent. A line of Latin verse is divided into feet depending on the pattern of long and short syllables. The pattern of feet then determines the meter. In some poetic meters, such as dactylic hexameter, there is also a main caesura in every line written as (˄). This is caused when there is a break in words in the middle of a foot.
# Latin/Common phrases ## Latin (Italic) Pronunciations are first given in the Ecclesiastical Pronunciation (Based on Italian, and used in some ceremonies by the Catholic church, and usually heard in recordings of classical music). These pronunciations are followed by the classical pronunciation (a reconstruction of how scholars believe the Romans pronounced these expressions) For example --- "of light" lucis (LOO-cheess) (LOO-kiss), with (LOO-cheess) being the ecclesiastical pronunciation, and (LOO-kiss) how the Romans said lucis. +----------+----------+----------+----------+----------+----------+ | Tra | Latin | IPA | Pseudo | IPA | Pseudo | | nslation | | (Eccles | -English | (Cl | -English | | | | astical) | | assical) | | +==========+==========+==========+==========+==========+==========+ | Latin | lingua | ```{=me | (lah- | ```{=me | (lah- | | | Latina | diawiki} | TEE-nah) | diawiki} | TEE-nah) | | | | { | | {{ | | | | | {IPA|/'l | | IPA|/'li | | | | | ingwa la | | ngwa la' | | | | | 'tina/}} | | tiːna/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | hello | ave! | ```{=me | (Ah-vay) | ```{=me | (Ah-way) | | | | diawiki} | | diawiki} | | | | | {{IPA| | | {{IPA|/ | | | | | /'ave/}} | | 'aweː/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | welcome | salve! | ```{=me | ( | ```{=me | ( | | | | diawiki} | Sal-vay) | diawiki} | Sal-way) | | | | {{IPA|/ | | {{IPA|/s | | | | | salve/}} | | alveː/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | goodbye | vale! | ```{=me | ( | ```{=me | ( | | | | diawiki} | vah-lay) | diawiki} | wah-lay) | | | | {{IPA|/ | | {{IPA|/' | | | | | 'vale/}} | | waleː/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | please | si | ```{=me | (see | ```{=me | (see | | | placet | diawiki} | PL | diawiki} | P | | | | {{IP | AH-chet) | {{IPA | LAH-ket) | | | | A|/si 'p | | |/siː 'p | | | | | laʧet/}} | | lakɛt/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | thank | gratias | ```{=me | (GRAH | ```{=me | (GRA | | you | tibi ago | diawiki} | -tsee-as | diawiki} | H-tee-as | | | | {{IPA| | TI-bee | {{IPA|/' | Ti-bee | | | | /'gratsi | AH-goh) | graːtiaː | AH-goh) | | | | as 'tibi | | s 'tibi | | | | | 'ago/}} | | 'agoː/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | that one | ille/ | ```{=me | ( | ```{=me | ( | | | illa/ | diawiki} | ILL-lay, | diawiki} | ill-leh, | | | illud | {{IPA| | ILL-lah, | {{IPA| | ill-lah, | | | | /'ilːe, | I | /'ilːɛ, | i | | | | 'ilːa, ' | LL-lood) | 'ilːa, ' | ll-lood) | | | | ilːud/}} | | ilːud/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | how | quot? | ```{=me | (quote) | ```{=me | (quote) | | much? | | diawiki} | | diawiki} | | | | | {{IPA| | | {{IPA| | | | | | /kwot/}} | | /kwot/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | yes | certe, | ```{=me | (CH | ```{=me | ( | | | ita vero | diawiki} | AIR-tay) | diawiki} | ker-tay) | | | | {{IPA|/' | | { | | | | | ʧerte/}} | | {IPA|/'k | | | | | ``` | | ɛrteː/}} | | | | | | | ``` | | +----------+----------+----------+----------+----------+----------+ | no | non, | ```{=me | (noan, | ```{=me | (known, | | | nullo | diawiki} | NUL-loh | diawiki} | NUL-oh | | | modo | {{IP | MO-doh) | {{IPA|/ | MO-doh) | | | | A|/'non, | | 'noːn, ' | | | | | 'nulːo | | nuːlːo ' | | | | | 'modo/}} | | mɔdoː/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | sorry | ignosce | ```{=me | (een- | ```{=me | (ing-k | | | mihi | diawiki} | YOH-shay | diawiki} | now-skeh | | | | {{IPA| | MEE-hee) | { | Mi-hee) | | | | /i'ɲoʃe | | {IPA|/i' | | | | | 'mihi/}} | | ŋnoːskɛ | | | | | ``` | | 'mihi/}} | | | | | | | ``` | | +----------+----------+----------+----------+----------+----------+ | I don't | non | ```{=me | (noan | ```{=me | (known | | un | com | diawiki} | c | diawiki} | c | | derstand | prehendo | {{ | om-pray- | {{IP | om-pray- | | | | IPA|/noŋ | HEN-doh) | A|/noːŋ | HEN-doh) | | | | kompre' | | komprɛ'h | | | | | hendo/}} | | ɛndoː/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | where\'s | ubi sunt | ```{=me | (OO-bee | ```{=me | (OO-bee | | the | l | diawiki} | soont | diawiki} | soont | | b | atrinae? | {{IP | lah-T | {{IPA| | lah-t | | athroom? | | A|/'ubi | REE-nay) | /'ubi su | ri-neye) | | | | sunt la' | | nt la'tr | (neye | | | | trine/}} | | iːnai/}} | rhyming | | | | ``` | | ``` | with | | | | | | | eye) | +----------+----------+----------+----------+----------+----------+ | generic | salutem! | ```{=me | (sah-L | ```{=me | (sah-L | | toast | | diawiki} | OO-taym) | diawiki} | OO-tehm) | | | | {{ | | {{ | | | | | IPA|/sa' | | IPA|/sa' | | | | | lutem/}} | | luːtɛ̃/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+ | Do you | lo | ```{=me | (l | ```{=me | (l | | speak | querisne | diawiki} | oh-quay- | diawiki} | oh-queh- | | English? | anglice? | {{IPA| | RISS-nay | {{IPA|/ | riss-neh | | | | /lokwe'r | AHNG-gle | lɔkwɛ'ri | ahng | | | | isne 'aŋ | e-chay?) | snɛ 'aŋg | li-kay?) | | | | gliʧe/}} | | likeː/}} | | | | | ``` | | ``` | | +----------+----------+----------+----------+----------+----------+
# Latin/Spoken Latin ## Audio Files Hi, if you want to learn spoken Latin some of the wide range of lessons on the Latinum podcast are aimed at this: have a look at <http://latinum.mypodcast.com> ## Code Switching Trick Here is a trick you can use to learn both basic grammar and to get into the hang of speaking in Latin. One of the biggest problems for students who learn Latin is the fact that it is not a word order language. This fact has already been covered in other lessons but the trick presented here is designed to get you past word order thinking and to start producing Latin in your head so it can come out of your mouth or off of your pen. Please note that if you don\'t have enough vocabulary to produce a real sentence in Latin with out looking up every word you can still use this trick to get yourself used to speaking in this way but using English words that you will slowly replace as your Latin vocabulary grows. I\'d not use this method for more than a day or so. But playing around with it will help a little. Nothing will really work, except for working and studying Latin itself, in Latin. Of course if you have studied the proper endings for a word then you should use it but if not just keep the English pronouns He, His, Him in you mind. Using these in English it is possible to violate English strict word order and still create an intelligible sentence. : *He to her its them gives.* Of course this is not good English and we don\'t know what the pronouns are referring to but we can still understand and that is the whole point. Using pronouns in English we can violate word order and even leave it behind. The interesting thing about Latin is that it isn\'t just the Pronouns but every word with few exceptions that can do this. This is what you do. Any word, from any language can be Latinized and used in a pseudo language that will teach you to speak Latin if you stick with it. Subject of a sentence: do nothing to the word but keep in mind that you can actually drop it from the sentence if everyone already knows what you are talking about. Possessive: add an \`IS\` to the end of the word, so instead of car\'s, you will have caris. Indirect object: add \`i\` to the end. This will sound funny but will work. If a word end in an ee kind of sound just pronounce it twice. Direct object: add \`EM\` to the end of a word. thus you get things like flowerem, spacem, computerem, carem, personem and so on. If you need to use a preposition just use the prepositions you have learned and don\'t change the word (just use the subject form as the preposition tell you the grammar of the word) Thus you could say a sentence like; : *boy girli manis flowerem gives* The above sentence is not English, nor Latin but it is what is called Code Switching and anyone who is on the way to fluency in a second language does it automatically. That is why is Japan people go around saying things like : *Car WA Boy OH Hit imasu.* We don\'t understand this sentence but it again is what may happen when two languages mix in the brain. Code Switcing is an important step to really becoming efficient in a new language. It allows you to move past only translation and actually make words come out of your mouth. Note; when you practice this trick don\'t worry about the plurals till you really study them. Anyone who has studied Latin even a little probably knows the beginnings of the conjugation for : *amo, amas, amat* What you should take note of is the fact that where the second person in Latin is governed by an S at the end and the third by a T it is reversed in English. : *I love, thou lovest, he loves* So this is what you do to start adding Verbs to your new Latin Code Switching hack; flip what you would normally say for HE from S to T at the end and start using S for the You form. : *I love, you loves, he lovet* Yes, It looks strange but it is to help you learn to code switch. Again, don\'t use plurals till you really learn them and have already gotten used to using the singulars here. When you learn the correct Latin Vocabulary then replace the English words for the correct Latin words with correct Latin endings for that particular word. As a final step before really forcing yourself into creating all Latin sentences, start using either an \`M\` or an \`I\` after verbs that are in the first person : *I lovem, I lovei* This will be important when you learn the perfect tense. Then start dropping the I, we, you, them pronouns all together. You will find that you don\'t need them since the verb tells you who is doing the action of the verb. Still use He and she as the difference from Male and Female is more important in Latin then in English. Your resulting sentences should be something like this when spoken : *boy girli manis flowerem givet.* Don\'t write in this code. This should be used only for spoken exercises. Get a friend and both of you learn this code and just speak back and forth. Keep it simple. Don\'t try anything too complicated till you actually learn it. Try to make it sound nice as well, Latin was a fluid, beautiful language that gave use the romance of French and Italian so giving yourself a little accent can\'t hurt. Another tip is to put the verb at the end of the sentence. The reason is that this creates a spoken period. Because we don\'t have word order to tell us when the sentence ends anymore, by putting the verb, which every sentence must have, at the end you are also telling the other person that the sentence is coming to an end. To make a question you can still put the verb at the end and just make it sound like a question or use a prober Latin question creator when you learn it. Here is an example of a conversation in this code : *computerem uses?* : *yes. use wants?* : *dog momis computerem broket.* : *really, terrible ist.* : *mom around house dogem chaset* : *funny soundt* : *say, girlis from computer class numberem gets?* : *no, she tall guyem liket* : *dark hairem she liket?* : *Maybe, not knowi* : *heris numberem get tryi* Yes, silly conversation, but this is just to give you an example of how to start breaking word order grammar and get into the mindset of the inflexive Latin grammar. Once you learn the proper endings start applying them to your English words. When you learn the proper vocabulary then switch to using the Latin words. When you learn a new Verb ending for past tense, infinitive and what not then start practicing with this new ending till you got it down, and not just with Latin words but with English Code Switching. You will be able to speak intelligible, near fluent Latin in less than five months. Once you actually do get some real Latin vocabulary under your belt you should start paying attention to the grave marks. Macrons can help you to tell the difference in words in their written form but really doesn\'t help with speaking. Find a book or article in the net that shows the little accent markes that are sometimes called graves and sometimes called Breves. They look like just a little slash over a vowel. é é à and the like. These tell you what part of the word to sort of choke up on. Try saying the word Spaghetti. You automatically want to choke up or **stress** the **E sound** in the middle. You actually say this \`*spaghétti*\`. Not all words have a stressed sound in them but many do and it can give you a great way to really sound Latin. All in all they are really helpful. Many speakers of Latin will change a C to a CH if it is followed by an E or I vowel sound. You don\'t have to do this and many people that teach Classical Latin say it is wrong but if you are speaking Latin today it really is by definition Not Classical Latin. Doing this will get you saying the word in a very European kind of pronunciation that really seems very natural and makes some words easier to say. Again, you don\'t have to do it and really shouldn\'t if it makes your teacher angry. Similar to changing the C to CH is the use of changing a G sound to a J sound if again followed by an E or an I sound. : Thus *Ge-nu* becomes *\`jen-u* as in the modern genuflect. : *Civitas- Kee vee tas becomes Chee vee tas* which eventually came to be *See vee tas-* so that we can say civics and citizen. The last point of concern is to choose to use the letter V as a v,v,v,v,v,v,v sound or a W,W,W,W,W,W sound. Once you pick it is best to stay consistent and not change from one word to another. If you don\'t like the way it is going with one and want to change to the other then change all words to the new way of saying them. ## Sentence patterns Once you have played around with the language a bit you will want to start putting things in order the way they should be in Latin. Now, it is true that Latin does not have a specifically set word order, but there is a usual order that sentences tend to go in. This does not mean that they HAVE TO go in this order, it just is the common way. The **word order**, it should be remembered, **has zero relation to the grammatical meaning of a word**. Regardless of word order the sentence will mean the exact same thing. However the normal word order goes something like this. **Nominative Dative Accusative Ablatives/Adverbs Verbs.** Put into modern English language grammatical terms, this translates into something like this. **Subject Indirect Object Direct Object Compliments verbs.** Please note, the verb is usually last. It does not have to be, but just usually is. The subject (nominative) is usually first but does not have to be and an interesting feature of Latin is that the Subject can be dropped anytime it is understood. Many sentences in Latin actually wind up being Direct Object Verb. The reason most teacher teach the declention list in a certain order N-G-D-Ac-Ab is because of this normal Latin word order even if they do not realize it. Most Latin sentences will not contain every case. Latin has a number of sentence patterns and these patterns determine what cases are needed and what those cases mean. The most basic sentence pattern in Latin is **Nominative Esse**. For this sentence pattern you basically put your noun in the nominative case and put the correct form of the \"be\" verb Esse after it. Examples:\ :*Homo sum. Mulier es. Umbella est. Pueri sumus. Puellae estis. Furnaces sunt.* Make sure you match singulars with singular verbs and plurals with plural verbs. The next sentence pattern in complexity is Nominative **Nominative Esse**. This basically says that you are equating the first thing with the second thing. This pattern is also used to place the qualities of an adjective on a noun. All that really matters is that they are both in the nominative. Make sure they match in gender. : *Pater homo est. Amicae mulieres sunt. Magister bonevolus est. Magistra irata est. Nauta bonus est. Manus dextra est.* These last two sentence patterns were pretty easy and straight forward, you just have to remember not to put the \"be\" verb in the middle but even if you do it is still correct Latin. It just sounds better to put the verb at the end. The next sentence pattern isn\'t so hard but since we don\'t really have it in English it can throw some. **Nominative Dative Esse**. This is where you state that a thing is \"for\" a person. \"The book is for him\" and the like. English doesn\'t really have a Dative case anymore so the idea is a bit out there but datives come up all the time in Latin so it is time to start getting used them. : *Liber puero est. Mulier homini est. Homo mulieri est. (Nominative dropped) Mihi est. Tibi est.* At this point in time it is appropriate to mention the Genitive case. You will notice even though most of your books state that the Genitive case is the possessor case similar to English \"His\" \"Her\" \"Its\" \"Their\", it was not used for that purpose above. In Latin the Genitive case is a quasi-adjective that states an internal quality of the noun. Take a look at the difference. : *Puer mulieri est. Puer irae est.* I can say \"the boy is for the woman / He is the woman\'s son\" but I can\'t say \"the boy is for anger.\" That makes no sense. But I can say \"He is a boy of anger.\" This gives you the impression that the boy is just angry all the time. **Datives used with the *Esse* verb tend to be people**, not objects. **Genitives used with the *esse* verb tend to be objects** but can often be people. Here is the difference. : *Filius homini est.* The very point of this sentence is to tell you that the Son is for the Man. : *Filius hominis nauta est.* This sentence uses a Genitive because the reason that the sentence exists is not to tell us that the Son is for the Man but that the Son is a Sailor. The fact that he is the Man\'s Son is just an extra idea that we threw on but could easily take off and still have the meaning of the sentence preserved. *Filius nauta est. Filius himinis nauta est.* Basically, for grammar, we will treat the genitive like an indeclinable adjective. It can go anyplace an adjective can go. The next sentence pattern we will look at is **Nominative Adverb est**. You basically state a nominative and give extra information about it using an adverb, or a preposition plus case noun. : *Petasus illic est. Petasus in mensa est.* With Intransitive and Transitive verbs we can use adverbs, prepositional phrases and Ablatives by themselves for this. : *Bene video. In via sto. Placido quiesco.* This means that you already know another sentence pattern. **Nominative Adverb Intransative Verb**. Once we jump into the world of transitive verbs you will have a bit more in the sentence to keep track of. A transitive verb allows an Actor (subject nominative) to act (transitive verb) on an object (Accusative). The sentence pattern goes like this: **Nominative Accusative Transative Verb**. In English we use word order to separate these two because unless we use a pronoun like **him**, the subject and object of the sentence will look the same. Not in Latin, or at least not often in Latin. In Latin, Subjects sound and thus look different than Objects. Keep in mind that word order could be any order but, so that you can see and get used to what you are seeing, I will stick to Nominative Accusative Verb. In a real Latin sentence, multiple adjective/genitives, adverbs/ablatives and or datives may be in a sentence to extend and enhance the meaning. : *Puella puerum videt.* See, even with Puer and Puella being next to each other and them being similar in pronunciation, you can still easily determine who is the subject and who is the object. ```{=html} <!-- --> ``` : *Pueri puellas cum intentissime observant.* No mystery here as to what is going on I hope. ```{=html} <!-- --> ``` : *Next we will look at giving verbs.* Their sentence pattern goes like this: **Nominative Dative Accusative Verb**. Nominative gives Accsative to Dative. If you can understand that then this sentence pattern is easy. ```{=html} <!-- --> ``` : *Puella puero rosam dat. Puer puellae cephalalgiam dat. Mulier hominibus litteras misit.* You will notice I hope that I used the verb Dat twice above. The Dative does indeed take its name from its frequent use with this verb. Also I used the verb Misit. Any verb that means \"give\" \"send\" \"grant\" and the like can logically use this construction. Next we look at Making verbs. This is where you say that you turned one thing into another thing. This can be a noun into another noun or a noun into an adjective. **Nominative Accusative Accusative Verb**. : *Coquus similaginem crustulum fecit. Coquus crustulum dulce fecit.* The last of the most basic sentence patterns that you will need to remember and use in everyday speech is **Nominative Ab Ablative Passive Verb**. In this sentence the Nominative Case is not the actor of the verb but instead receives the action that the verb gives, just like a passive verb in English. Logically, there can be no Accusative in this kind of sentence. The **person that is the actor does not have to be stated** but if he or she is it will be using the Ablative case after the preposition Ab. : *Ab familia mea laudar. Circenses ab omnibus videntur.* Those sentence patterns listed above are the most basic and most frequent sentence patterns that you will encounter and have to use is you become a Latin speaker (and you should be trying to become a Latin speaker). These sentence patterns are your base and onto them you will eventually add additional sub patterns that you will use. The important thing is to master these simple patterns first and then move on to more complex structures. Once you know the pattern, it becomes just a matter of vocabulary replacement. Move one word out and put in the desired next word. You should know how to do this through repetition so much that you do not have to think about it to parse or translate. The goal is to understand in Latin and not have to need to translate into English to get it.
# Latin/Words and their Flexion ## Words and their Flexion ### Stem Flexion ------------------------------------------------------------------------ 1\. Words are called in Grammar the Parts of Speech. : Words are either Simple, as flagrare flamma, or Compound as con-flagrare, flamm-i-er : Every Word has meaning and form. Form helps to determine meaning. ```{=html} <!-- --> ``` 2\. Every Word has a STEM and ROOT. : Word and Stem may be (but seldom are) the same, as tu, thou; aqua, water, while Root differs: flamma, flame: Root, flag-, blaze. ```{=html} <!-- --> ``` : Root and stem are often the same: ag-ere, to act. Such words are called Radical or Primitive: all others are derivative. ```{=html} <!-- --> ``` : A Compound Word has only one Stem, but as many Roots as it has composing parts. Thus the Stem of conflagrare is conflagra, the two Roots, cum and flag-. ```{=html} <!-- --> ``` 3\. Every true element in a word following the Root is called a SUFFIX. : Thus in flamma (for flag-ma) --ma is a Suffix; in flagrare, -r, -a and --re and suffixes. ```{=html} <!-- --> ``` : Suffixes may need a connecting Link or Vincular, which is not elemental: reg-I-bus, quer-I-monia. The final Suffix, which converts a Stem into a Word, is called an Ending, as --re in flag-r-a-re. But the Suffix --ma is not called an Ending because flamma is itself a Stem. When it forms flammas, s is an Ending. ```{=html} <!-- --> ``` 4\. A syllable placed before a word to modify its meaning, not being a root word, is called a PREFIX. : Thus in te-tend-I and cin-cinnus, te and cin are Prefixes. But particles in composition, as de-, re-, and se- are not Prefixes as having roots of their own. ```{=html} <!-- --> ``` 5\. The last letter of a Root, as g in flag is called the Root Character. : The last letter of a stem, as a in flamma, is called the Stem Character. The Stem Character, being of chief importance is also known as the Character of the Word. ```{=html} <!-- --> ``` 6\. FLEXION, or Stem Flexion is the method of inflecting a stem, that is, of making such changes in its form to indicate changes in its meaning and uses. : This is usually done by suffixing a Flexional Ending to the Stem: flagra-re; flamma-rum. Such suffixed endings sometimes need a Vincular, as I in regibus; sometimes they cause a mutation of the stem, as flamm-is for flamma-is (which is for flamma-bus). Sometimes change in a letter of the Stem itself is an inflection, such as flamm-a (short a) to flamm-a (long a). Sometimes both Letter-change and Ending are used; ag-, eg-I. Sometimes Prefix, Letter Change and Ending are used: can-, ce-cin-ci. ```{=html} <!-- --> ``` 7\. How then is a Stem defined? : A stem is that part of a Word which is virtually contained in every change of form, though the character is often liable to be hidden through the operation of the laws which determine letter change. So the character of flamma is hidden in the form flammis; the character of virgin- is hidden in the form virgo; the character of dirif- is hidden in the form direxi. ```{=html} <!-- --> ``` 8\. How then is a Root defined? : A Root is the primitive element in any word; that part which the word has in common with all other kindred words. Thus in agito, the Stem is agrita-, but the root is ag-, which it has in common with ag-o, ag-men, and many other kindred words. The Root-character and Root-vowel are more liable to be in hidden through letter change than even the Stem-character. Thus the Root ag- is contained in the words action, examen, redigo, but obscured in word by some mutation.
# Latin/Stylistic Features of Latin Verse and Prose # Stylistic Features of Latin Verse and Prose This is a brief glossary of stylistic features often found in Latin especially in rhetoric and poetry. ## Alliteration Alliteration is a common poetic technique used in Latin from the earliest surviving fragments to the latest literary age. In alliteration there is a repetition of the initial consonantal letter. ### Example 1 Latin English --------------------- ---------------------------- Caesar cum Cicerone Caesar, with Cicero Veni,Vidi,Vici I came, I saw, I conquered bellum bonum good war ## Hyperbaton Hyperbaton is the arranging of words in a particular manner to produce an effect. Hyperbaton is used often in Latin literature because Latin syntax is far more flexible than English. ### Example 2 Latin English ------------------------------------- ------------------------------------------------------------ magnae periculo opes Karthago, \... danger because of great wealth/resources of Carthage, \... Analysis: The word \'periculo\' separates the words \'magnae\' and \'opes\' even if it should be used before *magnae opes*. ## Hendiadys Hendiadys is a rhetorical and poetic technique that uses the juxtaposition of two or more words with a similar meaning to reinforce an idea. ## Parallelism Parallelism is a stylistic device common in Latin in which two sentences have similar syntax. ### Example 3 Latin English --------------------------- ------------------------ Italia in Europa est. Italy is in Europe. Marcus ad scholam currit. Marcus runs to school. Analysis: In both sentences the nominative is placed first and the principal verb is last. ## Chiasmus Chiasmus is the reverse of parallelism, because syntactic structures are inverted. The name is from the Greek letter Chi which resembles an X and illustrates symmetrical crossing. A good example is the aphorism quod cibus est aliis, aliis est venenum, \"What is food to some, to others is poison.\" The pattern is: noun, verb, pronoun; pronoun, verb, noun. ### Example 4 Latin English ------------------ ------------------- Claudiam laudo. I praise Claudia. Venio ad Marcum. I come to Marcus. ## Litotes The negation of a verb instead of using an antonym is a poetical device known as litotes. Litotes is much weaker than simply using an antonym. Litotes is often used as underestimation. ### Example 5 Latin English ------------------- ------------------------ non ignorare to not be ignorant of As opposed to\... tenere         to be knowledgeable of ## Anaphora The rhetorical figure called anaphora is often used in conjunction with parallelism where the first word in the first sentence of a paragraph or stanza is repeated in the following sentences. It is sometimes used where the initial word in a sentence must be understood in the clauses or sentences that follow. ### Example 6 Latin English ------------------------------------------ ---------------------------------------------- timeo ne non pueri essent boni in schola I dread that the boys are not good in school timeo ne non puellae essent bonae domi I dread that the girls are not good at home Analysis: `<i>`{=html}timeo`</i>`{=html} is repeated in the sentence, although not strictly necessary ## Epistrophe An epistrophe is a rhetorical device like anaphora except at the end of a sentence. ## Asyndeton Latin English ---------------- ---------------------------- Veni,vidi,vici I came, I saw, I conquered As you can see, an asyndeton is a multiple numeration without the \"et (and)\" ## Polysyndeton This is a numeration **with** et: Veni et vidi et vici. Polysyndeton is marked by the repeated use of the same conjunction (et\...et\...et) or (neque\...neque\...neque). It is the direct opposite of asyndeton (listing with no conjunctions). ## Pluralis modestiae This is an advanced technique, often used in ancient fabulae, by Aesop and others. It means that the Plural is used to show \"modestia\", for example \"officium magnum e nostro est.\"
# Applications of ICT in Libraries/Diploma ICTL The **Advanced Certificate** and the **Advanced Diploma** in **Applications of ICT in Libraries** were developed by the **Scottish Library and Information Council (SLIC)** and are validated by the **Scottish Qualifications Authority (SQA)** `<big>`{=html}\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\--CHANGES TO THE QUALIFICATION\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\--`</big>`{=html} The Certificate and Diploma have been superseded by the Professional Development Award in Applications of ICT in Libraries at levels 7 and 8 (English and Welsh levels 4 and 5). They consist of much the same content as the certificate and diploma but the PDAs include two new units: : Digital Culture: Online Communication: In this unit you will focus on the "new literacies" created by digital technologies. You will consider Web 2.0 tools, including social networks, online publishing, online collaboration and virtual worlds. : : Digital Culture: Online Collaboration: This unit considers the sociology and operation of virtual communities. You will discuss the uses of Web 2.0 and online collaboration tools within your workplace. To achieve the level 7 award you must complete three mandatory units: ⋅Locating Information on Behalf of Clients ⋅Using ICT in Library Practice & Professional Development ⋅Supporting Clients in the safe & Legal use of ICT and one of: ⋅Supporting Reader Development ⋅Digital Culture: Online Communication `<big>`{=html}\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\--`</big>`{=html} ### What are these qualifications? These qualifications are based on the training already carried out as during the People's Network programme. They have been developed by the Scottish Library and Information Council (SLIC) and are accredited by the Scottish Qualifications Authority (SQA). The level of the qualifications is roughly equivalent to a UK Higher National Certificate or Diploma (HNC/HND), a US Associate Degree or years 1 and 2 of a UK or US undergraduate degree. Credit for approximately one year of study may be transferable to other academic programmes. The **Museums, Libraries and Archives Council (MLA), SLIC, CyMAL** (the Welsh body) and **DCAL** (the Northern Ireland department) supported the development of the qualifications for use throughout the UK. SQA is currently exploring accreditation with the **QCA (Qualifications & Curriculum Authority)** and articulation into higher education. The qualifications have been reviewed by content advisers from across the UK in order to balance any variation in the context of library service delivery and the learning materials contain UK-wide examples of best practice. ### Who are they for? These qualifications are appropriate to library staff in any sector: public libraries, higher education, further education, schools, health libraries, national libraries etc. They are suitable for experienced staff (by showing how ICT can used in traditional library work)and they are also suitable for **new entrants** to the profession. They may also be of interest to English-speaking library staff in other countries. Candidates would normally be expected to have reached a reasonable level of general education, for example A-Level or SCE Higher and possess reasonable ICT skills, such as PC Passport or ECDL. ### What is the content? The **Level 7 in Applications of ICT in Libraries** consists of six 8 credit units, each roughly equivalent to 80 hours of study, as follows: Mandatory units: - Locating information on behalf of clients Applications of ICT in Libraries/Locating Information - Using ICT in professional practice Applications of ICT in Libraries/Using ICT in Professional Practice - Supporting clients in the safe and legal use of ICT Applications of ICT in Libraries/Safe and Legal Use of ICT Optional Units (learners undertake one of these units): - Supporting reader development Applications of ICT in Libraries/Supporting Reader Development - Supporting client learning Applications of ICT in Libraries/Supporting Client Learning - Digital Culture: digital communication The **Level 8 in Applications of ICT** in Libraries includes three 16 credit units (160 hours of study) and one 8 credit unit (80 hours of study): Optional Units (learners undertake one of these units): - Net Navigator Applications of ICT in Libraries/Net Navigator - Educator Applications of ICT in Libraries/Educator (candidates must choose one of these) Mandatory units: - Graded Unit -- Reflective Project Applications of ICT in Libraries/Graded Unit Project - Digital Culture: digital collaboration Summaries of the **unit content** can be found later in this document. ### What support material is available? A wide range of support material is available, including top-up learning material, assessment tools and electronic log-books to record assignments for authentication in the workplace. The top-up learning material is available in Wikibook format. ### How are they assessed? Almost all of the assessment is of a practical nature and involves the completion of logbooks relating to workplace activities, essays and reports. Most assessments can be submitted online. ### How do they relate to professional qualifications? ### What are the benefits? There are a number of benefits for individual and employers in supporting this development. Staff will have the chance to have their People's Network learning accredited, improve their qualifications, gain academic credits for transfer into other courses or improve their promotion prospects. From the employer\'s perspective, the qualifications will contribute towards workforce development and meeting corporate quality agendas such as Investors in People and Charter Mark. ## Applications of ICT in Libraries: Unit Summaries You can obtain the complete **unit specification** by following the link after the title. ### Locating information on behalf of clients The purpose of this unit is to guide candidates to work logically through the steps of a reference enquiry, typical for a public library, using Internet resources. 1. Define the precise nature of the enquiry in conjunction with the client. 2. Create a search strategy to fully satisfy the client\'s enquiry. 3. Evaluate the results of the search in terms of validity of information found and its appropriateness in meeting the client\'s needs. ### Supporting reader development The purpose of this unit is to develop skills in public library staff required to use online resources in order to support clients in the development of their reading. 1. Demonstrate an understanding of reader development. 2. Identify, evaluate and use a range of online resources that promote reading to adult clients. 3. Identify, evaluate and use a range of online resources that promote reading to younger clients. 4. Identify, evaluate and use a range of online resources that promote reading to clients with special needs or with specific language requirements. ### Supporting client learning The purpose of this unit is to develop skills in public library staff required to support clients in their selection and use of ICT-based learning packages within the library. 1. Profile client in terms of ICT competence and learning goals. 2. Select a range ICT-based package(s) to support this learning. 3. Provide appropriate ICT support to the client in the use of their chosen learning package(s). ### Using ICT in professional practice The purpose of this unit is to develop skills in public library staff required to use ICT in support of professional practice. 1. Use an automated library management system proficiently. 2. Use and evaluate online selection tools. 3. Use ICT in continuing professional development, to join in professional discussions and to improve own professional practice. ### Supporting clients in the safe and legal use of ICT The purpose of this unit is to develop skills in public library staff required to support clients so that they can use ICT safely for a range of purposes and within the current legislative framework. 1. Demonstrate safe practice relating to the use of ICT for communication. 2. Demonstrate ways in which ICT can support clients with special needs or with specific language requirements. 3. Demonstrate awareness of legislation relating to the use of ICT for storage, manipulation and access of information. 4. Demonstrate awareness of Freedom of Information legislation and information access issues. ### Digital Culture: Online Communication This unit focuses on using social media for communication purposes. It supports developing new digital literacies and using these skills to manage information effectively. 1. Examines communication using social media and collaborative documents 2. Explores using online publishing tools to support library services and continuing professional development 3. Uses new technologies to reflect on the information society ### Carrying Out the Educator Role The purpose of this unit is to develop skills in design and delivery of training on ICT-related topics. 1. Establish ICT training needs for individuals and groups. 2. Select delivery approach which takes account of learner\'s preferred learning style and is appropriate for learning content. 3. Design learning materials and programmes on ICT-related topics. 4. Utilise appropriate skills to support individuals and groups in their use of learning materials and programmes on ICT related topics 5. Evaluate and revise learning materials and programmes on ICT-related topics. ### Integrative Unit (Project) This Integrative Unit is designed to provide evidence that the candidate has integrated the knowledge and skills acquired throughout the programme into his/her ongoing professional practice. 1. Review the programme to identify key areas of learning. 2. Demonstrate the incorporation of key areas into ongoing professional practice. 3. Formulate an approach to continuing professional development in key areas. ## Certification Anyone wishing to be certified for the Diploma or Advanced Diploma must enrol as a student at one of the centres approved by SQA to offer the programmes. Centres may offer the programmes by different means, e.g.: full-time or part time, presencial, distance learning etc.
# Applications of ICT in Libraries/Advanced Diploma ICTL The **Advanced Certificate** and the **Advanced Diploma** in **Applications of ICT in Libraries** were developed by the **Scottish Library and Information Council (SLIC)** and are validated by the **Scottish Qualifications Authority (SQA)** \-\-\--CHANGES TO THE QUALIFICATION\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-- The Advanced Diploma has been superseded by the Professional Development Award in Applications of ICT in Libraries at level 8 (English and Welsh level 5). It consist of much the same content as the Advanced Diploma but the PDA includes a new unit: Digital Culture: Online Collaboration: This unit considers the sociology and operation of virtual communities. You will discuss the uses of Web 2.0 and online collaboration tools within your workplace. To achieve the level 8 award you must complete the level 7 award plus two mandatory units: \- Digital Culture: Online Collaboration and - Reflective Practice unit and one of either \- Carrying out the Net Navigator Role or - Carrying out the Educator Role ------------------------------------------------------------------------ ### What are these qualifications? These qualifications are based on the training already carried out as during the People's Network programme. They have been developed by the Scottish Library and Information Council (SLIC) and are accredited by the Scottish Qualifications Authority (SQA). The level of the qualifications is roughly equivalent to a UK Higher National Certificate or Diploma (HNC/HND), a US Associate Degree or years 1 and 2 of a UK or US undergraduate degree. Credit for approximately one year of study may be transferable to other academic programmes. The **Museums, Libraries and Archives Council (MLA), SLIC, CyMAL** (the Welsh body) and **DCAL** (the Northern Ireland department) supported the development of the qualifications for use throughout the UK. SQA is currently exploring accreditation with the **QCA (Qualifications & Curriculum Authority)** and articulation into higher education. The qualifications have been reviewed by content advisers from across the UK in order to balance any variation in the context of library service delivery and the learning materials contain UK-wide examples of best practice. ### Who are they for? These qualifications will permit library staff who have already. undergone the **People's Network** training to obtain accreditation, but they are also suitable for **new entrants** to the profession. The main target group is staff working in the UK public library service, but the qualifications are also likely to be of interest to staff in other library services, particularly **school libraries**. They may also be of interest to English-speaking library staff in other countries. Candidates would normally be expected to have reached a reasonable level of general education, for example A-Level or SCE Higher and possess reasonable ICT skills, such as PC Passport or ECDL. ### What is the content? The **Diploma in Applications of ICT in Libraries** consists of five single-credit units (each roughly equivalent to 40 hours of study), as follows: - Unit 1: Locating information on behalf of clients Applications of ICT in Libraries/Locating Information - Unit 2: Supporting reader development Applications of ICT in Libraries/Supporting Reader Development - Unit 3: Supporting client learning Applications of ICT in Libraries/Supporting Client Learning - Unit 4: Using ICT in professional practice Applications of ICT in Libraries/Using ICT in Professional Practice - Unit 5: Supporting clients in the safe and legal use of ICT Applications of ICT in Libraries/Safe and Legal Use of ICT The **Advanced Diploma in Applications of ICT** in Libraries includes all of the above units, plus the following double-credit units, each roughly equivalent to 80 hours of study: - Unit 6: Net Navigator Applications of ICT in Libraries/Net Navigator - Unit 7: Educator Applications of ICT in Libraries/Educator (candidates must choose one of these) - Unit 8: Graded Unit -- Project Applications of ICT in Libraries/Graded Unit Project Summaries of the **unit content** can be found later in this document. ### What support material is available? A wide range of support material is available, including top-up learning material, assessment tools and electronic log-books to record assignments for authentication in the workplace. The top-up learning material is available in Wikibook format and also in an interactive web-based format at <http://www.ictl.org.uk>. The top-up material includes activities, prompts and refresher learning. More than 600 pages of material have already been written and this is being expanded all the time. The top-up learning can be integrated with People\'s Network, cascade or new training and work-based practice. ### How are they assessed? Almost all of the assessment is of a practical nature and involves the completion of logbooks relating to workplace activities, essays and reports. Most assessments can be submitted online. ### How do they relate to professional qualifications? The qualifications support the **CILIP Framework of Qualifications** and can be used as evidence towards Certification, Chartership and Revalidation submissions. The Diplomas are based on reflective practice, and electronic logbooks make it easy to build portfolios. ### What are the benefits? There are a number of benefits for individual and employers in supporting this development. Staff will have the chance to have their People's Network learning accredited, improve their qualifications, gain academic credits for transfer into other courses or improve their promotion prospects. From the employer\'s perspective, the qualifications will contribute towards workforce development and meeting corporate quality agendas such as Investors in People and Charter Mark. ## Applications of ICT in Libraries: Unit Summaries You can obtain the complete **unit specification** by following the link after the title. ### Unit 1: Locating information on behalf of clients The purpose of this unit is to guide candidates to work logically through the steps of a reference enquiry, typical for a public library, using internet resources. 1. Define the precise nature of the enquiry in conjunction with the client. 2. Create a search strategy to fully satisfy the client\'s enquiry. 3. Evaluate the results of the search in terms of validity of information found and its appropriateness in meeting the client\'s needs. ### Unit 2: Supporting reader development The purpose of this unit is to develop skills in public library staff required to use online resources in order to support clients in the development of their reading. 1. Demonstrate an understanding of reader development. 2. Identify, evaluate and use a range of online resources that promote reading to adult clients. 3. Identify, evaluate and use a range of online resources that promote reading to younger clients. 4. Identify, evaluate and use a range of online resources that promote reading to clients with special needs or with specific language requirements. ### Unit 3: Supporting clients learning The purpose of this unit is to develop skills in public library staff required to support clients in their selection and use of ICT-based learning packages within the library. 1. Profile client in terms of ICT competence and learning goals. 2. Select a range ICT-based package(s) to support this learning. 3. Provide appropriate ICT support to the client in the use of their chosen learning package(s). ### Unit 4: Using ICT in professional practice The purpose of this unit is to develop skills in public library staff required to use ICT in support of professional practice. 1. Use an automated library management system proficiently. 2. Use and evaluate online selection tools. 3. Use ICT in continuing professional development, to join in professional discussions and to improve own professional practice. ### Unit 5 Supporting clients in the safe and legal use of ICT The purpose of this unit is to develop skills in public library staff required to support clients so that they can use ICT safely for a range of purposes and within the current legislative framework. 1. Demonstrate safe practice relating to the use of ICT for communication. 2. Demonstrate ways in which ICT can support clients with special needs or with specific language requirements. 3. Demonstrate awareness of legislation relating to the use of ICT for storage, manipulation and access of information. 4. Demonstrate awareness of Freedom of Information legislation and information access issues. ### Unit 6: Carrying Out the Net Navigator Role The purpose of this unit is to guide candidates to work logically through the steps of a complex reference enquiry, typical for a public library, using a complex search strategy, a wide range of internet resources and current awareness and alerting services. 1. Define the detail of a complex enquiry in conjunction with the client. 2. Demonstrate knowledge of search logic, search engines and features of the internet. 3. Create and implement a complex search strategy. 4. Evaluate websites located in a complex search. 5. Review effectiveness of search strategy. 6. Use ICT to set up current awareness and alerting services. ### Unit 7: Carrying Out the Educator Role The purpose of this unit is to develop skills in design and delivery of training on ICT-related topics. 1. Establish ICT training needs for individuals and groups. 2. Select delivery approach which takes account of learner\'s preferred learning style and is appropriate for learning content. 3. Design learning materials and programmes on ICT-related topics. 4. Utilise appropriate skills to support individuals and groups in their use of learning materials and programmes on ICT related topics 5. Evaluate and revise learning materials and programmes on ICT-related topics. ### Unit 8: Integrative Unit (Project) This Integrative Unit is designed to provide evidence that the candidate has integrated the knowledge and skills acquired throughout the programme into his/her ongoing professional practice. 1. Review the programme to identify key areas of learning. 2. Demonstrate the incorporation of key areas into ongoing professional practice. 3. Formulate an approach to continuing professional development in key areas. ### Digital Culture - Online Collaboration This unit examines the creation, sociology and operation of virtual communities and explore how individuals can collaborate for a common purpose using social media and online publishing tools. 1. Initiate and facilitate professional discussions using forums 2. Utilising social media for professional and personal networking 3. Co-orinate a group collaborative social media marketing project 4. Plan, edit and produce a group collaborative blog 5. Reflecting on the most appropriate social media strategy for your information service ## Certification Anyone wishing to be certified for the Diploma or Advanced Diploma must enrol as a student at one of the centres approved by SQA to offer the programmes. Centres may offer the programmes by different means, e.g.: full-time or part time, presencial, distance learning etc. ### Approved Centres At present there is only a single approved centre, but this is expected to change and further centres will be added as approval is granted. #### Millennium City Academy **Millennium City Academy** is an associate college of **London Graduate School of Management**, a private college located in the heart of London, UK. It offers the ICTL programmes by distance learning. Full details can be obtained from the college\'s web site <http://www.lgsm.ac>, or by emailing **ictl@lgsm.ac**.
# Applications of ICT in Libraries/Locating Information This page is designed for the use of students undertaking the **Diploma** (Diploma ICTL) or the **Advanced Diploma** (Advanced Diploma ICTL) in **Applications of ICT in Libraries**. These qualifications were developed by the **Scottish Library and Information Council (SLIC)** and are validated by the *Scottish Qualifications Authority (SQA)*\' **Locating Information on Behalf of Clients** is a core unit in both the Diploma and Advanced Diploma programmes. ## Introduction This unit aims to develop your skills in **working logically through the steps of a reference enquiry**, typical for a public library, using Internet resources. **Reference and enquiry work** has always been an integral part of the public library service. Nowadays many queries are answered using **electronic** rather than print sources. However, the **processes** and **strategies** used are the same with both print and electronic searches. So, any **experience** you have gained in answering queries through printed reference sources will enhance your competence in electronic searches. Enquiry work can provide library staff with a great deal of **job satisfaction**. No two enquiries, or enquirers, are exactly the same -- so searches for information are varied. Sometimes an information search will present a real intellectual challenge and require you to adopt an innovative or ingenious approach to tackling the enquiry. In such cases getting the required result for the enquirer is doubly rewarding. An effective enquiry service enhances the library's **reputation** with its clients and creates a positive image for library staff -- as professional, efficient and helpful people. If you are a member of staff in a public library who deals with information enquiries from clients and answers them using the Internet, you will have developed some or all of the expertise required for this unit. Read through the following information carefully. It summarises the **knowledge and skills** which you need in order to produce evidence of your competence. The unit involves interacting with library clients, establishing their information needs and using the Internet to search for the required information. This must be done in a real library environment and you will need access to the Internet, preferably broadband. Specifically you are asked to: **Define the precise nature of the enquiry in conjunction with the client** The main knowledge and/or skills required are: - reference interview techniques - open and closed questions - determining the nature of information to be provided-- quantity, level, format - constraints -- deadlines for completion, currency of information and language **Create a search strategy to fully satisfy the enquiry** The main knowledge and/or skills required are: - choice of search terms - structuring the search - common search engines - directories - meta crawlers - portals - bibliographic databases **Evaluate the results of the search in terms of validity of information found and its appropriateness in meeting the client's needs** The main knowledge and/or skills required are: - validity of information - reliability, accuracy and currency - measuring success of search in terms of client's requirements -- sufficiency, format and language - structuring and saving of search results for presentation to client, later retrieval, future updating **Assessment** The unit is assessed through four short searches and one extended search. These will be searches related to typical information needs of public library clients. Some examples are: **Short Searches** Finding out: - the current community charge rates in your locality - the sequel to a novel which the client has recently read - the post code of a firm for which the client knows name, street and town - whether UK citizens require a visa to visit Thailand **Extended Search** A client wishes to explore the topic of asylum seekers in Britain. You would produce information giving Government policy, views of other political parties, statistics on immigration etc. ## Defining the precise nature of the enquiry in conjunction with the client ### The Reference Interview Defining the precise nature of the enquiry in conjunction with the client is often referred to as the **reference interview**. However, you may not carry this out face to face. Instead you may carry out the interview over the telephone or through a series of e-mails. It is undoubtedly easier and quicker though if you can manage to meet the client. There are three main stages here: - Finding out what the client wants to know - Finding out why the client wants the information - Finishing off the reference interview #### Finding out what the client wants to know Before you can answer a question posed by a client, you must **find out exactly what that question** is. Experienced colleagues will be able to tell you of many situations where there has been a **misunderstanding** with a reference client, resulting in wasted time and effort and sometimes embarrassment. Whichever means of communication you use, do remember that the reference interview is a **two-way interaction** or **dialogue** and you must take responsibility for the **efficiency** of the communication process. The interview is likely to begin with the client asking you a question. Your task is to probe further until you are **fully satisfied** that you are clear exactly what the client wishes to find out. Remember to ask for **clarification** from the client about the topic, e.g. ask them to spell uncommon words, expand on the topic under investigation etc. #### Finding out why the client wants the information It is extremely helpful if you can establish early on in the interaction the reason **why the client wishes the information** requested. Tact may be required here, however, as some clients may be unwilling to give this information. This is especially likely where the enquiry is of a **sensitive or confidential nature**, such as a medical or financial problem. If the client appears uncomfortable or evasive when asked why the information is being sought, then it is unwise to probe further. You should ascertain the **starting point** of the enquiry in order to avoid time being wasted on finding information which the client already knows. Ask whether the client has already undertaken any research on the topic and what the results of this were. This can give guidance on successful and unsuccessful information searching approaches. But do not write off a particular approach just because a client assures you that it has yielded no information. Remember the client is not an information specialist -- you are! -- and so the client may not have searched as thoroughly or as efficiently as you would. #### Finishing off the reference interview By the end of the reference interview you should be confident that the nature of the enquiry has been fully explored and that the information required by the client has been specifically defined. The reference interview also provides the opportunity to establish any special needs of the client e.g.: visual or auditory impairment. And finally, do remember to record contact details for the client. In the excitement of exploring the enquiry and establishing the client's precise needs, it is all too easy to forget this important information. So make sure that every reference interview ends by your recording name, address, telephone, fax, e-mail details, as appropriate. If you will be phoning the client, it is also polite to note when it is convenient for the client to receive your call. YouTube How not to conduct the reference interview 1 Auckland City Libraries The reference interview 2 ### Spoken and written communication Good communication skills are key to the reference interview. This topic provides a good opportunity for practising and refining your communication skills. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, list the key factors you think would lead to good communication in a reference interview. Write these down on a piece of paper. ------------------------------------------------------------------------ #### Factors leading to good communication We think the important factors are: - Appropriate spoken language - Appropriate body language - Good feedback especially on the telephone - Good note taking skills - Clear and grammatical e-mails #### Spoken language You should use language which is appropriate to the client, avoiding talking down to the client or, at the other extreme, baffling the client with specialist jargon. If you do have to use a term which the client may not understand, e.g. "bibliography", be sure to explain it. For example, how would you explain "search engine" to a client who is not familiar with this term? You might say something like "A search engine allows you to search for websites related to a particular topic. To use a search engine, you have to choose and type in appropriate key words describing the topic #### Body language In face-to-face situations, use appropriate body language designed to set the client at ease and promote effective communication. Smile and greet the client by name if possible. Lean forward slightly and use eye contact to show your interest in the conversation. Try to carry out the interview in a place where both you and the client are sitting comfortably and at the same level, preferably side by side. What would you deduce from the body language of a client who fidgeted during the reference interview? The most likely explanations are that the client: - is in a hurry, perhaps because of another appointment - may feel nervous in the library environment or about asking for your assistance with their query. Test your understanding of body language with this simple quiz - <http://www.kent.ac.uk/careers/interviews/nvc.htm> #### Feedback With telephone communications you will have to be careful in order to make sure that you fully understand what the client says because you will get no clues from their body language. You should use appropriate feedback techniques to ensure understanding of the client's responses. For instance, you might: - Rephrase what the client has said and repeat this back to them - Ask if you can read out a summary of the enquiry based on the notes you have made. See if you can pick up clues from the tone of the client's voice. Conversely, make sure that your tone is positive and encouraging. Smiling as you speak into the phone generates a pleasant tone of voice which encourages helpful responses. #### Note taking In both face to face and telephone interactions, it is essential to take **written notes** of the main points of the conversation. These notes are your reference for checking that you have fully understood the details of the client's enquiry. You may have to put the query on one side for actioning later or you may pass it on to a colleague to deal with. In both cases a written record will be essential. #### Writing e-mails If you are using e-mail to communicate with the client, it is important to establish a cordial tone while remaining concise and to the point. Writing clearly and grammatically is key to this, as is structuring your e-mail so that the client can follow it easily and respond appropriately. The correct sequence for actioning an e-mail enquiry is as follows: 1. Thank the client for the enquiry 2. Summarise what the enquiry consists of 3. Give your proposals for how you will action the enquiry 4. State when you will provide the search results 5. Request confirmation from the client that your proposed actions and timescale are acceptable ### Open and Closed Questions In the reference interview, you will use both **open and closed questions**. These have different uses. It is important to be able to distinguish between the two types of question and to use them appropriately. **Closed questions** prompt yes/no or short factual answers, such as: Q. What time did you come to the library? A. 9 o'clock Q. Is your daughter called Amelia Austin? A. Yes Closed questions are mainly used in the reference interview context to: - elicit specific pieces of information from the client - gain confirmation that the your understanding of what the client has said is correct - an important feedback tool The following are examples of closed questions: *Do you use a left-handed mouse?* This is a closed question which will be answered by yes or no. *What is the charge for printing a page of A4 text?* This is a closed question which will be answered by a specific sum of money such as 10p. **Open questions** encourage longer answers, such as: Q. Why did you ask for a dictionary? A. I wanted to check whether there was a difference in meaning between "main" and "mane". The main uses of open questions in the reference interview context are to: - establish rapport with the client - set the scene for the enquiry - gain background information which is relevant to the enquiry The following are examples of open questions: *What will your students be using this information for?* A typical reply might be: \"These are students undertaking an initial course in professional cookery. They will need the data to understand the calorific content of the foods in the recipe." *Can you tell me how you went about looking for this information?* A typical reply might be: \"I started off looking up autism in the encyclopedias but the information was too general and not up to date enough. You will use both open and closed questions at appropriate times. When framing a question, always think of the type of response you hope to generate and word the question so as to encourage either a brief or an extended answer. ### Nature of information required Apart from the actual topic of investigation, there are other factors which need to be taken into account before a member of library staff will embark on the information search. There are three main factors: - the quantity of information required - the level of information required - the format of information required #### Quantity What appears to be the same request for information could produce results differing in quantity by orders of magnitude. You must clarify the scale of information required by the client in order to fully satisfy their needs. It may be that reference to a single book or website is required. Alternatively many in-depth sources of information may be required so that the client can analyse a breadth of opinion on the search subject. Providing too much information is just as unhelpful as providing too little. #### Level It is essential that the information provided is at a level of complexity which enables the client's full comprehension but does not patronise the client or tell them what they already know. The following points are a good guide: - the client's age (but remember age does not automatically bring wisdom!) - the client's educational attainment - the client's display of specialist knowledge - the client's linguistic ability - whether the information is intended for the client themselves or for use by other people. Tactful questioning can be used to make an estimation of the points listed above. #### Format The results may include information in various formats. Difficulties may arise if the client has expressed an initial preference for a format in which the information is not actually available. If the information is only available in a limited number of formats, you must alert the client to this and ascertain if any of these formats are acceptable. If the search is not carried out with the client present, you must ascertain if the client can visit the library at a later time to access the search results or if the information must be in a format which can be e-mailed or posted to the client. There are many formats available, including several as a result of the introduction of ICT. Your search may direct the client to items of library stock, to be used in the library or borrowed for home use. This could include: - Printed reference sources or information CD-ROMs - Books, audio or video material for home borrowing - Magazines and journals - Pamphlets or leaflets The search results may be bibliographies or lists of website references for the client to follow up. The results may be viewed on screen by client, in the form of text, audio or video. ## Create a search strategy to fully satisfy the client's enquiry ### Choosing search terms Searching for information using the most appropriate key words is important in any reference enquiry. But it is arguably even more important in an Internet search than when you are looking through printed indexes. When carrying out a manual search, the human mind can make links and jump from one search term to another. Computers on the other hand stick strictly to the script and will only find information which matches what you have instructed them to look for. Let's look at how you can derive the search terms for an enquiry. You must be able to analyse a topic and break it down into its component parts. At its simplest you just extract the significant words, usually the nouns and verbs, and use these as search terms. An example would be a client asking for information about "How would you cook a vegetable like fennel?" Which word(s) would you choose as search term(s) in this enquiry? The best choice would be \"cook\" and \"fennel\" - these two words are the essence of the enquiry. \"How would you\" is too general and \"vegetable\" would only be needed if there was some ambiguity over the nature of fennel. The above is not necessarily true depending on the search tool you are using. For example if you use YouTube and type in - how do you\... for almost any subject you will find video showing exactly what you want to know. #### Examples of search terms Here are some further examples of enquiries where you would be able to use one or more words from the client's initial question as search terms. The search terms are in bold. I need some advice on keeping a **greyhound** as a **pet**. What are the **symptoms** of **diabetes**? Who is the **chief executive** of **CILIP** (the Chartered Institute of Library and Information Professionals)? What **colour** is the flower commonly known as **ragwort**? Of course, the question as posed by the enquirer may not contain words which are the best search terms. You may need to think of alternatives in the form of synonyms (words which mean the same) and words related to the terminology used by the client. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.1** List some reasons why synonyms and related words might be better search terms. ------------------------------------------------------------------------ #### Synonyms It is important to consider synonyms of a search term because the word given to you by the client may be one of many which describes the concept to be searched for, e.g. if a client wishes to know about illness, it may be useful to carry out a search with the word disease instead. Try this example for yourself. Carry out two searches using the same search engine, the first with sports competitor as your search term and the second using sports opponent and look at the differences in the results. The term suggested by the client may be a less commonly used or out of date expression, so it is vital to think of more usual or appropriate synonyms. The client might ask about Ceylon when requiring information about the country now known as Sri Lanka. It would therefore be appropriate to search under both Ceylon and Sri Lanka. If you have time test your knowledge of the English language here - <http://www.kent.ac.uk/careers/tests/synonyms.htm> #### Related terms Sometimes it is useful to use a related term for the word given by the client. When a client asks for information on malnutrition in Africa, a related term could be used instead of the rather broad one. An individual country could be substituted, such as Sudan. Of course, you must take into account that using related terms can change the nature of your search. In this example, using Sudan will give you results which are influenced by the particular problems suffered by this country which differ from other parts of the continent. Can you come up with one or more potentially useful related terms in searching for each of the following? - web 2.0 applications in a library context - genetically modified crops - popular music in the 1960's - saving using insurance policies - capital punishment in the USA Some examples are: For web 2.0 applications you could use social media For genetically modified crops: Frankenstein seeds, Monsanto, soya For popular music in the 1960's: the name of any singer or group from this era -- the Beatles, Dusty Springfield For capital punishment in the USA: death row, electric chair, gas chamber, names of individual states where capital punishment is used e.g. Texas Another aspect to be considered when choosing search terms is that while the client may give you descriptive terms for the information required, it may be more effective to search on actual names of individuals or organisations or concepts. Taking the earlier search regarding malnutrition in Africa, the description malnutrition could lead you to search using the key words World Health Organisation. This will lead to the WHO site where information on diseases in specific African countries is quickly located. Can you come up with a name of an organisation or individual which could be a useful specific term in searching for each of the following? horse racing the royal family relativity theory college courses There are many related terms which apply to each of these. Here are the examples which we thought of: Shergar, British Horse Racing Board The name of any member of the royal family, such as the Prince of Wales Albert Einstein The name of your local college Note that the previous three techniques depend both on your ability to interpret the client's description and on your own general knowledge. With experience and in discussion with knowledgeable colleagues, your skills will increase. #### Ambiguity You should also keep in mind that some words are ambiguous. China can mean a country in the Far East or pottery products. The English language is particularly rich in such ambiguities. In the reference interview you will have clarified the meaning of any such ambiguous words. Now at the search stage, you should either use a non-ambiguous synonym (if one exists) or add an additional search term to remove the ambiguity. Some simple examples are: Cycle -- is it the bicycle or a rotation? Yarn -- could mean thread or a tall story. Kids -- could lead to children or young goats. ### Structuring an Internet search As an information professional, you need to know all the shortcuts to information that client's request. This means more than just typing search terms into Google! Structuring the search involves the choice of different search engines, metacrawlers, directories and portals or, where you are already familiar with appropriate websites and their content, direct interrogation of these. In order to search effectively on the Internet, you need to be familiar with the different types of websites used to search for information. Three general types are the search engine, the metacrawler and the directory. Each operates and is used in a different way, although several sites incorporate more than one type. For example the Google site consists of both a search engine and a directory. #### Search Engines A **search engine** is a website that allows you to input words representing your search terms and uses these to come up with a list of websites which should be relevant to your search. Repeating the same search using different search engines may lead to different results due to the way in which the various search engines search the web and order the sites found. You should have experience of a selection of search engines to understand their similarities and differences. It can be illustrative to make identical searches on a number of search engines and observe the different results. There are many different search engine sites. It is important to have a grasp of a few of the most important sites, i.e.: those that lead quickly to useful information. This can be because they specialise in a particular sector are well funded and thus comprehensive. (Such sites are popular and so command large fees for their advertising services.) ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.2** Start by familiarising yourself with some of the popular search engines which will be important in your information searching. Go to each search engine listed below and try out the search term **British planes**. Do not bother to use capital letters in the search terms as the search engines do not really take them into account. Note down what you find in the layout and types of information displayed. ------------------------------------------------------------------------ You will find four rather different results. Even if the same results were displayed (which is unlikely given the slightly vague search term), each search engine presents the information in a different manner. #### Differences between search engines Google and Yahoo are somewhat similar with a simple list but Google presents Wikipedia pages and news near the top. Ask Jeeves starts off with a list of commercial sites, all wanting to do business with you and only lower down shows you 'real' results. But in its favour, there is a list of related searches down the right hand side. Clusty is at first similar with a list of results and a few advertisements but there is a very useful feature in that down the left hand side, it clusters the results in categories which it has discerned. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.3** Try Clusty out with the search term **organ** and you will see the value of the category feature. Because organ is ambiguous as a search term, Clusty very neatly categorises its results into organ as a musical instrument and parts of the body. You can see that in this way Clusty can lead you to a set of results more focused that the other three search engines. ------------------------------------------------------------------------ Of course none of these search engines is perfect and it would unwise to rank one above another. #### Compound queries Note that our search terms consisted of two words, **British** and **planes**. When you look down the results at all four websites, you will see that only sometimes are the two words adjacent and that some of the results only have one of the words present. Most search engines have the convention that to indicate the compound term the words should be in quotes i.e.: **"British planes"**. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.4** Try this out with **Jersey cows**. Enter the two words with and without quotes and compare your results. ------------------------------------------------------------------------ Try to get as much experience as you can in using different search engines. You will learn that although using only Google, say, will give you lots of results, the use of a few different engines may give you a better overview of the range of information available for any chosen search topic. #### How search engines work It is helpful to know a little about how search engines work. In simple terms, they search the Internet and look at the websites and their contents. They index the information they find on the site and in the metadata descriptions placed on each site by its creator. This information is used to lead from your search terms to the results. Of course each search engine uses its own particular methods. You can find out more about this either by doing a search or looking for information on the actual search engines. This matching does have its pitfalls and if using ambiguous search terms you may get at best many useless results and at worst offensive ones. #### Metacrawlers Based on the maxim that more is better, Metacrawlers apply your search terms to several search engines simultaneously. Metacrawlers come in many forms and are sometimes described as **meta search engines**. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.4** Familiarise yourself with some of the popular metacrawlers which you can use in your information searching: Go to each metacrawler listed below and try out the search term **British planes**. - **Dogpile** at <http://www.dogpile.co.uk/> - **Surfwax** at <http://www.surfwax.com/> - **Mamma** at <http://www.mamma.com/> - **Ixquick** at <http://www.ixquick.com/eng/> Note down what you find in the layout and types of information displayed. ------------------------------------------------------------------------ Again there are different results and some very different layouts. One major reason for using metacrawlers rather than individual search engines is that you hope to get a good spread of the best information. We would suggest that this works best early in a search to get and idea of the breadth of the information available. Using a metacrawler also saves you having to visit each of the individual search engines. #### Web directories Unlike search engines, web directories do not search for you but are arranged as an alphabetically ordered index to the web, developing into a **tree structure** of levels of sub-categories. This is somewhat similar to the subject index in a print encyclopedia. Directories can be very useful in allowing you to home in on the general area of a reference search. However there are countless directory sites, many of which are poorly maintained. Poor maintenance manifests itself with broken links or links to inappropriate material. You should make yourself familiar with the good examples of directories and we will examine some of these now. General purpose directory sites are provided by many search engines: Google and Yahoo are examples. Most confusingly they show both the categories which you can descend and a search facility which looks like the web search but is in fact used to search the categories. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.5** Examine some of the general purpose web directories which you can use in your information searching: Go to each directory listed below and try to look for information on flower arranging: - Yahoo at <http://dir.yahoo.com/> - Open directory at <http://dmoz.org/> ------------------------------------------------------------------------ #### Differences between directories and search engines One key difference between the directory and the search engine is that the entries in the directory should be compiled 'by hand' and not through automated searching. This may be seen as an advantage if you consider that a human is better at categorising the sites i.e. spurious sites may be eliminated. We feel that the really useful directories are the more focused relating to environmental information. You can also appreciate that browsing through the tree structure of the directory can be time-consuming and will not automatically lead to a result. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.6** There is a tremendous amount of information available at <http://searchenginewatch.com/> covering every conceivable aspect of information providing websites. Have a look at this website for further tips. ------------------------------------------------------------------------ An alternative approach is the use of Portals. #### Using portals A portal is, at its most general, a website which offers grouped links leading to information. General purpose portals, such as www.msn.co.uk or www.yahoo.com, are often used as home pages by users and have links to life style sites. These sorts of general portals are rarely of use in answering information enquiries. Some more specialised portals are tailored to be used say, to provide a child friendly web experience (e.g.: <http://home.disney.co.uk/>), as they give relative safety from inappropriate material. Other specialised portals focus on particular topic areas and it is these which can save you time in answering reference enquiries. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.7** Familiarise yourself with some of the portals which you can use in your information searching. Go to each portal listed below and get a feel for the information you could access through it. - **DirectGov** at <http://www.direct.gov.uk/Homepage/fs/en> - **Wine.Com** at <http://www.wine.com/> - **Visit Scotland** at <http://www.visitscotland.com/> - **Irish Abroad** at <http://www.irishabroad.com/> - **Connects** at <http://www.connects.org.uk/> ------------------------------------------------------------------------ There are thousands of portals. With experience you will get to know a number of useful ones for sourcing specific information. #### Using bibliographic databases Bibliographic databases permit the retrieval of information in a variety of formats and media. Some of these are commercial subscription services, e.g.: www.booksinprint.com. You must be aware which databases your library subscribes to. If you do not know this already, check it out now. Other bibliographic databases which are free of charge include the catalogues of major libraries -- such as the British Library's catalogues containing over 12 million books, serials, printed music and maps. University libraries usually have online catalogue access, as do public libraries. Booksellers' databases can also be useful sources of online bibliographic information. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.8** Familiarise yourself with some of the bibliographic databases which you might use in your information searching: Go to each site listed below and get a feel for the information you could access through it. - **British Library** at <http://www.bl.uk/> - **Cardiff University Library** at <http://library.cf.ac.uk/> - **Blackwell's** at <http://www.blackwell.co.uk/> ------------------------------------------------------------------------ ### Frequently-used websites It is useful to acquaint yourself with sites of major organisations which hold information relating to commonly asked enquiries. Examples are government departments, your own local authority, major voluntary organisations and organisations of local interest. \-\-\-- ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.9** Familiarise yourself with some websites which will be important sources of information for you: Locate the Government's **Home Office website** and find the telephone number for General Enquiries Locate the website for your **local authority** and find a list of the local councillors Locate the website for the **UK Citizens Advice Bureau** and find the location of your local bureau. Locate the website for your **nearest airport** and find a list of destinations flown to. Now expand on this by thinking of other likely sources of specialised information and check out these websites for yourself. ------------------------------------------------------------------------ #### Internal searches As well as using search terms in search engines, you should notice that you can conduct a search within a website using the internal search facility provided by the site. A good example is the search facility within www.scottish.parliament.uk which permits searching by subject terms within specific areas of the site and for specified types of documents. This site has both simple and advanced search facilities. Use the Advanced Search facility to find **debates in the chamber** which relate to **apprenticeships**. ### Website suffixes When you are looking at websites, it is useful have an understanding of implications of the common suffixes used in the addresses for websites (called URLs). Some suffixes give a clue about the nature of the organisation which owns the website. Note, however, that for some suffixes there is no absolute fixed rule for their use. Thus you would find that gov.uk always indicates a local or national government site in the UK. By contrast, although .org suggests a non profit-making organisation, there is no guarantee that this applies to every .org website. Here is a list of common organisational suffixes and their meanings. - **.ac** **Academic** - **.biz** **Business** - **.co** **Commercial** - **.com** **Commercial** - **.edu** **Educational** - **.gov** **Local or National Government** - **.int** **International** - **.net** **Network** - **.org** **Non profit making** #### Geographical suffixes There are also **geographical suffixes** with .uk for the United Kingdom and .ie for the Republic of Ireland. The United States is the only country which does not use a suffix. The .us suffix exists, but is seldom seen. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.10** Go to <https://www.norid.no/en/om-domenenavn/domreg/> or another similar site and find the suffixes for Internet sites for the following countries: - **Australia** - **Canada** - **France** - **Germany** - **India** - **Pakistan** ------------------------------------------------------------------------ ## 1.3 Evaluate the results of the search ### Validity of information Information found on the Internet can sometimes be problematic. It is always important for the information professional to validate information found during a search, whether this results from printed or electronic sources. However, the information found in reference books and other printed materials in public libraries has usually undergone a rigorous selection process. Thus some of the validation of information has already taken place through the selection process. This is not the case with Internet sites. Individuals or organisations can, at almost negligible cost, upload information to websites which are then accessible throughout the World. Such sites may present information which is out of date, biased to one point of view or just plainly wrong. So all information found on the Internet must be critically evaluated. This is an important role for the information professional. Non-specialists are less likely to query the information found on the Internet -- perhaps they assume that it has been vetted in some way, just like the reference books in our libraries. There are three main criteria for validating information: **reliability**, **accuracy** and **currency**. #### Reliability There are a number of criteria which can be used to give you confidence in the **reliability of the information** on a website. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, list what you think are the criteria for establishing the reliability of a website. ------------------------------------------------------------------------ #### Reliability criteria We think that the following three points are very important: - **the expertise and reputation of those connected with the website** - **evidence of lack of bias** - **evidence of equal emphasis towards all aspects of the search topic** #### Expertise and reputation If you can see that the website is supported by a reputable organisation or contributed to by a person with known expertise then it is reasonable to accept the website as being reliable. Examples would be where a website giving medical advice was run by a government department or a well respected charity e.g. **NHS direct** at <http://www.nhsdirect.nhs.uk/> or **Cancer Research UK** at <http://www.cancerresearchuk.org/> Another more trivial example is that you would expect to find reliable recipes at **Delia Smith's** website <http://www.deliaonline.com/> #### Lack of bias Individuals can be **biased** in their opinions. Even well known experts may **represent only one aspect** of a topic. Many websites by their very nature present information from only one viewpoint and are thus biased. While such information need not necessarily be excluded from the results presented to the client, you must indicate any identified bias and, if possible, provide information from other sources which present opposing points of view. This is particularly important when the client is seeking information on **potentially contentious matters** such as politics, religion, race or issues related to pressure groups. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.1** As an exercise in looking for bias in websites, search for a pair of websites giving opposing points of view on the following topics. - keeping a monkey as a house pet - the need for the UK Monarchy - the greenness of nuclear fuel - the usefulness of homeopathy ------------------------------------------------------------------------ #### Opposing views The following example sites were available at the time of the latest review of this section. - Opposing views on keeping a monkey as a house pet can be found at **Pet Assure** <https://www.petassure.com/maxscorner/can-monkeys-make-good-pets/> and at <http://www.aspca.org/adopt/adoption-tips/exotic-animals-pets> the website of **American Society for the Prevention of Cruelty to Animals**. - Opposing views on the need for the **UK Monarchy** can be found at the official UK Monarchy site at <http://www.royal.gov.uk> and a Marxist perspective at <http://www.marxist.org.uk/> - Opposing views on the greenness of nuclear fuel can be found at the **Greenpeace** website <http://www.greenpeace.org.uk/> and that of the **World Nuclear Association** <http://www.world-nuclear.org/> - Opposing views on the usefulness of homeopathy at the site of the **British Homeopathic Association** at <http://www.trusthomeopathy.org/> and the **National Council Against Health Fraud (NCAHF)** Position Paper on Homeopathy found at <http://www.ncahf.org/pp/homeop.html> Although the exercise and the results may seem a little trivial, it is useful. The problem when you are faced with queries about these sort of contentious issues is that you will initially retrieve a site as a result of your information search which gives only one side of the case. You must then search for the opposite, just as you have done here. #### Equal emphasis Emphasis differs from bias in that it is **omission of information** rather than deliberate over-statement of one point of view. For example, US sites may devote little space to British developments. Another pertinent example in UK public libraries is that sites for UK government departments may include information only for England on devolved issues. You should be aware that **emphasis can be more difficult to detect than bias**. A solution is to apply the technique of **cross checking** with other sites on the same topic. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.2** Look at the government website for the Department for Education <https://www.gov.uk/government/organisations/department-for-education> . Education is a devolved responsibility and thus varies considerably between the four UK nations. Much of the information on the DfES website applies only to England and sometimes Wales. Compare the information about literacy strategy in schools with that given on: - <http://www.deni.gov.uk> **Department of Education Northern Ireland** - <http://www.scotland.gov.uk/topics/education> **Scottish Government Education and Training** - <http://www.learning.wales.gov.uk> **Welsh Assembly Government Education and Skills** ------------------------------------------------------------------------ #### Accuracy When you are looking for factual information you can usually assume that a reliable site based on the points above will attempt to provide correct data. However, mistakes can be made and you should cross check data using more than one reliable site wherever possible. #### Currency In using the Internet you often come across websites which are seriously out of date. In fact some of them are actually abandoned and will never be updated again. When you use websites in your information searching, you must make sure that the information is current. Of course with a reference book you can look at the publication date. However for websites it is not just so easy. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, list some points you could look for on a website to establish its currency. ------------------------------------------------------------------------ #### Establishing currency We can think of a few possible ways of establishing the currency of a website. Obviously they depend on finding date information. This can be explicit: - You can check the **"Last revised"** date on a website. This is usually found on the first screen. Note that this may only indicate the last time a change was made to a particular part of the website and that it does not imply that **all** the content was updated on that date. - You can look to see how recent are the **publication dates** of the documents referred to on the site - You can look out for **dates quoted** within text and make an estimate of currency - You might find a **"Forthcoming events"** list where all dates should be in the future, or in the very recent past. In the absence of any explicit date information you may need to look at Indirect methods of establishing currency #### Indirect methods of establishing currency If there are no actual dates mentioned, you will need to look for more subtle indications that the site is regularly updated. - You can look for **regulations or laws** mentioned in the site and find their dates of introduction. - You can look for the **names of institutions or Government departments.** These do change name and can be used to give a date range. - You can look for the **names of personalities** involved in the topic which can show currency. - Finally you can simply look for reference to **recent news items** which will date the site's information. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.3** Look at <http://www.bbc.co.uk/comedy/littlebritain/> This is a reputable site and it clearly states whether the site has been recently updated. ------------------------------------------------------------------------ ### Measuring the success of a search At the start of the enquiry process, during the reference interview you should have determined clearly the client's requirements. At the end of the enquiry process you must review the results of the search against these requirements in order to check that the search has been fully successful. In some cases you may not be able to fully satisfy the client's requirements. If this happens, the reasons for this must be explained to the client e.g.: information does not exist in the format specified. You should propose some **alternatives** if these are possible. There are three main criteria, **sufficiency**, **format** and **language**. #### Sufficiency Is there **enough information** or **too much?** If it is a straightforward fact being sought then you should have no difficulty here. However for a more complex search you must make sure that you have not overdone the amount of data retrieved to prevent swamping the client and if necessary trim it a bit. Conversely you must check that you have supplied enough information. If the client suggests that more would be appreciated, you can indicate tactfully that you have provided what was asked for but offer to search further if required. #### Format Make sure that the client's requests for **particular formats**, such as text, print-out, e-mailed results, audio or video have been met with. #### Language You should make sure that the client's requests for information in a **particular language** have been followed. ### Structuring and saving of search results The raw data should be presented in a structured way which facilitates understanding by the client. In particular, it is important for the client to be informed of the **source(s)** of the information found. For **simple searches**, the result is likely just to be a **short statement of fact**. Here all that is required is that the information is presented **clearly** and **unambiguously**. However simple the information, we do recommended that it is given to the client in writing and that you keep a copy. That way there can be no argument later about the results. And having a written record means that the client does not have to depend on their memory to recall the information. For searches which result in a considerable amount of information, you should present the results in some sort of **logical order**. Different orders suit different types of enquiry. #### Ordering results You might adopt one or a combination of: - **Following the progress of the search** -- "First I looked at the Food Standards Agency site and this told me....., then I moved on to the Association of Farmers Markets where I found.... etc. - **Geographical order** -- grouping information from a country together - **Chronological order** -- to show how a topic developed - **Alphabetical order** -- if the result of the search is a list of references - **By point of view** -- information on one side of the argument, then the opposing side. These are only some possibilities and you should not feel compelled to choose one of these. The important thing is that your structure for presenting the information suits the topic and is helpful to the client. #### Bibliographic references If the results of your search include **bibliographic references**, these should be quoted in a consistent and accepted style. You can find advice on this on the websites of most universities. A good example is Anglia Ruskin University <http://libweb.anglia.ac.uk/referencing/harvard.htm> or you could try the University of Warwick at <http://www2.warwick.ac.uk/services/library/main/help/guidespublications/bib_cit/> It is important to realise that your search and its results represent useful work, which does not simply end when the results are handed over to the client. We can think of two straightforward cases where reference will be made to your work in the future. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding write down two possible reasons for archiving searches for future use. ------------------------------------------------------------------------ #### Archiving searches Ignoring the possibility that the first client loses the data and wants another copy of it (this can happen!), the most likely scenario is that another client comes into the library and asks the very same query. Here, if you have stored the enquiry information properly, you can simply go to the search and produce a copy of the results. In this case, the search results should be archived in such a way that the search can be retrieved by appropriate key terms. These will be subject key words. Ideally the library should have a formal system for recording the results of **frequently asked questions**. You should be aware if your library service does this and, if so, make sure that you know how to add your information search results to this. #### Frequently asked questions One good example of a library database of frequently asked questions is Edinburgh University's "Previously AnsweRed Questions -- PARQs". ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.4** Examine Edinburgh University's "Previously AnsweRed Questions -- PARQs" site on <http://www.lib.ed.ac.uk/faqs/parqs.shtml> and find the answer to the question "How much did the Forth Bridge cost?" ------------------------------------------------------------------------ We think you will agree that this facility is very easy to use. Note how, in addition to answering the questions, the site points the enquirer to further sources of information by means of hyperlinks. If your library service does not have a formal service-wide system like this, you should consider setting up a simple version for yourself and colleagues at your service point. This is relatively simple to do using a database package available in your library. #### Updating data Another situation where you may wish to revisit your search is where the same client reappears and wants you to **repeat the enquiry** at a later point in order to **update the data** or **include new developments** which have taken place since the original search was undertaken. In this case it is important to save not just the **search results** but also the **search strategy**. You will need to repeat the strategy in order to update the information found the first time. You may find that certain enquiries have a habit of repeating at the same time each year. An example would be where pupils always undertake a school project on a particular topic at the beginning of each academic year. You know that every September a group of 12 year olds will descend on your library desperately seeking information on young people and drugs in the locality. In this case, you can even prepare yourself in advance by repeating your search **before** the question is posed, so that you are prepared to assist the young people with their information needs.
# Applications of ICT in Libraries/Supporting Reader Development This page is designed for the use of students undertaking the **Level 7 PDA** (previously called Diploma) in **Applications of ICT in Libraries**. This qualification was developed by the **Scottish Library and Information Council (SLIC)** and are validated by the **Scottish Qualifications Authority (SQA)** **Supporting Reader Development** is an optional unit in the programme. Information regarding the **background to the courses**, **content** and **certification opportunities** can be obtained by following the old (Diploma ICTL) or Level 8 PDA (Advanced Diploma ICTL) links. Further information can be obtained from **angela.lees@sqa.org.uk** # Objectives of reader development In recent years libraries have moved towards fostering reader development, a more reader-centred approach. A good definition of reader development is: \'\'\'active intervention to: - increase people's confidence and enjoyment of reading - open up reading choices - offer opportunities for people to share their reading experience - raise the status of reading as a creative activity\'\'\' (See <http://www.openingthebook.com/reader-centred-library>) Add alternative definitions below. # Reader development techniques Reader development is not about reading "better" books, in the sense that these are more worthy literary titles - the objective is that the reader relishes the reading experience and reads the books with a sense of satisfaction. Reader development can involve: - reading promotions - use of genres - literacy initiatives - reader centred selection skills ## Reading promotion It is important at the outset to distinguish between reading promotion and reader development. A reading promotion aims to market a small number of titles while reader development sells the whole reading experience and what it can do for you, rather than promoting individual books or writers. That said, however, reading promotions can still play an important role as part of a wider reader development programme, as they can alert readers to titles which they might otherwise remain unaware of. Reading promotions may be local (within the library or local authority library service), national or even international. Reading promotions focus on small or moderate numbers of book titles which are grouped together and marketed as a list or reading pathway for the client group. This group might be adults, younger clients or clients with special needs or specific language requirements. Sometimes, language, subject or publisher links them together. Although reading promotions are not reader-centred (their objective is to increase sales or issues), they do bring books to the attention of readers and may attract new readers because of their display and supporting print materials. Grouping books together in a promotion centres the reader's attention on them and will lead to increased client use of this stock. **Activity:** Find some examples of recent book promotions in which your library service has participated. Discuss with colleagues what was successful or unsuccessful about these promotions. ## Current book promotions There are so many book promotions that we could not attempt to give a comprehensive listing. However, here are three examples of current book promotions which could be applicable to public libraries, together with our comments on these. Maybe some of them were included in your list. ### Richard and Judy's Summer Reads <http://www.richardandjudybookclub.co.uk/> Celebrities Richard and Judy promote reading through their Summer Reads and Book Club. Whilst this is a small range of titles, these titles receive a high profile in the media and outlets like supermarkets, bookshops, stations and airports. It is always important to be aware of what is in the media spotlight, as requests from clients will follow. Richard and Judy's titles are contemporary paperback fiction. ### Welsh Book Council <http://www.cllc.org.uk/hafan-home> This website promotes access to books by Welsh publishers and contains useful reading suggestions for readers. It is important that local/national authors and publishers are promoted to encourage and sustain the growth and development of the local/national cultural industry. In addition Welsh/Gaelic language material should be made available to meet the needs of readers. ### Mills and Boon <http://www.millsandboon.co.uk> Mills and Boon publishers are well known for their range of romantic fiction. Their website includes a large number of titles but it will only appeal to a limited group of readers and has a commercial rather than reader-centred objective. # Genre A genre is a "family" group of books which share style, form, or content, e.g.: crime fiction. **Activity:** List other fiction genres which are common in public libraries. ## Fiction genres When you look round any bookshop or library, you see that it is possible to group fiction into many genres. New genres emerge all the time -- a few years ago, for instance, "chick lit" was unheard of; now it is one of the best selling fiction genres. The most common fiction genre groupings are: - literary fiction - crime - romance - fantasy and sci-fi - blockbusters - historical - short stories - westerns - defined by country, e.g.: Canadian literature ## Arranging collections by genre Many libraries organise part of their fiction collection by genre and the identifying spine labels for the different genres (e.g.: a gun for crime) will be familiar to many library clients. Libraries do this to help clients who habitually read, for example, crime novels. This means that clients regularly go to the same area of stock for their reading material and can miss out on wider reading choices. Some might argue that arranging the non-fiction stock using a classification system removes the need for genres in this area of the library. However, many libraries use genres for some of their non-fiction stock. Common examples are biographies and travel books. For the client who is completely focused on one genre it is undoubtedly helpful if they find all the books in this genre in one place in the library. But the disadvantage of this approach is that it can discourage more adventurous reading. The client may never look beyond the few shelves which contain the selection of "his/her books", even though other books elsewhere could be of interest to them. While some clients will always limit their reading choices to a particular genre, others can, with support, can be led to enjoy reading across a wider range. # Literacy initiatives Literacy initiatives can make a significant contribution to reader development. Such initiatives exist at both local and national level. There are many literacy initiatives related to education. These include the **National Literacy Strategy**, **National Priorities for Education** and **Literacy Hour**. The ability to read fluently is an important life skill and opens doors to better job prospects, improved economic prospects and more leisure choices. In the UK, the issues are about low levels of literacy rather than illiteracy, but **23% of adults in the UK struggle with basic literacy**. The website of the **National Literacy Trust**, <http://www.literacytrust.org.uk> has lots of statistical information. Good functional literacy is important to the well being of individuals as well as the economy of the country and reading/writing abilities are essential for everyday tasks such as writing shopping lists, texting and using medicines properly. Government initiatives to improve literacy in education include the introduction of the **Literacy Hour**. The **National Literacy Trust** was established in 1993 to improve skills, confidence and pleasure in reading. The NLT goes wider than formal education and there are well-developed national networks for Adult Literacy and Numeracy support and development. **Activity:** Go to <http://www.literacytrust.org.uk/projects_networks> and look at the details of the latest literacy initiatives applicable to libraries. Choose those of interest to your own library service and consider how you could use them as part of reader development. ## Examples of literacy initiatives In England, **The Reading Agency** brings libraries and adult literacy together in partnership and promotions include **Got Kids?** **Get Reading!** and **First Choice**. The Reading Agency runs an annual literacy initiative - the \'Six Books Challenge\' aimed at adults and learners in further education. You can find out more at <http://readingagency.org.uk/adults/quick-guides/six-book-challenge/> In Scotland, the **Big Plus** brand promotes adult literacy and numeracy. There is a partnership between **Communities Scotland's Learning Connections** and libraries which is developing projects, collections and providing training. <http://www.thebigplus.com/about/About_The_Big_Plus> **Activity:** Browse through the following literacy related websites for younger clients. Do any of them have activities which you could link into or adapt for your library service? Note: most of these sites give links to other related sites which may also provide you with inspiration. **The Child Literacy Centre** <http://www.childliteracy.com> **My home library** <http://www.myhomelibrary.org> # Reader-centred stock selection When choosing stock it is important that you consider the reading preferences of clients. Using reader-centred selection skills in general stock selection is good practice. You will keep your clients' reading preferences in mind as you take account of current demands, gaps in stock, levels and formats of stock and the condition and currency of stock. You may need to think about developing specific areas of stock. You may also need to select specific items or generate lists for individual clients and their meeting their needs should be the focus. Later we'll discuss what is involved in carrying out an interview with the client to establish their reading history and preferences and in building a reader-profile. Following on from that you will draw on your knowledge of the reading resources available in order to develop a reader-centred list or pathway. Here we discuss some of the resources which are available to assist you in stock selection. Activity: Make a list of the range of resources which are available to you when you are selecting stock to recommend to a reader whose reader-profile you have established. Remember you can be accessing stock which already exists in your library service or you may be ordering new stock for the client. ## Resources For stock within your library service you will use the library catalogue and themed lists such as the Quick Reads collection for emergent readers: <http://www.quickreads.org.uk/> To identify new stock you can use online sources -- there are many online selection tools which are useful in locating resources which your own service does not have. Examples include: Scottish Bibliographies Online: <http://www.scotlandsculture.org/sbo/sbo.htm> Which Book - for widening fiction choice (with reviews from library staff) Other resources for assisting in stock selection include: - catalogues of other libraries - bibliographies - review journals - publishers' lists - pre-publication lists - specialist suppliers - showroom and bookshop visits - trade publications ### Library catalogues Online library catalogues can assist you in your search for appropriate material. Most UK library catalogues can be searched via the Internet. The UK Public Libraries Page <http://dspace.dial.pipex.com/town/square/ac940/weblibs.html> is a useful resource, linking to the web-available catalogues. Some services "clump" together the catalogues of several libraries. A single-search interface is used to cross-search multiple catalogues in a single search action, such as <http://www.ni-libraries.net/> for Northern Ireland or CatCymru for Wales <http://library.wales.org/catcymru/> ### Bibliographies A bibliography is a list of materials on a particular subject or by a particular author. The publication, in either printed or electronic format, is usually arranged by author, date or subject, and provides information such as author, title, publisher and date of publication. This can then be used to identify sources and place orders for clients. Activity: Find out which bibliographies are held in hard copy in your library service and consider how each might be of use to you for reader-centred stock selection. ### Review journals Review journals offer more information about books, articles or research than is found in bibliographies. A review will summarise the contents and make an evaluative statement about its contribution within its context. Good examples include newspapers such as: The Sunday Times <http://www.timesonline.co.uk> The Guardian <http://www.guardian.co.uk/> Remember though, however respected the journal or reviewer, reviews are the views of one individual and so need to be evaluated carefully. ### Publishers' lists Publisher's websites and lists offer useful information. Caution must be exercised when using these to select material as publishers and booksellers have a commercial imperative. So you must always apply your selection criteria. Books from Scotland (http://www.booksfromscotland.com) is supported by Publishing Scotland's website and highlights new books as does their Facebook page (http://www.facebook.com/pages/BooksfromScotlandcom/28776550495) and Twitter feed (http://twitter.com/scottishbooks). They also have an RSS news feed. ### Pre-publication lists These lists offer useful information about forthcoming publications. However, library staff know that they must be especially careful when using information from pre-publication lists as these lists may be produced many months before an item is actually published. In the interval between the pre-publication list and the actual publication of the item, the date of publication, length, format and price may change. ### Specialist suppliers Specialist suppliers are used to ensure that range and depth is developed within collections. This might be a particular interest, specialist language material, dual language material, or alternative formats such as Braille or for emergent readers. ### Showroom and bookshop visits Visits to showrooms and bookshops offer the opportunity to browse through the books. The downsides are that the range is limited to what is available in stock and that it takes considerable time and travel to select from a wide range of stock effectively and efficiently. ### Trade publications The Bookseller is a weekly trade publication, which lists new publications and forthcoming titles <http://www.thebookseller.com>
# Applications of ICT in Libraries/Supporting Client Learning This page is designed for the use of students undertaking the **Diploma** (Diploma ICTL) or the **Advanced Diploma** (Advanced Diploma ICTL) in **Applications of ICT in Libraries**. These qualifications were developed by the **Scottish Library and Information Council (SLIC)** and are validated by the **Scottish Qualifications Authority (SQA)** **Supporting Client Learning** is a core unit in both the Diploma and Advanced Diploma programmes. Information regarding the **background to the courses**, **content** and **certification opportunities** can be obtained by following the **Diploma** (Diploma ICTL) or the **Advanced Diploma** (Advanced Diploma ICTL) links. Further information can be obtained from **angela.lees@sqa.org.uk** ## ICT competence and learning goals ### Establishing client competence in use of hardware and software The client's **ICT competence** clearly affects their ability to use any learning packages available. If ICT skills are lacking, the client may have to undertake some **ICT skills development** before moving onto their selected learning package. You should determine the client's ICT competence in relation to both **hardware** and **software**. Your initial task is to find out what sorts of **previous experience** and **competence** the client has had with ICT. Typically you might want to explore four areas: - **hardware** - **operating system environment (normally Windows)** - **using the Internet** - **using applications packages** ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.1** Before proceeding: - List the hardware items you would enquire about. - Note down what you would want to know about each of these items. ------------------------------------------------------------------------ #### Client competence in using hardware The main items of hardware which the client is likely to have to use are the: - **mouse** - **keyboard** - **printer** - **scanner** - **removable media** We look at each of these in turn, giving some specific pointers about what you should ask the client. #### The mouse You might want to start by finding out the following information: - Has the client used a mouse? - Is the client aware of the use of the **left and right buttons**? - Is the client aware of **hovering** over items? - (For left handed clients) is the client aware of how to change a mouse from right- to **left-handed** operation? - If the computers in your library use **another type of pointing device**, such as a tracker ball or touch pad, can the client use this proficiently? #### Keyboard You might want to start by finding out the following information: - Has the client used a keyboard? - Does the client know how to use: - **space and return keys** - **shift and caps lock keys** - **delete and backspace keys** - **cursor (arrow) keys** - **ctrl, tab, esc and insert keys** - **function keys** #### Printer You might want to start by finding out the following information: - Has the client used a printer? - Is the client aware of any printer processes which are *\'specific to your library*? - Can the client **load the printer with paper**? - Is the client aware of the **cost per page** of printing (monochrome and colour)? #### Scanner You might want to start by finding out the following information: - Has the client used a scanner? - Is the client aware of the routine of pre-scan, select area and scan? - Is the client aware of the importance of selecting an appropriate scanning resolution? #### Removable media Use of removable media, such as floppy disks, CD-ROMs and USB storage (also known as Flash Drives or Pen Drives) will be governed by library rules. If these are allowed you might want to start by finding out the following information: - Can the client **insert a disk** (or other media) properly? - Is the client aware of when it is appropriate to **remove** it? - Can the client access media in **different drives**? - Can the client save to **writable media**? #### Operating systems We use the term **operating system** to describe the basic software, such as **Microsoft Windows**, which makes the computer work. When a computer is switched on, the operating system starts running before any application package such as Word will run. The operating system involves **managing applications and data**. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.2** Before proceeding: - List the aspects of the operating system you would enquire about. - Note down what would you want to know about each aspect. ------------------------------------------------------------------------ #### Previous experience You might want to start by finding out the following information: - Is the client **familiar with the operating system** on the computers in your library? Note that, even within the same library, different computers may have different operating systems. Most of the common operating systems are supplied by Microsoft: - Windows 98 - Windows NT - Windows 2000 - Windows Millennium - Windows XP There are some significant differences in the practical operation of these, so you should determine whether the client can carry out the tasks we outline below for the operating system on the computer which will be used to work through the chosen learning packages. #### Operating system tasks You might want to start by finding out the following information: **Finding applications:** - Does the client know **where to look** for the applications or packages? - Does the client know the **names and icons** for the applications required? **Opening and closing applications:** - Can the client **open** an application? - Can the client **close** an application correctly? (This often involves saving information.) **Using a file manager to locate files and data:** - Can the client use **My Documents/Windows Explorer** to navigate around the file system? - Is the client aware of the concept of a **hierarchy** or tree structure of folders (directories)? **Creating folders and saving data in specific folders:** - Can the client **create a new folder** to save application data? #### Using the Internet A great deal of information to support learning as well as complete learning packages can be accessed via the Internet. It is therefore important to gauge the client's competence in Internet use. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.3** Before proceeding: - List the aspects of Internet use you would enquire about. - Note down what would you want to know about each aspect. ------------------------------------------------------------------------ #### Common Internet tasks Here are the main aspects of **basic Internet use** which you should ask about: **Browsing the Internet:** - Has the client experience of **using a browser**? (e.g.: Internet Explorer, Mozilla, Firefox) - Has the client experience of **using a search engine**? (e.g.: Google, Ask Jeeves) - Is the client aware of the variable quality of websites found on the Internet? **E-mail:** - Has the client used **e-mail**? - Does the client have an **e-mail address**? **Chat:** - Has the client used **chat**? - Is the client aware of **possible dangers** in its use? **Groups:** - Has the client used any **(news)groups**? #### Using applications packages You need to know about the client's existing experience with common applications packages. This will help to confirm the information gleaned so far. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.4** Before proceeding, list some applications packages you might want to ask about. ------------------------------------------------------------------------ #### Applications packages Word processing is the most likely example of an applications package. Almost all computer users will have done some word processing. But many will have used other packages as well. **Word processing packages** - Has the client used a **word processor**? (e.g.: Word, Write) **Spreadsheet packages** - Has the client used a **spreadsheet application**? (e.g.: Excel) **Photo/Graphics packages** - Has the client used a **photo/graphics package**? (e.g.: Paint Shop Pro, Photoshop) **Database packages** - Has the client used a **database application**? (e.g.: Access, dBASE) **Financial packages** - Has the client used a **financial package**? (e.g.: Quicken, Quick Books) **Other** - Has the client used any other, **more specialised packages** which do not fit into the above categories? If so, what are these packages and what do they do? In each case you should try to get an idea of the **level** at which the packages have been used. The best way of finding this out is to ask the client to give some **examples** of how they used the package. #### Using learning packages One important question to ask is whether the client wishes to use the chosen learning package **in the library**, using the library's equipment, or whether they would prefer to take the package away for **home** use. If the latter, it is vital that you establish the **specification** of their home computer. While many home users possess high specification equipment, others may have older, slower models which will not support the latest packages. This can be a particular problem where **graphics or audio** is involved. All learning packages will state clearly the **minimum specification** on which the application will run and you should ask the client to confirm that their home equipment meets or exceeds this. It is good practice to make a **written record** of what you have established about the client's ICT competence. Some libraries have checklists for this purpose. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.5** Find out if your library service has checklists of this nature. If not, why not create one for yourself and your colleagues to use? ------------------------------------------------------------------------ #### Establishing learning goals You need to **establish the learning goals** for the client before you can think about possible learning approaches. The client may have learning goals related to their **work** or to their **personal life**. You should attempt to establish exactly what the client wishes to learn and if possible get an idea of the reasons why the client is undertaking the learning. Some clients may come to the public library seeking learning packages which are **complete in themselves**. You may be able to provide such packages "off the shelf" in your library or you may have to source them from elsewhere. Other clients may be seeking additional learning to support training or education being **undertaken elsewhere**. The most obvious example of the latter is school pupils or college/university students wishing assistance with assignments or desiring materials which will help them revise for examinations. Clients engaged in more **informal learning** may also require top-up materials. For example, an adult working through a self-help book on word processing might ask for additional exercises in keyboarding. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.6** Before proceeding outline the different areas you would need to ask about to find out the client's learning goals. There are quite a few of them! ------------------------------------------------------------------------ #### Determining learning goals Here are some possible areas to look at with the client to determine the learning goals: **General subject area:** What is the **general subject area** in which the client wishes to undertake the learning? E.g.: the Spanish language. **Slant or specialism:** Is there a **particular specialism** to this learning? E.g.: Spanish for business. **Existing competence of client:** Does the client possess any existing relevant competence in the subject? E.g.: the client has picked up a basic knowledge while living in Spain for six months last year. **Future competence as a result of the learning undertaken:** What **level** does the client wish to be able to reach as a result of the learning? E.g.: the client wishes to write business letters to Spanish clients of their company. **Reasons for learning:** Is there a particular work or social **reason** the client has for wishing to undertake the learning? E.g.: the client is soon to take responsibility for their company's Spanish clients #### Additional factors You may need to consider the following additional factors: **Timeframe:** Over what **time period** does the client wish the learning to take place? E.g.: the next six months. **Time available:** **How much time** in the week does the client have for learning? E.g.: up to four hours per week. **Importance of certification:** Does the client particularly want to undertake learning which will result in a **qualification?** E.g.: the client is interested in gaining a City & Guilds qualification in Business Spanish on completion of the learning. **Finance:** Many of the learning materials available through public libraries will have no costs attached. However some may involve **enrollment or certification fees**. In these cases, you must tactfully investigate if the client would have the financial resources for a course of study with a fee associated? E.g.: is the client able and/or willing to pay for an end of course examination fee? It is good practice to make a **written record** of what you have established about the client's learning goals. Some libraries have checklists for this purpose. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.7** Find out if your library service has checklists of this nature. If not, why not create some for yourself and your colleagues to use? ------------------------------------------------------------------------ ### The UK education and training system In order to help your clients, you need to have a broad-based understanding of the **UK education and training system**as a whole - **pre-school, primary, secondary, tertiary, workplace** and **informal**. Naturally you are not expected to be an expert on education and training (although in some instances you may need to consult such experts). However you should be familiar with the basics of the system and know how to find out more detail on any aspect, if this is required. Remember that we live in an age of **lifelong learning** and that much learning takes place outside the traditional academic system. So you should make sure that you know not just the local schools, colleges and universities, but also private training providers, adult learning agencies, voluntary groups etc. In particular, it is essential that you appreciate the ways in which the education and training systems of the four UK nations differ from one another (the Scottish system displays the largest divergences from the others) and the implications of this for the client. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.8** Here are the official government websites for the education departments in England, Northern Ireland, Scotland and Wales: - England: <http://www.dcsf.gov.uk/> - Northern Ireland: <http://www.deni.gov.uk/> and <http://www.delni.gov.uk/> - Scotland: <http://www.scotland.gov.uk/Topics/Education/> - Wales: <http://www.learning.wales.gov.uk/> Familiarize yourself with the information provided on these sites, especially that related to the country in which you are resident. Note that much of the information on the English site applies also to Wales and some is also applicable to Northern Ireland.Each of these sites provides links to sites giving information on more specialised aspects of education. Note the addresses of such sites which are particularly relevant to yourself and summarise the sort of information which you can gain from them. ### Ascertaining special needs You should establish any special needs (in the widest sense) of the client which will have a bearing on the learning they are proposing to undertake. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.9** Before proceeding: - Make a list of the different types of special needs which could have a bearing on the learning. - For each case note the steps you can take to enable the learning. ------------------------------------------------------------------------ #### Types of special needs It is difficult to compile a comprehensive list of special needs. Here are some of the most common with some suggestions as to how the library can facilitate learning for such clients. - **Motor disabilities** - **Visual impairment** - **Hearing impairment** - **Special learning needs** (including literacy, numeracy and English as a second language) #### Motor disabilities This can cover a wide range of disabilities, ranging from a paraplegic learner in a wheelchair to someone with mild Repetitive Strain Injury (RSI). Some common examples of library facilities for this group are: - a **flexible computer desk** at a height which can be adjusted to suit varying dimensions of wheelchairs - a **joystick or specially adapted mouse** for clients who cannot operate a standard mouse - a **specialised "big keys" keyboard** etc. for clients who cannot operate a standard keyboard - a **mouse tray** so that clients can use the mouse on their lap - **touch screens** - **programmable keypads** to reduce the number of keystrokes required for common inputs #### Visual impairment Many manufacturers produce software specifically to enable use by **visually impaired users**. It is possible for the **users** to hear what appears on the screen. Some software produces output in **Braille**. Sometimes **simple measures** can be effective in facilitating use by visually impaired clients, such as: - changing the **text size** on the screen - altering the **colour settings** (It is usually easiest for clients with visual impairments to read black text on a white background) - using **"text only"** versions where graphics are removed. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.10** Make sure that you can carry out the three "simple measures" listed above. Useful information can be found on the website of the **Royal National Institution for the Blind**. Go to <http://www.rnib.org.uk/> and search for "internet". ------------------------------------------------------------------------ #### Hearing impairment Again much **specialist software** is available. Libraries can install systems which pick up sound from the computer through an amplifier and radio microphone which is then transmitted by infrared around the room. The hearing impaired person hears this amplified sound through a lightweight headset. There is no need for users to wear their hearing aids. <http://www.deafclub.co.uk> is a useful site with a search engine, which is specifically designed to help deaf people find information. It can also lists sites giving advice on ICT adaptations for clients with hearing impairment. <http://www.rnid.org.uk/> is the site of the Royal National Institute for Deaf People. #### Special learning needs Public libraries have always played an important role in assisting clients in these groups and recent **disability and discrimination legislation** has laid even more emphasis on this role. Research has shown that libraries are often viewed by such clients as **friendly, non-judgmental environment**s. In consequence they may be more likely to undertake learning in the library than in the more formal setting of a school or college. Your library service will have staff who specialise in assisting these user groups. These colleagues can advise you of how best to provide for individual clients. You should be aware that nowadays, there are many **holistic learning packages** which provide upskilling for young people or adults in literacy, numeracy and ICT. Remember that, although the word processor's **spell checking facility** is designed primarily to check for typing errors, it is an invaluable aid to anyone with problems in coping with the English language's idiosyncratic spelling. ### Sources of careers information In order to match the client's learning desires with work goals, it may be necessary to have information about which **workplace qualifications and competences** are useful in a particular job role or career. You are not expected to know this information but you should to be able to access it efficiently, most probably by use of the Internet. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.11** Before proceeding, find websites which will give you information on the following careers: - nursing - clockmaking - actuarial work - farriery ------------------------------------------------------------------------ #### Careers information sites There are several different sites which will produce the required information. There is usually a dedicated site for each **sector of employment**. Here are some examples for the jobs we asked about: **Nursing** An NHS site <http://www.nhscareers.nhs.uk/careers/nursing/> **Clockmaking** The British Horological Institute <http://www.bhi.co.uk/> **Actuarial work** Prospects the graduate careers website has a section at: <http://www.prospects.ac.uk/cms/ShowPage/Home_page/Explore_types_of_jobs/Types_of_Job/p!eipaL?state=showocc&idno=329&pageno=1> **Farriery** The Farriers Registration Council has a section on careers at: <http://www.farrier-reg.gov.uk/> #### General careers information There are several useful on-line sources of general careers information, such as: - **For England** <http://www.connexions-direct.com> - **For Scotland** <http://www.careers-scotland.org.uk> - **For Wales** <http://www.careerswales.com/> - **For the whole of the UK** <http://www.careers-gateway.co.uk> Web 2.0 sources University of Glamorgan YouTube <http://www.youtube.com/careersglamorganuni> Foreign and Commonwealth Office Twitter links <http://web.archive.org/20090804213504/www.fco.gov.uk/en/twitter/> Energy careers on Facebook <http://www.careerenergy.co.uk/?facebook> CILIP Graduate Trainee Opportunities on Facebook <http://www.facebook.com/group.php?gid=13484212748&ref=nf> ## Select a range of ICT-based packages to support learning ### Selection criteria You must take all the information obtained from the client into account so that you can **identify learning packages** which will meet the criteria. You will match learning packages against such criteria as: - Does the **subject matter** match the client's desired study topic? - Is **certification** available if the client desires this? - Does the **length** of the learning package fit with the time available for the client to learn? - Can the client afford any **costs** associated with the learning? - Does the learning package address any **special needs** of the client? - Is the level of the learning suitable in terms of both **starting competence** (i.e.: neither too easy nor too difficult) and **final competence** achieved at the end of learning? - Can the client undertake this learning without enhancement of their existing ICT skills? If not, can the library supply additional support for **ICT skills development** in order to enable the client to undertake the chosen learning package? ### Learning packages available within own organisation You need to be aware of the range of learning packages which are available within your own library service. Some of these will be at your own service point. Others will be held elsewhere within the service. The library catalogue will give information about the learning packages, both in your own library and elsewhere. Some libraries produce **specific catalogues** or lists of ICT learning packages, giving more details than might be found in the general catalogue. For packages at your own service point, it is also useful to examine the packages themselves and, if time permits, you can actually test them out. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.1** Familiarise yourself with all the catalogues and lists of ICT learning packages in your library service. Note what sort of information they provide for each item. ------------------------------------------------------------------------ #### Restrictions on the use of learning packages You must be able to determine any restrictions on the use of ICT learning packages, e.g.: - Must the package be used on **library premises** or is it available for **home use**? - Is there a limit to the **number of hours** a client may book to use the package in the library or on the length of time a package can be borrowed? - If the packages are to be used in the client's home it is vital for you to establish the details of the **client's own computer** in order to be sure that the specification is high enough to support the chosen learning package. When working in this area you will pick up useful information through the experience and comments of clients. If several clients recommend a particular package on keyboarding techniques, for instance, you can feel confident in recommending it to other clients with similar learning goals. Additionally you can gain information and advice through discussions with experienced colleagues. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.2** Here is an exercise to familiarise yourself with some learning packages available within your own library service.For each subject area given below, find two packages and note the differences between them: - Business studies - French language - Basic mathematics - Word processing ------------------------------------------------------------------------ ### Sourcing learning packages outside own organisation Your library cannot duplicate all the learning packages which will exist locally outside your library service. You must have an awareness of what is available out there. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.3** Before proceeding make a list of the types of organisation in your locality which produce and/or deliver learning packages. ------------------------------------------------------------------------ #### Sources of learning packages Here are some examples of where learning might be found in the locality: - **Schools** - **Further education colleges** - **Universities** - **Private trainers** - **Local learning partnerships** - **Community learning** - **Voluntary organisations**, e.g.: Workers' Educational Association ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.4** Here is an exercise to increase your familiarity with local sources of learning material outside the library service. Choose four of the types of provider given in the preceding list. For each type, find the website of a named organisation in this category and choose two different study packages offered. Note the differences between the packages at each organisation and the differences between the organisations. ------------------------------------------------------------------------ #### Differences between sources We expect that you will find the following points of difference: - **Cost of package (if any)** - **Flexibility of study times** - **Availability of certification** - **Level of studies** - **Range of content** In fact, you should come up with the very points which might be criteria gleaned from a client seeking learning. With e-learning it is not necessary for the provider to be local. Much excellent learning content can be sourced free of charge from the Internet e.g.: <http://www.studyspanish.com> offers free tuition in basic Spanish. In other cases e-learning may be delivered via the Internet for a fee. In these cases a **log in** and **password** will be required after registration. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.5** Before proceeding, find and note down five websites where learning is available on the Internet. ------------------------------------------------------------------------ ### Learning on the Internet Learning can be found on the Web at many, many sites. There is no way that you will be able to remember even a fraction of these. So it is extremely important that you should be familiar with sites which are commonly used to **find learning resources**. Check these sites frequently for news and developments, as their content is regularly updated. It is important to be aware of the scope of any such site. It is often the case that learning sites which appear to be **UK-wide** are not in fact applicable to one or more of the four nations. Frequently, learning sites apply to England, Wales and Northern Ireland (e.g.: <http://www.learndirect.co.uk>) and there is a separate site for Scotland (e.g.: <http://www.myworldofwork.co.uk>) The scope is not always obvious from the title of the site. Be especially careful when the word \"national\" is used. This can mean UK or a single one of the four UK nations. For example, the content of the National Learning Network (http://www.nln.ac.uk) applies only to England. In contrast, the content of the **National Learning Network** (http://www.nln.ac.uk) applies only to England. #### BBC learning materials The BBC (http://www.bbc.co.uk) offers excellent learning materials most of which are applicable in all four UK nations. This site also provides links to **other providers** of on-line learning. There are many websites which are specifically designed to provide **curriculum related resources and revision aids**. Once again it is vital to check that these are appropriate for the school or college curriculum of the UK nation where the client is studying. The BBC's site (http://www.bbc.co.uk) has educational and revision material for England, Northern Ireland, Scotland and Wales. You should be familiar with websites applicable to your own home nation's educational curriculum, such as Learning and Teaching Scotland (http://www.ltscotland.org.uk). However, do not consider that support learning should be confined to these educational web sites. Rather be prepared to assist clients to find appropriate support material for their learning from any suitable Internet source. This applies especially when the client is seeking information to **enhance a course** of study undertaken elsewhere. They may come to the library looking for company financial performance data to include in a presentation on marketing, literary criticism of T S Eliot for a university essay or information on the breeding habits of dolphins for A level biology. This sort of information in support of learning will probably be found on websites which are not specifically educational. So be prepared to assist your client to find information in support of their learning from **any appropriate Internet** source. ### Devising a learning plan You can give the client additional help in the form of a motivational learning plan to guide the learner through the package(s) you have sourced. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.6** Before proceeding, make a list of points which you might include in the plan. ------------------------------------------------------------------------ #### Contents of a learning plan A suitable set of features to be included in the learning plan is: - the overall learning goal - specific learning objectives which contribute to the learning goal - a deadline for completion of the learning - a schedule for learning - any support which the library staff have agreed to provide for the client - a specification of the responsibilities and involvement of any outside provider The learning plan is best expressed in SMART (Specific, Measurable, Achievable, Realistic, Timebound) objectives. It need not be a complex piece of documentation. Often it can simply be a checklist. This plan should be created with and agreed by the client. Usually it will be signed by both the client and a member of library staff. The use of such a learning plan avoids confusion and can also be motivating to the learner. Where the client is returning to learning after a gap, or has had prior negative learning experiences, it can be helpful to break the learning into "bite sized chunks" and produce a series of shorter learning plans. Thus the client has a positive experience of successfully completing a small amount of learning which engenders a sense of achievement and spurs them on to further efforts. #### Example of a learning plan ![](2Learning_Plan.png "2Learning_Plan.png"){width="500"} ### Progression opportunities An important role of the public library is to be a key player in lifelong learning. A **positive learning experience** provided by the library can lead to further successful progression for the client, in some cases into formal tertiary or workplace vocational education. The library user who enquires about opportunities to study Spanish language to further her career in retail sales may eventually undertake a university course in business and retail management. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.7** Before proceeding note down how you might explore progression opportunities for a client. ------------------------------------------------------------------------ #### Exploring progression opportunities You could explore the following possibilities: - What has been the **client's experience** with the learning undertaken so far? Have they enjoyed it? What was particularly enjoyable or useful and what was less so? - Revisit the client's **original reasons** for undertaking the learning. Are these motivations still the same or has the experience of learning awakened the client's ambition to broader horizons? It is not uncommon, for example, for a learner who has embarked on a short language package, with a view to being able to order food and ask directions on holiday, to be seized with enthusiasm and wish to carry on to GCSE or Standard Grade qualifications in the language. Based on this discussion you can consider any or all or the following: - Is there a **more advanced package** on this topic available? - Are there packages on **related topics** to that being undertaken by the client? - Has the client come to the end of the possible informal learning on the topic and might now proceed to **formal education**? - Which further learning will further **enhance the client's job prospects** after the present studies? Of course, all of the previously mentioned sources of information on learning provision are useful to you not only in **sourcing learning** which is appropriate for the client's immediate learning goals but also to **suggest further learning options** to the client, on completion of the initial learning. In other words, at its simplest, when you are sourcing learning material, you should always have your eye on the level above, to see how your client might further progress. #### Concluding the learning experience Hopefully the learning has been a **positive experience** for the client and they are interested in taking things further. But do not be discouraged if the client does not want to sign up for further learning immediately. It may be that the learning just completed has achieved all the client's current goals and they wish to pause at this point meantime. This is a **satisfactory outcome** because you can be sure that a satisfied client who has found the package stimulating and relevant is likely to return to the library in future looking for advice and guidance on other learning. ## Provide appropriate ICT support to the client ### Using in-house learning packs to develop ICT skills Most public library services have a wealth of **in-house learning packs** whose aim is to develop ICT skills, ranging from beginner to advanced level. You should examine the packages in your library so that you are completely familiar with their **content** and **level**. This enables you to make the most informed choice when recommending a package to a client and to be absolutely confident that the client will benefit from it. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.1** Select three in-house packages which develop basic ICT skills such as: - Using PC hardware - Using files and folders (directories) - Using the Internet - Keyboarding skills Try out each of the three packages to evaluate: - Level (absolute beginner to expert user) - Duration (how many hours to work through whole package) - Approach (friendly to overly formal) - Ease of use - Presentation (is it attractive and encouraging for the learner?) ------------------------------------------------------------------------ ### Front-line client support When a client is using any ICT based learning package in the library, whether to develop ICT skills or for other learning, it is likely that from time to time some **technical snags** will arise. You must be able to assist with straightforward trouble shooting e.g.: printing problems. We stress the word "straightforward". There is no suggestion that you should possess sophisticated trouble shooting skills: this is the responsibility of ICT technical staff. Rather you should be acquainted with typical, straightforward difficulties which can arise and be able to suggest how these can be overcome. Do be clear about the **boundary** between your responsibilities regarding trouble-shooting and when to call on the services of a technical professional. You probably have had experience of this already. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.2** Before proceeding, note down a few possible problems which may be encountered by clients using computers. (If this is outside your own experience ask colleagues to suggest computer problems they have solved for clients.) ------------------------------------------------------------------------ ### Typical problems Here are some of the problems you are most likely to encounter. - The monitor **appears blank** - After using the computer for some time, it **'hangs'**, neither keyboard nor mouse appear to operate - A client has difficulty reading off the monitor because the **print is too small** - **Nothing** comes out of the printer - The printer does not seem to use the whole of the sheet of paper and the **layout** is not the same as on the monitor - When saving data from an Office application like Word, the message comes up that the **disk is full** - The printer **jams** ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.3** Before proceeding, jot down any ideas you have about the help you would be able to give in each of the above cases. You can compare this with our suggestions on the following screens. You will find that with experience and in discussion with your colleagues you will build up a fund of solutions for these types of problem. Once again, as in Outcome 2, you must take full cognisance of any special needs of the client and offer appropriate technical support to address these. ------------------------------------------------------------------------ #### Resolving problems Some of our solutions are based on your ability to **change computer settings**. It may be that you do not have access rights to these and would need to contact an ICT professional. Note that with the first two faults (monitor blank, computer hanging), if they require forcing an application to end or indeed resetting or restarting the computer, it will always mean **any data not saved will probably be lost**. It is important to explain this to the client. It is even more important to explain before any incident occurs that **data should be saved at regular and frequent intervals** just in case something goes wrong! #### The monitor appears blank - Check to see if the computer has **gone to sleep** by pressing the space bar on the keyboard. - Check that the monitor is **switched on and connected** to the mains, i.e.: is the power light illuminated? - Check that the monitor is correctly **connected to the computer**. - Check to see if the system works after the computer is **reset** or switched off at the mains and on again. #### The computer hangs Sometimes, after using the computer for some time, it **hangs**, and neither keyboard nor mouse appears to operate. If this happens you can try the following - Wait a while to see if the computer is performing some **intensive task** and recovers. - Try *Ctrl-Alt-Del*. If you are lucky it will bring up a **Task Manager** window which will show you which application is not responding and allow you to close down only that application. - Use the **reset button** to restart the computer. - **Switch the computer off** at the mains and then on again. #### A client has difficulty reading off the monitor because the print is too small - If this is confined to a **particular application**, it is usually possible to adjust the **zoom setting**. If this does not appear in a box near the top of the window, it will be found in the menu system under View: *Zoom* or *View: Text size*. - If this applies to **everything on the monitor**, then, if you have access rights, you can change the **monitor settings**. Right click with the mouse on the desktop, choose *Properties* from the resulting menu, choose the *Settings* tab from the dialogue box, reduce the *Screen resolution* setting and *OK*. Unfortunately, the lower the screen resolution, the less can be displayed on the monitor. This often results in an uneasy compromise for people with problems with their sight. #### Nothing comes out of the printer - Check that the printer is **switched on and connected to the mains**, i.e.: is the power light illuminated? - Check that the printer is correctly **connected to the computer**. - Check that the printer has **paper** in it. - Check the **ink supply**. - Try printing a **test page**. - Check the print settings in both the **operating system** and the **application** to see that the computer is looking for the correct printer and that the correct size of paper has been selected and that manual/auto (as appropriate) is chosen. #### Print layout is incorrect Sometimes the printer does not seem to use the whole of the sheet of paper or the layout is not the same as on the monitor. - When using a word processor like Word, it is possible to set the paper size in the **application**. However there is also a setting for the printer itself. If these two settings are different, then the output will not appear correctly on the page. The driver for a newly connected **printer** may default to US legal for the paper size. It is normal to use A4 in this country and applications will use this as default. Go to the printer properties and check the paper size. *Start: Settings: Printers*: right click on the printer concerned, choose *Properties* and select the *Device settings* tab. #### The disk appears to be full Sometimes, when saving data from an Office application like Word, a message comes up that the disk is full. - It may be that the client's **floppy disk or pen drive is full**. This is quite likely for any sizable word-processed document especially if it contains graphics or other embedded items. - A fault condition can arise concerning interaction between the application and the operating system which results in a **false reporting** of the disk full error. This is irretrievable and requires the computer to be rebooted. If the client will lose a fair amount of unsaved data, it is worth opening a new document and copy and pasting from the original to the new document and then trying to save that. You may be lucky! - A similar problem can occur regarding the computer **running out of memory**. Again only rebooting the computer will correct the situation. #### The printer jams - There is no universal solution for this problem as each printer has its own unique mechanism. The best you can do is to familiarise yourself with the various types of printer in your library and how to un-jam each. ### Referring clients to sources of support external to library Where no suitable in-house packages are available, you will need to refer the client to **external sources**. These are likely to be hands on, practical courses from local providers. The knowledge of local provision outlined under Outcome 2 will enable you to suggest appropriate referral agencies. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.4** Before proceeding, make a list of the types of packages which are not available from your library service and would need to be sourced from outside. ------------------------------------------------------------------------ #### External sources of support As in Outcome 2 you will find ICT skills packages in the locality from: - **Schools** - **Colleges** - **Universities** - **Private trainers** - **Local learning partnerships** - **Community learning** - **Voluntary organisations, e.g.: Workers' Educational Association** ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.5** Here is an exercise to increase your familiarity with sources of ICT skills materials outside the library service. Choose four of the types of provider given in the preceding list. For each, find the organisation's website. Locate at each two different ICT skills packages being offered. Note any differences between the packages at the different organisations. You should repeat this exercise for ICT learning packages available over the Internet from providers outside your own locality. ------------------------------------------------------------------------
# Applications of ICT in Libraries/Using ICT in Professional Practice This page is designed for the use of students undertaking the **Level 7 PDA** (Diploma ICTL) or the **Level 8 PDA** (Advanced Diploma ICTL) in **Applications of ICT in Libraries**. These qualifications were developed by the **Scottish Library and Information Council (SLIC)** and are validated by the **Scottish Qualifications Authority (SQA)** **Using ICT in Professional Practice** is a core unit in both the Diploma and Advanced Diploma programmes. Information regarding the **background to the courses**, **content** and **certification opportunities** can be obtained by following the **Level 7** (Diploma ICTL) or the **Level 8** (Advanced Diploma ICTL) links. You will have received **on-site training** allowing you to develop specific operational knowledge of your library management system. This might have been provided by the **supplier**, the **systems manager** or other library staff. In some cases your job role may not allow you to get practice in all of the operations we describe in this Outcome. If this is the case, you must at least understand what is going on and see **demonstrations** of the operation. As an example, relatively few staff may actively add new items to the catalogue but it will help your understanding of the operation of the system as a whole if you can observe new items being added. You should know where to find information or instructions on **procedures** relating to the use of the library management system. If necessary you can create some "crib guides". \-\-\-- ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.1** You should have a good knowledge and understanding of the system and its workflows. As an exercise, taking a typical item, such as a work of fiction, draw up a flow chart which lists what happens at each stage from stock selection, through the ordering and acquisitions process, to the point when the item is made publicly available and is visible on the catalogue. ------------------------------------------------------------------------ #### Borrower information The two main elements in an automated system are the **borrowers** and the **stock items**. The basic information held on the borrower, apart from name, is address and contact details. There are usually several classes of borrower. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.2** Before proceeding, jot down the different classes of borrower you are aware of, and what the key differences are between them as far as the automated system is concerned. ------------------------------------------------------------------------ #### Types of borrower The **main categories of borrower**, common to most public libraries, are: - adult - teen - junior - concession (e.g.: senior citizen, person in receipt of benefits) - disability (e.g.: visually or hearing impaired) - housebound - temporary (e.g.: transient worker) You may have noted others. The key differences are likely to be: - limits on the **type of items allowed**, e.g.: junior borrowers may not borrow adult stock without a parent\'s permission - different **loan periods** for different categories of borrower, e.g.: no limit on length of loan period for borrowers with disabilities - the **scale of fines** may vary with the different classes of borrower, e.g.: no fines for concessionary borrowers. #### Registering and removing borrowers The precise details of **registering and removing borrowers** can vary significantly depending on the system in use at your location. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.3** Note down the steps you need to go through to: - register a borrower with the system. - remove a borrower from the system. ------------------------------------------------------------------------ In addition to the borrower details which are permanently on the system, it may be necessary from time to time to add a **temporary message** to alert members of staff to something connected with a particular borrower. Some of these messages may be added automatically by the system. Typical would be information about money owed by or due to the borrower. Staff will also be able to add specific messages. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, jot down some examples of messages which you might wish to add about borrowers. ------------------------------------------------------------------------ #### Messages about borrowers You might want to ask for some of the **borrower data** to be verified, e.g.: if you have tried unsuccessfully to contact the borrower by telephone, you could add a note asking for the telephone number to be checked. Other data which sometimes changes (and borrowers neglect to inform the library) are home address and e-mail address. Messages could be of a more **personal** nature "Mrs Jones left her umbrella in the library on her last visit. It is in the lost property cupboard." Or "Tell Mr O'Neill that we have got some good new stock in about the Atkins diet." With these sorts of messages, do be careful to keep them factual. Data protection legislation means that borrowers are entitled to read any information stored in a computer about themselves. Remember to **delete** these messages once they are no longer applicable. Mr O'Neill will be pleased to be told once about the Atkins diet books but he will not appreciate being reminded of them on every visit to the library! ### The circulation module **Issuing** and **discharging** items of library stock using an automated system is usually quick and straightforward. Sometimes the system will indicate a complexity in the transaction, e.g.: you are prevented from issuing an item to a borrower. Although in almost all cases the system will supply you with correct information regarding the status of the borrower and their borrowing activities, the underlying reasons may not be displayed on the screen. However, you have to be able to explain the actions of the system to the borrower. This requires both an excellent understanding of the library authority rules (which guide the system) and the ability to access quickly the required screens of the system to find the reasons for the system\'s decisions. You should have a good **understanding** and have had **practice** in the main operations of the circulation module of the system. **Issuing items** This is the basic action of entering the issuing details, i.e.: borrower and item barcodes on to the system. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, jot down problems that may occur with this task. ------------------------------------------------------------------------ #### Problems with issuing We can think of several problems, such as: - With **self-issuing systems**, where the borrower is able to carry out self-issue over the Internet, borrowers, especially if they are inexperienced in doing this, can easily make a mistake. - The system indicates that the borrower\'s **lending limit** has been reached. - The borrower would like at this point to know **which other items** they have out on loan. - Different classes of items may have different **loan periods**, e.g.: DVDs may need to be returned within three days. Certain types of book may be lent for only one week instead of the general three weeks. The system may prompt you about this but you have to remember use the correct date stamp on the item. You must be able to deal with these situations and be aware of relevant **library policies** so that you can communicate quickly with the borrower and explain the reason for any problems. #### Discharging items Most automated systems allow items to be discharged by entering only the **item barcode**. They do not require borrower information to be entered. This makes discharging items a simple and fast operation. However, **additional steps** are sometimes required. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, jot down problems that may occur when discharging items. ------------------------------------------------------------------------ #### Problems with discharging items We can think of several potential problems, such as: - The returned item is **damaged**. This must be shown on the system and the book sent for repair or disposal. - The returned item is subject to a **request by another borrower** or an inter-library loan. The system will prompt on this and you must follow reservation or ILL procedures. #### Other circulation tasks - **Renewing items:** this is a variation on the issuing procedure. However, it may be a renewal over the telephone. This requires you to manually input the details into the system. - **Reserving Items:** make sure that you are familiar with the steps you must carry out on the system to input a reservation. - **Overdues:** most automated systems generate overdue notices automatically and the screen will show any fine incurred by the borrower at the point of return of the item. - **Charges and Fines:** reservations often require charges to be made to the borrower. Charges may also be made for interlibrary loans. The other common financial transaction is related to fines for late return of items. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.4** Make a list of the charges your library make to borrowers which must be administered via the library\'s automated system. ------------------------------------------------------------------------ Data provided by the circulation control module of the automated management system can make a significant contribution to the successful management of stock. Used properly, the system can provide data on usage for managers to support their decisions in areas such as stock selection policy, opening hours, staffing levels, distribution of stock and information for statutory and local performance indicators. A particular use of the library management system is in monitoring the performance (levels of issuing of resources) of existing stock. ### The acquisitions module Once new stock to be purchased for the library has been selected (the selection process is covered in outcome two of this unit) the automated system plays a prominent part. Although details will differ, there are three clear steps - **ordering, receipting** and **invoicing**. The system then will allow the acquisitions process to run, using its Reporting Systems and Order Transmission. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.5** Find out the procedures for placing and receiving stock orders on your automated library system and how this interfaces with the system\'s monetary reporting facility. ------------------------------------------------------------------------ The above are the procedural steps. However, the automated system is equally powerful in aiding the acquisition process when it comes to **financial control**. The acquisition of new items for your library stock is governed principally by an **acquisitions policy**. Different library authorities will have different methods but the following is the basis of the process: - The **total level of resources** available for the library service as a whole is set. - **Priorities** for spending are agreed. - The total budget is then broken down across the various **budget headings**, e.g.: fiction, non-fiction, DVDs, allocations to different branches etc. - Budget holders are informed of their **budget allocation** and acquisitions may proceed. It is important that you clearly understand the **boundaries** of your personal authority within the ordering of any stock selection process. You may be permitted to place orders or this may only be done by a more senior member of staff. Know what responsibility you have and your accountability for actions within your remit. Clearly the whole process of acquisitions is based on the **availability of funds** to enable the purchase of new stock items. Thus, there is always a very clearly defined method of deciding how much money can be spent on the various types of new stock item. The joy of an automated system is that it can give really hard data to inform the acquisition process. It will give the **spending situation** under the various budget headings. This includes both the projected and the actual spending to date. Although you may not need to access this management information, it is important for you to realise that you have a vital part in this. You must always enter order information accurately to ensure the system has the correct data for its calculations. Of course there is also **non-financial information** in the data. For instance, it can also give information on the performance of the various suppliers used by the library. This allows the library managers to select the best performing suppliers for future orders. ### The cataloguing and stock management modules A library catalogue has two main functions: 1. it is a **record** of the items which comprise the library stock 2. it allows people to **seek out** suitable items they wish to use The first appearance of automated systems in libraries related to automation of the library catalogue. In the late 1960s computers became powerful and available enough to allow libraries, particularly **academic libraries**, to embark on 'computerising' their catalogues. It is easy to see why this was more attractive than going for the circulation system first. Users could use searching techniques to find book titles by keywords. Networks were beginning to appear so that it became possible to search for titles in **other libraries** remotely. You must compare this with the position up till this point of using paper or card indexes to find a book only by its author or subject. From the user\'s point of view the cataloguing module of the automated library system is the most powerful and useful part of it. Of course the user has to learn how to use it to advantage, as indeed do those who work in the library. #### The advantages of automated catalogues The advantages of automated catalogues are twofold: 1. They permit sophisticated **searching** of the library stock. 2. They link to the circulation control system so that not only can a borrower ascertain that the library service holds a particular item, they can also see its **loan status** at the time. The search facility of the catalogue module is very flexible. It will allow searching for items on author, title, accession number as well as classification. However its greatest power for users is to search on **subject keyword** or **word in title**. You will no doubt have to demonstrate this feature to keen users of your library. In your administrative work related to the catalogue, i.e.: stock management, you are most likely to be locating items whose details are known. You will be searching on author, title or accession number. Having found the item, you may need to withdraw it, thus deleting its entry in the catalogue. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.6** Note down the procedure to withdraw an item from the catalogue module of the automated library system. ------------------------------------------------------------------------ #### Withdrawing items Although the **basic deletion process** is very simple, there may be complications. The system may require a special procedure if it is the last remaining copy of a book, or if it is an item forming part of a special collection. Clearly your library will have its unique rules for this type of matter. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.7** Ascertain the policy in your library if an item being withdrawn is shown to be the last copy of this title held within the library service. ------------------------------------------------------------------------ #### Adding items You also need to understand how resources are added to the catalogue. In some library services, library staff undertake much of the work related to cataloguing and classifying items to be added to stock. In many other services this is done **automatically** using records from the supplier or downloaded from elsewhere during the order process. However, even here, with certain items, such as donations to the library, it may be necessary to create a new record and enter all its data manually. \-\-\-- ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.8** Note down the procedure to manually add an item to the catalogue module of the automated library system. ------------------------------------------------------------------------ Of course, having found the item after successfully searching the catalogue depends on knowing the layout and organisation of the particular library. The catalogue entry will include a shelf mark. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, note down how fiction items are arranged in your library. ------------------------------------------------------------------------ #### Shelving items Fiction is usually arranged by author surname in alphabetical order. Then, within any one author, by title. Where no author exists, the editor\'s surname or title is used alphabetically. A popular method of shelving fiction is by the use of **genres**. Essentially a set of genres are decided upon, e.g.: crime, fantasy, science fiction, romance and the books are labelled correspondingly and placed on the shelves in their appropriate genre. The catalogue entry will indicate this. Non-fiction is usually shelved by **subject** according to the local classification system. Here too genres may be used, e.g.: libraries frequently group all biographies together. Whichever methods are used, stock items are always organised according to agreed principles by libraries in order to aid the swift retrieval of resources either physically from the shelved collection or virtually from the library catalogue. ### Inter Library Loan module You should be familiar with the steps associated with the ILL process. It may be that the borrower has a specific item in mind, in which case you must get a precise description of the item. What information about a book would you ideally wish to have before placing an ILL request? To satisfy the British Library ILL form, a considerable amount of information is required, indeed the full bibliographic details. In the case of a book, these are the following: - Author - Title - Year of publication - Edition - ISBN - Publisher & place of publication - The source of the reference And remember you also need to record the name and contact details of the borrower. If, as is likely, the borrower cannot supply you with full bibliographic details of the item being requested, you will need to ascertain these using appropriate bibliographic tools. It may be that from the nature of the borrower request (they cannot find an item to satisfy their quest) you may need to follow the reference interview process, described in Unit 1 so that you have a clear definition of the subject area required by the borrower. #### Inter Library Loan procedures Before embarking on the ILL procedure, it is always worth **double-checking** your own library catalogue to verify that the requested item is not actually in your stock. If it is not, your library service will have **procurement procedures** and appropriate ways of securing the item. For example, this might be purchasing the item, instigating an internal ILL or carrying out an external ILL. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.9** Check out your library authority\'s procurement procedures for securing an item which might be subject to an ILL. ------------------------------------------------------------------------ Let us assume that an ILL will be required. The automated library system will allow the following steps to be carried out: - The initiation of an ILL request - Tracking the progress of an ILL request - Informing the borrower of the arrival of an inter-loaned item - Issuing the inter-loaned item - Discharging the inter-loaned item - Recalling an inter-loaned item - Recording the return of an inter-loaned item to its home library #### Using Inter Library Loans You should be familiar with all aspects of the Inter Library Loan system in use at your own location. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.10** Make yourself familiar with the Inter Library Loan module of your automated library management system for: - Initiating an ILL request - Monitoring progress of an ILL request - Carrying out internal ILL procedures for issue, discharge, recall of ILL items to client - Carrying out procedures for receipt of and return of ILL item from/to home library. ------------------------------------------------------------------------ You will find that the rules governing the use of ILL items will vary from those for stock items found in your own library. It is important to be aware of these conditions and to be able to explain them to the borrower. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, jot down some points which you think might be different for ILL items. ------------------------------------------------------------------------ #### Rules governing Inter Library Loans Three important points are as follows: **Costs:** your library may make a charge, thus passing on some of the ILL cost to the borrower, e.g.: fines for late return - there are additional penalties for non-return of British Library items within loan period. **Timescales:** you will need to give as accurate as possible an estimate of the time taken to secure the item. Also the period of time that the borrower can hold the item may be different from the loan period for similar items in your own library stock. **Restrictions on use**: it may be that the item may only be consulted within your library and not borrowed. There may be photocopying restrictions on the item. ## Use ICT sources in stock selection ### Criteria for stock selection Although you may not be responsible for the **selection** and **acquisition** of materials for your library, you may contribute to the identification of appropriate materials for the service. You certainly need to understand the **principles** of stock selection for public libraries. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, jot down the information you think you would need to make decisions on which stock to purchase. ------------------------------------------------------------------------ #### Selecting stock The two main drivers in stock selection are the **current demands of the borrowers** and the **current stock available**. The current demand has to be **audited**. This is relatively simple when an automated library system is being used. In fact, it is possible to be overwhelmed by the available statistics from an automated system. So a careful approach is required in deciding which categories, fiction genres and authors to run statistics on. This information on borrowing can be compared with the current stock provision. Broadly speaking there should be a match between the two. Thus looking at the detective genre, if the books by two popular authors show a great disparity such that the books by author X are on loan five times as much as author Y, there may be a good case for purchasing more copies of the books by author X. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, think of circumstances where this may not be valid ------------------------------------------------------------------------ #### Factors affecting demand It would be important to take into account any **reading promotions** carried out by the library on author X. Another factor might be that author Y\'s books are shelved in an inaccessible place. Perhaps X\'s books are paperback and Y\'s are hardback and your borrowers prefer the paperback format. The conclusions on the previous page are made under the assumption that the **stock levels, display methods** and **format** are roughly the same for both authors You also need to be aware of reading promotions external to your library which might drive a boom in borrowing books by author X. Although it may still be valid to increase your stock because there is a genuine and sustainable increase in interest in reading author X as a result of rave reviews on a television arts programme, you do need to question the **sustainability**. You do not want to be left six months later with a shelf full of author X\'s books which are no longer being borrowed. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, think of other reasons for choosing items for stock apart from balancing stock and demand. ------------------------------------------------------------------------ #### Additional criteria for stock selection Apart from this **balancing of stock and demand**, we think that the following points will drive stock choice. **Gaps in stock** which need to be filled. Obvious examples are new novels by favourite authors, or earlier novels which have never been in the stock of the library. There will also be a need for **replacement copies** due to poor condition or because material is out of date in the case of reference items for instance. There will also be some form of **stock development plan** for your library. This may cover the need for more diverse formats, including non-book resources, as well as new directions of book materials. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.1** Note down the stock development plans for your library. If necessary ask other library colleagues. ------------------------------------------------------------------------ All the above points go to making up the **stock selection policy** for your library. From this policy, it is possible to identify criteria for selection of new stock items. It is now possible to use **online selection tools** to find possible new items and assess them against the agreed stock selection criteria. ### Online library catalogues Of the possible ways of finding suitable material for stock selection, the use of online library catalogues of other libraries has the advantage that the materials ought to be properly catalogued and so easy to find using keywords. QUESTION TextEntry1: Online library catalogues This ability to search other library\'s catalogues is increasingly possible because it is becoming commonplace for libraries to have catalogues which can be searched via the Internet. The **UK Public Libraries Page** is a useful resource, linking to the web-available catalogues. <http://dspace.dial.pipex.com/town/square/ac940/weblibs.html> Some services **combine** together the catalogues of several libraries. A single-search interface is used to cross-search multiple catalogues in a single search action. In Wales there is CatCymru which enables the searching of library catalogues across all public, FE and HE libraries in Wales ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.2** Go to the UK Public Libraries Page and find examples of public library services with combined catalogues. (There are several examples of this.) ------------------------------------------------------------------------ #### Combined catalogues Some websites combine catalogues of collections with a common theme. Here are some more examples of catalogues to explore: - **British Library** <http://catalogue.bl.uk> - **Northern Ireland** <http://www.ni-libraries.net/library-card/library-catalogue/> - **CatCymru** <http://library.wales.org/catcymru/> - **Birmingham** <http://www.birmingham.gov.uk/libcat> #### Differences between catalogues The catalogues we looked at on the previous page vary in the details they provide and in the range of functions which can be performed. They do however offer the opportunity to trace resources. Here you are using the existing systems for inter-library loan as a helpful way of allowing library staff to view each other\'s collections. Some services may have automatic links to bibliographic service providers such as **Talis** or subscriptions to services such as **Whittaker\'s Books in Print**. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.3** Go to the Northern Ireland catalogue <https://opac.librariesni.org.uk/> and search under author for Dan Brown\'s "The Da Vinci Code". Look through the list and select the correct author. Follow the links and note that you can clearly see format, availability and reserve the item online. Compare this to the information available for the same book from your service. ------------------------------------------------------------------------ QUESTION TextEntry1: ### Publishers' and booksellers' websites The most obvious place on the Internet to look for new stock items is of course the library booksellers' and publishers' websites. These companies aim to sell the items and so one would expect that they contain the most **up to date information** on things like prices and publication dates for the items. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, think of other more negative points about the use of such websites. ------------------------------------------------------------------------ #### Negative aspects to commercial sites Well, you have to bear in mind that publishers and booksellers have a **commercial imperative** and thus the content may be biased or might not provide full information. You must exercise **caution** when using these websites to select material and you must therefore ensure that any selected materials do properly match the agreed selection criteria. #### Example sites Here is a small selection of useful sites: - **Askews** <http://www.askews.co.uk/site/default_askews.asp> - **Bertram Library services** <http://libraryservices.bertrams.com/BertramLibraryServices/> - **Booksellers Association** <http://www.booksellers.org.uk/> - **Scottish Bibliographies Online** <http://www.scotlandsculture.org/sbo/sbo.htm> - **Welsh Books Council** <http://www.cllc.org.uk/> - **Books from Scotland** <http://www.booksfromscotland.com> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.4** Go to the Harper Collins website (http://www.harpercollins.com) and follow links from the home page to New Releases, Forthcoming Titles and Best Sellers. Look for a favourite author in these sections and note the information you can find about the author, forthcoming events, full list of titles in print, range of formats titles are available in and links to author\'s websites. NB: You can also register for an author tracker facility and to find out about new writing. ------------------------------------------------------------------------ #### Services offered Some of the websites offer a range of sophisticated services -- pre-publication ordering facilities, EDI (Electronic Data Interchange) information, download facilities of MARC (Machine Reading Catalogue) records and tracking systems for current orders. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.4** Choose one of your own library suppliers, view their website and make a note of the services apart from straight forward sale of items which they provide. Find out how well they integrate with your automated library management system. You may find it useful to ask your colleagues about this. ------------------------------------------------------------------------ ### Online reviews and personal evaluations The Internet provides a great potential for reviewing potential new stock items. There are many websites which will provide this sort of service. An obvious choice is the bookseller Amazon However, there are many others' including sites linked to newspapers. Here are some examples: - **The Guardian book review site** <http://books.guardian.co.uk/reviews/> - **The Independent book review site** <http://www.independent.co.uk/arts-entertainment/books/reviews/> ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, think of more negative points about the use of such websites. ------------------------------------------------------------------------ #### Negative aspects of online reviews You have to treat reviews which have been posted on the Internet with some caution. They often include only part of the entire review and the views of the individual reviewer are unlikely to have been through a **rigorous editorial process**, unlike print journals. It is also possible to review extracts of audio/visual materials using the Internet, again candidates should return to the stock selection policy for guidance prior to purchase. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.4** Go to the Guardian\'s website <http://books.guardian.co.uk/reviews/> and compare one of the reviews with the book blurb on the publisher\'s website or another review on the same title. Look at style, content, detail and overall conclusion of the reviews with a view to their helpfulness within stock selection. ------------------------------------------------------------------------ ## Use ICT in continuing library practice and professional development ### Discussion lists Online discussion lists (sometimes called groups, newsgroups or forums) are the Internet version of electronic **bulletin boards**, popular among computer users long before Internet. A user can post comments on a topic and other users can respond. Messages are visible to all members of the group and some services provide extensions such as file storage and calendaring. The original newsgroup service, **Usenet**, is now available via Google Groups (http://groups.google.co.uk). Other services include **Jiglu** (http://www.jiglu.com/) and **Yahoo Groups** (http://groups.yahoo.com). Discussion lists are a useful tool for both individual professional development and solving specific problems. Lists work in the following way. You have to sign up as a member, giving your e-mail address. Any of the members can send in an e-mail with information of interest to the group or a question. All these e-mails are forwarded automatically to all list members. This usually generates a flurry of helpful responses. Some lists are **moderated** so that the e-mails are only posted after they have been vetted. For the lists you use, you should be aware which are vetted and which allow e-mails to be sent instantaneously. We can classify discussion lists into three broad categories: - professional discussion lists run by or for the professional library bodies - government or local government sponsored lists - ad hoc lists run by interested people or groups. #### Professional discussion lists JISC mail (the service provided by the Joint Information Systems Committee) is one of the key providers of discussion lists and has a number of **public library, special interest** and **library profession groups**. The home page is <http://www.jiscmail.ac.uk/>. You can search for different lists based on topic and there are many related to libraries. You can see a list of library categories on this page: <http://www.jiscmail.ac.uk/mailinglists/category/Library.html> Three specific examples of lists which can be used for professional matters by library staff are: - **LIS-PUB-LIBS:** is a forum for discussion of issues relating to UK public libraries. See the joining page at: <http://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=lis-pub-libs> - **LIS-SCOTLAND:** is a forum for discussion of issues relating to Scotland. See the joining page at: <http://www.jiscmail.ac.uk/cgi-bin/webadmin?SUBED1=lis-scotland&A=1> - **LIS-Wales:** is a forum for discussion of issues relating to Wales. See the joining page at: <https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=lis-wales> CILIP has a range of professional discussion lists which are targeted at supporting members of library staff who share particular professional interests or working environments. Visit <http://www.jiscmail.ac.uk/mailinglists/category/Library.html> to browse the library discussion lists (you can search for the CILIP sponsored discussion lists using \'LIS-CILIP\'). ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.1** Select an appropriate online discussion group on a subject that interests you e.g. information literacy, youth library work or mentoring. Join a group (you will find more at <http://www.jiscmail.ac.uk/mailinglists>) and read some of the recent discussions. ------------------------------------------------------------------------ #### Government sponsored lists Non-library-specific discussion groups, such as those run on local authority websites or the websites of other agencies may also be useful. An example is the **Welsh Assembly Government** which offers a range of consultation and discussion forums (you have to register to access the forums): <http://wales.gov.uk/?lang=en> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.2** Search the Internet for a discussion list for your geographic area, perhaps run by your local authority. ------------------------------------------------------------------------ #### Ad hoc groups and lists There is a range of commercial service providers such as: - **Yahoo Groups** <http://uk.groups.yahoo.com/> - **Jiglu** <http://www.jiglu.com/> - **Freeboards** <http://www.freeboards.net/main.htm> They provide discussion groups (lists) free of charge. These offer simple, alternative ways to start discussion lists for groups, e.g. Community Services Group (Scotland) at: <http://groups.yahoo.com/group/csgscotland/> Of course this also means that you can also easily set up a group to discuss any topic you choose. This approach can allow you to share ideas in the professional field. Social networking websites have a huge potential for useful exchanges of news, information and ideas. Many of them have established areas for library interests. The main problems are the quality of the content and access from within local authority firewalls. Here are some sites to look at, if you can access them. - **CILIPS** <https://twitter.com/CILIPScotland> - **CILIP South East Branch Flickr** <http://www.flickr.com/photos/cilip-se/> - **CILIP Career Development Group Facebook** <http://www.facebook.com/group.php?gid=2421438148> - **Welsh libraries blog** <http://libalyson.wordpress.com/> - **Del-i-cious** - **Scottish libraries blog** <http://scottishlibraries.wordpress.com/> - **Scottish Library and Information Council** <http://www.scottishlibraries.org/> which incorporates a range of web 2.0 tools. Guidance on using web 2.0 in a library and information service context have been published and are interesting reading. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.3** Taking any one of the three group providers mentioned above, explore how to set up a group for your own use.For all three use the group index or search system to find groups related to library work. ------------------------------------------------------------------------ ### Professional websites You should be familiar with and able to access a range of key professional websites to support you in your professional practice. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, jot down any websites you can think of which fall into the above category. ------------------------------------------------------------------------ #### Types of professional website The websites you have listed are likely to fall into one of three categories: - Websites of the **strategic agencies** - Websites of **professional associations** and **special interest groups** - Websites of **local agencies** #### Websites of the strategic agencies Each of the 4 UK home nations has its own strategic agency for libraries. These are: - **Arts Council England** <http://www.artscouncil.org.uk/what-we-do/supporting-libraries/> - **Scottish Library and Information Council (SLIC)** <http://www.scottishlibraries.org/> - **Museums Archives and Libraries Wales (CyMAL)** <http://www.cymal.wales.gov.uk/> - **Library and Information Services Council (Northern Ireland) LISC(NI)** <http://www.liscni.co.uk/> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.4** Look at each of these 4 websites and compare the information given. ------------------------------------------------------------------------ #### Websites of professional associations and special interest groups All **professional associations** have websites. These usually comprise pages which can be accessed by anyone plus further sections which are **available only to members** who use a password to access them. The main professional association in the library field is the **Chartered Institute of Library and Information Professionals (CILIP)** at: <http://www.cilip.org.uk/> Many relevant special interest groups have websites. These can be particularly useful as they often act as portal sites, collecting links to other websites based on the same or similar topics. Examples are: - **CILIP Multimedia Information and Technology Group** <http://mmitblog.wordpress.com/> - **The Historic Libraries Forum** <http://www.historiclibrariesforum.org.uk/> - **International Association of Music Libraries, Archives and Documentation Centres** <http://www.iaml-uk-irl.org/> #### Websites of local agencies You should also be aware of the importance of the contents and functions of your own **local authority website** and **local intranet**. Simple client enquiries made at the library counter or over the telephone can often be answered from these sources and it is useful to be well informed regarding content and layout so that site navigation takes the minimum amount of time. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.5** Spend some time making yourself familiar with the website run by your own local authority. ------------------------------------------------------------------------ ### Online professional journals **Online journals** offer a readily accessible and searchable source of professional information. Some are freely available but others operate on a subscription basis. Examples are: - **CILIP Update** <http://www.cilip.org.uk/publications/updatemagazine> - **CILIP in Scotland** <http://www.cilips.org.uk/> - **Journal of Information Literacy** <http://ojs.lboro.ac.uk/ojs/index.php/JIL> CILIP members enjoy free online access to the **Journal of Information Science** and J**ournal of Librarianship and Information Science** from the CILIP website. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.6** Look at the latest issue of CILIP Update at <http://www.cilip.org.uk/publications/updatemagazine> Familiarise yourself with the layout and content. Is there anything in this issue which is of interest to you in your current job role? ------------------------------------------------------------------------ You should get into the habit of regularly checking on-line journals to gather information and ideas which are relevant to your own continuing professional development.
# Applications of ICT in Libraries/Safe and Legal Use of ICT This page is designed for the use of students undertaking the **Diploma** (Diploma ICTL) or the **Advanced Diploma** (Advanced Diploma ICTL) in **Applications of ICT in Libraries**. \-\-\--CHANGES TO THE QUALIFICATION\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-- The Diploma and Advanced Diploma have been superceded by the Professional Development Award in Applications of ICT in Libraries at levels 7 and 8 (English and Welsh levels 4 and 5). They consist of much the same content as the Diploma and Advanced Diploma but the PDAs include two new Digital Culture units. ------------------------------------------------------------------------ These qualifications were developed by the **Scottish Library and Information Council (SLIC)** and are validated by the **Scottish Qualifications Authority (SQA)** **Supporting Clients in the Safe and Legal Use of ICT** is a Mandatory unit in the level 7 programmes. Information regarding the **background to the courses**, **content** and **certification opportunities** can be obtained by following the **Diploma** (Diploma ICTL) or the **Advanced Diploma** (Advanced Diploma ICTL) links. ## Safe practice relating to the use of ICT for communication ### Using ICT for communication This section relates to supporting clients in **using ICT safely** for communication purposes, within the constraints of current legislation. Clients should already possess basic ICT skills, such as simple word processing and the ability to navigate the Internet using a web browser. You should also establish the client's communication needs, e.g. do they need e-mail for personal or work-related correspondence, in order to assist in the selection of a suitable e-mail service. The use of e-mail exploded some years ago, encouraged by the fall in prices of home PCs and the introduction of free Internet access in libraries and schools. Since then despite the rise of social media email use has continued to increase and is predicted to continue. Email is an essential method of communication both socially, commercially and professionally. There are many advantages: - the speed of delivery - the ability to send to multiple recipients - the flexibility of using web-based e-mail accounts for sending e-mails for various locations - the ability to attach other types of files, such as images. - the low cost involved in sending mail in bulk. #### Electronic mail You should have an in-depth knowledge of electronic mail including: - local e-mail software, systems and protocols - the structure of e-mail addresses - tracking e-mail messages - delivered, read etc. - using importance flags - changing setting for preferred presentation Yo may be asked to set up e-mail accounts for clients ... #### Setting up e-mail accounts A web-based e-mail account is one where the user accesses his or her e-mail by means of a **web-browser**, such as **Internet Explorer** or **Firefox**, rather than by using a specialist e-mail client program, such as **Outlook, Outlook Express** or **Thunderbird**. You should be able to **set up web based e-mail accounts** and to show clients how to do this. This includes opening and closing the account. #### Free e-mail services Popular free e-mail services include the following: - **Gmail** <http://www.gmail.com> - **Hotmail** <http://www.hotmail.co.uk> - **Lycos** <http://mail.lycos.com/lycos/Index.lycos> - **Yahoo** <http://mail.yahoo.com/> - **Mail2web** <http://mail2web.com/> For some tips on email providers and the pros and cons associated with each one have a look at this link <http://www.pcadvisor.co.uk/features/internet/3448241/whats-best-free-email-service/> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.1** If you are not already familiar with the process, log on to one of the e-mail services above and follow the instructions to create an account for yourself, e.g.: joe_bloggs@hotmail.co.uk. As you do this, note down any points which you would wish to make to clients when demonstrating how to set up an email account. You will use this account or one of your own existing ones in subsequent activities. ------------------------------------------------------------------------ #### Sending and receiving e-mails Using e-mail is a big step for the uninitiated and assumptions should not be made about how quickly clients can absorb technical details and instructions. If you are in any doubt, you can find out how to send and receive mail from the help pages of the relevant e-mail services. You'll usually find a link to this on the opening page of any web based e-mail service. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.2** Select one of the web-based e-mail services listed above and show a client how to carry out the following tasks: 1\. create a new e-mail 2\. add content to an e-mail 3\. send an e-mail to a recipient 4\. check for new e-mails sent to them 5\. open received e-mails 6\. reply to e-mails received 7\. forward a received e-mail to another recipient. If you send e-mails to one of the accounts you created earlier, you'll be able to check that they've been received correctly and demonstrate this to the client. ------------------------------------------------------------------------ Once your clients have mastered the basics of e-mail, they'll probably want to move on to more complex tasks. Let's start by looking at sending, receiving and saving attached files ... #### Using attached files One of the particularly useful things about e-mail is the ability to **attach files** and thus send, say, copies of photographs to the recipient. This is particularly useful for older clients staying in touch with their family when they stay at a distance. Any sort of file can be attached and sent with an e-mail. Another common file type attached to e-mails is a word processed document You should be able to show clients **how to attach files**. The client may create the file in the library, e.g.: by typing a Word document or scanning in a photograph. Clients may also wish to attach previously created files brought to the library on floppy disks, CDs or USB flash drives. Not all library authorities allow the use of removable data, so you should check this for your own library service. One area where clients may run into difficulties involves the size of attached files #### Size of attached files You should make the clients aware of **possible limits to the size** of files attached to e-mails. There are two points. Firstly some web-based free e-mail services do not allow particularly large attachments. The second point is that, if the recipient is on a dial-up connection, large attachments may be almost impossible to download. This is a particular problem with photographs which can often be several megabytes in size. You should explain the idea of possibly **resizing** photographs and definitely compressing them. A rough guide might be that unless there is a special reason, attached photographs should be no more than say 100K in size. To resize a photograph, the client needs access to image processing software. A free example may be found in Irfan View On the other hand many e-mail programs offer automatic compression of photographs. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.3** Using one of the e-mail programs listed above, demonstrate to a client how to send both a word-processed document and a photograph as attached files. If you send e-mails to one of the accounts you created earlier, you'll be able to check that they've been received correctly and demonstrate this to the client. ------------------------------------------------------------------------ #### Using zipped files With e-mail attachments such as large graphics or word processed documents a reduction in size is achieved by **compressing** or "zipping" the file. If you are using certain operating systems, for example most versions of Linux and Windows ME/2000, file zipping is built in to the operating system. If you are using an earlier version of your operating system, you may need to install a third-party program such as WinZip. You can download an evaluation copy from <http://www.winzip.com> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.4** Using one of the e-mail programs listed above, demonstrate to a client how to compress or "zip" documents and attach them to an e-mail. If you send e-mails to one of the accounts you created earlier, you'll be able to check that they've been received correctly and demonstrate this to the client. You should also show the client how to decompress or "unzip" files and save or print them. ------------------------------------------------------------------------ Another area your clients will need to know about is virus checking #### Virus checking **Viruses in e-mail attachments** may cause serious problems for users. Local authorities have anti-virus software in place but you should be aware that this can be a serious problem for home users. Clients can inadvertently pick up viruses and then transfer them between machines when they use files on public access PCs. Automatic checking should be in place but you should still advise clients not to open unrecognised e-mail messages or attachments. Anti virus facilities, and the degree to which they can be automated, vary between e-mail service providers. You can find out how to configure anti-virus facilities from the help pages of the relevant e-mail services, which you can access from the opening pages. It might be worth noting that several providers limit sending or receiving of certain attachments (such as .exe, .bat or .com which are all Windows executables) - this can be useful in preventing the spread of viruses but it might hinder you should you wish to send such files legitimately over the system. #### Implementing virus checking Now try some activities relating to implementing anti-virus software. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.5** Go to the Lycos web-mail site at <http://mail.lycos.com/lycos/Index.lycos> and find out which type of virus protection is implemented. Alternatively, try searching for any email providers anti virus protection. e.g. type gmail virus protection into Google. ------------------------------------------------------------------------ In order to show clients how to check that the virus checking is turned on in their web-based e-mail service, you must be familiar with this facility in the commonly used services. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.6** Log on to any of the new e-mail accounts you created in the first exercise and make sure that automatic virus checking is turned on, as far as permitted by the e-mail service provider. ------------------------------------------------------------------------ #### Anti-virus software It is also worth informing clients about general antivirus software, which will protect against viruses from any source not just e-mails e.g. files brought in by a client on a floppy disk. AVG is a free anti-virus program which can be downloaded from <http://www.grisoft.com> Evaluation versions of subscription anti-virus programs can often be found on computer magazine cover CDs or they can be downloaded from: - **McAfee** <http://download.mcafee.com/us/eval/evaluate2.asp> - **Norton** <http://www.symantecstore.com> - **Panda** <http://www.pandasoftware.com/download/> Once clients start to build up a collection of sent and received e-mails, they may need to learn how to manage them so that they can be located easily when required, so let's have a look at Managing e-mails ... #### Managing e-mails The key to **effective management of e-mails** is always to have an almost empty in-box. In other words, when you receive e-mails you should be able to deal with them promptly and either delete them afterwards or store them in other folders which you have prepared in your e-mail program. You have to show your clients how to do this with their web-based e-mail account. We suggest that you spend a little time with the client, getting an idea of the likely categories for their e-mails, setting up one folder for them and then allowing the client to do this for themselves for the other categories. Google mail (Gmail) utilises Labels rather than folders. Labels work in a similar way but can take some getting used to especially as emails can be given more than one label. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, think of a typical client and jot down a list of folder names which might accommodate the majority of their e-mails. ------------------------------------------------------------------------ #### E-mail folders We can think of the following: - Family members - Friends - On-line shopping - Holidays You may also have thought of others. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.7** Using one of your web-based e-mail accounts, set up folders for the four categories we have listed above. Note down any specific points you would want to alert a client to when demonstrating this procedure to them. ------------------------------------------------------------------------ As well as trying to prevent viruses, clients will also need to take steps to protect themselves against other online threats and nuisances. Let's take a look at Combating spam ... #### Combating Spam All e-mail accounts are bombarded to a greater or lesser extent by **unsolicited e-mails** sent out by hoaxers or commercial interests. These e-mails are known as "spam". In some cases clients will find the spam e-mail subject as well as the content offensive. Most software systems and web based providers offer processes which can block a large percentage of unsolicited mail. You should make clients aware that accessing some websites and responding to messages where they are required to type in their e-mail address may aggravate the problem by signing them up to more junk mail. This is a particular problem with unsolicited e-mails which have a link purporting to remove you from the mailing list but in fact confirms that the account is active and will result in more spam. The **spam filtering systems** used by web based e-mail providers suffer from the same flaw that all spam filtering exhibits -- sometimes, genuine wanted e-mail gets classified as spam and does not appear in the in-box. You can find out how to manage combat spam from the help pages of the relevant e-mail services. You'll usually find a link to this on the opening page of the service. A good suggestion is to have two email accounts, one for personal emailing and another for use when purchasing online. Online shopping is a common way for spammers to find email addresses to pester! ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.8** Log on to each of the new e-mail accounts you created in the first exercise and make sure that the spam filters are turned on. ------------------------------------------------------------------------ #### E-mail etiquette The term "netiquette" is used to describe the rules that govern polite use of the Internet when interacting with other users. Clearly, a large part of this centres round the use of e-mails. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, jot down any points you can think of relating to courteous and effective use of e-mail. ------------------------------------------------------------------------ #### Netiquette Simple points of e-mail netiquette are: - properly describing the purpose of the e-mail in the subject field - using spell checking - avoid using solely capital letters. Using capital letters in an e-mail is seen as the equivalent of shouting at someone. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.9** Look at the exhaustive set of e-mail etiquette rules at <http://www.emailreplies.com> and make a list of the most obvious ones which you can then demonstrate to clients using e-mail in the library. ------------------------------------------------------------------------ Clients may also want so send e-mail to news groups, so we'll look briefly at Using news groups #### Using news groups When using news groups there is a protocol in replying to the various discussions/threads: - make sure that you are using the **correct news group** - make sure that you really mean to reply to the **whole group** and not just send a personal message to an individual member - always reply to the **correct thread** - sending the same message to several groups **(cross posting)** is frowned upon. Clients should be warned that they should always think **very** carefully before posting a message to a public newsgroup. There are group archives (e.g.: <http://groups.google.com>) which store every message ever posted, so a message can have a potential lifespan of many years and could be seen by millions of people! Once a message is posted there is no way of retracting it. Sometimes clients will want to send an e-mail to several people at the same time, so we'll look next at Sending e-mail to multiple recipients... #### E-mailing multiple recipients One of the time-saving features of using e-mail is to be able to send the same information to several people with little more effort that sending to only one recipient. This, of course, is the reason for the existence of spam. You should be able to show clients how send e-mail to multiple recipients, including replying to all, adding additional recipients and forwarding files. They should know how to send e-mails to multiple recipients without displaying the e-mail addresses of all recipients, a facility often known as **blind carbon copies** (Bcc:). This last point is important netiquette as it is very impolite to broadcast the e-mail addresses of others without their permission. You can find out how to send e-mail to multiple recipients from the help pages of the relevant e-mail services. You'll find a link to this on the opening page of the service. A more efficient way of emailing multiple recipients is to create groups. The benefit of using groups is that once created you just type the group name and the email will go to everyone in the group AND you will never miss anyone (as long as you created the group correctly in the first plaace!) ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.10** Log on to one of the new e-mail accounts you created in the first exercise and send an e-mail message to multiple recipients, i.e.: send the message to Account No 2, copy it to Account 3 and blind copy it to Account 4. Log on to the three recipient accounts and check that the messages have been received correctly. ------------------------------------------------------------------------ Sometimes clients will reach the stage where an e-mail account is no longer required, so we'll take a look now at Closing an e-mail account #### Closing an e-mail account You should warn clients that most web-based free e-mail accounts **expire** if not accessed by the user for a specified period of time, sometimes as short as 30 days. In this way the e-mail account will close itself. However, it is netiquette that e-mail accounts should be closed when they are no longer required. This avoids the problem of people sending e-mails to what appears to be a valid address, when no-one is checking the account. You can find out how to close an e-mail account from the help pages of the relevant e-mail services. You'll find a link to this on the opening page of the service. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.11** Log on to each of the four e-mail accounts you created in the first exercise and close each of them. (Assuming you no longer want to use them). ------------------------------------------------------------------------ Clients will often want to use Internet facilities other than e-mail, so we'll look next at Using chat rooms #### Using chat rooms Chat rooms are **virtual social spaces** on the Internet, where users can communicate with each other. Chat rooms are extremely popular because of their unedited and instantaneous nature. Some chat rooms are used simply for entertainment purposes, perhaps based around a topic such as discussing a daily television soap opera. Others may be used for more serious discussions. As with most of the Internet, younger clients are often very savvy with the technology and are keen on using chat rooms to communicate with others of the same age and with similar interests. It is easy to see the attraction for young people of being able to access this 'secret' world of anonymous communication where their parents cannot see what they are doing and in principle no holds are barred regarding 'bad' language. You should be able to inform clients about Acceptable practice in chat rooms Chat rooms have largely been superceded by other social networking services (Facebook, Twitter and Google hangouts etc) but they are still a feature of many peoples online lives. #### Acceptable practice in chat rooms There has been increasing concern about the use of chat rooms for "grooming". "Grooming" is the term given to interaction between an adult and a child with an end view of sexualising that relationship. "Grooming" is illegal. You need to advise **younger clients** as to how they can keep themselves safe by keeping personal information to themselves and never agreeing to meet alone in person anyone they have a chat room-friendship with. They should report any unwanted attention to their parents and / or the chatroom owners. You must make adult users of chat rooms aware of what is acceptable when they are using computers in the library -- this may be more restrictive than when using home PCs. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.12** Find out your library authority's policy and procedures regarding acceptable use of chat rooms and safeguarding young clients. ------------------------------------------------------------------------ #### More about chat rooms You can find useful information on this, and other topics at: <http://publib.boulder.ibm.com/infocenter/sametime/v8r0/index.jsp?topic=/com.ibm.collaboration.realtime.help_80/c_stadv_uim_whatis_chatrooms.html> You can find Chat services at: - **Lycos Chat** <http://chat.lycos.co.uk/> - **Social networking websites** Social networking websites and Chat rooms share similar concerns about safety and vulnerable groups. Social networking websites are very popular because they bring together friends and friends of friends who share a common interest. The illusion that it is a community of friends sometimes means that natural caution is abandoned and private details are shared. In many local authorities and organizations access to social networking websites are blocked by firewalls. These website can offer valuable professional tools and there are some examples of these in Unit 4. Examples of social networking websites include - **Bebo** www.bebo.com - **Facebook** www.facebook.com - **Flickr** www.flickr.com - **LinkedIn** www.linkedin.com - **MySpace** www.myspace.com - **Tumblr** www.tumblr.com - **Twitter** <http://twitter.com> - **WindowsLive** www.home.live.com The ICTL units Digital Culture: Online Communication and Digital Culture: Online Collaboration cover social networking in far greater depth. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.13** Log on to the Lycos chat service listed above and see if you can find a chat room where readers discuss books they have read. Check the Help pages for full details of how to use the service. OR try using a search engine and type \"book reading chat room\" one example is <https://bookclubreading.com/chat-rooms/> Clients may experience difficulties in carrying out certain tasks due to security restrictions placed on servers, so let's take a look at Secure servers ------------------------------------------------------------------------ #### Secure servers Local authorities normally have **secure servers** to protect the local authority and public from potentially hostile breaches. This means that desktops are often "locked-down" and you cannot make changes to the settings on PCs in your library. This can be frustrating -- especially when simple changes to the resolution of display, for example, would be useful for visually impaired clients. Secure servers also have restrictions on adding new software or on downloading executable files. It may also be worth pointing out to library clients the importance of checking the security of the sites they use when making purchases online. Vendors should always use secure servers for the parts of their systems where customers will be typing in personal and financial details, such as credit card numbers. There are two ways a client can check whether their details are secure: ⋅They should look for a closed padlock symbol, normally in the address window of the web site. ⋅They should check that the web address starts HTTPS. The S is the bit which tells them the server is secure. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.14** Check your authority's policy on secure servers and prepare a brief explanatory note for clients. ------------------------------------------------------------------------ Clients may wish to convert paper-based materials, such as photographs, to digital images so they can be sent as e-mail attachments, so let's have a look at Scanning images and saving to disk... #### Scanning and saving images Scanning of images and saving these to disk has increased with the proliferation of **inexpensive** scanning devices. Many clients will wish to send copies of photographs to their family via e-mail. You should be able to demonstrate to a client how to scan an image -- either of text or pictures - and save it to disk. (Note that the scanned files will often be large and may need to be reduced in size if they are to be attachments to e-mails.) Since there is such a range of types of scanner and associated software, we cannot realistically give instructions for use here. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.15** Practice using your locally-available scanner and software to scan and save both text and images. Find out how to reduce the resulting file by compressing it so that it will be acceptable as an e-mail attachment. Note down any points which you will want to make your clients aware of. ------------------------------------------------------------------------ ## Using ICT to support clients with special needs or specific language requirements Bear in mind the Equality Act <https://www.gov.uk/guidance/equality-act-2010-guidance> which encompasses the Disability Discrimination Act (DDA <https://www.nidirect.gov.uk/articles/disabled-peoples-rights-everyday-life>) ### Introduction This section relates to the ways in which ICT can support clients with special needs or those with specific language requirements. For example, this client group might include those **visually impaired**, those whose **first language is not English**, those **disabled**, those with **literacy difficulties**, and those with **dyslexia** or **learning disabilities**. Many of the clients in this group will be **mature and capable** with the same information needs as everyone else and could benefit from some of the assistive technologies to enable them to access the wide range of resources. **Sensitivity** is required in assessing the ability and aptitude of the client. It is important to remember that disabilities may not affect the reading level of clients or their interests. It may be useful to use pictograms instead of text in signage for some clients in this group. #### Websites for those with special needs or specific language requirements When dealing with clients having special needs or specific language requirements, special care should be given to the **appropriateness** of recommended websites. As well as the criteria applied to assessing the appropriateness of websites in general, you should exercise care to ensure that clients are directed towards accessible sites with appropriate content and format. For example, visually impaired people may be unable to access websites which are incompatible with software which they rely on. **Clients with Impaired Vision** Clients with impaired vision may be able to use a normal monitor screen if the settings are adjusted to give **large font size** and **high contrast**. However, others will need to use a software package which will read out the text on the web page -- a screen reader. Some web sites will not work well with a screen reader. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, can you think of features on a website page which would cause difficulties for a client with impaired vision using a screen reader? ------------------------------------------------------------------------ #### Problems for clients with impaired vision The main problems are caused by screens which have no text. If it is not possible to read meaningfully only the text on the website page, then the screen reader will not be successful. So the following are the problem areas: - Web pages which **overly rely** on graphics - Web pages which have graphics or photographs with **no alternative text** explanation - Web pages with text which is **presented within a graphic** - Web pages which use **explanatory animations** The worst offenders can be sites that start in Flash with **no text option**, so that the user gets no information from the screen reader and doesn't know if the site is open or not. #### Screen readers Some problems have been reported in using screen readers with early version of Adobe Acrobat, but these have been overcome in later versions. You can find more information about this at: <http://www.adobe.com> (type screen readers in the search window) A good example of a screen reader which is well liked by users is JAWS for Windows. You can find more information about it at: <http://www.freedomscientific.com/fs_products/JAWS_HQ.asp> Many libraries use **Supernova**, which incorporates a screen reader called **HAL**. Supernova also incorporates a very good monitor screen magnification element - so it can help partially sighted clients. You can get further information (and download an evaluation copy) from: <http://www.synapseadaptive.com/dolphin/> The Royal National Institute for the Blind (RNIB) site gives a useful list of access software at: <http://www.rnib.org.uk/professionals/softwareandtechnology/softwareaccesscentre/Pages/software_access_centre.aspx> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.1** To get a better feel for screen reader software and especially to assist those clients with visual impairment, visit the RNIB site mentioned above and follow the links to some of the sites listed. Download evaluation copies of a few of the software packages and try them out. ------------------------------------------------------------------------ #### Colour blindness Colour blindness is another factor which can affect a client's ability to use a website. There are software packages which: a\) permit a person who is not colour blind to view a web page **as it would appear to a colour blind person**. This can be a useful check for library staff before recommending a website. b\) Use **image processing techniques** to make web pages clearer for those with colour blindness. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.2** Go to <http://colorfilter.wickline.org/> and try the procedure on some webpages which you commonly use. How readable would they be to a client with colour blindness? An alternative colour blindness simulator just for images is <http://www.color-blindness.com/coblis-color-blindness-simulator/> The SLIC website (https://scottishlibraries.org/advice-guidance/the-six-steps-promise/) provides information on accessibility issues. ------------------------------------------------------------------------ #### Clients with specific language requirements When assisting clients with specific language requirements, it is worth turning to the Google search engine. This provides a useful set of **language tools** for finding information and/or websites in specific languages and for translating between a range of languages. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.3** Use the Google language tools to: a\) translate a favourite web page into another language; b\) translate a foreign-language web page into English. Another site which offers translation facilities for text and web pages is: <http://www.babelfish.com/> c\) Try the two tasks above using Babelfish as well. Which site do you think gives the best translations? d\) It\'s important to note that the translation might be a little rough around the edges. Try translating a simple phrase to another language, and then back into English. You might notice quite a change in the meaning of the phrase! ------------------------------------------------------------------------ ### Evaluating websites against best practice guidance Websites which can help assess the suitability of website material include: - **Introduction to web accessibility** <https://www.w3.org/WAI/intro/accessibility.php> - **BBC Best Practice Guidance** <http://www.bbc.co.uk/accessibility/best_practice/what_is.shtml> - **World Wide Web 3 Consortium** <http://www.w3.org/WAI/> - **WAVE Web Accessibility Evaluation Tool** <http://wave.webaim.org/> - **SLIC** <http://www.slainte.org.uk/accessandequity/equityindex.htm> Look at the World Wide Web 3 Consortium pages and find out exactly what Best Practice in terms of web accessibility means. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.4** Follow the link to WAVE given above and use the tool to check the accessibility of a few of your favourite websites. ------------------------------------------------------------------------ ### Assistive technologies Technology can help to balance the difficulties encountered by some client groups. For example, those with motor impairment can access PCs with the aid of a large t**rack ball mouse, touch screens, adapted keyboards** and **special software**. You can find a number of companies which specialise in supplying assistive technology equipment. An example is Inclusive Technology at: <http://www.inclusive.co.uk/>. They have an online catalogue which groups the various items in broad headings. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.5** Browse the Inclusive Technology catalogue. This will give you a good overview of what is available in hardware assistance. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.6** Find out what is available within your own library and library service which would support clients requiring assistive technology. Make a note on each item for future use. ------------------------------------------------------------------------ #### Assistive technologies for clients whose first language is not English You should also be able to use software or keyboard adaptations for people whose first language is not English. It is important for you to know about both what is available locally and organisations to whom clients can be referred. **Adaptive furniture** can be of great use to help clients. You can see an on-line catalogue on the website of Synapse Adaptive here: <http://www.synapseadaptive.com/> They cover many adaptive technologies but if you look for hardware and then ergonomics, you will find a number of desk and chair items. ### Changing software and keyboard settings Although assistive technologies are widely available, sometimes all that is required to improve access for a client is to change the keyboard or software settings. This can allow the enlargement of text, icons and the speed of a mouse click to the client's comfort. **Windows** offers a huge range of **accessibility features**, including adjusting Display Options, adjusting Mouse Options, adjusting Keyboard Options, adjusting Internet Options, adjusting Sounds and Audio Options, adjusting Taskbar and Menu Options, adjusting User Accounts Options, adjusting Speech Options, Utility Manager, On-Screen Keyboard, Narrator and Magnifier. The Microsoft website has details of these at: <http://www.microsoft.com/enable/> Windows has an accessibility wizard which can take the client through the various PC settings. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.7** If you are using Windows 8 visit <http://www.microsoft.com/enable/products/windows8/> for help. Try the features. If you have access to Windows XP you can use the **Accessibility Wizard** to explore the Accessibility features. You can start it by clicking on: **Start \> All Programs \> Accessories \> Accessibility \> Accessibility Wizard** OR **Start \> Run** type accwiz in the Open window. If you are using an earlier version of Windows, or another Operating System, check your local help files to find out what options are available. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.8** From the information sources above, or additionally from the **AbilityNet MyWay** site at: <http://www.abilitynet.org.uk/search/node/myway> make a note of the accessibility features you are likely to require to show to clients. Jot down the steps you have to carry out to implement them. ------------------------------------------------------------------------ ### Voice synthesis and voice recognition Voice synthesis software can be used as an alternative to keying in and outputting in text format. There are two types of software required for this. **Voice recognition software** allows a client via microphone to give spoken commands to the computer, to allow PC use without a keyboard. **Voice output** from the PC is achieved by software which reads out what is displayed on the screen. This is of great use to clients with vision problems. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.9** Find out which of these types of systems are available in your own library service. ------------------------------------------------------------------------ #### Voice synthesis and voice recognition products There are a number of products available for both voice synthesis and voice recognition, including **Dragon Naturally Speaking**, **CoolSpeach** and **Microsoft Speech Server**. You can find further information about one of the best known products at the following web site: - **Dragon Naturally Speaking:** <http://www.scansoft.com/naturallyspeaking/> There are of course many others Some operating system versions have voice synthesis built in. Again the AbilityNet MyWay site at: <http://www.abilitynet.org.uk/search/node/myway> has information on this topic Of course many people now use mobile devices to access information and people using iPods or devices running on the Android operating system have a built in Voice Commands (iPod voice Control, Android Voice Actions) functionality. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.10** Select a voice recognition package and a voice synthesis package available to your library service. In each case set up the package and get practice at using it. Jot down sufficient notes so that you can demonstrate it to a client in the future. ------------------------------------------------------------------------ ## Legislation relating to the use of ICT for storage, manipulation and access of information ### Introduction This section relates to legislation concerning the use of ICT for **storage, manipulation** and **access** of information. Government legislation has a significant impact on ICT in libraries and staff require a sound working knowledge to ensure that clients can use ICT safely and legally. ### General Data Protection Regulation #### Visit the Moodle section on GDPR for up to date information ### Data Protection Act **This section has been superseded by the General Data Protection Regulation (GDPR). The Freedom Of Information section below is still valid though** `<s>`{=html}The **Data Protection Act 1998** applies across the UK and gives legal rights to individuals in respect of their **personal data** held by others. Libraries must ensure that the ways they process personal data of clients and staff, whether manually recorded or computerised, comply with the provisions of the Act. This is particularly relevant to client data stored in an automatic library management system. Such ICT based systems facilitate analysis of client data which would not be possible with manual systems.`</s>`{=html} The following information is extracted from the **Data Protection Act Fact Sheet**, which can be downloaded from the Information Commissioner's website at: <http://www.informationcommissioner.gov.uk/>. The Data Protection Act 1998 seeks to strike a balance between the rights of individuals and the sometimes competing interests of those with legitimate reasons for using personal information. We will look at the following useful sections: - The eight principles of good practice - The six conditions for fair data processing - Sensitive data - Rights under the Act - Criminal offences created by the Act - Unsolicited electronic communications - The role of the Information Commissioner's Office #### The eight principles of good practice Anyone processing personal information must comply with eight **enforceable principles** of good information handling practice. These say that data must be: - - 1\. fairly and lawfully processed - 2\. processed for limited purposes - 3\. adequate, relevant and not excessive - 4\. accurate and up to date - 5\. not kept longer than necessary - 6\. processed in accordance with the individual's rights - 7\. secure - 8\. not transferred to countries outside European Economic area unless country has adequate protection for the individual #### The six conditions for fair data processing At least one of the following conditions must be met for personal information to be considered fairly processed: - - 1\. the individual has consented to the processing - 2\. processing is necessary for the performance of a contract with the individual - 3\. processing is required under a legal obligation (other than one imposed by the contract) - 4\. processing is necessary to protect the vital interests of the individual - 5\. processing is necessary to carry out public functions, e.g. administration of justice - 6\. processing is necessary in order to pursue the legitimate interests of the data controller or third parties (unless it could unjustifiably prejudice the interests of the individual) #### Sensitive data Specific provision is made under the Act for processing **sensitive personal information**. This includes racial or ethnic origin, political opinions, religious or other beliefs, trade union membership, physical or mental health condition, sex life, criminal proceedings or convictions. For personal information to be considered fairly processed, at least one of several extra conditions must be met. These include: - Having the explicit consent of the individual - Being required by law to process the information for employment purposes - Needing to process the information in order to protect the vital interests of the individual or another person - Dealing with the administration of justice or legal proceedings #### Rights under the Act There are seven rights under the Data Protection Act. - 1\. **The right to subject access:** This allows people to find out what information is held about them on computer and within some manual records. - 2\. **The right to prevent processing:** Anyone can ask a data controller not to process information relating to him or her that causes substantial unwarranted damage or distress to them or anyone else. - 3\. **The right to prevent processing for direct marketing:** Anyone can ask a data controller not to process information relating to him or her for direct marketing purposes. - 4\. **Rights in relation to automated decision-taking:** Individuals have a right to object to decisions made only by automatic means e.g. there is no human involvement. - 5\. **The right to compensation:** An individual can claim compensation from a data controller for damage and distress caused by any breach of the act. Compensation for distress alone can only be claimed in limited circumstances. - 6\. **The right to rectification, blocking, erasure and destruction:** Individuals can apply to the court to order a data controller to rectify, block or destroy personal details if they are inaccurate or contain expressions of opinion based on inaccurate information. - 7\. **The right to ask the Commissioner to assess whether the Act has been contravened:** If someone believes their personal information has not been processed in accordance with the DPA, they can ask the Commissioner to make an assessment. If the Act is found to have been breached and the matter cannot be settled informally, then an enforcement notice may be served on the data controller in question. #### Criminal offences created by the Act A number of **criminal offences** are created by the Act and include: **Notification offences:** This is where processing is being undertaken by a data controller who has not notified the Commissioner either of the processing being undertaken or of any changes that have been made to that processing. **Procuring and selling offences:** It is an offence to knowingly or recklessly obtain, disclose or procure the disclosure of personal information without the consent of the data controller. There are some exceptions to this -- for example, where such obtaining or disclosure was necessary for crime prevention/detection. If a person has obtained personal information illegally it is an offence to offer or to sell personal information. #### Unsolicited electronic communications The **Privacy and Electronic Communications (EC Directive) Regulations 2003** cover, amongst other things, unsolicited electronic marketing communications. - **Unsolicited marketing calls** should not be made to individual subscribers who have opted out either directly or by registering with the central stoplist, the **Telephone Preference Service** (TPS), or to corporate subscribers (e.g. companies) who have objected either directly or by registering on the Corporate TPS. ```{=html} <!-- --> ``` - **Unsolicited marketing faxes** should not be sent to individuals without their prior consent or to any subscriber who has objected, either directly or by registering on the Fax Preference Service (FPS). ```{=html} <!-- --> ``` - **Unsolicited marketing emails or SMS** should not be sent to any individual subscriber who has not consented unless the email address or phone number was collected in the context of a commercial relationship. ```{=html} <!-- --> ``` - **Wholly automated marketing calls**, i.e. where a recorded message is played and the recipient does not speak to a human being, can only be made where the subscriber concerned (whether individual or corporate) has consented. #### The role of the Information Commissioner's Office The ICO has specific responsibilities for the promotion and enforcement of the DPA. Under the Data Protection Act, the Information Commissioner may: - serve information notices requiring data controllers to supply him with the information he needs to assess compliance. - where there has been a breach, serve an enforcement notice (which requires data controllers to take specified steps or to stop taking steps in order to comply with the law). Appeals to these notices may be made to the Information Tribunal. #### Other Useful DPA websites There are several websites which give more details and explanations. We have listed some below: - The **Data Protection Act** itself can be found at: <http://www.hmso.gov.uk/acts/acts1998/19980029.htm> ```{=html} <!-- --> ``` - The website of the **Information Commissioner** is at: <http://www.informationcommissioner.gov.uk/> ```{=html} <!-- --> ``` - The website of the **Scottish Information Commissioner** is at: <http://www.itspublicknowledge.info> Useful information on this topic can also be found on the CILIP website. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.1** Search the CILIP website at: <http://www.cilip.org.uk> for 'data protection act'. Make a note of any aspects of data protection which are particularly relevant to your own work. ------------------------------------------------------------------------ Another aspect of data protection is that related to **Government initiatives** on privacy and data sharing led by the Ministry of Justice, which aim to increase the data which can be shared by public bodies. You can find information on the website of the Ministry of Justice at: <http://www.justice.gov.uk/information-access-rights/>`</s>`{=html} ### Copyright legislation Copyright legislation is UK-wide and a number of Statutory Instruments have been put in place to ensure that **European Copyright Directives** are enacted in the UK. The key Act is the **Copyright, Designs and Patents Act 1988** which determines what is illegal and what is permissible. \' The purpose of copyright is to ensure that the creator (person who holds the intellectual property right) or owner of the copyright can: - derive any financial benefit relating to their material - have control over the way in which their material is used. Regular revisions of copyright legislation take place so information professionals must keep their knowledge up to date. Copyright law is very complex but it is important that you have a sound knowledge of what is permissible and the role of library staff in enforcing copyright. The **Intellectual Property Office** website at: <http://www.ipo.gov.uk/> has a good summary of copyright issues. The information on the following pages is extracted from there and summarises the principal points. #### Ownership and duration of copyright The author is the first owner of copyright in a **literary, dramatic, musical or artistic work**. In the case of films, the principal director and the film producer are joint authors and first owners of copyright. The main exception is where a work or film is made in the **course of employment**, in which case the employer owns the copyright. The copyright in sound recordings, broadcasts and published editions generally belongs to the record producer, broadcaster or publisher. Copyright protection in the UK is **automatic** and there is **no registration system** - so there are no forms to fill in and no fees to pay. Copyright is a form of **intellectual property** and, like physical property, can be **bought and sold, inherited** or **otherwise transferred**. A transfer of ownership may cover all or only some of the rights to which a copyright owner is entitled. First or subsequent copyright owners can choose to **license** others to use their works whilst retaining ownership themselves. Copyright in a literary, dramatic, musical or artistic work (including a photograph) lasts until **70 years after the death of the author**. The duration of copyright in a film is 70 years after the death of the last to survive of the principal director, the authors of the screenplay and dialogue, and the composer of any music specially created for the film. **Sound recordings** are generally protected for **50 years from the year of publication. Broadcasts** are protected for **50 years and published editions** are protected for **25 years**. The following are useful websites providing information on copyright: - **Intellectual Property Office** <http://www.ipo.gov.uk/> - **Copyright Licensing Agency** <http://www.cla.co.uk/> - **Copyright, Designs and Patents Act 1988** <http://www.hmso.gov.uk/acts/acts1988/Ukpga_19880048_en_1.htm> #### Copyright and the Internet With the proliferation of electronic communications via the Internet, there has been a massive opportunity created for the **infringement** of copyright. The Internet provides text and illustrations in electronic format, making it easy for the unscrupulous user to **cut and paste** web material into their own documents. You will already be familiar with copyright law restrictions on copying material from books and journals. Similar provisions apply to material from the Internet. It is important to make clients aware that they should check the legality of making multiple copies of textual material from Internet sites. The greatest areas of commercial concern have been copyright infringements involving **music files** and **still and moving images**. It is clear to see that a digital file can be very easily and at virtually no cost copied and distributed anywhere in the World via the Internet. The creator of the original work is excluded from the process and thus receives no financial reward. Not surprisingly the media companies have been in the vanguard of creating means of prevention. A number of **defensive methods** have been created to counter copyright infringement in the digital domain. #### Digital Rights Management (DRM) This is a large area but the greatest and most visible use is (and will be even more so in the future) the **prevention of copying of films** (movies) from DVDs. This requires mechanisms to be active in one or both of the DVD disk itself and the DVD player or computer used. Examples are: - the need to keep a Satellite Television receiver box connected to the public telephone network - certain high definition film disks can only be played back on a computer which is connected to the Internet - the very latest large screen television displays will need a special module to display the coming high definition DVD films. Absence of the module disables the output from the DVD player. The existence of the module guarantees that the incoming digital signal is not being copied. - the regional coding of DVDs which does not allow a DVD disk purchased in the USA to be played on a European region DVD player. You can find additional information at: <http://en.wikipedia.org/wiki/Digital_rights_management> and at: <http://www.ipo.gov.uk/types/copy/c-other/c-protect.htm> #### Digital watermarking This is a computer encryption which is inserted into the image. It is of particular use with images which are placed on websites and thus easily copied. It is invisible to the casual user but provides a **tracking mechanism** for owners. It is a digital code, which can be unique to the image or shared across the owner's other images. You can find additional information at: <http://en.wikipedia.org/wiki/Digital_watermarking> and <http://www.webopedia.com/TERM/D/digital_watermark.html> **Digital fingerprints** are unique labels inserted into different copies of the same content (e.g.: an e-book, video or music file) prior to distribution. Each digital fingerprint is assigned to a specific recipient, and thus provides the capability to trace the culprits who use their content for unintended purposes. Fingerprints should be closely associated with the content and difficult to remove. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.2** Visit <http://www.steganos.com> and download the test version of Steganos Security Suite. Install the program and try using it to hide watermarks (or other messages) in GIF pictures. ------------------------------------------------------------------------ ### Intellectual Property Rights (IPR) The growth of Internet use and ease with which files and ideas can be transferred across continents has led to tighter regulation of and concern for **intellectual property rights**. Intellectual property refers to the rights of the thought process and intellectual creativity which developed the work. Information professionals should be aware of the Intellectual Property Rights issues. You should be aware that intellectual property is the **legally enforceable** right of the owner. Most countries have laws regulating the copying of inventions, identifying symbols and creative expressions. The UK laws cover four main types of intangible property: **patents, trademarks, copyrights** and **trade secrets**, referred to collectively as "intellectual property." Intellectual property has many of the same characteristics as tangible property. It is an asset which can be bought, sold, licensed, exchanged or given away. The intellectual property owner has the right to prevent unauthorised **use** or **sale** of the property. Clients should be aware that they should not use library computers (or any others) to do anything which infringes someone else's intellectual property rights, e.g.: by copying content from someone else's website into their own document, or illegally copying music files. You can find lots of additional information at The Intellectual Property Office <http://www.ipo.gov.uk/> ## Freedom of Information legislation and information access issues ### Freedom of Information legislation Freedom of Information legislation was introduced across the United Kingdom at the beginning of 2005. The Freedom of Information (FOI) legislation is different for **Scotland** from that in the rest of the UK, but the information given here is generally applicable throughout the UK. However you should always check the precise details against the relevant website for your own country. You can find a comprehensive description of the act and its implications at the website of the Information Commissioner at: <http://www.ico.org.uk/for_organisations/freedom_of_information> and for Scotland at the websites of the Scottish Information Commissioner at: www.itspublicknowledge.info The FOI legislation provides a right of access to the information of public bodies by individuals. Information can be in print, electronic, video or audio format. Working in a library you need to be aware of the procedures so that you can assist a client to make an information request on the basis of FOI legislation. You should also be aware of the position regarding your own local authority and its requirements to disclose information. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.1** A client approaches you with a request involving the FOI legislation. He wishes to find out how much money is spent by the local authority on traffic calming measures.Go to the website appropriate to your geographical location and make notes on the process of requesting information which will be useful for clients in the future. ------------------------------------------------------------------------ #### Freedom of Information Act The following details on the FOI legislation is based on information from the **Information Commissioner's** website: The **Freedom of Information Act** enables people to gain access to information held by public authorities in two ways: **Publication Schemes** Every public authority must make some information available as a matter routine through a **publication scheme**. Information that is included in such a scheme must be made available to the public. A publication scheme is both a public commitment to make certain information available and a guide to how that information can be obtained. **General right of access** Any person has the right to make a request for **information held by a public authority**. The authority must usually respond to this request within 20 working days. This right came into force on the 1 January 2005. **Exemptions** The Act recognises that there are grounds for **withholding information** and provides a number of **exemptions** from the right to know, some of which are subject to a public interest test. The Act also sets out procedures for dealing with requests, such as **time limits** for compliance and **fees** that must be charged. **Making complaints** The Information Commissioner is the **independent regulator** of the Act, with responsibilities to promote the legislation and enforce compliance with its provisions. This includes making decisions as to whether a public authority has dealt with requests properly. ### Acceptable Use Policies For legal reasons each library must have an **Acceptable Use Policy (AUP)** covering client access to ICT equipment and the Internet. Each authority will have an individual AUP policy reflecting the local circumstances. Each client using the library facilities is required to indicate acceptance of the policy. It is important that the AUP is reviewed on a regular basis to ensure that it complies with current legislation. The AUP must state that Internet access is monitored using **manual and electronic resources** and that **records of Internet access** are kept. The AUP should also specify the actions and **penalties** which could result from contravention of the AUP. This includes providing the police with information where it is suspected that a criminal act has taken place. If you select the People\'s Network Internet Acceptable Use Toolkit there are several examples of local authority AUPs. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.2** Search the internet to find examples of local authority AUPs. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.3** Obtain a copy of the AUP for your own library. Read it over and make a set of notes to enable you to explain the various points to a client new to the library computer facilities. ------------------------------------------------------------------------ ### Content filtering Internet filtering systems used in libraries are designed to **prevent clients accessing unsuitable material**. When the filtering system is turned on, users cannot open or link to web sites that the filtering system recognises as unsuitable. The filtering system is a software package which can be installed on a PC or a server (to regulate multiple machines). The software can use one or both of two principles. - 1\. When a site is requested, it will check the URL of the site against a list of **proscribed sites**. If the site is on the list, the software will block access. The list is updated at periodic intervals by the software supplier. - 2\. When a site is requested, the software will check over the site and attempt to recognise **key words** which would indicate an unsuitable site and then block access. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, think of a disadvantage for each of the above methods. ------------------------------------------------------------------------ #### Approaches to content filtering Although a useful tool, Internet filtering systems are not foolproof. The first method depends on the list of proscribed sites being complete. It would be impossibly expensive for every website on the Internet to be rated using a human observer. There will also be a **delay** in a new unsuitable site appearing and being added to the list. The second method suffers from the difficulty of **placing keywords into context**. An example being, it has difficulty in distinguishing between the names of body parts used in a pornographical or medical context. Another example is that access may be blocked to sites containing innocuous words, one component of which may be of a sexual or profane nature e.g. Essex (though more complex filters are now sometimes able to recognise such cases). Also, this method checks only for unaccepatble text, not unacceptable images or speech. Any blocking system can be potentially over-ridden by users with technical knowledge, or by using one of the many proxy sites which allow you to circumnavigate blocks by browsing through a proxy server. reporting websites is another way of controlling what is available, see <http://www.iwf.org.uk/> #### The Family Online Safety Institute (formerly The Internet Content Rating Association (ICRA)) FOSI provide a set of categories and levels within each category: - The presence or absence of nudity - The presence or absence of sexual content - The depiction of violence - The language used - The presence or absence of user-generated content and whether this is moderated - The depiction of other potentially harmful content such as gambling, drugs and alcohol The user's browser has to be configured to use the system. Clearly there are obvious weaknesses here in that website developers are not required to use the ratings, and they may be misused. However, similar to the \'\'\'age ratings\' associated with films and computer games, this may in the long run be the best possibility for filtering. Since there are weaknesses in each approach, filtering can not replace vigilance or simple common sense from library staff. For more information visit <http://www.fosi.org/icra/> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.4** Find out the filtering policies in place in your local authority and what your own responsibility is. ------------------------------------------------------------------------ #### Walled Gardens The walled garden approach is often used for young clients. Here, instead of trying to block access to possible unsuitable sites and allowing access to all other sites, the "walled garden" only offers access to **pre-selected websites**. This is a much simpler approach. Instead of trying to cope with rating or searching through the 25,270,000,000 websites catalogued by Google today, a small number of hand picked sites are allowed to be browsed. Of course the quality of this service relies upon the nature of the vetting before access is allowed. The disadvantage is of course the **exclusion of many potentially useful** sites. There have also been issues with e-mail and search engines allowing a hole to be made in the wall. Social networking websites, such as <http://www.facebook.com> and <http://www.flickr.com>, can also be regarded as walled gardens. This is because the owner can control the range of people who view their messages and updates. Another aspect of walled gardens is the barriers which prevent the free flow of information and this is also true of social networking sites with their custom language and proprietary nature. This means that information can't be transferred or access from one platform to another. #### Suppliers of filtering software The following sites are suppliers of **filtering software**, mainly aimed at young clients, which also provide lots of useful information on internet safety: - **SafeSurf** <http://www.safesurf.com> - **CyberPatrol** <http://www.cyberpatrol.com> - **NetNanny** <http://www.netnanny.com> Trial versions of several of these can be downloaded from the relevant website. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.5** Download an evaluation copy of CyberPatrol and try it out. ------------------------------------------------------------------------ ### Internet safety with younger clients Clearly the previous section covering content filtering is particularly applicable to young clients. It may be appropriate to **reserve particular machines** for particular user groups with regard to the type of material which may be accessed. This can also be managed by user ID login procedures. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.7** Find out what is the situation in your own library with regard to the reserving of particular PC's for restricted access to Internet materials. Undoubtedly, the younger clients will have the most restricted access. There are serious risks to younger clients with the possibility of someone being hurt, exploited or abused as a result of personal information being posted online or falling victim to "grooming" (covered in Outcome One of this unit). There are many useful websites which promote safe use of the Internet to younger clients, their parents and teachers. Here are three we would recommend you look at: - **ClickThinking** at <http://www.scotland.gov.uk/Publications/2010/02/09154928/1> - **Kidsmart** at <http://www.kidsmart.org.uk/> - **UK Government Internet Safety Advice** at <https://www.gov.uk/search?q=internet+safety> - **DirectGov Internet Safety** at <http://webarchive.nationalarchives.gov.uk/20121015000000/http://www.direct.gov.uk/en/Parents/Yourchildshealthandsafety/Internetsafety/index.htm> ------------------------------------------------------------------------ #### Illegal material Much material exists on the Internet which it is a criminal offence to access. The catchphrase is 'If it is illegal off-line - it is illegal on-line'. Three types of Internet content are generally regarded as illegal in the UK: - images of child abuse hosted anywhere in the world - criminally obscene images hosted in the UK - criminally racist content hosted in the UK Even though **filtering** and **acceptable use policies** are in place in local authorities, breaches can very easily happen. It is important that you are aware of the local procedures for dealing with such situations. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.8** Here are two scenarios involving a client accessing illegal materials. Consult your library service's Acceptable Use Policy and/or staff manual and make notes of what action you would take in each case. 1\. An adult client is observed systematically accessing criminally racist content on a public access PC. 2\. An adult client accidentally accesses images of child abuse whilst carrying out a genuine information search on another topic. ------------------------------------------------------------------------ #### Sources of further information Go to **Children Exploitation and Online Protection** <http://www.ceop.gov.uk/> This website points to helpful websites for young people and parents containing information about staying safe online at: <http://www.thinkuknow.co.uk/> . The **Internet Watch Foundation** at: <http://www.iwf.org.uk/> is a site allowing the reporting of websites which host illegal content. It is widely supported and has lots of links and information on the subject of illegal content.
# Applications of ICT in Libraries/Net Navigator This page is designed for the use of students undertaking the **Diploma** (Diploma ICTL) or the **Advanced Diploma** (Advanced Diploma ICTL) in **Applications of ICT in Libraries**. \-\-\-- CHANGES TO THE QUALIFICATION \-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-- The Diploma and Advanced Diploma have been superseded by the Professional Development Award in Applications of ICT in Libraries at levels 7 and 8 (English and Welsh levels 4 and 5). They consist of much the same content as the Diploma and Advanced Diploma but the PDAs include two new Digital Culture units. ------------------------------------------------------------------------ These qualifications were developed by the **Scottish Library and Information Council (SLIC)** and are validated by the **Scottish Qualifications Authority (SQA)** **Carrying Out the Net Navigator Role** is an optional unit in the PDA in ICTL Level 8 (Advanced Diploma programme). Information regarding the **background to the courses**, **content** and **certification opportunities** can be obtained by following the **Diploma** (Diploma ICTL) or the **Advanced Diploma** (Advanced Diploma ICTL) links. Further information can be obtained from **angela.lees@sqa.org.uk** ## Define the detail of a complex enquiry in conjunction with the client ### Reference interview techniques for complex enquiries In this outcome we will explore how you should tease out the details of a complex enquiry posed by a library client. We define a complex enquiry as one where: - the sources to be searched for information are **not obvious** at the outset of the inquiry - the precise nature of the topic requires to be **teased** out in some detail with the client - a minimum of 3 **variables** are linked in a Boolean search. From this we can see that the typical client for such complex enquiries is likely (but not always) to be a person with some **knowledge or expertise** in the subject area. Where this is so, you should capitalise on this at the initial stage and gain as much specific information as possible from the client. #### Defining the nature of the enquiry Defining the precise nature of the enquiry in conjunction with the client is often referred to as the **reference interview**. However, you may not be able to carry this out face to face. Instead you may carry out the interview over the telephone. Whether communicating face-to-face or by phone, do remember that the reference interview is a **two-way interaction** or dialogue and you must take responsibility for the efficiency of the communication process. You may use e-mails as part of the process, but we would recommend that, with complex enquiries, the bulk of the reference interview is oral. With a detailed and complex enquiry, you would find it difficult to gather from the client the level of detail which you require from the client through e-mails alone. By the end of the reference interview you should be confident that the nature of the complex enquiry has been **fully explored** and that the information required by the client has been specifically defined. The reference interview also provides the opportunity to **establish any special needs** of the client e.g.: visual or auditory impairment. This requires a **tactful** and **sympathetic** approach. You may need to ask for **assistance** from a colleague with specialist knowledge on disability issues. And finally, do remember to record **contact details** for the client. In the excitement of exploring the enquiry and establishing the client's precise needs, it is all too easy to forget this important information. So check at the end of every reference interview that you have a record of the client's name, address, telephone, fax and e-mail details, as appropriate. If you will be phoning the client, it is also polite to note **when** it is convenient for the client to receive your call. #### Communication skills Good communication skills are key to the reference interview. This unit outcome provides a good opportunity for **practising** and **refining** your communication skills. These include: - Appropriate spoken language - Appropriate body language - Good feedback, especially on the telephone - Note taking - Clear and grammatical e-mails We will briefly examine each of these. #### Spoken language You should use language which is **appropriate to the client**, avoiding talking down to the client or, at the other extreme, baffling the client with **specialist jargon**. If you do have to use a term which the client may not understand, e.g. "search engine syntax", be sure to explain it. QUESTION TextEntry1: Explain Dark Internet Conversely a client with expertise in the field they are enquiring about is likely to use **specialist or technical vocabulary** when describing the search topic. Such vocabulary can be useful for you when you are deciding on your search terms (see Outcomes 2 and 3) but make sure that you fully understand the meaning of any such specialist terms. The client should be able to explain them to you. #### Body language In face-to-face situations, use appropriate body language designed to set the client at ease and promote effective communication. Smile and greet the client by name if possible. Lean forward slightly and use eye contact to show your interest in the conversation. Try to carry out the interview in a place where both you and the client are sitting comfortably and at the same level, preferably side by side. #### Feedback You should use appropriate **feedback techniques** to ensure understanding of the client's responses. For instance, you might: - **Rephrase** what the client has said and repeat this back to them - Read out a **summary** of the enquiry based on the notes you have made. With telephone communications you will have to be careful in order to make sure that you fully understand what the client says because you will get no clues from their **body language**. See if you can pick up clues from the tone of the client's voice. Conversely, make sure that your tone is positive and encouraging. Smiling as you speak into the phone generates a **pleasant tone of voice** which encourages helpful responses. #### Note taking In both face to face and telephone interactions, it is essential to take **written notes** of the main points of the conversation. These notes are your reference for checking that you have fully understood the details of the client's enquiry. Full notes are also useful if you have to put the query on one side for actioning later or pass it on to a colleague to deal with. The more complex the enquiry, the more comprehensive your notes should be. #### Writing e-mails If you are using e-mails to communicate with the client, it is important to establish a **cordial tone** while remaining concise and to the point. Writing **clearly and grammatically** is key to this, as is structuring your e-mail well so that the client can follow it easily and respond appropriately. Saving e-mails, both those you send and those you receive, provides a record of your communication with the client. #### Open and Closed Questions In the reference interview, you will use both **open** and **closed** questions. These have different uses. It is important to be able to distinguish between the two types of question and to use them appropriately. Closed questions prompt yes/no or **short factual answers**, such as: - Q. What is the deadline for my getting this information for you? - A. Next Tuesday ```{=html} <!-- --> ``` - Q. Have you checked this reference already? - A. Yes Open questions encourage **longer answers**, such as: - Q. Can you explain briefly what my colleague did last time? - A. She started with Yahoo and then tried a couple of other search engines as well. I think she was looking it up under something like pagan religions in Wales. We got quite a lot of useful stuff. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, explain at what points during the reference interview and for what purposes you are likely to use: - a\) closed questions - b\) open questions. ------------------------------------------------------------------------ #### Using open and closed questions Closed questions prompting yes/no or short factual answers are mainly used in the reference interview context to: - elicit **specific pieces of information** from the client - gain **confirmation** that your understanding of what the client has said is correct - an important feedback tool. You are likely to use closed questions - at the **start of the interview** when you are taking basic personal details of the client - at intervals **throughout the discussion** when you want to check you have your facts right - at the **end of the interview** to sum up and agree on future action. Open questions encourage longer answers and their main uses in the reference interview context are to: - establish **rapport** with the client, especially in the initial stages of the interview and with clients who are not already known to you - set the scene for the enquiry and gain **background information** at the beginning of the discussion - encourage **input** from the client as the interview progresses. So you will use both open and closed questions at appropriate times. When framing a question, always think of the type of response you hope to generate and word the question so as to encourage either a **brief** or an **extended** answer. ### Eliciting information and advice from knowledgeable clients = The interview is likely to begin with the client asking you a question. Your task is to probe further until you are fully satisfied that you are clear **exactly what the client wishes to find out**. Remember to ask for clarification from the client about the topic e.g. ask them to spell uncommon words, expand on the topic under investigation etc. This is particularly important with clients who may be subject experts. While recognising that some clients may be unwilling to give this information, it is helpful if you can establish in some detail the **reasons** why the client wishes the information requested. One important point to establish is whether they require the information for themselves or whether they are enquiring on behalf of someone else. #### Determining the starting point It is important to ascertain the "starting point" of the enquiry in order to avoid wasting time on finding information which the client already knows. This is particularly important with **complex enquiries** for knowledgeable clients, where it may be relatively easy to access information at a simple level, when the client actually requires more sophisticated results. In a complex enquiry from a specialist enquirer, it is likely that the enquirer has already undertaken some basic searching on their own behalf. Equally a well-informed enquirer may well be familiar with some or all of the **sources of information** in their field. You should therefore try to determine what research the client has already undertaken on the topic and what results were obtained. It is often helpful to ask the client's opinion on the usefulness or otherwise of particular sources. A knowledgeable client may also be able to give you some guidance on successful and unsuccessful information searching approaches. However, do not make the assumption that, because the client is knowledgeable about the topic to be investigated, they are well informed about information sources and search techniques. Remember that you are the **information-searching specialist** (while the client is the subject specialist) and so you should critically evaluate any advice on sources and information searching techniques provided by the client. ### Determining the nature of detailed information to be provided Apart from the actual topic of investigation, there are other factors which need to be taken into account before a member of library staff will embark on the information search, e.g.: the quantity, level and format of the required information. #### Quantity We tend to think that our problem in information searching will be an inability to find **enough information**. This can indeed sometimes be the case. But using the Internet often results in the reverse situation -- an overabundance of results. Providing too much information is just as unhelpful as providing too little. You must clarify the scale of information required by the client in order to fully satisfy their needs. If the search produces a large amount of information, you should determine whether the client wishes you to undertake any **filtering** on their behalf before presenting the information or whether they wish to see the full search results. If filtering is requested, you must establish with the client the criteria which are to be applied. Conversely, if the search results are meagre, you should seek guidance from the client as to the possibility of broadening out the search. #### Level It is essential that the information provided is at a **level of complexity** which enables the client's full comprehension but does not patronise the client or tell them what they already know. The following points give you some guidance as to the likely level of complexity of information required: - the client's age (But remember age does not automatically bring wisdom! Remember too that some young people can display astonishing knowledge and expertise in subjects which interest them.) - the client's educational attainment - the client's display of specialist knowledge - the client's linguistic ability Tactful questioning can be used to make an estimation of the points listed above. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, outline a situation where you know all of the above but this knowledge does not tell you the level of complexity of information required. ------------------------------------------------------------------------ #### Other factors affecting level The most obvious example is where the client is making the enquiry on behalf of someone else. Typical examples would include: - a **teacher or lecturer** looking for material which could be used by school or college students - **parents** seeking information for use by their child - a **specialist** in one field who is a beginner in another e.g.: a consultant surgeon investigating horticulture - a **therapist or social worker** searching for information for one of their clients Linguistic ability can be misleading. An overseas visitor with a limited grasp of English or someone with a speech impediment may have **extensive knowledge** of the topic under investigation. You have probably thought of other similar examples. #### Format The results may include information in various formats. There are many formats available, including several as a result of the introduction of ICT. - Your search may direct the client to items of library stock, to be used in the library or borrowed for home use. This could include: - Printed reference sources or information CD-ROMs - Books, audio or video material for home borrowing - Magazines and journals - Pamphlets or leaflets ```{=html} <!-- --> ``` - The search results may be bibliographies or lists of website references for the client to follow up. - The results may be viewed on screen by client, in the form of text, audio or video. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} If the client wishes to view the results on screen on a computer outside the library, what must you ascertain before directing the client to websites with audio or video content? ------------------------------------------------------------------------ #### Other factors affecting format It will be important to check the **specification of the client's computer** in order to be sure that it will support audio or video applications. Another point to ask about is whether the client had a broadband connection. Downloading photographs, movies or sound on a dial-up connection can take considerable lengths of time (It may not even be possible with dial-up technology.) and is costly in terms of telephone charges. If the search is not carried out with the client present, you must ascertain if the client can **visit the library** at a later time to access the search results or if the information must be in a format which can be e-mailed or posted to the client. Difficulties may arise if the client has expressed an initial preference for a format in which the information is not actually available. If the information is only available in a **limited number of formats**, you must alert the client to this and ascertain if any of these formats are acceptable. ### Constraints There may be a number of constrains on the material required. These include: - deadlines for completion - currency of information - language - special needs #### Deadlines for completion It is important for you to gauge the **urgency** of the enquiry. This can range from enquiries where information is required immediately through to those where the results may be presented after some time has elapsed. You should agree with the client on the deadline for completion of the enquiry and also on the action to be taken should this deadline fail to be met for any reason. If you cannot meet the deadline for completion of the enquiry, clearly it is important to explain to the client the **reasons** for this. Perhaps the enquiry has turned out to be much more complex than was originally envisaged. A specialist member of staff who would normally have handled the enquiry may be absent through sickness. Technical problems resulting in Internet access being temporarily unavailable can also throw your enquiry off schedule. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} You have explained to the client the reasons for not meeting the deadline. What else should you discuss with the client? ------------------------------------------------------------------------ #### Difficulties in meeting deadlines Although the client may well feel more accepting of the situation if you explain the reasons for your failure to meet the agreed deadline, to some extent this is water under the bridge. More important to the client is the action you propose to take in order to **rectify** the situation. With this in mind you should raise the issue with the client at the earliest possible stage i.e. as soon as you realise that it is unlikely that the original deadline will be achieved. This gets the client on side and enables you and the client to jointly work out how to make the best of the situation. It could be that it is possible to complete part of the enquiry within the deadline, in which case you must agree with the client which aspects should be prioritised. Or perhaps you could arrange for some or all of the information to be provided by another organisation. The key to **client satisfaction** is to prevent such a situation happening. Be realistic when agreeing deadlines with the client. If you are unsure of how long the enquiry will take, say so. It is better to overestimate than underestimate the time required. That way the client gets a pleasant surprise when the search results are ready earlier than promised. #### Currency of information In your search you will be dealing with two kinds of information: - **Dynamic information** changes frequently (e.g.: current information on news, weather, government policy, share prices) and it is important for you to locate the most up-to-date data or, in a historical enquiry, the information as it was at the time being investigated. - **Static information** is always the same (e.g.: historical dates, chemical formulae). You must also ensure that the client is aware of the need to use **recently updated sources** for dynamic information and the implications which this may have in terms of the timescale and cost of the search. Updating websites to take account of constantly changing information is costly and it may be that there is a charge or a subscription cost to accessing such sites. This is especially true of sites giving financial and performance information about commercial companies or research results. QUESTION TextEntry1: Static and dynamic information #### Language Some information may only be available in languages other than English. You should be certain of the client's **fluency** in these languages before embarking on the search. Some websites have a facility which permits you to **choose the language**. This is usually very simple to do. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.1** Go to <http://www.easyjet.com/en/book/index.asp> and view the site in Italian.Look at <http://www.artis.nl/> and change the site from Dutch to English. ------------------------------------------------------------------------ Some search engines permit you to specify the language of the websites. Some also have a **translation facility** from a foreign language into English and from English into a foreign language. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 1.2** Try this out in Google. Go to <http://www.google.co.uk/> and click the "Search the web" option, then click on "language tools".Search for websites about **"días de fiesta"** (this means holidays) which are written in Spanish and located in Mexico.Choose some Spanish text from one of these websites, copy and paste it into the Translate Box and ask Google to translate it into English for you. ------------------------------------------------------------------------ #### Special needs The reference interview provides the opportunity to establish any special needs of the client. Some of the most common examples are: **Learning difficulty** For clients with learning difficulties you might have to look for material of a simpler nature, perhaps with more visual or audio content **English as a second language** These clients may prefer material which is not in English. This might mean having the enquirer at your side while you carry out the search so that they can provide assistance with vocabulary. Alternatively, you may be able to pass the enquiry over to a colleague with language skills. (See earlier guidance on language) **Physical impairment** Any material found must be accessible to the client e.g.: websites must be accessible to a visually impaired client. (See Outcome 4 for more details of this.) If you wish to find out more about the skills and knowledge required for this outcome, the following website may prove helpful. - <http://www.hals.lib.tx.us/ref123/2interview.htm> ## Demonstrate knowledge of search logic, search engines and features of the Internet ### Introduction This outcome looks at a number of aspects relating to web searches, including the following: - Boolean logic - Truncation and wildcards - Non-obvious search terms - Grammar of the Internet - Search engine operation - Search terms - How ranking works - Ownership of the web - Dark internet and invisible web #### Boolean logic Boolean operators are used to **combine search terms** in order to make the search results more specific. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, can you name the three Boolean operators? ------------------------------------------------------------------------ #### The Boolean operators There are three Boolean operators - **AND, NOT** and **OR**. We will explore how each of these is used. **AND** is used to link search terms. Entering an expression such as **beans AND toast** means that results will be returned only where both words appear. Using the **AND** operator narrows your search and gives a smaller number of results. **OR** is used to indicate that any of the terms may be present. Entering an expression such as **punk OR hair** means that results with either one or the other (or possibly both) will be returned. Using the **OR** operator widens your search and gives a larger number of results. The **OR** operator is particularly useful where a topic might involve synonyms or near synonyms. A search for **illness AND felines OR cats** will be more wide-ranging than **illness AND cats**. **NOT** is used to exclude terms. Entering an expression such as **pop music NOT beatles** might be devised to return results about pop music but excluding results about the Beatles. Using the **NOT** operator narrows your search and gives a smaller number of results. The **NOT** operator is particularly useful when one of your search terms had more than one meaning. **Telegraph** might refer to electronic communication methods but it is also a common name for newspapers. A search for **telegraph development NOT newspaper** will eliminate press information. In fact the expressions are pretty close to what you would say in natural speech: - I am looking for references to both beans **AND** toast. - I am looking for sites on either punk **OR** hair - I am looking for information on pop music but **NOT** including the Beatles. Sometimes this is easier to understand in diagrams, so let\'s have a look at Logic diagrams \... #### Logic diagrams: the AND operator Imagine that we have a number of websites which give information about children's clothes. Some of these have information only on girls' clothes, some have information only on boys' clothes and some have information on both boys' and girls' clothes. In the diagrams the left hand circle represents all records including the word **girls** and the right hand circle represents all the records including the word **boys** **AND** ![](Venn-and.svg "Venn-and.svg") **girls AND boys** The shaded area represents the records which have information on both girls' clothing and boys' clothing. #### Logic Diagrams: the OR operator **OR** ![](Venn-or.svg "Venn-or.svg") **girls OR boys** The shaded area represents the records which have information on only girls' clothing, only boys' clothing or on clothing for both boys and girls. #### Logic Diagrams: the NOT operator **NOT** ![](Venn-not.svg "Venn-not.svg") **girls NOT boys** The NOT operator excludes all records with information on boys' clothing, and the shaded area represents the records which have with information about girls' clothing only. #### Using multiple Boolean operators It is possible to use multiple Boolean operators. For example, **security AND internet AND banking** narrows down a search on Internet security issues to records which relate only to bank security on the Internet. QUESTION TextEntry1: Boolean Search QUESTION TextEntry1: Boolean Search 2 You can see how the use of Boolean operators allows a very precise search statement to be constructed. This should produce a smaller number but a better focused set of hits from a search engine. Boolean search logic underlies the operation of all search engines but the various search engines have different systems of entering a Boolean expression. Some allow straightforward search statements using capital letters for **AND, OR** and **NOT**. However many do not explicitly allow this, the much used Google being one of them. #### Constructing precise Boolean searches It is important to consult the search engine help pages to understand how you can create a precise Boolean search. There are three approaches: - 1\. Boolean expressions can be **entered directly** into the search box. We have already covered this. Altavista (http://www.altavista.com/) is a search engine which permits this. - 2\. The search engine **makes assumptions** about what you mean when you enter search terms. - 3\. There is an Advanced search facility. #### Search engine assumptions If the search engine makes certain assumptions about what you mean when you enter search terms in a particular way. You must understand the implications of these assumptions. Basically when you enter more than one term in the search box, the search engine turns this into a Boolean search. The two possibilities are that the engine defaults to an AND or an OR. Most of the common search engines default to AND. So putting in **carriage clock** should return results with both words included. Of course the words may appear in any order and not necessarily next to one another. Google allows the use of a minus sign (-) to use the NOT operator. Thus to create the Boolean search expression **sixties pop NOT beatles**, you would enter **sixties pop --beatles** (Note: You must not leave a space between the minus and the search term which you wish to exclude.) Google assumes that some common words and numbers are never included in the search. Thus if such a word is particularly required, it must be prefaced by a plus (+) sign. This is essentially the Boolean **AND** operator. Using + and -- in this way is not as predictable as you might expect in many search situations. We recommend that they should be used only when there is no alternative. You can find out more here <http://www.google.co.uk/help/basics.html> There are more features of search engines you can utilise have a look at Googles help pages on Punctuation and symbols <https://support.google.com/websearch/answer/2466433> and on Search Operators <https://support.google.com/websearch/answer/136861?hl=en> #### Advanced search facility Many search engines have an advanced search facility. This allows many refinements, such as specifying the language, format and age of the sites returned. Most advanced search facilities however have a set of choices which allow a Boolean search to be created. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, take a look at the advanced search facility on Yahoo: <http://search.yahoo.com/search/options?fr=fp-top&p> What expressions are used instead of the Boolean operators AND, OR and NOT? ------------------------------------------------------------------------ #### Advanced searching on Yahoo Yahoo uses *With all of the words = AND* *With at least one of the words = OR* *Without the words = NOT* By placing search terms in one or more of these categories, you can set up most Boolean statements you will need in your searching. Note that it is not only search engines which provide these advanced search facilities. They may also be found within a site. The Houses of Parliament site is an example: <http://www.parliament.uk/business/publications/> #### Other points on Boolean searching A good website covering Boolean searching can be found at: <http://searchenginewatch.com/2155991> A final point about the grouping of terms is that if you want to find results which include an exact phrase, most search engines let you do this by placing the phrase in quotes. e.g. **"knitting for children"**. In the advanced search facility, you are offered a box title **"With the exact phrase"**. This is particularly useful when searching for names where the forename and surname may not be kept together and in order by a search engine. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.1** Try two searches with **land act** and **"land act"** as search terms. You will see that the first search produces results relating to Acts of Parliament which relate in some way to land e.g. we found one about stopping dog fouling on public land. The second search leads us to the various Land Acts. ------------------------------------------------------------------------ ### Truncation and wildcards Traditionally on-line database searching allowed the use of truncation of search terms. This used a symbol such as \~ to represent one or more letters at the beginning or end of a word. For example, \~fuse could lead to refuse, defuse or infuse and refus\~ could lead to refuse, refuses, refused or refusing. In Internet searching this symbol would be called a Wildcard. Two types of Wildcard exist, commonly represented by ? and \*. - ? indicates the replacement of one character - \* indicates the replacement of any number of characters. Wildcard symbols can be used in the middle of a word, not just at the beginning and end, e.g.: *familiari?e* for *familiarise* and familiarize\'\'. You must keep in mind the pitfalls of over-enthusiastic use of wildcards or truncation. For instance, **men\*** would encompass both **men's** and **menstruate**, the latter term being unlikely to be relevant to a search on a male-related topic. Of course the search engines have their own rules. Google for instance does not have this feature. It carries out its own version of using extensions of words automatically. Many search engines use complex algorithms to produce their results which makes the use of wildcards or truncation inappropriate. Most sites which permit wildcard searching will indicate in their Help section which symbols are to be used for these. One search engine which does allow this is Exalead at <http://www.exalead.com/search/> #### Non-obvious search terms A non-obvious search term is a term from some area other than the main search subject which may lead to useful information. This is different from a **related term**, say using a particular country instead of its continent. A non-obvious search term comes from some sort of parallel area which is at first sight not clear. For example, when looking for information about a particular disease, the name of a **researcher** in a similar field would be a non-obvious search term. It is likely that you would have to be guided by the enquirer about the appropriateness of non-obvious search terms because background knowledge of the topic would be needed in order to think of them. Another means of finding non-obvious search terms is to browse in directories and portals and see what terms appear in associated sites. You might like to ask your experienced colleagues to give examples of non-obvious search terms which they have used in the past. ### Grammar of the Internet The official name for what we commonly refer to as a website address is URL. **URL** stands for **Uniform Resource Locator**. Certain conventions apply to the construction of URLs which can give pointers on their usefulness. (This is also relevant to the validation of website results -- see Outcome 4). Alan November has called this the Grammar of the Internet. (see <http://novemberlearning.com/educational-resources-for-educators/information-literacy-resources/>) or (http://novemberlearning.com/educational-resources-for-educators/information-literacy-resources/4-how-to-read-a-web-address/) **http** stands for **Hyper Text Transfer Protocol**. This simply means your browser is looking for a Hyper Text document. Hyper Text is the basic coding used to construct web pages **www**, as we all know, stands for World Wide Web. The interesting parts are after http and www. The next part is called the **domain name**. So for instance **amazon.co.uk** The first part of the domain name may yield useful clues. Is it a well-known name? If you come up with a page on the site <http://www.bbc.co.uk/history/> it has the authority of being on the BBC website. Is it a 'personal' site giving the opinion of only one person? The name of the person may be explicit in the domain name e.g. <http://www.jamieoliver.com/> BUT be terribly careful here. An individual may set up a website to promote their own ideas and then a rival may set up a website with an equally convincing domain name. Remember anyone can set up a domain name of their choice and load any sort of rubbish onto the website. #### Using WHOIS It is often possible to find the owner/publisher of a website by doing a WHOIS search on the domain name. An easy route to this can be found as a facility on many website providers sites e.g.: <http://www.networksolutions.com/en_US/whois/index.jhtml> You can enter the US domain name e.g.: **un.org** will yield the United Nations Organisation. Any site with a similar name attempting to fool users into thinking it is the UNO can be checked out in this way. The UK site for WHOIS searches is: <http://www.nominet.org.uk/uk-domain-names/about-domain-names/domain-lookup-whois/whois-tool> or go to www.nominet.org ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.2** Use WHOIS to decide which of the following is the official site of Glasgow Celtic football club. - <http://www.celticfc.co.uk> - <http://www.celtic-mad.co.uk/> ------------------------------------------------------------------------ #### URL extensions The final parts of the URL (separated by dots) are called **extensions**. A well-known example, say for Amazon (www.amazon.co.uk) is **.uk** which indicates that the website has been registered as of UK nationality. All domain names carry a national identifier as the last extension, except for those registered as being of USA nationality. Taking Amazon as an example: - www.amazon.com No national identifier signifies the United States - www.amazon.co.uk .uk signifies the United Kingdom - www.amazon.de .de signifies Germany - www.amazon.fr .fr signifies France - www.amazon.co.jp .jp signifies Japan ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.3** There are many websites which list these geographical extensions. One of these ishttp://www.iana.org/cctld/cctld-whois.htm Use this or any other appropriate site to find the geographic extensions for the following countries:Indonesia, India, Netherlands, Latvia, South Africa ------------------------------------------------------------------------ Let us look further into www.amazon.co.uk The extension between the company name and the geographical extension describes the type of organisation involved. "co" is for UK commercial companies. Each country has its own method for the domain name extensions. Most of the sites you will be dealing with will be UK or USA based, so let us look at the most common extensions for these countries. #### United Kingdom extensions **.gov.uk** is a national or local government site e.g. www.opsi.gov.uk the Office of Public Sector Information **.co.uk** is a company site e.g. <http://www.slc.co.uk/> the student loans company **.ac.uk** is an academic site e.g. <http://www.soton.ac.uk/> the University of Southampton **.org.uk** is an organisation, often a charity e.g. <http://www.nationaltrust.org.uk/> the National Trust **.ltd.uk** is a registered company e.g. <http://www.evans.ltd.uk/> the women's fashion outlet There will be other domain extensions produced in the future. A recent introduction is .me.uk which is presumably meant for individuals. However you must note that only some of these extensions can be relied upon. Only .gov, .ac and .ltd are strictly controlled. Anyone can set up a website with a .co or .org extension. In summary, you can use the domain name extensions as good CLUES (which are watertight for .ac.uk and .gov.uk) but be very careful. #### United States extensions Remember sites registered in the US have no geographical extensions. **.edu** is an educational institution e.g.: <http://www.wisc.edu/> Wisconsin university **.com** is any company e.g.: www.amazon.com Amazon the Internet company **.org** is an organisation (perhaps non-profit) e.g.: <http://www.openoffice.org/> the organisation developing Open Office, the free office software suite. **.gov** is a Government agency e.g.: <http://www.irs.gov/> Internal Revenue Service **.mil** is a military institution e.g.: <http://www.navy.mil/> the US Navy **.net** is used by network providers e.g.: <http://www.discountasp.net/> an Internet hosting company There are several others and some in the pipeline such as **.info** and **.biz** which will be used for commercial purposes. Not all countries use these descriptive extensions. Germany and France, for example, only have the country extension. Thus we saw: www.amazon.de for Germany and www.amazon.fr for France. Another point to remember is that there is no requirement to register your site under its country of origin. Some British organisations use the US extensions of .com or .org: www.debenhams.com/ - the well-known retailer www.rsc.org/ - the Royal Society of Chemistry are just two examples. ### Search engine operation There are essentially three stages involved in search engine operation. - 1\. Before you come to type in the search terms, there has to have been an enormous **gathering of data** about websites carried out by the search engine company. - 2\. The search engine uses your **search terms** to select candidate sites for the results. - 3\. The search engine returns the **results** ranked in some order. The Internet is continually being scanned by software set up by the search engine company. This software called a spider or web bot looks for websites and key words to associate with them. The key words can either be **metadata** (descriptive keywords supplied by the site designer) or words in the text. The result is an enormous data bank of website addresses and their corresponding key words. #### Search terms When the user enters the chosen search terms, the search engine uses complex and proprietary methods to select resulting websites which should satisfy the search - basically the engine is trying to match your search terms against its keywords. Each search engine has its own 'secret' methods, giving weight to particular words, including extensions to search terms such as plurals and so on. These algorithms may change with time and so different results for the same search terms may be obtained if the search is repeated at a later date. #### How ranking works Finally before presentation of the resulting websites, ranking occurs. Ranking is the process by which a search engine **orders the results** of a search. You would hope that ranking presents the websites most likely to have the most useful information first. However you should be aware that in some cases, commercial sites can **buy** a place near the top of a list of websites in a search engine's results. The implications of this are that the "best" sites do not necessarily appear at the top of the list. Also the results may appear in a different order at a different date due to ranking changes ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 2.4** A useful exercise is to look at the information pages of search engines to understand how they work. There is usually a section on how to notify the search engine about your website which will have interesting clues as to how the search engine treats new websites. For each of: - Google <http://www.google.co.uk/> - Teoma <http://www.teoma.com/> - Yahoo <http://www.yahoo.com/> look for the "about" pages and find out how the engine works and how you submit a website to it. ------------------------------------------------------------------------ It is important to remember that a search carried out by a particular search engine will return only a sub-set of all the possible results. This is because, due to practical constraints, the engine cannot index all the pages available in the web. An issue here is also how quickly the engine reacts to new or altered web pages. Thus it is always worth using several different search engines for any particular reference enquiry. Of course, there are sites returned in a search, which when clicked upon do not appear at all because the website has been rearranged or removed since the last indexing. ### Ownership of the web The questions 'Who owns the Web?' or 'Who owns the Internet?' come up from time to time. The implications of the answers are crucial to a good understanding of the nature of information on the Web. First, let's get the nomenclature correct. The Internet is the physical network over which information can flow. The World Wide Web (WWW) is a collection of sites where we can access information via the Internet. So the question is now in two parts. Who owns the Internet? (i.e.: the physical network) and Who owns the Web? (i.e.: the collection of information we can access)? #### Who owns the Internet? The Internet is an enormous network which has spread throughout the world. One could say that it is owned by many, many organisations but that is not quite correct. It would be more accurate to say that many, many organisations own their particular part of it. Consider how the Internet evolved. There were a number of scientific **research organisations** each with a network of computers and terminals. It was agreed to connect these together. Each organisation owned its own network. Gradually more and more commercial and organisation networks were created and joined together. The idea can be likened to the road network on the European Continent. Each country builds and pays for its own roads but it is possible to drive between any two points on the continent because the road network of each country is connected to the next country. Luckily it is worthwhile for each part of the Internet to pay its own way to get the benefit of being connected to the whole network. ### Who owns the Web The other part of the question, who owns the websites, is similarly answered. Each website is owned and financed by an **organisation or person**. They alone have the rights to place their own information on the website. So Governments will want to have websites to put up information for their citizens to be able to access. Commercial organisations will want to put up websites with information about their products to encourage sales. Other information providers will similarly create sites to distribute knowledge. Then there are millions of websites which are paid for and run by individuals who want to present information about their hobbies, favourite pop stars, family history etc. So there is no one person or body responsible for what exists on the web. It is really quite difficult then to enforce laws proscribing offensive matter because there is no overall control and the offensive site can be situated anywhere in the World. Tim Berners-Lee was the originator of the web and he saw it as a cooperative space for the sharing of information among researchers. He was working at CERN. It still can perform that purpose but the main driving force is now by **commercial interests**. On-line shopping is a very valuable sector nowadays and in the future there will be more and more commercial uses. However you should be aware of the very different forces influencing what is seen in the search results. There are individuals, organisations and companies attempting to present their own version of the truth, often in an even-handed way, but occasionally in an insidious and very dangerous manner. You must hone your validation techniques so that you can recommend websites which really are what they purport. The concepts of the 'grammar of the internet' can be put into practice here. Note that there are some truly shocking websites which lurk under the most inoffensive names. We are not going to supply any examples of these! ### Dark internet and the invisible web Search engines have become the main means of accessing information on the Internet. In the early days directories were used but these have now relinquished first place to the search engines. This is due to the enormous number of websites. Their number has grown exponentially and Google tells us that today there are over eight billion of them. There is no way that all these sites could be viewed by a human reviewer and placed in a directory. Our ability to find information on the Internet is now very much dependent on the qualities of the chosen search engine. This does mean is that, if there are websites which contain information which cannot properly be accessed by the search engine spider, then we will never see it listed in the results. Indeed there are areas of the web which are never found at all by the searching spiders. A current problem is with search engines being unable to index **databases** and other websites which generate **dynamic content**. In other words, the content is not set out on the pages of the website but is generated each time in response to a user accessing the site via a browser. Websites with some content not in HTML also cause difficulties. Examples are proprietary text formats or multimedia. PDF files have also been problematic. If the search engines are not able to find the information then the only hope of finding its existence is by using a Directory. There are specialised portals to 'invisible' websites. One example is www.invisible-web.net which includes a directory of some of the best resources the Invisible Web has to offer. You can read more about the Invisible Web here: <http://oedb.org/ilibrarian/invisible-web/> <http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/InvisibleWeb.html> ## Create and implement a complex search strategy ### Designing a complex search strategy In Outcome 2 we looked at the theory of search logic -- Boolean logic, wildcards, non-obvious search terms, grammar of the Internet, search engine operation and syntax, ranking, ownership of the web, the Dark Internet and invisible web. In Outcome 3 we consider how to apply all of this knowledge in order to design the best strategy for any inquiry. If you are not confident of your knowledge and understanding of the Outcome 2 topics, you will find in beneficial to revise that section before proceeding further with Outcome 3. You can return to the ICTL home page by clicking on the ICTL logo at the top left of the page and navigate to Outcome 2 from there. Complex searches fall into two broad categories: - 1\. You may want to locate a **single piece** of specific information. - 2\. You may be asked by the enquirer to retrieve **everything you can** on the topic. #### Locating a piece of specific information What makes the search complex is that this information is not easy to find. For this type of search, you are likely to use one or more search engines. The skill lies in **choosing your search terms** and combining these into a search statement which will yield the required results. Alternatively, you may know of an **authoritative site** on which this information will definitely be found. In this case, you will use the URL of the site and then carry out a search within that site for the required information. You should bookmark sites which you find especially useful. You can arrange these in your "Favourites" in topic related folders. #### Retrieving everything on a topic You may be asked by the enquirer to retrieve everything you can on the topic. In many cases, to carry out this instruction to the letter would mean presenting the enquirer with an **overwhelming** mass of material. The skill lies in designing your search so that it results in a number of the most useful and representative sites, which present sufficient, but not too much, information in the format and style best suited to your enquirer. For this type of search, in addition to search engines, you may need to use **directories, portals and databases**. With practice you will learn which to use first in specific types of enquiries. #### Useful Search Techniques The key to efficient searching is to construct an appropriate search statement by choosing and combining search terms. You will develop your skills in this with practice. Here are some tips from experienced Internet searchers. 1\. Enter what you consider to be the most important search terms first. For example, **rover cars** rather than **cars rover** ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.1** Enter **rover cars** and **cars rover** into a search engine and compare the first 20 sites listed. You will find the results differ, although some sites appear in the top 20 listed in both searches. **rover cars** is more likely to lead to sites which deal solely with Rovers. ------------------------------------------------------------------------ 2\. Enter phrases in quotes (or the equivalent syntax as specific by the search engine). Quotes instigate a search for the exact phrase e.g.: **"internet search techniques"** will search only for these three words next to each other and in this order. Without quotes, your search will also look for all three words but they could be anywhere in the document e.g.: **internet search techniques** could lead to sites discussing police **search techniques** for suspected **internet** crime. 3\. If you are specifically seeking UK information, either ask to search UK sites only (if the search engine permits this) or add **uk** as a search term 4\. Do not limit yourself to what we, as library staff, think of as indexing terms. Searching the Internet is different from consulting a printed index. So enter as search terms words that you would expect to find in the text. For example, in a search on teenage health problems, you might use search terms such as **bulimia, anorexia**, or **eating disorder**. #### More useful search techniques 5\. Look for distinctive, specific words or phrases which apply to your search topic. This is the best way of narrowing the search to relevant sites. **agoraphobia, English madrigals** and **peregrine falcon** are examples. 6\. Remember synonyms and variant spellings. As much of the Internet content originates from the United States, it is particularly important to remember Americanisms e.g.: **trunk** instead of **boot** of a car; **checking account** instead of **current account**. 7\. When searching on names of individuals or organisations, put these in quotes so that they are a phrase -- **"Melvyn Bragg"; "Royal Society for the Prevention of Cruelty to Animals"** 8\. When searching for information on an organisation, especially commercial companies, using the organisation's name as a search term often does not lead to the organisation's own web-site but to other sites in which the company is mentioned. (This is a result of the ranking methods used by search engines.) You may be more successful by using the organisation's **postcode** and/or **telephone number** as search terms. 9\. Use **nouns** rather than verbs as search terms, wherever possible. The reason underlying this is that nouns are frequently more specific than verbs. 10\. If you are aware that one of your search terms is ambiguous, add additional terms which define the area in which you are interested. You will find that **"michael jackson" "wine critic" uk** leads to sites which are less likely to have a connection with the well-known pop singer. ### Reviewing search terms in the light of results -- broader/narrower/related terms It is important to keep reviewing your search strategy and, in particular your search statement, as the search is underway. Ask yourself: Am I finding too much or too little information? - Is the search generating a number of sites which are unconnected, or only loosely related, to the topic? - Is there a slant to the topic which my search does not appear to be including? In order to refine your search, you must be able to use terms which are broader or narrower than or related to your original search term. The words broader, narrower and related are self-explanatory. A good example which clearly illustrates the concept is: initial search term - **Great Britain** broader term - **United Kingdom** (The United Kingdom includes Great Britain) narrower terms -- **England, Scotland, Wales** (Great Britain includes these three nations) related term - **Northern Ireland** (Northern Ireland is related to Great Britain in that GB and NI make up the United Kingdom) QUESTION TextEntry1: Search term terriers At each stage you should review the search statement, considering if it is appropriate to change the search terms. #### Changing search terms Where the key terms selected initially are yielding too much information, you should move to the use of narrower terms. A knowledgeable client might be able to advise you here. Where the key terms selected initially are not yielding sufficient information, you should move to the use of broader or related terms. Using a directory may help you identify broader, narrower and related terms within its structure. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.2** Enter aeroplanes into the search box on Surfwax. When the next screen appears which summarises the search results, click on **Focus** and this will show you a selection of Similar, Narrower and Broader terms for **aeroplanes**. ------------------------------------------------------------------------ ### Collection and presentation of results The results of your search should be presented in a structured way which facilitates understanding by the client. This may require you to extract or summarise information from one or more sites. If you do this, it is important for the client to be informed of the source(s) of the information found so that the client may explore the information further if they wish. The result of the search might be a **bibliography** of web references or references to information sources in print, audio or video formats. You must quote any such references using a recognised format, for example, as in ISO 690. ISO 690-2 specifies the elements to be included in bibliographic references to electronic documents. It sets out a prescribed order for the elements of the reference and establishes conventions for the transcription and presentation of information derived from the source electronic document. Here is an example of an electronic citation. Monibot, George (2014) \"How we ended up paying farmers to flood our homes\". Accessed via <http://www.theguardian.com/commentisfree/2014/feb/17/farmers-uk-flood-maize-soil-protection> (19 February 2014). ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, state what you think the elements in this citation mean: Monibot George 2014 How we ended up paying farmers to flood our homes <http://www.theguardian.com> 19 February 2014 ------------------------------------------------------------------------ #### Electronic citations The elements of the citation are as follows: Monibot - Author's surname George - Author's forename 2014 - Date of publication of item How we ended up paying farmers to flood our homes - Title of item <http://www.theguardian.com> - URL for website on which item was found. 19 February 2014 - Date this site was accessed Note that because web pages change constantly and can disappear it is important to give the date on which the site was accessed. #### Presenting information to the client You should devise a **logical structure** for presenting the information to the client. The most commonly used structures are based on these arrangements: - Alphabetical - Chronological - Geographical (grouped by country, region or town) - Topical (grouped by sub-topics) - Categories (e.g.: type of organisation -- public, private, voluntary) - Accepted hierarchies (e.g.: biological taxonomy) - Sites presenting one point of view, followed by sites presenting the opposing arguments QUESTION TextEntry1: Traffic Congestion Search ## Evaluate websites located in a complex search ### Evaluating websites Information on the Internet presents greater **problems** regarding reliability than information found in reference books and other materials in public libraries which have undergone a rigorous selection process. So ALL information found on websites must be **critically evaluated**. The more complex the search, the more necessary it is to apply sophisticated evaluation techniques. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, make a list of criteria you might apply to assess the suitability of a website found as a result of carrying out a complex information search ------------------------------------------------------------------------ #### Evaluation criteria We have noted the following nine criteria: - Authority - Credibility - Accuracy - Bias - Emphasis - Currency - Clarity of presentation - Use of multimedia - Ease of use for visually impaired clients We shall now look at each of these in more detail. #### Authority Here you need to consider the **expertise and reputation** of the organisations or individuals connected with the website. When the information is explicitly attributed to an author, you can assess their reputation. Thus information supplied by an acknowledged expert in a field or found on the website of a well-known and respected organisation carries a lot of weight. Of course a website may give no direct clues as to **authorship** and hence authority. In this case you can try to find out who owns the site. In Outcome 2 of this unit, we covered examining the URL of the website and carrying out a WHOIS search to find out this type of information. In searching for information about horse breeds you might come across this site: <http://www.ansi.okstate.edu/breeds/horses/> Remembering Outcome 2, what type of organisation does this URL suggest? .edu tells us that this site belongs to an educational institution in the Unites States. In fact, the site is that of the Department of Animal Science of Oklahoma State University and therefore you can expect an amount of authority. Note that some colleges and universities allow their students to create home pages which are not authoritative in the least. You can usually spot this by the name of the student in the URL. #### Tracing website ownership If you were obtaining information about travelling in South Africa, you might come across this site <http://www.springbokatlas.co.za/> From the two domain name extensions you can see that it should be a commercial site (.co) and it is registered as a South African site (.za) You need to access the **whois** for South Africa. You can do this by searching for it. You can find it here: <http://co.za/whois.shtml> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.1** Carry out this whois search.You can see that <http://www.springbokatlas.co.za/> is registered by the travel company and at the same address as the travel site in Cape Town. That gives a bit of confidence that it is a real company and not a fraudulent 'front'. ------------------------------------------------------------------------ Of course it is pretty rare that a respected organisation's website would not very explicitly feature its own name. You may have to either omit the information found on a non-attributable website or give a strong **health warning** to the client regarding its usefulness. #### Credibility If the author or organisation is unknown to you, you have to check out their credibility. Regarding a named but unknown author: - a\) there may be a section on the **author's credentials**, giving qualifications etc. -- you can check out these details. - b\) if no credentials are supplied you can simply carry out a search on the **authors' name**. What would you look for in the search results? You might be convinced by such things as: - positive references to their names in other articles on respected sites - biographical information showing that they have relevant qualifications or work experience ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.2** When carrying out a search on the history of nuclear physics, you have found a site which quotes extensively from the research of someone called **Norman Feather**. Carry out a search to determine who this person was and whether or not he was a respected scientist of his time. ------------------------------------------------------------------------ A mark of credibility is in the **citing of sources** for the information. If the unknown author cites only her/his own sources then you have no clue. #### Evaluating credibility You can evaluate a site to some extent by looking for **references** to it on other reputable websites. You can check which sites link to or reference the website being validated simply by searching on its URL. Enter the URL into a search engine and it should return a list of websites where the URL is found. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.3** Try this out by searching on www.qca.org.uk which is the URL for Qualifications and Curriculum Development Agency www.qcda.gov.uk. You will find links to many respectable curriculum related sites, including government departments. ------------------------------------------------------------------------ We have now covered a **variety of methods** which can be used to establish the authority and/or credibility of websites. With experience you will know which method(s) are best in any instance. The next activity provides an opportunity to practice using different methods. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.4** Check reliability of each of the following web pages for authority and credibility: - <http://www.nasa.gov> - <http://blogs.sun.com/roller/page/dcb/?anchor=rocket_science_open_standards> - <http://www.apogeerockets.com/> - <http://www.bbg.org/gar2/pestalerts/> - <http://www.rbgsyd.nsw.gov.au/plant_info/pests_diseases> - <http://www.care2.com/channels/solutions/outdoors/444> - <http://webarchive.nationalarchives.gov.uk/20060711093022/http://www.met.police.uk/history/ripper.htm> ------------------------------------------------------------------------ #### Accuracy Verifying the accuracy on information in a complex search has particular problems for the information professional who cannot be a subject specialist for every search area. The accuracy of factual information can usually be assumed to apply to reputable sites but even then you need to cross check using more than one site wherever possible. You certainly cannot supply information from sites with dubious authority/credibility without a caveat. You must of course use your **common sense**. You can detect obvious mistakes e.g. a road-based car is not going to travel at 2000 miles per hour although it might in exceptional circumstances reach 200 mph. With more specialised data, you may still be able to get a feel for the numbers and simple mistakes will stick out. #### Bias Here you are looking to see if only one side of an argument is given. Many websites by their very nature present information from only one viewpoint and are thus biased. It is worth examining the URL and whois information. A commercial site is not going to criticise its products negatively. If the site is a personal one, you may be looking at the one-sided views of a 'crank'. If the site is sponsored by a dubious organisation, you may only be able to find this out by looking at the whois data. Of course even well known experts can be biased in their opinions. While such information need not necessarily be excluded from the results presented to the client, you must **indicate any identified bias** and, if possible, provide information from another sources which present opposing points of view. This is particularly important when the client is seeking information on potentially contentious matters such as politics, religion, race or issues related to pressure groups. One of the most obvious areas where bias is shown is **health information**. Some sites are simply promoting dubious or unproven therapies with a view to selling their own "medicinal" products. You must make doubly sure that any sites found as a result of a search on a medical topic are reputable. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.5** As an exercise in looking for bias in websites, search for a pair of websites giving opposing points of view on the following topics: - Cats make better pets than dogs - HRT is the only way to go - Why wind farms are bad - Petrol is greener than diesel Have a close look at the arguments. Note how convincing some of these one-sided views can be. You may be lucky when searching for information in a contentious area in that your initial search results in several sites giving the different viewpoints. However, if not, you must be prepared to actively seek out websites giving alternative views. ------------------------------------------------------------------------ #### Emphasis This differs from bias in that it is the omission of information rather than deliberate over-emphasis of one point of view. For example, US sites may devote little space to British developments. Another pertinent example is that sites for UK government departments may include information only for England on devolved issues. You should be aware that emphasis can be more difficult to detect than bias. A solution is to apply the technique of cross checking with other sites on the same topic. Health topics are an excellent example of where emphasis can creep in because of the differing approaches to medicine in different countries. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.6** Insert the search term **"chronic fatigue syndrome"** into a search engine. Note how the majority of sites which appear are from the United States. Examine the sort of information on these sites. How useful would it be to an enquirer from the UK? Now repeat the search using **"chronic fatigue syndrome" uk**. Examine the sites listed. We are sure that you will find them more useful sources of information for a client in your library. ------------------------------------------------------------------------ #### Currency In using the Internet you often come across websites which are seriously **out of date**. In fact some of them are actually abandoned and will never be updated again. When you use websites in your information searching, you must make sure that the information is current. Of course with a reference book you can look at the publication date. However for websites it is not just so easy. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, jot down some points you could look for on a website to establish its currency. ------------------------------------------------------------------------ #### Establishing currency We can think of a few possible ways of establishing the currency of a website. Obviously they depend on finding date information. This can be explicit: - You can check the **"Last revised"** date on a website. Remember though that this may only indicate the last time a change was made to a particular part of the website and that it does not imply that all the content was updated on that date. - You can look to see how recent are the **publication dates** of the documents referred to on the site - You can look out for **dates quoted** within text and make an estimate of currency If there are no actual dates mentioned, you will need to look for implications of dates. - You can look for **regulations or laws** mentioned in the site and find their dates of introduction. - You can look for the names of **institutions** or Government departments. These do change name and can be used to give a date range. - You can look for the names of **personalities** involved in the topic which can show currency. - Finally you can simply look for reference to **recent news items** which will date the site's information. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.7** Look at the following websites which all provide dynamic information and note the evidence which indicates that each has been recently updated. - <http://www.bankofengland.co.uk> - <http://mascotsuk.com/> - <http://www.thisismoney.co.uk/> - <http://easyjet.com/en/book/index.asp> - <http://www.blenheimpalace.com/> ------------------------------------------------------------------------ #### Currency indicators We noted the following points: **Bank of England** -- lists recent working papers, conference reports etc. **Mascot** -- states on home page "Site last updated \[date\]" **This is Money** -- states on home page "latest news on \[date\]" **Easyjet** -- the earliest date for booking is today's date **Blenheim Palace** -- the list of events is completely current. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, can you think of a flaw with the method we used to check the currency of the Blenheim Palace site? ------------------------------------------------------------------------ #### Problems in establishing currency In our Blenheim Palace example, we have established that their events calendar is current. This site also has a section on Properties to Rent. We cannot assume from the fact that the Events information is up-to-date that this section too has been updated (although clearly it would make good commercial sense for Blenheim Palace to make sure that this is done!) Previous versions of a Website The **wayback machine** at <http://www.archive.org> allows previous versions of websites to be browsed so that the history of a site may be viewed. This can allow you to get a feeling for how it has developed. It also allows or will allow changes in thought or policy to be observed by looking at a website at different points in time. You should, however, be aware that this site is by no means comprehensive. It is possible for website publishers to opt not to be archived. Also there is a limit to the amount of storage for the past websites. In a complex search, it is likely that the results of the reference enquiry will consist of a **list of websites**. This differs from a simpler search which might only consist of information which you extract from a website. Since the client will have to browse the resulting sites, some further points have to be considered as to the suitability of the websites. #### Clarity of presentation You need to choose sites where the information is clearly presented. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, list the factors you would consider when assessing whether a site presents information clearly. ------------------------------------------------------------------------ #### Presenting information clearly You will want to make sure that the following points are satisfied: - Is it easy to **glean specific information** from the site? - Is the site easy to **navigate** around? - Does the site **avoid gimmicks** such as unnecessary and obscuring graphics? Unless you are in the position that very few websites provide the required information, you can select the best, which satisfy the above points. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.8** Look at <http://www.eca.ac.uk/> It is difficult to find information on the site because of its emphasis on visual gimmicks and use of multiple drop-down menus. Unfortunately a client seeking information on this institution will have little choice but to persevere in using the site. ------------------------------------------------------------------------ #### Use of multimedia The appropriate use of **multimedia** can enhance understanding and indeed provide additional information. However, some sites include multimedia such as Flash introductions, which at best are annoying and at worst put off the client due to the delays caused. If the connection to the Internet is not fast broadband, then the delays can be intolerable. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.9** Here is an example of a site from a firm offering web design services <http://www.transcena.co.uk> We think its Flash introduction is unnecessary and does not add anything to the information provided. See if you agree with us. ------------------------------------------------------------------------ Some sites offer the option of a Flash and non-Flash version. Look at <http://web.archive.org/web/20050113090553/http://www.blackburn.ac.uk/> and compare the operation of both versions. Which do you prefer? For some searches, information in multi-media format is useful or even essential. You can make this one of your selection criteria. Often just typing video as one of your search terms will lead to sites which have video clips (It can, of course, also lead to sites which are selling videos). We tried jfk, assassination, and video which led amongst others to <http://www.courttv.com/onair/shows/kennedy/vintage_video.html> where video clips can be played. If sound files or sound tracks of movie clips are used, these may require loudspeakers to be available or, more likely in libraries, headsets to be used. Clearly sites where essential information is presented audibly are not appropriate for the hearing impaired. #### Ease of use for visually impaired clients There are two main areas which should be considered for the visually impaired client. It may be that a client can use text on the monitor screen if it is very clear and perhaps large size. Here it is necessary to check that the website text is not partly obscured by background graphics such as a **watermark effect**. Other considerations are whether the text size can be increased by the user and if there is a text only version of the website. The colour of the text and the background can also influence visibility. It is generally accepted that bright orange, yellow and red backgrounds make text difficult to read. <http://web.archive.org/web/20040710220451/http://www.dundee.ac.uk/djcad/courses/details.php?s=3> is an example. Another practice to be avoided is white or pastel coloured text on a dark background. In a previous version <http://web.archive.org/web/20040101101704/http://battle1066.com/> the banner headline above the coat of arms in this site is difficult for even those with perfect vision. You can compare this with the latest version at <http://www.battle1066.com/> <http://www.abelard.org/technology/net-searching.php> Much of the text here is almost illegible. At the level where the client is unable to read text from a monitor screen a **text to speech** accessory must be used. For this to be a successful experience, the website must be clearly laid out. Also it is important that all graphics have text descriptions. This is vital when it comes to the use of graphics in navigation through the website. There are **guidelines for accessibility** and although you cannot be an expert in this area, you will find useful information on the following websites: Two sites covering all accessibility issues: <http://www.coi.gov.uk> and <http://www.becta.org.uk/> A commercial site explains its approach <http://www.santander.co.uk> The RNIB site <http://www.rnib.org.uk/xpedio/groups/public/documents/code/public_rnib008789.hcsp> Recent research by the **Museums, Libraries and Archives Council** tested websites in the museums, libraries and archives sector and found that only 3% of these met the accessibility criteria set for government websites. You can read more about this research at: <http://web.archive.org/web/20050503012040/http://www.egovmonitor.com/reports/rep11278.pdf> ## Reviewing the Effectiveness of a Search Strategy ### Estimating the effectiveness of a search strategy The **client's requirements** should have been clearly specified during the reference interview. The first stage in evaluation is to revisit that initial interview and consider if you did indeed fully explore with the client all the aspects of the query. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 5.1** Think of any complex information searches which you have recently carried out. Look back to your initial reference interviews with the clients. Could these have been improved in any way? Note down what you could do better next time. ------------------------------------------------------------------------ Next you must **review the results of the search** against the client's requirements and consider the success of the search in these terms. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, outline the criteria which you would use to judge whether your search strategy has been successful. ------------------------------------------------------------------------ #### Criteria for success We suggest that you would consider: - Did the search produce results which were **relevant** to the client's needs? - Did the search produce **comprehensive information**? i.e.: enough for the client's needs? - And conversely, were the search results **sifted** in order to avoid deluging the client with information? - Did the search produce information which was **reliable, up-to-date** and **covered all aspects** of the topic? - Did you constantly have to **modify the search strategy** during the course of the search? And were these modifications a result of **deficiencies** in your original strategy? - Did you meet the client's **deadlines** for producing the results? - Did your search strategy mean that the search was carried out as **quickly and efficiently** as possible? You should have no difficulty in applying the majority of the above criteria when considering the **effectiveness** of your search. The final criteria relating to time and speed may be less familiar to you. #### Time spent searching Time spent on a search is a **key evaluation criterion**. Given enough time an unskilled searcher could probably produce the required results, but an information professional should be able to produce the requested information much more quickly. You should consider if your search strategy produced the results in the minimum possible time or whether any modifications of the search strategy would have yielded speedier results. Key to this is the choice of search engines, directories, search terms and logic. Finally, do remember that **it may not be possible** in all cases to fully satisfy the client's requirements. (If this is the case, you will have explained the reasons for this to the client, e.g. information does not exist in the format specified, and proposed some alternatives if this is possible.) Failing to fully satisfy the client's requirements is not in itself a criticism of your search strategy. If the information does not exist, the best search strategy you can devise will not uncover it. It does, however, give you a pointer for the next time you are asked to carry out a similar information search. If you have doubts as to the **existence** of the information requested, share this with the client right at the start so that they are not disappointed later. ### Measuring the cost of a search The cost of an information search arises from two components. The **cost of staff time** (yourself and colleagues) dedicated to the search and **direct costs**, i.e.: anything which has actually to be paid for. An effective search strategy should mean that staff time input is **minimised**, thus keeping down the cost of the search. It can be easy to overlook the cost to the library service of staff time because public libraries do not normally charge for this. Commercial libraries often ask library and information staff to log the time spent on information searches and the enquirer's department is then billed for this. We are not suggesting that you formally log time spent -- merely that you keep aware of roughly how much time you are devoting to any information search and whether this is justified. If you find yourself devoting an **inordinate amount of time** to any search, ask yourself whether you should: - modify your search strategy - ask advice from a more experienced colleague - ask a more experienced colleague to take over the search for you - abandon the search at this point, explaining the reasons for this to the client. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, note down any direct costs which you think could be associated with an information search on the Internet? ------------------------------------------------------------------------ #### Direct costs Direct costs could include: - Telecommunications charges - Fees for subscription sites - Charges to download particular documents - "Pay-per-view" costs for commercial sites Telecommunications charges will have been paid by your library service. They represent a **fixed overhead** and so you do not need to try to calculate them for any search. Where a library service, has decided to subscribe to a particular information source, there will be good reasons for this. A knowledgeable person has decided that the subscription site provides better information than is available on free sites. Indeed the subscription service may provide the only information available. You should therefore familiarise yourself with the **content of subscription sites** and their **charging structures**. **Downloading** and **pay-per-view** charges can mount up. Before using such information, always consider if there is an appropriate alternative source which is free of charge. An interesting article on the development of \"pay for content\" Internet provision is found at <http://web.archive.org/web/20040206000441/http://www.demonatthus.net/news/n-a030407a.html> Another cost which can be considerable relates to **printing** and/or copying the search results. This can be minimised if you supply the results to the client in electronic format wherever possible. ## Use ICT to set up current awareness and alerting services ### Determining current awareness requirements of clients You should begin by establishing an **information profile** for the client. This will provide information about what information the client needs and the quantity, level and format of the required information. It will also specify any constraints, such as deadlines for completion, currency of information and language and note any special needs that the client might have: **Example Information Profile** The following information profile might suit a client who wants to be kept up to date on happenings in the Scottish Parliament: **Client name:** Joseph Grant **Email address:** jgrant@btinternet.com **Age:** 35 **Education:** Completed six years secondary school **Information Required:** Regular updates re Scottish Parliament **Quantity:** Brief summary with links to full stories **Level:** Literate adult **Format:** Daily digest **Deadlines:** Wants to start ASAP **Currency:** Updated daily **Language:** English **Special Needs:** None You can find an example of online profile form at: <http://web.archive.org/web/20060705204606/http://sciweb.lib.umn.edu/general/profile.phtml> #### Establishing an information profile Establishing an information profile uses essentially the same skills and techniques as the first part of this unit, i.e.: - Reference interview techniques - Eliciting information and advice from clients - Determining the nature of detailed information to be provided-- quantity, level, format - Constraints -- deadlines for completion, currency of information and language - Special needs of the client If you want to review these topics, you can click the ICTL logo at the top left of the page to return to the Unit 6 home page and navigate from there to Outcome 1 of this unit. In addition to establishing the nature of information required, what else would you need to agree with the client in order to provide a satisfactory current awareness service? It is also essential that you should agree the update frequency with the client. e.g.: weekly, monthly, whenever a change occurs, on-demand etc. #### Costs You should take into account the **costs** (in staff time or subscriptions to commercial services) of providing updates and should be realistic about their frequency. Remember that your time costs money and it is unrealistic to spend disproportionate amounts of it in meeting the needs of a small number of clients. Also, commercial services can be **expensive to use**: if you do not already subscribe to a service, it may be uneconomical to do so to meet the needs of a small number of clients. Some commercial services also incur a usage charge, in which case you must ensure that this is not excessive. ### News services A news service is one which provides regular updates on topics commonly regarded as news, i.e.: those topics covered in newspapers and television or radio news broadcasts, such as current events, politics, sport etc. News is a distinct category for current awareness because of the need for **immediate notification** of breaking events as well as **regular summaries**. There are a wide variety of news sites to choose from. Three **methods of delivery** may be distinguished: - **daily digest** via e-mail. This gives the subscriber a brief daily summary of newsworthy events, usually with links to more detailed stories. - **breaking news events** by e-mail. This lets you receive instant details of new stories, more or less as they break - **online news ticker** permanently visible on the computer monitor. This scrolls news headlines continuously across the bottom of the screen and is updated with new stories as they happen. It often provides hotlinks to more detailed coverage. All three have their own advantages and disadvantages. The daily digest is non-intrusive and allows you to follow up such stories as you choose, but you only receive updates once a day. The breaking events coverage lets you know as soon as something happens, but you have to check your email to see it. The online news ticker lets you know about new stories instantly, but some people find it an annoyance having it on the screen all the time. Some e-mail delivery services allow the use of filters, which give an element of choice of news topics delivered. If you are setting up a news delivery service for a client, it is vital that you use this filtering in order to tailor the service to the client's needs. #### Daily digests You can obtain a daily digest from the following sources: - **BBC:** <http://newsvote.bbc.co.uk/email/news> OUT OF DATE try this.. <http://www.bbc.co.uk/news> - **Google:** <http://www.google.com/alerts?hl=en> - **The Scotsman:** <http://auth.jpress.co.uk/login.aspx?ReturnURL=http%3a%2f%2fwww.scotsman.com%2ftemplate%2fEmailPreferences.aspx&SiteRef=SCOT> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 6.1** Choose one of the above services and sign up to receive a news digest. Remember, you can always cancel it later if you don\'t like it. ------------------------------------------------------------------------ #### Breaking news You can obtain breaking news alerts from the following sources: - **BBC:** <http://news.bbc.co.uk/1/hi/help/3533099.stm> - **Google:** <http://www.google.com/alerts?hl=en> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 6.2** Choose one of the above services and sign up to receive breaking news stories. Remember, you can always cancel it later if you don\'t like it. ------------------------------------------------------------------------ #### Online tickers Online tickers are available from the following sources: - **Reuters:** <http://www.microsite.reuters.co.uk/ticker/uk/godownload.htm?src=marketing> - **BBC:** Currently being upgraded, but check at <http://news.bbc.co.uk> TRY <http://news.bbc.co.uk/1/hi/help/4801459.stm> You can find a list of news tickers at: <http://www.journalismnet.com/choose/newstickers.htm> It\'s unlikely that you could install these on library machines due to security restrictions, but you might have to explain to clients how to put tickers on their own PCs. \-\-\-- ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 6.3** Go to <http://www.journalismnet.com/choose/newstickers.htm> and look at the tickers. Which ones look as if they might be useful to you and why? ------------------------------------------------------------------------ #### News aggregators **news aggregators**, use an XML format such as RSS, to receive relevant news headlines. **XML** stands for **eXtensible Markup Language** and is a standard format for computer-readable documents which makes it straightforward to process them automatically. **RSS** stands for **Really Simple Syndication**. It\'s a method of describing news or other Web content that is available for syndicating (i.e.: feeding or distributing) from an online publisher to Web users. The term "syndication" derives from the newspaper industry practice of sharing content between different papers. A column or a cartoon (such as Peanuts) which appears in numerous different papers is described as "syndicated". There is a useful introductory article at: <http://www-106.ibm.com/developerworks/library/w-rss.html?dwzone=web> and another at: <http://news.bbc.co.uk/1/hi/help/3223484.stm> To read rss feeds sign up to a free account at netvibes A **news aggregator** is a software application that collects syndicated content from a variety of sources and displays it as a single web page. A website may incorporate aggregator features by republishing syndicated content on one or more of its pages. Aggregator features also can be added to other client software, such as Web browsers, e-mail clients, weblog creation programs, or media player programs, to allow these programs to display syndicated content. You can get more information from: <http://en.wikipedia.org/wiki/News_aggregator> #### News providers Another way to make the topic choice more focused is by the choice of provider. The FT ticker would be a good choice for stock market data. If you carry out a simple search on Google, an array of sites providing specialised news will be found, e.g.: www.bunkerworld.com offers both an e-mail delivery service and a news ticker devoted to the happenings in the world of bunker fuel. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 6.4** Use Google to find specialised news providers on the following topics: - The Middle East - ComputingTake a note of the two most interesting ones in each category. The ones we found included the following: **The Middle East** - Globalvision News Network: <http://www.gvnews.net/html/index.shtml> - AME Info: <http://www.ameinfo.com/45876.html> - Gulf in the Media: <http://www.gulfinthemedia.com> **Computing** - SearchMobileComputing: <http://searchmobilecomputing.techtarget.com> - News.Com <http://archive.is/20121208135346/http://news.com.com/> - Network Computing <http://www.networkcomputing.com/netnews/> ------------------------------------------------------------------------ ### Website updating services Some commercial websites offer an alerting service detailing new products. Of particular interest to library professionals are the alerting services of journal and book publishers. For journals, it is possible to get the table of contents and sometimes abstracts of the articles. One example is the content alerting feature in <http://www3.oup.co.uk/jnls/> for Oxford University Press Journals. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 6.5** Go to <http://www3.oup.co.uk/jnls/> and sign up for alerts for one or more of the OUP journals. ------------------------------------------------------------------------ For book publisher alerting services it is possible to include filters to receive information on particular types of books. An example is the Mailing List feature on www.heinemann.com Booksellers also offer alerting services, with www.amazon.co.uk being an obvious example. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 6.6** Go to www.amazon.co.uk and subscribe to their alerting service by clicking on the New for You link in the left-hand column. ------------------------------------------------------------------------ You can find links to the website alerting services of many major publishers and vendors at: <http://www.lib.cuhk.edu.hk/information/publisher.htm> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 6.7** Go to <http://www.lib.cuhk.edu.hk/information/publisher.htm> and sign up for one or two alerting services which look useful to you. ------------------------------------------------------------------------ Alerting services are not confined to books and journals. For example, Stay Smart Online (http://www.ssoalertservice.net.au/view/80956e10461f4446acbcab5cae348a0c) is an Australian Government service, designed to provide small businesses with accurate, plain English advice to help protect computers, mobile phones and other devices from malicious attack. #### Monitoring websites The contents of websites change and often do so at unpredictable intervals. If you want to be notified when the contents of a website change, without having to connect to it frequently to check, you can set up an **alert** to notify you of any changes. If an alert can be set up it can solve two problems. Firstly if there is a substantial change to an often-recommended site, you can check up to see if must be re-evaluated for recommendation. Secondly, if data contained in a site is updated at say annual intervals, it is useful to know when the new data becomes available. This is similar to knowing that a new edition of a reference work has been published and needs to be purchased. Some websites offer to notify subscribers automatically if changes are made, but there are a number of tools available which allow you to monitor changes on any website, e.g.: - Website Watcher <http://www.aignes.com/features.htm> - Check and Get: <http://activeurls.com/en/> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 6.8** ------------------------------------------------------------------------ Download an evaluation version of the software from one of the sites given above and use this to set up alerts fro two or three websites you visit frequently. ### Creating a current awareness system for your own organisation A **current awareness service** is a service or publication designed to alert scholars, researchers, readers, customers, or employees to recently published literature in their specialist field(s). Current awareness systems are usually available in special libraries serving companies, organizations, and institutions in which access to current information is essential. Such services can be tailored to fit the interest profile of a specific individual or group. Some online catalogues and bibliographic databases include a \"preferred searches\" option that allows the library user to archive search statements and re-execute them as needed. Current awareness services are sometimes referred to as **selective dissemination of information (SDI)**. Internal **current awareness systems** have traditionally involved the physical circulation of print materials to clients. These have now been replaced by electronic versions. This includes identification of relevant materials which match the client's information profile. The materials might include internal documents in electronic or print format. You should be able to identify relevant print or non-print materials from journals, reports etc. Where such are available only in print format, you should give a reference and a brief description. You should be able to operate a system for e-mailing information to clients within the organisation at agreed intervals and set up web-sourced current awareness services for internal clients. You can find lots of links relating to current awareness services for librarians at the following sites: <http://www.city.academic.gr/special/libproject/LIBRARY_SITE/information_services/LIBRARY_SERVICES/alerting_services.htm> <http://www.lboro.ac.uk/departments/dis/disresearch/ascas.html> Although these are university library sites, much of the content is applicable to public libraries. You can find a long list of available current awareness and alerting services at the following location: <http://www.tru.ca/library/guides/current_awareness/current_awareness_a-z.html> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 6.9** Draw up information profiles for one or two of your colleagues and set up current awareness services for them by using some of the resources mentioned in the sites listed above. ------------------------------------------------------------------------
# Applications of ICT in Libraries/Educator This page is designed for the use of students undertaking the **Level 8 PDA** (Advanced Diploma ICTL) in **Applications of ICT in Libraries**. These qualifications were developed by the **Scottish Library and Information Council (SLIC)** and are validated by the **Scottish Qualifications Authority (SQA)** **Carrying Out the Educator Role** is an optional unit in the Level 8 PDA programme. Information regarding the **background to the courses**, **content** and **certification opportunities** can be obtained by following the **Level 7** (Diploma ICTL) or the **Level 8** (Advanced Diploma ICTL) links. Further information can be obtained from **angela.lees@sqa.org.uk** ## Establishing ICT training needs for individuals or groups ### Training needs analysis Before embarking on designing and delivering any training programme you must establish your precise objectives. This means determining: - 1\. the **existing** skills, knowledge and competences of each of the learners - 2\. the skills, knowledge and competences the learners **require** in order to operate effectively in their existing work role or to progress to a different work role - 3\. And, from 1 and 2, the **gap** in skills, knowledge and competence which the training is designed to address. It will be the objective of your training that each participant learns enough to eliminate this gap. This process is often called a **Training Needs Analysis (TNA)** or **Learning Needs Analysis (LNA)**. For Outcome 1 you must demonstrate that you can carry out a straightforward TNA for individuals and groups of learners. The first step then is to make an **accurate estimate** of the learner's current competence. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, outline what may happen if you embark on delivering training without ascertaining the existing skills, knowledge and competence of your learners. ------------------------------------------------------------------------ #### TNA problems There are two equally damaging scenarios. At one extreme you may have **overestimated** the learners' skills and knowledge. You therefore pitch your training at too high a level. If you are lucky, the learners will point this out to you and you may be able to think on your feet and do a quick redesign of the training. However, if you find yourself having to devote a considerable amount of time to bringing the learners' skills and knowledge up to the point at which you thought you would be starting from, you will be unlikely to be able to achieve the final learning objectives in the original timescale. If you have overestimated the skills of only one or two members of a learning group, it is quite likely that they will not draw your attention to this. Instead they will sit quietly, not wishing to appear foolish in front of their colleagues. In this situation they will learn little and will become demotivated and disinterested. At the other extreme you may have **underestimated** the learners' skills and knowledge. You will then find yourself delivering training which covers areas which they already know -- "teaching Granny to suck eggs". Your learners are likely to become quickly **disenchanted** and possibly aggressive. If this applies to only one or two in a learning group, these learners are likely to switch off and may distract other group members. From these examples, you can see the importance of really knowing your learners before you start. #### Estimating ICT Competence Learners may have acquired differing **levels** of ICT competence through: - **formal training** in the workplace - **experience** in the workplace - **off-the-job training** such as an ICT course at school or college - **personal development** and experience outside work. Where skills and knowledge come from non-workplace environments, it is important to make sure that they are transferable into a workplace setting. ICT skills and knowledge usually do transfer readily. Thus your TNA should relate to competences from both work and non-work environments. The obvious place to start is with the learners themselves. However, people are, depending on their personality, often inclined to underplay or alternatively exaggerate their ICT competence and experience. So you will wish to **corroborate** the learner's estimates of their competence through hard evidence or the views of other people. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, think of who else, apart from the learners themselves, might be able to provide you with useful information on a learner's ICT competence. ------------------------------------------------------------------------ #### Sources of information regarding ICT competence You might usefully consult some or all of the learner's: - **line manager** or immediate supervisor - **colleagues** - **previous tutors** or trainers from within and outside your own organisation - **clients** in the library who will have received a service from the learner which is ICT related. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, note down as many techniques as you can which you might use to gather information on the learner's competence from the learner themselves or from any or all of the people listed above. ------------------------------------------------------------------------ #### Information gathering techniques You might use some or all of: - direct observation of the learner using ICT in the workplace - examination of work samples or work records belonging to the learner - practical tests and assessments of the learner's use of ICT - questionnaires or checklists covering key ICT competences - the learner's staff appraisal reports - interviews or focus groups with learner, manager, colleagues, tutors, clients #### Direct Observation This is one of the most reliable methods for you to gauge the learner's competence. You will see for yourself exactly what they can and cannot do. You can supplement this by **questioning** to extend to situations which occur rarely or would be emergencies. Use questions like \"What would you do if the system crashed at this point?" or "Can you think of an occasion when what you have just done would not be appropriate?" There are a few **disadvantages** with direct observation. The learner may feel nervous and so under-perform. Alternatively, they may "play to the camera", although this is usually easily spotted. The main drawback is that observation must be done on a one-to-one basis. It is therefore time-consuming. Another difficulty can be that you have to arrange a time which is convenient to both you and the learner and when work conditions allow the learner to carry out the specified tasks. #### Examination of Work Products ICT tasks often produce **printed materials** or **electronic records** which are stored in the computer. These demonstrate clearly what a learner has been capable of. #### Practical Tests and Assessments You may be able to devise a short pre-training assessment which all learners will undertake. Make sure that this assesses only the knowledge and skills which are directly relevant to the proposed training (and, it goes without saying, to the work to which this training is related). Devising assessment material is a skilled task. It is always advantageous to have a dummy run with a couple of volunteers who will give you unbiased feedback and point out any ambiguities or deficiencies in the assessment. You may be able to get assistance in devising assessment materials from your Training or HR Department. #### Questionnaires or Checklists Questionnaires or checklists can be completed by the learner themselves or by other people who can give an **informed opinion** as to the learner's competence. It is important not to make these too detailed. You should home in on the key competences only. Here's an example of a checklist which might be used to establish a learner's competence in using applications under Microsoft Windows. Please tick the box which best describes your ability to carry out each of the tasks below: ----------------------------------------------------------------------------------- ------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------- ---------------------------------------------------- Task I have done this often and am confident about my ability                I have done this quite a few times and I would probalby be able to do this in most situations      I have done this occasionally and would need some reminders about how to do it again I have never done this                             Run an application from the desktop or by using the Start menu         Create a new folder         Open a document and use the Save and Save As options         Save a document in different formats         Print a document         Cut, copy and paste within a document, between documents and between applications         ----------------------------------------------------------------------------------- ------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------- ---------------------------------------------------- #### Staff Appraisal Reports Staff appraisal documents are, of course, **confidential**. However, with the agreement of the member of staff concerned you may be shown relevant extracts relating to ICT skills. #### Interviews or Focus Groups These an take place with learners, managers, colleagues tutors or clients and may be one-to-one or group interviews. It is vital to obtain the consent of the learner before you invite opinions from others as to the learner's ICT competence. It is equally important to reassure others that the learner has agreed to your interview with them. In some cases the learner may be able to suggest appropriate interviewees who could provide valuable insight into their ICT competence. In all cases it is essential to start the interview by explaining the reasons why you are exploring the learner's ICT competence. It is good practice to use a checklist to ensure that you get all the required information from each interviewee. #### Areas of competence You can use these techniques to profile the learner's **existing ICT** skills in the areas of: - hardware - operating system environment (e.g.: Windows) - packages used (e.g.: Word) - the library's own ICT management system - the Internet In Outcome 1 of Unit 3 we discussed in some detail the areas which you would want to explore under each of these headings. If you want to review this material, you can click the ICTL logo near the top left of the page to return to the Unit 7 home page and navigate to the relevant Outcome from there. #### Learning objectives The next stage is to determine your learning objectives, i.e.: the skills and knowledge which it is intended all learners should possess at the end of the training. These will usually be related to: - improving the learners' **competence in their current job** - preparing for planned **new ICT devleopments** which will impinge on the learners' current job - upskilling so that the learners can move on to a different job which requires **increased ICT competence.** To determine the required skills and knowledge, you can use the same or modifications of the methods for assessing existing ICT competence ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, look at this list again: - direct observation of learner using ICT in the workplace - examination of work samples or work records belonging to the learner - practical tests and assessments of the learner's use of ICT - questionnaires or checklists covering key ICT competences - the learner's staff appraisal reports· interviews with learner, manager, colleagues, tutors, clients Remembering that this time you are focusing on the end product of the training, amend the list to show the methods you could employ. ------------------------------------------------------------------------ #### Methods of gathering information We think that this time you will lay more emphasis than previously on evidence from people other than the learner. Of course, it is still important to consult the learner in order to gain their views on the skills which they think they require. However, at this stage you are likely also to consider: - **direct observation** of others using ICT in the workplace, e.g.: staff already employed in a post to which the learner may aspire - **examination of work samples or work records** belonging to others, e.g.: a colleague in a similar job to the learner who demonstrates greater ICT competence - **questionnaires or checklist**s covering key ICT competences, e.g.: completed by managerial or supervisory staff - **interviews** with managers, supervisors and colleagues in similar posts or in promoted posts - **literature** provided by suppliers of new/upgraded ICT equipment which it is intended to install in the library. And finally having gathered all your evidence as to the existing skills and knowledge of your learners and the competence which are the end result of the training, you can design an appropriate training programme to upskill the learners to the required level. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, consider what approach you might adopt if your training needs analysis establishes that the ICT skills of your small group of learners differ considerably. ------------------------------------------------------------------------ #### Dealing with differing skill levels Your approach might be to design **individual learning programmes** for each learner which they can work through independently of their colleagues. However, it is probably more cost-effective to bring the skills of all group members up to a common base level and then provide group training from that point on. You might, for instance, arrange for three of the group to work through some basic ICT learning packages in the library before you delivered some group sessions on simple Internet searching. ## Selecting a delivery approach ### Learning styles We all learn in a variety of ways but each of us tends to have one learning style with which we feel most comfortable. Many educational theorists have written about learning styles and the implications of these for delivery of training. One well-accepted approach is that of **Honey and Mumford** who identified four main learning styles: - activists - reflectors - theorists - pragmatists According to Honey and Mumford, different learning activities are associated with each of the four learning styles. #### Activists Activists prefer **new experiences, opportunities to tackle problems** and **difficult tasks**. They like challenges, generating new ideas, brain storming, leading others. Their philosophy is: \"I\'ll try anything once\". They tend to act first and consider the consequences afterwards. They are gregarious and like learning in a group with other people, although they can tend to try to centre all such group activities on themselves. #### Reflectors Reflectors are thoughtful people who prefer to **collect all the facts** and data and **consider every aspect** of a situation before taking action. They will listen to others' opinions and experiences and learn from these. They are likely to adopt a low profile in group discussions but enjoy observing other people in action. #### Theorists Theorists prefer a **clear structure, focus and purpose** and will want to know exactly what is expected of them. They like to have time to **think logically** about ideas and situations and try to fit these into a pattern. They learn by thinking problems through in a step-by-step, logical way. They like to analyse and synthesise. They are uncomfortable with subjective judgements, lateral thinking and anything flippant. They are happy to learn alone without group support. #### Pragmatists Pragmatists learn best through **concrete activities** which let them try out ideas, theories and techniques. They like to have the opportunity to **practice** what they are learning with **feedback** from a knowledgeable mentor. As they are essentially practical, down to earth people who like making practical decisions and solving problems, they tend to dislike long-winded and open-ended discussions. Although each learner is likely to have one preferred learning style, everyone can use a **mixture of styles**, depending on the type of learning and the occasion. QUESTION TextEntry1: Different Learning Implications #### Other approaches to learning styles The approach of **Honey and Mumford** is just one way of looking at different learning styles. If you wish to explore this further, you will find some good summaries of other approaches at: <http://www.learningandteaching.info/learning/experience.htm> Another way of categorising learners is to measure their attributes in terms of: - 1\. Active vs reflective - 2\. Sensing vs intuitive - 3\. Visual vs verbal - 4\. Sequential vs global. You can learn more about these learning styles and their implications for design and delivery of training at: <http://www.engr.ncsu.edu/learningstyles/ilsweb.html> This also includes a **short online questionnaire** which you can be used to determine your own learning style. That\'s the end of this section. You can review any topic by using the menu at the left-hand side of the screen, or move on to the next section: Delivery approaches ... ### Delivery approaches When we explored the four different learning styles, we realised that the trainer must choose **appropriate delivery methods** in order to accommodate the styles of the learners. Another equally important dimension to consider is matching the delivery method to the nature and content of the learning. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, list the most common types of delivery method which you might be able to include in a programme of workplace training. ------------------------------------------------------------------------ #### Delivery methods Among the most common delivery methods are: - "chalk and talk" - demonstration - group problem solving - role playing and simulations - practical activities, individually and in groups - individualised learning, e.g. from a book or an e-learning package - videos and other media. #### "Chalk and Talk" This phrase is often used to describe **traditional teaching**. The picture it conjures up is of the trainer in front of the group of learners, giving a talk on some topic. Nowadays, the "chalk" element is more likely to be a whiteboard, flipchart or a PowerPoint computerised presentation. This method is suitable where the trainer wishes to impart theoretical knowledge to the whole group of learners. We absorb more information from **what we see** than from what we hear. So it makes sense always to include visuals, either on the board, chart or screen or through handouts or posters. The learners' **attention span** will be limited when they are required only to listen to someone talking. Good practice is to introduce a variation by asking questions of the learners, encouraging the learners to ask questions of you or by interspersing your talk with group discussions. #### Demonstration The trainer will demonstrate **how to carry out a practical activity** to either a group of learners or to an individual. You might be able to incorporate demonstrations from other people -- experienced colleagues or one of the group who is more skilled than the others. When group demonstrations are involved, it is crucial that every group member can observe the demonstration clearly and has the opportunity to ask questions of the demonstrator. #### Group Problem Solving **Team working** is one of the most highly prized skills in the workforce of today. Any training which involves group problem solving has the multiple advantage of: - improving the learners team working skills - developing the particular competences related to the training topic - enhancing the core problems solving skills of the learners. Problem solving activities need to be carefully structured by the trainer. A useful approach is to encourage the learners to adopt a process of Plan--Do--Review. This ensures that they progress to the stage of evaluating their problem solving strategy and learning from it: not just designing and implementing a strategy for solving the problem. #### Role Playing and Simulations These offer the opportunity for participants to practice in a safe environment and to learn about situations which occur only rarely or which involve danger and emergency action. However, role-playing and simulations should be used sensitively, remembering that many learners feel apprehensive in artificially constructed situations. #### Practical Activities **Hands-on practical work** has an important role to play in workplace learning. It offers the learners the opportunity to develop skills in a real situation, with the equipment they will actually use on the job. Do make sure that there is enough equipment. In particular, it is unwise to double learners up on terminals to undertake computer-related tasks. This usually results in one (the more confident) learner carrying out all the tasks, while their partner passively watches. #### Individualised Learning You may have access to commercially produced learning packages (print or electronic) which are applicable to the training you wish to deliver. The alternative is to design your own -- but be warned - this requires **considerable skill** and **time input** on the part of the trainer, if a polished and professional product is to result. #### Videos and other media It is common to use audio or video material in learning sessions. These provide the opportunity to engage the learner by introducing experiences from beyond the training room or the library service. And they can provide a welcome change from the trainer's voice! ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, complete the chart below. ------------------------------------------------------------------------ Which learning activity(s) would be most suitable for the training topics listed? -------------------------- ---------------------------------------------------------------------------- ------------------------------ ------------------------------- ----------------------------------------------------------------------- New health and safety regulations and their implications for the workplace Dealing with awkward clients Operating the new e-catalogue Catching up for two learners who missed the previous learning session "chalk and talk"         demonstration         group problem solving         role-playing/simulations         practical activities         individualised learning         Videos and other media         -------------------------- ---------------------------------------------------------------------------- ------------------------------ ------------------------------- ----------------------------------------------------------------------- #### Choosing learning activities It is possible to think of a scenario when you might use each of the activities for any of these topics. However, we think the most fruitful choice is likely to be. -------------------------- ---------------------------------------------------------------------------- ------------------------------ ------------------------------- ----------------------------------------------------------------------- New health and safety regulations and their implications for the workplace Dealing with awkward clients Operating the new e-catalogue Catching up for two learners who missed the previous learning session "chalk and talk" X       demonstration   X X X group problem solving X       role-playing/simulations   X     practical activities     X   individualised learning       X Videos and other media   X   X -------------------------- ---------------------------------------------------------------------------- ------------------------------ ------------------------------- ----------------------------------------------------------------------- ### Motivating learners Motivation is the key to all successful learning. You may have designed a wonderful training programme but if the learners are not motivated to learn, your efforts are doomed to failure. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, make a list of factors which can demotivate learners ------------------------------------------------------------------------ #### Demotivating learners We could demotivate you by giving a long list here! But instead here is a summary of what we think are the **main demotivators** for learners. **The training itself:** - The training is at too high or low a level. - Learners have been compelled to attend the training without the reasons for their participation being adequately explained. - The topic appears irrelevant to the learners. - The trainer has not outlined clearly at the start of the training what the **specific learning objectives** are. - The training is **delivered badly.** - The **learning environment** is poor. **The learner:** - Learners have had previous **negative experiences** at school, college or of workplace training. - Learners are **distracted** by problems unconnected with the learning. #### Level of training If the training is pitched at the **wrong level**, it will result in learners who are either **struggling to cope** or **bored**. Neither category of learner will be particularly motivated to learn. If you have carried out the training needs assessment properly, this should simply not occur. Learners for whom the training would have been at too high a level should have received preparatory training to upskill them and extend their knowledge to the competence required. Learners for whom the training would be at too low a level should either simply not attend or could be slotted in part way through the programme at the point at which the learning becomes relevant to them. #### Other demotivating factors We will group the next three points together as they are closely linked. - Learners have been compelled to attend the training without the **reasons** for their participation being adequately explained. - The topic appears **irrelevant** to the learners. - The trainer has not outlined clearly at the start of the training what the **specific learning objectives** are. We take it as read that the topic is relevant to the learners - otherwise there is no justification for you to deliver the training. Reasons for attendance should be clearly explained to the learners in advance and links between the proposed training and their work demonstrated. It is especially important to outline the benefits to the learners themselves (as opposed to the library service) which will result from the training programme. You might be able to show, for instance, how learning to use a new computer program could cut down on boring, repetitive manual tasks. As the trainer you may either discuss these issues yourself with the learners in advance of the training or, alternatively, you should ensure that another person does so, most probably their line manager. In the later case you may find it helpful to construct a briefing sheet. At the start of the training programme you will outline your specific learning objectives and how you intend to deliver the training to achieve these. At this point you should clarify what your expectations of the learners are and, conversely, what support the learners can expect from you. #### Badly delivered training We hope that when you have completed this unit, this will not be the case! However, let us list a few common pitfalls which you should try to avoid. - Trying to pack **too much material** into a learning session - Poorly produced **visuals** - Irritating **mannerisms** on the part of the trainer, e.g.: jingling coins in pocket, fiddling with jewellery - **Poor delivery**, e.g.: mumbling, speaking too quickly - **Lack of variation** of learning activities - **Poorly structured learning programme**, e.g.: no logical flow through content (See Outcome 3) - Trainer does not have **sufficient knowledge** or skills in topic #### Poor learning environment We are using the term "learning environment" to encompass the **venue**, **the equipment**, the **resources** etc. You should make sure that any practical issues which might demotivate the learner are minimised. Examples might be too high or too low temperatures in the training room, training sessions which start late or over-run, extraneous noise or distractions, technical problems with ICT equipment, interruptions from colleagues seeking information on day-to-day work. And do make sure that all mobile phones are switched off before the training commences. #### Previous negative experiences Obviously establishing a friendly, reassuring **relationship** with the learner is crucial here. It may also be helpful to expand on the differences between the current training programme and any previous negative experiences which the learner has had. You could emphasise for instance that your learners will be able to work at their own pace, can practice what they are learning in the workplace with support from more experienced colleagues, will not have to sit formal examinations or test etc. One major motivator is for the learner to see that they have achieved something. Success breeds success. The implication of this for you as the trainer is that learning programmes must be broken down into small sections and the objective and sub-objectives for each section should be clearly explained to your learners. For instance, if the training relates to word processing, a sub-objective might be for the learner to become competent in left, right and full justification of text. #### Distractions If a learner is worried about **personal problems**, they will be unable to give their full attention to learning new things. This is possibly the most difficult demotivator for a trainer to tackle. After all, you can do little if one of your learners is experiencing financial difficulties, marital problems or is concerned about their health. All you can do in these circumstances is to reassure the learner that you are sympathetic to any difficulties which they have shared with you and that you will attempt to accommodate any special requests resulting from them. You may be able to take some action about more practical problems though. An example would be if the training occurs at the venue which is not the learner's normal workplace, resulting in childcare problems because of long journeys by public transport. By allowing such a learner to leave ten minutes earlier, you might be able to resolve the situation. If you wish to read more about the theory of motivation and its application to training, you will find a good summary at <http://www.learningandteaching.info/learning/motivation.htm> ## Design of learning materials and programmes on ICT related topics ### Defining learning objectives You should define learning objectives in **specific terms**. Learning objectives usually involve a statement of: - **the task or knowledge** involved, i.e.: what must the learner be able to do or know? E.g.: save data in a spreadsheet - **the condition,** i.e.: how will it be performed? E.g.: without reference to the Help facility - **the standard,** i.e.: how well must it be performed? E.g.: correctly in 90% of cases It is generally accepted that all learning objectives should be SMART (Specific, Measurable, Achievable, Realistic, Timebound.) You can find more information about this at <http://explearning.ucf.edu/registered-students/tips-for-success/writing-smart-learning-objectives/195> You can find useful guides to writing learning objectives at the following locations: **A Quick Guide to Writing Learning Objectives:** - <http://www.nwlink.com/~donclark/hrd/templates/objectivetool.html> **Guidelines for Writing Learning Objectives:** - <http://apha.confex.com/apha/learningobjectives.htm> **Writing Quality Learning Objectives** <http://www.learninginstitute.qmul.ac.uk/wp-content/uploads/2011/05/Aims-and-Outcomes-Guide.pdf> #### Bloom\'s Taxonomy You may find it useful to investigate Bloom's Taxonomy as a framework for writing learning objectives. In 1956 Benjamin Bloom wrote a book entitled "Taxonomy of Educational Objectives" which has been widely adopted within the educational community as the de facto way of classifying **cognitive competence**. An updated version of the book, edited by Anderson and Krathwohl was published in 2001. You can easily find it at www.amazon.co.uk and other online bookshops. Bloom's Taxonomy is a simple way of categorising cognitive skills. It has six levels: - 1\. knowledge - 2\. comprehension - 3\. application - 4\. analysis - 5\. synthesis - 6\. evaluation. You can get further information at: <http://www.bobbyelliott.com/Taxonomy.htm> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.1** Choose a simple task, e.g.: "Using tables in Word" and write learning objectives for it. (Try to choose a task which is of some relevance to you, or to one of your clients, as we'll be using it for activities throughout this section.) ------------------------------------------------------------------------ #### Structuring learning In structuring learning you should take account of the learning cycle. In its simplest (3 stage) form the way in which learning takes place may be expressed as plan, do and review. See <http://www.wilderdom.com/experiential/elc/ExperientialLearningCycle.htm> for more detail. or Kolb's more sophisticated version: <http://www.businessballs.com/kolblearningstyles.htm> #### Learning sequence You should be able to devise a **logical sequence** for the learning, taking account of which parts of the learning are a precursor for others, moving from simpler to more complex concepts and grouping related topics together. Any session should have a **beginning** (where the objectives are clearly stated and agreed by the candidate and the learners), a **middle** (where the learning activities are undertaken) and an **end** (where the learning is summarised and next steps agreed). The learning plan should be made clear to the learners when the learning programme commences. In structuring the learning the candidate should ensure that a variety of **learning experiences** are included to prevent tedium from demotivating the learner. You can find a lot of useful information about **structuring learning** from the link below. Although it is specifically aimed at teachers, most of the information given is equally applicable in other learning contexts. <http://www.teachfind.com/national-strategies/foundation-subjects-strand-key-messages-about-structuring-learning> ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.2** Draw up a learning plan to allow a specific client to achieve the objectives you listed in the previous activity. Your plan should take account of the client's preferred learning style. ------------------------------------------------------------------------ #### Using ICT to create learning materials Your approach to the use of software to create learning materials will be dependent on the availability of software within your own organisation. There are several **courseware creation packages** available, which can be used. Although they offer many features to include multimedia etc., the vital advantage is that they provide routing (branching and looping) through the material allowing learners to take their own appropriate path. They can also provide automated and recorded assessment. One easy-to-use package is **Course Genie**, which lets you create course materials in Word and convert them automatically to HTML. This software has now been superceeded by Wimba Create: <http://www.wimba.com/products/wimba_create> This site also offers extensive demos on the use of the software. Other examples of content creation software include **Authorware, Director** and **Dreamweaver** (http://www.macromedia.com) and products such as **Lectora** (http://www.lectora.co.uk). It should be noted that these are complex products and you may require specialised training to achieve maximum benefit. If specialised software is not available, there are other ICT routes. Word processing software such as Microsoft Word can be used to author content. Graphics, animations, videos and sound files can also be included in the document, as well as text. Animations and sound files will then operate when the document is viewed on a computer. A more polished package can be created by using presentation software such as **Microsoft PowerPoint**. The greatest advantage is that this will create a page-based approach. Additionally a **common look** can be created throughout the whole package. Again, sound or still and moving visual effects can be incorporated. You should have knowledge of how both specialised and general software can be used to create a learning package and have experience of authoring with either general or specialised software. You can use a site like: <http://www.jiscrsc.ac.uk/scotland> which has a range of practical units on making the most of Microsoft software aimed at designing simple learning episodes. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.3** Use the package of your choice to create a short learning episode designed to meet one of the objectives you outlined earlier. ------------------------------------------------------------------------ #### Selecting and merging content from internal and external sources You should appreciate that it is not always necessary to produce **original content** for learning packages. A wealth of learning material is available through the Internet and much of this is copyright free for educational purposes. You should ensure that any chosen material matches the learning objectives and style of the complete package and that the use which is made of the chosen material is fully compliant with copyright. You can often find useful materials quickly with a search engine, but you may also like to check some of the following links: The BBC offers a number of useful online courses on PC-related topics: <http://www.bbc.co.uk/learning/onlinecourses/> You can find useful online resources for learning about Microsoft Office products at: <http://office.microsoft.com/en-us/training-FX101782702.aspx> If your library is an SQA centre, you may be able to get access to the **PC Passport** materials produced by SQA. You can get more information at: <http://www.sqa.org.uk/pcpassport> If you have access to these materials you can download them in Word format, allowing you to modify them if you wish. There are also a number of low-cost or open source courseware suppliers. For example, **Moodle** is open source software widely used by schools, colleges and universities ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 3.4** See if you can use a search engine to locate any resources which would be useful for meeting the learning objectives you outlined earlier. ------------------------------------------------------------------------ ## Support individuals and groups in their use of learning materials ### Types of support We often see the terms coaching, mentoring and training used in relation to workplace learning. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, can you write down a short definition of each of these terms, as you understand them? ------------------------------------------------------------------------ #### Support roles Although there may be some argument over the precise meaning of these terms, the following definitions bring out the key differences between them. In **coaching**, the learner and the coach are active collaborators. The coach observes the learner in a real, naturally occurring workplace situation as they try to complete tasks. The coach provides hints, help, and feedback as needed. **Mentoring** involves a sustained relationship between the learner and the mentor who offers support, guidance, and assistance. **Training** is more formal learning, and more of a one-way process, where the trainer imparts skills and knowledge to the learner. #### Coaching Coaching was originally used in business to describe support given to people who were seen as under-performing in some way. Now it is more usually seen as a means of supporting people on the job in order to help them **improve their competence** and achieve their maximum potential. The analogy of the sports coach developing the tennis player to improve their techniques and win more matches may be helpful. Coaching is generally considered to be a fairly **short-term** activity, related to specific objectives. It consists of a one-to-one interaction between the coach and the person being coached in a relatively informal setting. The aim is to provide the learner with feedback in their performance together with suggestions on how to improve from a knowledgeable and skilled person. Skilled coaches know when to be **directive** and when to be **passive**. They can distinguish between situations when it is appropriate to **intervene** to support the learner and when it is more effective to permit independent learning even though this involves the learner making mistakes. #### Mentoring Mentoring has become very fashionable in the last few years. Although mentoring is a relatively widespread practice there is no **formal definition** of what mentoring is but, generally speaking, it could be defined as a relationship between two people - the mentee (the person being mentored) and the mentor - which will positively affect the development of at least one of them. Note the phrase "positively affect the development of at least one of them". This recognises the fact that most mentors will say that they too have gained from the experience of mentoring. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 4.1** Think of people who have had a significant influence on the development, progression and direction of your career. You may come up with several. Now identify what they did which influenced you. ------------------------------------------------------------------------ #### Significant influences You will probably find that the people who have affected your career significantly: - Guided you - Supported you - Created opportunities for you - Provided a role model for you. By doing one or more of these things they were fulfilling the role of a mentor in some way. Someone who is designated as a formal mentor will do all of the above. The mentoring relationship will last over a period of time. This allows mentor and mentee to get to know and trust one another. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, write down the qualities which you consider a good mentor would require. ------------------------------------------------------------------------ #### Mentor qualities We think that a good mentor should: - Provide a **good role model** - Possess excellent **communication skills** - Be able to **empathise** with the mentee - Recognise that learners have **different motivations, skills, knowledge and needs** and be able to capitalise on these - Be good at **spotting learning opportunities** and challenges which will assist the mentee's development - Be **well informed** about the objectives and content of the training programme being undertaken by the mentee in order to provide maximum support - Provide **meaningful feedback** to the mentee - Understand that sometimes it may be necessary to **push** the mentee to move out of their comfort zone - Encourage the mentee to **think for themselves** and work out solutions to problems From the above you can appreciate how useful coaches and mentors could be in supporting the learning programme which you are delivering. To find out more about coaching and mentoring, look at: - <http://www.coachingnetwork.org.uk/ResourceCentre/WhatAreCoachingAndMentoring.htm> #### Training Training is more directive than either coaching or mentoring. It involves the learners receiving input from the trainer in the form of instruction. Training is always specific and may be long or short term. The trainer is your role! This unit explores the skills you require and the methods you may use to deliver direct training to the learners. As the trainer, you must consider the ways in which coaches and/or mentors could contribute to the progress of your learners. You must exercise care in the choice of staff to undertake the coaching/mentoring role. As well as having the necessary work-related knowledge and skills, they must be in a position to devote time to coaching/mentoring and should be able to develop a real rapport with your learners. QUESTION TextEntry1: Coaching, Mentoring or Training ### First line ICT support You are designing and delivering training on ICT related topics. It is therefore very likely that your learners themselves will be operating ICT equipment as part of the learning programme. When a learner is using any type of computerised equipment, it is likely that from time to time some **technical snags** will arise. You must be able to assist the learner with straightforward trouble shooting e.g. printing problems because the page set-up is not correct; computer "hanging"; changing screen resolution. You should also be able to assist any learner with special needs to use appropriate features of the technology. We are not suggesting that you should possess sophisticated trouble shooting skills: this is the responsibility of ICT technical staff. You should simply be able to cope with typical, straightforward difficulties which can arise. The next few pages summarise some of the most common problems you are likely to encounter, together with some tips on how to solve these. #### The monitor appears blank - Check to see if the computer has 'gone to sleep' by pressing the **space bar** on the keyboard. - Check that the monitor is **switched on** and connected to the mains i.e. is the power light illuminated? - Check that the monitor is **correctly connected** to the computer. - Check to see if the system works after the computer is **reset** or switched off at the mains and on again. #### The computer hangs Sometimes, after using the computer for some time, it 'hangs'; neither keyboard nor mouse appears to operate. - Wait a while to see if the computer is performing some **intensive task** and recovers. - Try **CtrlAltDel**. If you are lucky it will bring up a task manager window which will show you which application is not responding and allow you to close down only that application. - Use the **reset button** to restart the computer. - **Switch the computer off** at the mains and then on again. #### Monitor text is too small Sometimes a client has difficulty reading off the monitor because the text is too small. - If this is confined to a particular application, it is usually possible to adjust the **zoom setting**. If this does not appear in a box near the top of the window, it will be found in the menu system under View: Zoom or View: Text size. - If this applies to everything on the monitor, then, if you have access rights, you can change the **monitor settings**. Right click with the mouse on the desktop, choose Properties from the resulting menu, choose the Settings tab from the dialogue box, reduce the Screen resolution setting and OK. Unfortunately, the lower the screen resolution, the less can be displayed on the monitor. This often results in an uneasy compromise for people with problems with their sight. #### Nothing comes out of the printer - Check that the printer is switched on and connected to the mains i.e. is the power light illuminated? - Check that the printer is **correctly connected** to the computer. - Check that the printer has **paper** in it. - Check the **ink supply**. - Try printing a **test page**. - Check the print settings in both the operating system and the application to see that the computer is looking for the correct printer and that the correct size of paper has been selected and that manual/auto (as appropriate) is chosen. #### Print layout is wrong Sometimes the printer does not seem to use the whole of the sheet of paper and the layout is not the same as on the monitor. When using a word processor like Word, it is possible to set the **paper size** in the application. However there is also a setting for the printer itself. If these two settings are different, then the output will not appear correctly on the page. The driver for a newly connected printer may default to US legal for the paper size. It is normal to use A4 in this country and applications will use this as default. Go to the printer properties and check the paper size. Start: Settings: Printers: right click on the printer concerned, choose Properties and select the Device settings tab. #### Disk is full Sometimes, when saving data from an Office application like Word, the message comes up that the disk is full. - It may be that the client's **floppy disk** or **pen drive** is full. This is quite likely for any sizeable word-processed document especially if it contains graphics or other embedded items. - A fault condition can arise concerning interaction between the application and the operating system which results in a false reporting of the disk full error. This is irretrievable and requires the computer to be rebooted. If the client will lose a fair amount of unsaved data, it is worth opening a new document and **copy and pasting** from the original to the new document and then trying to save that. You may be lucky! - Note: a similar problem can occur regarding the **computer** running out of memory. Again only rebooting the computer will correct the situation. #### The printer jams There is no universal solution for this problem as each printer has its own unique mechanism. The best you can do is to familiarise yourself with the various types of printer in your library and how to un-jam each. ## Evaluate and revise learning materials and programmes ### Assessing learner progress When the learning programme is underway, you will want to **review regularly** how your learners are progressing towards their objectives. We should make it clear at this point that this unit is intended for library staff who find themselves in the role of educators and not for those who are required to undertake formal assessment of learners for National or Scottish Vocational Qualifications or other workplace awards. That type of assessment must be undertaken by someone who has an assessor or teacher qualification. In this unit we are concerned only with assessment which will give **feedback** to the learner on his/her progress towards the learning objectives and to you, the trainer, as to how effective the learning programme has been. (You may see this referred to as "formative" assessment.) In this context you will use methods which are as non-threatening as possible to the learner. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, note down any ways that you could use to assess how well your learners are progressing. ------------------------------------------------------------------------ #### Methods of assessing progress We can think of quite a few methods of assessing learner progress. Two of the commonest are: - Direct observation - Examination of products #### Direct Observation The most immediate method is to observe directly the **activities** being undertaken by the learners during the learning programme. From this you will get a clear idea as to whether your learners are actually managing the tasks they have been set and how well they are coping. While you are not in any way 'giving marks', you can use this information in two ways. Firstly you can use it to provide a little bit more assistance to any learners having difficulty. Secondly you can use it to assess the success of your own approach in delivering the learning. Trainers benefit from **observing the learners** at all points in the learning programme, not just when they are involved in specific tasks. Their facial expressions and body language will give you feedback on how well the training is being received. If you notice a learner, yawning, fidgeting or gazing out of the window while you are explaining a topic, it is unlikely that they are absorbing the information fully. Perhaps they know this information already, perhaps the material is too advanced for them, perhaps your explanation has confused them -- in all of these cases, you need to take some action in order to re-engage them in the learning process. #### Examination of products Many of the learning activities you will ask the learners to undertake will produce a result which can be checked. This may be a **printout** or **screen dump** or perhaps a **file**. This is an excellent method to use for feedback purposes because, if your learning is well designed, the product will not be seen as something artificial, produced solely for assessment purposes. Also, as evidence, it should be fairly incontrovertible, either there will be a result or not. Examining products gives you **feedback** without the learner really being aware that their performance is being assessed. You can simply review the product with the learner, leading naturally into a discussion of how easy it was to produce this, how it might be improved etc. #### Assessment 'lite' You may find it useful to use some methods which veer in the direction of traditional educational assessment. For example, you can carry out a **quiz** or use a simple tick box test. You can construct these yourself or tap into ones which experts have designed. ------------------------------------------------------------------------ ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="50"} **ACTIVITY 5.1** Go to <http://www.learner.org/courses/neuroscience/interactives/interactive2.html> and try the learning related quiz which explores whether your left of right side of the brain is dominant. This quiz is quick and fun to complete. Although it is simple it would give you some useful feedback on your learners if you asked them to complete it before embarking on the learning programme. ------------------------------------------------------------------------ When making up simple tests, it is best to confine yourself to TRUE/FALSE or "fill in the blanks" (sometimes called CLOZE) questions. Compiling multiple-choice questions requires a great deal of skill and is best left to specialists. #### True/False Test on Word Processing Indicate if the following statements are true or false. ------------------------------------------------------------------------------------- ------- ------- ------- 1 To copy and paste, you use Ctrl C and Ctrl V True             2 A text with a straight margin on the right hand side is called "right justified" True             3 Pressing the Delete key removes letters to the left of the cursor.       False 4 We change the colour of the text by highlighting it and left clicking       False       5 Arial is the name of a font. True             6 Left clicking on a word in the text activates the spell checker.       False       7 The "save as" command is used to save a copy of the document as a duplicate file. True             8 To change the style of bullet points, you must go to the format menu. True             9 A running title along the top of pages in a document is called a tag line. True             10 You use the thesaurus feature to find alternative spellings of a word True             ------------------------------------------------------------------------------------- ------- ------- ------- #### Cloze Question on Word Processing A text with a straight margin down the right hand side is called\_\_\_\_\_\_\_\_\_\_\_ justified. #### Direct Feedback Here you can obtain feedback from individual learners using **verbal interaction**. This can best be done during or perhaps towards the end of a training session. You can also allow the learner to create direct feedback by issuing **scorecards**. The learner can use these to record the tasks in which they consider themselves to be competent as they progress through the learning. #### A simple scorecard This illustrates a scorecard for a learner who is part way through a learning programme on training needs analysis techniques. +:--------------------------------------------------------------------:+ | **Training Needs Analysis Techniques** | +----------------------------------------------------------------------+ | Use this scorecard to record your competence in the use of the | | techniques covered in the programme. You are asked to review this at | | the end of each weekly session. | | | | The numerical scale represents | | | | 0 = I have no experience of this at all | | | | to | | | | 5 = I am 100% competent in using this technique | +----------------------------------------------------------------------+ |   | +----------------------------------------------------------------------+ | Direct observation of the learner using ICT in the workplace | +----------------------------------------------------------------------+ | Examination of learner's work samples or work records | +----------------------------------------------------------------------+ | Practical tests and assessments of the learner's use of ICT | +----------------------------------------------------------------------+ | Questionnaires or checklists covering key ICT competences | +----------------------------------------------------------------------+ | Examination of the learner's staff appraisal reports | +----------------------------------------------------------------------+ | Interviews with learner, manager, colleagues, tutors, clients | +----------------------------------------------------------------------+ | Focus groups of learners, colleagues, managers etc. | +----------------------------------------------------------------------+ #### Computer Based Assessment Some ICT based learning packages incorporate **diagnostic tests** which score and benchmark learner competence automatically as they work though the package. It is best to use a method where the learner sees the result and not something which appears secret and is suddenly sprung on the learner at the end of the course of learning. Alternatively you can use special software such as **Hot Potatoes** to create your own computer based assessment tools. If you wish to read more about this, look at: <http://www.ucl.ac.uk/isd/staff/e-learning/tools/hot_potatoes> ### Designing feedback tools The previous section dealt with **evaluating** the learning you have developed in terms of assessing the learners' progress towards the learning objectives. It is also important to evaluate the learning you have developed by getting feedback on the learning experience. As you can imagine, the overall quality of the learning experience has a deal of effect on the rate of progress of the learner. ------------------------------------------------------------------------ ![](T_cap.gif "T_cap.gif"){width="50"} Before proceeding, note down which aspects of the learning experience you would want to ask the learners about. ------------------------------------------------------------------------ #### Aspects requiring feedback Here is a list of issues we would expect to be included in feedback on the learning experience. You may have thought of some additional points. - Were the **learning objectives** relevant? - Did the **content** match the stated learning objectives? - Was the **quality** of the learning materials satisfactory? - Did the trainer provide sufficient **support**? - Was the trainer's **presentation** clear? - Was the **learning environment** pleasant? - Were there any deficiencies or problems with the **equipment**? - Was the **learning experience** enjoyable? You can see that we have included a mixture of issues relating to learning objectives and delivery/support, as well as on the learning environment and enjoyment. #### Objectives related issues - Were the learning objectives relevant? - Did the content match the stated learning objectives? This area is important because the learner's **perception** of the relevancy of the objectives is what matters. If you are not getting this relevancy over to the learners, then you will have great motivational problems. Also once the learner has accepted that the objectives are relevant, they must experience the content you provide as being the correct material. Although trainers may sometimes dismiss **negative feedback** from one individual learner in this area, it is clear that a low score from a significant number of learners for this area needs a serious response on your behalf. #### Delivery related issues - Was the **quality** of the learning materials satisfactory? - Did the trainer provide sufficient **support**? - Was the trainer's **presentation** clear? This are core areas for you as a trainer because they are the areas you have most control over and input into. If the learners consider the **quality of the learning materials** to be unsatisfactory, you should probe this further to find the exact cause of their dissatisfaction -- were the materials at the correct level, clearly expressed, professionally presented, attractive to look at etc. Different learners will require varied **levels of support** from the trainer. In this instance, negative feedback from just one or two learners is significant because it can indicate that you have tailored your level of support to suit the majority of the group and ignored the needs of those who are finding the learning more difficult than average. Individual learners will undoubtedly have different views on the **learning experience** in terms of the trainer's delivery -- an element of personality is involved here. But again, if there is not a broad positive result from your learners in this area, you will have to look very closely at what you are doing. #### Learning environment issues - Was the **learning environment** pleasant? - Were there any deficiencies or problems with the **equipment**? This area is one where the trainer may have limited control. If you are allocated a dingy windowless room in which to carry out the training, or if you are given an old slow PC to carry out your ICT demonstrations on, you will have real problems in providing a good learning experience. Try to pre-empt complaints on the learning environment by resolving any such difficulties **in advance** of delivering the learning. #### Enjoyable experience - Was the learning experience enjoyable? Finally we consider an overall question as to whether the learning was enjoyable. Is this a valid question? Well, if the learners did not enjoy the experience, it is unlikely that they benefited fully from it or that they will ever come back willingly for more! #### Feedback form design There are different methods of obtaining feedback. You can use **paper forms** handed out to the learners, or utilise a **computerised approach**. #### Types of feedback form As we saw on the previous page, you should try to create questions which are: - **relevant** to the area to be evaluated - expressed in **neutral terms** so as not to prompt a certain answer - **clearly phrased** and non ambiguous. In order to compare feedback from different learners or groups of learners, it is best to design feedback forms in which learners can score different aspects of the learning on a scale, by ticking the box corresponding to their choice. You might offer five choices. --------------- ---------- ---------------- ---------- --------------- **Very Poor** **Poor** **Acceptable** **Good** **Excellent** --------------- ---------- ---------------- ---------- --------------- But you can apply some psychology here. If you have an odd number of possible ratings as we have here (5), there is a tendency for learners just to choose the **middle** one. You can try to force them to make a more measured evaluation by having an even number of possibilities which makes them positively choose. ---------- ---------------- ---------- --------------- **Poor** **Acceptable** **Good** **Excellent** ---------- ---------------- ---------- --------------- These four categories can be represented by numerical values, say zero to three. - Poor = 0 - Acceptable = 1 - Good = 2 - Excellent = 3 Doing this, allows you to carry out some simple statistics, such as finding the average response for the whole group of learners and to compare the overall response of different groups. #### Feedback statistics Perhaps it's easier to see this in an example. Imagine you have a group of 10 learners. Their answers to the questions on the feedback form are: - Poor -- 0 responses - Acceptable -- 3 responses - Good -- 6 responses - Excellent -- 1 response This converts to a total of 18 (0x0 + 3x1 + 6x2 + 1x3). Dividing 18 by the number of learners (10) gives an **overall score** of 1.8 for the group as a whole, equating to Good. Another way of looking at this data is to produce a **graph**. image:feedbackstats.png You can then make a **visual comparison** of the results for each question. #### Unstructured feedback Of course you should allow the learners to provide some feedback on the form which is not structured by your questions. It is important to leave space for them to make **comments**, either throughout the form at appropriate questions or at the end under 'any other comments'. To analyse these, you should simply list the actual responses and note any duplicated points of view. There are a couple of other points to note apart from question design if you are to motivate your learners to make a good job of completing the form Before proceeding, note down anything else that you can think of that should be in the **feedback form design** if it is to be successful in its purpose. #### Essential elements of feedback form design Well, for the form to be successful, the **instructions must be easily understood** and it should be **easy to fill in**. It should also be **quick** for the learner to complete. This all suggests a **short questionnaire**, one or two sides maximum with a limited number of questions having straightforward possible responses #### Simple feedback form You can find many examples of simple course feedback forms on the internet #### Commercial software and websites You may also like to explore using commercial software such as **SurveyMonkey** which facilitates design of survey forms and collation and analysis of results via the Internet. See it at <http://www.surveymonkey.com> There are many Internet websites offering advice on feedback form and questionnaire design. One problem is that many of them are aimed at professional researchers and thus too detailed. However, you may still benefit from looking at some of these sites, as the basic principles of questionnaire design are the same, regardless of the subject area being researched. Here are some suggested sites. - <http://www.sysurvey.com/tips/wording.htm> - <http://www.statpac.com/surveys/question-qualities.htm> ### Assessing success of learning approaches The diagram shows the training cycle. It represents a continuous process of: - Identification of training needs - Design of the training and learning programme - Delivery of training and learning programme - Evaluation of training and learning programme For more information on the training cycle see: <http://mournetrainingservices.blogspot.co.uk/2009/06/training-cycle-explained.html> You have carried out the first three stages and are now about to carry out the fourth with the help of the feedback on the learning experience coupled with evidence on learner progress. In particular, the feedback will be used to assess the effectiveness of the design and delivery of the programme. This will feed into **revision** of those aspects of the learning programme which were judged to be less than satisfactory. With a further check on the identification of the needs and the re-design of materials and delivery, a cycle of continuous improvement is established. You have essentially two sources of information for your evaluation: - the **evidence** of learner progress - the **feedback** on the quality of the learning experience. Both are important and there are definite connections between the two. For instance, there could be a general reduction in learner progress not related to content and delivery issues but due to the learning taking place in a room which is always too hot resulting in the learners experiencing discomfort. #### Learner progress In analysing the learner progress, in order to create improvements, you must look for **trends**. The first time you deliver the training to a small group, poor performance from one learner may affect your results disproportionately. Over time and a large number of learners, this random effect diminishes. So you are looking for the particular topics and outcomes where a significant number of learners have difficulty. Of course 'a significant number' is a matter of opinion. But let us say that, if out of a group of fifteen learners, three had a difficulty with one topic, while excelling at all the other topics, then we would say that is significant. So you need to look for these parts of the learning and revisit the design of those parts. #### Learning experience Most of the feedback will have been converted into a set of averaged numerical data representing the learner group as a whole. You now have to **interpret** this data. Broadly speaking, you are having no real problems if the scores hit a point somewhere a bit above the middle value. You cannot expect every learner to think that everything is perfect. On the other hand, remember that most people tend not to give low scores unless there is a real problem. Of course different learners will have different **expectations**. However, again the hope is that they will apply the same expectation level to each of the facets of the learning experience and this variable will average out over all the questions and learners. There is one danger in using the **average** and getting a middling score. That is, if out of a group of, say, twenty learners, ten score highest and the other ten score lowest. This gives the appearance of a just acceptable result with no great worry. A score of 50% for the learning environment could be due to one side of a room being too cold. A score of 50% for relevance of course content could be due to a group of 20 where 10 thought the training was pitched at the ideal level and 10 who found most of the content already familiar. So remember, you have to look at both the **average score** and the **spread of scores** across the group of learners. #### Looking for trends Regarding 'Any other comments', you are again looking for **trends**. If the same type of comments comes up three or four times out of a group of fifteen learners, then you need to address it. When you are delivering training to colleagues within your own organisation, remember that you need not be completely reliant on written feedback forms. Most of the learners will be willing to provide **informal feedback** and suggestions for improvement orally. You should also consider when to gather feedback. It is useful to gather opinions immediately after the conclusion of the training, when the content and delivery are fresh in the learners' minds. This can be supplemented by **further feedback** at a later date, if you wish to explore how useful the training has been to the learners in their workplace situation.
# Applications of ICT in Libraries/Digital Culture - Online Communication ## Digital Culture - Online Communication This is the first of two units that are relatively new additions to the Application of ICT in Libraries course. This session will explore the new digital literacies that you need to develop to be active users of Social Media tools and you will also get the chance to communicate online using a number of these services. The full course materials are hosted for registered students on the Application of ICT in Libraries pages on Moodle. This module will enable you to dip into new social media tools and explore their potential for supporting library services, your users and also your own interests. You learning outcomes will include: - What is social media? - What are the new digital literacies information professionals and our service users need to develop? - How do I facilitate and take part in a conversation on a forum? - How can I collaborate with my colleagues or manage a team online? - What tools can I use for professional networking? - How and why should I use a blogging tool? - What are virtual communities? ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="40"} Each learning outcome has a series of short activities that you will participate in with your class group. The tutor will deliver one face to face class session in North Wales and South Wales and the remainder of the time will facilitate the course online. This is a practical module that uses social media to explore social media - you have permission to play!
# Applications of ICT in Libraries/Digital Culture - Online Collaboration ## Digital Culture - Online Collaboration This is the second of two units that are relatively new additions to the Application of ICT in Libraries course. This session will explore the new digital literacies that you need to develop to be active users of Social Media tools and you will also get the chance to communicate online using a number of these services. The full course materials are hosted for registered students on the Application of ICT in Libraries pages on Moodle. This module will enable you explore more fully the collaborative nature of social media and work within a group to complete all the learning outcomes. You learning outcomes will include: - Exploring virtual communities and how the concept of \'community\' changed with the spread of social media - Using a forum to facilitate professional discussions - Using collaborative documents and cloud computing to complete a group project - Exploring the potential of social networking for continuing professional development - Developing, editing and publishing a collaborative blog - Meeting, collaborating and exploring with your group in a virtual world ![](A_Cap_Digital.svg "A_Cap_Digital.svg"){width="40"} Each learning outcome has a series of short activities that you will participate in with your class group. The tutor will deliver one face to face class session in North Wales and South Wales and the remainder of the time will facilitate the course online. This is a practical module that uses social media to explore social media - you have permission to play!
# Chess/Arranging The Board | |= 8 |rd|nd|bd|qd|kd|bd|nd|rd|= 7 |pd|pd|pd|pd|pd|pd|pd|pd|= 6 | | | | | | | | |= 5 | | | | | | | | |= 4 | | | | | | | | |= 3 | | | | | | | | |= 2 |pl|pl|pl|pl|pl|pl|pl|pl|= 1 |rl|nl|bl|ql|kl|bl|nl|rl|= a b c d e f g h |Initial position of the chessboard}} ``` Before starting the game, it\'s very important to arrange the board in the right manner. The 1 - 8 horizontal squares are called \"ranks\", and the vertical ones are called \"files\". Your chess board is an 8×8 board. Place the board in such a manner that the bottom right hand corner on your side is white (\"White on the right\"). On that white square, place the Rook (known also as the \"Castle\") and place the other Rook on the bottom left corner. Next to the Rooks, place the Knights, followed by the Bishops. Wrong placement of the Queens is a common mistake. While arranging these pieces, make sure that the black Queen goes on a black square and the white Queen goes on a white square (\"Queen on her own color\"). The King then goes on the square next to the Queen. It is very important that you place these two pieces properly. Any game found to be set up incorrectly, i.e., King on its own color, will result in the game being voided and a restart called using the same colors. Fill the next rank with your eight pawns. You\'re ready to play! {{-}}
# Chess/Playing The Game Chess, unlike many other games, does not involve direct chance such as the roll of a dice or which card is drawn. The outcome completely depends on the decisions of the players. However, because of its vast complexity, the far-reaching consequences of some decisions are practically unforeseeable. One player (\"White\") has the white pieces while the other (\"Black\") has the black pieces. Sometimes the colors are not black and white (for instance, light and dark, or yellow and blue), but they generally contrast each other. In friendly games the choice of colors can be made by any method, such as flipping a coin. If there is no coin at hand, another typical way of deciding would be to conceal a black piece in one hand and a white piece in the other and ask one\'s opponent to select a hand. The colored piece selected will be the opponent\'s color. In competitive games the players are assigned their colors. ### Order of play Once all the pieces have been arranged, White (or the lighter color) makes the first move. White *always* makes the first move; this is important for notation, and any chess player will insist upon it. After White has made the move, Black will then make a move. The gameplay will continue in alternating fashion, White making a move, followed by Black. ### General movement rules - A move consists of moving a single piece, in accordance with its rules of movement, to a square that is unoccupied or occupied by an enemy piece. A player may never move a piece onto a square already occupied by another of his or her own pieces. - *Exception*: There is a special move called \"castling\" where two pieces, a rook and the king, are moved; see below. - If a piece is moved onto a square occupied by an enemy piece, the latter piece is removed from play and the first piece replaces it. The removed piece is said to have been *captured* or *taken*. - *Exception*: In *en passant* capture, a pawn moves to an unoccupied square but still captures another pawn \"in passing\"; see below. - Most pieces move and capture opponent pieces in the same way. - *Exception*: The pawn has separate rules for moving and capturing opponent pieces. - Most pieces may only make a move to a non-adjacent square if all the intervening squares are vacant (pieces may not \'jump over\' other pieces). - *Exception*: The knight can move to any suitable final square regardless of occupants of other squares. - *Exception*: In castling, a king and a rook jump over each other. - No player may make a move that leaves their own king \"in check\" (see below). - The player must *always* make a move when it is his or her turn. In other words, he or she cannot choose not to make a move. If no legal move is possible the game ends in a draw (see below), except when the king is in check - this is called *checkmate*, and is usually how the opposing player wins. Also, when a pawn moves to a square at the opposite end of the board, it becomes a different piece (pawn promotion); all of these exceptions are covered below in more detail. ## The board Traditionally, the game is played on a board of 64 alternating black and white squares turned with a white square to each player\'s near right-hand corner. \"White on right\" is a helpful saying to remember this convention. The light and dark squares on the chessboard and the light and dark chess pieces are traditionally referred to as \"white\" and \"black\" respectively, although in modern chess sets almost any colors may be used (as long as they are not the *same* colors.) The horizontal rows of squares are called **ranks** and are numbered 1-8; the vertical columns of squares are called **files** and given the letters a-h. This way any single square can be easily identified by its rank and file, making it possible to record games by writing down the starting and ending position of the piece that moves every turn. A chess diagram is always printed from the White player\'s perspective. {{-}} ## The pieces The movement of the individual pieces is described below. In all the board diagrams shown, the squares to which the piece in question can move are indicated with x\'s. ### Pawn ![](Chess_pll44.png "Chess_pll44.png") Pawns can move one square straight forward, or optionally and on their first move only, two squares straight forward. The pawn is the only piece that can\'t move backwards. This piece is worth 1 point. {{-}} #### Capturing Pieces The pawn can move one square diagonally forward to capture a piece, but cannot capture a piece by moving straight forward. For this reason, two opposing pawns on a file may become blocked by each other. In the first diagram below, legal capture moves for the white pawn are indicated with black circles. To capture means to displace a piece, meaning, to replace the captured with the capturer. In the second diagram below the White pawn is prevented from moving forwards by the Black pawn immediately in front of it (in the d-file) which it cannot capture, but it can capture the adjacent Black pawn by moving diagonally forward as seen in the last diagram. The pawn is the only piece that moves and captures differently. {{-}} ### Knight ![](Chess_nll44.png "Chess_nll44.png") The knight has a unique move that allows it to flank the other pieces. The easiest way to describe this move is that he moves to a square of the opposite color from the one he\'s on that is exactly two squares away from him. This piece is worth 3 points. {{-}} Another way to visualize the move is this: of the 16 squares that are 2 away from a knight he reaches the 8 that are of the opposite color of the square he\'s on and the other 8 can be reached by a queen where she on his square. {{-}} {{-}} It is important to remember that the knight moves in a straight line like all the other pieces, it\'s just along lines of movement no other piece uses. Consider this comparison: A queen moves ordinally along the ranks and files - North, East, South, and West on a compass rose; and she also moves diagonally - Northeast, Southeast, Southwest, and Northwest on a compass rose. The knight moves along the wind lines of the rose - North by Northeast, East by Northeast, and so on. These lines pass between the squares adjacent to the knight and pass through the middle of the squares that are one square away from the knight. The knight moves to the first square its line of movement passes through the middle of, so like the King the knight has eight squares he can move to when he is near the center of the board. Since the knight is moving between the squares adjacent to him pieces do not hinder his move whether they are allied or enemy. #### Capturing Pieces The knight captures any opponent\'s piece that occupies a square it can move to by removing that piece from the board and placing the knight in that square. An important consequence of the knight\'s use of wind lines is that it can attack (that is, threaten to capture) pieces without being threatened in return so long as they are not also knights. The reverse is also true - pieces attacking a knight are never threatened by it. {{-}} ### Bishop ![](Chess_bll44.png "Chess_bll44.png") The bishop can move any number of squares diagonally. The bishop may not jump over any piece of either color. The bishop is restricted to the color of squares on which it began the game. Each player starts out with one light-square bishop that moves on the light colored squares, and one dark-square bishop that moves on the dark colored squares. In the diagram below, the bishop stands on a light square and can only move to other light squares. This piece worth 3 points. {{-}} {{-}} #### Capturing Pieces The bishop captures any opponent\'s piece that it encounters during the movement described above, and then occupies the captured piece\'s square. In the diagram above the bishop may take any of the black queens. Notice that bishop may not move (jump) to squares behind or capture pieces hiding behind the queens. ### Rook ![](Chess_rll44.png "Chess_rll44.png") The rook can be moved any number of squares horizontally or vertically, but not diagonally. Like the bishop, the rook cannot jump over any pieces, except for \"castling\".This piece is worth 5 points. {{-}} {{-}} #### Capturing Pieces If the rook attempts to occupy a space already occupied by an opponent\'s piece, it captures the piece. In the diagram above the rook may take any of the black queens. ### Queen ![](Chess_qll44.png "Chess_qll44.png") The queen is the most powerful piece, being able to move any number of squares in any lateral or diagonal direction. It is best described as the combination of a rook\'s and bishop\'s movement capabilities.This piece is worth 9 points. {{-}} {{-}} #### Capturing Pieces The queen captures any opponent\'s piece that it encounters during the movement described above, and then occupies the captured piece\'s square. In the diagram above the queen may take any of the black queens. ### King ![](Chess_kll44.png "Chess_kll44.png") The king can move one square at a time in any direction, as long as doing so does not place himself in check (see below). This piece is worth ∞ points, because if you lose the king, you lose the game. (Note that the king would be 3.5 points as an attacker/defender.) {{-}} {{-}} #### Capturing Pieces The king may capture any opponent\'s piece adjacent to it, as long as doing so does not place himself in check (see below). In the diagrams above the king may take any of the black knights. #### Check The king is the most important piece belonging to each player, though not the most powerful. If a player moves a piece such that he threatens to capture his opponent\'s king in the next move, that king is said to be in *check*. If a player\'s king is in check, he must immediately remove the check by moving the king, blocking the check with another piece, or capturing the checking piece. In the diagram below black\'s rook has checked the white king. White may avoid the check by moving the king one step sideways, blocking the check by putting the rook between the attacking black rook and the white king, or capture the black rook using the white bishop. Other normally legal moves, like moving one of the pawns, are illegal in this position since they will not remove the check. In a friendly game, a check is usually announced by saying *check* after the move is completed. {{-}} #### Checkmate If the king is placed in check and can not escape, it is said to have been *checkmated* (or \"*mated*\" for short). The first player to checkmate the opponent\'s king wins the game. Note that the king is never actually captured, since it is obliged to move out of check whenever possible (and the game ends when it is impossible). In the diagram below white has no options to escape the check from black\'s rook, he is therefore checkmated. {{-}} #### Special Restrictions --- Avoiding \"Self-check\" Players may not make any move which allows their king to be captured in the next move, i.e. places their own king in check. Thus two kings may never occupy adjacent squares, since they would have put themselves in check by moving there. This is called the \"opposition\" and is indispensable when, for instance, you are using a queen or rook to checkmate a king. The white king in the following diagram cannot move upwards or to the left since it would be in check from the bishop, or diagonally downwards which would leave it adjacent to the black king. Also, as no piece is threatening it if it fails to move, the king is not currently in check. Similarly, the black king cannot move diagonally upwards as that would put it next to the White king. {{-}} The diagram below shows a position where the white bishop\'s movement is restricted by the same rule; the bishop can not be moved since the move would let black capture the white king in his next move. The white king on the other hand may move to any of the adjacent squares. {{-}} ## Special Moves #### Pawn Promotion If a pawn makes it to one of the eight squares along the far edge of the board from their initial position, the pawn is \"promoted\". Upon reaching the far rank the player exchanges the pawn with either a queen, a rook, a bishop, or a knight. The player\'s move ends when the new piece occupies the promoted square. The new piece need not be a previously captured piece. Thus a player can have more than one queen, and more than two rooks, bishops or knights on the board. The player may never have more than one king, since the pawn can not be promoted to a king. In theory it is possible to get up to nine queens, or ten rooks, bishops or knights since there are eight pawns to promote. In practice however the pawn is usually promoted to a queen, since it is the most powerful piece, and it is rare for a player to have more than two queens on the board. If an extra queen is not at hand, an upside-down rook is usually used as a substitute. {{-}} #### Castling !Kingside castling: O-O !Queenside castling: O-O-O Castling is a move involving the king and either of the rooks. Castling performed with the king\'s rook is called kingside castling, performed with the queen\'s rook is called queenside castling. A castling is typically done to move the king to a protective \'castle\' surrounded by three pawns and a rook. Subject to restrictions detailed below, a player may move his king two squares towards the rook, and subsequently, *on the same turn*, move the rook adjacent to but on the opposite side of the king, (onto the square over which the king has just passed). The restrictions specific to castling are: 1. Neither the king nor the participating rook may have moved previously in the game 2. The king must not be in check at the start of the move, though it may have been in check previously in the game. 3. The square over which the king passes must not be under attack (\'in check\') from an enemy piece. (This would expose the king to a \"check\" in passing.) The rook(s) may be under attack, or the queens\' rooks may pass through an attacked queens\' knight square. 4. The king must not be in check at the end of the move. (Also applies to all normal moves.) 5. The squares between the king and rook must be vacant. The diagrams below show examples of positions where castling is not legal. {{-}} Note that the king must be the first piece moved and it must be moved two squares before it is released. If the rook is touched or moved first, then the king must stay where it is. This rule mainly applies in \"strict rules of chess\" where if a piece is touched, it must be moved. Touching the rook first indicates a rook only move, while releasing the king after one square indicates a king only move. Moving the king two squares is not a legal move by itself, and indicates a castling move. {{-}} #### *En passant* capture *En passant* is French for \"in passing\"; you capture an enemy pawn as it is passing you. When a pawn on its first move advances two squares onto the same rank as an opposing pawn on an adjacent file, this opposing pawn may, on that player\'s next move only, capture the advancing pawn as though it had only moved one square (provided the move is otherwise legal). The pawn\'s ability to move two squares on their first move was a relatively late addition to the game of chess. En Passant was introduced to prevent abuses of the new rule. In the following example, the Black pawn advances two squares, and is captured by the White pawn which moves diagonally forwards and to the right (as if the Black pawn had moved only one square forward and been there). This move is only allowed on the turn in which the option is presented. {{-}} ## Initial position In the initial position each side has eight pawns, two rooks, two knights, two bishops, a queen and a king arranged as shown in the diagram below. Note that the only pieces on either side which can initially move are the pawns and knights. Beginners often set up the board incorrectly; it is a complex position to remember. The following mnemonics may help you remember where the pieces go. - **White on the Right** It is important that the bottom-right-hand square is light-colored. - **Knights live in castles** One knight is placed next to each rook (rooks look like the towers of a castle, and are sometimes \[incorrectly\] even *called* castles.) - **Queens on their color** OR **The dress matches the shoes** The White Queen goes on a White Square, Black Queen goes on a Black Square - **Bishops are advisers to the Royalty** Bishops surround the King and Queen. - **White King on the Right** From the White Player\'s perspective, both Kings are on the right, and from the Black Player\'s perspective, the Kings are on the left. If the ranks and files are printed on the board, the following rules may be helpful: - White\'s pieces should be placed on the 1st and 2nd rank, and Black\'s pieces should be placed on the 7th and 8th rank. - The Queens should be positioned on the d-file (*D for Dame*). {{-}} ## Conclusion of the game Play continues to alternate between White and Black until one of the following outcomes is reached: ### Winning and losing - One player\'s king is checkmated. The game is lost by that player. - In a competitive game, one player runs out of time. The game is lost by that player (with two important exceptions, see draws below). - One player resigns, which is equivalent to quitting the game. A player may resign on either his or his opponent\'s turn. Resignation is often symbolized by the resigning player tipping over his king. ### Draws - The player to move has been *stalemated*, meaning that he has no legal move and is not in check. - Both players agree to draw the game. Either player may offer a draw to the opponent upon completion of his move. If the offer is accepted, the game is drawn. If the offer is rejected, the game will continue. - A player can claim a draw with if any of the following are true: - If the exact same position occurs or will occur three times with the same player to move, the player on move may claim a draw by threefold repetition. Note that the same set of moves must be available for each player (including castling and *en passant*). - No pawn has moved and no piece was captured in the last 50 moves. - The opponent does not have sufficient material to checkmate him by any legal sequence of moves. - Both players have run out of time in a competitive game. - One player has run out of time in a competitive game, but the opponent does not have sufficient pieces to checkmate him by any legal sequence of moves. {{-}} The diagrams above shows example of some of the draw rules: - Stalemate: Since black can not move the pawn or the king without placing himself in self-check, the game results in a stalemate. - Threefold repetition: Black has checked white, and can continue to check white forever by moving the rook back and forth between f2 and f1. The same position will thus occur again and again. - 50 move rule: White has material advantage and enough material to mate, but if black plays correctly black will use his bishop to avoid being mated forever. - Insufficient mating material: White has material advantage, but not enough material to mate. ## Chess Etiquette Generally, chess games at tournaments are conducted under the following rules: - **Touch-move rule** - If a player touches his own piece, he must move it, and if a player touches an opponents piece, he must capture it (unless the capture is not possible). If he releases a piece on a square, the move is completed and can\'t be taken back. If you need to center a piece on its square, it is traditional to say *j\'adoube* (I adjust). - **Be silent when your opponent is on the move** - You can only adjust pieces, offer a draw, or claim a draw when it is your turn to move. A friendly game may be played in any way that is mutually agreeable. Generally it is considerate to avoid distracting your opponent. ## Glossary - **Capture** - To move one\'s piece into the same square as one of one\'s opponent\'s pieces. The opponent\'s piece is removed from the board. - **Check** - The king is \'in check\' when it is being attacked by an enemy piece. - **Checkmate** - The player whose turn it is can make no legal move to get his king out of check. - **Stalemate** - The player whose turn it is can make no legal move, but the king is not in check. es:Manual de Ajedrez/Iniciación del juego it:Scacchi/Le regole del gioco ms:Catur/Bermain nl:Schaken/Spelregels pt:Xadrez/Regras ro:Şah/Reguli de bază zh:国际象棋/规则
# Chess/Notating The Game Notating chess games is important to any chess student, since it allows them to review their strategy and that of their opponent, to read of classic chess encounters, and follow how the game developed. Further, chess puzzles are often set in magazines, newspapers and online, and their solutions are notated; for an example, see The Times Chess. ## Algebraic notation A very common nomenclature for chess games is algebraic notation. There are several older systems of notation, but these are less common. In algebraic notation, we use - **R** for a Rook; - **N** for a Knight; - **B** for a Bishop; - **K** for a King; - **Q** for a Queen; - **no letter** for a Pawn. Sometimes a pictorial language-independent notation is used, in which a picture of a horse might represent a Knight, and so on. Each square on a chess board is given by a coordinate, much like a map or a planar graph. The *ranks* (rows) are indexed with Arabic numerals 1 through 8, and the *files* (columns) are indexed with Latin letters "a" through "h." A square's coordinate is denoted as its file index followed by its rank index. For example, in the board below, black's King is on the square **d5**. If black moves his King to, say, **d6**, the move is notated as **Kd6**, i.e. the **K**ing has moved to square **d6**. If more than one piece of the same type could have moved to the square to which the piece was moved, then the file of the piece prior to its move should come in between the piece\'s symbol and the coordinates of its destination (i.e., **Qee7**.) If necessary, the rank it was on may also be added, (i.e., **Qe6e4**.) Moves in which a piece is captured, a King put in check, or checkmate have special notations. - If a piece is captured, a cross (**x**) is inserted just before the destination square. Thus, if the capture is done by a Pawn, the cross is preceded by the column the Pawn occupied prior to the capture. - If the King is put in check, the move\'s notation is followed by a plus sign (**+**). - If the King is put in checkmate, the move\'s notation is followed by a hash or double plus signs (**#\'\'\",**++\'\'\',) or the word \"mate\" or \"checkmate.\" ### Annotation shorthand Annotation shorthand is not a notation system. Rather, it is a system of symbols for the player or annotator to add his descriptions or comments. A player or annotator notating a game might wish to highlight an excellent move, question a bad one, or indicate which player he thinks has the advantage. - If a move is followed by an exclamation mark (**!**), the player/annotator is surprised by the move\'s quality. - If a move is followed by a question mark (**?**), the player/annotator suspects the move may have been poor. - If a move is followed by an exclamation mark and then a question mark (**!?**), the move interests the player/annotator, though it may be sub-optimal. - If a move is followed by a question mark and then an exclamation mark (**?!**), the player/annotator fears that the move may be conclusive. Repeating a symbol (e.g. **!!** or **??**) adds emphasis. Results are written as white\'s score followed by black\'s score. For example, **1--0** indicates that white won, and **0--1** indicates that black won. In the case of a draw, the result is **½--½**. There are some additional symbols for the player/annotator to note his thoughts on the game in general, rather than on any particular move. - An equals sign (**=**) indicates positional equality between the players. - A plus-minus sign (**+/--**) indicates that white is considered to have the advantage. - A minus-plus sign (**--/+**) indicates that black is considered to have the advantage. ## Ambiguity Sometimes algebraic notation can be ambiguous---that is, two pieces of the same designation can move to one square. For example, a player might be able to move either of his Rooks to the same square. In these cases, it is essential to specify which piece was moved. The precise move is specified by designating the file (column) that the piece moved from, before the move\'s final co-ordinate. For example, **Nd2** indicates that a Knight moved to **d2**, but **Nbd2** indicates that the Knight that was in column **b** moved to **d2**. If a piece\'s file is not enough to precisely specify the move, then its rank is used instead. If neither is enough on its own, both are used. ### Special moves Some special moves are tricky to write in algebraic notation, and must have their own notation. - Castling King-side is written **O-O**. - Castling Queen-side is written **O-O-O**. - En Passant (or En Passe\") (French for \"In passing\") capture is written as if the captured pawn only moved one square. The notation may be followed with *e.p.* or *ep* to clarify that the capture was done En Passant. - If a Pawn is promoted, the Pawn\'s initial move is written, followed by an equal sign and then the shorthand for the new piece; for instance, e8=Q. Any additional nomenclature or annotation is written after the shorthand for the new piece (such as c8=Q+ if a Pawn promoted to a Queen on c8 places the opposing King in check.) ## Sample game in algebraic notation If you have familiarized yourself with algebraic notation, consider this short sequence of moves. Try to follow the game by looking at the moves in algebraic notation, and the boards. The game has begun, and is nearing the end. White is to move. White decides to move his Bishop from **d3** to **c4**, to check black\'s King. This is white\'s thirtieth move. So in algebraic notation, we write - **30. Bc4+** Since only one Bishop could move to **c4**, the Bishop\'s initial position was not specified. The **+** indicates the check. White\'s Bishop is now, unfortunately, in the Queen\'s line of fire. Black decides to capture it. So for black\'s 30th move we write - **30\... Qxc4** The *x* signifies that a piece has been captured. When black\'s move is written separately from white\'s, an ellipsis (**\...**) is placed between the number and the move. The ellipsis indicates that white\'s move has been omitted. The board now looks like this: White is in trouble now, and decides to flee to **f2**. His move is - **31. Kf2** If black checks white\'s King, by moving his Queen to **c2**, his move is - **31\... Qc2+** ## Descriptive Notation An older form of notation you will run into quite frequently is *Descriptive Notation*. It is useful to know because older books use it. In this form, instead of the files being a, b, c etc., they are Queen rook (QR), Queen Knight (QN), Queen Bishop (QB), Queen (Q), King (K), King Bishop (KB), King Knight (KN) and King Rook (KR). The ranks are labelled from your point of view so that the square e4 (in algebraic) is White\'s K4 and Black\'s K5. To record the moving of a piece, you write the piece, then a dash, (\"-\") which means \"moves\", or \"moves to\" and to where it moves. 1. P-K4 means move a Pawn to the 4th rank in the King\'s file. N-Q-B3 means you move your Knight to the third rank in the Queen\'s Bishop file. For a capture, you specify the piece taking, and the piece to be taken. QRPxN means Pawn in the Queen Rook file takes Knight. Excessive notation is left out so that if there is only one way a Pawn could legally take a Knight, the move is recorded as PxN. Note that if a piece is specified to be on the King\'s or Queen\'s side of the board, that is the side it is on *now*, NOT the side it started out on. In rare occasions the move will still be ambiguous when, for example, both Knights can make a particular capture and both of them are on the same side. It would then be necessary to insert a \"/\" which means \"on\". For example: N/3XP (for the rank) or N/BXP (for the file). In order to compare the two systems, we could look at the same game in both algebraic and descriptive notation in full (1, 3, 5) and abbreviated (2, 4, 6) notation. +--------------------+-------------------------------------------------+ | Algebraic | Descriptive | +====================+=================================================+ | 1. e2-e4 e7-e6 | 1. PK2-K4 PK2-K3 | | 2. d4 d5 | 2. P-Q4 P-Q4 | | 3. Nb2-c3 Bf8-b4 | 3. NQN1-QB3 BKB1-QN5 | | 4. Bb5+ Bd7 | 4. B-QN5ch B-Q2 | | 5. Bh3xd7+ Qd8xd7 | 5. BKR3xQ7ch QQ1-Q2xB | | 6. Ne2 d3xe4 | 6. N-K2 PQ3xPK4 | | 7. 0-0 | 7. 0-0 | +--------------------+-------------------------------------------------+ : 1.Note here that since only one Bishop can move to QN5, it is unnecessary to specify which Bishop moved to that square. : 2.Check is indicated by \"ch\", or \"+\", and \"++\" for the uncommon but not entirely rare *double check*, and \"+mate\" or \"+++\" for checkmate. ## Coordinate Notation A different type of notation uses only the squares that the pieces were on to denote movements; the dash \"-\" is inserted to denote \"moves to\". For example, to denote the earlier 7 moves, the following notes are shown: 1. e2-e4 e7-e6 2. d2-d4 d7-d5 3. b1-c3 f8-b4 4. f1-b5+ c8-d7 5. b5xd7+ d8xd7 6. g1-e2 d5xe4 7. 0-0 or 0-0-0 ## ICCF numerical notation ```{=html} <div style="float:right;"> ``` ```{=html} </div> ``` A move is denoted by the file (1 to 8) and rank (1 to 8) of its starting square followed by its destination square (from 11 at the White Queen's Rook square to 88 at the Black King's Rook square). \"1. e4\" is denoted as \"1. 5254\" in ICCF notation. Unlike other notations, ICCF notation does not make apparent when castling, check, checkmate, and capture took place (castling King side is 5171 for white and 5878 for black). Pawn promotion necessitates a fifth number specifying the new piece (1=Queen, 2=Rook, 3=Bishop, 4=Knight). This notation is considered to be international in that there is no dependency on piece names or specific alphabets. However this notation still depends on Arabic numerals. es:Manual de Ajedrez/Anotando un juego it:Scacchi/Annotazioni di gioco ms:Catur/Mencatat permainan
# Chess/Tactics ## Guarding When one of your pieces is placed so that it attacks a square occupied by another of your pieces, the former is said to be guarding the latter. When your opponent captures the guarded piece, you can recapture with the guarding piece. Note that if a guarding piece is pinned to your king (see below for a description of pins), it can only guard other pieces against capturing by the enemy king, but not from other enemy pieces, since it is unable to move or capture. ## Batteries Batteries are formed when two or more pieces work together. The most common kind of battery is the doubling of rooks on a file. Other batteries can be formed by rook-queen, bishop-queen, two knights or a bishop-pawn. A triple battery can be constructed with the queen and both rooks. This is known as Alekhine\'s gun (diagram at right) and can be extremely dangerous. It is often advantageous to place the queen behind one or both rooks as it is a more valuable piece. ## The Exchange In almost any game, a player will have the opportunity to capture one of his opponent\'s pieces in exchange for sacrificing or losing one of his own pieces. This should however NOT be done for its own sake! Initiate an exchange only when it benefits you. Benefits can include, but are not limited to: - Material advantage - Exchanging one of your pieces for a more valuable opponent\'s piece (e.g. exchanging a bishop for your opponent\'s Queen). - Doubling pawns - Take when taking back means the doubling (or tripling) of your opponent\'s pawns on the same file. - Opening up the king\'s defenses - Take when taking back means moving a pawn that exposes the king. - Removing a defender - Take when the piece being taken is providing an essential service for the opponent. - Blunting an attack - When you are being attacked, often a well timed exchange will leave your opponent with too few pieces to keep up the attack. - Gaining space - In a cramped position, having more pieces can actually be a disadvantage because the pieces get in the way of each other. If your opponent has a space advantage, exchanging pieces can lessen the advantage and make the resultant position less confining. - Improving a material advantage - if you are ahead material, exchanging pieces will usually benefit you (note - pieces, NOT pawns). Similarly, if you have an extra pawn, trade pieces that may otherwise be used as a sacrifice to prevent pawn promotion. - Forcing checkmate - If you are able to force a checkmate by exchanging pieces, you should always take the exchange, even if the exchanges seem poor (e.g. sacrificing a Queen for a bishop). Note that a forced checkmate is one where there is no way for your opponent to prevent the checkmate. - Threatening checkmate - Sometimes, you can propose an exchange where you can force a checkmate if your opponent accepts the exchange. That is if your opponent captures your piece after you capture one of their pieces, you are then able to force a checkmate. - Preventing checkmate - If you are in a situation where the only way out of a checkmate is to exchange pieces, you must make the exchange. ## Forks and Double Attacks Sometimes a piece can be in position to attack two enemy pieces at once. This is called a fork or a double attack. All pieces can fork, even pawns, but knights have a reputation for making especially vicious forks because other pieces cannot block their way because the endangered pieces cannot defend by attacking it, unless they are another knight. ### Forking with check A knight fork that attacks the king from an unguarded square is very powerful. The opponent must then move his king to safety and the other piece in the fork has no chance of escape. #### The Royal Fork A *royal* fork is one involving both your opponent\'s king and queen. In the example shown here, white\'s knight on f7 has engaged black in a royal fork. Black will be down the exchange of a queen for a knight. ### Forks do not always win material If every time you saw a fork you played it, you would be making a mistake. You have to examine the different possibilities to escape the fork. In the queen fork on the right white has just played 1.Qd4+ forking the black king and rook. However black can play 1. \...Rg7 blocking the check and moving the rook to safety (although white could play 2.Qxg7, taking the rook, black could then play 2. \...Kxg7, taking the queen; white will then have lost the Exchange and will be unable to destroy Black\'s pawn majority, resulting in a forced win for Black, a queened pawn, and a king-queen checkmate.) However 1.Qd4 is by no means a bad move. Perhaps White played 1.Qd4 in order to force black to play 1. \...Rg7 in which White can now play 2.Qd8+ (fork on king and pawn) Rg8 (forced) followed by 3.Qxa5 in which case White can push his a-pawn. Here White forked Black\'s king and rook not to win the rook but to later win a pawn by a fork, and pave the way for his a-pawn to become promoted to a queen. He might have also intended to play 3.Qf6+ Rg7 (forced) 4.Qxc6, eliminating Black\'s passed pawn. {{-}} ## Pinned pieces A pinned piece is a piece that cannot move because it would expose an attack on an important piece by one of the opposing pieces, such that the capture of said piece would result in material gain by the opponent. A great tactic is to pin the opponent\'s pieces to his king; this is known as an *absolute pin*. For example, take a look at the board on the right. Black just moved his dark-squared bishop to **b4**. The white knight is now pinned and cannot move, because moving the knight would put himself in check. White\'s only way to stop the pin is to move his king. The pawn on **e4** is no longer guarded by the knight, since the knight could not move to exchange. The position diagrammed to the right shows the theme of attacking the pinned piece. White can look at this position and immediately take the rook and win an exchange. However this wouldn\'t even be the best move. If white did this then the material would be dead even; however, white has more pawn islands and it would be a very close game. Instead, white can play Ng5! The rook cannot move, and black has no way of effectively defending the rook a second time, therefore Black will eventually lose a rook. So, if you have pinned a piece, try to see if you can attack the piece again, and if a piece of yours is pinned, try to see if your opponent can attack it again. The moral of the story: if you see a good move, stop and look around for a better one. In contrast to the absolute pin, a *relative pin* occurs when one player\'s piece is pinned to one of lesser value than the king, such as a queen or rook. If the benefit of moving the pinned piece outweighs the loss of material occasioned by the capture of the exposed piece (for example, if a forced mate may be achieved), then the pin can be disregarded and the pinned piece moved. {{-}} ## Skewers A skewer is similar to a pin, but it is in a sense more powerful. The difference between a pin and skewer is the location of the more important piece. In a pin the lesser piece blocks the attack on the more important one, in a skewer the more important piece is attacked first and when it moves it exposes the lesser piece behind it to be hit. Black has, in a blunderous moment, placed his king on **d7** in front of his queen on **d8**. White may now triumphantly slide either rook to **d1**, skewering Black\'s king and queen. Since Black cannot block the check, the king has to move, exposing the black queen to the attack of the white rook. {{-}} ## Discoveries A discovery is an attack on an enemy piece which is unveiled by moving one of your pieces. The power of discoveries is that two targets can be attacked simultaneously. If combined with a check they can be lethal. {{-}} Note that White\'s 1.Nd7+ was a *double check*, a type of discovered check where the piece moving also gives check. Such checks are very powerful, since the king is forced to move (both checks cannot be blocked at the same time). They are also often lethal, as in the above game. {{-}} A simpler example of a discovered checkmate is shown below. ## Removing the defender By first capturing, threatening, or pinning a piece that guards another, you should be able to capture the other piece for free. You can also remove the defender of a position. By using tactics you might be able to force a checkmate! ## Sacrifices A sacrifice is an exchange of a piece for a non material advantage: {{-}} In the first diagram, White just moved **1. Kh1** to get out of check. Black sacrifices his queen with **1\...Qg1+** for a winning positional advantage - White is in check and can not take with his king because the knight guards the queen. **2. Rxg1** - forced - this smothers the king - he cannot move because his own pieces are on every square he could go to - any check on an unguarded square now is mate. **2\...Nf2#** Checkmate. This queen\'s sacrifice was an example of a smothered mate (in which a knight delivers a checkmate that is caused by the king\'s inability to move anywhere). In fact, this is a special kind of smothered mate, called *Philidor\'s Legacy.* {{-}} ## Zwischenzugs A *Zwischenzug* (pronounced \"TSVISH-en-tsoog\",) or \"in-between move,\" is one that is made unexpectedly in the midst of a sequence of moves. But not just any series of moves, one in which the player falling for the Zwischenzug feels the sequence is forced, while his opponent demonstrates to him that it certainly isn\'t! Most commonly these fall in between trades where a recapture seems to be the only proper means of play. Such in-between moves often have a surprising and pleasing effect of increasing the potency of a combination beyond the opponent\'s expectations. In Borisenkov-Mezenev (shown in the diagram to the right), black played **1\... f2**, threatening to queen, which White countered with **2. Rg8**, intending **3. Rf8+**, and **4. Rxf1**. But White resigned after the Zwischenzug **2\... Bb1!** which allows Black to queen (**3. Kxb1 f1=Q+** or **3. Rf8+ Bf5**).{{-}} it:Scacchi/Tattica
# Chess/Tactics Exercises Chess is, of course, a game of tactics and strategy, and the tactics described in the Chess/Tactics entry are important to any chess player. The right tactics can allow you to make quick gains of material, can protect you from quick losses of material, and can, ultimately, help you to win chess games. ## Tactics Practice Good chess players, then, must practice tactics. Consider the chess boards below. In each board white can win material by force, if he chooses his moves wisely and utilizes the tactics described in the Chess/Tactics entry. Play white first in each board (unless, of course, it is otherwise stated), and force material gains for white with the right tactics. The solutions are at the bottom of this page. ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ```{=html} <div style="float:left"> ``` ```{=html} </div> ``` ## Solutions ### 1. - 1\. **d5** **Ne7** (White threatens knight with pawn, black moves knight, knight no longer guards **b4**.) - 2\. **Qa4+**\... (Fork tactic; queen checks king, and threatens bishop. Black must concede bishop.) ### 2. - 1.**Rxd7**+ **Kc8** ( if \...**Nxd7??**, **2. Qe8#**) - 2\. **Rd5+** (if **Re7**+, **Kb7** and White risks losing an exchange) **Kb7** - 2\. **Qc6** is also acceptable. It is followed by \...**Ra7**, **Be6** and eventual moves that clear black pawns on the right. - 3\. **Rxe5** **Bd6** - 4\. **Rh5**, and white wins a pawn while still being able to keep pressure on black. ### 3. - 1.**Rf8**+ **Rxf8** (\...Ka7? 2.Bxe3+ b6 3.Rxh8) (White\'s rook forks check and black\'s rook, and discovers threat on black\'s knight from white\'s bishop.) - 2.**Rxf8**+ **Ka7** (Rook checks king. King moves diagonally.) - 3.**Bxe3+** (Bishop takes knight with check, gaining a piece and avoiding a checkmate on Rg1.) ### 4. The expected solution: - 1\. **Qf4**; black\'s pinned knight is now en prise (thrice attacked, twice defended). - 1\. \...**Ned7** defends for black (1. \...Ng6 is fruitless, as white needs simply relocate his queen, Qf5, and black is out of tricks) - 2\. **e5!** and we see that white\'s first move was critical, preparing his e pawn to assume the now vacant e5 square, forking black\'s knight and rook. This one is a tricky alternative: - 1\. **Rf5** **Ned7** (2. \... Re8? 3. Raf1 Ned7 4. Qf2!) (White adds pressure to the knight forcing a withdraw.) - 2\. **Qf2** **Rg8** (2. e5? Rb6 3. exf6 Qxe2) (White adds pressure to the other knight, preventing black from moving any of its defenders, and also protects the bishop. There are other responses for black, but this generates some offensive threats and is probably the best option.) - 3\. **e5!** **Rxg5** (3. \... Nxe5? 4. Bxf6 Rxf6 5. Rxf6) (White\'s pawn move offers the most immediate reward in the impending exchange. White still has potential with 3. Bh4, but the gains, if any, will take many more turns to come to fruition. For example, 3. Bh4? Rg6 4. Rf1 Qe8! yields a situation far less favorable for white.) - 4\. **exd6** **Rxf5** - 5\. **dxe7** **Rxf2** - 6\. **Kxf2** (White does not necessarily have to allow the exchange happen to completion, but since white has a material advantage such simplification of the board is only to his or her benefit.) This results in white having a bishop, a rook, and a pawn on the seventh rank versus two knights. From there, white can win a further few more pawns somewhat easily, giving a hefty material advantage. One might try the more immediate 1. c5 with the hope of 1. \... Rd5 2. Bxf6 but to do so is forgetting that 1. \... Rc6 is another response. Also, one might try 1. Bxf6 Rxf6 2. Qg7, with the idea that black cannot save both of the rooks at once, but this also does not work because of 2. \... Rxf1+. White must now play something like 3. Rxf1, which gives black the opportunity to save the rook on h8. ### 5. - 1.**Qb3**+ **Kh7** (\...**Rf7** 2.**Qxf7**+ **Kh7**) (White checks king with queen. King moves away.) - 2.**Rh1**+ **Qh5** (White checks king with rook. Black blocks with queen.) - 3.**Rxh5**+ **gxh5** (White exchanges rook for queen!) Note the importance of white\'s knight in this exchange. It guarded **f7**, preventing a simple defense of the initial check with **Rf7**. Alternatively, if 1. \... **Kh8**, - 2\. **Nf7**+ if 2. \...**Kg8**, 3. **Nh6**+ (or **Nd6**+) wins the queen for a knight. If 2. \...**Kh7**, - 3\. **Rh1**+ if 3. \...**Qh5**, 4. **Rxh5** (back to main variation) if 3. \...**Kg8**, 4. **Nh6**+ (or **Nd6**+) wins the queen for a knight ### 6. - 1.**Nf6**+ **Kf8** (\...**gxf6?** 2.**Bxf6 Nxa1** 3.**Rh8#**) (**Nf6** checks, and threatens two rooks. A naive defence of **gxf6** would result in checkmate.) - 2\. **Nxd7**+ **Kg8** (Any other move allows 3. **Rh8#**) - 3\. **Nf6**+ leaving Black in the same bind, eventually winning Black\'s other rook as well. ### 7. - 1.Rh3+ Kg8 - 2.e7+ d5 - 3.exd8=Q Rxd8 - 4.Qxc5 Bxh3 - 5.gxh3 ### 8. - 1.Rh8+ Kxh8 - 2.Qxf8+ Kh7 - 3.Qxg7# - Also 1.Qe6+ Rf7 2.Rf1 (Black\'s rook is pinned) Black cannot stop 3.Qxf7# ### 9. - 1.Rh7+ Kg8 - 2.Rcg7+ Kf8 - 3.Bd6+ (Computer give the better 3.Bh6 \... - 4.Rh8# is better and logical!) \...Re7 4.Bxe7+ (With mate following, this was what I saw and played. Bh6 is better but it might be to hard for all to find, both lead to mate) ### 10. - 1.Rxf8+ Kxf8 - 2.Qf3+ Kg8 (\...Bf4 3.Bxf4 exf4 4.Qxf4+) - 3.Qxg3 ### 11. - 1.**Nf6** **Qe7** (\...**Bxf6**? 2.**Qxf6** **Kg8** 3.**Bh6**\...) \... 1. \...**Qc8** gives white mate in at most 8 moves) - 2.**Nxe8** to win an exchange Alternatively, - 2.**Nxh7**+ **Kg7** 3. **Bxe7** to win an exchange (when black recaptures on h6 or e7 just move the other piece away) ### 12. - 1.Ne7+ Kh8 - 2.Nf7+ Qxf7 - 3.Rxf7 Alternatively, - 2.Nexc8 (Threatening back rank mate with Rf8#) if 2. \... **Bxe3**+ then 3. **Qxe3** Other black moves that avoids mate should allow 3. Nxa7 ### 13. - 1\. \...Bh4 - 2.Qxh4 Nf3+ - 3.gxf3 Qxe3+ - 4.Kd1 Bb1+ - 5.Qxd8+ Rxd8# ### 14. - 1\. \...Bxg3 - 2.fxg3 Rxg3+ - 3.hxg3 Qxg3 - 4.Kh1 (4.Kf1 Qf3+ 5.Kg1 Rg8+ 6.Kh2 Qg2#) Qh3+ - 5.Kg1 Rg8+ - 6.Kf2 Rg2+ - 7.Kf1 Qh1# ### 15. - 1\. \...Bxb3 - 2.cxb3 Qxd1 ### 16. - 1.Qe6+ Kf8 (1. \...Kh8? 2.Rxh7+ Kxh7 3.Qxg6+ Kh8 4.Rh1# or 4.Qh7#) - 2.Rxh7 Bg7 - 3.Rdh1 or 3.Bxg6 with mate following. There are different moves Black can play, White is likely to play both Rdh1 threating rook sacrifice on h8 followed by mate and Bxg6 which is threatening Qf7#. 1.Qxd4 is also winning for White. 1. \...Ng7 2.Rxh7 Kxh7 3.Qh4+ Kg8 (3. \...Nh5? Qxh5, g pawn is pinned) 4.Bxg6 Kg8 With mate following. ### 17. - 1.Nd2+ Kc2 - 2.Nf3 (There is no way for White to avoid giving up an exchange.) ### 18. - 1.Qh5+ Kg8 - 2.Qxh7+ Kf7 - 3.Qxf5+ Kg8 - 4.Qh7+ Kf7 - 5.Rf3# (1.Qxh7? Re5 2.Rf3 Ke8 and game continues) ### 19. - 1.Nf5+ Kg8 (1. \...Kf8? 2.Rh8#) - 2.Qg4+ Kf8 - 3.Rh8# ## A Highly Tactical Position What follows is a complex board. The board arose after the opening moves 1.e4 e5 2.Nf3 Nc6 3.Bc4 h6 (Ask yourself, was **h6** a bad move?) 4.Nc3 Na5 (Ask yourself, was **Na5** a bad move?) 5.Bxf7+ Even an experienced player might struggle to calculate all the possible moves and their consequences. One way to improve one\'s tactical vision is to set-up this board, or indeed any board, choose an opening move, and then continuing, picking the best moves possible, and noting the success of the initial move. Consider the **h6** and the **Na5** moves, and note their weakness. Indeed, the **Na5** move\'s tempo renders black\'s only developed piece useless, and the **h6** move weakens the King\'s side and scuppers a future defensive **g6** move. Black may have anticipated a Fried Liver Attack, and made a pre-emptive defense, though such an attack should threaten black. Now consider how the game might develop. Black is in check. He can take the bishop (**Kxf7**), but this might not be tactical. If Black moves **Kxf7**, there is an inevitable knight check (**Nxe5**). White might then play **Qh5** which may be played with check. Studying the many variations, and the patterns of movement, will be beneficial for any chess player, especially once white\'s queen is active. There are many mate threats that can be created, and many guarded squares that black cannot move his king to. Here are possible scenarios. First, **Ke7**, where black moves his king forward, and out of check, which is discussed in some detail. Second, **Kxf7**, where black captures white\'s bishop, which is left as an exercise for the keen reader. :\*1\...Ke7 Declining the Bishop capture 2. Nd5+ now the King is forced to capture the Bishop (or play Kd6 with no lose of material for white), 2\...Kxf7. It was bad for black to decline the sacrifice because white was able to muscle black into accepting it, and now white has an additional knight bearing down on the black king. 3. Nxe5+ Ke6 (3\...Ke8 Would lead to mate with 4. Qh5 g6 5.Qxg6#) 4. Qh5 (White now threatens 5. Qf5+ Kd6 and 6. Nf7+ winning the Black queen the following move) 4\...Qg5 (it is plausible that Black will play this in attempt to trade queens and greatly reduce White\'s attack) 5. Qf7+ Kd6 (The e5 Knight is immune from capture from the King, for two reasons. 5\...Kxe5 is met with a.) 6. f4+ forking the Queen, so long as f4 is defended by a white piece, and b.) 6. d5+, this is good because it facilitates the development of the dark square bishop, but white is likely to lose the bishop so long as the queen is protected by the h pawn. There are two ways but only 1 black queen you might say, regardless it is still good to have two ways. What this means is if white can utilize his knight and queen for different things since they aren\'t tied down to the defense of the f4 square, and the d5 knight will remain immune. That means white is more flexible and can respond to blacks defenses in more ways) 6. Qxf8+ (vacates the f7 square with tempo) Ne7 7 Nf7+ (forking the King and Queen) Black\'s position is hopeless. :\*1\...Kxf7 See if you can work out what can happen here.
# Chess/Strategy ## Strategy Basics You may choose different strategies depending on what type of opponent you are playing, and what kind of player you are. Strategy starts with the opening, and continues through the middlegame, and on to the endgame. Games are considered open if the exchange of pieces have opened up files or diagonals, and closed if they have not. These games are called open or closed because there is more mobility for one's pieces in open games, and because this category usually determines the complexity of the game. Specifically, recognition of open versus closed games is important because closed games are more conducive to Knights, whereas open games see more involvement with longer range pieces such as Bishops, Queens, and Rooks. _Strategic Openings:_ If you choose to play a long-range, theoretical sort of game, you may want to choose a complex opening such as the Queen's Gambit, the Ruy Lopez, or the English. In these types of games, especially when you are playing the closed variations, you are likely to venture into close positions where positional maneuvering predominates over tactical shots. From there, you can focus on strategic elements like controlling files, pawn structure, and other long range development considerations. _Tactical Openings:_ If you are more interested in sharpening your tactical play and focusing on combinations, you may choose a more tactical opening. Some of these openings include the Sicilian Defence (especially the Dragon and the old main line of the Najdorf), the Grünfeld Defence, and the older variations of the Two Knights\' Defence. By initiating exchanges you can always simplify the game, and it will become more computational. If you don't want that to happen, you have to be very guarded and conservative. You should always be thinking about how many squares a piece controls (i.e. can attack), and which squares are controlled. In the beginning you should aim to control the center of the board. As the game progresses you may want to attack one flank, especially if the King has castled onto that side. ## Material advantage Having more valuable pieces on the board than your opponent means you have a material advantage. If your position otherwise is equal, you will be more likely to win. Since not all pieces are equal, many people use the following point system to estimate which player has a greater material advantage: - Pawn = 1 - Knight = 3 - Bishop = 3 - Rook = 5 - Queen = 9 - King = infinite (3.5 as an attack/defense strength during end game) However, a slightly more accurate system is as follows: - Pawn = 1 - Knight = 3½ - Bishop = 3½ - Rook = 5 - Queen = 9 - King = infinite These values can only be used as guidelines for the relative value of the pieces; a piece\'s value in a particular chess position must be treated on a case-by-case basis. ### Queenside vs Kingside When calculating the value of a position, dividing the board in Queenside and Kingside, it will be seen that it matters that the king is considered to be worth 3.5 points. The calculation of forces on either side will determine the stronger side. This side usually can become the attacking one, all other things considered. ### The pieces\' relative value changes over time The value of the pieces changes as the game progresses, because there is less material on the board to get in the way of some pieces. Rooks usually become more powerful because there are fewer pawns in the way, and a rook has the opportunity to control more squares. Bishops can travel great distances if unobstructed, while knights have a more local presence. So, knights shine when the board is cluttered in a closed game because they can \"jump\" over pieces whereas bishops are generally stronger in open games where they have the run of the board. ### The value of the King Assigning a point value to the King for the sake of deciding to trade the King for other pieces doesn't make sense, since capturing the King is the object of the entire game! Therefore it is customary to either exclude the King from the point value scale, or assign it an infinite value. However, keep in mind that the King has an attacking and defense capability as any other piece. The King attack and defense value changes dramatically as the game progresses. During the opening and middle game the King is a piece that needs to be protected against checkmate at all cost. Its usefulness as an attacking or defending piece is thus limited. However its strength as an attacking piece becomes greater in the endgame. In this phase of the game it is generally reckoned to be stronger than a knight or bishop but weaker than a rook. Therefore giving the King an attack or defense point value of 3.5 during the endgame makes sense. ### Knight vs Bishop Based on the point value scale above the value of the knight and bishop appears to be the same. Alternative scales have tried to assign the knight and the bishop slightly different values, usually preferring the bishop over the knight. But since the relative value of the knight and bishop is strongly related to the position, such minor differentiation provide little overall guidance. Knights are more powerful if they have a safe outpost in enemy territory - a knight on the 6th rank that cannot be attacked by opposing pawns can be as powerful as a rook in the right circumstances. This type of knight, if guarded by a pawn, is called "a home away from home". A bishop never leaves its own color, so if one of the bishops is captured, half the board is now out of reach of a bishop. So trading one bishop for a knight tends to favor the person losing the knight, who is left with two bishops. However, trading the second bishop isn\'t quite so hurtful. So trading a bishop for a bishop where one side has only 1 bishop to begin with helps the side with fewer bishops. Knights cannot cover both sides of the board at the same time, while a bishop can, so in an endgame where there are pawns on both sides of the board, the bishop is stronger. Bishops cannot attack pawns that are on the opposite color, while a knight can. Furthermore, in a game where there is a short pawn chain, a knight can stand at the head of the chain and attack the pawn supporting it, so a knight is often more effective attacking pawns as long as they are limited to one side of the board. Finally, it is possible to force checkmate with two bishops and king against a lone king, but not with two knights and king versus lone king. It is important to keep in mind what sorts of positions will benefit the pieces that you have. For example if you have 2 knights and no bishops and your opponent has 2 bishops and no knights then it would be good for you to keep the center cluttered with pawns by avoiding pawn exchanges. If you do this then your opponent\'s bishops will have hampered mobility whereas your knights can hop over the pawns. Also if you have the bishops and your opponent has knights then you should play to keep the center clear so your bishops can have more mobility. Also, this idea can help you decide on whether or not to trade a bishop for a knight or vice versa. ### More pieces are usually better Usually having more pieces is more valuable when the point value is roughly equal for both players---two bishops beat a rook, two rooks beat a queen---but this is conditioned on proper co-ordination between the pieces. It may be worthwhile to sacrifice two pieces for a rook if this results in long-term damage to the enemy\'s piece co-ordination. Usually this means tying down the extra pieces to the defense of weak pawns, so that they cannot cooperate in attacking friendly pawns. ## Compensation Material values only matter in the context of position. **Compensation** is a term used in chess to describe the trade off between material and positional advantage. A strong position can make up for a material deficiency. For example if your opponent has all their pawns on white squares, a black bishop is worth more than a white bishop. Typically having compensation for a piece means that an attack against the enemy\'s king or strong points cannot be repelled or may only be repelled by the enemy returning the material he is up. Often compensation can refer to having the initiative or in trapping the opponent\'s king in a vulnerable position. A pawn majority on one wing or a passed pawn can also sometimes be considered compensation for a minor piece. Generally the player who is down on material has to act quickly and avoid exchanging pieces to prevent the enemy from making his material advantage count. ## Pawn Strategy and Pawn Chains In the end game, pawns gain strength as they advance because they pose the threat of promotion, so a pawn on the 6th or 7th rank is worth significantly more than a pawn on the second rank - often as much as a piece. However, in the opening and middlegame, an advanced pawn is less likely to promote and more likely to be in need of being defended. It is also unable to defend the center and often leaves \"holes\" in your territory that can serve as outposts for your opponent\'s pieces. An overadvanced pawn is then often a liability. In the opening and middle game, pawns in the center of the board block paths and support outposts. So they tend to be more valuable than end pawns. However, in the end game, a wing pawn is usually the hardest to get to and block or capture and is therefore more likely to queen. So in the endgame, the edge pawns are often more valuable than the middle pawns (Note: this is not necessarily true in some basic pawn and king endings, where a pawn on the edge leads to only drawing options). A passed pawn has only pieces stopping it from queening, so it is considered more valuable - especially if it is protected by another pawn. ## Tempo Tempo is the effective number of moves required to reach the position on the board. Moving a piece twice to reach a position it could have reached in one results in a net loss of one tempo - moving a piece back to its starting place usually results in a loss of all its tempo - unless other pieces moved that could not have moved otherwise. Also the capture of a piece means all of the tempo it gained is lost as well. Essentially, tempo is one way of showing how many effective moves you have made. So the gain of a tempo is basically like getting a move for free. Three tempi is usually considered equivalent to a pawn in terms of advantage. Example: In the position above there have been 2 tempi played on each side, play continues with: **3. cxd5 Nxd5 4. e4 Nf6** Now white still has 2 Tempi (one for d4 and 1 for e4) while black only has 1. The captured pieces lost the tempo they had gained in moving and the knight lost the tempo it had when it captured. For argument\'s sake, lets assume play went as follows: **5. e5 Nd5 6. Bc4 Nb6 7. Qd3 Na4 8. Nc3 Nxc3 9. Qxc3 e6** Now black still has only 1 tempo (e6) while white has 6 (2 queen moves, 3 pawn moves and a bishop move). This has let white develop 2 pieces, control the center and give black a cramped position. Also, while both sides can castle kingside in the same number of moves, White can connect his rooks (position them so there is nothing between them on the back rank) 2 moves sooner than black. Chances are, white will complete development and launch an attack before black is able to. This means white will have an advantage when the middlegame is reached. ## Quality ### Active and passive pieces An active piece is one that has the potential to make a threat. A passive one is usually relegated to defending a piece. In this example, white\'s bishop on g5 is considered active, while black\'s bishop on e7 is considered passive. Piece activity depends on whether it can move and attack. A piece can be rendered passive if it is stuck protecting another piece or if it is restricted from being able to get into play by its own pawns. ### Good vs. Bad Bishops As noted above, a bishop can only travel on squares of one color. This leads to a situation wherein one bishop may be effectively blocked out of the game by the pawn structure. In general it is better to have your pawns on the opposite colored squares to your bishop. For example, if you as black have pawns on e6 and d5, your queen\'s bishop is likely to be a \"bad bishop.\" It is bad because it is hard to do anything constructive with it; developing it to g4 is impossible and \"fianchettoing\" it via b7 is ineffective since your pawn on d5 blocks any influence it may have over the centre. When one has a bad bishop there are two methods to improve the game: exchanging the offender and freeing up the game. In general it is profitable to try to exchange your bad bishop for an opponent\'s bishop or knight, as your bad bishop has little value. However, it is important to bear in mind that in the end game having two bishops is considerably stronger than have two knights or a bishop and a knight. Therefore you should always be wary of exchanging bishop for knight in situations where an endgame is likely. The other method to rid yourself of this weakness is by freeing up the game through making pawn moves. ### Overloaded pieces Overloaded pieces are pieces which defend too many other pieces and therefore cannot be considered to defend all of them at once. For example, a rook can defend up to 4 pieces, but if one is taken, and the rook takes the offending piece, 2 of the other pieces are undefended. ## Initiative The player with the initiative is the player who is making the threats to which the other person must respond. Having the initiative is advantageous because it forces your opponent to place his pieces in essentially defensive formations. A piece that is defending a square generally has less mobility (freedom of movement) than a piece attacking the same square. Having the first move, it is generally white who has the initiative in the early part of the game. Therefore trying to maintain the initiative would be prudent strategy. ## Zugzwang A Zugzwang situation occurs when any move a player makes will weaken his/her position, but he/she is compelled to move in accordance with the rules. An example of zugzwang is as follows: {{-}} White moves and wins. {{-}} **1. a4** : White moves the a-pawn, blocking the black a-pawn to move forward. Black has only one legal move; moving the black king out of the way of the d-pawn\'s path. {{-}} **1. \... Ke7** : The black king is forced to move away from his current position where he blocks the d-pawn\'s path to promotion, because he now has no other legal move to make. Since this move is not desired by Black, as he would rather keep his king on the d8 square where it stands to continue blocking the white d-pawn, Black is \"in zugzwang\". {{-}} **2. Kc7** : White\'s king continue to protect the pawn on d7 from capture, and blocks black\'s king to move back to it desired location of d8. {{-}} **2. \... Ke6** : Black can make other legal moves with the black king, but they will yield the same result. Even if Black must move the king, this is not an example of zugzwang. Keeping the king at e7 would not yield a better result for Black, since the d8 promotion square is protected by the white king. {{-}} **3. d8=Q** : White gains a queen and wins the game easily. Alternatively, white can force a win by moving the king first: 1. Kd6 a4 2. Kc6(Ke6) Ke7(Kc7) 3. Kc7(Ke7) with 4. d8=Q to follow *Exercise:* From the same initial position but with black to move first, show that Black can force a draw by using zugzwang. *Solution:* 1. \... a4 2. Kb5 Kxd7 (White\'s move is Zugzwang.) 3. Kxa4 Kc7 4. Kb5 Kb7 5. a4 Ka7 6. a5 Ka8 7. Kb6 Kb8 8. a6 Ka8 9. a7 (Draw by stalemate.) ## Combining attack with defense A winning strategy in Chess often involves balancing several considerations against each other. Moves that maximize immediate material gain might expose a vulnerability or yield a difficult position as the game progresses. Similarly, material sacrifices for position may be disadvantageous if they cannot be parlayed into an effective attack. Thus, a key consideration should be balancing attack with defense. A profitable move would be one that both furthers your attack and solidifies your defense. - Yasser Seirawan in his Pro Mentor DVD. es:Manual de Ajedrez/Estrategia it:Scacchi/Strategie pt:Xadrez/Estratégia
# Chess/Basic Openings The following is an overview of the aims of an opening and some standard openings that you can try in your games. All of them are playable and should lead to reasonable games with best play. ## Aims of an opening Before looking at some of the more common openings played today it is important to consider what you are trying to achieve in the opening of a chess game. In some cases, one player will sacrifice a pawn, or in some cases even more, to accomplish the goals listed below. Such an opening is called a **gambit**. **Development** You should attempt to move your pieces away from their starting positions to squares in which they can participate more fully in the game. Obviously a Knight at c3 is more effective both defensively and aggressively than a knight on b1. Avoid moving pieces more than once in the opening as this allows your opponent time to develop another piece while you are wasting time. Also avoid moving your queen in the opening, it can too easily be chased around the board by other pieces which aids your opponent\'s development while wasting moves for you. **Control the Centre** The squares in the centre of the board are critical for two reasons. The first is that pieces in the centre are able to move to more squares than pieces on the edges. (Note a knight on a3 can move to only 4 squares, whereas a knight on c3 can move to 8.) Secondly, if you control the centre it is easier to move pieces from Kingside to Queenside quickly. One of the great truths in chess is that attacks along one wing are destined to fail if the centre is not sufficiently controlled. This is because the defender with a strong centre will generally be able to muster enough defence on that side and at the same time mount a counterattack in the centre and/or on the other wing. So if you plan on mounting an attack make sure you control the centre. Traditionally it was thought that the ideal situation is one where you have a pawn majority in the centre, especially with pawns on d4 and e4 (for white). However it has been shown that an equally valid strategy is to control the centre with pieces and make minimal pawn moves. The thinking is that central pawn moves often lead to permanent positions and can block attacks. \"Fianchettoing\" a bishop by moving it to b2 or g2 after b3 or g3 allows the bishop to keep a watchful eye on the centre without fixing a pawn in the centre. **Castle** A King in the centre of the board is open to attack. It is generally a good idea to castle your king so as to be able to defend it more easily. Some players will sacrifice material in order to prevent the enemy king from castling and to attack it ferociously due to its vulnerability. Castling also has the added benefit of bringing the rooks together on the first rank so that they are able to combine in defence and attack. Once your pieces are developed, king is safely castled, and your rooks are combined, the opening is over. **Protect the King** It is not always necessary although highly advisable to protect the king through castling. That being said, there are other ways to go about protecting the king than castling although they are less efficient and will often result in pins. ## **King\'s Pawn Openings** (open and semi-open games) ### Ruy Lopez (aka Spanish Opening) **1.e4 e5 2.Nf3 Nc6 3.Bb5** the main line continues **3\...a6 4.Ba4 Nf6 5.0-0** The move **3\...a6** works because if white plays **4.Bxc6 dxc6 5.Nxe5**, Black can regain the pawn with **5\...Qd4** forking the e4 pawn and the knight. {{-}} ### Italian Game **1.e4 e5 2.Nf3 Nc6 3.Bc4** There are two key replies: 3\...Bc5, known as the Giuoco Piano (Italian for Quiet Game), and 3\...Nf6 headed to a much more involved opening called the Two Knights Defence. School children in local clubs often drift into weaker variants of the Giuoco Piano, mostly out of insufficient knowledge. A few scholastic trainers have even suggested avoiding the opening, as there are fewer crisp strategic concepts compared to many other openings. {{-}} ### Russian Game (aka Petrov Defence) **1.e4 e5 2.Nf3 Nf6** {{-}} The Petrov Defence may look like a counter-attack, and very early on this was supposed to be the idea. However, it soon became apparent that the symmetrical nature of the opening produced defensive positions. If White takes the pawn, Black should avoid taking it back because of 4. Qe2 Nd6?? 5.Nc6+ which wins the black queen. The main line goes 3. Nxe5 d6 4. Nf3 Nxe4. It is considered quite solid, and is a key defensive opening against the dangerous first move 1. e4. There are a few gambits which White can try to shift the style of the opening. The Cochrane gambit is perhaps the most dangerous. It involves a Knight sacrifice on f7. Currently not considered objectively sound, its use is psychological: White dares the opponent to spend twenty moves defending against an attack, and this pressure may cause the Black player to finally fall victim to a tactical shot. ### Philidor Defence **1.e4 e5 2.Nf3 d6** If Black wants to defend the threatened pawn with a pawn, this is the way to do it (playing 2\...f6? is plain bad, as 3. Nxe5 fxe5 4. Qh5+ is winning for White). It gives Black a solid but somewhat cramped position. The f8 bishop is hemmed in and will be relegated to a defensive role. The Black knight retains the option of going to d7 leaving the c-pawn mobile, but it is not without reason that 2\...Nc6 is much more common than 2\...d6. {{-}} ### Danish Gambit **1.e4 e5 2.d4 exd4 3.c3 dxc3 4.Bc4 cxb2 5.Bxb2** This gambit gives White quick development and control of the center at the cost of two pawns initially. However, current opinion reports that to properly fend off the attacking waves, at least one and sometimes both pawns must be returned. This involves the liberating pawn push \...d5 by Black. Even so, inventive attacking players can still use the resulting open lines to play a complex game. {{-}} ### Sicilian Defence **1.e4 c5** Play can continue **2.Nf3 Nc6 3.d4 cxd4 4.Nxd4** (2\...d6 and 2\...e6 are also common, and usually also met by 3.d4) The Sicilian is the most common and best-scoring response to 1.e4, as it balances the white advantage with flank play. It discourages White from occupying the centre with 2.d4. After 2\...cxd4 White must either take the pawn back with the queen (and move it again after 3.Qxd4 Nc6) or sacrifice the pawn, usually with 3.c3. One problem with the Sicilian is that there is a vast amount of theory written on it, and in a sharp opening like this, you can wind up in trouble if you don\'t know it. {{-}} ### French Defence **1.e4 e6 2.d4 d5** White has three essential continuations: 3.Nc3 \"Winawer Variation\" 3.Nd2 \"Tarrasch Variation\" 3.e5 \"Advance Variation\". A fourth alternative, the \"Exchange Variation\" is 3. exd5, but this actually frees Black\'s game from all of the traditional cramping problems of the French Defence. It is mainly used by White players who forgo all attempts at a theoretical battle, hoping to play on \"general principles\". The French Defence is considered one of the strongest black responses to the White opening move 1.e4. Among world class grandmasters, it currently trails the Sicilian 1. e4 c5 and the symmetrical 1.e4 e5 in popularity. {{-}} ### Pirc Defence **1.e4 d6**, usually followed by **2.d4 Nf6 3.Nc3 g6** {{-}} This opening bears considerable similarities to another one called the King\'s Indian, which begins 1.(e4 d6) d4 Nf6 2. c4 g6 3. Nc3 Bg7. However, subtle but long range strategic differences exist between the two. In the Pirc, White\'s c-file pawn is still at home, and not committed to the c4 square. This means that overall, White has better control of the d4 square. The pawn move c2-c4 has been replaced by a developing piece move N-c3, and this \"faster\" development tends to encourage White towards central or kingside attacks compared with the queenside play classically associated with the King\'s Indian defence. ### Modern Defence **1.e4 g6**, usually followed by **2.d4 Bg7** {{-}} This move order is often used to \"back into\" a Pirc defence, while avoiding specific move order issues. However, an entirely different range of strategy is possible based upon \...c6 and \...d5. ### Alekhine\'s Defence **1.e4 Nf6**, usually followed by **2.e5 Nd5 3.d4 d6** This looks like a rather alarming opening for Black to play. Black lets White chase the knight around the board and use that time to build up the pawn centre. Black\'s plan is to show that White has expanded too quickly, and will find the pawn centre vulnerable. The disadvantage to this opening is that if White succeeds in maintaining it, White will have a serious and suffocating advantage in space. {{-}} ### Scandinavian Defence **1.e4 d5**, usually followed by **2.exd5 Qxd5 3.Nc3 Qa5** Playing d7-d5 is the main idea behind most of the semi-open games for black. Here it is played immediately for the price of an extra move with the queen after 3.Nc3. Long disparaged as the epitome of weak play \"because moving the queen early wastes time\", it was resurrected in the 1990s with a pawn move c7-c6, allowing the queen to retreat from a5 to c7 when necessary. Now it is considered an attempt to reduce White\'s central pressure, and is popular among club players because White suddenly has to demonstrate some sophistication. {{-}} **1.e4 d5 2.exd5 Qxd5 3.Nc3 Qa5 4.d4 Nf6 5.Nf3 Bg4 6.h3** - possible continuation\... This is a general continuation of the Scandinavian Defense. White developing its pieces towards the center by 4.d4 and 5.Nf3 placing the Knight on the natural f3 square. Meantime black develops also in a simple way 4\...Nf6 and 5\...Bg4 creating a pin for the white Knight. There is another pin for c3 Knight - created by the d4 pawn push. Now white has to eliminate the pins - in order to make the Knights free to move. White can do it by 6.h3 move or 6.Be2 - simple relieve for the Bishop pin. After 6.h3 black Bishop can retreat by 6\...Bh5 - maintaining the pin or can capture the white Knight 6\... Bxf3. {{-}} **1.e4 d5 2.exd5 Qxd5 3.Nc3 Qa5 4.d4 Nf6 5.Nf3 Bg4 6.Be2 ?!** - thematic continuation\...not the best one\... Most of the club players - or \"players in the parks\" or casual internet players without any deep opening knowledge are taking this **6.Be2?!** move as a smooth continuation to relieve from the Bishop pin. The normal development of the pieces continues 6\...Nc6 7.0-0 0-0-0 8.Be3 \... {{-}} ## **Queen\'s Pawn Openings** (closed and semi-closed games) ### Queen\'s Gambit **1.d4 d5 2. c4** {{-}} **2\...e6** 3.Nc3 Nf6 4.Bg5 Be7 leads to Queen\'s Gambit Declined 1 variations. A special characteristic among the declined games has the Tarrasch-Defence 3\... c5, mostly followed by 4.Nf3 Nc6 5.cxd5 exd5. {{-}} **2\...c6** (usually followed by 3.Nf3 Nf6 4.Nc3 dxc4) leads to the \"Slav Defence\". {{-}} This is one of the opening \"families\" with interchangeable moves. It is quite possible to play both \...e6 and \...c6 (known as the Semi-Slav), and there are large numbers of interchangeable points called transpositions. **2\...dxc4** is the \"Queen\'s Gambit Accepted\". {{-}} Black has gained a pawn but Black cannot keep it. If White wants it back White can play e2-e3 at some point, threatening the pawn with the bishop and if Black tries to defend it with \...b5 Black will find the queenside severely weakened (and the pawn should fall anyway). Nonetheless, this is playable for Black as well, instead of trying to keep the pawn, it is best to develop quickly and strike back at the White centre. ### King\'s Indian Defence **1.d4 Nf6 2. c4 g6** {{-}} **3.Nc3 Bg7 4. e4 d6** {{-}} Popularised after World War II, the King\'s Indian Defence involves opposite sides strategies in a race between Black\'s mating attack vs. White\'s methodical attempts to unravel Black\'s Queenside. At World Class level, there is some concern that Black\'s concept is very committal, leading Former Champion Garry Kasparov to discontinue his use of the opening shortly before he retired from the game. At any level below that, it is still very popular due to the deep developmental work by Fischer and Kasparov. ### Grünfeld Defence **1.d4 Nf6 2.c4 g6** {{-}} **3.Nc3 d5** {{-}} Looks a bit like a cross between the Queen\'s Gambit and the King\'s Indian Defence, but this opening is played differently from both of them. Black gives White an early opportunity to grab control of the centre with 4.cxd5 Nxd5 5.e4. Black will need to launch a counterattack against that centre, perhaps with \...c5 to stop White from getting the upper hand. If Black succeeds, the White centre may indeed be very vulnerable, if Blacks fails, the centre will be very dominating. ### Nimzo-Indian Defence **1.d4 Nf6 2.c4 e6** {{-}} **3.Nc3 Bb4** {{-}} After 3.Nc3, White threatens to take control over the centre by playing 4.e4. The Nimzo-Indian, named after the hypermodern player Aron Nimzowitch, is one of the two main ways of preventing this (the other way is the direct 3\...d5 which leads to the Queen\'s Gambit Declined). Black puts a bishop where it pins the White knight, and often intends to trade it off, surrendering the bishop pair but inflicting White with doubled pawns if needed to recapture with the b-pawn. White can avoid these doubled pawns by playing the queen to c2, but this costs time. On the other hand, Black has not staked out a big claim of the centre yet, and White can get a real space advantage if Black is careless. ### Queen\'s Indian Defence **1.d4 Nf6 2.c4 e6** {{-}} **3.Nf3 b6** {{-}} Strategically, this opening is similar to the Nimzo-Indian. White has played 3.Nf3 rather than 3.Nc3 so he is not threatening to grab the center with 4.e4 just yet. Playing the Nimzo-like 3\...Bb4+ anyway is possible (and called the Bogo-Indian) and tends to lead to rather quiet play. More usual is 3\...b6 which opens up for the bishop to go to b7 where it will continue the clamp-down on the e4-square, or to a6 where it will put pressure on White\'s pawn on c4. ### Modern Benoni **1.d4 Nf6 2.c4 c5** {{-}} **3.d5 e6** {{-}} ### Benko Gambit **1.d4 Nf6 2.c4 c5** {{-}} **3.d5 b5** {{-}} ## Other openings ### English Opening **1.c4** {{-}} Black\'s most common responses are: **1\...e5**, a reversed Sicilian Defence {{-}} **1\...c5** {{-}} **1\...Nf6** {{-}} **1\...e6** (preparing 2\...d5) {{-}} and **1\...c6** (preparing 2\...d5) {{-}} ### Réti Opening **1.Nf3 d5 2.c4** {{-}} ### Benko Opening {{-}} This opening threatens to fianchetto the bishop on f1 to g2, threatening a rook capture, or h3, threatening a bishop exchange, either of which would also threaten a Black pawn center. However, this opening is rather passive and is relatively easy to parry. ### King\'s Indian Attack **1.Nf3 d5 2.g3** {{-}} ### Barnes Opening This can end almost as quickly as it begins, with an *extremely* fast checkmate by Black (called *fool\'s mate.*) {{-}} The Barnes Opening goes like this: **1.f3 e5**. {{-}} It can be continued as the Fool\'s Mate: **2.g4?? Qh4#**. Fortunately for White, the fool\'s mate is extremely rare, even among novices, because the Barnes Opening is passive and has no advantage over 1.f4, and because it is very easy for even a novice to see that the continuation of the Barnes Opening gives Black an immediate mate opportunity. it:Scacchi/Aperture di base fi:Shakkiaapinen/Avausteorian alkeet
# Chess/Sample chess game \_\_NOTOC\_\_ This is a **sample game of chess**, recorded in standard algebraic chess notation and accompanied by commentary. White has the first move and therefore a significant initiative. White wins 10% more often than Black simply on the power of that initiative. It is important not to squander the opening advantage with a move that does nothing. ## Moves 1-5 ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 1. e4 White chooses an excellent move, common among beginners and experts alike. The move has several advantages: 1. It stakes out territory in the center. A player who controls the center with pawns will probably be able to find good squares for their pieces. 2. It opens a diagonal for the king\'s bishop to move out and attack, which also facilitates kingside castling. 3. It opens a diagonal for the queen to move out and attack. This move follows the two most important principles of an opening move: 1. develop a piece, or facilitate the development of a piece, and 2. control the center. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 1\... e5 This move for Black is good for the same reasons listed above. Note that the two e-file pawns are not threatening to capture each other, because pawns capture diagonally. Instead, they merely block each other until something breaks the logjam. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 2. Nf3 White makes another fine move. White is mobilizing forces by bringing a knight forward into an attacking position. Because the white knight is attacking Black\'s e-pawn, White is maintaining the initiative by forcing Black to react. So now, Black must choose a move that defends the pawn, or else he might lose it. The initiative may appear to offer only a slight edge, but at the hands of a master, it can be deadly. White could have moved out the queen instead, but that would be dangerous. The queen is generally too valuable to trade for any other piece except the enemy queen (however, it can be traded for multiple enemy pieces of equivalent total value, such as two bishops and three pawns; two bishops and a knight; or a rook, a bishop, and a pawn, for instance), so it can\'t do much by itself unless the opponent carelessly leaves pieces unprotected. Thus, your opponent can keep attacking your queen with different pieces. And while you are simply moving your queen around, your opponent will be able to keep developing their pieces. It is better to wait until there are other pieces in the fray which can serve as shock troops for her. White also could have moved out the kingside bishop. That would not be a bad idea, but it isn\'t clear yet whether the bishop wants to be at c4, b5, or possibly even behind the pawns. The knight, on the other hand, usually goes to f3 anyway, because the other squares it could move to are inferior: on h3, it would not attack the center, and on e2, it would be temporarily in the way. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 2\... f6? Black makes a worthless move, entering the infamous Damiano Defense. Black needed to defend his pawn with either 2\...Nc6 (main line) or 2\...d6 (Philidor Defense), or counterattack White\'s pawn with 2\...Nf6 (Petrov\'s Defense). Either of the knight moves would have maintained the balance of the game by contesting the center. If Black felt brave, he could also venture into the murky waters of 2\...f5 (Latvian Gambit) or 2\...d5 (Elephant Gambit). The move 2\...f6 appears to defend the threatened e-pawn, but this is an illusion, as the game shall demonstrate. Black has weakened the kingside, allowing attacks on the f7-square, which is protected by nothing other than the king itself. This weakening is called \"opening the door,\" and White must take advantage of this. Black has failed to follow the principles here and has received no compensation. He has affected the center, but the move 2\...d6 would have done the same and gained some control on the queenside. Also, he has not developed a piece, nor has he facilitated the development of a piece. 2\...Nc6 would have developed and gained control in the center, and 2\...d6 would have gained some control on the c8--h3 diagonal and facilitated the development of the light-squared bishop. Black has also weakened his kingside. Any pawn moves in front of a castled king can be useful weaknesses for the opponent. Since pawns cannot go backwards, you should be very cautious of any pawn moves on the side you wish to castle on (usually the kingside). The moves 2\...f5 and 2\...d5 seem to not adhere to the principles. Why have these moves been brought up? The fact is that the best moves in a position will sometimes break principles, but they will offer compensation for whatever gains are lost by not following the principle. So, in a sense, the principles tell us what questions to ask ourselves when making a move, such as, \"Should I develop now?\" So it is important to understand the principles in order to decide if you are getting enough compensation. It is not always good to blindly do whatever the principles dictate. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 3. Nxe5 White attacks immediately, *sacrificing* the white knight for a pawn, although White would generally need three pawns for the knight to have material equality. Before making this sacrifice, White has to calculate to make sure he is going to gain something that compensates for the lost material. In this case, as the following moves show, White knows that he will gain an attack on the enemy king, forcing Black to either surrender more material or allow checkmate. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 3\... fxe5? Black makes the only move consistent with 2\...f6, but it is not best. The best try for an equal game was 3\...Qe7, *skewering* White\'s knight and pawn and putting pressure on White\'s king. That is to say, the queen would indirectly be attacking everything in the e-file. After the knight moved away, the queen could take on e4 with check, regaining the pawn. White would, however, have a large advantage because of his lead in development and Black\'s weakened kingside pawn structure, e.g. 4.Nf3 Qxe4+ 5.Be2, likely followed by 0-0 and Nc3, attacking the queen. Retaking the knight now merely invites White\'s queen to jump into the fray with check. The fact that Black cannot afford to take the knight shows that 2\...f6 did not really protect the pawn at all. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 4. Qh5+ The game\'s first check! There are three legal ways to respond to check: 1. Capture the piece giving check. Here, this is impossible, as Black has nothing which can move to h5. 2. Interpose a piece between the king and the piece giving check. Black could play 4\...g6, but that would lose a rook to 5.Qxe5+ and 6.Qxh8. 3. Move the king out of check. Moving the king to f7 leaves it in check and is thus illegal, so e7 is the only square to move out of check. Note that White has forked the king on e8 and the pawn on e5. There is no time for Black to protect both, so no matter what Black does to get out of check, White\'s queen can take on e5. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 4\... Ke7 This move leaves Black in a dangerous position because the black king is so exposed. Furthermore, the black rooks, bishops, and queen still have no way to get out. The black position is no more developed than it was at the start of the game. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 5. Qxe5+ Another check. Black now has only one legal move: Black can\'t interpose anything between the king and queen, and he can\'t take the queen, so the black king must be moved out of check. There is only one square next to Black\'s king which White\'s queen is not threatening. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 5\... Kf7 Black moves the king; it\'s the only available move to play. White\'s queen is a dangerous attacker. However, because it is too valuable to trade for anything, it can only take undefended pieces. Everything in Black\'s camp that the white queen could target is defended by something, so the queen has done all it can do by itself. It is time to bring in reinforcements. ## Moves 6-10 ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 6. Bc4+ This is an excellent move to keep the pressure on Black because it develops a piece and gives check while preventing Black from consolidating. If White had played less energetically with 6.Nc3, the advantage would have evaporated instantly. Black could answer with 6\...Nf6, bringing a piece to the defense. If Black gets his king to safety, Black might actually be winning: White has only two pawns for the sacrificed knight, giving him a material disadvantage. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 6\.... d5! Black makes an excellent defensive move. Never forget that moving the king isn\'t the only way to get out of check! Admittedly, Black\'s d-pawn is a dead duck. It is attacked by White\'s bishop, queen, and pawn, three times altogether, while it is defended only once, by Black\'s queen. The sacrifice is worthwhile, though, to open up lines for the queen and bishop so they can help with the defense. Now, if White fails to find the best continuation, Black has some chance to counterattack. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 7. Bxd5+ White gives check yet again, which prevents Black from doing anything constructive. Let\'s review the three ways to get out of check: 1. Capture the piece giving check. Black could play 7\...Qxd5. However, White would simply take the queen with 8.Qxd5+. With such a huge material disadvantage and an exposed king, Black could resign without feeling like a quitter. 2. Interpose a piece. Black could play 7\...Be6. However, that would be inadvisable because the bishop would be defended only once (by Black\'s king) and attacked twice (by White\'s queen and bishop). In fact, White could end the game at once with 8.Qxe6#. 3. Move the king. Alas, the only square which is not under attack by White is g6, even further into the open. It beats the alternatives, though. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 7\... Kg6 Now White must think of a way to continue the attack. White would like to play 8.Qf5+, driving Black\'s king to h6 where it can be cornered and checkmated, but Black\'s c8-bishop is guarding the square f5. If Black hadn\'t interposed with 6\...d5, Black would now be subject to a forced checkmate. As it stands, White has to be more creative to keep the initiative. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 8. h4 Again, White finds a strong continuation. White is threatening to force the Black king to h6 after all with h5+. Also, the pawn protects the g5 square, which is important in some mating combinations. Finally, there is some chance the rook will be able to join the attack down the h-file. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 8\... h5 Black plays a tenacious defense in a precarious situation. White\'s pawn is blocked from further advances, and the king has a new escape square on h7. Black\'s position is still precarious, but there is no immediate way for White to force checkmate. Now let us take a step deeper into chess reasoning. White knows Black is on the run for the moment, but if Black has a chance to regroup, the game is far from over. Three pawns for the sacrificed knight is roughly material equality. If White brings additional forces forward with 9.Nc3 or 9.d4, the obvious developing moves, Black will harass White\'s queen with 9\...Bd6. That would force White to lose time protecting the queen. Black would gain enough time to get the black pieces out and get the black king to safety. White desperately wants a quick kill but can\'t see how to get it. White is annoyed that Black\'s bishop on c8 prevents White from playing 9.Qf5+ and administering the coup de grace. Therefore, White asks the question, \"What if Black\'s bishop were not on c8? If only that annoyance were removed, I could do great things.\" ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 9. Bxb7!! White finds a forceful continuation that puts Black in dire straits. Black\'s best bet now is to ignore White\'s bishop and harass White\'s queen with 9\...Bd6, but then White calmly plays 10.Qa5, maintaining the threat on f5 and forcing Black to lose material. One possible line of play is 9\...Bd6 10.Qa5 Nc6 11.Bxc6 Rb8. The checkmate has been avoided, but now White has a large material advantage of four extra pawns, and he can win slowly and surely with patient developing moves like 12.Nc3. (Note that after 9\...Bd6 10.Qa5, Black cannot play 10\...Bxb7 because of 11.Qf5+, with the same play as in the main variation below.) As it happens, Black does not understand the danger. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 9\... Bxb7? Black grabs the bishop to gain a material advantage (bishop plus knight versus four pawns). This is Black\'s critical error, allowing White\'s attack to break through. From here on, White has a forced mate. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 10. Qf5+ The crushing move can be unleashed at last. Black has only one legal reply. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 10\... Kh6 This is the only move to get out of check: the white queen cannot be taken, and any other moves for the king would leave it under attack. ## Moves 11-14 ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 11. d4+ White continues the attack with a special kind of check, a *discovered check*. White moves a pawn, but it isn\'t the pawn which gives check. It is White\'s bishop, attacking from its home square, which delivers the blow. Note that Black\'s king has no legal moves, and White\'s bishop is safe from capture, so interposition is the only option. But because it *is* an option, this is not yet checkmate. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 11\... g5 At this point, White has an easy win with 12.Bxg5+ Kg7 13.Bxd8. The material advantage of a queen and five pawns for a bishop and a knight is overwhelming. However, weak players have been known to play on in completely hopeless positions rather than resign. In order to forestall a long, boring mop-up operation, White looks for a direct kill. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 12. Qf7! Truly a masterful move! White doesn\'t even call check, but mate is now inevitable. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 12\... Qe7 Nothing can save Black now short of White forgetting the plan, but there is some logic to Black\'s move. Where can White\'s queen go? Any of Black\'s pieces that it could take are protected. If White trades queens, then the attack is over, and Black is winning. Finally, if White\'s queen simply retreats, Black will strike back with check: 13\...Qxe4+! However, White must have foreseen this possibility when playing his last move. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 13. hxg5+ This checks Black\'s king and destroys Black\'s pawn cover. Black can\'t get out of this check by interposition or by moving the king away. All retreat is cut off by White\'s well-placed queen. The only option is to capture the checking piece. ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 13\... Qxg5 ```{=html} <div class="thumb tright"> ``` ```{=html} </div> ``` ##### 14. Rxh5# Checkmate. Black can\'t interpose anything, because the rook is giving check from an adjacent square. Black\'s king can\'t move away, because White\'s queen covers all retreat squares. Black\'s king can\'t capture the rook, because then it would be in check from White\'s queen. Finally, Black\'s queen can\'t capture White\'s rook because it is pinned. If Black\'s queen moved away, White\'s bishop on c1 would be giving check to Black\'s king. Notice that, although material considerations are very important in chess thinking, one doesn\'t win by having the most pieces. One wins by delivering checkmate. White has been behind in material almost the entire game, including in the final position, but comes away with the victory nonetheless. ## Move list in Portable Game Notation Here is the game in Portable Game Notation (PGN) format. Most computer chess programs have an easy way to import games in this format. In the best case you can just copy the following code, start your chess program and paste the code to it: `[Event ""]`\ `[Site ""]`\ `[Date "????.??.??"]`\ `[Round ""]`\ `[White "White"]`\ `[Black "Black"]`\ `[TimeControl "-"]`\ `[Result "1-0"]`\ \ `1.e4 e5 2.Nf3 f6 3.Nxe5 fxe5 4.Qh5+ Ke7 5.Qxe5+ Kf7 6.Bc4+ d5 7.Bxd5+ `\ `Kg6 8.h4 h5 9.Bxb7 Bxb7 10.Qf5+ Kh6 11.d4+ g5 12.Qf7 Qe7 13.hxg5+ Qxg5 `\ `14.Rxh5# 1-0` ms:Catur/Contoh permainan
# Chess/The Endgame The Endgame is the last stage of chess, and arguably the most important. Even if you succeed in the opening and middle stages of the game, not knowing the skills to turn the resulting endgame into a checkmate can cost you many wins, turning many otherwise easily won positions into draws or even losses. For this reason, we recommend devoting a good portion of your study to endgames. If you\'re still beginning your chess studies, the Basic Checkmates section should be enough to cover the simplest scenarios appropriate for your level. More complex situations are covered in the second part of this manual, suitable for those who already have a decent grasp of the easy checkmates. ## Basic Checkmates These include positions that have no pawns. When one side is ahead in material and has pawns, the easiest winning plan is typically to queen one or more pawns and use them to checkmate. The situations where one has a king and queen, king and two rooks, or king and rook versus a lone king occur very often and it is essential to know how checkmate is achieved in such cases. The other cases, with minor pieces (bishops and knights) are more rare and more difficult to perform, but nonetheless are covered here for completeness. - King and Queen vs. King - King and Two Major Pieces vs. King - King and Rook vs. King - Minor Pieces - Pawn Endings ## More Advanced Endgames These are situations that occur less commonly in games, but are still very important. Most intermediate to advanced players are expected to have at least a basic understanding of how these endings work. - Endings with Multiple Major Pieces - Rook and Minor Piece Endings - Rook and Pawn Endings - Endings with 3+ Minor Pieces - Other Endgames ------------------------------------------------------------------------ - Endgame Studies and Puzzles ## External links - Interactive King + Queen vs King Checkmate - Interactive King + Rook vs King Checkmate - View endgames involving the King+Knight+Pawn vs. King+Knight+Pawn - View endgames involving the King+Pawn vs. King+Pawn - View endgames involving the King+Queen+Pawn vs. King+Queen+Pawn - View endgames involving the King+Rook+Pawn vs. King+Rook+Pawn - View endgames involving the King+Bishop+Pawn vs. King+Bishop+Pawn \_\_NOTOC\_\_ it:Scacchi/Finali ro:Şah/Finalul
# Chess/Variants !*De ludo scachorum*, 1493 Just as chess has changed over the centuries that it has been played, there are people who try to add new features or ideas to chess even now. Sometimes this is just a minor rule change to make things interesting, but sometimes there are whole new ideas that are proposed that will modify chess so substantially that it essentially is a whole new game to be played. The following are some chess variants to be considered if you want to experiment with alternative ideas for playing chess: Many other chess variants can be found on Wikipedia. - /Random Opening Chess/ - Arimaa - /Bug House/ and /Crazy House/ - /Crazy House/ (see /Bug House/) - /Chinese Chess/ or Xiangqi - Shogi or Japanese Chess ## Fairy chess It is possible to invent a piece that moves according to any defined set of rules. In fairy chess, pieces are typically divided into three categories: leapers, riders, and hoppers. A **leaper** moves directly from one square to another, regardless of the position of any other pieces on the board. In ordinary chess, the knight is a (2,1) leaper: it moves one square horizontally and two squares vertically, or vice versa. The king is a hybrid (1,0) and (1,1) leaper: it moves to any adjacent square. Fairy chess has pieces called camels and zebras: these are long-range leapers like knights, except that they leap (3,1) and (3,2) respectively. Note that a (3,1) leaper, like a bishop, always stays on squares of the same color, but a (3,2) leaper, like a knight, always moves to a square of the opposite color. A **rider** is a leaper that can make multiple leaps in the same direction on the same move. In ordinary chess, the bishop is a (1,1) rider: it can move to any square diagonally, no matter how far away it is, as long as there is no other piece blocking the diagonal line. Similary, the rook is a (1,0) rider. The queen is a hybrid (1,1) and (1,0) rider. A special fairy chess rider is the nightrider or knightrider. This is a knight that can make consecutive knight-hops in the same direction on the same move. A **hopper** is a piece that moves in a line while hopping over another piece. There are no hoppers in ordinary chess, but the capture rule in checkers is a kind of hop: the capturing piece jumps over the opponent\'s piece, which is then removed from the board. Also, the cannon in Xiangqi is a hopper. In fairy chess, a hopper may or may not be restricted to jumping over pieces of one color or the other; and the piece that is jumped over may either stay on the board or be removed, depending on the rules for that particular hopper. The prototypical fairy chess hopper is the grasshopper. It moves in any direction, like a queen, but it can move only by hopping over another piece, and it lands one square beyond that piece. The piece that is jumped over is not removed from the board; however, a locust is a special type of grasshopper, which captures an enemy piece over which it jumps. T. R. Dawson, one of the most prolific chess composers of all time, defined the concepts of fairy chess in the 1930s, and produced many problems using invented pieces such as the nightrider and grasshopper. Fairy chess has become a popular domain for chess composing and solving, especially because it offers a level of creativity that is sometimes hard to find in the more thoroughly developed areas of traditional chess composition.
# Chess/Tournaments If you want to play chess in serious competition, beyond the casual play, you may want to play in **tournaments**. The strength of the tournament players can vary greatly from tournament to tournament, as well as within the tournament. ## Types of tournament Common tournament forms include - Master tournaments are usually closed events where very strong players are invited to play against each other. As a new player, you will probably not wind up in such tournaments for some time (if at all). However, there are frequently side events to a master tournament, open to other players. - Open tournaments are generally open to any player who has the required memberships, and who want to play. There may be some very strong masters in such tournaments as well, but the list of players usually will include a majority of amateur players. Open tournaments, in particular larger events, may be sectioned, where the lower sections are limited to players with a chess rating below some threshold. How players without ratings are handled may vary from event to event; if in doubt, contact the organizer. - Scholastic events are tournaments set up for children in school age. They tend to feature faster time controls than the adult events. Children in school age are usually more than welcome to enter adult tournaments, although the youngest children, or those with little or no tournament experience may find themselves outclassed in such events. Some tournaments may be arranged over one day with several fast games being played (or a small number of rounds). Some are arranged over the course of a weekend. Larger international tournaments are frequently a week long, with one round a day. Club tournaments may last over several months, with an evening round each week. ### Tournament formats The most common tournament formats are *round robins* and *Swiss systems*. The round-robin is an all-play-all event, usually in small sections. You will during the course of a round-robin meet everyone else in the section. Perhaps even more common is the Swiss system, where you in each round meet a player who has a score similar to your score. So if you have lost your first game, you will most likely meet another player who lost the first game as well for the next round. You are never *eliminated* from a Swiss system event, if there are an odd number of players the worst that can happen is that you receive a \"bye\", which means you get a free point (as if you won a game) instead of a game for that particular round. The bye is generally awarded to a player in the lowest score group, but a player can only receive one of them. In some events the organizer may arrange for an extra game for the player who got a bye. ## Where to find tournaments Most countries have a national chess federation or association, and their websites usually have notes about tournaments. For the United States tournament announcements may be found on the USCF website\'s tournament search engine, but it does not list all events, smaller events are often not listed. Websites of the state affiliates may include more local events). For other countries you can find links to the national chess federations here. ## Requirements for entering a tournament ### Rules You should be sure you know how the pieces move, and how a game ends. In particular, you need to know the rules of *en passant*, *castling*, *pawn promotion* and the *three-time repetition of position* rule. You should know how the chess clock is used. In all tournaments you have to complete your moves within a time limit, which varies from tournament to tournament. Furthermore, you should know how to record the game using algebraic chess notation. Most tournaments with reasonably long time limits require players to keep score of the game. This is not an absolute requirement, players who are unable to keep score for various reasons, be they religious or due to an inability to write, may be exempted. Additionally, players who are in time trouble (with less than five minutes on their clocks) can be temporarily excused from writing moves to conserve time, although they are encouraged to update their scoresheets with the opponent\'s score if/when a time control is reached. In tournament play, the touch-move rule is strictly enforced. If you touch a piece of your own you must move it (if you have a legal move), when you\'ve released the piece after a move it stays. If you touch your opponents piece you must capture it, provided that you have a legal capture. If you merely wish to adjust a piece which is standing askew on the square, you may do so if you warn your opponent (\"I adjust\" is fine, but the French \"J\'adoube\" is also popular) *before* you touch the piece. Remember that tournaments can, and should, be fun, but they are pretty formal events. Distracting or disturbing your opponent is prohibited. In addition, you should refrain from talking in the tournament hall as much as possible. If you have to communicate something to someone, do it as quietly and discreetly as possible. If, after finishing a game, you and your opponent want to go over it, go to a different room to analyse instead of remaining in the playing hall pushing pieces around - it distracts nearby players. *Remember to turn mobile phones off before the game starts!* If a mobile phone rings during the game, a penalty is usually assessed by the arbiter, depending on the tournament. In most USCF tournaments, for a first offence ten minutes is removed from the offending player\'s clock, and for a second offence the game is forfeited as a loss. There is nothing more embarrassing than the *faux pas* of a loud ringtone going off in an otherwise dead silent playing hall and half a dozen people from nearby boards glaring at you. The FIDE laws which most other countries play by are even more strict: mobile phones are *prohibited altogether*, and if a player is found to be in possession of a mobile phone, then that player loses. Organizers may announce a more lenient policy, but unless you are informed otherwise, assume that the strict \"no mobile phones\" rule applies. From 2009, the general rule at serious, professional tournaments about arriving late to the board is a zero tolerance policy. If you are not present at the board when the round starts, you forfeit the game. This has sometimes been enforced in a draconian fashion, one player in the Chinese Championship who was standing near the board waiting for the game to start was forfeited when the round started because she wasn\'t *sitting* at the board 1. A tournament may announce a more lenient rule where a latecomer is forfeited only if a certain time elapses (one hour was the limit before the rule change in 2009), and some federations have announced that one hour will remain the default standard for all tournaments in their country (such as the USCF). However, even if arriving late does not forfeit the game automatically, your clock *will* be started on time, so unless you are willing to waste the time you have for thinking, **don\'t be late for your game**. Full laws can be read here. (Note that the United States have slightly different tournament regulations.) ### Membership In most events, it is required that you are a member of the country\'s chess association. In the United States, this means that you must be a member of the United States Chess Federation and so on. Some events may require further memberships, club championships may require membership in that club for instance. For many events in Europe, membership in any national chess federation associated with FIDE may be sufficient (this allows foreign players to play without purchasing new memberships all the time.) The organizer can nearly always arrange a membership for you, so don\'t feel like you cannot go to a tournament just because you aren\'t a member yet. ### Equipment In most tournaments in the United States, players are expected to provide boards, sets and clocks. Pieces should be of normal Staunton design, with a king about 3-and-a-half inches to 4 inches tall, and the board should have squares of around 2 to 2-and-a-half inches. A cheap roll-up board with normal plastic pieces is quite sufficient. Clocks can be purchased in many places, and the prices can vary. Shop around. Some sets include an extra pair of queens, so that one can handle the situation where a player gets two queens due to pawn promotion. While helpful, this is not essential. In tournaments, multiple queens should be handled by fetching an additional queen, and *not* by placing an overturned rook in place of a queen. The situation is fairly rare in practice however, and when it does happen, you can usually borrow a queen from someone else. In Europe equipment is usually provided, though some events may have a shortage of clocks, and ask players to provide that. Bring a pen to write with so that you can keep score. ## General advice for play - Remember that tournament play is a learning experience. After the game try to go through the game with your opponent so that you can learn from mistakes made. Do this especially when you have lost, because here you must have done something wrong where your opponent did something right, and you should try to avoid losing the same way again. - Inexperienced players sometimes get distracted by the clock, and start playing too fast. If you have two hours available to make 40 moves, but have only used thirty minutes when the 40 moves are up, you have probably played too quickly and consequently not thought the position through well enough. - If you get a winning position, be careful! Your opponent will in all likelihood be looking for ways in which you can go wrong, letting him escape with a draw or turn the tables and win. ## Withdrawing Try to complete the tournament, even if you have started badly. The opposition will tend to get easier, and learning how to bounce back after setbacks is important. If you must withdraw, you must tell the organizer that you are going to do so. Otherwise the player you would have met will be deprived of a game. (That player gets awarded a full-point as if the game were won, but the entry fee was probably paid for an opportunity to play chess, not to sit at a table with nobody to play with!) In some cases, a player dropping out without informing the organizer, may face a fine, and be excluded from that organizer\'s future events until the fine is paid. ## Ratings Tournament players are after a stipulated number of games assigned a rating, which is an *estimate* for the strength of that player. This goes up and down depending on the player\'s performance in rated events. The average rating of a tournament player is around 1400, the strongest grandmasters have ratings in the excess of 2700. As a rule of thumb, a player with a rating 200 points higher than the opponent should expect to score 75% against that opponent, and 90% against someone rated 400 points lower, but upsets are in practice more common than what the rating formulas predict. Understand that an average tournament player of 1400 is, compared to a casual player who only knows the rules, but with no tournament experience or study of the game, a very strong player indeed. A new player who enters a tournament may easily find the first rating to be below 1000, but as experience is gained this may rise! Remember, ratings are only estimates of playing strength based on past events. Ratings do not measure a person\'s ability to improve, they are not rewards in themselves, and they are definitely not measures of self-worth. In tournament play, ratings determine what sections you are eligible to play in, and which opponents you will meet in Swiss system events. ## Glossary of terms - **Arbiter** or **tournament director** is the authority which referees the event, makes pairings, and rulings. - **Board 1, board 2, etc.**. In Swiss system events boards are numbered. The players who currently have the best scores are seated at board no. 1, while those with the weakest scores are seated further down. - **Class prize**. A prize awarded to a player for finishing at the top of his or her rating class. A prize could be awarded for instance for \"first place among those rated below 1600\". - **Entry fee**. The amount a player is charged in order to be allowed to participate. - **Flag**. On analog chess clocks, the flag is a small device attached just left of the \"12\" on the clock face. As the minute hand approaches 12, it lifts the flag up so that it falls once the minute hand passes 12. This **flag fall** makes it possible to determine exactly when the time has expired. For example, if each player has 90 minutes, the clocks are initially set at 4:30, and the time has expired when the flag falls when the clock is at 6:00. (Technically, the flag also falls at 5:00, but this has no consequence.) Digital clocks usually have some indicator marking expiry, and the indicator when this is activated is also called a \"flag fall\". If the time control stipulates that a certain number of moves be made within a time limit, the last required move must be completed, and the clock stopped, before flag fall, otherwise that player has overstepped the time limit. - **Forfeit loss/forfeit win**. If a player fails to arrive at the board an hour after the announced starting time, then that player loses by forfeit, and the opponent receives a forfeit win. The game counts for tournament standings, but not rating. A person who loses by forfeit is typically removed from the tournament, unless an adequate excuse is provided. A player who has received a win by forfeit is ineligible for receiving a full-point bye in future rounds. - **Full-point bye** or **walkover**. If there is an odd number of players for a round, the arbiter will award a full-point bye to one player who does not play that particular round, but instead receives a point as if a game was won. - **Half-point bye**. In some tournaments, a player who is unable to play a particular round may elect to take a half-point bye. The player does not play that round but receives a half-point instead as if a game were drawn. Tournaments frequently regulate such byes, putting a cap on how many can be taken and/or requiring that a player commit to taking them before a certain deadline. - **Increment**. A small amount of time (the increment) which is added to a player\'s clock at every move. This avoids frantic time scrambles by ensuring that there will always be enough time to make a move. Some tournaments stipulate a time limit with an increment, others do not. Games played with an increment require a digital chess clock with this capability. - **J\'adoube**. French for \"I adjust\", and can be said by a player before touching a piece to adjust it rather than move it. - **Sandbagging**. A fraudulent scheme where a player deliberately lowers his rating so that he may play in a lower rated section sometime in the future in order to win cash prizes. Sandbagging is a form of cheating, and people caught may face stiff sanctions. - **Sudden death**. A time limit where one must make all remaining moves in a set amount of time. A time limit of \"40/90, SD/30\" means that each player must complete 40 moves in 90 minutes (that is the non-sudden death control), and then the remaining moves in 30 minutes (plus any time left over from the first time control), this second phase is the sudden death phase. - **Swiss-system**. An tournament format where players face other players with same or similar scores in each round. - **Time control**. The number of moves one must make within the time limit. For example if one must make 35 moves in 90 minutes, the time control is at 35 moves. - **Time delay**. A small amount of time (the delay) which passes before the clock starts deducting time from a player at every move. No time is deducted if a player moves before the delay is up. The idea is similar to that of an increment, but a player cannot build up a reservoir of time. Games played with a delay require a digital chess clock with this capability. In the United States, a five second time delay is standard, and clocks which have the delay capability are preferred over clocks which do not.
# Chess/Famous Games Throughout the history of chess there have been many famous games between the masters that many serious players are familiar. These games stand out because they contain unusual positions, feature brilliant sacrifices, or some other reason that sets them apart from average chess games. By studying and analysing these games, you can not only gain more appreciation for chess, but improve your strategy as well. This section is intended for readers with some knowledge of basic chess strategy. The games are provided with commentary to explain critical moves and point out strategy concepts. #### 19th Century: The Era of Gambits and Sacrifices - Anderssen vs. Kieseritzky, 1851: The Immortal Game - Anderssen vs. Dufresne, 1852: The Evergreen Game - Morphy vs. Duke Karl and Count Isouard, 1858: The Opera Game #### Early 20th Century: Steinitz, Lasker, and Capablanca - Alekhine vs. Nimzowitsch 1930 #### Later 20th Century: From Fischer to Kasparov - Byrne vs. Fischer, 1958: The Game of the Century - Caruana vs. Wojtkiewicz, 2002, Fabiano Caruana (10 years old) is the youngest player to defeat a GM [^1] #### Modern Era: Man and Machine - Deep Blue vs. Garry Kasparov, 1996: Game One - Kasparov vs. the World, 1999 ## References ```{=html} <references /> ``` \_\_NOTOC\_\_ [^1]:
# Chess/Puzzles Chess piece placement puzzles are puzzles where certain pieces have to be placed on the board and satisfy certain conditions. Chess checkmates are problems where White starts and mates in a *clearly* stated number of moves (or less). Chess endgames and middlegames are problems where the number of moves is indefinite, and White (or Black) has to either win or tie, as stated by the question. - Piece placement puzzles - Directmates - Endgame problems - Middlegame problems
# Chess/Computer Chess If you\'re interested in chess and wish to improve, you might want to consider installing a chess program onto your computer to help train you. Some programs are dedicated to certain areas of the game (such as endgame or opening study, or tactical exercises), while others allow you to input your games into a database and have the computer analyse them for errors and suggestions. Most regular tournament players usually have some sort of chess engine installed on their computer. These engines are programmed to find the best possible moves in any position given to them and determine who is ahead by means of algorithms. When plugged into an interface, you can either play directly against the engine or submit vary widely in quality and playing style. Some are commercial, others are freeware and available to download over the internet. Due to advances in technology in the 21st century, some of these engines have become so strong that even the best human players in the world have difficulty beating them, even on an average-speed home computer. A non-Master will probably never be able to beat - or even draw - a strong engine unassisted. In a sense, having a good chess program running over your games is almost like having a Grandmaster on hand to discuss your games with you. Engines are not all the same. Depending on how it\'s programmed, it may favour moves that are attacking and tactical, while others prefer solid, positional moves and don\'t take as many risks. Formerly, commercial engines were the strongest, but now some freeware engines are just as good or even better. Online If you don\'t want to install your own engine, you may play against one on a free online service. Be aware that these do not play at full strength and may not be allocated a lot of thinking time. In summary, they do not play at the highest level they can play at. - lichess.org features the powerful Stockfish engine in levels 1 through 8 (Glicko-2 ranges 1500 to 2361 \-- near Grandmaster), with 50 to 400 ms thinking time. You may set up positions using the Board Editor. You may analyse the games afterwards with Stockfish at nearly full strength, with 2 seconds of thinking time for each move. - GameKnot features a proprietary engine at levels ranging from \~1000 Elo rating to 2200+ (Grandmaster) Elo rating. Allows setting up a position from the Games DB. Does not offer a takeback option. Requires a Java Runtime. - The Shredder Chess website features the engine of the same name on easy, medium and hard levels. The hard level is particularly difficult for players of all skills. - Chess.com allows for users to play against other users, or against bots. Post-game review is also available for users to analyze their games. Interfaces Before you can use an engine, you first have to run it through an interface. There are many that can be used, the most common of which are listed: - \"Fritz\" interface - This is one of the most popular interfaces in use by professionals today. It generally comes prepackaged when you buy one of the commercial engines sold by ChessBase (Fritz, Shredder, Hiarcs, et al.). As such, it\'s considered commercial, although older versions of the interface may be released as freeware. (Be aware though, that there may be compatibility problems in this case.) - Arena = This is the most common freeware interface. It is compatible with Mac, Windows, and Linux. - Chessmaster - This interface comes prepackaged with the King chess engine. There are multiple training tools available as well, such as an openings book, tactics exercises, etc., so you don\'t have to purchase a separate program to do this. However, it may be harder to install independent chess engines to run underneath this interface. Engines Freeware: - Stockfish = Very strong open-source engine, consistently ranked as first or second strongest in the world.
# Chess/Optional homework These optional Worksheet problems will test your / your students\' ability to apply chess concepts. Try them and learn/teach! Each handout is designed to have a 20 minute time limit; feel free to use a timer, or adjust timing depending on the skill of your players. Each handout can be print using the \"Printable version\" button available on the left side of page. First, choose the groups so that no student on the same table has the same group (this allows to prevent cheating): - Group A - Group B - Group C - Group D ```{=html} <!-- --> ``` - /Solutions/
# Cognitive Psychology and Cognitive Neuroscience/Cognitive Psychology and the Brain Imagine the following situation: A young man, let's call him Knut, is sitting at his desk, reading some papers which he needs to complete a psychology assignment. In his right hand he holds a cup of coffee. With his left one he reaches for a bag of sweets without removing the focus of his eyes from the paper. Suddenly he stares up to the ceiling of his room and asks himself: "What is happening here?" Probably everybody has had experiences like the one described above. Even though at first sight there is nothing exciting happening in this everyday situation, a lot of what is going on here is highly interesting particularly for researchers and students in the field of Cognitive Psychology. They are involved in the study of lots of incredibly fascinating processes which we are not aware of in this situation. Roughly speaking, an analysis of Knut\'s situation by Cognitive Psychologists would look like this: Knut has a problem; he really needs to do his assignment. To solve this problem, he has to perform loads of cognition. The light reaching his eyes is transduced into electrical signals traveling through several stations to his visual cortex. Meanwhile, complex nets of neurons filter the information flow and compute contrast, colour, patterns, positions in space, motion of the objects in Knut\'s environment. Stains and lines on the screen become words; words get meaning; the meaning is put into context; analyzed on its relevance for Knut\'s problem and finally maybe stored in some part of his memory. At the same time an appetite for sweets is creeping from Knut\'s hypothalamus, a region in the brain responsible for controlling the needs of an organism. This appetite finally causes Knut to reach out for his sweets. Now, let us take a look into the past to see how Cognitive Psychologists developed its terminology and methods to interpret ourselves on the basis of brain, behaviour and theory. ## History of Cognitive Psychology Early thoughts claimed that knowledge was stored in the brain. ### Renaissance and Beyond Renaissance philosophers of the 17th century generally agreed with Nativists and even tried to show the structure and functions of the brain graphically. But also empiricist philosophers had very important ideas. According to David Hume, the internal representations of knowledge are formed obeying particular rules. These creations and transformations take effort and time. Actually, this is the basis of much current research in Cognitive Psychology. In the 19th Century Wilhelm Wundt and Franciscus Cornelis Donders made the corresponding experiments measuring the reaction time required for a response, of which further interpretation gave rise to Cognitive Psychology 55 years later. ### 20th Century and the Cognitive Revolution During the first half of the 20th Century, a radical turn in the investigation of cognition took place. Behaviourists like Burrhus Frederic Skinner claimed that such mental internal operations - such as attention, memory, and thinking -- are only hypothetical constructs that cannot be observed or proven. Therefore, Behaviorists asserted, mental constructs are not as important and relevant as the study and experimental analysis of behaviour (directly observable data) in response to some stimulus. According to Watson and Skinner, man could be objectively studied only in this way. The popularity of Behavioralist theory in the psychological world led investigation of mental events and processes to be abandoned for about 50 years. In the 1950s scientific interest returned again to attention, memory, images, language processing, thinking and consciousness. The "failure" of Behaviourism heralded a new period in the investigation of cognition, called Cognitive Revolution. This was characterized by a revival of already existing theories and the rise of new ideas such as various communication theories. These theories emerged mainly from the previously created information theory, giving rise to experiments in signal detection and attention in order to form a theoretical and practical understanding of communication. Modern linguists suggested new theories on language and grammar structure, which were correlated with cognitive processes. Chomsky's Generative Grammar and Universal Grammar theory, proposed language hierarchy, and his critique of Skinner's "Verbal Behaviour" are all milestones in the history of Cognitive Science. Theories of memory and models of its organization gave rise to models of other cognitive processes. Computer science, especially artificial intelligence, re-examined basic theories of problem solving and the processing and storage of memory, language processing and acquisition. **For clarification: Further discussion on the \"behaviorist\" history.** Although the above account reflects the most common version of the rise and fall of behaviorism, it is a misrepresentation. In order to better understand the founding of cognitive psychology it must be understood in an accurate historical context. Theoretical disagreements exist in every science. However, these disagreements should be based on an honest interpretation of the opposing view. There is a general tendency to draw a false equivalence between Skinner and Watson. It is true that Watson rejected the role that mental or conscious events played in the behavior of humans. In hindsight this was an error. However, if we examine the historical context of Watson\'s position we can better understand why he went to such extremes. He, like many young psychologists of the time, was growing frustrated with the lack of practical progress in psychological science. The focus on consciousness was yielding inconsistent, unreliable and conflicting data. Excited by the progress coming from Pavlov\'s work with elicited responses and looking to the natural sciences for inspiration, Watson rejected the study of observable mental events and also pushed psychology to study stimulus-response relations as a means to better understand human behavior. This new school of psychology, \"behaviorism\" became very popular. Skinner\'s school of thought, although inspired by Watson, takes a very different approach to the study of unobservable mental events. Skinner proposed that the distinction between \"mind\" and \"body\" brought with it irreconcilable philosophical baggage. He proposed that the events going on \"within the skin\", previously referred to as mental events, be called private events. This would bring the private experiences of thinking, reasoning, feeling and such, back into the scientific fold of psychology. However, Skinner proposed that these were things we are doing rather than events going on at a theorized mental place. For Skinner, the question was not of a mental world existing or not, it was whether or not we need to appeal to the existence of a mental world in order to explain the things going on inside our heads. Such as the natural sciences ask whether we need to assume the existence of a creator in order to account for phenomena in the natural world. For Skinner, it was an error for psychologists to point to these private events (mental) events as causes of behavior. Instead, he suggested that these too had to be explained through the study of how one evolves as a matter of experience. For example, we could say that a student studies because she \"expects\" to do better on an exam if she does. To \"expect\" might sound like an acceptable explanation for the behavior of studying, however, Skinner would ask why she \"expects\". The answer to this question would yield the true explanation of why the student is studying. To \"expect\" is to do something, to behave \"in our head\", and thus must also be explained. The cognitive psychologist Henry Roediger pointed out that many psychologists erroneously subscribe to the version of psychology presented in the first paragraph. He also pointed to the successful rebuttal against Chomsky\'s review of Verbal behavior. The evidence for the utility in Skinner\'s book can be seen in the abundance of actionable data it has generated, therapies unmatched by any modern linguistic account of language. Roediger reminded his readers that in fact, we all measure behavior, some simply choose to make more assumptions about its origins than others. He recalls how, even as a cognitive psychologist, he has been the focus of criticism for not making more assumptions about his data. The law of parsimony tells us that when choosing an explanation for a set of data about observable behavior (the data all psychologists collect), we must be careful not to make assumptions beyond those necessary to explain the data. This is where the main division lies between modern day behavior analysts and cognitive psychologists. It is not in the rejection of our private experiences, it is in how these experiences are studied. Behavior analysts study them in relation to our learning history and the brain correlates of that history. They use this information to design environments that change our private experience by changing our interaction with the world. After all, it is through our interaction with our relative world that our private experiences evolve. It is a far cry from the mechanical stimulus-response psychology of John Watson. Academic honesty requires that we make a good faith effort to understand what we wish to criticize. Henry Roediger pointed out that many psychologists understand a very stereotyped, erroneous version of psychology\'s history. In doing so they miss the many successful real world applications that Skinner\'s analysis has generated. Neuroinformatics, which is based on the natural structure of the human nervous system, tries to build neuronal structures by the idea of artificial neurons. In addition to that, Neuroinformatics is used as a field of evidence for psychological models, for example models for memory. The artificial neuron network "learns" words and behaves like "real" neurons in the brain. If the results of the artificial neuron network are quite similar to the results of real memory experiments, it would support the model. In this way psychological models can be "tested". Furthermore it would help to build artificial neuron networks, which posses similar skills like the human such as face recognition. If more about the ways humans process information was understood, it would be much simpler to build artificial structures, which have the same or similar abilities. The area of cognitive development investigation tried to describe how children develop their cognitive abilities from infancy to adolescence. The theories of knowledge representation were first strongly concerned with sensory inputs. Current scientists claim to have evidence that our internal representation of reality is not a one-to-one reproduction of the physical world. It is rather stored in some abstract or neurochemical code. Tolman, Bartlett, Norman and Rumelhart made some experiments on cognitive mapping. Here, the inner knowledge seemed not only to be related to sensory input, but also to be modified by some kind of knowledge network modeled by past experience. Newer methods, like Electroencephalography (EEG) and functional magnetic resonance imaging (fMRI) have given researchers the possibility to measure brain activity and possibly correlate it to mental states and processes. All these new approaches in the study of human cognition and psychology have defined the field of Cognitive Psychology, a very fascinating field which tries to answer what is quite possibly the most interesting question posed since the dawn of reason. There is still a lot to discover and to answer and to ask again, but first we want to make you more familiar with the concept of Cognitive Psychology. ## What is Cognitive Psychology? The easiest answer to this question is: "Cognitive Psychology is the study of thinking and the processes underlying mental events." Of course this creates the new problem of what a mental event actually is. There are many possible answers for this: Let us look at Knut again to give you some more examples and make the things clearer. He needs to focus on reading his paper. So all his attention is directed at the words and sentences which he perceives through his visual pathways. Other stimuli and information that enter his cognitive apparatus - maybe some street noise or the fly crawling along a window - are not that relevant in this moment and are therefore attended much less. Many higher cognitive abilities are also subject to investigation. Knut's situation could be explained as a classical example of problem solving: He needs to get from his present state -- an unfinished assignment -- to a goal state - a completed assignment - and has certain operators to achieve that goal. Both Knut's short and long term memory are active. He needs his short term memory to integrate what he is reading with the information from earlier passages of the paper. His long term memory helps him remember what he learned in the lectures he took and what he read in other books. And of course Knut's ability to comprehend language enables him to make sense of the letters printed on the paper and to relate the sentences in a proper way. This situation can be considered to reflect mental events like perception, comprehension and memory storage. Some scientists think that our emotions cannot be considered separate from cognition, so that hate, love, fear or joy are also sometimes looked at as part of our individual minds. Cognitive psychologists study questions like: How do we receive information about the outside world? How do we store it and process it? How do we solve problems? How is language represented? Cognitive Psychology is a field of psychology that learns and researches about mental processes, including perception, thinking, memory, and judgment. The mainstay of cognitive psychology is the idea where sensation and perception are both different issues. ## Relations to Neuroscience ### Cognitive Neuropsychology Of course it would be very convenient if we could understand the nature of cognition without the nature of the brain itself. But unfortunately it is very difficult if not impossible to build and prove theories about our thinking in absence of neurobiological constraints. Neuroscience comprises the study of neuroanatomy, neurophysiology, brain functions and related psychological and computer based models. For years, investigations on a neuronal level were completely separated from those on a cognitive or psychological level. The thinking process is so vast and complex that there are too many conceivable solutions to the problem of how cognitive operation could be accomplished. Neurobiological data provide physical evidence for a theoretical approach to the investigation of cognition. Therefore it narrows the research area and makes it much more exact. The correlation between brain pathology and behaviour supports scientists in their research. It has been known for a long time that different types of brain damage, traumas, lesions, and tumours affect behaviour and cause changes in some mental functions. The rise of new technologies allows us to see and investigate brain structures and processes never seen before. This provides us with a lot of information and material to build simulation models which help us to understand processes in our mind. As neuroscience is not always able to explain all the observations made in laboratories, neurobiologists turn towards Cognitive Psychology in order to find models of brain and behaviour on an interdisciplinary level -- Cognitive Neuropsychology. This "inter-science" as a bridge connects and integrates the two most important domains and their methods of research of the human mind. Research at one level provides constraints, correlations and inspirations for research at another level. ### Neuroanatomy Basics The basic building blocks of the brain are a special sort of cells called neurons. There are approximately 100 billion neurons involved in information processing in the brain. When we look at the brain superficially, we can\'t see these neurons, but rather look at two halves called the hemispheres. The hemispheres themselves may differ in size and function, as we will see later in the book, but principally each of them can be subdivided into four parts called the lobes: the temporal, parietal, occipital and frontal lobe. This division of modern neuroscience is supported by the up- and down-bulging structure of the brain\'s surface. The bulges are called gyri (singular gyrus), the creases sulci (singular sulcus). They are also involved in information processing. The different tasks performed by different subdivisions of the brain as attention, memory and language cannot be viewed as separated from each other, nevertheless some parts play a key role in a specific task. For example the parietal lobe has been shown to be responsible for orientation in space and the relation you have to it, the occipital lobe is mainly responsible for visual perception and imagination etc. Summed up, brain anatomy poses some basic constraints to what is possible for us and a better understanding will help us to find better therapies for cognitive deficits as well as guide research for cognitive psychologists. It is one goal of our book to present the complex interactions between the different levels on which the brain that can be described, and their implications for Cognitive Neuropsychology. ### Methods Newer methods, like EEG and fMRI etc. allow researchers to correlate the behaviour of a participant in an experiment with the brain activity which is measured simultaneously. It is possible to record neurophysiological responses to certain stimuli or to find out which brain areas are involved in the execution of certain mental tasks. EEG measures the electric potentials along the skull through electrodes that are attached to a cap. While its spatial resolution is not very precise, the temporal resolution lies within the range of milliseconds. The use of fMRI benefits from the fact the increased brain activity goes along with increased blood flow in the active region. The haemoglobin in the blood has magnetic properties that are registered by the fMRI scanner. The spatial resolution of fMRI is very precise in comparison to EEG. On the other hand, the temporal resolution is in the range of just 1--2 seconds. ## Conclusion Remember the scenario described at the beginning of the chapter. Knut was asking himself "What is happening here?" It should have become clear that this question cannot be simply answered with one or two sentences. We have seen that the field of Cognitive Psychology comprises a lot of processes and phenomena of which every single one is subject to extensive research to understand how cognitive abilities are produced by our brain. In the following chapters of this WikiBook you will see how the different areas of research in Cognitive Psychology are trying to solve the initial question raised by Knut.
# Cognitive Psychology and Cognitive Neuroscience/Problem Solving from an Evolutionary Perspective +:------------------------------+:----:+------------------------------:+ | Previous | O | [Next | | Chapter | niti | Social_Cognitions "wikilink") | | | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ ## Introduction Same place, different day. Knut is sitting at his desk again, staring at a blank paper in front of him, while nervously playing with a pen in his right hand. Just a few hours left to hand in his essay and he has not written a word. All of a sudden he smashes his fist on the table and cries out: \"I need a plan!\" That thing Knut is confronted with is something everyone of us encounters in his daily life. He has got a problem -- and he does not really know how to solve it. But what exactly is a problem? Are there strategies to solve problems? These are just a few of the questions we want to answer in this chapter. We begin our chapter by giving a short description of what psychologists regard as a problem. Afterwards we are going to present different approaches towards problem solving, starting with gestalt psychologists and ending with modern search strategies connected to artificial intelligence. In addition we will also consider how experts do solve problems and finally we will have a closer look at two topics: The neurophysiological background on the one hand and the question what kind of role can be assigned to evolution regarding problem solving on the other. The most basic definition is "A problem is any given situation that differs from a desired goal". This definition is very useful for discussing problem solving in terms of evolutionary adaptation, as it allows to understand every aspect of (human or animal) life as a problem. This includes issues like finding food in harsh winters, remembering where you left your provisions, making decisions about which way to go, learning, repeating and varying all kinds of complex movements, and so on. Though all these problems were of crucial importance during the evolutionary process that created us the way we are, they are by no means solved exclusively by humans. We find a most amazing variety of different solutions for these problems in nature (just consider, e.g., by which means a bat hunts its prey, compared to a spider). For this essay we will mainly focus on those problems that are not solved by animals or evolution, that is, all kinds of abstract problems (e.g. playing chess). Furthermore, we will not consider those situations as problems that have an obvious solution: Imagine Knut decides to take a sip of coffee from the mug next to his right hand. He does not even have to think about how to do this. This is not because the situation itself is trivial (a robot capable of recognising the mug, deciding whether it is full, then grabbing it and moving it to Knut's mouth would be a highly complex machine) but because in the context of all possible situations it is so trivial that it no longer is a problem our consciousness needs to be bothered with. The problems we will discuss in the following all need some conscious effort, though some seem to be solved without us being able to say how exactly we got to the solution. Still we will find that often the strategies we use to solve these problems are applicable to more basic problems, too. Non-trivial, abstract problems can be divided into two groups: ### Well-defined Problems For many abstract problems it is possible to find an algorithmic solution. We call all those problems well-defined that can be properly formalised, which comes along with the following properties: - The problem has a clearly defined given state. This might be the line-up of a chess game, a given formula you have to solve, or the set-up of the towers of Hanoi game (which we will discuss later). ```{=html} <!-- --> ``` - There is a finite set of operators, that is, of rules you may apply to the given state. For the chess game, e.g., these would be the rules that tell you which piece you may move to which position. ```{=html} <!-- --> ``` - Finally, the problem has a clear goal state: The equations is resolved to x, all discs are moved to the right stack, or the other player is in checkmate. Not surprisingly, a problem that fulfils these requirements can be implemented algorithmically (also see convergent thinking). Therefore many well-defined problems can be very effectively solved by computers, like playing chess. ### Ill-defined Problems Though many problems can be properly formalised (sometimes only if we accept an enormous complexity) there are still others where this is not the case. Good examples for this are all kinds of tasks that involve creativity, and, generally speaking, all problems for which it is not possible to clearly define a given state and a goal state: Formalising a problem of the kind "Please paint a beautiful picture" may be impossible. Still this is a problem most people would be able to access in one way or the other, even if the result may be totally different from person to person. And while Knut might judge that picture X is gorgeous, you might completely disagree. Nevertheless ill-defined problems often involve sub-problems that can be totally well-defined. On the other hand, many every-day problems that seem to be completely well-defined involve- when examined in detail- a big deal of creativity and ambiguities. If we think of Knut\'s fairly ill-defined task of writing an essay, he will not be able to complete this task without first understanding the text he has to write about. This step is the first subgoal Knut has to solve. Interestingly, ill-defined problems often involve subproblems that are well-defined. ## Restructuring -- The Gestalt Approach One dominant approach to Problem Solving originated from Gestalt psychologists in the 1920s. Their understanding of problem solving emphasises behaviour in situations requiring relatively novel means of attaining goals and suggests that problem solving involves a process called restructuring. Since this indicates a perceptual approach, two main questions have to be considered: - How is a problem represented in a person\'s mind? - How does solving this problem involve a reorganisation or restructuring of this representation? This is what we are going to do in the following part of this section. ### How is a problem represented in the mind? In current research internal and external representations are distinguished: The first kind is regarded as the knowledge and structure of memory, while the latter type is defined as the knowledge and structure of the environment, such like physical objects or symbols whose information can be picked up and processed by the perceptual system autonomously. On the contrary the information in internal representations has to be retrieved by cognitive processes. Generally speaking, problem representations are models of the situation as experienced by the agent. Representing a problem means to analyse it and split it into separate components: - objects, predicates - state space - operators - selection criteria Therefore the efficiency of Problem Solving depends on the underlying representations in a person's mind, which usually also involves personal aspects. Analysing the problem domain according to different dimensions, i.e., changing from one representation to another, results in arriving at a new understanding of a problem. This is basically what is described as restructuring. The following example illustrates this: : Two boys of different age are playing badminton. The older one is a more skilled player, and therefore it is predictable for the outcome of usual matches who will be the winner. After some time and several defeats the younger boy finally loses interest in playing, and the older boy faces a problem, namely that he has no one to play with anymore. : The usual options, according to M. Wertheimer (1945/82), at this point of the story range from \'offering candy\' and \'playing another game\' to \'not playing to full ability\' and \'shaming the younger boy into playing\'. All those strategies aim at making the younger stay. : And this is what the older boy comes up with: He proposes that they should try to keep the bird in play as long as possible. Thus they change from a game of competition to one of cooperation. They\'d start with easy shots and make them harder as their success increases, counting the number of consecutive hits. The proposal is happily accepted and the game is on again. The key in this story is that the older boy *restructured* the problem and found out that he used an attitude towards the younger which made it difficult to keep him playing. With the new type of game the problem is solved: the older is not bored, the younger not frustrated. Possibly, new representations can make a problem more difficult or much easier to solve. To the latter case insight-- the sudden realisation of a problem's solution -- seems to be related. ### Insight There are two very different ways of approaching a *goal-oriented situation*. In one case an organism readily *reproduces* the response to the given problem from past experience. This is called **reproductive thinking**. The second way requires *something new and different* to achieve the goal, prior learning is of little help here. Such **productive thinking** is (sometimes) argued to involve **insight**. Gestalt psychologists even state that insight problems are a separate category of problems in their own right. Tasks that might involve insight usually have certain features -- they require something new and non-obvious to be done and in most cases they are difficult enough to predict that the initial solution attempt will be unsuccessful. When you solve a problem of this kind you often have a so called **\"AHA-experience\"** -- the solution pops up all of a sudden. At one time you do not have any ideas of the answer to the problem, you do not even feel to make any progress trying out different ideas, but in the next second the problem is solved. For all those readers who would like to experience such an effect, here is an example for an Insight Problem: Knut is given four pieces of a chain; each made up of three links. The task is to link it all up to a closed loop and he has only 15 cents. To open a link costs 2, to close a link costs 3 cents. What should Knut do? thumbnail=chain task.svg\|center\|If you want to know the correct solution, click to enlarge the image. To show that solving insight problems involves *restructuring*, psychologists created a number of problems that were more difficult to solve for participants provided with previous experiences, since it was harder for them to change the representation of the given situation (see Fixation). Sometimes given hints may lead to the insight required to solve the problem. And this is also true for involuntarily given ones. For instance it might help you to solve a memory game if someone accidentally drops a card on the floor and you look at the other side. Although such help is not obviously a hint, the effect does not differ from that of intended help. For *non-insight* problems the opposite is the case. Solving arithmetical problems, for instance, requires schemas, through which one can get to the solution step by step. ### Fixation Sometimes, previous experience or familiarity can even make problem solving more difficult. This is the case whenever habitual directions get in the way of finding new directions -- an effect called **fixation**. #### Functional fixedness Functional fixedness concerns the solution of *object-use problems*. The basic idea is that when the usual way of using an object is emphasised, it will be far more difficult for a person to use that object in a novel manner. An example for this effect is the **candle problem**: Imagine you are given a box of matches, some candles and tacks. On the wall of the room there is a cork-board. Your task is to fix the candle to the cork-board in such a way that no wax will drop on the floor when the candle is lit. -- Got an idea? thumbnail=Candle task.svg\|center\|The candle task : Explanation: The clue is just the following: when people are confronted with a problem and given certain objects to solve it, it is difficult for them to figure out that they could use them in a different (not so familiar or obvious) way. In this example the box has to be recognised as a support rather than as a container. A further example is the **two-string problem**: Knut is left in a room with a chair and a pair of pliers given the task to bind two strings together that are hanging from the ceiling. The problem he faces is that he can never reach both strings at a time because they are just too far away from each other. What can Knut do? ![{width="400"} : Solution: Knut has to recognise he can use the pliers in a novel function -- as weight for a pendulum. He can bind them to one of the :strings, push it away, hold the other string and just wait for the first one moving towards him. If necessary, Knut can even climb on the chair, but he is not that small, we suppose . . . #### Mental fixedness Functional fixedness as involved in the examples above illustrates a **mental set** -- a person's tendency to respond to a given task in a manner based on past experience. Because Knut maps an object to a particular function he has difficulties to *vary the way of use* (pliers as pendulum\'s weight). One approach to studying fixation was to study *wrong-answer verbal insight problems*. It was shown that people tend to give rather an incorrect answer when failing to solve a problem than to give no answer at all. : A typical example: People are told that on a lake the area covered by water lilies doubles every 24 hours and that it takes 60 days to cover the whole lake. Then they are asked how many days it takes to cover half the lake. The typical response is \'30 days\' (whereas 59 days is correct). These wrong solutions are due to an *inaccurate interpretation*, hence *representation*, of the problem. This can happen because of *sloppiness* (a quick shallow reading of the problem and/or weak monitoring of their efforts made to come to a solution). In this case error feedback should help people to reconsider the problem features, note the inadequacy of their first answer, and find the correct solution. If, however, people are truly fixated on their incorrect representation, being told the answer is wrong does not help. In a study made by P.I. Dallop and R.L. Dominowski in 1992 these two possibilities were contrasted. In approximately one third of the cases *error feedback* led to right answers, so only approximately one third of the wrong answers were due to *inadequate monitoring*.[^1] Another approach is the study of examples with and without a preceding analogous task. In cases such like the **water-jug task** analogous thinking indeed leads to a correct solution, but to take a different way might make the case much simpler: : Imagine Knut again, this time he is given three jugs with different capacities and is asked to measure the required amount of water. :Of course he is not allowed to use anything despite the jugs and as much water as he likes. In the first case the sizes are: 127 litres, 21 litres and 3 litres while 100 litres are desired. ```{=html} <!-- --> ``` : In the second case Knut is asked to measure 18 litres from jugs of 39, 15 and three litres size. In fact participants faced with the 100 litre task first choose a complicate way in order to solve the second one. Others on the contrary who did not know about that complex task solved the 18 litre case by just adding three litres to 15. ## Problem Solving as a Search Problem The idea of regarding problem solving as a search problem originated from Alan Newell and Herbert Simon while trying to design computer programs which could solve certain problems. This led them to develop a program called General Problem Solver which was able to solve any well-defined problem by creating heuristics on the basis of the user\'s input. This input consisted of objects and operations that could be done on them. As we already know, every problem is composed of an initial state, intermediate states and a goal state (also: desired or final state), while the initial and goal states characterise the situations before and after solving the problem. The intermediate states describe any possible situation between initial and goal state. The set of operators builds up the transitions between the states. A solution is defined as the sequence of operators which leads from the initial state across intermediate states to the goal state. The simplest method to solve a problem, defined in these terms, is to search for a solution by just trying one possibility after another (also called trial and error). As already mentioned above, an organised search, following a specific strategy, might not be helpful for finding a solution to some ill-defined problem, since it is impossible to formalise such problems in a way that a search algorithm can find a solution. As an example we could just take Knut and his essay: he has to find out about his own opinion and formulate it and he has to make sure he understands the sources texts. But there are no predefined operators he can use, there is no panacea how to get to an opinion and even not how to write it down. ### Means-End Analysis In Means-End Analysis you try to reduce the difference between initial state and goal state by creating subgoals until a subgoal can be reached directly (probably you know several examples of recursion which works on the basis of this). An example for a problem that can be solved by Means-End Analysis are the „Towers of Hanoi": Towers of Hanoi -- A well defined problem The initial state of this problem is described by the different sized discs being stacked in order of size on the first of three pegs (the "start-peg"). The goal state is described by these discs being stacked on the third pegs (the "end-peg") in exactly the same order. ![](Tower_of_Hanoi_4.gif "Tower_of_Hanoi_4.gif") There are three operators: - You are allowed to move one single disc from one peg to another one - You are only able to move a disc if it is on top of one stack - A disc cannot be put onto a smaller one. ![](ToH.PNG "ToH.PNG") In order to use Means-End Analysis we have to create subgoals. One possible way of doing this is described in the picture: 1\. Moving the discs lying on the biggest one onto the second peg. 2\. Shifting the biggest disc to the third peg. 3\. Moving the other ones onto the third peg, too You can apply this strategy again and again in order to reduce the problem to the case where you only have to move a single disc -- which is then something you are allowed to do. Strategies of this kind can easily be formulated for a computer; the respective algorithm for the Towers of Hanoi would look like this: 1\. move n-1 discs from A to B 2\. move disc #n from A to C 3\. move n-1 discs from B to C where n is the total number of discs, A is the first peg, B the second, C the third one. Now the problem is reduced by one with each recursive loop. Means-end analysis is important to solve everyday-problems -- like getting the right train connection: You have to figure out where you catch the first train and where you want to arrive, first of all. Then you have to look for possible changes just in case you do not get a direct connection. Third, you have to figure out what are the best times of departure and arrival, on which platforms you leave and arrive and make it all fit together. ### Analogies Analogies describe similar structures and interconnect them to clarify and explain certain relations. In a recent study, for example, a song that got stuck in your head is compared to an itching of the brain that can only be scratched by repeating the song over and over again. ### Restructuring by Using Analogies One special kind of restructuring, the way already mentioned during the discussion of the Gestalt approach, is analogical problem solving. Here, to find a solution to one problem -- the so called target problem, an analogous solution to another problem -- the source problem, is presented. An example for this kind of strategy is the radiation problem posed by K. Duncker in 1945: As a doctor you have to treat a patient with a malignant, inoperable tumour, buried deep inside the body. There exists a special kind of ray, which is perfectly harmless at a low intensity, but at the sufficient high intensity is able to destroy the tumour -- as well as the healthy tissue on his way to it. What can be done to avoid the latter? When this question was asked to participants in an experiment, most of them couldn\'t come up with the appropriate answer to the problem. Then they were told a story that went something like this: A General wanted to capture his enemy\'s fortress. He gathered a large army to launch a full-scale direct attack, but then learned, that all the roads leading directly towards the fortress were blocked by mines. These roadblocks were designed in such a way, that it was possible for small groups of the fortress-owner\'s men to pass them safely, but every large group of men would initially set them off. Now the General figured out the following plan: He divided his troops into several smaller groups and made each of them march down a different road, timed in such a way, that the entire army would reunite exactly when reaching the fortress and could hit with full strength. Here, the story about the General is the source problem, and the radiation problem is the target problem. The fortress is analogous to the tumour and the big army corresponds to the highly intensive ray. Consequently a small group of soldiers represents a ray at low intensity. The solution to the problem is to split the ray up, as the general did with his army, and send the now harmless rays towards the tumour from different angles in such a way that they all meet when reaching it. No healthy tissue is damaged but the tumour itself gets destroyed by the ray at its full intensity. M. Gick and K. Holyoak presented Duncker\'s radiation problem to a group of participants in 1980 and 1983. Only 10 percent of them were able to solve the problem right away, 30 percent could solve it when they read the story of the general before. After given an additional hint -- to use the story as help -- 75 percent of them solved the problem. With this results, Gick and Holyoak concluded, that analogical problem solving depends on three steps: 1\. **Noticing** that an analogical connection exists between the source and the target problem.\ 2. **Mapping** corresponding parts of the two problems onto each other (fortress → tumour, army → ray, etc.)\ 3. **Applying** the mapping to generate a parallel solution to the target problem (using little groups of soldiers approaching from different directions → sending several weaker rays from different directions) Next, Gick and Holyoak started looking for factors that could be helpful for the noticing and the mapping parts, for example: Discovering the basic linking concept behind the source and the target problem. **\--\>picture coming soon\<\--** #### Schema The concept that links the target problem with the analogy (the "source problem") is called problem schema. Gick and Holyoak obtained the activation of a schema on their participants by giving them two stories and asking them to compare and summarise them. This activation of problem schemata is called "schema induction". The two presented texts were picked out of six stories which describe analogical problems and their solution. One of these stories was \"The General\" (remember example in Chapter 4.1). After solving the task the participants were asked to solve the radiation problem (see chapter 4.2). The experiment showed that in order to solve the target problem reading of two stories with analogical problems is more helpful than reading only one story: After reading two stories 52% of the participants were able to solve the radiation problem (As told in chapter 4.2 only 30% were able to solve it after reading only one story, namely: "The General"). Gick and Holyoak found out that the quality of the schema a participant developed differs. They classified them into three groups: - Good schemata: In good schemata it was recognised that the same concept was used in order to solve the problem (21% of the participants created a good schema and 91% of them were able to solve the radiation problem). - Intermediate schemata: The creator of an intermediate schema has figured out that the root of the matter equals (here: many small forces solved the problem). (20% created one, 40% of them had the right solution). - Poor schemata: The poor schemata were hardly related to the target problem. In many poor schemata the participant only detected that the hero of the story was rewarded for his efforts (59% created one, 30% of them had the right solution). The process of using a schema or analogy, i.e. applying it to a novel situation is called transduction. One can use a common strategy to solve problems of a new kind. To create a good schema and finally get to a solution is a problem-solving skill that requires practise and some background knowledge. ## How do Experts Solve Problems? With the term expert we describe someone who devotes large amounts of his or her time and energy to one specific field of interest in which he, subsequently, reaches a certain level of mastery. It should not be of surprise that experts tend to be better in solving problems in their field than novices (people who are beginners or not as well trained in a field as experts) are. They are faster in coming up with solutions and have a higher success rate of right solutions. But what is the difference between the way experts and non-experts solve problems? Research on the nature of expertise has come up with the following conclusions: : Experts know more about their field, : their knowledge is organised differently, and : they spend more time analysing the problem. When it comes to problems that are situated outside the experts\' field, their performance often does not differ from that of novices. **Knowledge:** An experiment by Chase and Simon (1973a, b) dealt with the question how well experts and novices are able to reproduce positions of chess pieces on chessboards when these are presented to them only briefly. The results showed that experts were far better in reproducing actual game positions, but that their performance was comparable with that of novices when the chess pieces were arranged randomly on the board. Chase and Simon concluded that the superior performance on actual game positions was due to the ability to recognise familiar patterns: A chess expert has up to 50,000 patterns stored in his memory. In comparison, a good player might know about 1,000 patterns by heart and a novice only few to none at all. This very detailed knowledge is of crucial help when an expert is confronted with a new problem in his field. Still, it is not pure size of knowledge that makes an expert more successful. Experts also organise their knowledge quite differently from novices. **Organisation:** In 1982 M. Chi and her co-workers took a set of 24 physics problems and presented them to a group of physics professors as well as to a group of students with only one semester of physics. The task was to group the problems based on their similarities. As it turned out the students tended to group the problems based on their surface structure (similarities of objects used in the problem, e.g. on sketches illustrating the problem), whereas the professors used their deep structure (the general physical principles that underlay the problems) as criteria. By recognising the actual structure of a problem experts are able to connect the given task to the relevant knowledge they already have (e.g. another problem they solved earlier which required the same strategy). **Analysis:** Experts often spend more time analysing a problem before actually trying to solve it. This way of approaching a problem may often result in what appears to be a slow start, but in the long run this strategy is much more effective. A novice, on the other hand, might start working on the problem right away, but often has to realise that he reaches dead ends as he chose a wrong path in the very beginning. ## Creative Cognition We already introduced a lot of ways to solve a problem, mainly strategies that can be used to find the "correct" answer. But there are also problems which do not require a "right answer" to be given -- It is time for creative productiveness! Imagine you are given three objects -- your task is to invent a completely new object that is related to nothing you know. Then try to describe its function and how it could additionally be used. Difficult? Well, you are free to think creatively and will not be at risk to give an incorrect answer. For example think of what can be constructed from a half-sphere, wire and a handle. The result is amazing: a lawn lounger, global earrings, a sled, a water weigher, a portable agitator, \... [^2] ### Divergent Thinking The term divergent thinking describes a way of thinking that does not lead to one goal, but is open-ended. Problems that are solved this way can have a large number of potential \'solutions\' of which none is exactly \'right\' or \'wrong\', though some might be more suitable than others. Solving a problem like this involves indirect and productive thinking and is mostly very helpful when somebody faces an ill-definedproblem, i.e. when either initial state or goal state cannot be stated clearly and operators or either insufficient or not given at all. The process of divergent thinking is often associated with creativity, and it undoubtedly leads to many creative ideas. Nevertheless, researches have shown that there is only modest correlation between performance on divergent thinking tasks and other measures of creativity. Additionally it was found that in processes resulting in original and practical inventions things like searching for solutions, being aware of structures and looking for analogies are heavily involved, too. Thus, divergent thinking alone is not an appropriate tool for making an invention. You also need to analyse the problem in order to make the suggested, i.e. invention, solution appropriate. #### right or wrong The ability of children to imitate the people and the surrounding environment also influential in recognizing the concepts of right and wrong To introduce the concepts of right and wrong must be seen from the age of the child. When children are a year old, their brains are not fully developed so their understanding is still limited. But keep in mind, too, from an early age the average child is able to imitate parents, see their surroundings and do imitation or called modeling. Therefore, the introduction of the concept of right and wrong also depends on how the parents or other adults live with the child. \"If a mother often sits on the couch while raising both legs, children tend to sit with more or less the same style and think this is true. As we get older, modeling is the most natural thing that children can get about right and wrong,\" said this psychologist called Kiki. The method of giving understanding about the concepts of right and wrong is also adjusted to the age of the child. If children are still toddlers, they can go through activities such as telling stories that are rich in social values. Slip conclusions at the end of a fairy tale. \"For example, the Kancil tale, after storytelling parents can say, \'So, stealing is not good\', to emphasize the moral message in the fairy tale,\" said the psychologist from the Indonesian Psychological Practice Foundation, Bintaro, South Jakarta. For children who are older, for example in primary school age and still under 12 years of age, understanding can be given by giving an explanation of their eyes. Because the nature of them still tends to be egocentric. However, when entering adolescence, giving an explanation can be through a general perspective, especially cause and effect. \"When giving to tell children about the concepts of right and wrong, parents need to pay attention to whether the child really understands the message that was delivered as a whole or only part of the contents of the message,\" Kiki added. For example, when parents want to teach the concept of stealing is not good through the story of Kancil, parents must make sure the child understands that anyone should not steal, no matter what the circumstances. Do not let the child who understands that is not allowed to steal a mouse deer or that should not be stolen is cucumber. Therefore, ask the child to explain his understanding once more so that the child is sure to understand. Responsible Learning If you have been taught the concept of right and wrong, but the child still violates it, parents must act and the child needs to know the consequences of the wrong actions. \"For example, it was explained that you should not pick rambutan from a neighboring tree, but the child still did it, immediately reprimanded firmly and words that were not ambiguous or ambiguous, but still polite. \"However, the child must be responsible for his attitude,\" Kiki reminded. Of course, continued Kiki, all this depends on the age of the child. In a small age for certain things, it is better for parents to stay with children, but when they are older, children need to know that parents will not risk their mistakes. Children who from childhood have understood between right and wrong will grow into individuals who are independent, responsible and well-mannered. This will also make it easier for them to socialize in their environment, have healthy friendships and make it easier for them to get good jobs because employers and coworkers certainly want to work with people who are polite, honest and responsible. Important to remember The following basic things can be done by parents to instill in children the right behavior - To say thanks - Say a word please if you want to ask for help - apologize if wrong, even to the child if the parents are wrong - Say greetings ### Convergent Thinking Convergent thinking patterns are problem solving techniques that unite different ideas or fields to find a solution. The focus of this mindset is speed, logic and accuracy, also identification of facts, reapplying existing techniques, gathering information. The most important factor of this mindset is: there is only one correct answer. You only think of two answers, namely right or wrong. This type of thinking is associated with certain science or standard procedures. People with this type of thinking have logical thinking, are able to memorize patterns, solve problems and work on scientific tests. Most school subjects sharpen this type of thinking ability. Research shows that the creative process involves both types of thought processes. But experts recommend not joining the two processes in one session. For example, in the next 30 minutes, you invite everyone on your team to brainstorm creating new ideas (which involve divergent thinking patterns). Within 30 minutes, all ideas should only be recorded, not judged, for example by saying that an idea is irrelevant because of a limited budget. After all the ideas are contained, go to the next session, namely analysis and decision making (which involves convergent thinking patterns). Based on research too, doing creative jobs causes mood swings (mood swings), and it turns out that both types of thinking create two different moods. Convergent thinking patterns create negative moods, while divergent thinking patterns create a positive mood. J.A. Research Horne in 1988 revealed that lack of sleep will greatly affect the performance of people with divergent thought patterns, whereas people with convergent mindsets will be more likely to be fine. Including which mindset do you have? Use wisely your talents, and practice both types of thinking to be able to use them in balance at the right times. ## Neurophysiological Background Presenting Neurophysiology in its entirety would be enough to fill several books. Fortunately we do not have to concern ourselves with most of these facts. Instead, let\'s just focus on the aspects that are really relevant to problem solving. Nevertheless this topic is quite complex and problem solving cannot be attributed to one single brain area. Rather there are systems of several brain areas working together to perform a specific task. This is best shown by an example: : In 1994 Paolo Nichelli and coworkers used the method of PET (Positron Emission Tomography), to localise certain brain areas, which are involved in solving various chess problems. In the following table you can see which brain area was active during a specific task: +----------------------------------+----------------------------------+ | Task | Location of Brain activity | +==================================+==================================+ | - Identifying chess pieces | - Pathway from Occipital to | | | Temporal Lobe | | ```{=html} | | | <!-- --> | (also called the | | ``` | \"what\"-pathway of visual | | - determining location of | processing) | | pieces | | | | - Pathway from Occipital to | | ```{=html} | parietal Lobe | | <!-- --> | | | ``` | (also called the | | - Thinking about making a move | \"where\"-pathway of visual | | | processing) | | ```{=html} | | | <!-- --> | - Premotor area | | ``` | | | - Remembering a pieces move | ```{=html} | | | <!-- --> | | ```{=html} | ``` | | <!-- --> | - Hippocampus | | ``` | | | - Planning and executing | (forming new memories) | | strategies | | | | - Prefrontal cortex | +----------------------------------+----------------------------------+ framed\|center\|Lobes of the Brain One of the key tasks, namely **planning and executing strategies**, is performed by a brain area which also plays an important role for several other tasks correlated with problem solving -- the prefrontal cortex (PFC). This can be made clear if you take a look at several examples of damages to the PFC and their effects on the ability to solve problems.\ Patients with a **lesion** in this brain area have difficulty switching from one behaviouristic pattern to another. A well known example is the wisconsin card-sorting task. A patient with a PFC lesion who is told to separate all blue cards from a deck, would continue sorting out the blue ones, even if the experimenter told him to sort out all brown cards. Transferred to a more complex problem, this person would most likely fail, because he is not flexible enough to change his strategy after running into a **dead end**.\ Another example is the one of a young homemaker, who had a tumour in the frontal lobe. Even though she was able to cook individual dishes, preparing a whole family meal was an infeasible task for her. As the examples above illustrate, the structure of our brain seems to be of great importance regarding problem solving, i.e. cognitive life. But how was our cognitive apparatus designed? How did perception-action integration as a central species specific property come about? ## The Evolutionary Perspective Charles Darwin developed the evolutionary theory which was primarily meant to explain why there are so many different kinds of species. This theory is also important for psychology because it explains how species were *designed* by evolutionary forces and what their goals are. By knowing the goals of species it is possible to explain and predict their behaviour. The process of evolution involves several components, for instance *natural selection* -- which is a feedback process that \'chooses\' among \'alternative designs\' on the basis of deciding how good the respective modulation is. As a result of this natural selection we find adaption. This is a process that constantly tests the variations among individuals in relation to the environment. If adaptions are useful they get passed on; if not they'll just be an unimportant variation. Another component of the evolutionary process is sexual selection, i.e. increasing of certain sex characteristics, which give individuals the ability to rival with other individuals of the same sex or an increased ability to attract individuals of the opposite sex. Altruism is a further component of the evolutionary process, which will be explained in more detail in the following chapter Evolutionary Perspective on Social Cognitions. ## Summary and Conclusion After Knut read this WikiChapter he was relieved that he did not waste his time for the essay -- quite the opposite! He now has a new view on problem solving -- and recognises his problem as a well-defined one: His initial state was the clear blank paper without any philosophical sentences on it. The goal state was just in front of his mind\'s eye: Him -- grinning broadly -- handing in the essay with some carefully developed arguments. He decides to use the technique of Means-End Analysis and creates several subgoals: : 1\. Read important passages again : 2\. Summarise parts of the text : 3\. Develop an argumentative structure : 4\. Write the essay : 5\. Look for typos Right after he hands in his essay Knut will go on reading this WikiBook. He now looks forward to turning the page over and to discovering the next chapter\... ## References ```{=html} <references /> ``` ## External links - Mental Models, by Philip N. Johnson-Laird ## Organizational Stuff - send eMail to all - anwinkle - benkuest - lkaestne - nmoeller - tgrage [^1]: R.L. Dominowski and P. Dallob, Insight and Problem Solving. In The Nature of Insight, R.J. Sternberg & J.E. Davidson (Eds). MIT Press: USA, pp.33-62 (1995). [^2]: Goldstein, E.B. (2005). Cogntive Psychology. Connecting Mind, Research, and Everyday Experience. Belmont: Thomson Wadsworth.
# Cognitive Psychology and Cognitive Neuroscience/Evolutionary Perspective on Social Cognitions +:------------------------------+:----:+------------------------------:+ | Previous | O | [Next | | C | verv | Chapter | | onary_Perspective "wikilink") | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ ## Introduction ![{width="101"} Why do we live in cities? Why do we often choose to work together? Why do we enjoy sharing our spare time with others? These are questions of Social Cognition and its evolutionary development. The term Social Cognition describes all abilities necessary to act adequately in a social system. Basically, it is the study of how we process social information, especially its storage, retrieval and application to social situations. Social Cognition is a common skill among various species. In the following, the focus will be on Social Cognition as a human skill. Important concepts and the development during childhood will be explained. Having built up a conceptional basis for the term, we will then take a look at this skill from an evolutionary perspective and present the common theories on the origin of Social Cognition. The publication of Michael Tomasello *et al.* in the journal Behavioral and Brain Sciences (2005) [^1] will serve as a basis for this chapter. ## Social Cognition ### *The human faculty of Social Cognition* thumb\|Playing football as a complex social activity Humans are by far the most talented species in reading the minds of others. That means we are able to successfully predict what other humans perceive, intend, believe, know or desire. Among these abilities, understanding the intention of others is crucial. It allows us to resolve possible ambiguities of physical actions. For example, if you were to see someone breaking a car window, you would probably assume he was trying to steal a stranger\'s car. He would need to be judged differently if he had lost his car keys and it was his own car that he was trying to break into. Humans also collaborate and interact culturally. We perform complex collaborative activities, like building a house together or playing football as a team. Over time this led to powerful concepts of organizational levels like societies and states. The reason for this intense development can be traced back to the concept of *Shared Intentionality*. ### *Shared Intentionality* An intentional action is an organism\'s intelligent behavioural interaction with its environment towards a certain goal state. This is the concept of Problem Solving, which was already described in the previous chapter. The social interaction of agents in an environment which understand each other as acting intentionally causes the emergence of Shared Intentionality. This means that the agents work together towards a shared goal in collaborative interaction. They do that in coordinated action roles and mutual knowledge about themselves. The nature of the activity or its complexity is not important, as long as the action is carried out in the described fashion. It is important to mention that the notion of *shared goals* means that the internal goals of each agent include the intentions of the others. This can easily be misinterpreted. For example, take a group of apes on a hunt. They appear to be acting in a collaborative way, however, it is reasonable to assume that they do not have coordinated action roles or a shared goal -- they could just be acting towards the same individual goal. Summing up, the important characteristics of the behaviour in question are that the agents are mutually responsive, have the goal of achieving something together and coordinate their actions with distributed roles and action plans. The strictly human faculty to participate in collaborative actions that involve shared goals and socially coordinated action plans is also called *Joint Intention*. This requires an understanding of the goals and perceptions of other involved agents, as well as sharing and communicating these, which again seems to be a strictly human behaviour. Due to our special motivation to share psychological states, we also need certain complex cognitive representations. These representations are called *dialogic cognitive representations*, because they have as content mostly social engagement. This is especially important for the concept of joint intentions, since we need not only a representation for our own action plan, but also for our partner\'s plan. Joint Intentions are an essential part of Shared Intentionality. Dialogic cognitive representations are closely related with the communication and use of linguistic symbols. They allow in some sense a form of *collective intentionality*, which is important to construct social norms, conceptualize beliefs and, most importantly, share them. In complex social groups the repeated sharing of intentions in a particular interactive context leads to the creation of habitual social practices and beliefs. That may form normative or structural aspects of a society, like government, money, marriage, etc. Society might hence be seen as a product and an indicator of Social Cognition. The social interaction that builds ground for activities involving Shared Intentionality is proposed to be divided into three groups: - **Dyadic engagement**: The simple sharing of emotions and behaviour, by means of interaction and direct mutual response between agents. Dyadic interaction between human infants and adults are called *protoconversations*. These are turn-taking sequences of touching, face expressions and vocalisations. The exchange of emotions is the most important outcome of this interaction. ```{=html} <!-- --> ``` - **Triadic engagement**: Two agents act together towards a shared goal, while monitoring the perception and goal-direction of the other agent. They focus on the same problem and coordinate their actions respectively, which makes it possible to predict following events. ```{=html} <!-- --> ``` - **Collaborative engagement**: The combination of Joint Intentions and attention. At this point, the agents share a goal and act in complementary roles with a complex action plan and mutual knowledge about the selective attention and the intentions of one another. The latter aspect allows the agents to assist each other and reverse or take over roles. These different levels of social engagement require the understanding of different aspects of intentional action, as introduced above, and presuppose the motivation to share psychological states with each other. ### *Development of Social Cognition during childhood* !Children making social experiences{width="150"} A crucial point for Social Cognition is the comprehension of intentional action. Children\'s understanding of intentional action can basically be divided into three groups, each representing a more complex level of grasp. 1. The first one to be mentioned is the identification of animate action. This means that after a couple of months, babies can differentiate between motion that was caused by some external influence and actions that an organism has performed by itself, as an animate being. At this stage, however, the child has not yet any understanding of potential goals the observed actor might have, so it is still incapable of predicting the behaviour of others. 2. The next stage of comprehension includes the understanding that the organism acts with persistence towards achieving a goal. Children can now distinguish accidental incidents from intentional actions and failed from successful attempts. This ability develops after about 9 months. With this new perspective, the child also learns that the person it observes has a certain perception - thus a certain amount of predicting behaviour is possible. This is an essential difference between the first and the second stage. 3. After around 14 months of age, children fully comprehend intentional action and the basics of rational decision making. They realise, that an actor pursuing a goal may have a variety of action plans to achieve a goal, and is choosing between them. Furthermore, a certain sense for the selective attention of an agent develops. This allows a broad variety of predictions of behaviour in a certain environment. In addition to that, children acquire the skill of cultural learning: when they observe how an individual successfully reaches a goal, they memorise the procedure. Hence, they can use the methods to reach their own goals. This is called imitative learning, which turns out to be an extremely powerful tool. By applying this technique, children also learn how things are conventionally done in their culture. ## Evolutionary perspective on Social Cognition So far we discussed what Social Cognition is about. But how could this behaviour develop during evolution? At first glance, Darwin's theory of the survival of the fittest does not support the development of social behaviour. Caring for others, and not just for oneself, seems to be a decrease of fitness. Nevertheless, various theories have been formulated which try to explain Social Cognition from an evolutionary perspective. We will present three influential theories which have been formulated by Steven Gaulin and Donald McBurney.[^2] ### *Group Selection* thumb\|Moai at Rano Raraku Vero Wynne-Edwards first proposed this theory in the 1960s. From an evolutionary perspective, a group is a number of individuals which affect the fitness of each other. Group Selection means that if any of the individuals of a group is doing benefit to its group, the group is more likely to survive and pass on its predisposition to the next generation. This again improves the chance of the individual to spread its genetic material. So in this theory a social organism is more likely to spread its genes than a selfish organism. The distinction to the classical theory of evolution is that not only the fittest individuals are likely to survive, but also the fittest groups. An example would be the history of the Rapa Nui. The Rapa Nui were the natives of Easter Island which handled their resources extremely wasteful in order to build giant heads made of stone. After a while, every tree on the island was extinct because they needed the trunks to transport the stones. The following lack of food led to the breakdown of their civilization. A society which handles their resources more moderate and provident would not have ended up in such a fate. However, if both societies would have lived on one island, the second group would not have been able to survive because they would not have been able to keep the resources. This indicates the problem of the Group Selection: it needs certain circumstances to describe things properly. Additionally, every theory about groups should include the phenomenon of migration. So in this simple form, the theory is not capable of handling selfish behaviour of some agents in altruistic groups: Altruistic groups which include selfish members would turn into pure selfish ones over time, because altruistic agents would work for selfish agents, thereby increasing the cheaters\' fitness while decreasing their own. Thus, Group Selection may not be a sufficient explanation for the development of Social Cognition. ### *Kin Selection* Since altruistic populations are vulnerable to cheaters, there must exist a mechanism that allows altruism to be maintained by natural selection. The Kin Selection approach provides an explanation how altruistic genes can spread without being eliminated by selfish behaviour. The theory was developed by William D. Hamilton and John M. Smith in 1964.[^3] The basic principle of Kin Selection is to benefit somebody who is genetically related, for example by sharing food. For the altruistic individual, this means a reduction of its own fitness by increasing the fitness of its relative. However, the closer the recipient is related to the altruist, the more likely he shares the altruistic genes. The loss of fitness can be compensated since the genes of the altruistically behaving agent have then the chance to be spread indirectly through the recipient: The relative might be able to reproduce and pass the altruistic genes over to the next generation. In principle, the disadvantage for the giver should always be less than the increased fitness of the addressee. This relation between costs and benefit is expressed by Hamilton\'s rule taking additionally the relatedness of altruist and recipient into account: ```{=html} <center> ``` $r \cdot b > c$ ```{=html} </center> ``` !Ant colonies provide evidence for Kin Selection where : **r** shows the genetic relatedness between altruist and recipient (coefficient between zero and one), ```{=html} <!-- --> ``` : **b** is the reproductive benefit or increased fitness for the recipient and ```{=html} <!-- --> ``` : **c** are the altruist\'s reproductive costs or the reduction of his fitness in the performed action. If the product of relatedness and benefit outweighs the costs for the giver, the altruistic action should be performed. The closer the recipient is genetically related, the higher costs are acceptable. Examples for kin-selected altruism can be found in populations of social insects like ants, termites or bees. An ant colony, for instance, consists of one fertile queen and several hundreds or more of sterile female workers. While the queen is the only one reproducing, the workers are among other things responsible for brood care. The workers are genetically closer related to the sisters they raise (75%) than they would be to their own offspring (50%). Therefore, they are passing on more of their genes than if they bred on their own. According to Hamilton\'s rule, altruism is only favoured if directed towards relatives, that is $r > 0$. Therefore, Kin Selection theory accounts only for genetic relatives. Altruism however occurs among not related individuals as well. This issue is addressed by the theory of Reciprocal Altruism. ### *Reciprocal Altruism* The theory of Reciprocal Altruism describes beneficial behaviour in expectation of future reciprocity. This form of altruism is not a selfless concern for the welfare of others but it denotes mutual cooperation of repeatedly interacting species in order to maximise their individual utility. In social life an individual can benefit from mutual cooperation, but each one can also do even better by exploiting the cooperative efforts of others. Game Theory allows a formalisation of the strategic possibilities in such situations. It can be shown, that altruistic behaviour can be more successful (in terms of utility) than purely self-interested strategies and therefore will lead to better fitness and survivability. In many cases social interactions can be modelled by the Prisoner\'s Dilemma, which provides the basis of our analysis. The classical prisoner\'s dilemma is as follows: Knut and his friend are arrested by the police. The police has insufficient evidence for a conviction, and, having separated both prisoners, visits each of them to offer the same deal: if one testifies for the prosecution against the other and the other remains silent, the betrayer goes free and the silent accomplice receives the full ten-year sentence. If both stay silent, the police can sentence both prisoners to only six months in jail for a minor charge. If each betrays the other, each will receive a two-year sentence. Prisoner 1 / Prisoner 2 Cooperate Defect ------------------------- ----------------- ----------------- Cooperate 6 months each 10 years / free Defect free / 10 years 2 years each : Possible outcomes of the Prisoner\'s Dilemma: Each prisoner has two strategies to choose from, to remain silent (cooperate) or to testify (defect). Assume Knut wants to minimize his individual durance. If Knut\'s friend cooperates, it is better to defect and go free than to cooperate and spend six months in jail. If Knut\'s friend defects, then Knut should defect too, because two years in jail are better than ten. The same holds for the other prisoner. So defection is the dominant strategy in the prisoner\'s dilemma, even though both would do better, if they cooperated. In a one-shot game a rational player would always defect, but what happens if the game is played repeatedly? One of the most effective strategies in the iterated prisoner\'s dilemma is the mixed strategy called Tit for Tat: Always cooperate in the first game, then do whatever your opponent did in the previous game. Playing Tit for Tat means to maintain cooperation as long as the opponent does. If the opponent defects he gets punished in succeeding games by defecting likewise until cooperation is restored. With this strategy rational players can sustain the cooperative outcome at least for indefinitely long games (like life).[^4] Clearly Tit for Tat is only expected to evolve in the presence of a mechanism to identify and punish cheaters. Assuming species are not able to choose between different strategies, but rather that their strategical behaviour is hard-wired, we can finally come back to the evolutionary perspective. In The Evolution of Cooperation Robert Axelrod formalised Darwin\'s emphasis on individual advantage in terms of game theory.[^5] Based on the concept of an evolutionary stable strategy in the context of the prisoner\'s dilemma game he showed how cooperation can get started in an asocial world and can resist invasion once fully established. ## Conclusion Summing up, Social Cognition is a very complex skill and can be seen as the fundament of our current society. On account of the concept of Shared Intentionality, humans show by far the most sophisticated form of social cooperation. Although it may not seem obvious, Social Cognition can actually be compatible with the theory of evolution and various reasonable approaches can be formulated. These theories are all based on a rather selfish drive to pass on our genetic material - so it may be questionable, if deep-rooted altruism and completely selfless behaviour truly exists. ## References ```{=html} <references/> ``` [^1]: Tomasello, M. et al (2005). Understanding and sharing intentions: The origins of cultural cognition. *Behavioral and Brain Sciences*, 28(5), 675--735. [^2]: Gaulin, S. J. C, & McBurney, D. H. (2003). *Evolutionary Psychology*. New Jersey: Prentice-Hall. [^3]: Hamilton, W. D. (1964). The genetical evolution of social behaviour I and II. *Journal of Theoretical Biology*, 7, 17-52. [^4]: Aumann, R. J. (1959). Acceptable Points in General Cooperative n-Person Games. *Contributions to the Theory of Games IV, Annals of Mathematics Study*, 40, 287-324. [^5]: Axelrod, R. (1984). *The Evolution of Cooperation*. New York: Basic Books.
# Cognitive Psychology and Cognitive Neuroscience/Behavioural and Neuroscience Methods +:------------------------------+:----:+------------------------------:+ | Previous | [O | [Next | | Chapter | niti | ation_and_Emotion "wikilink") | | | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ ## Introduction !Ct-Scan !human brain lobes Behavioural and Neuroscientific methods are used to gain insight into how the brain influences the way individuals think, feel, and act. There are an array of methods, which can be used to analyze the brain and its relationship to behavior. Well-known techniques include EEG (electroencephalography) which records the brain's electrical activity and fMRI (functional magnetic resonance imaging) which produces detailed images of brain structure and/or activity. Other methods, such as the lesion method, are lesser known, but still influential in today\'s neuroscience research. Methods can be organized into the following categories: anatomical, physiological, and functional. Other techniques include modulating brain activity, analyzing behavior or computational modeling. ## Lesion method In the lesion method, patients with brain damage are examined to determine which brain structures are damaged and how this influences the patient\'s behavior. Researchers attempt to correlate a specific brain area to an observed behavior by using reported experiences and research observations. Researchers may conclude that the loss of functionality in a brain region causes behavioral changes or deficits in task performance. For example, a patient with a lesion in the parietal-temporal-occipital association area will exhibit agraphia, a condition in which he/she is not able to write, despite having no deficits in motor ability. If damage to a particular brain region (structure X) is shown to correlate with a specific change in behavior (behavior Y), researchers may deduce that structure X has a relation to behavior Y. In humans, lesions are most often caused by tumors or strokes. Through current brain imaging technologies, it is possible to determine which area was damaged during a stroke. Loss of function in the stroke victim may then be correlated with that damaged brain area. While lesion studies in humans have provided key insights into brain organization and function, lesions studies in animals offer many advantages. First, animals used in research are reared in controlled environmental conditions that limit variability between subjects. Secondly, researchers are able to measure task performance in the same animal, before and after a lesion. This allows for within-subject comparison. And third the control groups can be watched who either did not undergo surgery or who did have surgery in another brain area. These benefits also increase the accuracy of the hypothesis being tested which is more difficult in human research because the before-after comparison and control experiments drop out. !Visualization of iron rod passing through brain of Phineas Gage.gif "Visualization of iron rod passing through brain of Phineas Gage"){width="220"} To strengthen conclusions regarding a brain area and task performance, researchers may perform double dissociation. The goal of this method is to prove that two dissociations are independent. Through comparison of two patients with differing brain damage and contradictory disease patterns, researchers may localize different behaviors to each brain area. Broca\'s area is a region of the brain is responsible for language processing, comprehension and speech production. Patients with a lesion in Broca\'s area will exhibit Broca\'s aphasia or non-fluent aphasia. These patients are unable to speak fluently; a sentence produced by a patient with damage to the Broca\'s area may sound like: \"I \... er \... wanted \... ah \... well \... I \... wanted to \... er \... go surfing \... and ..er \... well\...\". On the other hand, Wernicke\'s area is responsible for speech comprehension. A patient with a lesion in this area has Wernicke\'s aphasia. They may be able to produce language, but lack the ability to produce meaningful sentences. Patients may produce \'word salad\': \" I then did this chingo for some hours after my dazi went through meek and been sharko\". Patients with Wernicke\'s aphasia are often unaware of speech deficits and may believe that they are speaking properly. Certainly one of the famous \"lesion\" cases was that of Phineas Gage. On 13 September 1848 Gage, a railroad construction foreman, was using an iron rod to tamp an explosive charge into a body of rock when premature explosion of the charge blew the rod through his left jaw and out the top of his head. Miraculously, Gage survived, but reportedly underwent a dramatic personality change as a result of destruction of one or both of his frontal lobes. The uniqueness of Gage case (and the ethical impossibility of repeating the treatment in other patients) makes it difficult to draw generalizations from it, but it does illustrate the core idea behind the lesion method. Further problems stem from the persistent distortions in published accounts of Gage---see the Wikipedia article Phineas Gage. ## Techniques for Assessing Brain Anatomy / Physiological Function ### CAT !X-ray picture.{width="200"} CAT scanning was invented in 1972 by the British engineer Godfrey N. Hounsfield and the South African (later American) physicist Alan Cromack. CAT (Computed Axial Tomography) is an x-ray procedure which combines many x-ray images with the aid of a computer to generate cross-sectional views, and when needed 3D images of the internal organs and structures of the human body. A large donut-shaped x-ray machine takes x-ray images at many different angles around the body. Those images are processed by a computer to produce cross-sectional picture of the body. In each of these pictures the body is seen as an x-ray 'slice' of the body, which is recorded on a film. This recorded image is called a tomogram. CAT scans are performed to analyze, for example, the head, where traumatic injuries (such as blood clots or skull fractures), tumors, and infections can be identified. In the spine the bony structure of the vertebrae can be accurately defined, as can the anatomy of the spinal cord. CAT scans are also extremely helpful in defining body organ anatomy, including visualizing the liver, gallbladder, pancreas, spleen, aorta, kidneys, uterus, and ovaries. The amount of radiation a person receives during a CAT scan is minimal. In men and non-pregnant women it has not been shown to produce any adverse effects. However, doing a CAT test hides some risks. If the subject or the patient is pregnant it maybe recommended to do another type of exam to reduce the possible risk of exposing her fetus to radiation. Also in cases of asthma or allergies it is recommended to avoid this type of scanning. Since the CAT scan requires a contrast medium, there\'s a slight risk of an allergic reaction to the contrast medium. Having certain medical conditions; Diabetes, asthma, heart disease, kidney problems or thyroid conditions also increases the risk of a reaction to contrast medium. ### MRI Although CAT scanning was a breakthrough, in many cases it was substituted by magnetic resonance imaging (MRI), a method of looking inside the body without using x-rays, harmful dyes or surgery. Instead, radio waves and a strong magnetic field are used in order to provide remarkably clear and detailed pictures of internal organs and tissues. !MRI head side{width="200"} **History and Development of MRI** MRI is based on a physics phenomenon called nuclear magnetic resonance (NMR), which was discovered in the 1930s by Felix Bloch (working at Stanford University) and Edward Purcell (from Harvard University). In this resonance, magnetic field and radio waves cause atoms to give off tiny radio signals. In the year 1970, Raymond Damadian, a medical doctor and research scientist, discovered the basis for using magnetic resonance imaging as a tool for medical diagnosis. Four years later a patent was granted, which was the world\'s first patent issued in the field of MRI. In 1977, Dr. Damadian completed the construction of the first "whole-body" MRI scanner, which he called the "Indomitable". The medical use of magnetic resonance imaging has developed rapidly. The first MRI equipment in healthcare was available at the beginning of the 1980s. In 2002, approximately 22,000 MRI scanners were in use worldwide, and more than 60 million MRI examinations were performed. !A full size MRI-Scanner.{width="250"} **Common Uses of the MRI Procedure** Because of its detailed and clear pictures, MRI is widely used to diagnose sports-related injuries, especially those affecting the knee, elbow, shoulder, hip and wrist. Furthermore, MRI of the heart, aorta and blood vessels is a fast, non-invasive tool for diagnosing artery disease and heart problems. The doctors can even examine the size of the heart-chambers and determine the extent of damage caused by a heart disease or a heart attack. Organs like lungs, liver or spleen can also be examined in high detail with MRI. Because no radiation exposure is involved, MRI is often the preferred diagnostic tool for examination of the male and female reproductive systems, pelvis and hips and the bladder. **Risks** An undetected metal implant may be affected by the strong magnetic field. MRI is generally avoided in the first 12 weeks of pregnancy. Scientists usually use other methods of imaging, such as ultrasound, on pregnant women unless there is a strong medical reason to use MRI. ### PPT MRIII !Reconstruction of nerve fibers{width="220"} There has been some further development of the MRI: The DT-MRI (diffusion tensor magnetic resonance imaging) enables the measurement of the restricted diffusion of water in tissue and gives a 3-dimensional image of it. History: The principle of using a magnetic field to measure diffusion was already described in 1965 by the chemist Edward O. Stejskal and John E. Tanner. After the development of the MRI, Michael Moseley introduced the principle into MR Imaging in 1984 and further fundamental work was done by Dennis LeBihan in 1985. In 1994 the engineer Peter J. Basser published optimized mathematical models of an older diffusion-tensor model.[^1] This model is commonly used today and supported by all new MRI-devices. The DT-MRI technique takes advantage of the fact that the mobility of water molecules in brain tissue is restricted by obstacles like cell membranes. In nerve fibers mobility is only possible alongside the axons. So measuring the diffusion gives rise to the course of the main nerve fibers. All the data of one diffusion-tensor are too much to process in a single image, so there are different techniques for visualization of different aspects of this data: - Cross section images - tractography (reconstruction of main nerve fibers) - tensor glyphs (complete illustration of diffusion-tensor information) The diffusion manner changes by patients with specific diseases of the central nervous system in a characteristic way, so they can be discerned by the diffusion-tensor technique. Diagnosis of apoplectic strokes and medical research of diseases involving changes of the white matter, like Alzheimer\'s disease or Multiple sclerosis are the main applications. Disadvantages of DT-MRI are that it is far more time consuming than ordinary MRI and produces large amounts of data, which first have to be visualized by the different methods to be interpreted. ### fMRI The fMRI (Functional Magnetic Resonance) Imaging is based on the Nuclear magnetic resonance (NMR). The way this method works is the following: All atomic nuclei with an odd number of protons have a nuclear spin. A strong magnetic field is put around the tested object which aligns all spins parallel or antiparallel to it. There is a resonance to an oscillating magnetic field at a specific frequency, which can be computed in dependence on the atom type (the nuclei's usual spin is disturbed, which induces a voltage s (t), afterwards they return to the equilibrium state). At this level different tissues can be identified, but there is no information about their location. Consequently the magnetic field's strength is gradually changed, thereby there is a correspondence between frequency and location and with the help of Fourier analysis we can get one-dimensional location information. Combining several such methods as the Fourier analysis it is possible to get a 3D image. !fMRI picture{width="270"} The central idea for fMRI is to look at the areas with increased blood flow. Hemoglobin disturbs the magnetic imaging, so areas with an increased blood oxygen level dependant (BOLD) can be identified. Higher BOLD signal intensities arise from decreases in the concentration of deoxygenated haemoglobin. An fMRI experiment usually lasts 1-2 hours. The subject will lie in the magnet and a particular form of stimulation will be set up and MRI images of the subject\'s brain are taken. In the first step a high resolution single scan is taken. This is used later as a background for highlighting the brain areas which were activated by the stimulus. In the next step a series of low resolution scans are taken over time, for example, 150 scans, one every 5 seconds. For some of these scans, the stimulus will be presented, and for some of the scans, the stimulus will be absent. The low resolution brain images in the two cases can be compared, to see which parts of the brain were activated by the stimulus. The rest of the analysis is done using a series of tools which correct distortions in the images, remove the effect of the subject moving their head during the experiment, and compare the low resolution images taken when the stimulus was off with those taken when it was on. The final statistical image shows up bright in those parts of the brain which were activated by this experiment. These activated areas are then shown as coloured blobs on top of the original high resolution scan. This image can also be rendered in 3D. fMRI has moderately good spatial resolution and bad temporal resolution since one fMRI frame is about 2 seconds long. However, the temporal response of the blood supply, which is the basis of fMRI, is poor relative to the electrical signals that define neuronal communication. Therefore, some research groups are working around this issue by combining fMRI with data collection techniques such as electroencephalography (EEG) or magneto encephalography (MEG), which has much higher temporal resolution but rather poorer spatial resolution. ### PET Positron emission tomography, also called PET imaging or a PET scan, is a diagnostic examination that involves the acquisition of physiologic images based on the detection of radiation from the emission of positrons. It is currently the most effective way to check for cancer recurrences. Positrons are tiny particles emitted from a radioactive substance administered to the patient. This radiopharmaceutical is injected to the patient and its emissions are measured by a PET scanner. A PET scanner consists of an array of detectors that surround the patient. Using the gamma ray signals given off by the injected radionuclide, PET measures the amount of metabolic activity at a site in the body and a computer reassembles the signals into images. PET\'s ability to measure metabolism is very useful in diagnosing Altsheimer\'s disease, Parkinson\'s disease, epilepsy and other neurological conditions, because it can precisely illustrate areas where brain activity differs from the norm. It is also one of the most accurate methods available to localize areas of the brain causing epileptic seizures and to determine if surgery is a treatment option. PET is often used in conjunction with an MRI or CT scan through \"fusion\" to give a full three-dimensional view of an organ. ## Electromagnetic Recording Methods The methods we have mentioned up to now examine the metabolic activity of the brain. But there are also other cases in which one wants to measure electrical activity of the brain or the magnetic fields produced by the electrical activity. The methods we discussed so far do a great job of identifying where activity is occurring in the brain. A disadvantage of these methods is that they do not measure brain activity on a millisecond-by-millisecond basis. This measuring can be done by electromagnetic recording methods, for example by single-cell recording or the Electroencephalography (EEG). These methods measure the brain activity really fast and over a longer period of time so that they can give a really good temporal resolution. ### Single cell When using the single-cell method an electrode is placed into a cell of the brain on which we want to focus our attention. Now, it is possible for the experimenter to record the electrical output of the cell that is contacted by the exposed electrode tip. That is useful for studying the underlying ion currents which are responsible for the cell's resting potential. The researchers' goal is then to determine for example, if the cell responds to sensory information from only specific details of the world or from many stimuli. So we could determine whether the cell is sensitive to input in only one sensory modality or is multimodal in sensitivity. One can also find out which properties of a stimulus make cells in those regions fire. Furthermore we can find out if the animal's attention towards a certain stimulus influences in the cell's respond. Single cell studies are not very helpful for studying the human brain, since it is too invasive to be a common method. Hence, this method is most often used in animals. There are just a few cases in which the single-cell recording is also applied in humans. People with epilepsy sometimes get removed the epileptic tissue. A week before surgery electrodes are implanted into the brain or get placed on the surface of the brain during the surgery to better isolate the source of seizure activity. So using this method one can decrease the possibility that useful tissues will be removed. Due to the limitations of this method in humans there are other methods which measure electrical activity. Those we are going to discuss next. ### EEG !Placement of electrodes{width="400"} !EEG record during sleep{width="250"} One of the most famous techniques to study brain activity is probably the Electroencephalography (EEG). Most people might know it as a technique which is used clinically to detect aberrant activity such as epilepsy and disorders. Electroencephalogram (Electroencephalography, EEG) is obtained by electro-electron electroencephalography, which collects weak creatures produced by the human brain from the scalp and enlarges notes. Measuring electroencephalogram, and EEG measures, voltage fluctuations generated by the flow of ionic neurons in the brain. EEG is a diagnosis of a brain-related disease, but because it is susceptible to interference, it is usually used in combination with other methods. EEG is most commonly used to diagnose epilepsy because epilepsy can cause abnormal EEG readings. It is also used to diagnose sleep disorders, coma, cerebrovascular disease, etc., and brain death. Brain waves have been used in first-line methods to diagnose tumors, strokes, and other focal brain diseases, but this has been reduced with the advent of high-resolution anatomical imaging techniques, such as nuclear magnetic resonance (MRI). And computed tomography (CT). Unlike CT and MRI, EEGs have a higher temporal resolution. Therefore, although spatial resolution of EEG is limited, it is still a valuable tool for research and diagnostics, especially when determining studies that require time resolution in the millisecond range +----------------------+----------------------+----------------------+ | Name | Frequency (Hz) | About | +======================+======================+======================+ | - Delta(δ) | - 0.1\~3 Hz | - Deep sleep and | | - Theta(θ) | - 4\~7Hz | no dreams | | - Alpha(α) | - 8\~12Hz | - When adults are | | - Beta(β)Low | - 12.5 \~ 16 Hz | under stress, | | Range | - 16.5 \~ 20 Hz | especially | | - Beta(β) Middle | - 20.5 \~ 28 Hz | disappointment | | Range | - 25 \~ 100 | or frustration | | - Beta(β) High | Hz(normally | - Relax, calm, | | Range | 40Hz) | close your eyes, | | - Gamma(γ) | - according to the | but when you are | | - Lambda(λ) | power generated | awake | | - P300 | - according to the | - Relax but | | | power generated | concentrate | | | | - Thinking, | | | | dealing with | | | | receiving | | | | external | | | | messages | | | | (hearing or | | | | thinking) | | | | - Excitement, | | | | anxiety | | | | - Raise awareness, | | | | happiness, | | | | stress | | | | reduction, | | | | meditation | | | | - Induced by 100ms | | | | after the eye is | | | | stimulated by | | | | light (also | | | | known as P100) | | | | - Induced after | | | | seeing or | | | | hearing | | | | something | | | | imagined in the | | | | brain 300ms | | | | later | +----------------------+----------------------+----------------------+ In an experimental way this technique is used to show the brain activity in certain psychological states, such as alertness or drowsiness. To measure the brain activity mental electrodes are placed on the scalp. Each electrode, also known as lead, makes a recording of its own. Next, a reference is needed which provides a baseline, to compare this value with each of the recording electrodes. This electrode must not cover muscles because its contractions are induced by electrical signals. Usually it is placed at the "mastoid bone" which is located behind the ear. During the EEG electrodes are places like this. Over the right hemisphere electrodes are labelled with even numbers. Odd numbers are used for those on the left hemisphere. Those on the midline are labelled with a z. The capital letters stands for the location of the electrode(C=central, F=frontal, Fop= frontal pole, O= occipital, P= parietal and T= temporal). After placing each electrode at the right position, the electrical potential can be measured. This electrical potential has a particular voltage and furthermore a particular frequency. Accordingly, to a person's state the frequency and form of the EEG signal can differ. If a person is awake, beta activity can be recognized, which means that the frequency is relatively fast. Just before someone falls asleep one can observe alpha activity, which has a slower frequency. The slowest frequencies are called delta activity, which occur during sleep. Patients who suffer epilepsy show an increase of the amplitude of firing that can be observed on the EEG record. In addition EEG can also be used to help answering experimental questions. In the case of emotion for example, one can see that there is a greater alpha suppression over the right frontal areas than over the left ones, in the case of depression. One can conclude from this, that depression is accompanied by greater activation of right frontal regions than of left frontal regions. The disadvantage of EEG is that the electric conductivity, and therefore the measured electrical potentials vary widely from person to person and, also during time. This is because all tissues (brain matter, blood, bones etc.) have other conductivities for electrical signals. That is why it is sometimes not clear from which exact brain-region the electrical signal comes from. ### ERP Whereas EEG recordings provide a continuous measure of brain activity, event-related potentials (ERPs) are recordings which are linked to the occurrence of an event. A presentation of a stimulus for example would be such an event. When a stimulus is presented, the electrodes, which are placed on a person's scalp, record changes in the brain generated by the thousands of neurons under the electrodes. By measuring the brain\'s response to an event we can learn how different types of information are processed. Representing the word eats or bake for example causes a positive potential at about 200msec. From this one can conclude, that our brain processes these words 200 ms after presenting it. This positive potential is followed by a negative one at about 400ms. This one is also called N400 (whereas N stands for negative and 400 for the time). So in general one can say that there is a letter P or N to denote whether the deflection of the electrical signal is positive or negative. And a number, which represent, on average, how many hundreds of milliseconds after stimulus presentation the component appears. The event-related- potential shows special interest for researchers, because different components of the response indicate different aspects of cognitive processing. For example, presenting the sentences "The cats won't eat" and "The cat won't bake", the N400 response for the word "eat" is smaller than for the word "bake". From this one can draw the conclusion that our brain needs 400 ms to register information about a word's meaning. Furthermore, one can figure out where this activity occurs in the brain, namely if one looks at the position on the scalp of the electrodes that pick up the largest response. ### MEG Magnetoencephalography (MEG) is related to electroencephalography (EEG). However, instead of recording electrical potentials on the scalp, it uses magnetic potentials near the scalp to index brain activity. To locate a dipole, the magnetic field can be used, because the dipole shows excellently the intensity of the magnetic field. By using devices called SQUIDs (superconducting quantum interference device) one can record these magnetic fields. MEG is mainly used to localize the source of epileptic activity and to locate primary sensory cortices. This is helpful because by locating them they can be avoided during neurological intervention. Furthermore, MEG can be used to understand more about the neurophysiology underlying psychiatric disorders such as schizophrenia. In addition, MEG can also be used to examine a variety of cognitive processes, such as language, object recognition and spatial processing among others, in people who are neurologically intact. MEG has some advantages over EEG. First, magnetic fields are less influenced than electrical currents by conduction through brain tissues, cerebral spinal fluid, the skull and scalp. Second, the strength of the magnetic field can tell us information about how deep within the brain the source is located. However, MEG also has some disadvantages. The magnetic field in the brain is about 100 million times smaller than that of the earth. Due to this, shielded rooms, made out of aluminum, are required. This makes MEG more expensive. Another disadvantage is that MEG cannot detect activity of cells with certain orientations within the brain. For example, magnetic fields created by cells with long axes radial to the surface will be invisible. ## Techniques for Modulating Brain Activity ### TMS **History:** Transcranial magnetic stimulation (TMS) is an important technique for modulating brain activity. The first modern TMS device was developed by Antony Baker in the year 1985 in Sheffield after 8 years of research. The field has developed rapidly since then with many researchers using TMS in order to study a variety of brain functions. Today, researchers also try to develop clinical applications of TMS, because there are long lasting effects on the brain activity it has been considered as a possible alternative to antidepressant medication. **Method:** UMTS utilizes the principle of electromagnetic induction to an isolated brain region. A wire-coil electromagnet is held upon the fixed head of the subject. When inducing small, localized, and reversible changes in the living brain tissue, especially the directly under laying parts of the motor cortex can be effected. By altering the firing-patterns of the neurons, the influenced brain area is disabled. The repetitive TMS (rTMS) describes, as the name reveals, the application of many short electrical stimulations with a high frequency and is more common than TMS. The effects of this procedure last up to weeks and the method is in most cases used in combination with measuring methods, for example: to study the effects in detail. **Application:** The TMS-method gives more evidence about the functionality of certain brain areas than measuring methods on their own. It was a very helpful method in mapping the motor cortex. For example: While rTMS is applied to the prefrontal cortex, the patient is not able to build up short term memory. That determines the prefrontal cortex, to be directly involved in the process of short term memory. By contrast measuring methods on their own, can only investigate a correlation between the processes. Since even earlier researches were aware that TMS could cause suppression of visual perception, speech arrest, and paraesthesias, TMS has been used to map specific brain functions in areas other than motor cortex. Several groups have applied TMS to the study of visual information processing, language production, memory, attention, reaction time and even more subtle brain functions such as mood and emotion. Yet long time effects of TMS on the brain have not been investigated properly, Therefore experiments are not yet made in deeper brain regions like the hypothalamus or the hippocampus on humans. Although the potential utility of TMS as a treatment tool in various neuropsychiatric disorders is rapidly increasing, its use in depression is the most extensively studied clinical applications to date. For instance in the year 1994, George and Wassermann hypothesized that intermittent stimulation of important prefrontal cortical brain regions might also cause downstream changes in neuronal function that would result in an antidepressant response. Here again, the methods effects are not clear enough to use it in clinical treatments today. Although it is too early at this point to tell whether TMS has long lasting therapeutic effects, this tool has clearly opened up new hopes for clinical exploration and treatment of various psychiatric conditions. Further work in understanding normal mental phenomena and how TMS affects these areas appears to be crucial for advancement. A critically important area that will ultimately guide clinical parameters is to combine TMS with functional imaging to directly monitor TMS effects on the brain. Since it appears that TMS at different frequencies has divergent effects on brain activity, TMS with functional brain imaging will be helpful to better delineate not only the behavioral neuropsychology of various psychiatric syndromes, but also some of the pathophysiologic circuits in the brain. ### tDCS **transcranial Direct Current Stimulation:** The principle of tDCS is similar to the technique of TMS. Like TMS this is a non-invasive and painless method of stimulation. The excitability of brain regions is modulated by the application of a weak electrical current. **History and development:** It was first observed that electrical current applied to the skull lead to an alleviation of pain. Scribonius Largus, the court physician to the Roman emperor Claudius, found that the current released by the electric ray has positive effects on headaches. In the Middle Ages the same property of another fish, the electrical catfish, was used to treat epilepsy. Around 1800, the so-called galvanism (it was concerned with effects of today's electrophysiology) came up. Scientists like Giovanni Aldini experimented with electrical effects on the brain. A medical application of his findings was the treatment of melancholy. During the twentieth century among neurologists and psychiatrists electrical stimulation was a controversial but nevertheless wide spread method for the treatment of several kinds of mental disorders (e.g. Electroconvulsive therapy by Ugo Cerletti). **Mechanism:** The tDCS works by fixation of two electrodes on the skull. About 50 percent of the direct current applied to the skull reaches the brain. The current applied by a direct current battery usually is around 1 to 2 mA. The modulation of activity of the brain regions is dependent on the value of current, on the duration of stimulation and on the direction of current flow. While the former two mainly have an effect on the strength of modulation and its permanence beyond the actual stimulation, the latter differentiates the modulation itself. The direction of the current (anodic or cathodic) is defined by the polarity and position of the electrodes. Within tDCS two distinct ways of stimulation exist. With the anodal stimulation the anode is put near the brain region to be stimulated and analogue for the cathodal stimulation the cathode is placed near the target region. The effect of the anodal stimulation is that the positive charge leads to depolarization in the membrane potential of the applied brain regions, whereas hyperpolarisation occurs in the case of cathodal stimulation due to the negative charge applied. The brain activity thereby is modulated. Anodal stimulation leads to a generally higher activity in the stimulated brain region. This result can also be verified with MRI scans, where an increased blood flow in the target region indicates a successful anodal stimulation. **Applications:** From the description of the TMS method it is should be obvious that there are various fields of appliances. They reach from identifying and pulling together brain regions with cognitive functions to the treatment of mental disorders. Compared to TMS it is an advantage of tDCS to not only is able to modulate brain activity by decreasing it but also to have the possibility to increase the activity of a target brain region. Therefore the method could provide an even better suitable treatment of mental disorders such as depression. The tDCS method has also already proven helpful for apoplectic stroke patients by advancing the motor skills. ## Behavioural Methods Besides using methods to measure the brain's physiology and anatomy, it is also important to have techniques for analyzing behaviour in order to get a better insight on cognition. Compared to the neuroscientific methods, which concentrate on neuronal activity of the brain regions, behavioural methods focus on overt behaviour of a test person. This can be realized by well defined behavioural methods (e.g. eye-tracking), test batteries (e.g. IQ-test) or measurements which are designed to answer specific questions concerning the behaviour of humans. Furthermore, behavioural methods are often used in combination with all kinds of neuroscientific methods mentioned above. Whenever there is an overt reaction on a stimulus (e.g. picture) these behavioural methods can be useful. Another goal of a behavioural test is to examine in what terms damage of the central nervous system influences cognitive abilities. ### A Concept of a behavioural test The tests are performed to give an answer to certain questions about human behaviour. In order to find an answer to that question, a test strategy has to be developed. First it has to be carefully considered, how to design the test in the best way, so that the measurement results provide an accurate answer to the initial question. How can the test be conducted so that founding variables are minimal and the focus really is on the problem? When an appropriate test arrangement is found, the defining of test variables is the next part. The test is now conducted and probably repeated until a sufficient amount of data is collected. The next step is the evaluation of the resulting data, with the suitable methods of statistics. If the test reveals a significant result, it might be the case that further questions arise about neuronal activity underlying the behaviour. Then neuroscientific methods are useful to investigate correlating brain activities. Methods, which proved to provide good evidence to a certain recurrent question about cognitive abilities of subjects, can bring together in a test battery. **Example:** Question: Does a noisy surrounding affect the ability to solve a certain problem? Possible test design: Expose half of the subject to a silent environment while solving the same task as the other half in a noisy environment. In this example founding variables might be different cognitive abilities of the participants. Test variables could be the time needed to solve the problem and the loudness of the noise etc. If statistical evaluation shows significance: Probable further questions: How does noise affect the brain activities on a neuronal level? **Are you interested in doing a behavioural test on your own, visit:** the socialpsychology.org website.[^2] ### Test batteries A neuropsychological assessment utilizes test batteries that give an overview on a person's cognitive strengths and weaknesses by analyzing various cognitive abilities. A neuropsychological test battery is used by a neuropsychologist to assess brain dysfunctions that can rise from developmental, neurological or psychiatric issues. Such batteries can appraise various mental functions and the overall intelligence of a person. Firstly, there are test batteries designed to assess whether a person suffers from a brain damage or not. They generally work well in discriminating those with brain damage from neurologically impaired patients, but worse when it comes to discriminating them from those with psychiatric disorders. The most popular test, **Halstead-Reitan battery**, assesses abilities ranging from basic sensory processing to complex reasoning. Furthermore, the Halstead-Reitan battery provides information on the cause of the damage, the brain areas that were harmed, and the stage the damage has reached. Such information is valuable in developing a rehabilitation program. Another test battery, the **Luria-Nebraska battery**, is twice as fast to administer as the Halstead-Reitan. Its subtests are ordered according to twelve content scales (e.g. motor functions, reading, memory etc.). These two test batteries do not focus only on the absolute level of performance, but look at the qualitative manner of performance as well. This allows for a more comprehensive understanding of the cognitive impairment. Another type of test batteries, the so-called IQ tests, aims to measure the overall cognitive performance of an individual. The most commonly used tests for estimating intelligence are the **Wechsler family intelligence tests**. Age-appropriate test versions exist for small children from age 2 years and 6 months, school-aged children, and adults. For example, the Wechsler Intelligence Scale for Children, fifth edition (WISC-V) measures various cognitive abilities in children between 6 and 16 years of age. The test consists of multiple subtests that form five different main indexes of cognitive performance. These main constructs are verbal reasoning skills, inductive reasoning skills, visuo-spatial processing, processing speed and working memory. Performance is analyzed both compared to a normative sample of similarly aged peers and within the test subject, assessing personal strengths and weaknesses. ### The Eye Tracking Procedure Another important procedure for analyzing behavior and cognition is Eye-tracking. This is a procedure of measuring either where we are looking (the point of gaze) or the motion of an eye relative to the head. There are different techniques for measuring the movement of the eyes and the instrument that does the tracking is called the tracker. The first non-intrusive tracker was invented by George Buswell. The eye tracking is a study with a long history, starting back in the 1800s. In 1879 Louis Emile Javal noticed that reading does not involve smooth sweeping of the eye along the text but rather series of short stops which are called fixations. This observation is one of the first attempts to examine the eye's directions of interest. The book of Alfred L. Yarbus which he published in 1967 after an important eye tracking research is one of the most quoted eye tracking publications ever. The eye tracking procedure is not that complicated. Video based eye trackers are frequently used. A camera focuses on one or both eyes and records the movements while the viewer looks at some stimulus. The most modern eye trackers use contrast to locate the center of the pupil and create corneal reflections using infrared or near-infrared non-collimated light. There are also two general types of eye tracking techniques. The first one -- the Bright Pupil is an effect close to the red eye effect and it appears when the illuminator source is onset from the optical path while when the source is offset from the optical path, the pupil appears to be dark (Dark Pupil). The Bright Pupil creates great contrast between the iris and the pupil which allows tracking in light conditions from dark to very bright but it is not effective for outdoor tracking. There are also different eye tracking setup techniques. Some are head mounted, some require the head to be stable, and some automatically track the head during motion. The sampling rate of the most of them is 30 Hz. But when we have rapid eye movement, for example during reading, the tracker must run at 240, 350 or even 1000-1250 Hz in order to capture the details of the movement. Eye movements are divided to fixations and saccades. When the eye movement pauses in a certain position there is a fixation and saccade when it moves to another position. The resulting series of fixations and saccades is called a scan path. Interestingly most information from the eye is received during a fixation and not during a saccade. Fixation lasts about 200 ms during reading a text and about 350 ms during viewing of a scene and a saccade towards new goal takes about 200 ms. Scan paths are used in analyzing cognitive intent, interest and salience. Eye tracking has a wide range of application -- it is used to study a variety of cognitive processes, mostly visual perception and language processing. It is also used in human-computer interactions. It is also helpful for marketing and medical research. In recent years the eye tracking has generated a great deal of interest in the commercial sector. The commercial eye tracking studies present a target stimulus to consumers while a tracker is used to record the movement of the eye. Some of the latest applications are in the field of the automotive design. Eye tracking can analyze a driver's level of attentiveness while driving and prevent drowsiness from causing accidents. ## Modeling Brain-Behaviour Another major method, which is used in cognitive neuroscience, is the use of neural networks (computer modelling techniques) in order to simulate the action of the brain and its processes. These models help researchers to test theories of neuropsychological functioning and to derive principles viewing brain-behaviour relationships. !A basic neural network.{width="500"} In order to simulate **mental functions** in humans, a variety of **computational models** can be used. The basic component of most such models is a "unit", which one can imagine as showing neuron-like behaviour. These units receive input from other units, which are summed to produce a net input. The net input to a unit is then transformed into that unit's output, mostly utilizing a sigmoid function. These units are connected together forming layers. Most models consist of an input layer, an output layer and a "hidden" layer as you can see on the right side. The input layer simulates the taking up of information from the outside world, the output layer simulates the response of the system and the "hidden" layer is responsible for the transformations, which are necessary to perform the computation under investigation. The units of different layers are connected via connection weights, which show the degree of influence that a unit in one level has on the unit in another one. The most interesting and important about these models is that they are able to \"learn\" without being provided specific rules. This ability to "learn" can be compared to the human ability e.g. to learn the native language, because there is nobody who tells one "the rules" in order to be able to learn this one. The computational models learn by extracting the regularity of relationships with repeated exposure. This exposure occurs then via "training" in which input patterns are provided over and over again. The adjustment of "the connection weights between units" as already mentioned above is responsible for learning within the system. Learning occurs because of changes in the interrelationships between units, which occurrence is thought to be similar in the nervous system. ## References ```{=html} <references/> ``` - Ward, Jamie (2006) The Student\'s Guide to Cognitive Neuroscience New York: Psychology Press - Banich,Marie T. (2004). Cognitive Neurosciene and Neuropsychology. Housthon Mifflin Company. - Gazzangia, Michael S.(2000). Cognitive Neuroscience. Blackwell Publishers. - 27.06.07 Sparknotes.com - \(1\) 4 April 2001 / Accepted: 12 July 2002 / Published: 26 June 2003 Springer-Verlag 2003. Fumiko Maeda • Alvaro Pascual-Leone. Transcranial magnetic stimulation: studying motor neurophysiology of psychiatric disorders - \(2\) a report by Drs Risto J Ilmoniemi and Jari Karhu Director, BioMag Laboratory, Helsinki University Central Hospital, and Managing Director, Nexstim Ltd - \(3\) Repetitive Transcranial Magnetic Stimulation as Treatment of Poststroke Depression: A Preliminary Study Ricardo E. Jorge, Robert G. Robinson, Amane Tateno, Kenji Narushima, Laura Acion, David Moser, Stephan Arndt, and Eran Chemerinski - Moates, Danny R. An Introduction to cognitive psychology. B:HRH 4229-724 0 [^1]: Filler, AG: The history, development, and impact of computed imaging in neurological diagnosis and neurosurgery: CT, MRI, DTI: Nature Precedings DOI: 10.1038/npre.2009.3267.4. [^2]: Socialpsychology.org
# Cognitive Psychology and Cognitive Neuroscience/Motivation and Emotion +:------------------------------+:----:+------------------------------:+ | Previous | [O | [Next | | Chapter | | roscience_Methods "wikilink") | niti | | | | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ ## Introduction Happiness, sadness, anger, surprise, disgust and fear. All these words describe some kind of abstract inner states in humans, in some cases difficult to control. We usually call them feelings or emotions. But what is the reason that we are able to \"feel\"? Where do emotions come from and how are they caused? And are emotions and feelings the same thing? Or are we supposed to differentiate? These are all questions that cognitive psychology deals with in emotion research. Emotion research in the cognitive science is not much older than twenty years. The reason for this lies perhaps in the fact that much of the cognitive psychology tradition was based on computer-inspired information-processing models of cognition. This chapter gives an overview about the topic for a better understanding of motivation and emotions. It provides information about theories concerning the cause of motivation and emotions in the human brain, their processes, their role in the human body and the connection between the two topics. We will try to show the actual state of research, some examples of psychologist experiments, and different points of view in the issue of emotions. In the end we will briefly outline some disorders to emphasize the importance of emotions for the social interaction. ## Motivation ### About Drives and Motives Motivation is an extended notion, which refers to the starting, controlling and upholding of corporal and mental activities. It is declared by inner processes and variables which are used to explain behavioral changes. Motivations are commonly separated into two types: 1.Drives: describe acts of motivation like thirst or hunger that have primarily biological purposes. 2.Motives: are driven by primarily social and psychological mechanisms. Motivation is an interceding variable, which means that it is a variable that is not directly observable. Therefore, in order to study motivation, one must approach it through variables which are measurable and observable: \- Observable terms of variation (independent variables [^1]) \- Indicators of behavior (dependent variables[^2]) e.g.: rate of learning, level of activity, \... There are two major methodologies used to manipulate drives and motives in experiments: *Stimulation*: Initiating motives by aversive attractions like shocks, loud noise, heat or coldness. On the other side attractions can activate drives which lead to positive affective states, e.g. sexual drives. *Deprivation*: means that you prohibit the access to elementary aspects of biological or psychological health, like nutrition or social contacts. As a result it leads it to motives or drives which are not common for this species under normal conditions. A theory of motivations was conceived by Abraham Maslow in 1970 (Maslow\'s hierarchy of needs). He considered two kinds of motivation: 1\. *Defected motivation*: brings humans to reconsider their psychical and physical balance. 2\. *Adolescence motivation*: gets people to pass old events and states of their personal development. Maslow argues that everyone has a hierarchy of needs(see picture). Regarding to this, our innate needs could be ordered in a hierarchy, starting at the "basic" ones and heading towards higher developed aspects of humanity. The hypothesis is that the human is ruled by lower needs as long as they are not satisfied. If they are satisfied in an adequate manner, the human then deals with higher needs. (compare to chapter attention) !Hierarchy of needs, Maslow (1970)") Nevertheless, all throughout history you can find examples of people who willingly practiced deprivation through isolation, celibacy, or by hunger strike. These people may be the exceptions to this hypothesis, but they may also have some other, more pressing motives or drives which induce them to behave in this way. It seems that individuals are able to resist certain motives via personal cognitive states. The ability of cognitive reasoning and willing is a typical feature of being human and can be the reason for many psychological diseases which indicates that humans are not always capable to handle all rising mental states. Humans are able to manipulate their motives without knowing the real emotional and psychological causes. This introduces the problem that the entity of consciousness, unconsciousness and what ever else could be taken into account is essentially unknown. Neuroscience cannot yet provide a concrete explanation for the neurological substructures of motives, but there has been considerable progress in understanding the neurological procedures of drives. ### The Neurological Regulation of Drives #### The Role of the Hypothalamus The purpose of drives is to correct disturbances of homeostasis which is controlled by the hypothalamus. Deviations from the optimal range of a regulated parameter like temperature are detected by neurons concentrated in the periventricular zone of the hypothalamus. These neurons then produce an integrated response to bring the parameter back to its optimal value. This response generally consists of 1\. *Humoral response* 2\. *Visceromotor response* 3\. *Somatic motor response* When you are dehydrated, freezing, or exhausted, the appropriate humoral and visceromotor responses are activated automatically,[^3] e.g.: body fat reserves are mobilized, urine production is inhibited, you shiver, blood is shunted away from the body surface, ... But it is much faster and more effective to correct these disturbances by eating, drinking water or actively seeking or generating warmth by moving. These are examples of drives generated by the somatic motor system, and they are incited to emerge by the activity of the lateral hypothalamus. For illustration we will make a brief overview on the neural basis of the regulation of feeding behavior, which is divided into the long-term and the short-term regulation of feeding behavior. The long-term regulation of feeding behavior prevents energy shortfalls and concerns the regulation of body fat and feeding. In the 1940s the "dual center" model was popular, which divided the hypothalamus in a "hunger center" (lateral hypothalamus) and a "satiety center" (ventromedial hypothalamus). This theory developed from the facts that bilateral lesions of the lateral hypothalamus causes anorexia, a severely diminished appetite for food (lateral hypothalamic syndrome) and on the other side bilateral lesions of the ventromedial hypothalamus causes overeating and obesity (ventromedial hypothalamic syndrome). Anyway, it has been proved that this "dual model" is overly simplistic. The reason why hypothalamic lesions affect body fat and feeding behavior has in fact much to do with leptin signaling. Adipocytes (fat cells) release the hormone leptin, which regulates body mass by acting directly on neurons of the arcuate nucleus[^4] of the hypothalamus that decreases appetite and increase energy expenditure. A fall in leptin levels stimulates another type of arcuate nucleus neurons[^5] and neurons in the lateral hypothalamus,[^6] which activate the parasympathetic division of the ANS, and stimulate feeding behavior. The short-term regulation of feeding behavior deals with appetite and satiety. Until 1999 scientists believed that hunger was merely the absence of satiety. This changed with the discovery of a peptide called ghrelin, which is highly concentrated in the stomach and is released into the bloodstream when the stomach is empty. In the arcuate nucleus it activates neurons,[^7] that strongly stimulate appetite and food consumption. The meal finally ends by the concerted actions of several satiety signals, like gastric distension and the release of insulin.[^8] But it seems that animals not only eat because they want food to satisfy their hunger. They also eat because they like food in a merely hedonistic sense. Research on humans and animals suggests that "liking" and "wanting" are mediated by separate circuits in the brain. #### The Role of Dopamine in Motivation In the early 1950s, Peter Milner and James Olds conducted an experiment in which a rat had an electrode implanted in its brain, so the brain could be locally stimulated at any time. The rat was seated in a box, which contained a lever for food and water and a lever that would deliver a brief stimulus to the brain when stepped on. At the beginning the rat wandered about the box and stepped on the levers by accident, but before long it was pressing the lever for the brief stimulus repeatedly. This behavior is called electrical self-stimulation. Sometimes the rats would become so involved in pressing the lever that they would forget about food and water, stopping only after collapsing from exhaustion. Electrical self-stimulation apparently provided a reward that reinforced the habit to press the lever. Researches were able to identify the most effective sites for self-stimulation in the different regions of the brain: the mesocorticolimbic dopamine system. Drugs that block dopamine receptors reduced the self-stimulation behavior of the rat. In the same way this drugs greatly reduced the pressing of a lever for receiving of food even if the rat was hungry. These experiments suggested a mechanism by which natural rewards (food, water, sex) reinforce particular behavior. Dopamine plays an important role in addiction of drugs like heroin, nicotine and cocaine. Thus these drugs either stimulate dopamine release (heroin, nicotine) or enhance dopamine actions (cocaine) in the nucleus accumbens. Chronic stimulation of this pathway causes a down-regulated of the dopamine "reward" system. This adaption leads to the phenomenon of drug tolerance. Indeed, drug discontinuation in addicted animals is accompanied by a marked decrease in dopamine release and function in the nucleus accumbens, leading to the symptom of craving for the discontinued drug. The exact role of dopamine in motivating behavior continues to be debated. However, much evidence suggests that animals are motivated to perform behaviors that stimulate dopamine release in the nucleus accumbens and related structures ## Emotions ### Basics In contrast to previous research, modern brain based neuroscience has taken a more serviceable approach to the field of Emotions, because emotions definitely are brain related processes which deserve scientific study, whatever their purpose may be. One interpretation regards emotions as „action schemes", which especially lead to a certain behaviour which is essential for survival. It is important to distinguish between conscious aspects of emotion like subjective - often bodily - feelings, as well as unconscious aspects like the detection of a threat. This will be discussed later on in conjunction with awareness of emotion. It is also important to differentiate between a mood and an emotion. A mood refers to a situation where an emotion occurs frequently or continuously. As an example: Fear is an emotion, anxiety is a mood. The first question which arises is how to categorise emotions. They could be treated as a single entity, but perhaps it could even make more sense to distinguish between them, which leads to the question if some emotions like happiness or anger are more basic than other types like jealousy or love and if emotions are dependent on culture and/or language. One of the most influential ethnographic studies by Eckman and Friesen, which is based on the comparison of facial expressions of emotions in different cultures, concluded that there are six basic types of emotions expressed in faces - namely sadness, happiness, disgust, surprise, anger and fear, independent from culture and language. An alternative approach is to differentiate between emotions not by categorising but rather by measuring the intensity of an emotion by imposing different dimensions, e.g. their valence and their arousal. If this theory would be true then one might expect to find different brain regions which selectivey process positive or negative emotions. !Six basic types of emotions expressed in faces{width="500"} Complex emotions like jealousy, love and pride are different from basic emotions as they comprehend awareness of oneself in relation to other people and one\'s attitude towards other people. Hence they come along with a more complex attributional process which is required to appreciate thoughts and beliefs of other people. Complex emotions are more likely be dependent on cultural influences than basic types of emotions. If you think of Knut who is feeling embarrassment, you have to consider what kind of action he committed in which situation and how this action raised the disapproval of other people. ### Awareness and Emotion Awareness is closely connected with changes in the environment or in the psycho-physiological state. Why recognise changes rather than stable states? An answer could be that changes are an important indicator of our situation. They show that our situation is unstable. Paying attention or focusing on that might increase the chance to survive. A change bears more information than repetitive events. This appears more exciting. Repetition reduces excitement. If we think that we got the most important information from a situation or an event,we become unaware of such an event or certain facts. Current research in this field suggest that changes are needed to emerge emotions,so we can say that it is strong attention dependent. The event has to draw our attention. No recognition, no emotions. But do we have always an emotional evaluation, when we are aware of certain events? How has the change to be relevant for our recognition? Emotional changes are highly personal significant, saying that it needs a relation to our personal self. Significance presupposes order and relations. Relations are to meaning as colours are to vision: a necessary condition, but not its whole content. One determines the significance and the scope of a change by f.e. event´s impact (event´s strength), reality, relevance and factors related to the background circumstances of the subject. We feel no emotion in response to change which we perceive as unimportant or unrelated. Roughly one can say that emotions express our attitude toward unstable significant objects which are somehow related to us. This is also always connected with the fact that we have greater response to novel experience. Something that is unexpected or unseen yet. When children get new toys, they are very excited at first, but after a while one can perceive, or simply remember their own childhood, that they show less interest in that toy. That shows, that emotional response declines during time. This aspect is called the process of adaptation. The threshold of awareness keeps rising if stimulus level is constant. Hence, awareness decreases. The organism withdraws its consciousness from more and more events. The person has the pip, it has enough. The opposite effect is also possible. It is known as the process of facilitation. In this case the threshold of awareness diminishes. Consciousness is focusing on increasing number of events. This happens if new stimuli are encountered. The process of adaptation might prevent us from endlessly repetitive actions. A human would not be able to learn something new or be caught in an infinite loop. The emotional environment contains not only what is, and what will be, experienced but also all that could be, or that one desires to be, experienced; for the emotional system, all such possibilities are posited as simultaneously there and are compared with each other. Whereas intellectual thinking expresses a detached and objective manner of comparison, the emotional comparison is done from a personal and interested perspective; intellectual thinking may be characterised as an attempt to overcome the personal emotional perspective. It is quite difficult to give an external description of something that is related to an intrinsic, personal perspective. But it is possible. In the following the most popular theories will be shown, and an rough overview about the neural substrates of emotions. ### The Neural Correlate of Emotion #### Papez Circuit James W. Papez was the investigator of the Papez Circuit theory (1937). He was the first who tried to explain emotions in a neurofuncional way. Papez discovered the circuit after injecting the baring-virus into a cat\'s hippocampus andobserved its effects on the brain. The Papez circuit is chiefly involved in the cortical control of emotion. The corpus mamillare (part of the hypothalamus) plays a central role. The Papez Circuit involves several regions in the brain with the following course: ● The hippocampus projects to fornix and via this to corpus mamillare ● from here neurons project via the fasciculus mamillothalamicus to nucleus anterior of the thalamus and then to the gyrus cinguli ● due to the connection of gyrus cinguli and hippocampus the circuit is closed. 1949 Paul MacLean extended this theory by hypothezing that regions like the amygdala and the orbitofrontal cortex work together with the circuit and form an emotional brain. However, the theory of the Papez circuit could no longer be held because, for one, some regions of the circuit can no longer be related to functions to which they were ascribed primarily. And secondly, current state of research concludes that each basic emotion has its own circuit. Furthermore, the assumption that the limbic system is solely responsible for these functions is out-dated. Other cortical and non-cortical structures of the brain have an enormous bearing on the limbic system. So the emergence of emotion is always an interaction of many parts of the brain. #### Amygdala and Fear The Amygdala (lat. Almond), latinic-anatomic Corpus amygdaloideum, is located in the left and right temporal lobe. It belongs to the limbic system and is essentially involved in the emergence of fear. In addition, the amygdala plays a decisive role in the emotional evaluation and recognition of situations as well as in the analysis of potential threat. It handles external stimuli and induces vegetative reactions. These may help prepare the body for fight and flight by increasing heart and breathing-rate. The small mass of grey matter is also responsible for learning on the basis of reward or punishment. If the two parts of the amygdala are destroyed the person loses their sensation of fear and anger. Experiments with patients whose amygdala is damaged show the following: The participants were impaired to a lesser degree with recognizing facial anger and disgust. They could not match pictures of the same person when the expressions were different. Beyond Winston, O´Doherty and Dolan report that the amygdala activation was independent of whether or not subjects engaged in incidental viewing or explicit emotion judgements. However, other regions (including the ventromedial frontal lobes) were activated only when making explicit judgements about the emotion. This was interpreted as reinstatement of the „feeling" of the emotion. Further studies show that there is a slow route to the amygdala via the primary visual cortex and a fast subcortical route from the thalamus to the amygdala. The amygdala is activated by unconscious fearful expressions in healthy participants and also „blindsight" patients with damage to primary visual cortex. The fast route is imprecise and induces fast unconscious reactions towards a threat before you consciously notice and may properly react via the slow route. This was shown by experiments with persons who have a snake phobia (ophidiophobics) or a spider phobia (arachnophobics). When they get to see a snake, the former showed a bodily reaction, before they reported seeing the snake. A similar reaction was not observable in the case of a spiderphobia. By experiments with spiders the results were the other way round. #### Recognition of Other Emotional Categories Another basic emotional category which is largely independent of other emotions is disgust. It literally means „bad taste" and is evolutionary related to contamination through ingestion. Patients with the Huntington\'s disease have problems with recognizing disgust. The insula, a small region of cortex buried beneath the temporal lobes, plays an important role for facial expressions of disgust. Furthermore, the half of the patients with a damaged amygdala have problems with facial expressions of sadness. The damage of the ventral regions of the basal ganglia causes the deficit in the selective perception of anger and this brain area could be responsible for the perception of aggression. Happiness cannot be selectively impaired because it consist of a more distributed network. ### Functional Theories In order to explain human emotions, that means to discover how they arise and investigate how they are represented in the brain, researchers worked out several theories. In the following the most important views will be discussed #### James -- Lange Theory The James -- Lange theory of emotion states that the self -- perception of bodily changes produces emotional experience. For example you are happy because you are laughing or you feel sad because you are crying. Alternatively, when a person sees a spider he or she might experience fear. One problem according this theory is that it is not clear what kind of processing leads to the changes in the bodily state and wether this process can be seen as a part of the emotion itself. However, people paralyzed from the neck down, who have little awareness of sensory input are still able to experience emotions. Also, research by Schacter and Singer has shown, that changes in bodily state are not enough to produce emotions. Because of that, an extension of this theory was necessary. #### Two Factor Theory The two factor theory views emotion as an compound of the two factors: physiological arousal and cognition. Schacter and Singer (1962) did well-known studies in this field of research. They injected participants with adrenaline (called epinephrine in the USA). This is a drug that causes a number of effects like increased blood flow to the muscles and increased heart rate. The result was that the existence of the drug in the body did not lead to experiences of emotion. Just with the presence of an cognitive setting, like an angry man in the room, participants did self -- report an emotion. Contrary to the James -- Lange theory this study suggests that bodily changes can only support conscious emotional experiences but do not create emotions. Therefore, the interpretation of a certain emotion depends on the physiological state in correlation to the subjects circumstances. #### Somatic Marker Hypothesis This current theory of emotions (from A. Damasio) emphasizes the role of bodily states and implies that "somatic marker" signals have influence on behaviour, like particularly reasoning and decision--making. Somatic markers are the connections between previous situations, which are stored in the cortex, and the bodily feeling of such situations (e.g. stored in the amygdala). From this it follows, that the somatic markers are very useful during the decision process, because they can give you immediate response on the grounds of previous acquired knowledge, whether the one or the other option "feels" better. People who are cheating and murdering without feeling anything miss somatic markers which would prevent them from doing this. In order to investigate this hypothesis a gambling task was necessary. There have been four decks of cards (A, B, C, D) on the table and the participants had to take always one in turn. On the other side of the card was either a monetary penalty or gain. The players have been told that they must play so that they win the most. Playing from decks A and B leads to a loss of money whereas choosing decks C and D leads to gain. Persons without a brain lesion learned to avoid deck A and B but players with such damage did not. ### Reading Minds Empathy is the ability to appreciate others' emotions and their point of view. Simulation theory states that the same neural and cognitive resources are used by perceiving the emotional expressions of others and by producing actions and this expressions in oneself. If you are watching a movie where one person touches another, the same neural mechanism (in the somatosensory cortex) is activated as if you were physically touched. Further studies investigated empathy for pain. That means, if you see someone experiencing pain, two regions in your brain are overlapping. The first region is responsible for expecting another person's pain, and the second region is responsible for experiencing this pain oneself. ### Mood and Memory While we store a memory, we not only record all sensory data, we also store our mood and emotional state. Our current mood thus will affect the memories that are most effortlessly available to us, such that when we are in a good mood we recollect good memories (and vice versa). While the nature of memory is associative this also means that we tend to store happy memories in a linked set. There are two different ways we remember past events: #### Mood-congruence Memory occurs where current mood helps recall of mood-congruent material, e.g. characters in stories that feel like the reader feels while reading, regardless of our mood at the time the material was stored. Thus when we are happy, we are more likely to remember happy events. Also remembering all of the negative events of our past when depressed is an example of mood congruence. That means that you can rather remember a funeral where you were happy in a happy mood while you remember a party where you were sad in a sad mood, although a funeral is sad and a party is happy. #### Mood-dependency Memory occurs where the congruence of current mood with the mood at the time of memory storage helps recall of that memory. When we are happy, we are more likely to remember other times when we were happy. So, if you want to remember something, get into the mood you were in when you experienced it. You can easily try this yourself. You just have to bring into a certain mood by listening to the saddest/happiest music you know. Now you learn a list of words. Then you try to recall the list in the other/the same mood. You will see that you remember the list better when you are in the same mood as you were while learning it. ## Disorders Without balanced emotions, one\'s ability to interact in a social network will be affected in some manner (e.g. reading minds). In this part of the chapter some grave disorders will be presented- these are: depression, austism and antisocial behaviour disorders as psychopathy and sociopathy. It is important to mention that those disorders will mainly be considered in regard to their impact on social competence. To get a full account of the characteristics of each of the disorders, we recommend reading the particular articles provided by Wikipedia. ### Autism Autism is thought to be an innate condition with individual forms distributed on a broad spectrum. This means that symptoms can range from minor behavioral problems to major mental deficits, but there is always some impairment of social competence. The American Psychiatric Association characterizes autism as \"the presence of markedly abnormal or impaired development in social interaction and communication and a markedly restricted repertoire of activities and interests\" (1994, diagnostic and statistical manual; DSM-IV). The deficits in social competence are sometimes divided into the so-called \"triad of impairments\", including: (1)Social interaction This includes difficulties with social relationships, for example appearing distanced and indifferent to other people. (2)Social communication Autists have problems with verbal and non-verbal communication, for example, they do not fully understand the meaning of common gestures, facial expressions or the voice tones. They often show reduced or even no eye-contact as well, avoid body contact like shaking hands and have difficulties to understand metaphores and \"to read between the lines\". (3)Social imagination Autists lack social imagination manifesting in difficulties in the development of interpersonal play and imagination, for example having a limited range of imaginative activities, possibly copied and pursued rigidly and repetitively. All forms of autism can already be recognized during childhood and therefore disturb the proper socialization of the afflicted child. Often autistic children are less interested in playing with other children but for example love to arrange their toys with utmost care. Unable to interpret emotional expressions and social rules autists are prone to show inappropriate behaviour towards the people surrounding them. Autists may not obviously be impaired therefore other people misunderstand their actions as provocation. Still there are other features of autism- autists often show stereotyped behaviour and feel quite uncomfortable when things change in the routines and environment they are used to. Very rarely, a person with autism may have a remarkable talent, such as memorizing a whole city panorama including, for example, the exact number of windows in each of the buildings. There are several theories trying to explain autism or features of autism. In an experiment conducted by Baron-Cohen and colleagues (1995) cartoons were presented to normal and autistic children showing a smiley in the centre of each picture and four different sweets in each corner (see picture below). The smiley, named Charlie, was gazing at one of the sweets. The children were asked question as: \"Which chocolate does Charlie want?\" !Autistic children were able to detect where the smiley was looking but unable to infer its \'desires\'. (adapted graphic from Ward, J. (2006). *The Students Guide to Cognitive Neuroscience*. Hove: Psychology Press. page 316). The Students Guide to Cognitive Neuroscience. Hove: Psychology Press. page 316)") Normal children could easily infer Charlie\'s desires from Charlie\'s gaze direction whereas autistic children would not guess the answer. Additional evidence from other experiments suggest that autists are unable to use eye gaze information to interpret people\'s desires and predict their behaviour which would be crucial for social interaction. Another proposal to explain autistic characteristics suggests that autists lack representations of other people\'s mental states (mindblindness - proposed by Baron-Cohen, 1995b). ### Depression Depression is a disorder that leads to an emotional disfunction characterized by a state of intensive sadness, melancholia and despair. The disorder affects social and everyday life. There are many different forms of depression that differ in strength and duration. People affected by depression suffer from anxiety, distorted thinking, dramatic mood changes and many other symptoms. They feel sad, and everything seems to be bleak. This leads to an extremely negative view of themselves and their current and future situation. These factors can lead to a loss of a normal social life that might affect the depressed person even further. Suffering from depression and losing your social network can thereby lead to a vicious circle. ### Psychopathy and Sociopathy Psychopathy and sociopathy are nowadays subsumed under the notion of antisocial behaviour disorders but experts are still quite discordant whether both are really separated disturbances or rather forms of other personal disorders e.g. autism. Psychopaths and sociopaths often get into conflict with their social environment because they repeatedly violate social and moral rules. Acquired sociopathy manifests in the inability to form lasting relationships, irresponsible behaviour as well as getting angry quite fast and exceptional strong egocentric thinking. While acquired sociopathy might be characterised by impulsive antisocial behaviour often having no personal advantage, developmental psychopathy manifests in goal directed and self-initiated aggression. Acquired sociopathy is caused by brain injury especially found in the orbitofrontal lobe (frontal lobe) and is thought to be a failure to use emotional cues and the loss of social knowledge. Therefore sociopaths are unable to control and plan their behaviour in a socially adequate manner. In contrast to sociopaths psychopaths are not getting angry because of minor reasons but they act aggressively without understandable reasons at all which might be due to their inability to understand and distinguish between moral rules (concerning the welfare of others) and conventions (consensus rules of society). Furthermore it even happens that they feel no guilt or empathy for their victims. Psychopathy is probably caused by a failure to process distress cues of others, meaning that they are unable to understand sad and fearful expressions and consequently suppress their aggression (Blair 1995). It is important to mention that they are nevertheless able to detect stimuli being threatening for themselves. ## Summary We hope that this chapter gave you an overview and answered the question we posed at the beginning. As one can see this young field of cognitive is wide and not yet completely researched. Many different theories were proposed to explain emotions and motivation like the James-Lange Theory which claims that bodily changes lead to emotional experiences. This theory led to the Two-Factor-Theory which in contrast says that bodily changes only support emotional experiences. Whereas the newest theory (Somatic marker) states that somatic markers support decision making. While analyzing emotions, one has to distinguish between conscious emotions, like a feeling, and unconscious aspects, like the detection of threat. Presently, researchers distinguish six basic emotions that are independent from cultural aspects. In comparison to this basic emotions other emotions also comprehend social awareness. So, emotions are not only important for our survival but for our social live, too. Reading faces helps us to communicate and interpret behaviour of other people. Many disorders impair this ability leaving the afflicted person with an inability to integrate himself into the social community. Another important part in understanding emotions is awareness; we only pay attention on new things in order to avoid getting unimportant information. Moods also affect our memory - we can remember things better if we are in the same mood as in the situation before and if the things we want to remember are connoted in the same way as our current mood. We also outlined the topic of motivation which is crucial to initiate and uphold our mental and corporal activities. Motivation consists of two parts: drives (biological needs) and motives (primarily social and psychological mechanisms). One important theory is the Maslow Hierarchy of Needs; it states that higher motivations are only aspired if lower needs are satisfied. As this chapter only dealt with mood and memory, the next chapter deals with memory and language. ## References ### Books - Zimbardo, Philip G. (1995, 12th edition). Psychology and Life. Inc. Scott, Foresman and Company, Glenview, Illinois. - Banich,Marie T. (2004). Cognitive Neuroscience and Neuropsychology. Housthon Mifflin Company. - Robert A. Wilson and Frank C. Keil. (2001). The MIT Encyclopedia of Cognitive Sciences (MITECS). Bradford Book. - Antonio R. Damasio. (1994) reprinted (2005). Descartes\' Error: Emotion, Reason and the Human Brain. Penguin Books. - Antonio R. Damasio. (1999). The Feeling of what Happens. Body and Emotion in the Making of Consciousness. Harcourt Brace & Company. - Aaron Ben-Ze\'ev (Oct 2001). The Subtlety of Emotions.(MIT CogNet). - Ward, J. (2006). The Students Guide to Cognitive Neuroscience. Hove: Psychology Press. ### Journals - The emotional brain. Tim Dalgleish. - \(1\) Leonard, C.M., Rolls, E.T., Wilson, F.A.W. & Baylis, C.G. Neurons in the amygdala of the monkey with responses selective for faces. Behav. Brain Res. 15, 159-176 (1985) - (2)Adolphs, R., Tranel, D., Damasio, H. & Damasio, A. Impaired recognition of emotion in facial expressions following bilateral damage of the human amygdala. Nature 372, 669-672 (1994) - (3)Young, A. W. et al. Face processing impairments after amygdalotomy. Brain 118, 15-24 (1995) - (4)Calder, A. J. et al. Facial emotion recognition after bilateral amygdala damage: Differentially severe impairment of fear. Cognit. Neuropsychol. 13, 699-745 (1996) - (5)Scott, S. K. et al. Impaired auditory recognition of fear and anger following bilateral amygdala lesions. Nature 385, 254-257 (1997) - (6)Cahill, L., Babinsky, R., Markowitsch, H. J. & McGaugh, J. L. The amygdala and emotional memory. Nature 377, 295-296 (1995) - (7)Wood, Jacqueline N. and Grafman, Jordan (02/2003). Human Prefrontal Cotex. Nature Reviews/ Neuroscience - (8)Brothers, L. , Ring, B. & Kling, A. Response of neurons in the macaque amygdala to complex social stimuli. Behav. Brain Res. 41, 199-213 (1990) - (9)Bear, M.F., Connors, B.W., Paradiso, M.A. (2006, 3rd edition). Neuroscience. Exploring the Brain. Lippincott Wiliams & Wilkins. ### Links - Dana Foundation and the Dana Alliance: The Site for Brain News - Brain Facts: PDF [^1]: Independent variables are the circumstance of major interest in an experiment. The Participant does only react on them, but cannot actively change them. They are independent of his behaviour. [^2]: The measured behaviour is called the dependent variable. [^3]: At the humoral response hypothalamic neurons stimulate or inhibit the release of pituitary hormones into the bloodstream and at the visceromotor response neurons in the hypothalamus adjust the balance of sympathetic and parasympathetic outputs of the autonomic nervous system (ANS). [^4]: αMSH neurons and CART neurons of the arcuate nucleus. αMSH(alpha-malanocyte-stimulating hormone) and CART(cocaine- and amphetamine-regulated transcript) are anoretic peptides, which activate the pituitary hormones TSH(thyroid-stimulating hormone) and ACTH(adrenocorticotropic hormone), that have the effect of raising the metabolic rate of cells throughout the body. [^5]: NPY neurons and AgRP neurons. NPY(neuropeptide Y) and AgRP(agouti-related peptide) are orexigenic peptides, which inhibit the secretion of TSH and ACTH. [^6]: MCH(melanin-concentrating hormone) neurons, which have extremely widespread connections in the brain, including direct monosynaptic innervation of most of the cerebral cortex, that is involved in organizing and initiating goal-directed behaviors, such as raiding the refrigerator. [^7]: The NPY- and AgRP neurons. [^8]: The pancreatic hormone insulin, released by β cells of the pancreas, acts directly on the arcuate and ventromedial nuclei of the hypothalamus. It appears that it operates in much the same way as leptin to regulate feeding behavior, with the difference that its primary stimulus for realisng is increased blood glucose level.
# Cognitive Psychology and Cognitive Neuroscience/Memory +:------------------------------+:----:+------------------------------:+ | Previous | [O | [Next | | Chap | verv | C | | ter | niti | mory_and_Language "wikilink") | | | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ # Introduction Imagine our friend Knut, who we have already introduced in earlier chapters of this book, hastily walking through his apartment looking everywhere for a gold medal that he has won many years ago at a swimming contest. The medal is very important to him, since it was his recently deceased mother who had insisted on him participating. The medal reminds him of the happy times in his life. But now he does not know where it is. He is sure that he had last seen it two days ago but, searching through his recent experiences, he is not able to recall where he has put it.\ So what exactly enables Knut to remember the swimming contest and why does the medal trigger the remembrance of the happy times in his life? Also, why is he not able to recall where he has put the medal, even though he is capable of scanning through most of his experiences of the last 48 hours?\ Memory, with all of its different forms and features, is the key to answering these questions. When people talk about memories, they are subconsciously talking about \"the capacity of the nervous system to acquire and retain usable skills and knowledge, which allows living organisms to benefit from experience\".[^1] Yet, how does this so-called memory function? In the process of answering this question, many different models of memory have evolved. Distinctions are drawn between Sensory Memory, Short Term Memory, and Long Term Memory based on the period of time information is accessible after it is first encountered. **Sensory Memory**, which can further be divided into **Echoic** and **Iconic Memory**, has the smallest time span for accessibility of information. With **Short Term** and **Working Memory**, information is accessible seconds to minutes after it is first encountered. While **Long Term Memory**, has an accessibility period from minutes to years to decades. This chapter discusses these different types of memory and further gives an insight into memory phenomena like **False Memory** and **Forgetting**. Finally, we will consider **biological foundations** that concern memory in human beings and the biological changes that occur when learning takes place and information is stored. # Types of Memory In the following section, we will discuss the three different types of memory and their respective characteristics: **Sensory Memory**, **Short Term (STM)** or **Working Memory (WM)** and **Long Term Memory (LTM)**. ## Sensory Memory This type of memory has the shortest retention time, only milliseconds to five seconds. Roughly, Sensory Memory can be subdivided into two main kinds: framed\|Sensory Memory - **Iconic Memory** (visual input) - **Echoic Memory** (auditory input) While Iconic and Echoic Memory have been well researched, there are other types of Sensory Memory, like **haptic**, **olfactory**, etc., for which no sophisticated theories exist so far.\ It should be noted, though, that according to the Atkinson and Shiffrin (1968)`<ref>`{=html}Atkinson, R. C. & Shiffrin, R. M. (1968). Human memory: A proposed system and its control processes. : In K. Spence & J. Spence (Eds.), *The psychology of learning and motivation (Volume 2)*. New York: Academic Press. ```{=html} </ref> ``` Sensory Memory was considered to be the same thing as Iconic Memory. Echoic Memory was added to the concept of Sensory Memory due to research done by Darwin and others (1972).`<ref>`{=html}Darwin, C. J., Turvey, M. T., & Crowder, R. G. (1972). An auditory analogue of the Sperling partial report procedure: : Evidence for brief auditory storage. *Cognitive Psychology, 3*, 255-267. ```{=html} </ref> ``` Let us consider the following intuitive example for Iconic Memory: Probably we all know the phenomenon that it seems possible to draw lines, figures or names with lighted sparklers by moving the sparkler fast enough in a dark environment. Physically, however, there are no such things as lines of light. So why can we nevertheless see such figures? This is due to Iconic Memory. Roughly speaking, we can think of this subtype of memory as a kind of photographic memory, but one which only lasts for a very short time (milliseconds, up to a second). The image of the light of a sparkler remains in our memory (persistence of vision) and thus makes it seem to us like the light leaves lines in the dark. The term \"Echoic Memory\", as the name already suggests, refers to auditory input. Here the persistence time is a little longer than with Iconic Memory (up to five seconds).\ At the level of Sensory Memory no manipulation of the incoming information occurs, it is transferred to the **Working Memory**. By 'transfer' it is meant that the amount of information is reduced because the capacity of the working memory is not large enough to cope with all the input coming from our sense organs. The next paragraph will deal with the different theories of selection when transferring information from Sensory Memory to Working Memory.\ One of the first experiments researching the phenomenon of **Attention** was the **Shadowing Task** (Cherry et al., 1953).`<ref>`{=html}Cherry, E. C. (1953). Some experiments on the recognition of speech with one and with two ears. : *Journal of Accoustical Society of America, 25*, 975-979. ```{=html} </ref> ``` This experiment deals with the filtering of auditory information. The subject is wearing earphones, getting presented a different story on each ear. He or she has to listen to and repeat out loud the message on one ear (shadowing). When asked for the content of the stories of both ears only the story of the shadowed side can be repeated; participants do not know about the content of the other ear's story. From these results Broadbent concluded the **Filter Theory** (1958).[^2] This theory proposes that the filtering of information is based on specific physical properties of stimuli. For every frequency there exists a distinct nerve pathway. The attention control selects which pathway is active and can thereby control which information is passed to the Working Memory. This way it is possible to follow the utterance of one person with a certain voice frequency even though there are many other sounds in the surrounding. But imagine a situation in which the so called cocktail party effect applies: having a conversation in a loud crowd at a party and listening to your interlocutor you will immediately switch to listening to another conversation if the content of it is semantically relevant to you, e.g. if your name is mentioned.\ So it is found that filtering also happens semantically. The above mentioned Shadowing Task was changed so that the semantic content of a sentence was split up between the ears, and the subject, although shadowing, was able to repeat the whole sentence because he or she was following the semantic content unconsciously.\ Reacting to the effect of semantic filtering, new theories were developed. Two important theories are the **Attenuation Theory** (Treisman, 1964)`<ref>`{=html}Treisman, A. M. (1964). Monitoring and storage of irrelevant messages and selective attention. : *Journal of Verbal Learning and Verbal Behaviour, 3*, 449-459. ```{=html} </ref> ``` and the **Late Selection Theory** (Deutsch & Deutsch, 1963).[^3] The former proposes that we attenuate information which is less relevant, but do not filter it out completely. Thereby also semantic information of ignored frequencies can be analyzed but not as efficiently as those of the relevant frequencies. The Late Selection Theory presumes that all information is analyzed first and afterwards the decision of the importance of information is made. Treisman and Geffen did an experiment to find out which one of the theories holds. The experiment was a revision of the Shadowing Task. Again the subjects have to shadow one ear but in contrast they also have to pay attention to a certain sound which could appear on either ear. If the sound occurs the subject has to react in a certain way (for example knock on the table). The result is that the subject identifies the sound on the shadowed ear in 87% of all cases and can only do this in 8% of the cases on the ignored side. This shows that the information on the ignored side must be attenuated since the rate of identification is lower. If the Late Selection Theory were to hold then the subject would have to analyze all information and would have to be able to identify the same amount on the ignored side as on the shadowed side. Since this is not the case the Attenuation Theory by Treisman explains the empirical results more accurately. framed\|center\|Illustration of the Attention Control Model by a) Treisman - Attenuation Theory and b) Deutsch & Deutsch -- Late Selection Theory. ## Short Term Memory The **Short Term Memory** (STM) was initially discussed by Attkinson and Shiffrin (1968).`<ref>`{=html}Atkinson, R. C. & Shiffrin, R. M. (1968). Human memory: A proposed system and its control processes. : In K. Spence & J. Spence (Eds.), *The psychology of learning and motivation (Volume 2)*. New York: Academic Press. ```{=html} </ref> ``` The Short Term Memory is the link between **Sensory Memory** and **Long Term Memory** (LTM). Later Baddeley proposed a more sophisticated approach and called the interface **Working Memory** (WM). We will first look at the classical Short Term Memory Model and then go on to the concept of Working Memory. As the name suggests, information is retained in the Short Term Memory for a rather short period of time (15--30 seconds). framed\|Short Term Memory If we look up a phone number in the phone book and hold it in mind long enough for dialling the number, it is stored in the Short Term Memory. This is an example of a piece of information which can be remembered for a short period of time. According to George Miller (1956)`<ref>`{=html}Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. : *Psychological Review, 63*, 81-97. ```{=html} </ref> ``` the capacity of the Short Term Memory is five to nine pieces of information (The **magical number seven, plus or minus two**). The term \"pieces of information" or, as it is also called, **chunk** might strike one as a little vague. All of the following are considered as chunks: single digits or letters, whole words or even sentences and the like. It has been shown by experiments also done by Miller that **chunking** (the process of bundeling information) is a useful method to memorize more than just single items in the common sense. Gobet et al. defined a chunk as \"a collection of elements that are strongly associated with one another but are weakly associated with other chunks\" (Goldstein, 2005).[^4] A very intuitive example of chunking information is the following:\ Try to remember the following digits: - 0 3 1 2 1 9 8 2 But you could also try another strategy to remember these digits: - 03\. 12. 1982. With this strategy you bundled eight pieces of information (eight digits) to three pieces with help to remember them as a date schema.\ A famous experiment concerned with chunking was conducted by Chase and Simon (1973)`<ref>`{=html}Chase, W. G. & Simon, H.A. (1973). The mind's eye in chess. In W. G. Chase (Ed.), *Visual information processing*. : New York: Academic Press. ```{=html} </ref> ``` with novices and experts in chess playing. When asked to remember certain arrangements of chess pieces on the board, the experts performed significantly better that the novices. However, if the pieces were arranged arbitrarily, i.e. not corresponding to possible game situations, both the experts and the novices performed equally poorly. The experienced chess players do not try to remember single positions of the figures in the correct game situation, but whole bundles of figures as already seen before in a game. In incorrect game situations this strategy cannot work which shows that chunking (as done by experienced chess players) enhances the performance only in specific memory tasks. ```{=html} <!-- --> ``` From Short Term Memory to Baddeley's Working Memory Model: Baddeley and Hitch (1974)`<ref>`{=html}Baddeley, A. D. & Hitch, G. (1974). Working memory. In G. A. Bower (Ed.), *Recent advances in learning and motivation (Vol. 8)*. : New York: Academic Press. ```{=html} </ref> ``` drew attention to a problem with the Short Term Memory Model. Under certain conditions it seems to be possible to do two different tasks simultaneously, even though the STM, as suggested by Atkinson and Shiffrin, should be regarded as a single, undivided unit. An example for the performance of two tasks simultaneously would be the following: a person is asked to memorize four numbers and then read a text (unrelated to the first task). Most people are able to recall the four numbers correctly after the reading task, so apparently both memorizing numbers and reading a text carefully can be done at the same time. According to Baddeley and Hitch the result of this experiment indicates that the number-task and the reading-task are handled by two different components of Short Term Memory. So they coined the term \"Working Memory\" instead of \"Short Term Memory\" to indicate that this kind of Memory enables us to perform several cognitive operations at a time with different parts of the Working Memory. ## Working Memory According to Baddeley, **Working Memory** is limited in its capacity (the same limitations hold as for Short Term Memory) and the Working Memory is not only capable of storage, but also of the manipulation of incoming information. Working Memory consists of three parts:\ framed\|Working Memory - **Phonological Loop** - **Visuospatial Sketch Pad** - **Central Executive** We will consider each module in turn:\ The **Phonological Loop** is responsible for auditory and verbal information, such as phone numbers, people's names or general understanding of what other people are talking about. We could roughly say that it is a system specialized for language. This system can again be subdivided into an active and a passive part. The storage of information belongs to the passive part and fades after two seconds if the information is not rehearsed explicitly. Rehearsal, on the other hand, is regarded as the active part of the Phonological Loop. The repetition of information deepens the memory. There are three well-known phenomena that support the idea that the Phonological Loop is specialized for language: The **phonological similarity effect**, the **word-length effect** and **articulatory suppression**. When words that sound similar are confused, we speak of the phonological similarity effect. The word-length effect refers to the fact that it is more difficult to memorize a list of long words and better results can be achieved if a list of short words is memorized. Let us look at the phenomenon of articulatory suppression in a little more detail. Consider the following experiment:\ Participants are asked to memorize a list of words while saying \"the, the, the \..." out loud. What we find is that, with respect to the word-length effect, the difference in performance between lists of long and short words is levelled out. Both lists are memorized equally poorly. The explanation given by Baddeley et al. (1986),[^5] who conducted this experiment, is that the constant repetition of the word \"the\" prevents the rehearsal of the words in the lists, independent of whether the list contains long or short words. The findings become even more drastic if we compare the memory-performance in the following experiment (also conducted by Baddeley and his co-workers in 1986):\ Participants were again asked to say out loud \"the, the, the \...\" But instead of memorizing words from a list of short or long words, their task was to remember words that were either spoken to them or shown to them written on paper. The results indicated that the participants' performances were significantly better if the words were presented to them and not read out aloud. Baddeley concluded from this fact that the performance in a memory task is improved if the two stimuli can be dealt with in distinct components of the Working Memory. In other words, since the reading of words is handled in the Visuospatial Sketch Pad, whereas the saying of \"the\" belongs to the Phonological Loop, the two tasks do not \"block\" each other. The rather bad performance of hearing words while speaking could be explained by the fact that both hearing and speaking are dealt with in the Phonological Loop and thus the two tasks conflict with each other, decreasing the performance of memorization.\ In the **Visuospatial Sketch Pad**, visual and spatial information is handled. This means that information about the position and properties of objects can be stored. As we have seen above, performance decreases if two tasks that are dealt with in the same component are to be done simultaneously. Let us consider a further example that illustrates this effect. Brandimonte and co-workers (1992)`<ref>`{=html}Brandimonte, M. A., Hitch, G. J., & Bishop, D. V. M. (1992). Influence of short-term memory codes on visual image processing: : Evidence from image transformation tasks. *Journal of Experimental Psychology: Learing, Memory, and Cognition, 18*, 157-165. ```{=html} </ref> ``` conducted an experiment where participants were asked to say out loud \"la, la, la\..." At the same time they were given the task of subtracting a partial image from a given whole image. The subtraction had to be done mentally because the two images were presented only for a short time. The interesting result was that the performance not only didn\'t decrease while saying \"la, la, la \...\" when compared to doing the subtraction-task alone, but the performance even increased. According to Brandimonte this was due to the fact that the subtraction task was easier if handled in the Visuospatial Sketch Pad as opposed to the Phonological Loop (both the given and the resulting pictures were such that they could also be named, i.e. verbalized, a task that belongs to the Phonological Loop). As mentioned above, because of the fact that the subtraction of a partial image from a whole given image is easier if done visually, the performance increased if participants were forced to visually perform that task, i.e. if they were forced to use the component that is suited best for the given task. We have seen that the Phonological Loop and the Visuospatial Sketch Pad deal with rather different kinds of information which nonetheless have to somehow interact in order to do certain tasks. The component that connects those two systems is the Central Executive. The **Central Executive** co-ordinates the activity of both the Phonological Loop and the Visuospatial Sketch Pad. Imagine the following situation: You are driving a car and your friend in the passenger seat has the map and gives you directions. The directions are given verbally, i.e. they are handled by the Phonological Loop, while the perception of the traffic, street lights, etc. is obviously visual, i.e. dealt with in the Visuospatial Sketch Pad. If you now try to follow the directions given to you by your friend it is necessary to somehow combine both kinds of information, the verbal and the visual information. This important connection of the two components is done by the Central Executive. It also links the Working Memory to Long Term Memory, controls the storage in Long Term Memory and the retrieval from it. The process of storage is influenced by the duration of holding information in Working Memory and the amount of manipulation of the information. The latter is stored for a longer time if it is semantically interpreted and viewed with relation to other information already stored in Long Term Memory. This is called Deep Processing. Pure syntactical processing (reading a text for typos) is called Shallow Processing. Baddeley proposes also further capabilities for the Central Executive: - **Initiating movement** - **Control of conscious attention** Problems which arise with the Working Memory approach: In theory, all information has to pass the Working Memory in order to be stored in the Long Term Memory. However, cases have been reported where patients could form Long Term Memories even though their STM-abilities were severely reduced. This clearly poses a problem to the modal model approach. It was suggested by Shallice and Warrington (1970)`<ref>`{=html}Shallice, T., & Warrington, E. K. (1970). Independent functioning of verbal memory stores: A neuropsychological study. : *Quarterly Journal of Experimental Psychology,22*, 261-273. ```{=html} </ref> ``` that there must be another possible way for information to enter Long Term Memory than via Working Memory. ## Long Term Memory As the name already suggest, **Long Term Memory** is the system where memories are stored for a long time. \"Long\" in this sense means something between a few minutes and several years or even decades to lifelong. framed\|Long Term Memory Similar to Working Memory, Long Term Memory can again be subdivided into different types. Two major distinctions are made between **Declarative** (conscious) and **Implicit** (unconscious) **Memory**. Those two subtypes are again split into two components each: **Episodic** and **Semantic Memory** with respect to **Declarative Memory** and **Priming Effects**, and **Procedural Memory** with respect to Implicit Memory. In contrast to Short Term or Working Memory, the capacity of Long Term Memory is theoretically infinite. The opinions as to whether information remains in the Long Term Memory forever or whether information can get deleted differ. The main argument for the latter opinion is that apparently not all information that was ever stored in LTM can be recalled. However, theories that regard Long Term Memories as not being subject to deletion emphasize that there might be a useful distinction between the existence of information and the ability to retrieve or recall that information at a given moment. There are several theories about the "forgetting" of information. These will be covered in the section **"Forgetting and False Memory"**. #### Declarative Memory Let us now consider the two types of **Declarative Memory**. As noted above, those two types are **Episodic** and **Semantic Memory**. Episodic Memory refers to memories for particular events that have been experienced by somebody (autobiographical information). Typically, those memories are connected to specific times and places. Semantic Memory, on the other hand, refers to knowledge about the world that is not connected to personal events. Vocabularies, concepts, numbers or facts would be stored in the Semantic Memory. Another subtype of memories stored in Semantic Memory is that of the so called **Scripts**. Scripts are something like blueprints of what happens in a certain situation. For example, what usually happens if you visit a restaurant (You get the menu, you order your meal, eat it and you pay the bill). Semantic and Episodic Memory are usually closely related to one another, i.e. memory of facts might be enhanced by interaction with memory about personal events and vice versa. For example, the answer to the factual question of whether people put vinegar on their chips might be answered positively by remembering the last time you saw someone eating fish and chips. The other way around, good Semantic Memory about certain things, such as football, can contribute to more detailed Episodic Memory of a particular personal event, like watching a football match. A person that barely knows the rules of that game will most probably have a less specific memory for the personal event of watching the game than a football-expert will. #### Implicit Memory We now turn to the two different types of **Implicit Memory**. As the name suggests, both types are usually active when unconscious memories are concerned. This becomes most evident for **Procedural Memory**, though it must be said that the distinction between both types is not as clearly cut as in the case of Declarative Memory and that often both categories are collapsed into the single category of Procedural Memory. But if we want to draw the distinction between **Priming Effects** and **Procedural Memory**, the latter category is responsible for highly skilled activities that can be performed without much conscious effort. Examples would be the tying of shoelaces or the driving of a car, if those activities have been practiced sufficiently. It is some kind of movement plan. As regards the **Priming Effect**, consider the following experiment conducted by Perfect and Askew (1994):[^6]\ Participants were asked to read a magazine without paying attention to the advertisements. After that, different advertisements were presented to them; some had occurred in the magazine, others had not. The participants were told to rate the presented advertisement with respect to different criteria such as how appealing, how memorable or eye-catching they were. The result was that in general those advertisements that had been in the magazine received higher rankings than those that had not been in the magazine. Additionally, when asked which advertisements the participants had actually seen in the magazine, the recognition was very poor (only 2.8 of the 25 advertisements were recognized). This experiment shows that the participants performed **implicit learning** (as can be seen from the high rankings of advertisements they had seen before) without being conscious of it (as can be seen from the poor recognition rate). This is an example of the Priming Effect.\ framed\|center\|Final overview of all different types of memory and their interaction # Forgetting and False Memory As important as memory is, also the process of Forgetting is present to everybody.\ Therefore one might wonder: - Why do we forget at all? - What do we forget? - How do we forget? Why do we forget at all? One might come up with something you could call "mental hygiene". It is not useful to remember every little detail of your life and your surrounding, but rather a disadvantage because you maybe would not be able to remember the important things as quickly or even quick enough but have an overload of facts in your memory. Therefore it is important that unused memories are "cleaned up" so that only relevant information is stored. What do we forget and how? There are different theories about how things are forgotten. One theory proposes that the capacity of the Long Term Memory is infinite. This would mean that actually all memories are stored in the LTM but some information cannot be recalled (anymore) due to factors to be mentioned in the following paragraphs: There are two main theories about the causes of forgetting: - The _**Trace Decay Theory**_ states that you need to follow a certain path, or trace, to recall a memory. If this path has not been used for some time, one would say that the activity of the information decreases (it fades (-\>decays)), which leads to difficulty or the inability to recall the memory. !Memory Interference{width="450"} ```{=html} <!-- --> ``` - The **_Interference Theory_** proposes that all memories interfere with each other. One distinguishes between two kinds of interferences: - **Proactive Interference**: : Earlier memories influence new ones or hinder one to make new ones. - **Retroactive Interference**: : Old memories are changed by new ones, maybe even so much that the original one is completely 'lost'. ```{=html} <!-- --> ``` - Which of the two theories applies in your opinion? - Do you agree with a mixture of the two? !Ebbinghaus Curve of forgetting{width="450"} In 1885 **Herrmann Ebbinghaus** did several self-experiments to research human forgetting. He memorized a list of meaningless syllables, like "WUB" and "ZOF", and tried to recall as many as possible after certain intervals of time for several weeks. He found out that forgetting can be described with an almost logarithmic curve, the so called **forgetting curve** which you can see on the left. These theories about forgetting already make clear that memory is not a reliable recorder but it is a construction based on what actually happened plus additional influences, such as other knowledge, experiences, and expectations. Thus **false memories** are easily created. In general there are three types of tendencies towards which people's memories are changed. These tendencies are called ## Biases in memory One distinguishes between three major types: - **Egocentric Bias** : It makes one see his or herself in the best possible light. - **Consistency Bias** : Because of which one perceives his or her basic attitudes to remain persistent over time. - **Positive Change Bias** : It is cause for the fact that one perceives things to be generally improving. (For a list of more known memory biases see: List of memory biases) There are moments in our lives that we are sure we will never forget. It is generally perceived that the memories of events that we are emotionally involved with are remembered for a longer time than others and that we know every little detail of them. These kinds of memories are called **Flashbulb Memories**.\ The accuracy of the memories is an illusion, though. The more time passes, the more these memories have changed while our feeling of certainty and accuracy increases. Examples for Flashbulb Memories are one's wedding, the birth of one's child or tragedies like September 11th. Interesting changes in memory can also occur due to **Misleading Postevent Information** (MPI). After an event information given another person can so to say intensify your memory in a certain respect. This effect was shown in an experiment by Loftus and Palmer (1974):`<ref>`{=html}Loftus, E. F., & Palmer, J. C. (1974). Reconstruction of an automobile destruction: : An example of the interaction between language and memory. *Journal of Verbal Learning and Verbal Behavior, 13*, 585-589. ```{=html} </ref> ``` The subjects watched a film in which there were several car accidents. Afterwards they were divided into three groups that were each questioned differently. While the control group was not asked about the speed of the cars at all, in the other groups questions with a certain key word were posed. One group was asked how fast the cars were going when they hit each other, while in the other question the verb "smashed" was used. One week later all participants were asked whether they saw broken glass in the films. Both the estimation of speed and the amount of people claiming to have seen broken glass increased steadily from the control group to the third group.\ Based on this **Misinformation Effect** the **Memory Impairment Hypothesis** was proposed.\ This hypothesis states that suggestible and more detailed information that one receives after having made the actual memory can replace the old memory.\ Keeping the possible misleading information in mind, one can imagine how easily eyewitness testimony can be (purposely or accidentally) manipulated. Depending on which questions the witnesses are asked they might later on remember to see, for example, a weapon or not. These kinds of changes in memory are present in everyone on a daily basis. But there are other cases: People with a lesion in the brain sometimes suffer from **Confabulation**. They construct absurd and incomplete memories that can even contradict with other memories or with what they know. Although the people might even be aware of the absurdness of their memories they are still firmly convinced of them. (See Helen Phillips\' article *Mind fiction: Why your brain tells tall tales*) ## Repressed and Recovered Memories If one cannot remember an event or detail, it does not mean that the memory is completely lost. Instead one would say that these memories are **repressed**, which means that they cannot easily be remembered. The process of remembering in these cases is called **recovery**.\ Recovering of a repressed memory usually occurs due to a **retrieval cue**. This might be an object or a scene that reminds one of something which has happened long ago.\ Traumatic events, which happened during childhood for example, can be recovered with the help of a therapist. This way, perpetrators have been brought to trial after decades.\ Still, the correctness of the "recovered" memory is not guaranteed: as we know, memory is not reliable and if the occurrence of an event is suggestible one might produce a false memory.\ Look at the illustration to the right to be able to relate to these processes. !How did the memory for an event become what it is? Other than on a daily basis errors in memory and amnesia are due to damages in the brain. The following paragraphs will present the most important brain regions enabling memory and mention effects of damage to them. # Some neurobiological facts about memory In this section, we will first consider how information is stored in synapses and then talk about two regions of the brain that are mainly involved in forming new memories, namely the **amygdala** and the **hippocampus**. To show what effects memory diseases can have and how they are classified, we will discuss a case study of **amnesia** and two other common examples for amnesic diseases: **Karsakoff's amnesia** and **Alzheimer's disease**. ## Information storage The idea that physiological changes at synapses happen during learning and memory was first introduced by **Donald Hebb**.[^7] It was in fact shown that activity at a synapse leads to structural changes at the synapse and to enhanced firing in the postsynaptic neuron. Since this process of enhanced firing lasts for several days or weeks, we talk about **Long Term Potentiation** (LTP). During this process, existing synaptic proteins are altered and new proteins are synthesized at the modified synapse. What does all this have to do with memory? It has been discovered that LTP is most easily generated in regions of the brain which are involved in learning and memory - especially the hippocampus, about which we will talk in more detail later. Donald Hebb found out that not only a synapse of two neurons is involved in LTP but that a particular group of neurons is more likely to fire together. According to this, an experience is represented by the firing of this group of neurons. So it works according to the principle: **"what wires together fires together"**. ## Amygdala The **amygdala** is involved in the modulation of **memory consolidation**. !Location of the amygdala in the human brain Following any learning event, the Long Term Memory for the event is not instantaneously formed. Rather, information regarding the event is slowly assimilated into long term storage over time, a process referred to as **memory consolidation**, until it reaches a relatively permanent state. During the consolidation period, memory can be modulated. In particular, it appears that emotional arousal following a learning event influences the strength of the subsequent memory for that event. Greater emotional arousal following a learning event enhances a person\'s retention of that event. Experiments have shown that administration of stress hormones to individuals, immediately after they learn something, enhances their retention when they are tested two weeks later. The amygdala, especially the basolateral nuclei, is involved in mediating the effects of emotional arousal on the strength of the memory for the event. There were experiments conducted by James McGaugh on animals in special laboratories. These laboratories have trained animals on a variety of learning tasks and found that drugs injected into the amygdala after training affect the animal's subsequent retention of the task. These tasks include basic **Pavlovian Tasks** such as **Inhibitory Avoidance**, where a rat learns to associate a mild footshock with a particular compartment of an apparatus, and more complex tasks such as spatial or cued water maze, where a rat learns to swim to a platform to escape the water. If a drug that activates the amygdala is injected into the amygdala, the animals had better memory for the training in the task. When a drug that inactivated the amygdala was injected, the animals had impaired memory for the task. Despite the importance of the amygdala in modulating memory consolidation, however, learning can occur without it, although such learning appears to be impaired, as in fear conditioning impairments following amygdala damage. Evidence from work with humans indicates a similar role of the amygdala in humans. Amygdala activity at the time of encoding information correlates with retention for that information. However, this correlation depends on the relative \"emotionality\" of the information. More emotionally-arousing information increases amygdalar activity, and that activity correlates with retention. ## Hippocampus Psychologists and neuroscientists dispute over the precise role of the **hippocampus**, but, generally, agree that it plays an essential role in the formation of new memories about experienced events (Episodic or Autobiographical Memory). !Position of the hippocampus in the human brain{width="185"} Some researchers prefer to consider the hippocampus as part of a larger medial temporal lobe memory system responsible for general declarative memory (memories that can be explicitly verbalized --- these would include, for example, memory for facts in addition to episodic memory). Some evidence supports the idea that, although these forms of memory often last a lifetime, the hippocampus ceases to play a crucial role in the retention of the memory after a period of consolidation. Damage to the hippocampus usually results in profound difficulties in forming new memories (anterograde amnesia), and normally also affects access to memories prior to the damage (retrograde amnesia). Although the retrograde effect normally extends some years prior to the brain damage, in some cases older memories remain intact - this sparing of older memories leads to the idea that consolidation over time involves the transfer of memories out of the hippocampus to other parts of the brain. However, researchers have difficulties in testing the sparing of older memories and, in some cases of retrograde amnesia, the sparing appears to affect memories formed decades before the damage to the hippocampus occurred, so its role in maintaining these older memories remains controversial. \ ## Amnesia As already mentioned in the preceding section about the hippocampus, there are two types of **amnesia** - **retrograde** and **antrograde amnesia**. framed\|center\|Different types of Amnesia Amnesia can occur when there is damage to a number of regions in the medial temporal lobe and their surrounding structures. The **patient H.M.** is probably one of the best known patients who suffered from amnesia. Removing his medial temporal lobes, including the hippocampus, seemed to be a good way to treat the epilepsy. What could be observed after this surgery was that H.M. was no longer able to remember things which happened after his 16th birthday, which was 11 years before the surgery. So given the definitions above one can say that he suffered retrograde amnesia. Unfortunately, he was not able to learn new information due to the fact that his hippocampus was also removed. H.M. therefore suffered not only from retrograde amnesia, but also from anterograde amnesia. His Implicit Memory, however, was still working. In procedural memory tests, for example, he still performed well. When he was asked to draw a star on a piece of paper which was shown to him in a mirror, he performed as bad as every other participant in the beginning. But after some weeks his performance improved even though he could not remember having done the task many times before. Thus, H.M.'s Declarative Memory showed severe deficits but his Implicit Memory was still fine. Another quite common cause of amnesia is the **Korsakoff's syndrome** or also called Korsakoff's amnesia. Long term alcoholism usually elicits this Korsakoff's amnesia due to a prolonged deficiency of vitamin B1. This syndrome is associated with the pathology of the midline diencephalon including the dorsomedial thalamus. **Alzheimer's disease** is probably the best known type of amnesia because it is the most common type in our society. Over 40 percent of the people who are older than 80 are affected by Alzheimer's disease. It is a neurodegenerative disease and the region in the brain which is most affected is the entorhinal cortex. This cortex forms the main input and output of the hippocampus and so damages here are mostly severe. Knowing that the hippocampus is especially involved in forming new memories one can already guess the patients have difficulties in learning new information. But in late stages of Alzheimer's disease also retrograde amnesia and even other cognitive abilities, which we are not going to discuss here, might occur. center\|framed\|This figure shows the brain structures which are involved in forming new memories Final checklist of what you should keep in mind ------------------------------------------------------------------------ 1. Why does memory exist? 2. What is sensory memory? 3. What is the distinction between Short Term memory and Working Memory? 4. What is Long Term Memory and which brain area(s) are involved in forming new memories? 5. Remember the main results of the theory (For example: What does the Filter Theory show?) 6. Don't forget why we forget! # Links - Memory in Psychology,Encyclopedia of Psychology - Psychology 101 Memory and Forgetting, AllPsych ONLINE - Human Memory website of the University of Amsterdam # References ```{=html} <references/> ``` **Everyday memory - Eyewitness testimony** **Introduction** Witness psychology is the study of human as an observer and reporter of events in life. It's about how detailed and accurate we register what is happening, how well we remember what we observed, what causes us to forget and remember the mistakes, and our ability to assess the reliability and credibility of others\' stories. It is the study of observation and memory for large and small events in life, from everyday trivialities to the dramatic and traumatic events that shook our lives (Magnussen, 2010) **Basic concepts** The eyewitness identification literature has developed a number of definitions and concepts that require explanation. Each definition and concept is described below. A *lineup* is a procedure in which a criminal suspect (or a picture of the suspect) is placed among other people (or pictures of other people) and shown to an eyewitness to see if the witness will identify the suspect as the culprit in question. The term suspect should not be confused with the term culprit. A suspect might or might not be the culprit, a suspect is suspected of being the culprit (Wells & Olson, 2003) *Fillers* are people in the lineup who are not suspects. Fillers, sometimes called foils or distractors, are known-innocent members of the lineup. Therefore, the identification of filler would not result in charges being brought against the filler. A culprit-absent lineup is one in which an innocent suspect is embedded among fillers and a culprit-present lineup is one in which a guilty suspect (culprit) is embedded among fillers. The primary literature sometimes calls these target-present and target-absent lineups (Wells & Olson, 2003). A *simultaneous lineup* is one in which all lineup members are presented to the eyewitness at once and is the most common lineup procedure in use by law enforcement. A sequential lineup, on the other hand, is one in which the witness is shown only one person at a time but with the expectation that there are several lineup members to be shown (Wells & Olson, 2003). A *lineup's functional size* is the number of lineup members who are "viable" choices for the eyewitness. For example, if the eyewitness described the culprit as being a tall male with dark hair and the suspect is the only lineup member who is tall with dark hair, then the lineup's functional size would be 1.0 even if there were 10 fillers. Today functional size is used generically to mean the number of lineup members who fit the eyewitness's description of the culprit (Wells & Olson, 2003). *Mock witnesses* are people who did not actually witness the crime but are asked to pick a person from the lineup based on the eyewitness's verbal description of the culprit. They are shown the lineup and are asked to indicate who is the offender. Mock witnesses are used to test the functional size of the lineup (Wells & Olson, 2003). The *diagnosticity of suspect identification* is the ratio of accurate identification rate with a culprit-present lineup to the inaccurate identification rate with a culprit- absent lineup. The diagnosticity of "not there" is the ratio of "not there" response rates with culprit-absent lineups to "not there" response rates with culprit-present lineups. The diagnosticity of filler identifications is the ratio of filler identification rates with culprit-absent lineups to filler identification rates with culprit-present lineups (Wells & Olson, 2003) Among variables that affect eyewitness identification accuracy, a system variable is one that is, or could be, under control of the criminal justice system, while an estimator variable is one that is not. Estimator variables include lighting conditions at the time of witnessing and whether the witness and culprit are of the same or of different races. System variables include instructions given to eyewitnesses prior to viewing a lineup and the functional size of a lineup. The distinction between estimator and system variables has assumed great significance in the eyewitness identification literature since it was introduced in the late 1970s . In large part, the prominence of this distinction attests to the applied nature of the eyewitness identification literature. Whereas the development of a literature on estimator variables permits some degree of post diction that might be useful for assessing the chances of mistaken identification after the fact, the development of a system variable literature permits specification of how eyewitness identification errors might be prevented in the first place (Wells & Olson, 2003). **History and Reliability** The criminal justice system relies heavily on eyewitness identification for investigating and prosecuting crimes. Psychology has built the only scientific literature on eyewitness identification and has warned the justice system of problems with eyewitness identification evidence. Recent DNA exoneration cases have corroborated the warnings of eyewitness identification researchers by showing that mistaken eyewitness identification was the largest single factor contributing to the conviction of innocent people (Wells & Olson, 2003). Psychological researchers who began programs in the 1970s, however, have consistently articulated concerns about the accuracy of eyewitness identification. Using various methodologies, such as filmed events and live staged crimes, eyewitness researchers have noted that mistaken identification rates can be surprisingly high and that eyewitnesses often express certainty when they mistakenly select someone from a lineup. Although their findings were quite compelling to the researchers themselves, it was not until the late 1990s that criminal justice personnel began taking the research seriously. This change in attitude about the psychological literature on eyewitness identification arose primarily from the development of forensic DNA tests in the 1990s (Wells & Olson, 2003). More than 100 people who were convicted prior to the advent of forensic DNA have now been exonerated by DNA tests, and more than 75% of these people were victims of mistaken eyewitness. The apparent prescience of the psychological literature regarding problems with eyewitness identification has created a rising prominence of eyewitness identification research in the criminal justice system. Because most crimes do not include DNA-rich biological traces, reliance on eyewitness identification for solving crimes has not been significantly diminished by the development of forensic DNA tests. The vast criminal justice system itself has never conducted an experiment on eyewitness identification (Wells & Olson, 2003). **Research** The experimental method has dominated the eyewitness literature, and most of the experiments are lab based. Lab-based experimental methods for studying eyewitness issues have strengths and weaknesses. The primary strength of experimental methods is that they are proficient at establishing cause--effect relations. This is especially important for research on system variables, because one needs to know in fact whether a particular system manipulation is expected to cause better or worse performance. In the real world, many variables can operate at the same time and in interaction with one another (Wells, Memon & Penrod, 2006) Multicollinearity can be quite a problem in archival/field research, because it can be very difficult to sort out which (correlated) variables are really responsible for observed effects. The control of variables that is possible in experimental research can bring clarity to causal relationships that are obscured in archival research. For example, experiments on stress during witnessing have shown, quite compellingly, that stress interferes with the ability of eyewitnesses to identify a central person in a stressful situation. However, when Yuille and Cutshall (1986) studied multiple witnesses to an actual shooting, they found that those who reported higher stress had better memories for details than did those who reported lower stress. Why the different results? In the experimental setting, stress was manipulated while other factors were held constant; in the actual shooting, those who were closer to the incident reported higher levels of stress (presumably because of their proximity) but also had a better view. Thus, in the actual case, stress and view covaried. The experimental method is not well suited to post diction with estimator variables---that is, there may be limits to generalizing from experiments to actual cases. One reason is that levels of estimator variables in experiments are fixed and not necessarily fully representative of the values observed in actual cases. In addition, it is not possible to include all interesting and plausible interactions among variables in any single experiment (or even in a modest number of experiments). Clearly, generalizations to actual cases are best undertaken on the basis of a substantial body of experimental research conducted across a wide variety of conditions and employing a wide variety of variables. Nevertheless, the literature is largely based on experiments due to a clear preference by eyewitness researchers to learn about cause and effect. Furthermore, ''ground truth'' (the actual facts of the witnessed event) is readily established in experiments, because the witnessed events are creations of the experimenters. This kind of ground truth is difficult, if not impossible, to establish when analyzing actual cases (Wells et al. 2006). **Memory** The world is complex. All natural situations or scenes contains infinitely more physical and social information than the brain is able to detect. The brain's ability to record information is limited. In studies of immediate memory for strings of numbers that have been read once, it turns out that most people begin to go wrong if the number of single digits exceeds five (Nordby, Raanaas & Magnussen, 2002). The limitations of what humans are capable to process, leads to an automatically selection of information. This selection is partially controlled by external factors, the factors in our environment that captures our attention (Magnussen, 2010). In the witness psychology we often talk about the weapon focus, in which eyewitnesses attend to the weapon, which reduces their memory for other information (Eysenck & Keane, 2010). The selection of information in a cognitive overload situation is also governed by psychological factors, the characteristics of the person who is observing. It is about the emotional state and the explicit and implicit expectations of what will happen. Psychologists call such expectations cognitive schemas. Cognitive schemas forms a sort of hypotheses or map of the world based on past experiences. These hypotheses or mental maps of the world determines what the brain chooses of the information, and how it interprets and if it will be remembered. When information is uncertain or ambiguous, the psychological factors are strong (Magnussen, 2010). Eyewitness testimony can be distorted via confirmation bias, i.e., event memory is influenced by the observer's expectation. A study made by Lindholm and Christianson (1998), Swedish and immigrant students saw a videotaped simulated robbery in which the perpetrator seriously wounded a cashier with a knife. After watching the video, participants were shown color photographs of eight men -- four Swedes and the remainder immigrants. Both Swedish and immigrant participants were twice as likely to select an innocent immigrant as an innocent swede. Immigrants are overrepresented in Swedish crime statistics, and this influenced participants' expectations concerning the likely ethnicity of the criminal (Eysenck & Keane, 2010) Bartlett (1932) explained why our memory is influenced by our expectations. He argued that we possess numerous schemas or packets of knowledge stored in long-term memory. These schemas lead us to form a certain expectations and can distort our memory by causing us to reconstruct an event details based on "what must have been true"(Eysenck & Keane, 2010). What we select of information, and how we interpret information is partially controlled by cognitive schemas. Many cognitive schemas are generalized, and for a large automated and non-conscious, as the expectation that the world around us is stable and does not change spontaneously. Such generalized expectations are basic economic and making sure we do not have to devote so much energy to monitor the routine events of daily life, but they also contribute to the fact that we in certain situations may overlook important, but unexpected information, or supplement the memory with details who is form consistent, but who actually don´t exist (Magnussen, 2010). **Estimator variables** First, estimator variables are central to our understanding of when and why eyewitnesses are most likely to make errors. Informing police, prosecutors, judges, and juries about the conditions that can affect the accuracy of an eyewitness account is important. Second, our understanding of the importance of any given system variable is, at least at the extreme, dependent on levels of the estimator variables. Consider a case in which a victim eyewitness is abducted and held for 48 hours by an unmasked perpetrator; the witness has repeated viewings of the perpetrator, lighting is good, and so on. We have every reason to believe that this witness has a deep and lasting memory of the perpetrator's face. Then, within hours of being released, the eyewitness views a lineup. Under these conditions, we would not expect system variables to have much impact. For instance, a lineup that is biased against an innocent suspect is not likely to lead this eyewitness to choose the innocent person, because her memory is too strong to be influenced by lineup bias. On the other hand, when an eyewitness's memory is weaker, system variables have a stronger impact. Psychologists have investigated the effects on identification accuracy of a large number of estimator variables, witness, crime, and perpetrator characteristics. Here we recount findings concerning several variables that have received significant research attention and achieved high levels of consensus among experts (based on items represented in a survey by Kassin, Tubb, Hosch, & Memon, 2001) or have been the subject of interesting recent research (Wells et al. 2006). **References** Eysenck, M.E., & Keane, M.T., (2010). Cognitive psychology. A student´s Handbook (6th Edn). New York: Psychological Press Magnussen, S., (2010). Vitnepsykologi. Pålitelighet og troverdighet I dagligliv og rettssal. Oslo: Abstrakt forlag as. Nordby, K., Raanaas, R.K. & Magnussen, S. (2002). The expanding telephone number. I: Keying briefly presented multiple-digit numbers. Behavior and Information Technology, 21, 27-38. Wells, G.L., Memon, A., & Penrod, S.D. ( 2006). Eyewitness Evidence. Improving Its Probative Value, 7(2), 45-75. Wells, G.L., & Olson, E.A., (2003). Eyewitness Testimony, 54:277-95. Doi: 10.1146/annurev.psych.54.101601.145028 [^1]: Quotation from www.wwnorton.com. [^2]: Broadbent, D. E. (1958). *Perception and communication.* New York: Pergamon. [^3]: Deutsch, J. A. & Deutsch, D. (1963). Attention: Some theoretical considerations. *Psycological Review, 70*, 80-90. [^4]: Goldstein, E. B. (2005). Cognitive Psychology. London: Thomson Leaning, page 157. [^5]: Baddeley, A. D. (1986). *Working Memory*. Oxford: Oxford University Press. [^6]: Perfect, T. J., & Askew, C. (1994). Print adverts: Not remembered but memorable. *Applied Cognitive Psychology, 8*, 693-703. [^7]: Hebb, D. O. (1948). *Organization of behavior*. New York: Wiley.
# Cognitive Psychology and Cognitive Neuroscience/Memory and Language +:------------------------------+:----:+------------------------------:+ | Previous | [O | [Next | | Chapter | (Cog | roscience/Imagery "wikilink") | | | niti | | | | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ ## Introduction Introduction \"You need memory to keep track of the flow of conversation\" [^1] Maybe the interaction between memory and language does not seem very obvious at first, but this interaction is necessary when trying to lead a conversation properly. Memory is the component for storing and retrieving information. So to remember both things just said and information heard before which might be important for the conversation. Whereas language serves for following the conversational partner, to understand what he says and to reply to him in an understandable way.\ This is not a simple process which can be learned within days. In childhood everybody learns to communicate, a process lasting for years.\ So how does this work? Possible responses to the question of language acquisition are presented in this chapter.The section also provides an insight into the topic of malfunctions in the brain. Concerning dysfunctions the following questions arise: How can the system of language and memory be destroyed? What causes language impairments? How do the impairments become obvious? These are some of the topics dealt with in this chapter. Up to now, the whole profoundness of memory and language cannot be explored because the present financial resources are insufficient. And the connection between memory and language mostly becomes obvious when an impairment arises. So certain brain areas are explored when having a comparison between healthy brain and impaired brain. Then it is possible to find out what function this brain area has and how a dysfunction becomes obvious. ## Basics ### Memory Memory is the ability of the nervous system to receive and keep information. It is divided into three parts: Sensory memory, Short-term memory and Long-term memory. Sensory memory holds information for milliseconds and is separated into two components. The iconic memory is responsible for visual information, whereas auditory information is processed in the echoic memory. Short-term memory keeps information for at most half a minute. Long-term memory, which can store information over decades, consists of the conscious explicit and the unconscious implicit memory. Explicit memory, also known as declarative, can be subdivided into semantic and episodic memory. Procedural memory and priming effects are components of the implicit memory. ![](Brainlobes.svg "Brainlobes.svg") Brain regions: Brain regions Memory ------------------------------------------------------------- -------------------------------------- Frontal lobe, parietal lobe, dorsolateral prefrontal cortex Short-term Memory/ Working Memory Hippocampus Short-term Memory → Long-term Memory Medial temporal lobe (neocortex) Declarative Memory Amygdala, Cerebellum Procedural Memory For detailed information see chapter **Memory** ### Language Language is an essential system for communication which highly influences our life. This system uses sounds, symbols and gestures for the purpose of communication. Visual and auditory systems of a human body are the entrance-pathway for language to enter the brain. The motor system is responsible for speech and writing production, it serves as exit-pathway for language. The nature of language exists in the brain processes between the sensory and motor systems, especially between visual or auditory income and written or spoken outcome. The biggest part of the knowledge about brain mechanism for language is deduced from studies of language deficits resulting from brain damage. Even if there are about 10 000 different languages and dialects in the world, all of them express the subtleties of human experience and emotion. For detailed information see chapters **Comprehension** and **Neuroscience of Comprehension** ## Acquisition of language A phenomenon which occurs daily and in everybody's life is the acquisition of language. Anyhow scientists are not yet able to explain the underlying processes in detail or to define the point when language acquisition commences, even if they agree that it happens long before the first word is spoken.\ Theorists like Catherine Snow and Michael Tomasello think that the acquisition of language skills begins at birth. Others claim, it already commences in the womb. Newborns are not able to speak, even if babbling activates the brain regions later involved in speech production.\ The ability to understand the meaning of words already begins before the first birthday, even if they cannot be pronounced till then. The phonological representation of words in the memory changes between the stage of repetitive syllable-babbling and the one-word stage. At first children associate words with concrete objects, followed by an extension to the class of objects. After a period of overgeneralisation the children's system of concept approaches to the adults' one. To prove the assumption of understanding the meaning of words that early, researches at MIT let children watch two video clips of "Sesame Street". Simultaneously the children heard the sentences "Cookie Monster is tickling Big Bird" or "Big Bird is tickling Cookie Monster". The babies consistently looked more at the video corresponding to the sentence, what is an evidence for comprehension of more complex sentences, than they are able to produce during the one-word period.\ The different stages of speech production are listed in the table below. +--------------------+-----------------------+-----------------------+ | Age | Stage of Acquisition | Example | +====================+=======================+=======================+ | 6th month | Stage of babbling:\ | | | | - systematic | | | | combining of vowels | | | | and consonants | | +--------------------+-----------------------+-----------------------+ | 7th -- 10th month | Stage of repetitive | da, ma, ga | | | syllable-babbling:\ | | | | - higher part of | ------------------- | | | consonants → paired | | | | with a vowel -- | mama, dada, gaga | | | monosyllabic | | | | | | | | ------------------- | | | | | | | | reduplicated babbling | | +--------------------+-----------------------+-----------------------+ | 11th -- 12th month | Stage of variegated | bada, dadu | | | babbling:\ | | | | - combination of | | | | different consonants | | | | and vowels | | +--------------------+-----------------------+-----------------------+ | 12th month | Usage of first | car, hat | | | words - John | | | | Locke(1995):\ | | | | - prephonological → | | | | conson | | | | ant-vowel(-consonant) | | +--------------------+-----------------------+-----------------------+ Locke's theory about the usage of the first word is only a general tendency. Other researchers like Charlotte Bühler (1928), a German psychologist, think that the age of speaking the first word is around the tenth month, whereas Elizabeth Bates et al. (1992) proposed a period between eleven and 13 months. The one-word stage described above can last from two till ten months. Until the second year of life a vocabulary of about 50 words evolves, four times more than the child utilises. Two thirds of the language processed is still babbling. After this stage of learning the vocabulary increases rapidly. The so called vocabulary spurt causes an increment of about one word every two hours. From now on children learn to have fluent conversations with a simple grammar containing errors. As you can see in the following example, the length of the sentences and the grammatical output changes a lot. While raising his son, Knut keeps a tally of his son's speech production, to see how fast the language develops: Speech diary of Knut's son Andy:\ *(Year; Month)*\ *2;3: Play checkers. Big drum. I got horn. A bunny rabbit walk.*\ *2;4: See marching bear go? Screw part machine. That busy bulldozer truck.*\ *2;5: Now put boots on. Where wrench go? Mommy talking bout lady. What that paper clip doing?*\ *2;6: Write a piece a paper. What that egg doing? I lost a shoe. No, I don\'t want to sit seat.*\ *2;7: Where piece a paper go? Ursula has a boot on. Going to see kitten. Put the cigarette down. Dropped a rubber band. Shadow has hat just like that. Rintintin don\'t fly, Mommy.*\ *2;8: Let me get down with the boots on. Don\'t be afraid a horses. How tiger be so healthy and fly like kite? Joshua throw like a penguin.*\ *2;9: Where Mommy keep her pocket book? Show you something funny. Just like turtle make mud pie.*\ *2;10: Look at that train Ursula brought. I simply don\'t want put in chair. You don\'t have paper. Do you want little bit, Cromer? I can\'t wear it tomorrow.*\ *2;11: That birdie hopping by Missouri in bag? Do want some pie on your face? Why you mixing baby chocolate? I finish drinking all up down my throat. I said why not you coming in? Look at that piece a paper and tell it. We going turn light on so you can\'t see.*\ *3;0: I going come in fourteen minutes. I going wear that to wedding. I see what happens. I have to save them now. Those are not strong mens. They are going sleep in wintertime. You dress me up like a baby elephant.*\ *3;1: I like to play with something else. You know how to put it back together. I gon\' make it like a rocket to blast off with. I put another one on the floor. You went to Boston University? You want to give me some carrots and some beans? Press the button and catch it, sir. I want some other peanuts. Why you put the pacifier in his mouth? Doggies like to climb up.*\ *3;2: So it can\'t be cleaned? I broke my racing car. Do you know the light wents off? What happened to the bridge? When it\'s got a flat tire it\'s need a go to the station. I dream sometimes. I\'m going to mail this so the letter can\'t come off. I want to have some espresso. The sun is not too bright. Can I have some sugar? Can I put my head in the mailbox so the mailman can know where I are and put me in the mailbox? Can I keep the screwdriver just like a carpenter keep the screwdriver?* [^2] Obviously children are able to conjugate verbs and to decline nouns using regular rules. To produce irregular forms is more difficult, because they have to be learnt and stored in Long-term memory one by one. Rather than the repetition of words, the observation of speech is important to acquire grammatical skills. Around the third birthday the complexity of language increases exponentially and reaches a rate of about 1000 syntactic types.\ Another interesting field concerning the correlation between Memory and Language is Multilingualism. Thinking about children educated bilingual, the question arises how the two languages are separated or combined in the brain. Scientists assume that especially lexical information is stored independently for each language; the semantic and syntactic levels rather could be unified. Experiments have shown that bilinguals have a more capacious span of memory when they listen to words not only in one but in both languages. ## Disorders and Malfunctions Reading about the disorders concerning memory and language one might possibly think about amnesia or aphasia, both common diseases in the concerned brain regions. But when dealing with the correlation of memory and language we want to introduce only diseases which affect loss of memory as well as loss of language. ### Alzheimer\'s Disease Discovered in 1906 by Alois Alzheimer, this disease is the most common type of dementia. Alzheimer's is characterised by symptoms like loss of memory, loss of language skills and impairments in skilled movements. Additionally, other cognitive functions such as planning or decision-making which are connected to the frontal and temporal lobe can be reduced. The correlation between memory and language in this context is very important because they work together in order to establish conversations. When both are impaired, communication becomes a difficult task. People with Alzheimer's have reduced working memory capability, so they cannot keep in mind all of the information they heard during a conversation. They also forget words which they need to denote items, their desires and to understand what they are told. Affected persons also change their behaviour; they become anxious, suspicious or restless and they may have delusions or hallucinations. In the early stages of the disorder, sick persons become less energetic or suffer little loss of memory. But they are still able to dress themselves, to eat and to communicate. Middle stages of the disease are characterised by problems of navigation and orientation. They do not find their way home or even forget where they live. In the late stages of the disease, the patients' ability to speak, read and write decreases enormously. They are no longer able to denote objects and to talk about their feelings and desires. So their family and the nursing staff have great problems to find out what the patients want to tell them. In the end-state, the sick persons do not show any response or reaction. They lie in bed, have to be fed and are totally helpless. Most of them die after four to six years after diagnosis, although the disease can endure from three to twenty years. A cause for this is the difficulty to distinguish Alzheimer's from other related disorders. Only after death when seeing the shrinkage of the brain one can definitely say that the person was affected by Alzheimer's disease. *\"Genetic Science Learning Center, University of Utah, <http://learn.genetics.utah.edu/>* *A comparison of the two brains:*\ *In the Alzheimer brain:*\ *· The cortex shrivels up, damaging areas involved in thinking, planning and remembering.*\ *· Shrinkage is especially severe in the hippocampus, an area of the cortex that plays a key role in formation of new memories.*\ *· Ventricles (fluid-filled spaces within the brain) grow larger.* Scientists say that long before the first symptoms appear nerve cells that store and retrieve information have already begun to degenerate. There are two theories giving an explanation for the causes of Alzheimer's disease. The first describes plaques as protein fragments which defect the connection between nerve cells. They arise when little fragments release from nerve cell walls and associate with other fragments from outside the cell. These combined fragments, called plaques, append to the outside of nerve cells and destroy the connections. Then the nerve cells start to die because they are no longer provided with nutrients. As a conclusion the stimuli are no longer transferred. The second theory explains that tangles limit the functions of nerve cells. They are twisted fibers of another protein that form inside brain cells and destroy the vital cell transport made of proteins. But scientists have not yet found out the exact role of plaques and tangles. *\"Genetic Science Learning Center, University of Utah, <http://learn.genetics.utah.edu/>*\ *- Alzheimer tissue has many fewer nerve cells and synapses than a healthy brain.*\ *- Plaques, abnormal clusters of protein fragments, build up between nerve cells.*\ *Dead and dying nerve cells contain tangles, which are made up of twisted fibers of another protein.* Alzheimer's progress is separated into three stages: In the early stages (1), tangles and plaques begin to evolve in brain areas where learning, memory, thinking and planning takes place. This may begin 20 years before diagnosis. In the middle stages (2), plaques and tangles start to spread to areas of speaking and understanding speech. Also the sense of where your body is in relation to objects around you is reduced. This may last from 2--10 years. In advanced Alzheimer's disease (3), most of the cortex is damaged, so that the brain starts to shrink seriously and cells begin to die. The people lose their ability to speak and communicate and they do not recognise their family or people they know. This stage may generally last from one to five years. Today, more than 18 million people suffer from Alzheimer's disease, in Germany there are nearly 800,000 people. The number of affected persons increases enormously. Alzheimer's is often only related to old people. Five percent of the people older than 65 years and fifteen to twenty percent of the people older than 80 years suffer from Alzheimer's. But also people in the late thirties and forties can be affected by this heritable disease. The probability to suffer from Alzheimer's when parents have the typicall old-generation-Alzheimer's is not very high. ### Autism Autism is a neurodevelopment condition, which causes neurodevelopmental disorders in several fields. For the last decade, autism has been studied in light of Autistic Spectrum Disorders, including mild and severe autism, as well as Asperger\'s syndrome. Individuals with autism, for example, have restricted perception and problems in information processing. The often associated intellectual giftedness only holds for a minority of people with autism, whereas the majority possesses a normal amount of intelligence or is below the average.\ There are different types of autism, i.a.: - Asperger's syndrome -- usually arising at the age of three - infantile autism -- arising between nine and eleven months after birth The latter is important because it shows the correlation between memory and language in the children\'s behaviour very clearly. Two different types of infantile autism are the low functioning autism (LFA) and the high functioning autism (HFA). The LFA describes children with an IQ lower than 80, the HFA those with an IQ higher than 80. The disorders in both types are similar, but they are more strongly developed in children with LFA.\ The disorders are mainly defined by the following aspects: 1. the inability of normal social interaction, e.g. amicable relations to other children 2. the inability of ordinary communication, e.g. disorder of spoken language/idiosyncratic language 3. stereotypical behaviour, e.g. stereotypical and restricted interests with an atypical content To demonstrate the inability to manage normal communication and language, the University of Pittsburgh and the ESRC performed experiments to provide possible explanations. Sentences, stories or numbers were presented to children with autism and to normal children. The researchers concluded that the disorders in people with HFA and LFA are caused by an impairment in declarative memory. This impairment leads to difficulties in learning and remembering sentences, stories or personal events, whereas the ability to learn numbers is available. It has been shown that these children are not able to link words they heard to their general knowledge, thus the words are only partially learnt, with an idiosyncratic meaning. This explains why LFA and HFA affected children differ in their way of thinking from sane children. It is often difficult for them to understand others and vice versa. Furthermore scientists believe that the process of language learning depends on an initial vocabulary of fully meaningful words. It is assumed that these children do not possess such a vocabulary, thus their language development is impaired. In a few cases the acquisition of language fails completely, therefore in some cases the children are not able to use language in general. The inability of learning and using language can be a consequence of an impairment of declarative memory. It might also cause a low IQ because the process of learning is language-mediated. In HFA the IQ is not significantly lower than the IQ of sane children. This correlates well with their better understanding of word meanings. They have a milder form of autism. The experiments have also shown that adults do not have problems with the handling of language. A reason for that might be that they have been taught to use it during development or maybe they acquired this ability through reading and writing. The causes of autism are not yet explored appropriately to get some idea how to help and support those people having autism in everyday-life. It is still not clear whether the diseases are really caused by genetic disorders. It is also possible that other neurological malfunctions like brain damages or biochemical specialties are responsible for autism. The research just started to get answers to those questions.\ ## References and Resources ```{=html} <references/> ``` **Books** Steven Pinker: The Language Instinct; The Penguin Press, 1994, \ Gisela Klann-Delius: Spracherwerb; Sammlung Metzler, Bd 325; Verlag J.B.Metzler; Stuttgart, Weimar, 1999; \ Arnold Langenmayr: Sprachpsychologie - Ein Lehrbuch; Verlag für Psychologie, Hogrefe, 1997; \ Mark F. Bear, Barry W. Connors, Michael A. Paradiso: Neuroscience - Exploring The Brain; Lippincott Williams & Wilkins, 3rd edition, 2006; \ **Links** <http://de.wikipedia.org/wiki/Ged%C3%A4chtnis>\ <http://en.wikipedia.org/wiki/Memory>\ <http://www.cogsci.rpi.edu/CSJarchive/proceedings/2006/docs/p822.pdf>\ <http://www.psychology.uiowa.edu/faculty/gupta/pdf/gupta.brain+lang2003.pdf>\ <http://www.cogsci.rpi.edu/CSJarchive/1980v04/i03/p0243p0284/MAIN.PDF>\ <http://www.quarks.de/gedaechtnis/gedaechtnis.pdf>\ <http://www.alz.org/alzheimers_disease_alzheimers_disease.asp>\ <http://en.wikipedia.org/wiki/Autism>\ <http://www.apa.org/journals/releases/neu20121.pdf>\ <http://www.esrc.ac.uk/ESRCInfoCentre/Plain_English_Summaries/knowledge_communication_learning>\ /index22.aspx?ComponentId=17702&SourcePageId=11748\ [^1]: E. G. Goldstein, \"Cognitive Psychology - Connecting Mind, Research, and Everyday Experience\", page 137, THOMSON WADSWORTH TM 2005 [^2]: S. Pinker, The Language Instinct, p.269f
# Cognitive Psychology and Cognitive Neuroscience/Imagery +:------------------------------+:----:+------------------------------:+ | Previous | [O | [Next | | C | verv | Chapter | | mory_and_Language "wikilink") | niti | | | | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ of issues concerning their copyright.** ## Introduction & History Mental imagery was already discussed by the early Greek philosophers. Socrates sketched a relation between perception and imagery by assuming that visual sensory experience creates images in the human\'s mind, which are representations of the real world. Later on, Aristoteles stated that \"thought is impossible without an image\". At the beginning of the 18th century, Bishop Berkeley proposed another role of mental images - similar to the ideas of Sokrates - in his theory of idealism. He assumed that our whole perception of the external world consists only of mental images. At the end of the 19th century, Wilhelm Wundt - the generally acknowledged founder of experimental psychology and cognitive psychology - called imagery, sensations and feelings the basic elements of consciousness. Furthermore, he had the idea that the study of imagery supports the study of cognition because thinking is often accompanied by images. This remark was taken up by some psychologists and gave rise to the *imageless-thought debate*, which discussed the same question Aristoteles already had asked: Is thought possible without imagery? In the early 20th century, when Behaviourism became the main stream of psychology, Watson argued that there is no visible evidence of images in human brains and therefore, the study of imagery is worthless. This general attitude towards the value of research on imagery did not change until the birth of cognitive psychology in the 1950s and -60s. Later on, imagery has often been believed to play a very large, even pivotal, role in both memory (Yates, 1966; Paivio, 1986) and motivation (McMahon, 1973). It is also commonly believed to be centrally involved in visuo-spatial reasoning and inventive or creative thought. ## Concept Imagination is the ability to form images, perceptions, and concepts. In fact, images, perceptions and concepts are not perceived through sight, hearing or other senses. Imagine the work of the mind and help create fantasy. Imagination helps to provide meaning and provide an understanding of knowledge; imagination is the basic ability of people to create meaning for the world; imagination also plays a key role in the learning process. The basic training method for cultivating imagination is to listen to stories; when listening to stories, the accuracy of wording is the basic factor of "generating the world". Imagine any power we face. We combine what we touch, see and hear into a \"picture\" by imagination. It is widely believed that as an intrinsic ability, as a factor in perceiving the public world from the senses, in the process of inventing a partial or complete personal domain in the mind, the term is used in the professional use of psychology, meaning the mind. In the recovery process, \[source request\] restores the sensory object previously presented to the perception. Because the use of this term contradicts the use of everyday language, some psychologists tend to describe this process as an \"image process\" or \"image\", or as a \"regeneration\" imaginary process, using \"generating or constructive\" The imaginary process \"images of imagination\" are seen with the \"eye of the soul.\" Imagination can also be expressed through fairy tales or imaginary situations. The most famous invention or entertainment product is created by one\'s imagination. One hypothesis about the evolutionary process of human imagination is that imagination allows conscious species to solve problems by using psychological simulations. Children are often considered to be imaginative groups. Because their way of thinking has not yet formed, there are fewer ideological restrictions and rules than adults. Therefore, it is often imaginative. Children often use stories or pretend games to practice their imagination. When children have fantasies, they play a role on two levels: on the first level, they use role-play to achieve what they create with imagination; at the second level, they pretend to believe that the situation is to play games. In terms of behavior, what they create seems to be a real reality, and this already exists in the myth of the story. Artists often need a lot of imagination because they are engaged in creative work, and imagination can help them break existing rules and bring aesthetics into a new model. Imagine the universal use of this term, which means the process of forming an image that has not been experienced before in the mind, or the process of forming an image that is at least partially experienced or formed by different combinations. Some typical examples are as follows: fairy tale Fiction The illusion of forms inspired by fantasy novels and science fiction spurs readers to pretend that these stories are real, and by resorting to fantasy objects such as books or fantasy, these objects are not in the fantasy world. Imagination in this sense (not limited to the precise knowledge gained from actual needs) is somewhat exempt from objective limitations. Imagine being in the position of another person. This ability is very important for social relationships and social understanding. Einstein said: \"Imagination\... is more important than knowledge. Knowledge is limited. Imagination encompasses the world.\" \[8\] However, in all fields, even imagination is limited: therefore, one Human imagination does violate the basic law, or the inevitable principle of violating the actual possibility, or the possibility of rationality in a certain situation, is considered a mental disorder. The same limitations place imagination in the realm of scientific assumptions. The advancement of scientific research is largely due to some temporary explanations; these explanations are based on imagination. However, these assumptions must be made up of previously identified facts and must be coordinated with the principles of a particular science. Imagination is an experimental part of thinking that creates functional-based theories and ideas. Separate objects from real perceptions and use complex \"features\" to envision creating new ideas or changing ideas. This part of the thinking is crucial to improving and improving the way new and old tasks are completed. These experimental ideas can be implemented steadily in the field of simulation; then, if the concept is very likely and its function is real, then the concept can be implemented in reality. Imagination is the key to the new development of the soul. It shares with others and progresses together. Imagination can be divided into: Automatic imagination (from dreams and daydreams) Don\'t automatically imagine (renewable imagination, creative imagination, future dreams) ## The Imagery Debate Imagine yourself back on vacation again. You are now walking along the beach, while projecting images of white benzene-molecules onto the horizon. At once you are realizing that there are two real little white dots under your projection. Curiously you are walking towards them, until your visual field is filled by two seriously looking, but fiercely debating scientists. As they take notice of your presence, they invite you to take a seat and listen to the still unsolved imagery debate. Today's imagery debate is mainly influenced by two opposing theories: On the one hand Zenon Pylyshyn's (left) propositional theory and on the other hand Stephen Kosslyn's (right) spatial representation theory of imagery processing. ### Theory of propositional representation The theory of Propositional Representation was founded by Dr. Zenon Pylyshyn who invented it in 1973. He described it as an epiphenomenon which accompanies the process of imagery, but is not part of it. Mental images do not show us how the mind works exactly. They only show us that something is happening. Just like the display of a compact disc player. There are flashing lights that display that something happens. We are also able to conclude what happens, but the display does not show us how the processes inside the compact disc player work. Even if the display would be broken, the compact disc player would still continue to play music. #### Representation The basic idea of the propositional representation is that relationships between objects are represented by symbols and not by spatial mental images of the scene. For example, a bottle under a table would be represented by a formula made of symbols like **UNDER(BOTTLE,TABLE)**. The term *proposition* is lend from the domains of Logic and Linguistics and means the smallest possible entity of information. Each proposition can either be true or false. If there is a sentence like \"Debby donated a big amount of money to Greenpeace, an organisation which protects the environment\", it can be recapitulated by the propositions \"Debby donated money to Greenpeace\", \"The amount of money was big\" and \"Greenpeace protects the environment\". The truth value of the whole sentence depends on the truth values of its constituents. Hence, if one of the propositions is false, so is the whole sentence. #### Propositional networks This last model does not imply that a person remembers the sentence or its single propositions in its exact literal wording. It is rather assumed that the information is stored in the memory in a propositional network. !Figure 1: Example of a propositional network In Figure 1, each circle represents a single proposition. Regarding the fact that some components are connected to more than one proposition, they construct a network of propositions. Propositional networks can also have a hierarchy, if a single component of a proposition is not a single object, but a proposition itself. An example of a hierarchical propositional network describing the sentence \"John believes that Anna will pass her exam\" is illustrated in Figure 2. !Figure 2: Propositional network with hierarchy #### Complex objects and schemes Even complex objects can be generated and described by propositional representation. A complex object like a ship would consist of a structure of nodes which represent the ships properties and the relationship of these properties. Almost all humans have concepts of commonly known objects like ships or houses in their mind. These concepts are abstractions of complex propositional networks and are called schemes. For example our concept of a house includes propositions like: `Houses have rooms.`\ `Houses can be made from wood.`\ `Houses have walls.`\ `Houses have windows.`\ `...` Listing all of these propositions does not show the structure of relationships between these propositions. Instead, a concept of something can be arranged in a schema consisting of a list of attributes and values, which describe the properties of the object. Attributes describe possible forms of categorisation, while values rep- resent the actual value for each attribute. The schema-representation of a house looks like this: *`House`*\ `Category: building`\ `Material: stone, wood `\ `Contains: rooms`\ `Function: shelter for humans`\ `Shape: rectangular`\ `...` The hierarchical structure of schemes is organised in categories. For example, \"house\" belongs to the category \"building\" (which has of course its own schema) and contains all attributes and values of the parent schema plus its own specific values and attributes. This way of organising objects in our environment into hierarchical models enables us to recognise objects we have never seen before in our life, because they can possibly be related to categories we already know. #### Experimental support In an experiment performed by Wisemann und Neissner in 1974, people are shown a picture which, on first sight, seems to consist of random black and white shapes. After some time the subjects realise that there is a dalmatian dog in it. The results of this show that people who recognise the dog remember the picture better than people who do not recognise him. An possible explanation is that the picture is stored in the memory not as a picture, but as a proposition. In an experiment by Weisberg in 1969, subjects had to memorise sentences like \"Children who are slow eat bread that is cold\". Then the subjects were asked to associate the first word from the sentence that comes in their mind to a word given by the experiment conductor. Almost all subjects associated the word \"children\" to the given word \"slow\", although the word \"bread\" has a position that is more close to the given word \"slow\" than the word \"children\". An explanation for this is that the sentence is stored in the memory using the three propositions \"Children are slow\", \"Children eat bread\" and \"Bread is cold\". The subjects associated the word \"children\" with the given word \"slow\", because both belong to one proposition, while \"bread\" and \"slow\" belong to different ones. The same evidence was proven in another experiment by Ratcliff and McKoon in 1978. ### Theory of spatial representation Stephen Kosslyn\'s theory opposing Pylyshyn\'s propositional approach implies that images are not only represented by propositions. He tried to find evidence for a spatial representation system that constructs mental, analogous, three-dimensional models. The primary role of this system is to organize spatial information in a general form that can be accessed by either perceptual or linguistic mechanisms. It also provides coordinate frameworks to describe object locations, thus creating a model of a perceived or described environment. The advantage of a coordinate representation is that it is directly analogous to the structure of real space and captures all possible relations between objects encoded in the coordinate space. These frameworks also reflect differences in the salience of objects and locations consistent with the properties of the environment, as well as the ways in which people interact with it. Thus, the representations created are models of physical and functional aspects of the environment. #### Encoding What, then, can be said about the primary components of cognitive spatial representation? Certainly, the distinction between the external world and our internal view of it is essential, and it is helpful to explore the relationship between the two further from a process-oriented perspective. The classical approach assumes a complex internal representation in the mind that is constructed through a series of specific perceived stimuli, and that these stimuli generate specific internal responses. Research dealing specifically with geographic-scale space has worked from the perspective that the macro-scale physical environment is extremely complex and essentially beyond the control of the individual. This research, such as that of Lynch and of Golledge (1987) and his colleagues, has shown that there is a complex of behavioural responses generated from corresponding complex external stimuli, which are themselves interrelated. Moreover, the results of this research offers a view of our geographic knowledge as a highly interrelated external/internal system. Using landmarks encountered within the external landscape as navigational cues is the clearest example of this interrelationship. The rationale is as follows: We gain information about our external environment from different kinds of perceptual experience; by navigating through and interacting directly with geographic space as well as by reading maps, through language, photographs and other communication media. Within all of these different types of experience, we encounter elements within the external world that act as symbols. These symbols, whether a landmark within the real landscape, a word or phrase, a line on a map or a building in a photograph, trigger our internal knowledge representation and generate appropriate responses. In other words, elements that we encounter within our environment act as external knowledge stores. !Figure 3: Internal representation map{width="350"} Each external symbol has meaning that is acquired through the sum of the individual perceiver\'s previous experience. That meaning is imparted by both the specific cultural context of that individual and by the specific meaning intended by the generator of that symbol. Of course, there are many elements within the natural environment not \"generated\" by anyone, but that nevertheless are imparted with very powerful meaning by cultures (e.g., the sun, moon and stars). Man-made elements within the environment, including elements such as buildings, are often specifically designed to act as symbols as at least part of their function. The sheer size of downtown office buildings, the pillars of a bank facade and church spires pointing skyward are designed to evoke an impression of power, stability or holiness, respectively. These external symbols are themselves interrelated, and specific groupings of symbols may constitute self-contained external models of geographic space. Maps and landscape photographs are certainly clear examples of this. Elements of differing form (e.g., maps and text) can also be interrelated. These various external models of geographic space correspond to external memory. From the perspective just described, the total sum of any individual\'s knowledge is contained in a multiplicity of internal and external representations that function as a single, interactive whole. The representation as a whole can therefore be characterised as a synergistic, self-organising and highly dynamic network. #### Experimental support ##### Interaction Early experiments on imagery were already done in 1910 by Perky. He tried to find out, if there is any interaction between imagery and perception by a simple mechanism. Some subjects are told to project an image of common objects like a ship onto a wall. Without their knowledge there is a back projection, which subtly shines through the wall. Then they have to describe this picture, or are questioned about for example the orientation or the colour of the ship. In Perkys experiment, none of the 20 subjects recognised that the description of the picture did not arise from their mind, but were completely influenced by the picture shown to them. ##### Image Scanning Another seminal research in this field were Kosslyn\'s image-scanning experiments in the 1970s. Referring to the example of the mental representation of a ship, he experienced another linearity within the move of the mental focus from one part of the ship to another. The reaction time of the subjects increased with distance between the two parts, which indicates, that we actually create a mental picture of scenes while trying to solve small cognitive tasks. Interestingly, this visual ability can be observed also with congenitally blind, as Marmor and Zaback (1976) found out. Presuming, that the underlying processes are the same of sighted subjects, it could be concluded that there is a deeper encoded system that has access to more than the visual input. ##### Mental Rotation Task Other advocates of the spatial representation theory, Shepard and Metzler, developed the mental rotation task in 1971. Two objects are presented to a participant in different angles and his job is to decide whether the objects are identical or not. The results show that the reaction times increases linearly with the rotation angle of the objects. The participants mentally rotate the objects in order to match the objects to one another. This process is called \"mental chronometry\". Together with Paivio\'s memory research, this experiment was crucial for the importance of imagery within cognitive psychology, because it showed the similarity of imagery to the processes of perception. For a mental rotation of 40° the subjects needed two seconds in average, whereas for a 140° rotation the reaction time increased to four seconds. Therefore, it can be concluded that people in general have a mental object rotation rate of 50° per second. ##### Spatial Frameworks Although most research on mental models has focussed on text comprehension, researchers generally believe that mental models are perceptually based. Indeed, people have been found to use spatial frameworks like those created for texts to retrieve spatial information about observed scenes (Bryant, 1991). Thus, people create the same sorts of spatial memory representations no matter if they read about an environment or see it themselves. ##### Size and the visual field If an object is observed from different distances, it is harder to perceive details if the object is far away because the objects fill only a small part of the visual field. Kosslyn made an experiment in 1973 in which he wanted to find out if this is also true for mental images, to show the similarity of the spatial representation and the perception of real environment. He told participants to imagine objects which are far away and objects which are near. After asking the participants about details, he supposed that details can be observed better if the object is near and fills the visual field. He also told the participants to imagine animals with different sizes near by another. For example an elephant and a rabbit. The elephant filled much more of the visual field than the rabbit and it turned out that the participants were able to answer questions about the elephant more rapidly than about the rabbit. After that the participants had to imagine the small animal besides an even smaller animal, like a fly. This time, the rabbit filled the bigger part of the visual field and again, questions about the bigger animal were answered faster. The result of Kosslyn\'s experiments is that people can observe more details of an object if it fills a bigger part of their mental visual field. This provides evidence that mental images are represented spatial. ### Discussion Since the 1970s, many experiments enriched the knowledge about imagery and memory to a great extend in the course of the two opposing point of views of the imagery debate. The seesaw of assumed support was marked of lots of smart ideas. The following section is an example of the potential of such controversities. In 1978, Kossylyn expanded his image screening experiment from objects to real distances represented on maps. In the picture you see our island with all the places you encountered in this chapter. Try to imagine, how far away from each other they are. This is exactly the experiment performed by Kossylyn. Again, he predicted successfully a linear dependency between reaction time and spatial distance to support his model. !Figure 5: Support for Kosslyn\'s theory of spatial representation{width="400"} In the same year, Pylyshyn answered with what is called the \"tacit-knowledge explanation\", because he supposed that the participants include knowledge about the world without noticing it. The map is decomposed into nodes with edges in between. The increase of time, he thought, was caused by the different quantity of nodes visited until the goal node is reached. !Figure 6: Support for Pylyhsyn\'s theory of propositional representation{width="400"} Only four years later, Finke and Pinker published a counter model. Picture (1) shows a surface with four dots, which were presented to the subjects. After two seconds, it was replaced by picture (2), with an arrow on it. The subjects had to decide, if the arrow pointed at a former dot. The result was, that they reacted slower, if the arrow was farer away from a dot. Finke and Pinker concluded, that within two seconds, the distances can only be stored within a spatial representation of the surface. !Figure 7: Counter model by Finke and Pinker{width="400"} To sum it up, it is commonly believed, that imagery and perception share certain features but also differs in some points. For example, perception is a bottom-up process that originates with an image on the retina, whereas imagery is a top-down mechanism which originates when activity is generated in higher visual centres without an actual stimulus. Another distinction can be made by saying that perception occurs automatically and remains relatively stable, whereas imagery needs effort and is fragile. But as psychological discussions failed to point out one right theory, now the debate is translocated to neuroscience, which methods had promising improvements throughout the last three decades. ## Neuropsychological approach ### Investigating the brain - a way to resolve the imagery debate? Visual imagery was investigated by psychological studies relying solely on behavioural experiments until the late 1980s. By that time, research on the brain by electrophysiological measurements such as the event-related potential (ERP) and brain-imaging techniques (fMRI, PET) became possible. It was therefore hoped that neurological evidence how the brain responds to visual imagery would help to resolve the imagery debate. We will see that many results from neuroscience support the theory that imagery and perception are closely connected and share the same physiological mechanisms. Nevertheless the contradictory phenomena of double dissociations between imagery and perception shows that the overlap is not perfect. A theory that tries to take into account all the neuropsychological results and gives an explanation for the dissociations will therefore be presented in the end of this section. ### Support for shared physiological mechanisms of imagery and perception Brain imaging experiments in the 1990s confirmed the results which previous electrophysiological measurements had already made. Therein brain activity of participants was measured, using either PET or fMRI, both when they were creating visual images and when they were not creating images. These experiments showed that imagery creates activity in the striate cortex which is, being the primary visual receiving area, also active during visual perception. Figure 8 (not included yet due to copyright issues) shows how activity in the striate cortex increased both when a person perceived an object ("stimulus on") and when the person created a visual image of it ("imagined stimulus"). Although the striate cortex has not become activated by imagery in all brain-imaging studies, most results indicate that it is activated when participants are asked to create detailed images. Another approach to understand imagery has been made by studies of people with brain damage in order to determine if both imagery and perception are affected in the same way. Often, patients with perceptual problems also have problems in creating images like in the case of people having both lost the ability to see colour and to create colours through imagery. Another example is that of a patient with unilateral neglect, which is due to damage to the parietal lobes and causes that the patient ignores objects in one half of his visual field. By asking the patient to imagine himself standing at a place that is familiar to him and to describe the things he is seeing, it was found out that he did not only neglect the left side of his perceptions but also the left side of his mental images, as he could only name objects that were on the right hand side of his mental image. The idea that mental imagery and perception share physiological mechanisms is thus supported by both brain imaging experiments with normal participants and effects of brain damage like in patients with unilateral neglect. However, also contradictory results have been observed, indicating that the underlying mechanisms of perception and imagery cannot be identical. ### Double dissociation between imagery and perception A double dissociation exists when a single dissociation (one function is present another is absent) can be demonstrated in one person and the complementary type of single dissociation can be demonstrated in another person. Regarding imagery and perception a double dissociation has been observed as there are both patients with normal perception but impaired imagery and patients with impaired perception but normal imagery. Accordingly, one patient with damage to his occipital and parietal lobes was able to recognise objects and draw accurate pictures of objects placed before him, but was unable to draw pictures from memory, which requires imagery. Contrary, another patient suffering from visual agnosia was unable to identify pictures of objects even though he could recognise parts of them. For example, he did not recognise a picture of an asparagus but labelled it as "rose twig with thorns". On the other hand, he was able to draw very detailed pictures from memory which is a task depending on imagery. As double dissociation usually suggests that two functions rely on different brain regions or physiological mechanisms, the described examples imply that imagery and perception do not share exactly the same physiological mechanisms. This of course conflicts with the evidence from brain imaging measurements and other cases of patients with brain damage mentioned above that showed a close connection between imagery and perception. ### Interpretation of the neuropsychological results A possible explanation for the paradox that on the one hand there is great evidence for parallels between perception and imagery but on the other hand the observed double dissociation conflicts with these results goes as follows. Mechanisms of imagery and perception overlap only partially so that the mechanisms responsible for imagery are mainly located in higher visual centres and the mechanisms underlying perception are located at both lower and higher centres (Figure 9, not included yet due to copyright issues). Accordingly, perception is thought to constitute a bottom-up-process that starts with an image in the retina and involves processing in the retina, the Lateral Geniculate Nucleus, the striate cortex and higher cortical areas. In contrast, imagery is said to start as a top-down process, as its activity is generated in higher visual centres without any actual stimulus, that is without an image on the retina. This theory provides explanations for both the patient with impaired perception but normal imagery and the patient with normal perception but impaired imagery. In the first case, the patient's perceptual problems could be explained by damage to early processing in the cortex and his ability to still create images by the intactness of higher areas of the brain. Similarly, in the latter case, the patient\'s impaired imagery could be caused by damage to higher-level areas whereas the lower centres could still be intact. Even though this explanation fits several cases it does not fit all cases. Consequently, further research has to accomplish the task of developing an explanation that is able to explain the relation between perception and imagery sufficiently. ## Imagery and memory Besides the imagery debate, which is concerned with the question how we imagine for example objects, persons, situations and involve our senses in these mental pictures, questions concerning the memory are still untreated. In this part of the chapter about imagery we are dealing with the questions how images are encoded in the brain, and how they are recalled out of our memory. In search of answering these questions three major theories evolved. All of them explain the encoding and recalling processes different, and as usual validating experiments were realised for all these theories. In search of answering these questions, three major streams evolved. All of them try to explain the encoding and recalling processes differently and, as usual, validating experiments were realised in all streams. ### The common-code theory This view of memory and recall theories that images and words access semantic information in a single conceptual system that is neither word-like nor spatial-like. The model of common-code hypothesis that for example images and words both require analogous processing before accessing semantic information. So the semantic information of all sensational input is encoded in the same way. The consequence is that when you remember for example a situation where you were watching an apple falling down a tree, the visual information about the falling of the apple and the information about the sound, which appeared when the apple hit the ground, both are constructed on -- the -- fly in the specific brain regions (e.g. visual images in the visual cortex) out of one code stored in the brain. Another difference of this model is that it claims images require less time than words for accessing the common conceptual system. Therefore images need less time to be discriminated, because they share a smaller set of possible alternatives than words. Apart from that words have to be picked out of a much larger set of ambiguous possibilities in the mental dictionary. The heaviest point of criticism on this model is that it does not declare where this common code is stored at the end. ### The abstract-propositional theory This theory rejects any notion of the distinction between verbal and non - verbal modes of representation, but instead describes representations of experience or knowledge in terms of an abstract set of relations and states, in other words *propositions*. This theory postulates that the recall of images is better if the one who is recalling the image has some connection to the meaning of the image which is recalled. For example if you are looking at an abstract picture on which a bunch of lines is drawn, which you cannot combine in a meaningful way with each other, the recall process of this picture will be very hard (if not impossible). As reason for this it is assumed, that there is no connection to propositions, which can describe some part of the picture, and no connection to a propositional network, which reconstructs parts of the picture. The other case is, that you look at a picture with some lines in it, which you can combine in a meaningful way with each other. The recall process should be successful, because in this case you can scan for a proposition which has at least one attribute with the meaning of the image you recognised. Then this proposition returns the information which is necessary to recall it. ### The dual-code theory Unlike the common-code and abstract-propositional approaches, this model postulates that words and images are represented in functionally distinct verbal and non - verbal memory systems. To establish this model, Roland and Fridberg (1985) had run an experiment, in which the subjects had either to imagine a mnemonic or how they walk the way to their home through their neighbourhoods. While the subjects did one of this tasks, their brain was scanned with the positron emission tomography (PET). Figure 10 is a picture combining the brains of the subjects, which achieved the first and the second task. !Figure 10: Green dots represent regions which showed a higher activity during the walking home task; yellow dots represent regions which showed a higher activity during the mnemonic task. As we can see on the picture, for the processing of verbal and spatial information different brain areas are involved. The brain areas, which were active during the walking home task, are the same areas which are active during the visual perception and the information processing. And among those areas which showed activity while the mnemonic task was carried out, the Broca-centre is included, where normally language processing is located. This can be considered as an evidence for both representation types to be somehow connected with the modalities, as Paivio's theory about dual-coding suggests Anderson (1996). Can you imagine other examples, which argue for the dual-code theory? For example, you walk along the beach in the evening, there are some beach bars ahead. You order a drink, and next to you, you see a person, which seems to be familiar to you. While you drink your drink, you try to remember the name of this person, but you fail stranded, even if you can remember where you have seen the person the last time, and perhaps what you have talked about in that situation. Now imagine another situation. You walk through the city, and you pass some coffee bars, out of one of them you hear a song. You are sure that you know that song, but you cannot remember the name of the interpreter, nor the name of the song either where you have heard it. Both examples can be interpreted as indicators for the assumption that in these situations you can recall the information which you perceived in the past, but you fail in remembering the propositions you connected to them. !Figure 11: An abstract picture vs. a smiling Knut with a baseball cap In this area of research, there are of course other unanswered questions, for example why we cannot imagine smell, how the recall processes are performed or where the storage of images is located. The imagery debate is still going on, and ultimate evidence showing which of the models explains the connection between imagery and memory are missing. For now the dual-code theory seems to be the most promising model. ## References Anderson, John R. (1996). Kognitive Psychlogie: eine Einfuehrung. Heidelberg: Spektrum Akademischer Verlag. Bryant, D. J., B. Tversky, et al. (1992). "Internal and External Spatial Frameworks for Representing Described Scenes." Journal of Memory and Language 31: 74-98. Coucelis, H., Golledge, R., and Tobler, W. (1987). Exploring the anchor- point hypothesis of spatial cognition. Journal of Environmental Psychol- ogy, 7, 99-122. E.Bruce Goldstein, Cognitive Psychology, Connecting Mind, Research, and Everyday Experience (2005) - . Marmor, G.S. and Zaback, L.A. (1976). Mental Rotation in the blind: Does mental rotation depend on visual imagery?. Journal of Experimental Psychology: Human Perception and Performance, 2, 515-521. Roland, P. E. & Fridberg, L. (1985). Localization of critical areas activated by thinking. Journal of Neurophysiology, 53, 1219 -- 1243. Paivio, A. (1986). Mental representation: A dual-coding approach. New York: Oxford University Press. ## Links & Further Reading Cognitive Psychology Osnabrueck Dr. Rolf A. Zwaan\'s Homepage with many Papers **Articles** Cherney, Leora (2001): Right Hemisphere Brain Damage Grodzinsky, Yosef (2000): The neurology of syntax: Language use without Broca's area. Mueller, H. M., King, J. W. & Kutas, M. (1997). Event-related potentials elicited by spoken relative clauses; Cognitive Brain Research 4:193-203. Mueller, H.M. & Kutas, M. (1996). What's in a name? Electrophysiological differences between spoken nouns, proper names and one's own name; NeuroReport 8:221-225. Revised in July 2007 by: Alexander Blum (Spatial Representation, Discussion of the Imagery Debate, Images), Daniel Elport (Propositional Representation), Alexander Lelais (Imagery and Memory), Sarah Mueller (Neuropsychological approach), Michael Rausch (Introduction, Publishing) Authors of the first version (2006): Wendy Wilutzky, Till Becker, Patrick Ehrenbrink (Propositional Representation), Mayumi Koguchi, Da Shengh Zhang (Spatial Representation, Intro, Debate).
# Cognitive Psychology and Cognitive Neuroscience/Comprehension : \"Language is the way we interact and communicate, so, naturally, the means of communication and the conceptual background that's behind it, which is more important, are used to try to shape attitudes and opinions and induce conformity and subordination. Not surprisingly, it was created in the more democratic societies.\" - Noam Chomsky Language is a central part of everyday life and communication a natural human necessity. For those reasons, there has been a high interest in their properties. However, describing the processes of language turns out to be quite hard. We can define language as a system of communication through which we code and express our feelings, thoughts, ideas and experiences. Already Plato was concerned with the nature of language in his dialogue "Cratylus", where he discussed first ideas about nowadays important principles of linguistics namely morphology and phonology. Gradually philosophers, natural scientists and psychologists became interested in features of language. Since the emergence of the cognitive science in the 1950\'s and Chomsky´s criticism on the behaviourist view, language is seen as a cognitive ability of humans, thus incorporating linguistics in other major fields like computer science and psychology. Today, psycho-linguistics is a discipline on its own and its most important topics are acquisition, production and comprehension of language. Especially in the 20th century, many studies concerning communication have been conducted, evoking new views on old facts. New techniques, like CT, MRI and fMRI or EEG, as described in Methods of Behavioural and Neuroscience Methods, made it possible to observe brain during communication processes in detail. Later on, an overview of the most popular experiments and observed effects is presented. But in order to understand those, one needs to have a basic idea of semantics and syntax as well as of linguistic principles for processing words, sentences and full texts. Finally, some questions will arise: How is language affected by culture? Or in philosophical terms, the discussion about the relationship between language and thoughts has to be developed. ## Historical review on Psycholinguistics & Neurolinguistics Starting with philosophical approaches, the nature of the human language had ever been a topic of interest. Galileo in the 16th century saw the human language as the most important invention of humans. Later on in the 18th century the scientific study of language began by psychologists. Wilhelm Wundt (founder of the first laboratory of psychology) saw language as the mechanism by which thoughts are transformed into sentences. The observations of Wernike and Broca (see chapter 9) were milestones in the studies of language as a cognitive ability. In the early 1900s the behaviouristic view influenced the study of language very much. In 1957 B.F.Skiner published his book \"Verbal Behaviour\", in which he proposed that learning of language can be seen as a mechanism of reinforcement. Noam Chomsky (quoted at the beginning of this chapter) published in the same year \"Syntactic Structures\". He proposed that the ability to invent language is somehow coded in the genes. That led him to the idea that the underlying basis of language is similar across cultures. There might be some kind of universal grammar as a base, independent of what kind of language (including sign language) might be used by humans. Further on Chomsky published a review of Skinner´s \"Verbal Behaviour\" in which he presented arguments against the behaviouristic view. There are still some scientists who are convinced that it does not need a mentalist approach like Chomsky proposed, but in the meantime most agree that human language has to be seen as a cognitive ability. \[edit\] Current goals of Psycholinguistics A natural language can be analysed at a number of different levels. In linguistics we differ between phonology (sounds), morphology (words), syntax (sentence structure), semantics (meaning), and pragmatics (use). Linguists try to find systematic descriptions capturing the regularities inherent in the language itself. But a description of natural language just as a abstract structured system, can not be enough. Psycholinguists rather ask, how the knowledge of language is represented in the brain, and how it is used. Today\'s most important research topics are: 1. comprehension: How humans understand spoken as well as written language, how language is processed and what interactions with memory are involved. 2. speech production: Both the physical aspect of speech production, and the mental process that stands behind the uttering of a sentence. 3. acquisition: How people learn to speak and understand a language. ## Characteristic features What is a language? What kinds of languages do exist? Are there characteristic features that are unique in human language? There are plenty of approaches how to describe languages. Especially in computational linguistics, researchers try to find formal definitions for different kinds of languages. But for psychology other aspects of language than its function as pure system of communication are of central interest. Language is also a tool we use for social interactions starting with the exchange of news up to the identification of social groups by their dialect. We use it for expressing our feelings, thoughts, ideas etc. Although there are plenty ways to communicate (consider Non-Human-Language) humans expect their system of communication - the human language to be unique. But what is it that makes the human language so special and unique? Four major criteria have been proposed by Professor Franz Schmalhofer from the University of Osnabrück as explained below: - semanticity - displacement - creativity - structure dependency Semanticity means the usage of symbols. Symbols can either refer to objects or to relations between objects. In the human language words are the basic form of symbols. For example the word \"book\" refers to an object made of paper on which something might be written. A relation symbol is the verb \"to like\" which refers to the sympathy of somebody to something or someone. The criterion of displacement means that not only objects or relations at presence can be described but there are also symbols which refer to objects in another time or place. The word \"yesterday\" refers to day before and objects mentioned in a sentence with \"yesterday\" refer to objects from another time than the present one. Displacement is about the communication of events which had happened or will happen and the objects belonging to that event. Having a range of symbols to communicate these symbols can be newly combined. Creativity is the probable most important feature. Our communication is not restricted to a fixed set of topics or predetermined messages. The combination of a finite set of symbols to an infinite number of sentences and meaning. With the infinite number of sentences the creation of novel messages is possible. How creative the human language is can be illustrated by some simple examples like the process that creates verbs from nouns. New words can be created, which do not exist so far, but we are able to understand them. Examples: leave the boat on the beach -\> beach the boat keep the aeroplane on the ground -\> ground the aeroplane write somebody an e-mail -\> e-mail somebody Creative systems are also found in other aspects of language, like the way sounds are combined to form new words. i.e. prab, orgu, zabi could be imagined as names for new products. To avoid an arbitrary combination of symbols without any regular arrangement \"true\" languages need structure dependency. Combining symbols the syntax is relevant. A change in the symbol order might have an impact on the meaning of the sentence. For example "The dog bites the cat" has obviously a different meaning than "The cat bites the dog" based on the different word arrangement of the two sentences. \[edit\] Non-Human Language - Animal Communication \[edit\] Forms of Communication As mentioned before human language is just one of quite a number of communication forms. Different forms of communication can be found in the world of animals. From a little moth to a giant whale, all animals appear to have the use of communication. Not only humans use facial expression for stressing utterances or feeling, facial expressions can be found among apes. The expression, for example \"smiling\" indicates cooperativeness and friendliness in both the human and the ape world. On the other hand an ape showing teeth indicates the willingness to fight. Posture is a very common communicative tool among animals. Lowering the front part of the body and extending the front legs is a sign of dogs that they are playful whereas lowering the full body is a dog's postural way to show its submissiveness. Postural communication is known in both human and non-human primates. Besides facial expression, gesture and posture that are found in human communication, there are other communicative devices which are either just noticeable by the sub-consciousness of humans like scent or cannot be found amongst humans like light, colour and electricity. The chemicals which are used for a communicative function are called pheremones. Those pheremones are used to mark territorial or to signal its reproductive readiness. For animals scent is a very important tool which predominates their mating behaviour. Humans are influenced in their mating behaviour by scent as well but there are more factors to that behaviour so that scent is not predominating. The insects use species-dependent light patterns to signal identity, sex and location. For example the octopus changes colour for signalling territorial defence and mating readiness. In the world of birds colour is wide spread, too. The male peacock has colourful feathering to impress female peahens as a part of mating behaviour. These ways of communication help to live in a community and survive in certain environment. \[edit\] Characteristic Language Features in Animal Communication As mentioned above it is possible to describe the uniqueness of human language by four criteria (semanticity, displacement, creativity and structural dependency) which are important devices in the human language to form a clear communication between humans. To see if these criteria exist in animal communication - i.e. if animals possess a \"true\" language - several experiments with non-human primates were performed. Non-human primates were taught American Sign Language (ASL) and a specially developed token language to detect in how far they are capable of linguistic behaviour. Can semanticity, displacement, creativity and structure dependency be found in non-human language? Experiments 1. In 1931, comparative psychologist Winthrop Niles Kellogg and his wife started an experiment with a chimpanzee, which he raised alongside his own child. The purpose was of course to see how environment influenced development, could chimpanzee be more like human? Eventually the experiment failed, the factors are: the behavior of their son started to become more and more chimpanzee-like and also the tiredness of having to do both experiment and raising two babies at the same time. 2. Human language In 1948, in Orange Park, Florida, Keith and Cathy Hayes tried to teach English words to a chimpanzee named Viki. She was raised as if she were a human child. The chimpanzee was taught to \"speak\" easy English words like \"cup\". The experiment failed since with the supralanyngal anatomy and the vocal fold structure that chimpanzees have it is impossible for them to produce human speech sounds. The failure of the Viki experiment made scientists wonder how far are non-human primates able to communicate linguistically. 3. Sign language From 1965 to 1972 the first important evidence showing rudiments of linguistic behaviour was \"Washoe\", a young female chimpanzee. The experimenters Allen and Beatrice Gardner conducted an experiment where Washoe learned 130 signs of the American Sign Language within three years. Showing pictures of a duck to Washoe and asking WHAT THAT? she combined the symbols of WATER and BIRD to create WATER BIRD as she had not learned the word DUCK (the words in capital letters refer to the signs the apes use to communicate with the experimenter). It was claimed that Washoe was able to arbitrarily combine signs spontaneously and creatively. Some scientists criticised the ASL experiment of Washoe because they claimed that ASL is a loose communicative system and strict syntactic rules are not required. Because of this criticism different experiments were developed and performed which focus on syntactic rules and structure dependency as well as on creative symbol combination. A non-human primate named \"Kanzi\" was trained by Savage-Rumbaugh in 1990. Kanzi was able to deal with 256 geometric symbols and understood complex instructions like GET THE ORANGE THAT IS IN THE COLONY ROOM. The experimenter worked with rewards. A question which arose was whether these non-human primates were able to deal with human-like linguistic capacities or if they were just trained to perform a certain action to get the reward. For more detailed explanations of the experiments see The Mind of an Ape. Can the characteristic language features be found in non-human communication? Creativity seems to be present in animal communication as amongst others Washoe showed with the creation of WATER BIRD for DUCK. Although some critics claimed that creativity is often accidental or like in the case of Washoe's WATER BIRD the creation relays on the fact that water and bird were present. Just because of this presence Washoe invented the word WATER BIRD. In the case of Kanzi a certain form of syntactic rules was observed. In 90% of Kanzi's sentences there was first the invitation to play and then the type of game which Kanzi wanted to play like CHASE HIDE, TICKLE SLAP and GRAB SLAP. The problem which was observed was that it is not always easy to recognise the order of signs. Often facial expression and hand signs are performed at the same time. One ape signed the sentence I LIKE COKE by hugging itself for "like" and forming the sign for "coke" with its hands at the same time. Noticing an order in this sign sentence was not possible. A certain structural dependency could be observed at Kanzi's active and passive sentences. When Matata, a fellow chimpanzee was grabbed Kanzi signed GRAB MATATA and when Matata was performing an action such as biting Kanzi produced MATATA BITE. It has not yet been proved that symbolic behaviour is occurring. Although there are plenty evidences that creativity and displacement occur in animal communication some critics claim that these evidences can be led back to dressage and training. It was claimed that linguistic behaviour cannot be proved as it is more likely to be a training to correctly use linguistic devices. Apes show just to a little degree syntactic behaviour and they are not able to produce sentences containing embedded structures. Some linguists claim that because of such a lack of linguistic features non-human communication cannot be a "true" language. Although we do not know the capacity of an ape\'s mind it does not seem that the range of meanings observed in ape\'s wild life approach the capaciousness of semanticity of human communication. Furthermore apes seem not to care to much about displacement as it appears that they do not communicate about imaginary pasts or futures. All in all non-human primate communication consisting of graded series of communication shows little arbitrariness. The results with non-human primates led to a controversial discussion about linguistic behaviour. Many researchers claimed that the results were influenced by dressage. For humans language is a communication form suited to the patterns of human life. Other communication systems are better suited for fellow creatures and their mode of existence. Now that we know that there is a difference between animal communication and human language we will see detailed features of the human language. \[edit\] Language Comprehension & Production \[edit\] Language features -- Syntax and Semantics In this chapter the main question will be "how do we understand sentences?". To find an answer to that problem it is necessary to have a closer look at the structure of languages. The most important properties every human language provides are rules which determine the permissible sentences and a hierarchical structure (phonemes as basic sounds, which constitute words, which in turn constitute phrases, which constitute sentences, which constitute texts). These feature of a language enable humans to create new unique sentences. The fact that all human languages have a common ground even if they developed completely independent from one another may lead to the conclusion that the ability to process language must be innate. Another evidence of a inborn universal grammar is that there were observations of deaf children who were not taught a language and developed their own form of communication which provided the same basic constituents. Two basic abilities human beings have to communicate is to interpret the syntax of a sentence and the knowledge of the meaning of single words, which in combination enables them to understand the semantic of whole sentences. Many experiments have been done to find out how the syntactical and semantical interpretation is done by human beings and how syntax and semantics works together to construct the right meaning of a sentence. Physiological experiments had been done in which for example the event-related potential (ERP) in the brain was measured as well as behavioristic experiments in which mental chronometry, the measurement of the time-course of cognitive processes, was used. Physiological experiments showed that the syntactical and the semantical interpretation of a sentence takes place separately from each other. These results will be presented below in more detail. ## Physiological Approach Semantical incorrectness in a sentence evokes an N400 in the ERP The exploration of the semantic sentence processing can be done by the measurement of the event-related potential (ERP) when hearing a semantical correct sentence in comparison to a semantical incorrect sentence. For example in one experiment three reactions to sentences were compared: Semantically correct: "The pizza was too hot to eat." Semantically wrong: "The pizza was too hot to drink." Semantically wrong: "The pizza was too hot to cry." In such experiments the ERP evoked by the correct sentence is considered to show the ordinary sentence processing. The variations in the ERP in case of the incorrect sentences in contrast to the ERP of the correct sentence show at what time the mistake is recognized. In case of semantic incorrectness there was observed a strong negative signal about 400ms after perceiving the critical word which did not occure, if the sentence was semantically correct. These effects were observed mainly in the partial and central area. There was also found evidence that the N400 is the stronger the less the word fits semantically. The word "drink" which fits a little bit more in the context caused a weaker N400 than the word "cry". That means the intensity of the N400 correlates with the degree of the semantic mistake. The more difficult it is to search for a semantic interpretation of a sentence the higher is the N400 response. To examine the syntactical aspects of the sentence processing a quite similar experiment as in the case of the semantic processing was done. There were used syntactical correct sentences and incorrect sentences, such as (correct:)"The cats won´t eat..." and (incorrect:)"The cats won´t eating...". When hearing or reading a syntactical incorrect sentence in contrast to a syntactical correct sentence the ERP changes significantly on two different points of time. First of all there a very early increased response to syntactical incorrectness after 120ms. This signal is called the 'early left anterior negativity' because it occurs mainly in the left frontal lobe. This advises that the syntactical processing is located amongst others in Broca\'s area which is located in the left frontal lobe. The early response to syntactical mistakes also indicates that the syntactical mistakes are detected earlier than semantic mistakes. The other change in the ERP when perceiving a syntactical wrong sentence occurs after 600ms in the partial lobe. The signal is increasing positively and is therefore called P600. Possibly the late positive signal is reflecting the attempt to reconstruct the grammatical problematic sentence to find a possible interpretation. <File:Cpnp3001.jpg> Syntactical incorrectness in a sentence evokes after 600ms a P600 in the electrodes above the partial lobe. To summarize the three important ERP-components: First of all there occurs the ELAN at the left frontal lobe which shows a violation of syntactical rules. After it follows the N400 in central and partial areas as a reaction to a semantical incorrectness and finally there occurs a P600 in the partial area which probably means a reanalysis of the wrong sentence. ## Behavioristic Approach -- Parsing a Sentence Behavioristic experiments about how human beings parse a sentence often use syntactically ambiguous sentences. Because it is easier to realize that sentence-analysing mechanisms called parsing take place when using sentences in which we cannot automatically constitute the meaning of the sentence. There are two different theories about how humans parse sentences. The syntax-first approach claims that syntax plays the main part whereas semantics has only a supporting role, whereas the interactionist approach states that both syntax and semantics work together to determine the meaning of a sentence. Both theories will be explained below in more detail. The Syntax-First Approach of Parsing The syntax-first approach concentrates on the role of syntax when parsing a sentence. That humans infer the meaning of a sentence with help of its syntactical structure (Kako and Wagner 2001) can easily be seen when considering Lewis Carroll´s poem 'Jabberwocky': \"Twas brillig, and the slithy toves Did gyre and gimble in the wabe: All mimsy were the borogoves, And the mome raths outgrabe.\" Although most of the words in the poems have no meaning one may ascribe at least some sense to the poem because of its syntactical structure. There are many different syntactic rules that are used when parsing a sentence. One important rule is the principle of late closure which means that a person assumes that a new word he perceives is part of the current phrase. That this principle is used for parsing sentences can be seen very good with help of a so called garden-path sentence. Experiments with garden-path sentences have been done by Frazier and Fayner 1982. One example of a garden-path sentence is: "Because he always jogs a mile seems a short distance to him." When reading this sentence one first wants to continue the phrase "Because he always jogs" by adding "a mile" to the phrase, but when reading further one realizes that the words "a mile" are the beginning of a new phrase. This shows that we parse a sentence by trying to add new words to a phrase as long as possible. Garden-path sentences show that we use the principle of late closure as long it makes syntactically sense to add a word to the current phrase but when the sentence starts to get incorrect semantics are often used to rearrange the sentence. The syntax-first approach does not disregard semantics. According to this approach we use syntax first to parse a sentence and semantics is later on used to make sense of the sentence. Apart from experiments which show how syntax is used for parsing sentences there were also experimens on how semantics can influence the sentence processing. One important experiment about that issue has been done by Daniel Slobin in 1966. He showed that passive sentences are understood faster if the semantics of the words allow only one subject to be the actor. Sentences like "The horse was kicked by the cow." and "The fence was kicked by the cow." are grammatically equal and in both cases only one syntactical parsing is possible. Nevertheless the first sentence semantically provides two subjects as possible actors and therefore it needs longer to parse this sentence. By measuring this significant difference Daniel Slobin showed that semantics play an important role in parsing a sentence, too. ## The Interactionist Approach of Parsing The interactionist approach ascribes a more central role to semantics in parsing a sentence. In contrast to the syntax-first approach, the interactionist theory claims that syntax is not used first but that semantics and syntax are used simultaneously to parse the sentence and that they work together in clarifying the meaning. There have been several experiments which provide evidence that semantics are taken into account from the very beginning reading a sentence. Most of these experiments are working with the eye-tracking techniques and compare the time needed to read syntactical equal sentences in which critical words cause or prohibit ambiguity by semantics. One of these experiments was done by John Trueswell and coworkers in 1994. He measured the eye movement of persons when reading the following two sentences: The defendant examined by the lawyer turned out to be unreliable. The evidence examined by the lawyer turned out to be unreliable. He observed that the time needed to read the words "by the lawyer" took longer in case of the first sentence because in the first sentence the semantics first allow an interpretation in which the defendant is the one who examines, while the evidence only can be examined. This experiment shows that the semantics also play a role while reading the sentence which supports the interactionist approach and argues against the theory that semantics are only used after a sentence has been parsed syntactically. \[edit\] Inferences Creates Coherence Coherence is the semantic relation of information in different parts of a text to each other. In most cases coherence is achieved by inference; that means that a reader draws information out of a text that is not explicitly stated in this text. For further information the chapter \[Neuroscience of Text Comprehension\] should be considered. ## Situation Model A situation model is a mental representation of what a text is about. This approach proposes that the mental representation people form as they read a story does not indicate information about phrases, sentences, paragraphs, but a representation in terms of the people, objects, locations, events described in the story (Goldstein 2005, p. 374) For a more detailed description of situation models, see Situation Models ## Using Language Conversations are dynamic interactions between two or more people (Garrod &Pickering, 2004 as cited in Goldstein 2005). The important thing to mention is that conversation is more than the act of speaking. Each person brings in his or her knowledge and conversations are much easier to process if participants bring in shared knowledge. In this way, participants are responsible of how they bring in new knowledge. H.P. Grice proposed in 1975 a basic principle of conversation and four "conversational maxims." His cooperative principle states that "the speaker and listener agree that the person speaking should strive to make statements that further the agreed goals of conversation." The four maxims state the way of how to achieve this principle. 1\. Quantity: The speaker should try to be informative, no over-/underinformation. 2\. Quality: Do not say things which you believe to be false or lack evidence of. 3\. Manner: Avoiding being obscure or ambiguous. 4\. Relevance: Stay on topic of the exchange. An example of a rule of conversation incorporating three of those maxims is the given-new-contract. It states that the speaker should construct sentences so that they include given and new information. (Haviland & Clark, 1974 as cited in Goldstein, 2005). Consequences of not following this rule were demonstrated by Susan Haviland and Herbert Clark by presenting pairs of sentences (either following or ignoring the given-new-contract) and measuring the time participants needed until they fully understood the sentence. They found that participants needed longer in pairs of the type: `   We checked the picnic supplies. `\ `   The beer was warm.`\ \ `   Rather than:`\ `   We got some beer out of the trunk. `\ `   The beer was warm.` The reason that it took longer to comprehend the second sentence of the first pair is that inferencing has to be done (beer has not been mentioned as being part of the picnic supplies). (Goldstein, 2005, p. 377-378) ## Language, Culture and Cognition In the parts above we saw that there has been a lot of research of language, from letters through words and sentences to whole conversations. Most of the research described in the parts above was processed by English speaking researchers and the participants were English speaking as well. Can those results be generalised for all languages and cultures or might there be a difference between English speaking cultures and for example cultures with Asian or African origin? Imagine our young man from the beginning again: Knut! Now he has to prepare a presentation with his friend Chang for the next psychology seminar. Knut arrives at his friend's flat and enters his living-room, glad that he made it there just in time. They have been working a few minutes when Chang says: "It has become cold in here!" Knut remembers that he did not close the door, stands up and\..."stop! What is happening here?!" This part is concerned with culture and its connection to language. Culture, not necessarily in the sense of \"high culture\" like music, literature and arts but culture is the \"know-how\" a person must have to tackle his or her daily life. This know-how might include high culture but it is not necessary. ## Culture and Language Scientists wondered in how far culture affects the way people use language. In 1991 Yum studied the indirectness of statements in Asian and American conversations. The statement \"Please shut the door\" was formulated by Americans in an indirect way. They might say something like \"The door is open\" to signal that they want to door to be shut. Even more indirect are Asian people. They often do not even mention the door but they might say something like \"It is somewhat cold today\". Another cultural difference affecting the use of language was observed by Nisbett in 2003 in observation about the way people pose questions. When American speaker ask someone if more tea is wanted they ask something like \"More tea?\". Different to this Asian people would ask if the other one would like more drinking as for Asians it seems obvious that tea is involved and therefore mentioning the tea would be redundant. For Americans it is the other way round. For them it seems obvious that drinking is involved so they just mention the tea. This experiment and similar ones indicate that people belonging to Asian cultures are often relation orientated. Asians focus on relationships in groups. Contrasting, the Americans concentrate on objects. The involved object and its features are more important than the object\'s relation to other objects. These two different ways of focusing shows that language is affected by culture. A experiment which clearly shows these results is the mother-child interaction which was observed by Fernald and Morikawa in 1993. They studied mother-child talk of Asian and American mothers. An American mother trying to show and explain a car to her child often repeated the object \"car\" and wants the child to repeat it as well. The mother focuses on the features of the car and labels the importance of the object itself. The Asian mother shows the toy car to her child, gives the car to the child and wants it to give the car back. The mother shortly mentions that the object is a car but concentrates on the importance of the relation and the politeness of giving back the object. Realising that there are plenty differences in how people of different cultures use language the question arises if languages affects the way people think and perceive the world. ## What is the connection between language and cognition? ### Sapir-Whorf Hypothesis In the 1950s Edward Sapir and Benjamin Whorf proposed the hypothesis that the language of a culture affects the way people think and perceive. The controversial theory was question by Elenor Rosch who studied colour perception of Americans and Danis who are members of an stone-age agricultural culture in the Iran. Americans have several different categories for colour as for example blue, red, yellow and so on. Danis just have two main colour categories. The participants were ask to recall colours which were shown to them before. That experiment did not show significant differences in colour perception and memory as the Sapir-Whorf hypothesis presumes. <File:Color-naming> exp.jpg Color-naming experiment by Roberson et al. (2000) ### Categorical Perception Nevertheless a support for the Sapir-Whorf hypothesis was Debi Roberson\'s demonstration for categorical perception based on the colour perception experiment by Rosch. The participants, a group of English-speaking British and another group of Berinmos from New Guinea were ask to name colours of a board with colour chips. The Berinmos distinguish between five different colour categories and the denotation of the colour names is not equivalent to the British colour denotation. Apart from these differences there are huge differences in the organisation of the colour categories. The colours named green and blue by British participants where categorised as nol which also covers colours like light-green, yellow-green, and dark blue. Other colour categories differ similarly. The result of Roberson\'s experiment was that it is easier for British people to discriminate between green and blue whereas Berinmos have less difficulties distinguishing between Nol and Wap. The reaction to colour is affected by language, by the vocabulary we have for denoting colours. It is difficult for people to distinguish colours from the same colour category but people have less trouble differentiating between colours from different categories. Both groups have categorical colour perception but the results for naming colours depends on how the colour categories were named. All in all it was shown that categorical perception is influenced by the language use of different cultures. These experiments about perception and its relation to cultural language usage leads to the question whether thought is related to language with is cultural differences. ## Is thought dependent on, or even caused by language? ### Historical theories An early approach was proposed by J.B. Watson's in 1913. His peripheralist approach was that thought is a tiny not noticeable speech movement. While thinking a person performs speech movements as he or she would do while talking. A couple year later, in 1921 Wittgenstein poses the theory that the limits of a person\'s language mean the limits of that person\'s world. As soon as a person is not able to express a certain content because of a lack of vocabulary that person is not able to think about those contents as they are outside of his or her world. Wittgenstein\'s theory was doubted by some experiments with babies and deaf people. ### Present research To find some evidence for the theory that language and culture is affecting cognition Lian-hwang Chiu designed an experiment with American and Asian children. The children were asked to group objects in pairs so that these objects fit together. On picture that was shown to the children there was a cow, a chicken and some grass. The children had to decided which of the two objects fitted together. The American children mostly grouped cow and chicken because of group of animals they belong to. Asian children more often combined the cow with the grass as there is the relation of the cow normally eating grass. In 2000 Chui repeated the experiment with words instead of pictures. A similar result was observed. The American children sorted their pairs taxonomically. Given the words \"panda\", \"monkey\" and \"banana\" American children paired \"panda\" and monkey\". Chinese children grouped relationally. They put \"monkey\" with \"banana\". Another variation of this experiment was done with bilingual children. When the task was given in English to the children they grouped the objects taxonomically. A Chinese task caused a relational grouping. The language of the task clearly influenced on how to group the objects. That means language may affects the way people think. The results of plenty experiments regarding the relation between language, culture and cognition let assume that culture affects language and cognition is affected by language.Our way of thinking is influenced by the way we talk and thought can occur without language but the exact relation between language and thought remains to be determined. ## Introduction *\"Language is the way we interact and communicate, so, naturally, the means of communication and the conceptual background that's behind it, which is more important, are used to try to shape attitudes and opinions and induce conformity and subordination. Not surprisingly, it was created in the more democratic societies.\"* - Chomsky Language is a central part of everyday life and communication a natural human necessity. For those reasons there has been a high interest in their properties. However describing the processes of language turns out to be quite hard. We can define language as a system of communication through which we code and express our feelings, thoughts, ideas and experiences.[^1] Already Plato was concerned with the nature of language in his dialogue "Cratylus", where he discussed first ideas about nowadays important principles of linguistics namely morphology and phonology. Gradually philosophers, natural scientists and psychologists became interested in features of language. Since the emergence of the cognitive science in the 50\'s and Chomsky´s criticism on the behaviourist view, language is seen as a cognitive ability of humans, thus incorporating linguistics in other major fields like computer science and psychology. Today, psycho-linguistics is a discipline on its own and its most important topics are acquisition, production and comprehension of language. Especially in the 20th century many studies concerning communication have been conducted, evoking new views on old facts. New techniques, like CT, MRI and fMRI or EEG, as described in Methods of Behavioural and Neuroscience Methods, made it possible to observe brain during communication processes in detail. Later on an overview of the most popular experiments and observed effects is presented. But in order to understand those one needs to have a basic idea of semantics and syntax as well as of linguistic principles for processing words, sentences and full texts. Finally some questions will arise: How is language affected by culture? Or in philosophical terms, the discussion about the relationship between language and thoughts has to be developed. ## Language as a cognitive ability ### Historical review on Psycholinguistics & Neurolinguistics Starting with philosophical approaches, the nature of the human language had ever been a topic of interest. Galileo in the 16th century saw the human language as the most important invention of humans. Later on in the 18th century the **scientific** study of language began by psychologists. Wilhelm Wundt (founder of the first laboratory of psychology) saw language as the mechanism by which thoughts are transformed into sentences. The observations of Wernike and Broca (see chapter 9) were milestones in the studies of language as a cognitive ability. In the early 1900s the behaviouristic view influenced the study of language very much. In 1957 B.F.Skiner published his book \"Verbal Behaviour\", in which he proposed that learning of language can be seen as a mechanism of reinforcement. Noam Chomsky (quoted at the beginning of this chapter) published in the same year \"Syntactic Structures\". He proposed that the ability to invent language is somehow coded in the genes. That led him to the idea that the underlying basis of language is similar across cultures. There might be some kind of universal grammar as a base, independent of what kind of language (including sign language) might be used by humans. Further on Chomsky published a review of Skinner´s \"Verbal Behaviour\" in which he presented arguments against the behaviouristic view. There are still some scientists who are convinced that it does not need a mentalist approach like Chomsky proposed, but in the meantime most agree that human language has to be seen as a cognitive ability. ### Current goals of Psycholinguistics A natural language can be analysed at a number of different levels. In linguistics we differ between phonology (sounds), morphology (words), syntax (sentence structure), semantics (meaning), and pragmatics (use). Linguists try to find systematic descriptions capturing the regularities inherent in the language itself. But a description of natural language just as a abstract structured system, can not be enough. Psycholinguists rather ask, how the knowledge of language is represented in the brain, and how it is used. Today\'s most important research topics are: 1\) comprehension: How humans understand spoken as well as written language, how language is processed and what interactions with memory are involved. 2\) speech production: Both the physical aspect of speech production, and the mental process that stands behind the uttering of a sentence. 3\) acquisition: How people learn to speak and understand a language. ### Characteristic features What is a language? What kinds of languages do exist? Are there characteristic features that are unique in human language? There are plenty of approaches how to describe languages. Especially in computational linguistics researchers try to find formal definitions for different kinds of languages. But for psychology other aspects of language than its function as pure system of communication are of central interest. Language is also a tool we use for social interactions starting with the exchange of news up to the identification of social groups by their dialect. We use it for expressing our feelings, thoughts, ideas etc. Although there are plenty ways to communicate (consider Non-Human-Language) humans expect their system of communication - the human language to be unique. But what is it that makes the human language so special and unique? Four major criteria have been proposed by Professor Franz Schmalhofer from the University of Osnabrück as explained below: -semanticity -displacement -creativity -structure dependency **Semanticity** means the usage of symbols. Symbols can either refer to objects or to relations between objects. In the human language words are the basic form of symbols. For example the word \"book\" refers to an object made of paper on which something might be written. A relation symbol is the verb \"to like\" which refers to the sympathy of somebody to something or someone. The criterion of **displacement** means that not only objects or relations at presence can be described but there are also symbols which refer to objects in another time or place. The word \"yesterday\" refers to day before and objects mentioned in a sentence with \"yesterday\" refer to objects from another time than the present one. Displacement is about the communication of events which had happened or will happen and the objects belonging to that event. Having a range of symbols to communicate these symbols can be newly combined. **Creativity** is the probable most important feature. Our communication is not restricted to a fixed set of topics or predetermined messages. The combination of a finite set of symbols to an infinite number of sentences and meaning. With the infinite number of sentences the creation of novel messages is possible. How creative the human language is can be illustrated by some simple examples like the process that creates verbs from nouns. New words can be created, which do not exist so far, but we are able to understand them. Examples: leave the boat on the beach -\> beach the boat keep the aeroplane on the ground -\> ground the aeroplane write somebody an e-mail -\> e-mail somebody Creative systems are also found in other aspects of language, like the way sounds are combined to form new words. i.e. prab, orgu, zabi could be imagined as names for new products. To avoid an arbitrary combination of symbols without any regular arrangement \"true\" languages need **structure dependency**. Combining symbols the syntax is relevant. A change in the symbol order might have an impact on the meaning of the sentence. For example "The dog bites the cat" has obviously a different meaning than "The cat bites the dog" based on the different word arrangement of the two sentences. ## Non-Human Language - Animal Communication ### Forms of Communication As mentioned before human language is just one of quite a number of communication forms. Different forms of communication can be found in the world of animals. From a little moth to a giant whale, all animals appear to have the use of communication. Not only humans use facial expression for stressing utterances or feeling, facial expressions can be found among apes. The expression, for example \"smiling\" indicates cooperativeness and friendliness in both the human and the ape world. On the other hand an ape showing teeth indicates the willingness to fight. Posture is a very common communicative tool among animals. Lowering the front part of the body and extending the front legs is a sign of dogs that they are playful whereas lowering the full body is a dog's postural way to show its submissiveness. Postural communication is known in both human and non-human primates. Besides facial expression, gesture and posture that are found in human communication, there are other communicative devices which are either just noticeable by the sub-consciousness of humans like scent or cannot be found amongst humans like light, colour and electricity. The chemicals which are used for a communicative function are called pheremones. Those pheremones are used to mark territorial or to signal its reproductive readiness. For animals scent is a very important tool which predominates their mating behaviour. Humans are influenced in their mating behaviour by scent as well but there are more factors to that behaviour so that scent is not predominating. The insects use species-dependent light patterns to signal identity, sex and location. For example the octopus changes colour for signalling territorial defence and mating readiness. In the world of birds colour is wide spread, too. The male peacock has colourful feathering to impress female peahens as a part of mating behaviour. These ways of communication help to live in a community and survive in certain environment. ### Characteristic Language Features in Animal Communication As mentioned above it is possible to describe the uniqueness of human language by four criteria (semanticity, displacement, creativity and structural dependency) which are important devices in the human language to form a clear communication between humans. To see if these criteria exist in animal communication - i.e. if animals possess a \"true\" language - several experiments with non-human primates were performed. Non-human primates were taught American Sign Language (ASL) and a specially developed token language to detect in how far they are capable of linguistic behaviour. Can semanticity, displacement, creativity and structure dependency be found in non-human language? **Experiments** **1. Human language** In 1948, in Orange Park, Florida, Keith and Cathy Hayes tried to teach English words to a chimpanzee named Viki. She was raised as if she were a human child. The chimpanzee was taught to \"speak\" easy English words like \"cup\". The experiment failed since with the supralanyngal anatomy and the vocal fold structure that chimpanzees have it is impossible for them to produce human speech sounds. The failure of the Viki experiment made scientists wonder how far are non-human primates able to communicate linguistically. **2. Sign language** From 1965 to 1972 the first important evidence showing rudiments of linguistic behaviour was \"Washoe\", a young female chimpanzee. The experimenters Allen and Beatrice Gardner conducted an experiment where Washoe learned 130 signs of the American Sign Language within three years. Showing pictures of a duck to Washoe and asking WHAT THAT? she combined the symbols of WATER and BIRD to create WATER BIRD as she had not learned the word DUCK (the words in capital letters refer to the signs the apes use to communicate with the experimenter). It was claimed that Washoe was able to arbitrarily combine signs spontaneously and creatively. Some scientists criticised the ASL experiment of Washoe because they claimed that ASL is a loose communicative system and strict syntactic rules are not required. Because of this criticism different experiments were developed and performed which focus on syntactic rules and structure dependency as well as on creative symbol combination. A non-human primate named \"Kanzi\" was trained by Savage-Rumbaugh in 1990. Kanzi was able to deal with 256 geometric symbols and understood complex instructions like GET THE ORANGE THAT IS IN THE COLONY ROOM. The experimenter worked with rewards. A question which arose was whether these non-human primates were able to deal with human-like linguistic capacities or if they were just trained to perform a certain action to get the reward. For more detailed explanations of the experiments see The Mind of an Ape. **Can the characteristic language features be found in non-human communication?** Creativity seems to be present in animal communication as amongst others Washoe showed with the creation of WATER BIRD for DUCK. Although some critics claimed that creativity is often accidental or like in the case of Washoe's WATER BIRD the creation relays on the fact that water and bird were present. Just because of this presence Washoe invented the word WATER BIRD. In the case of Kanzi a certain form of syntactic rules was observed. In 90% of Kanzi's sentences there was first the invitation to play and then the type of game which Kanzi wanted to play like CHASE HIDE, TICKLE SLAP and GRAB SLAP. The problem which was observed was that it is not always easy to recognise the order of signs. Often facial expression and hand signs are performed at the same time. One ape signed the sentence I LIKE COKE by hugging itself for "like" and forming the sign for "coke" with its hands at the same time. Noticing an order in this sign sentence was not possible. A certain structural dependency could be observed at Kanzi's active and passive sentences. When Matata, a fellow chimpanzee was grabbed Kanzi signed GRAB MATATA and when Matata was performing an action such as biting Kanzi produced MATATA BITE. It has not yet been proved that symbolic behaviour is occurring. Although there are plenty evidences that creativity and displacement occur in animal communication some critics claim that these evidences can be led back to dressage and training. It was claimed that linguistic behaviour cannot be proved as it is more likely to be a training to correctly use linguistic devices. Apes show just to a little degree syntactic behaviour and they are not able to produce sentences containing embedded structures. Some linguists claim that because of such a lack of linguistic features non-human communication cannot be a "true" language. Although we do not know the capacity of an ape\'s mind it does not seem that the range of meanings observed in ape\'s wild life approach the capaciousness of semanticity of human communication. Furthermore apes seem not to care to much about displacement as it appears that they do not communicate about imaginary pasts or futures. All in all non-human primate communication consisting of graded series of communication shows little arbitrariness. The results with non-human primates led to a controversial discussion about linguistic behaviour. Many researchers claimed that the results were influenced by dressage. For humans language is a communication form suited to the patterns of human life. Other communication systems are better suited for fellow creatures and their mode of existence. Now that we know that there is a difference between animal communication and human language we will see detailed features of the human language. ## Language Comprehension & Production ### Language features -- Syntax and Semantics In this chapter the main question will be "how do we understand sentences?". To find an answer to that problem it is necessary to have a closer look at the structure of languages. The most important properties every human language provides are rules which determine the permissible sentences and a hierarchical structure (phonemes as basic sounds, which constitute words, which in turn constitute phrases, which constitute sentences, which constitute texts). These feature of a language enable humans to create new unique sentences. The fact that all human languages have a common ground even if they developed completely independent from one another may lead to the conclusion that the ability to process language must be innate. Another evidence of a inborn universal grammar is that there were observations of deaf children who were not taught a language and developed their own form of communication which provided the same basic constituents. Two basic abilities human beings have to communicate is to interpret the syntax of a sentence and the knowledge of the meaning of single words, which in combination enables them to understand the semantic of whole sentences. Many experiments have been done to find out how the syntactical and semantical interpretation is done by human beings and how syntax and semantics works together to construct the right meaning of a sentence. Physiological experiments had been done in which for example the event-related potential (ERP) in the brain was measured as well as behavioristic experiments in which mental chronometry, the measurement of the time-course of cognitive processes, was used. Physiological experiments showed that the syntactical and the semantical interpretation of a sentence takes place separately from each other. These results will be presented below in more detail. **Physiological Approach** **Semantics** !Semantical incorrectness in a sentence evokes a N400 in the ERP Semantical incorrectness in a sentence evokes an N400 in the ERP The exploration of the semantic sentence processing can be done by the measurement of the event-related potential (ERP) when hearing a semantical correct sentence in comparison to a semantical incorrect sentence. For example in one experiment three reactions to sentences were compared: Semantically correct: "The pizza was too hot to eat." Semantically wrong: "The pizza was too hot to drink." Semantically wrong: "The pizza was too hot to cry." In such experiments the ERP evoked by the correct sentence is considered to show the ordinary sentence processing. The variations in the ERP in case of the incorrect sentences in contrast to the ERP of the correct sentence show at what time the mistake is recognized. In case of semantic incorrectness there was observed a strong negative signal about 400ms after perceiving the critical word which did not occure, if the sentence was semantically correct. These effects were observed mainly in the partial and central area. There was also found evidence that the N400 is the stronger the less the word fits semantically. The word "drink" which fits a little bit more in the context caused a weaker N400 than the word "cry". That means the intensity of the N400 correlates with the degree of the semantic mistake. The more difficult it is to search for a semantic interpretation of a sentence the higher is the N400 response. **Syntax** ! Syntactical incorrectness in a sentence can evoke an ELAN (early left anterior negativity) in the electrodes above the left frontal lobe after 120ms. in the electrodes above the left frontal lobe after 120ms.") To examine the syntactical aspects of the sentence processing a quite similar experiment as in the case of the semantic processing was done. There were used syntactical correct sentences and incorrect sentences, such as (correct:)"The cats won´t eat..." and (incorrect:)"The cats won´t eating...". When hearing or reading a syntactical incorrect sentence in contrast to a syntactical correct sentence the ERP changes significantly on two different points of time. First of all there a very early increased response to syntactical incorrectness after 120ms. This signal is called the 'early left anterior negativity' because it occurs mainly in the left frontal lobe. This advises that the syntactical processing is located amongst others in Broca\'s area which is located in the left frontal lobe. The early response to syntactical mistakes also indicates that the syntactical mistakes are detected earlier than semantic mistakes. The other change in the ERP when perceiving a syntactical wrong sentence occurs after 600ms in the partial lobe. The signal is increasing positively and is therefore called P600. Possibly the late positive signal is reflecting the attempt to reconstruct the grammatical problematic sentence to find a possible interpretation. ! Syntactical incorrectness in a sentence evokes after 600ms a P600 in the electrodes above the partial lobe. To summarize the three important ERP-components: First of all there occurs the ELAN at the left frontal lobe which shows a violation of syntactical rules. After it follows the N400 in central and partial areas as a reaction to a semantical incorrectness and finally there occurs a P600 in the partial area which probably means a reanalysis of the wrong sentence. **Behavioristic Approach -- Parsing a Sentence** Behavioristic experiments about how human beings parse a sentence often use syntactically ambiguous sentences. Because it is easier to realize that sentence-analysing mechanisms called parsing take place when using sentences in which we cannot automatically constitute the meaning of the sentence. There are two different theories about how humans parse sentences. The syntax-first approach claims that syntax plays the main part whereas semantics has only a supporting role, whereas the interactionist approach states that both syntax and semantics work together to determine the meaning of a sentence. Both theories will be explained below in more detail. **The Syntax-First Approach of Parsing** The syntax-first approach concentrates on the role of syntax when parsing a sentence. That humans infer the meaning of a sentence with help of its syntactical structure (Kako and Wagner 2001) can easily be seen when considering Lewis Carroll´s poem 'Jabberwocky': \"Twas brillig, and the slithy toves Did gyre and gimble in the wabe: All mimsy were the borogoves, And the mome raths outgrabe.\" Although most of the words in the poems have no meaning one may ascribe at least some sense to the poem because of its syntactical structure. There are many different syntactic rules that are used when parsing a sentence. One important rule is the principle of late closure which means that a person assumes that a new word he perceives is part of the current phrase. That this principle is used for parsing sentences can be seen very good with help of a so called garden-path sentence. Experiments with garden-path sentences have been done by Frazier and Fayner 1982. One example of a garden-path sentence is: "Because he always jogs a mile seems a short distance to him." When reading this sentence one first wants to continue the phrase "Because he always jogs" by adding "a mile" to the phrase, but when reading further one realizes that the words "a mile" are the beginning of a new phrase. This shows that we parse a sentence by trying to add new words to a phrase as long as possible. Garden-path sentences show that we use the principle of late closure as long it makes syntactically sense to add a word to the current phrase but when the sentence starts to get incorrect semantics are often used to rearrange the sentence. The syntax-first approach does not disregard semantics. According to this approach we use syntax first to parse a sentence and semantics is later on used to make sense of the sentence. Apart from experiments which show how syntax is used for parsing sentences there were also experimens on how semantics can influence the sentence processing. One important experiment about that issue has been done by Daniel Slobin in 1966. He showed that passive sentences are understood faster if the semantics of the words allow only one subject to be the actor. Sentences like "The horse was kicked by the cow." and "The fence was kicked by the cow." are grammatically equal and in both cases only one syntactical parsing is possible. Nevertheless the first sentence semantically provides two subjects as possible actors and therefore it needs longer to parse this sentence. By measuring this significant difference Daniel Slobin showed that semantics play an important role in parsing a sentence, too. **The Interactionist Approach of Parsing** The interactionist approach ascribes a more central role to semantics in parsing a sentence. In contrast to the syntax-first approach, the interactionist theory claims that syntax is not used first but that semantics and syntax are used simultanuasly to parse the sentence and that they work together in clearifying the meaning. There have been made several experiments which provide evidence that semantics are taking into account from the very beginning reading a sentence. Most of these experiments are working with the eye-tracking techniques and compare the time needed to read syntactical equal senences in which critical words cause or prohibit ambiguitiy by semantics. One of these experiments has been done by John Trueswell and coworkers in 1994. He measured the eye movement of persons when reading the following two sentences: The defendant examined by the lawyer turned out to be unreliable. The evidence examined by the lawyer turned out to be unreliable. He observed that the time needed to read the words "by the lawyer" took longer in case of the first sentence because in the first sentence the semanics first allow an interpretation in which the defendant is the one who examines, while the evidence only can be examined. This experiment shows that the semantics also play a role while reading the sentence which supports the interactionist approach and argues against the theory that semantics are only used after a sentence has been parsed syntactically. ### Inferences Creates Coherence Coherence is the semantic relation of information in different parts of a text to each other. In most cases coherence is achieved by inference; that means that a reader draws information out of a text that is not explicitly stated in this text. For further information the chapter Psychology and Cognitive Neuroscience/Situation Models and Inferencing#Neuropsychology of Inferencing Neuroscience of Text Comprehension should be considered. ### Situation Model A situation model is a mental representation of what a text is about. This approach proposes that the mental representation people form as they read a story does not indicate information about phrases, sentences, paragraphs, but a representation in terms of the people, objects, locations, events described in the story (Goldstein 2005, p. 374) For a more detailed description of situation models, see Psychology and Cognitive Neuroscience/Situation Models and Inferencing Situation Models ## Using Language Conversations are dynamic interactions between two or more people (Garrod &Pickering, 2004 as cited in Goldstein 2005). The important thing to mention is that conversation is more than the act of speaking. Each person brings in his or her knowledge and conversations are much easier to process if participants bring in shared knowledge. In this way, participants are responsible of how they bring in new knowledge. H.P. Grice proposed in 1975 a basic principle of conversation and four "conversational maxims." His cooperative principle states that "the speaker and listener agree that the person speaking should strive to make statements that further the agreed goals of conversation." The four maxims state the way of how to achieve this principle. 1\. **Quantity**: The speaker should try to be informative, no over-/underinformation. 2\. **Quality**: Do not say things which you believe to be false or lack evidence of. 3\. **Manner**: Avoiding being obscure or ambiguous. 4\. **Relevance**: Stay on topic of the exchange. An example of a rule of conversation incorporating three of those maxims is the given-new-contract. It states that the speaker should construct sentences so that they include given and new information. (Haviland & Clark, 1974 as cited in Goldstein, 2005). Consequences of not following this rule were demonstrated by Susan Haviland and Herbert Clark by presenting pairs of sentences (either following or ignoring the given-new-contract) and measuring the time participants needed until they fully understood the sentence. They found that participants needed longer in pairs of the type: `    We checked the picnic supplies. `\ `    The beer was warm.` `    Rather than:`\ `    We got some beer out of the trunk. `\ `    The beer was warm.` The reason that it took longer to comprehend the second sentence of the first pair is that inferencing has to be done (beer has not been mentioned as being part of the picnic supplies). (Goldstein, 2005, p. 377-378) ## Language, Culture and Cognition In the parts above we saw that there has been a lot of research of language, from letters through words and sentences to whole conversations. Most of the research described in the parts above was processed by English speaking researchers and the participants were English speaking as well. Can those results be generalised for all languages and cultures or might there be a difference between English speaking cultures and for example cultures with Asian or African origin? Imagine our young man from the beginning again: Knut! Now he has to prepare a presentation with his friend Chang for the next psychology seminar. Knut arrives at his friend's flat and enters his living-room, glad that he made it there just in time. They have been working a few minutes when Chang says: "It has become cold in here!" Knut remembers that he did not close the door, stands up and\..."stop! What is happening here?!" This part is concerned with culture and its connection to language. Culture, not necessarily in the sense of \"high culture\" like music, literature and arts but culture is the \"know-how\" a person must have to tackle his or her daily life. This know-how might include high culture but it is not necessary. **Culture and Language** Scientists wondered in how far culture affects the way people use language. In 1991 Yum studied the indirectness of statements in Asian and American conversations. The statement \"Please shut the door\" was formulated by Americans in an indirect way. They might say something like \"The door is open\" to signal that they want to door to be shut. Even more indirect are Asian people. They often do not even mention the door but they might say something like \"It is somewhat cold today\". Another cultural difference affecting the use of language was observed by Nisbett in 2003 in observation about the way people pose questions. When American speaker ask someone if more tea is wanted they ask something like \"More tea?\". Different to this Asian people would ask if the other one would like more drinking as for Asians it seems obvious that tea is involved and therefore mentioning the tea would be redundant. For Americans it is the other way round. For them it seems obvious that drinking is involved so they just mention the tea. This experiment and similar ones indicate that people belonging to Asian cultures are often relation orientated. Asians focus on relationships in groups. Contrasting, the Americans concentrate on objects. The involved object and its features are more important than the object\'s relation to other objects. These two different ways of focusing shows that language is affected by culture. A experiment which clearly shows these results is the mother-child interaction which was observed by Fernald and Morikawa in 1993. They studied mother-child talk of Asian and American mothers. An American mother trying to show and explain a car to her child often repeated the object \"car\" and wants the child to repeat it as well. The mother focuses on the features of the car and labels the importance of the object itself. The Asian mother shows the toy car to her child, gives the car to the child and wants it to give the car back. The mother shortly mentions that the object is a car but concentrates on the importance of the relation and the politeness of giving back the object. Realising that there are plenty differences in how people of different cultures use language the question arises if languages affects the way people think and perceive the world. ### What is the connection between language and cognition? **Sapir-Whorf Hypothesis** In the 1950s Edward Sapir and Benjamin Whorf proposed the hypothesis that the language of a culture affects the way people think and perceive. The controversial theory was question by Elenor Rosch who studied colour perception of Americans and Danis who are members of an stone-age agricultural culture in the Iran. Americans have several different categories for colour as for example blue, red, yellow and so on. Danis just have two main colour categories. The participants were ask to recall colours which were shown to them before. That experiment did not show significant differences in colour perception and memory as the Sapir-Whorf hypothesis presumes. !Color-naming experiment by Roberson et al. (2000)") **Categorical Perception** Nevertheless a support for the Sapir-Whorf hypothesis was Debi Roberson\'s demonstration for *categorical perception* based on the colour perception experiment by Rosch. The participants, a group of English-speaking British and another group of Berinmos from New Guinea were ask to name colours of a board with colour chips. The Berinmos distinguish between five different colour categories and the denotation of the colour names is not equivalent to the British colour denotation. Apart from these differences there are huge differences in the organisation of the colour categories. The colours named *green* and *blue* by British participants where categorised as nol which also covers colours like *light-green*, *yellow-green*, and *dark blue*. Other colour categories differ similarly. The result of Roberson\'s experiment was that it is easier for British people to discriminate between green and blue whereas Berinmos have less difficulties distinguishing between Nol and Wap. The reaction to colour is affected by language, by the vocabulary we have for denoting colours. It is difficult for people to distinguish colours from the same colour category but people have less trouble differentiating between colours from different categories. Both groups have categorical colour perception but the results for naming colours depends on how the colour categories were named. All in all it was shown that categorical perception is influenced by the language use of different cultures. These experiments about perception and its relation to cultural language usage leads to the question whether thought is related to language with is cultural differences. ### Is thought dependent on, or even caused by language? **Historical theories** An early approach was proposed by J.B. Watson's in 1913. His peripheralist approach was that thought is a tiny not noticeable speech movement. While thinking a person performs speech movements as he or she would do while talking. A couple year later, in 1921 Wittgenstein poses the theory that the limits of a person\'s language mean the limits of that person\'s world. As soon as a person is not able to express a certain content because of a lack of vocabulary that person is not able to think about those contents as they are outside of his or her world. Wittgenstein\'s theory was doubted by some experiments with babies and deaf people. **Present research** To find some evidence for the theory that language and culture is affecting cognition Lian-hwang Chiu designed an experiment with American and Asian children. The children were asked to group objects in pairs so that these objects fit together. On picture that was shown to the children there was a cow, a chicken and some grass. The children had to decided which of the two objects fitted together. The American children mostly grouped cow and chicken because of group of animals they belong to. Asian children more often combined the cow with the grass as there is the relation of the cow normally eating grass. In 2000 Chui repeated the experiment with words instead of pictures. A similar result was observed. The American children sorted their pairs taxonomically. Given the words \"panda\", \"monkey\" and \"banana\" American children paired \"panda\" and monkey\". Chinese children grouped relationally. They put \"monkey\" with \"banana\". Another variation of this experiment was done with bilingual children. When the task was given in English to the children they grouped the objects taxonomically. A Chinese task caused a relational grouping. The language of the task clearly influenced on how to group the objects. That means language may affects the way people think. The results of plenty experiments regarding the relation between language, culture and cognition let assume that culture affects language and cognition is affected by language.*Our way of thinking is influenced by the way we talk and thought can occur without language but the exact relation between language and thought remains to be determined.* ## References ```{=html} <references/> ``` ------------------------------------------------------------------------ *Books* - O\'Grady, W.; Dobrovolsky, M.; Katamba, F.: Contemporary Linguistics. Copp Clark Pittmann Ltd. (1996) - Banich, Marie T. : Neuropsychology. The neural bases of mental function. (1997) - Goldstein, E.B.: Cognitive Psychology: Connecting Mind, Research and Everyday Experience. (2005) - Akmajian, A.; Demers, R. A.; Farmer, A. K.; Harnish R. M.: Linguistics - An Introductin to Language and Communication, fifth Edition; the MIT Press Cambridge, Massachusetts, London, England; (2001) - Yule, G.: The study of language, second edition, Cambridge University Press; (1996) - Premack, D.; Premack, A.J.: The Mind of an Ape. W W Norton & Co Ltd.(1984) ------------------------------------------------------------------------ *Journals* - MacCorquodale, K.: On Chomsky´s Review of Skinner´s verbal Behavior. Journal of experimental analysis of behaviour. (1970) Nr.1 Chap. 13, p. 83-99, - Stemmer, N: Skinner\'s verbal behaviour, Chomsky\'s review, and mentalism. Journal of experimental analysis of behaviour. (1990) Nr.3 Chap. 54, p. 307-315 - Chomsky, N.: Collateral Language. TRANS, Internet journal for cultural sciences.(2003) Nr. 15 ## Links & Further reading Cognitive Psychology and Cognitive Neuroscience/Comprehension [^1]: E. B. Goldstein, \"Cognitive Psychology - Connecting Mind, Research, and Everyday Experience\" (2005), page 346
# Cognitive Psychology and Cognitive Neuroscience/Neuroscience of Text Comprehension +:------------------------------+:----:+------------------------------:+ | Previous | [O | [Next | | Chapter | (Cog | _Neuroscience/Situation_Model | | | niti | s_and_Inferencing "wikilink") | | | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ ## Introduction What is happening inside my head when I listen to a sentence? How do I process written words? This chapter will take a closer look on brain processes concerned with language comprehension. Dealing with natural language understanding, we distinguish between the neuroscientific and the psycholinguistic approach. As text understanding spreads through the broad field of cognitive psychology, linguistics, and neurosciences, our main focus will lay on the intersection of two latter, which is known as neurolinguistics. Different brain areas need to be examined in order to find out how words and sentences are being processed. For long time scientist were restricted to draw conclusions from certain brain lesions to the functions of corresponding brain areas. During the last 40 years techniques for brain imaging and ERP-measurement have been established which allow for a more accurate identification of brain parts involved in language processing. Scientific studies on these phenomena are generally divided into research on auditory and visual language comprehension; we will discuss both. Not to forget is that it is not enough to examine English: To understand language processing in general, we have to look at non-Indo-European and other language systems like sign language. But first of all we will be concerned with a rough localization of language in the brain. ## Lateralization of language Although functional lateralization studies and analyses find individual differences in personality or cognitive style don\'t favor one hemisphere or the other, some brain functions occur in one or the other side of the brain. Language tends to be on the left and attention on the right (Nielson, Zielinski, Ferguson, Lainhart & Anderson, 2013). There is a lot of evidence that each brain hemisphere has its own distinct functions in language comprehension. Most often, the right hemisphere is referred to as the non-dominant hemisphere and the left is seen as the dominant hemisphere. This distinction is called lateralization (from the Latin word lateral, meaning sidewise) and reason for it first was raised by experiments with split-brain patients. Following a top-down approach we will then discuss the right hemisphere which might have the mayor role in higher level comprehension, but is not quite well understood. Much research has been done on the left hemisphere and we will discuss why it might be dominant before the following sections discuss the fairly well understood fundamental processing of language in this hemisphere of the brain. ### Functional asymmetry **Anatomical differences between left and right hemisphere** Initially we will consider the most apparent part of a differentiation between left and right hemisphere: Their differences in shape and structure. As visible to the naked eye there exists a clear asymmetry between the two halves of the human brain: The right hemisphere typically has a bigger, wider and farther extended frontal region than the left hemisphere, whereas the left hemisphere is bigger, wider and extends farther in it's occipital region (M. T. Banich,\"Neuropsychology\", ch.3, pg.92). Significantly larger on the left side in most human brains is a certain part of the temporal lobe's surface, which is called the planum temporale. It is localized near Wernicke's area and other auditory association areas, wherefore we can already speculate that the left hemisphere might be stronger involved in processes of language and speech treatment. In fact such a left laterality of language functions is evident in 97% of the population (D. Purves, \"Neuroscience\", ch.26, pg.649). But actually the percentage of human brains, in which a \"left-dominance\" of the planum temporale is traceable, is only 67% (D. Purves, \"Neuroscience\", ch.26, pg.648). Which other factors play aunsolved yet. **Evidence for functional asymmetry from \"split brain\" patients** In hard cases of epilepsy a rarely performed but popular surgical method to reduce the frequency of epileptic seizures is the so-called corpus callosotomy. Here a radical cut through the connecting \"communication bridge\" between right and left hemisphere, the corpus callosum, is done; the result is a \"split-brain\". For patients whose corpus callosum is cut, the risk of accidental physical injury is mitigated, but the side-effect is striking: Due to this eradicative transection of left and right half of the brain these two are not longer able to communicate adequately. This situation provides the opportunity to study differentiation of functionality between the hemispheres. First experiments with split-brain patients were performed by Roger Sperry and his colleagues at the California Institute of Technology in 1960 and 1970 (D. Purves, \"Neuroscience\", ch.26, pg.646). They lead researchers to sweeping conclusions about laterality of speech and the organization of the human brain in general. ```{=html} <center> ``` ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- **A digression on the laterality of the visual system** !Visual systemA visual stimulus, located within the left visual field, projects onto the nasal (inner) part of the left eye's retina and onto the temporal (outer) part of the right eye's retina. Images on the temporal retinal region are processed in the visual cortex of the same side of the brain (ipsilateral), whereas nasal retinal information is mapped onto the opposite half of the brain (contralateral). The stimulus within the left visual field will completely arrive in the right visual cortex to be processed and worked up. In \"healthy\" brains this information furthermore attains the left hemisphere via the corpus callosum and can be integrated there. In split-brain patients this current of signals is interrupted; the stimulus remains \"invisible\" for the left hemisphere. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ```{=html} </center> ``` !Split Brain Experiments{width="300"}The experiment we consider now is based on the laterality of the visual system: What is seen in the left half of the visual field will be processed in the right hemisphere and vice versa. Aware of this principle a test operator presents the picture of an object to one half of the visual field while the participant is instructed to name the seen object, and to blindly pick it out of an amount of concrete objects with the contralateral hand. It can be shown that a picture, for example the drawing of a die, which has only been presented to the left hemisphere, can be named by the participant (\"I saw a die\"), but is not selectable with the right hand (no idea which object to choose from the table). Contrarily the participant is unable to name the die, if it was recognized in the right hemisphere, but easily picks it out of the heap of objects on the table with the help of the left hand. These outcomes are clear evidence of the human brain's functional asymmetry. The left hemisphere seems to dominate functions of speech and language processing, but is unable to handle spatial tasks like vision-independent object recognition. The right hemisphere seems to dominate spatial functions, but is unable to process words and meaning independently. In a second experiment evidence arose that a split-brain patient can only follow a written command (like \"get up now!\"), if it is presented to the left hemisphere. The right hemisphere can only \"understand\" pictorial instructions. The following table (D. Purves, \"Neuroscience\", ch.26, pg.647) gives a rough distinction of functions: ```{=html} <center> ``` +------------------------------------+-----------------------------------+ | **Left Hemisphere** | **Right Hemisphere** | +------------------------------------+-----------------------------------+ | - analysis of right visual field | - analysis of left visual field | | - language processing | - spatial tasks | | - writing | - visuospatial tasks | | - speech | - object and face recognition | +------------------------------------+-----------------------------------+ ```{=html} </center> ``` First it is important to keep in mind that these distinctions comprise only functional dominances, no exclusive competences. In cases of unilateral brain damage, often one half of the brain takes over tasks of the other one. Furthermore it should be mentioned that this experiment works only for stimuli presented for less than a second. This is because not only the corpus callosum, but as well some subcortical commissures serve for interhemispheric transfer. In general both can simultaneously contribute to performance, since they use complement roles in processing. ```{=html} <center> ``` +----------------------------------------------------------------------+ | **A digression on handedness** | +----------------------------------------------------------------------+ | An important issue, when exploring the different brain organization, | | is handedness, which is the tendency to use the left or the right | | hand to perform activities. Throughout history, left-handers, which | | only comprise about 10% of the population, have often been | | considered being something abnormal. They were said to be evil, | | stubborn, defiant and were, even until the mid 20th century, forced | | to write with their right hand. | | | | One most commonly accepted idea, as to how handedness affects the | | hemispheres, is the brain hemisphere division of labour. Since both | | speaking and handiwork require fine motor skills, the presumption | | here is that it would be more efficient to have one brain hemisphere | | do both, rather than having it divided up. Since in most people, the | | left side of the brain controls speaking, right-handedness | | predominates. The theory also predicts that left-handed people have | | a reversed brain division of labour. | | | | In right handers, verbal processing is mostly done in the left | | hemisphere, whereas visuospatial processing is mostly done in the | | opposite hemisphere. Therefore, 95% of speech output is controlled | | by the left brain hemisphere, whereas only 5% of individuals control | | speech output in their right hemisphere. Left-handers, on the other | | hand, have a heterogeneous brain organization. Their brain | | hemisphere is either organized in the same way as right handers, the | | opposite way, or even such that both hemispheres are used for verbal | | processing. But usually, in 70% of the cases, speech is controlled | | by the left-hemisphere, 15% by the right and 15% by either | | hemisphere. When the average is taken across all types of | | left-handedness, it appears that left-handers are less lateralized. | | | | After, for example, damage occurs to the left hemisphere, it follows | | that there is a visuospatial deficit, which is usually more severe | | in left-handers than in right-handers. Dissimilarities may derive, | | in part, from differences in brain morphology, which concludes from | | asymmetries in the planum temporale. Still, it can be assumed that | | left-handers have less division of labour between their two | | hemispheres than right-handers do and are more likely to lack | | neuroanatomical asymmetries. | | | | There have been many theories as to find out why people are | | left-handed and what its consequences may be. Some people say that | | left-handers have a shorter life span or higher accident rates or | | autoimmune disorders. According to the theory of Geschwind and | | Galaburda, there is a relation to sex hormones, the immune system, | | and profiles of cognitive abilities that determine, whether a person | | is left-handed or not. Concludingly, many genetic models have been | | proposed, yet the causes and consequences still remain a mystery | | (M.T.Banich, \"Neuropsychology\", ch.3, pg. 119). | +----------------------------------------------------------------------+ ```{=html} </center> ``` ### The right hemisphere **The role of the right hemisphere in text comprehension** The experiments with \"split-brain\" patients and evidence that will be discussed soon suggest that the right hemisphere is usually not (but in some cases, e.g. 15% of left handed people) dominant in language comprehension. What is most often ascribed to the right hemisphere is cognitive functioning. When damage is done to this part of the brain or when temporal regions of the right hemisphere are removed, this can lead to cognitive-communication problems, such as impaired memory, attention problems, and poor reasoning (L. Cherney, 2001). Investigations lead to the conclusion that the right hemisphere processes information in a gestalt and holistic fashion, with a special emphasis on spatial relationships. Here, an advantage arises for differentiating two distinct faces because it examines things in a global manner and it also reacts to lower spatial, and also auditory, frequency. The former point can be undermined with the fact that the right hemisphere is capable of reading most concrete words and can make simple grammatical comparisons (M. T. Banich,"Neuropsychology", ch.3, pg.97). But in order to function in such a way, there must be some sort of communication between the brain halves. **Prosody - the sound envelope around words** Consider how different the simple statement \"She did it again\" could be interpreted in the following context taken from Banich: LYNN: Alice is way into this mountain-biking thing. After breaking her arm, you\'d think she\'d be a little more cautious. But then yesterday, she went out and rode Captain Jack\'s. That trail is gnarly - narrow with lots of tree roots and rocks. And last night, I heard that she took a bad tumble on her way down. SARA: *She did it again* Does Sara say that with rising pitch or emphatically and with falling intonation? In the first case she would ask whether Alice has injured herself again. In the other case she asserts something she knows or imagines: That Alice managed to hurt herself a second time. Obviously the sound envelope around words - prosody - does matter. Reason to belief that recognition of prosodic patterns appears in the right hemisphere arises when you take into account patients that have damage to an anterior region of the right hemisphere. They suffer from **aprosodic** speech, that is, their utterances are all at the same pitch. They might sound like a robot from the 80ties. There is another phenomena appearing from brain damage: **dysprosodic** speech. In that case the patient speaks with disordered intonation. This is not due to a right hemisphere lesion, but arises when damage to the left hemisphere is suffered. The explanation is that the left hemisphere gives ill-timed prosodic cues to the right hemisphere, thus proper intonation is affected. **Beyond words: Inference from a neurological point of view** On the word level, the current studies are mostly consistent with each other and with findings from brain lesion studies. But when it comes to the more complex understanding of whole sentences, texts and storylines, the findings are split. According to E. C. Ferstl's review "The Neuroanatomy of Text Comprehension. What's the story so far?" (2004), there is evidence for and against right hemisphere regions playing the key role in pragmatics and text comprehension. On the current state of knowledge, we cannot exactly say how and where cognitive functions like building situation models and inferencing work together with "pure" language processes. As this chapter is concerned with the neurology of language, it should be remarked that patients with right hemisphere damage have difficulties with inferencing. Take into account the following sentence: *With mosquitoes, gnats, and grasshoppers flying all about, she came across a small black bug that was being used to eavesdrop on her conversation.* You might have to reinterpret the sentence until you realize that \"small black bug\" does not refer to an animal but rather to a spy device. People with damage in the right hemisphere have problems to do so. They have difficulty to follow the thread of a story and to make inferences about what has been said. Furthermore they have a hard time understanding non-literal aspects of sentences like metaphors, so they might be really horrified when they hear that someone was \"Crying her eyes out\". The reader is referred to the next chapter for a detailed discussion of Situation Models ### The left hemisphere **Further evidence for left hemisphere dominance: The Wada technique** Before concerning concrete functionality of the left hemisphere, further evidence for the dominance of the left hemisphere is provided. Of relevance is the so-called Wada technique, allowing testing which hemisphere is responsible for speech output and usually being used in epilepsy patients during surgery. It is not a brain imaging technique, but simulates a brain lesion. One of the hemispheres is anesthetized by injecting a barbiturate (sodium amobarbital) in one of the patient's carotid arteries. Then he is asked to name a number of items on cards. When he is not able to do that, despite the fact that he could do it an hour earlier, the concerned hemisphere is said to be the one responsible for speech output. This test must be done twice, for there is a chance that the patient produces speech bilaterally. The probability for that is not very high, in fact, according to Rasmussen & Milner 1997a (as referred to in Banich, p. 293) it occurs only in 15% of the left-handers and none of the right-handers. (It is still unclear where these differences in left-handers' brains come from.) That means that in most people, only one hemisphere "produces" speech output -- and in 96% of right-handers and 70% of left-handers, it is the left one. The findings of the brain lesion studies about asymmetry were confirmed here: Normally (in healthy right-handers), the left hemisphere controls speech output. **Explanations of left hemisphere dominance** Two theories why the left hemisphere might have special language capacities are still discussed. The first states that dominance of the left hemisphere is due to a specialization for **precise temporal control of oral and manual articulators**. Here the main argument is that gestures related to a story line are most often made with the right and therefore by the left hemisphere controlled hand whilst other hand movements appear equally often with both hands. The other theory says that the left hemisphere is dominant because it is specialized for **linguistic processing** and is due to a single patient - a speaker of American Sign Language with a left hemisphere lesion. He could neither produce nor comprehend ASL, but could still communicate by using gestures in non-linguistic domains. **How innate is the organisational structure of the brain?** Not only cases of left-handers but also brain imaging techniques have shown examples of bilateral language processing: According to ERP studies (by Bellugi et al. 1994 and Neville et al. 1993 as cited in E. Dabrowska, \"Language, Mind an Brain\" 2004, p. 57), people with the Williams' syndrome (WS) also have no dominant hemisphere for language. WS patients have a lot of physical and mental disorders, but show, compared to their other (poor) cognitive abilities, very good linguistic skills. And these skills do not rely on one dominant hemisphere, but both of them contribute equally. So, whilst the majority of the population has a dominant left hemisphere for language processing there are a variety of exceptions to that dominance. That there are different "organisation possibilities" in individual brains Dabrowska (p. 57) suggests that the organisational structure in the brain could be less innate and fixed as it is commonly thought. ## Auditory Language Processing This section will explain where and how language is processed. To avoid intersections with visual processes we will firstly concentrate on spoken language. Scientists have developed three approaches of conceiving information about this issue. The first two approaches are based upon brain lesions, namely aphasia, whereas the recent approach relies on results of on modern brain-image techniques. ### Neurological Perspective The Neurological Perspective describes which pathways language follows in order to be comprehended. Scientists revealed that there are concrete areas inside the brain where concrete tasks of language processing are taking place. The most known areas are the Broca and the Wernicke Area. **Broca's aphasia** !Broca\'s and Wernicke\'s area One of the most well-known aphasias is Broca's aphasia that causes patients to be unable to speak fluently. Moreover they have a great difficulty producing words. Comprehension, however, is relatively intact in those patients. Because these symptoms do not result from motoric problems of the vocal musculature, a region in the brain that is responsible for linguistic output must be lesioned. Broca discovered that the brain region causing fluent speech is responsible for linguistic output, must be located ventrally in the frontal lobe, anterior to the motor strip. Recent research suggested that Broca\`s aphasia results also from subcortical tissue and white matter and not only cortical tissue. ```{=html} <center> ``` Example of spontaneous Speech - Task: What do you see on this picture? ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- „O, yea. Det's a boy an' girl\... an' \... a \... car \... house\... light po' (pole). Dog an' a \... boat. ‚N det's a \... mm \... a \... coffee, an' reading. Det's a \... mm \... a \... det's a boy \... fishin'." (Adapted from „Principles of Neuroscience" 4th edition, 2000, p 1178) ```{=html} </center> ``` **Wernicke's aphasia** Another very famous aphasia, known as Wernicke\`s aphasia, causes opposite syndromes. Patients suffering from Wernicke\`s aphasia usually speak very fluently, words are pronounced correctly, but they are combined senselessly -- "word salad" is the way it is most often described. Understanding what patients of Wernicke\`s aphasia say is especially difficult, because they use paraphasias (substitution of a word in verbal paraphasia, of word with similar meaning in semantic paraphasia, and of a phoneme in phonemic paraphasia) and neologisms. With Wernicke\`s aphasia the comprehension of simple sentences is a very difficult task. Moreover their ability to process auditory language input and also written language is impaired. With some knowledge about the brainstructure and their tasks one is able to conclude that the area that causes Wernicke\`s aphasia, is situated at the joint of temporal, parietal and occipital regions, near Heschl\`s gyrus (primary auditory area), because all the areas receiving and interpreting sensory information (posterior cortex), and those connecting the sensory information to meaning (parietal lobe) are likely to be involved. ```{=html} <center> ``` Example of spontaneous Speech - Task: What do you see on this picture? ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- „Ah, yes, it's ah \... several things. It's a girl \... uncurl \... on a boat. A dog \... 'S is another dog \... uh-oh \... long's \... on a boat. The lady, it's a young lady. An' a man a They were eatin'. 'S be place there. This \... a tree! A boat. No, this is a \... It's a house. Over in here \... a cake. An' it's, it's a lot of water. Ah, all right. I think I mentioned about that boat. I noticed a boat being there. I did mention that before \... Several things down, different things down \... a bat \... a cake \... you have a \..." (adapted from „Principles of Neuroscience" 4th edition, 2000, p 1178) ```{=html} </center> ``` **Conduction aphasia** Wernicke supposed that an aphasia between Broca's area and Wernicke's area, namely conduction aphasia, would lead to severe problems to repeat just heard sentences rather than having problems with the comprehension and production of speech. Indeed patients suffering from this kind of aphasia show an inability to reproduce sentences since they often make phonemic paraphasias, may substitute or leave out words, or might say nothing. Investigations determined that the \"connection cable\", namely the arcuate fasciculus between Wernicke's and Broca's area is almost invariably damaged in case of a conduction aphasia. That is why conduction aphasia is also regarded as a disconnection syndrome (the behavioural dysfunction because of a damage to the connection of two connected brain regions). ```{=html} <center> ``` Example of the repetition of the sentence „The pastry-cook was elated": ------------------------------------------------------------------------------------------------------------------ „The baker-er was /vaskerin/ \... uh \..." (adapted from „Principles of Neuroscience" 4th edition, 2000, p 1178) ```{=html} </center> ``` **Transcortical motor aphasia and global aphasia** Transcortical motor aphasia, another brain lesion caused by a connection disruption, is very similar to Broca\`s aphasia, with the difference that the ability to repeat is kept. In fact people with a transcortical motor aphasia often suffer from echolalia, the need to repeat what they just heard. Usually patients\` brain is damaged outside Broca\`s area, sometimes more anterior and sometimes more superior. Individuals with transcortical sensory aphasia have similar symptoms as those suffering from Wernicke\`s aphasia, except that they show signs of echolalia. Lesions in great parts of the left hemisphere lead to global aphasia, and thus to an inability of both comprehending and producing language, because not only Broca\`s or Wenicke\`s area is damaged. (Barnich, 1997, pp. 276--282) ```{=html} <center> ``` +----------+----------+----------+----------+----------+----------+ | **Type | **Spo | **Para | * | **Repe | ** | | of | ntaneous | phasia** | *Compreh | tition** | Naming** | | A | Speech** | | ension** | | | | phasia** | | | | | | +----------+----------+----------+----------+----------+----------+ | - | - N | - | - Good | - Poor | - Poor | | Broca\`s | onfluent | Uncommon | - Poor | - Poor | - Poor | | - Wer | - | - | - Good | - Poor | - Poor | | nicke\`s | Fluent | Common | - Good | - Good | - Poor | | - Co | - | | - Poor | (ec | - Poor | | nduction | Fluent | (verbal) | - Poor | holalia) | - Poor | | - | - N | - | | - Good | | | Trans | onfluent | Common | | (ec | | | cortical | - | ( | | holalia) | | | | Fluent | literal) | | - Poor | | | motor | - N | - | | | | | - | onfluent | Uncommon | | | | | Trans | | - | | | | | cortical | | Common | | | | | | | - | | | | | sensory | | Variable | | | | | - | | | | | | | Global | | | | | | +----------+----------+----------+----------+----------+----------+ `<small>`{=html}Overview of the effects of aphasia from the neurological perspective`</small>`{=html} ```{=html} </center> ``` (Adapted from Benson, 1985,p. 32 as cited in Barnich, 1997, p. 287) ### Psychological Perspective Since the 1960's psychologists and psycholinguists tried to resolve how language is organised and represented inside the brain. Patients with aphasias gave good evidence for location and discrimination of the three main parts of language comprehension and production, namely phonology, syntax and semantics. **Phonology** Phonology deals with the processing of meaningful parts of speech resulting from the mere sound. More over there exists a differentiation between a phonemic representation of a speech sound which are the smallest units of sounds that leads to different meanings (e.g. the /b/ and /p/ in bet and pat) and phonetic representation. The latter means that a speech sound may be produced in a different manner at different situations. For instance the /p/ in pill sounds different than the /p/ in spill since the former /p/ is aspirated and the latter is not. Examining which parts are responsible for phonetic representation, patients with Broca\`s or Wernicke\`s aphasia can be compared. As the speech characteristic for patients with Broca\`s aphasia is non-fluent, i.e. they have problems producing the correct phonetic and phonemic representation of a sound, and people with Wernicke\`s aphasia do not show any problems speaking fluently, but also have problems producing the right phoneme. This indicates that Broca\`s area is mainly involved in phonological production and also, that phonemic and phonetic representation do not take place in the same part of the brain. Scientists examined on a more precise level the speech production, on the level of the distinctive features of phonemes, to see in which features patients with aphasia made mistakes. A distinctive feature describes the different manners and places of articulation. /t/ (like in touch) and /s/ (like in such) for example are created at the same place but produced in different manner. /t/ and /d/ are created at the same place and in the same manner but they differ in voicing. Results show that in fluent as well as in non-fluent aphasia patients usually mix up only one distinctive feature, not two. In general it can be said that errors connected to the place of articulation are more common than those linked to voicing. Interestingly some aphasia patients are well aware of the different features of two phonemes, yet they are unable to produce the right sound. This suggests that though patients have great difficulty pronouncing words correctly, their comprehension of words is still quite good. This is characteristic for patients with Broca\`s aphasia, while those with Wernicke\`s aphasia show contrary symptoms: they are able to pronounce words correctly, but cannot understand what the words mean. That is why they often utter phonologically correct words (neologisms) that are not real words with a meaning. **Syntax** Syntax describes the rules of how words must be arranged to result in meaningful sentences. Humans in general usually know the syntax of their mother tongue and thus slip their tongue if a word happens to be out of order in a sentence. People with aphasia, however, often have problems with parsing of sentences, not only with respect to the production of language but also with respect to comprehension of sentences. Patients showing an inability of comprehension and production of sentences usually have some kind of anterior aphasia, also called agrammatical aphasia. This can be revealed in tests with sentences. These patients cannot distinguish between active and passive voice easily if both agent and object could play an active part. For example patients do not see a difference between "The boy chased the girl" and "The boy was chased by the girl", but they do understand both "The boy saw the apple" and "The apple was seen by the boy", because they can seek help of semantics and do not have to rely on syntax alone. Patients with posterior aphasia, like for example Wernicke\`s aphasia, do not show these symptoms, as their speech is fluent. Comprehension by mere syntactic means would be possible as well, but the semantic aspect must be considered as well. This will be discussed in the next part. **Semantics** Semantics deals with the meaning of words and sentences. It has been shown that patients suffering from posterior aphasia have severe problems understanding simple texts, although their knowledge of syntax is intact. The semantic shortcoming is often examined by a Token Test, a test in which patients have to point to objects referred to in simple sentences. As might have been guessed, people with anterior aphasia have no problems with semantics, yet they might not be able to understand longer sentences because the knowledge of syntax then is involved as well. ```{=html} <center> ``` --------------- ----------------------------------------------- --------------------------------------- **anterior Aphasia (e.g. Broca)** **posterior Aphasia (e.g. Wernicke)** **Phonology** phonetic and phonemic representation affected phonemic representation affected **Syntax** affected no effect **Syntax** no effect affected --------------- ----------------------------------------------- --------------------------------------- `<small>`{=html}Overview of the effects of aphasia from the psychological perspective`</small>`{=html} ```{=html} </center> ``` In general studies with lesioned people have shown that anterior areas are needed for speech output and posterior regions for speech comprehension. As mentioned above anterior regions are also more important for syntactic processing, while posterior regions are involved in semantic processing. But such a strict division of the parts of the brain and their responsibilities is not possible, because posterior regions must be important for more than just sentence comprehension, as patients with lesions in this area can neither comprehend nor produce any speech. (Barnich, 1997, pp. 283--293) ### Evidence from Advanced Neuroscience Methods Measuring the functions of both normal and damaged brains has been possible since the 1970s, when the first brain imaging techniques were developed. With them, we are able to "watch the brain working" while the subject is e.g. listening to a joke. These methods (further described in chapter 4) show whether the earlier findings are correct and precise. Generally, imaging shows that certain functional brain regions are much smaller than estimated in brain lesion studies, and that their boundaries are more distinct (cf. Banich p. 294). The exact location varies individually, therefore bringing the results of many brain lesion studies together caused too big estimated functional regions before. For example, stimulating brain tissue electrically (during epilepsy surgery) and observing the outcome (e.g. errors in naming tasks) led to a much better knowledge where language processing areas are located. PET studies (Fiez & Petersen, 1993, as cited in Banich, p. 295) have shown that in fact both anterior and posterior regions were activated in language comprehension and processing, but with different strengths -- in agreement with the lesion studies. The more active speech production is required in experiments, the more frontal is the main activation: For example, when the presented words must be repeated. Another result (Raichle et al. 1994, as referred to in Banich, p. 295) was that the familiarity of the stimuli plays a big role. When the subjects were presented well-known stimuli sets in well-known experimental tasks and had to repeat them, anterior regions were activated. Those regions were known to cause conduction aphasia when damaged. But when the words were new ones, and/or the subjects never had to do a task like this before, the activation was recorded more posterior. That means, when you repeat an unexpected word, the heaviest working brain tissue is about somewhere under your upper left earlap, but when you knew this word that would be the next to repeat before, it is a bit nearer to your left eye. ## Visual Language Processing The processing of written language is performed when we are reading or writing and is thought to happen in a distinct neural processing unit than auditory language processing. Reading and writing respectively rely on vision whereas spoken language is first mediated by the auditory system. Language systems responsible for written language processing have to interact with a sensory system different from the one involved in spoken language processing. Visual language processing in general begins when the visual forms of letters ("c" or "C" or "c") are mapped onto abstract letter identities. These are then mapped onto a word form and the corresponding semantic representation (the "meaning" of the word, i.e. the concept behind it). Observations of patients that lost a language ability due to a brain damage led to different disease patterns that indicated a difference between perception (reading) and production (writing) of visual language just like it is found in non-visual language processing. Alexic patients possess the ability to write while not being able to read whereas patients with agraphia are able to read but cannot write. Though alexia and agraphia often occur together as a result of damage to the angular gyrus, there were patients found having alexia without agraphia (e.g. Greenblatt 1973, as cited in M. T. Banich, "Neuropsychology", p. 296) or having agraphia without alexia (e.g. Hécaen & Kremin, 1976, as cited in M. T. Banich, "Neuropsychology", p. 296). This is a double dissociation that suggests separate neural control systems for reading and writing. Since double dissociations are also found in phonological and surface dyslexia, experimental results support the theory that language production and perception respectively are subdivided into separate neural circuits. The two route model shows how these two neural circuits are believed to provide pathways from written words to thoughts and from thoughts to written words. ### Two routes model !1.1. Each route derives the meaning of a word or the word of a meaning in a different way{width="395"}In essence, the two routes model contains two routes. Each of them derives the meaning of a word or the word of a meaning in a different way, depending on how familiar we are with the word. Using the **phonological route** means having an intermediate step between perceiving and comprehending of written language. This intermediate step takes places when we are making use of grapheme-to-phoneme rules. Grapheme-to-phoneme rules are a way of determining the phonological representation for a given grapheme. A grapheme is the smallest written unit of a word (e.g. "sh" in "shore") that represents a phoneme. A phoneme on the other hand is the smallest phonological unit of a word distinguishing it from another word that otherwise sounds the same (e.g. "bat" and "cat"). People learning to read or are encountering new words often use the phonological route to arrive at a meaning representation. They construct phonemes for each grapheme and then combine the individual phonemes to a sound pattern that is associated with a certain meaning (see 1.1). The **direct route** is supposed to work without an intermediate phonological representation, so that print is directly associated with word-meaning. A situation in which the direct route has to be taken is when reading an irregular word like "colonel". Application of grapheme-to-phoneme rules would lead to an incorrect phonological representation. According to Taft (1982, as referred to in M. T. Banich,"Neuropsychology", p. 297) and others the direct route is supposed to be faster than the phonological route since it does not make use of a "phonological detour" and is therefore said to be used for known words ( see 1.1). However, this is just one point of view and others, like Chastain (1987, as referred to in M. T. Banich, "Neuropsychology", p. 297), postulate a reliance on the phonological route even in skilled readers. ### The processing of written language in reading !1.2. Regularity effects are common in cases of surface alexia{width="353"}Several kinds of alexia could be differentiated, often depending on whether the phonological or the direct route was impaired. Patients with brain lesions participated in experiments where they had to read out words and non-words as well as irregular words. Reading of non-words for example requires access to the phonological route since there cannot be a "stored" meaning or a sound representation for this combination of letters. Patients with a lesion in temporal structures of the left hemisphere (the exact location varies) suffer from so called **surface alexia**. They show the following characteristic symptoms that suggest a strong reliance on the phonological route: Very common are regularity effects, that is a mispronunciation of words in which the spelling is irregular like \"colonel\" or \"yacht\" (see 1.2). These words are pronounced according to grapheme-to-phoneme rules, although high-frequency irregularly spelled words may be preserved in some cases, the pronunciation according to the phonological route is just wrong. Furthermore, the would-be pronunciation of a word is reflected in reading-comprehension errors. When asked to describe the meaning of the word "bear", people suffering from surface alexia would answer something like "a beverage" because the resulting sound pattern of "bear" was the same for these people as that for "beer". This characteristic goes along with a tendency to confuse homophones (words that sound the same but are spelled differently and have different meanings associated). However, these people are still able to read non-words with a regular spelling since they can apply grapheme-to-phoneme rules to them. !1.3. Patients with phonological alexia have to rely on the direct route{width="353"}In contrast, **phonological alexia** is characterised by a disruption in the phonological route due to lesions in more posterior temporal structures of the left hemisphere. Patients can read familiar regular and irregular words by making use of stored information about the meaning associated with that particular visual form (so there is no regularity effect like in surface alexia). However, they are unable to process unknown words or non-words, since they have to rely on the direct route (see 1.3). Word class effects and morphological errors are common, too. Nouns, for example, are read better than function words and sometimes even better than verbs. Affixes which do not change the grammatical class or meaning of a word (inflectional affixes) are often substituted (e.g. "farmer" instead of "farming"). Furthermore, concrete words are read with a lower error rate than abstract ones like "freedom" (concreteness effect). **Deep Alexia** shares many symptomatic features with phonological alexia such as an inability to read out non-words. Just as in phonological alexia, patients make mistakes on word inflections as well as function words and show visually based errors on abstract words ("desire" → "desert"). In addition to that, people with deep alexia misread words as different words with a strongly related meaning ("woods" instead of "forest"), a phenomenon referred to as semantic paralexia. Coltheart (as referred to in the "Handbook of Neurolinguistics", ch.41-3, p. 563) postulates that reading in deep dyslexia is mediated by the right hemisphere. He suggests that when large lesions affecting language abilities other than reading prevent access to the left hemisphere, the right-hemispheric language store is used. Lexical entries stored there are accessed and used as input to left-hemisphere output systems. !Overview alexia{width="622"} ### The processing of written language in spelling !The phonological route is supposed to make use of phoneme-to-grapheme rules while the direct route links thought to writing without an intermediary phonetic representation{width="365"}Just like in reading, two separate routes --a phonological and a direct route- are thought to exist. The phonological route is supposed to make use of phoneme-to-grapheme rules while the direct route links thought to writing without an intermediary phonetic representation (see 1.4). It should be noted here that there is a difference between phoneme-to-grapheme rules (used for spelling) and grapheme-to-phoneme rules in that one is not simply the reverse of the other. In case of the grapheme "k" the most common phoneme for it is /k/. The most common grapheme for the phoneme /k/, however, is "c". Phonological agraphia is caused by a lesion in the left supramarginal gyrus, which is located in the parietal lobe above the posterior section of the Sylvian fissure (M. T. Banich, "Neuropsychology", p. 299). The ability to write regular and irregular words is preserved while the ability to write non-words is not. This, together with a poor retrieval of affixes (which are not stored lexically), indicates an inability to associate spoken words with their orthographic form via phoneme-to-grapheme rules. Patients rely on the direct route, which means that they use orthographic word-form representations that are stored in lexical memory. Lesions at the conjunction of the posterior parietal lobe and the parieto-occipital junction cause so called lexical agraphia that is sometimes also referred to as surface agraphia. As the name already indicates, it parallels surface alexia in that patients have difficulty to access lexical-orthographic representations of words. Lexical agraphia is characterised by a poor spelling of irregular words but good spelling for regular and non-words. When asked to spell irregular words, patients often commit regularization errors, so that the word is spelled phonologically correct (for example, "whisk" would be written as "wisque"). The BEST to CONNECT is to CAPITALISE the WORDS you WANT TO COMMUNICATE for readers to COMPREHEND. !Overview agraphia{width="581"} ### Evidence from Advanced Neuroscience Methods How can we find evidence for the theory of the two routes. Until now neuroscientific research is not able to ascertain that there are neural circuits representing a system like the one described above. The problem of finding evidence for visual language processing on two routes in contrast to one route ( as stated by e.g. from Seidenberg & McClelland as referred to in M. T. Banich,"Neuropsychology", p. 308) is that it is not clear what characteristic brain activation would indicate that it is either happening on two or one routes. To investigate whether there are one or two systems, neuroimaging studies examine correlations between the activations of the angular gyrus, which is thought to be a crucial brain area in written language processing and other brain regions. It was found out that during reading of non- words ( which would strongly engage the phonological route) the activation is mostly correlated with brain regions which are involved in phonological processing e.g. superior temporal regions (BA 22) and Boca's area. During reading of normal words (which would strongly engage the direct route) the highest activation was found in occipital and ventral cortex. That at least can imply that there are two distinct routes. However, these are conclusions drawn from highest correlations which do not ensure this suggestion. What neuroimaging studies do ascertain is that the usage of a phonological and a direct route strongly overlap, which is rather unspectacular since it is quiet reasonable that fluent speaker mix both of the routes. Other studies additionally provide data in which the activated brain regions during reading of non-words and reading of normal words differ. ERP studies suggest that the left hemisphere possesses some sort mechanism which response to combinations of letters in a string, or to its orthography and / or to the phonological representation of the string. ERP waves differ, during early analysis of the visual form of the string, if the string represents a correct word or just pronounceable nonsense (Posner & McCandliss, 1993 as referred in M.T. Banich, „Neuropsychology"p. 307-308). That indicates that this mechanism is sensitive to correct or incorrect words. The opposite hemisphere, the right hemisphere, is in contrast to the left hemisphere, not involved in abstract mapping of word meaning but is rather responsible for encoding word specific visual forms. ERP and PET studies provides evidence that the right hemisphere responds in a stronger manner than the left hemisphere to letter like strings. Moreover divided visual field studies reveal that the right hemisphere can better distinguish between different shapes of the same letter (e.g. in different handwritings) than the left hemisphere. The contribution of visual language processing on both hemispheres is that the right hemisphere first recognizes a written word as letter sequences, no matter how exactly they look like, then the language network in the left hemisphere builds up an abstract representation of the word, which is the comprehension of the word. ## Other symbolic systems Most neurolinguistic research is concerned with production and comprehension of English language, either written or spoken. However, looking at different language systems from a neuroscientific perspective can substantiate as well as differentiate acknowledged theories of language processing. The following section shows how neurological research of three symbolic systems, each different from English in some aspect, has made it possible to distinguish - at least to some extent - between brain regions that deal with the modality of the language (and therefore may vary from language to language, depending on whether the language in question is e.g. spoken or signed) from brain regions that seem to be necessary to language processing in general - regardless whether we are dealing with signed, spoken, or even musical language. ### Kana and Kanji Kana and Kanji are the two writing systems used parallel in the Japanese language. Since different approaches are used in them to represent words, studying Japanese patients with alexia is a great possibility to test the hypothesis about the existence of two different routes to meaning, explicated in the previous section. The English writing system is phonological -- each grapheme in written English roughly represents one speech sound -- a consonant or a vowel. There are, however, other possible approaches to writing down a spoken language. In syllabic systems like the Japanese kana, one grapheme stands for one syllable. If written English were syllabic, it could e.g. include a symbol for the syllable "nut", appearing both in the words "donut" and "peanut". Syllabic systems are sound-based -- since the graphemes represent units of spoken words rather than meaning directly, an auditory representation of the word has to be created in order to arrive at the meaning. Therefore, reading of syllabic systems should require an intact phonological route. In addition to kana, Japanese also use a logographic writing system called kanji, in which one grapheme represents a whole word or a concept. Different from phonological and syllabic systems, logographic systems don't comprise systematical relationships between visual forms and the way they're pronounced -- instead, visual form is directly associated with the pronunciation and meaning of the corresponding word. Reading kanji should therefore require the direct route to meaning to be intact. The hypothesis about the existence of two different routes to meaning has been confirmed by the fact that after brain damage, there can be a double dissociation between kana and kanji. Some Japanese patients can thus read kana but not kanji (surface alexia), whereas other can read kanji but not kana (phonological alexia). In addition, there is evidence that different brain regions of Japanese native speakers are active while reading kana and kanji, although like in the case of English native speakers, these regions also overlap. Since the distinction between direct and phonological route also makes sense in case of Japanese, it may be a general principle common to all written languages that reading them relies on two independent (at least partially) systems, both using different strategies to catch the meaning of a written word -- either associating the visual form directly with the meaning (the direct route), or using the auditory representation as an intermediary between the visual form and the meaning of the word (the phonological route). ```{=html} <center> ``` ----------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- !The Japanese Kana sign for the syllable \"mu\" !The Japanese Kanji sign for the concept \"Book\", \"writing\", or \"calligraphy ----------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ```{=html} </center> ``` ### Sign Language From a linguistic perspective, sign languages share many features of spoken languages -- there are many regionally bounded sign languages, each with a distinct grammar and lexicon. Since at the same time, sign languages differ from spoken languages in the way the words are "uttered", i.e. in the modality, neuroscientific research in them can yield valuable insights into the question whether there are general neural mechanisms dealing with language, regardless of its modality. **Structure of SL** Sign languages are phonological languages - every meaningful sign consists of several phonemes (phonemes used to be called cheremes (Greek χερι: hand) until their cognitive equivalence to phonemes in spoken languages was realized) that carry no meaning as such, but are nevertheless important to distinguish the meaning of the sign. One distinctive feature of SL phonemes is the place of articulation -- one hand shape can have different meanings depending on whether it's produced at the eye-, nose-, or chin-level. Other features determining the meaning of a sign are hand shape, palm orientation, movement, and non-manual markers (e.g. facial expressions). To express syntactic relationships, Sign Languages exploit the advantages of the visuo-spatial medium in which the signs are produced -- the syntactic structure of sign languages therefore often differs from that of spoken languages. Two important features of most sign language\'s grammars (including American Sign Language (ASL), Deutsche Gebärdensprache (DGS) and several other major sign languages) are directionality and simultaneous encoding of elements of information: - Directionality The direction in which the sign is made often determines the subject and the object of a sentence. Nouns in SL can be \'linked\' to a particular point in space, and later in the discourse they can be referred to by pointing to that same spot again (this is functionally related to pronouns in English). The object and the subject can then be switched by changing the direction in which the sign for a transitive verb is made. - Simultaneous encoding of elements of information The visual medium also makes it possible to encode several pieces of information simultaneously. Consider e.g. the sentence \"The flight was long and I didn\'t enjoy it\". In English, the information about the duration and unpleasantness of the flight have to be encoded sequentially by adding more words to the sentence. To enrich the utterance \"The flight was long" with the information about the unpleasantness of the flight, another sentence ("I did not enjoy it\") has to be added to the original one. So, in order to convey more information, the length of the original sentence must grow. In sign language, however, the increase of information in an utterance doesn't necessarily increase the length of the utterance. To convey information about the unpleasantness of a long flight experienced in the past, one can just use the single sign for \"flight\" with the past tense marker, moved in a way that represents the attribute \"long\", combined with the facial expression of disaffection. Since all these features are signed simultaneously, no additional time is needed to utter \"The flight was long\" as compared to \"The flight was long and I didn\'t enjoy it\". **Neurology of SL** Since sentences in SL are encoded visually, and since its grammar is often based on visual rather than sequential relationships among different signs, it could be suggested that the processing of SL mainly depends on the right hemisphere, which is mainly concerned with the performance on visual and spatial tasks. However, there is evidence suggesting that processing of SL and spoken language might be equally dependant on the left hemisphere, i.e. that the same basic neural mechanism may be responsible for all language functioning, regardless of its modality (i.e. whether the language is spoken or signed). The importance of the left hemisphere in SL processing indicated e.g. by the fact that signers with a damaged right hemisphere may not be aphasiacs, whereas as in case of hearing subjects, lesions in the left hemisphere of signers can result in subtle linguistic difficulties (Gordon, 2003). Furthermore, studies of aphasic native signers have shown that damage to anterior portions of the left hemisphere (Broca's area) result in a syndrome similar to Broca's aphasia -- the patients lose fluency of communication, they aren't able to correctly use syntactic markers and inflect verbs, although the words they sign are semantically appropriate. In contrast, patients with damages to posterior portions of the superior temporal gyrus (Wernicke's area) can still properly inflect verbs, set up and retrieve nouns from a discourse locus, but the sequences they sign have no meaning (Poizner, Klima & Bellugi, 1987). So, like in the case of spoken languages, anterior and posterior portions of the left hemisphere seem to be responsible for the syntax and semantics of the language respectively. Hence, it's not essential for the \"syntax processing mechanisms\" of the brain whether the syntax is conveyed simultaneously through spatial markers or successively through word order and morphemes added to words - the same underlying mechanisms might be responsible for syntax in both cases. Further evidence for the same underlying mechanisms for spoken and signed languages comes from studies in which fMRI has been used to compare the language processing of: - 1\. congenitally deaf native signers of British Sign Language, - 2\. hearing native signers of BSL (usually hearing children of deaf parents) - 3\. hearing signers who have learned BSL after puberty - 4\. non-signing subjects Investigating language processing in these different groups allows making some distinctions between different factors influencing language organization in the brain - e.g. to what amount does deafness influences the organization of language in the brain as compared to just having SL as a first language(1 vs. 2), or to what amount does learning of SL as a first language differ from learning SL as native language(1,2 vs.3), or to what amount is language organized in speakers as compared to signers(1,2,3 vs.4). These studies have shown that typical areas in the left hemisphere are activated in both native English speakers given written stimuli and native signers given signs as stimuli. Moreover, there are also areas that are equally activated both in case of deaf subjects processing sign language and hearing subjects processing spoken language -- a finding which suggests that these areas constitute the core language system regardless of the language modality(Gordon, 2003). Different from speakers, however, signers also show a strong activation of the right hemisphere. This is partly due to the necessity to process visuo-spatial information. Some of those areas, however (e.g. the angular gyrus) are only activated in native signers and not in hearing subjects that learned SL after puberty. This suggests that the way of learning sign languages (and languages in general) changes with time: Late learner\'s brains are unable to recruit certain brain regions specialized for processing this language (Newman et al., 1998).\] We have seen that evidence from aphasias as well as from neuroimaging suggest the same underlying neural mechanisms to be responsible for sign and spoken languages. It 's natural to ask whether these neural mechanisms are even more general, i.e. whether they are able to process any type of symbolic system underlying some syntax and semantics. One example of this kind of more general symbolic system is music. ### Music Like language, music is a human universal involving some combinatorial principles that govern the organizing of discrete elements (tones) into structures (phrases) that convey some meaning -- music is a symbolic system with a special kind of syntax and semantics. It's therefore interesting to ask whether music and natural language share some neural mechanisms: whether processing of music is dependent on processing of language or the other way round, or whether the underlying mechanisms underlying them are completely separate. By investigating the neural mechanisms underlying music we might find out whether the neural processes behind language are unique to the domain of natural language, i.e. whether language is modular. Up to now, research in the neurobiology of music has yielded contradicting evidence regarding these questions. On the one hand, there is evidence that there is a double dissociation of language and music abilities. People suffering from amusia are unable to perceive harmony, to remember and to recognize even very simple melodies; at the same time they have no problems in comprehending or producing speech. There is even a case of a patient who developed amusia without aprosodia, i.e. although she couldn\'t recognize tone in musical sequences, she nevertheless could still make use of pitch, loudness, rate, or rhythm to convey meanings in spoken language (Pearce, 2005). This highly selective problem in processing music (amusia) can occur as a result of brain damage, or be inborn; in some cases it runs on families, suggesting a genetic component. The complement syndrome of amusia also exists -- after suffering a brain damage in the left hemisphere, the Russian composer Shebalin lost his speech functions, but his musical abilities remained intact (Zatorre, McGill, 2005). On the other hand, neuroimaging data suggest that language and music have a common mechanism for processing syntactical structures. The P600 ERP\`s in the Broca area, measured as a response to ungrammatical sentences, is also elicited in subjects listening to musical chord sequences lacking harmony (Patel, 2003) -- the expectation of typical sequences in music could therefore be mediated by the same neural mechanisms as the expectation of grammatical sequences in language. A possible solution to this apparent contradiction is the dual system approach (Patel, 2003) according to which music and language share some procedural mechanisms (frontal brain areas) responsible for processing the general aspects of syntax, but in both cases these mechanisms operate on different representations (posterior brain areas) -- notes in case of music and words in case of language. ## Outlook Many questions are to be answered, for it is e.g. still unclear whether there is a distinct language module (that you could cut out without causing anything in other brain functions) or not. As Evely C. Ferstl points out in her review, the next step after exploring distinct small regions responsible for subtasks of language processing will be to find out how they work together and build up the language network. ## References & Further Reading `        ` *Books - english* - Brigitte Stemmer, Harry A. Whitaker. Handbook of Neurolinguistics. Academic Press (1998). - Marie T. Banich: Neuropsychology. The neural bases of mental function (1997). - Ewa Dąbrowska: Language, Mind and Brain. Edinburgh University press Ltd.(2004) - *a review:* Evelyn C. Ferstl, The functional neuroanatomy of text comprehension. What\'s the story so far?\" from: Schmalhofer, F. & Perfetti, C. A. (Eds.), Higher Level Language Processes in the Brain:Inference and Comprehension Processes. Lawrence Erlbaum. (2004) *Books - german* - Müller,H.M.& Rickert,G. (Hrsg.): Neurokognition der Sprache. Stauffenberg Verlag (2003) - Poizner, Klima & Bellugi: What the hands reveal about the brain. MIT Press (1987) - N. Chomsky: Aspects of the Theory of Syntax. MIT Press (1965). - Neville & Bavelier: Variability in the effects of experience on the development of cerebral specializations: Insights from the study of deaf individuals. Washington, D.C.: US Government Printing Office (1998) - Newman et al.: Effects of Age of Acquisition on Cortical Organization for American Sign Language: an fMRI Study. NeuroImage, 7(4), part 2 (1998) *Links - english* - Robert A. Mason and Marcel Adam Just: How the Brain Processes Causal Inferences in Text - Neal J. Pearlmutter and Aurora Alma Mendelsohn: Serial versus Parallel Sentence Comprehension - Brain Processes of Relating a Statement to a Previously Read Text: Memory Resonance and Situational Constructions - Clahsen, Harald: Lexical Entries and Rules of Language: A Multidisciplinary Study of German Inflection. - Cherney, Leora (2001): Right Hemisphere Brain Damage - Grodzinsky, Yosef (2000): The neurology of syntax: Language use without Broca\'s area. - Müller, H.M. & Kutas, M. (1996). What\'s in a name? Electrophysiological differences between spoken nouns, proper names and one\'s own name. NeuroReport 8:221-225. - Müller, H. M., King, J. W. & Kutas, M. (1997). Event-related potentials elicited by spoken relative clauses Cognitive Brain Research 4:193-203. *Links - german* - University of Bielefeld: - Müller, H. M., Weiss, S. & Rickheit, G. (1997). Experimentelle Neurolinguistik: Der Zusammenhang von Sprache und Gehirn In: Bielefelder Linguistik (Hrsg.) Aisthesis-Verlag, pp. 125--128. - Müller, H.M. & Kutas, M. (1997). Die Verarbeitung von Eigennamen und Gattungsbezeichnungen: Eine elektrophysiologische Studie. In: G. Rickheit (Hrsg.). Studien zur Klinischen Linguistik - Methoden, Modelle, Intervention. Opladen: Westdeutscher Verlag, pp. 147--169. - Müller, H.M., King, J.W. & Kutas, M. (1998). Elektrophysiologische Analyse der Verarbeitung natürlichsprachlicher Sätze mit unterschiedlicher Belastung des Arbeitsgedächtnisses. Klinische Neurophysiologie 29: 321-330. ```{=html} <!-- --> ``` - Michael Schecker (1998): Neuronale \"Kodierung\" zentraler Sprachverarbeitungsprozesse \--\> Debates (only a criticism) ### Organizational Issues **Group Members 2007** - send eMail to all - dberndt - phenk - tgeishau - bschledd **Group Members 2006** - send eMail to all - jbuergle - maebert - hknepper - hnasir - npraceju - msumpf
# Cognitive Psychology and Cognitive Neuroscience/Situation Models and Inferencing +:------------------------------+:----:+------------------------------:+ | Previous | O | [Next | | Chapter | | ext_Comprehension "wikilink") | niti | | | | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ ## Introduction An important function and property of the human cognitive system is the ability to extract important information out of textually and verbally described situations. This ability plays a vital role in understanding and remembering. But what happens to this information after it is extracted, how do we represent it and how do we use it for inferencing? With this chapter we introduce the concept of a "situation model" (van Dijk&Kintsch, 1983, "mental model": Johnson-Laird, 1983), which is the mental representation of what a text is about. We discuss what these representations might look like and show the various experiments that try to tackle these questions empirically. By assuming situations to be encoded by perceptual symbols (Barsalou, 1999), the theory of Situation Models touches many aspects of Cognitive Philosophy, Linguistics and Artificial Intelligence. In the beginning of this chapter, we will mention why Situation Models are important and what we use them for. Next we will focus on the theory itself by introducing the four primary types of information - the situation model components, its Levels of Representation and finally two other basic types of knowledge used in situation model construction and processing (general world knowledge and referent specific knowledge). Situation models not only form a central concept in theories of situated cognition that helps us in understanding how situational information is collected and how new information gets integrated, but they can also explain many other phenomena. According to van Dijk & Kintsch, situation models are responsible for processes like domain-expertise, translation, learning from multiple sources or completely understanding situations just by reading about them. These situation models consist, according to most researches in this area, of five dimensions, which we will explain later. When new information concerning one of these dimensions is extracted, the situation model is changed according to the new information. The bigger the change in the situation model is, the more time the reader needs for understanding the situation with the new information. If there are contradictions, e.g. new information which does not fit into the model, the reader fails to understand the text and probably has to reread parts of the text to build up a better model. It was shown in several experiments that it is easier to understand texts that have only small changes in the five dimensions of text understanding. It also has been found that it is easier for readers to understand a text if the important information is more explicitly mentioned. For this reason several researchers wrote about the importance of fore-grounding important information (see Zwaan&Radvansky 1998 for a detailed list). The other important issue about situation models is the multidimensionality. Here the important question is how are the different dimensions related and what is their weight for constructing the model. Some researchers claim that the weight of the dimensions shifts according to the situation which is described. Introducing such claims will be the final part of this chapter and aims to introduce you to current and future research goals. #### The VIP: Rolf A. Zwaan Rolf A. Zwaan, born September 13, 1962 in Rotterdam (the Netherlands), is a very important person for this topic, since he made the most research (92 publications in total), and also because most of our data is taken from his work. Zwaan did his MA (1986) and his Ph.D. (1992) at the Utrecht University (Netherlands), both cum laude. Since then he collected multiple awards like the Developing Scholar Award (Florida state University, 1999) or the Fellow of the Hanse Institute for Advanced Study (Delmenhorst, Germany, 2003) and became member of several Professional Organisations like the Psychonomic Society, the Cognitive Science Society or the American Psychological Society. He works as Chair of the Biology & Cognitive Psychology at the Erasmus University in Rotterdam (Netherlands), since 2007. ## Why do we need situation models? A lot of tasks which are based on language processing can only be explained by the usage of situation models. The so called situation model or mental model consists of five different dimensions, which refer to different sources. To comprehend a text or just a simple sentence, situation models are useful. Furthermore the comprehension and combination of several texts and sentences can be explained by that theory much better. In the following, some examples are listed why we really need situation models. #### Integration of information across sentences Integration of information across sentences is more than just understanding a set of sentences. For example: *"Gerhard Schroeder is in front of some journalists. Looking forward to new ideas is nothing special for the Ex-German chancellor. It is like in the good old days in 1971 when the leader of the Jusos was behind the polls and talked about changes."* This example only makes sense to the reader if he is aware that *"Gerhard Schroeder"*, *"Ex-German chancellor"* and *"the leader of the Jusos in 1971"* is one and the same person. If we build up a situation model, in this example *"Gerhard Schroeder"* is our token. Every bit of information which comes up will be linked to this token, based on grammatical and world knowledge. The definite article in the second sentence refers to the individual in the first sentence. This is based on grammatical knowledge. Every definite article indicates a connection to an individual in a previous sentence. If there would be an indefinite article, we have to build a new token for a new individual. The third sentence is linked by domain knowledge to the token. It has to be known that "Gerhard Schroeder" was the leader of the Jusos in 1971. Otherwise the connection can only be guessed. We can see that an integrated situation model is needed to comprehend the connection between the three sentences. #### Explanation of similarities in comprehension performances across modalities The explanation of similarities in comprehension performances across modalities can only be done by the usage of situation models. If we read a newspaper article, watch a report on television or listen to a report on radio, we come up with a similar understanding of the same information, which is conveyed through different modalities. Thus we create a mental representation of the information or event. This mental representation does not depend on the modalities itself. Furthermore there is empirical evidence for this intuition. Baggett (1979) found out that students who saw a short film and students who heard a spoken version of the events in the short film finally produced a structurally similar recall protocol. There were differences in the protocols of the two groups but the differences were due to content aspects. Like the text version explicitly stated that a boy was on his way to school and in the movie this had to be inferred. #### Domain expertise on comprehension Situation models have a deep influence for effects of domain expertise on comprehension. In detail this means that person A, whose verbal skills are less than from person B, is able to outperform person B, if he has more knowledge of the topic domain. To give evidence for this intuition, there was a study by Schneider and Körkel (1989). They compared the recalls of "experts" and novices of a text about a soccer match. In the study were three different grades: 3rd, 5th and 7th. One important example in that experiment was that the 3rd grade soccer experts outperformed the 7th grade novices. The recall of units in the text was 54% by the 3rd grade experts and 42% by the 7th grade novices. The explanation is quite simple: The 3rd grade experts built up a situation model and used knowledge from their long-term memory (Ericsson & Kintsch, 1995). The 7th grade novices had just the text by which they can come up with a situation model. Some more studies show evidence for the theory that domain expertise may counteract with verbal ability, i.e. Fincher-Kiefer, Post, Greene & Voss, 1988 or Yekovich, Walker, Ogle & Thompson in 1990. #### Explanation of translation skills An other example why we need situation models is by trying to explain translation. Translating a sentence or a text from one language to another is not simply done by translating each word and building a new sentence structure until the sentence seems to be sound. If we have a look now at the example of a Dutch sentence: ![{width="450"} Now we can conclude that the translation level between Dutch and English is not based on the lexical-semantic level; it is based on the situation level. In this example "don't do something (action) before you haven't done something else (another action)". Other studies came up with findings that the ability to construct situation models during the translation is important for the translation skill (Zwann, Ericsson, Lally and Hill, in 1998). #### Multiple source learning People are able to learn about a domain from multiple documents. This phenomenon can be explained by a situation model, too. For example, we try to learn something about the *"Cold War"* we use different documents with information. The information in one document may be similar to other documents. Referents can be the same or special relationships in the "Cold War" can just be figured out by the usage of different documents. So what we are really doing by learning and reasoning is that we integrate information on the base of different documents into a common situation model, which has got an organized order of the information we've learned. We have seen that we need situation models in different tasks of language processing, but situation models are not needed in all tasks of language processing. An example is proofreading. A proofreader checks every word for its correctness. This ability does not contain the ability to construct situation models. This task uses the resources of the long-term memory in which the correct writing of each word is stored. The procedure is like: !Zwaan (2003{width="400"} This is done word by word. It is unnecessary to create situation models in this task for language processing. ## Multidimensionality of Situation Models ### Space Very often, objects that are spatially close to us are more relevant than more distant objects. Therefore, one would expect the same for situation models. consistent with this idea, comprehenders are slower to recognise words denoting objects distant from a protagonist than those denoting objects close to the protagonist (Glenberg, Meyer & Lindem, 1987). When comprehenders have extensive knowledge of the spatial layout of the setting of the story (e.g., a building), they update their representations according to the location and goals of the protagonist. They have the fastest mental access to the room that the protagonist is currently in or is heading to. For example, they can more readily say whether or not two objects are in the same room if the room mentioned is one of these rooms than if it is some other room in the building (e.g., Morrow, Greenspan, & Bower, 1987). This makes perfect sense intuitively because these are the rooms that would be relevant to us if we were in the situation. People's interpretation of the meaning of a verb denoting movement of people or objects in space, such as *to approach*, depends on their situation models. For example, comprehenders interpret the meaning of *approach* differently in *The tractor is just approaching the fence* than in *The mouse is just approaching the fence*. Specifically, they interpret the distance between the figure and the landmark as being longer when the figure is large (tractor) compared with when it is small (mouse). The comprehenders' interpretation also depends on the size of the landmark and the speed of the figure (Morrow & Clark, 1988). Apparently, comprehenders behave as if they are actually standing in the situation, looking at the tractor or mouse approaching a fence. ### Time We assume by default that events are narrated in their chronological order, with nothing left out. Presumably this assumption exists because this is how we experience events in everyday life. Events occur to us in a continuous flow, sometimes in close succession, sometimes in parallel, and often partially overlapping. Language allows us to deviate from chronological order, however. For example, we can say, "Before the psychologist submitted the manuscript, the journal changed its policy." The psychologist submitting the manuscript is reported first, even though it was the last of the two events to occur. If people construct a situation model, this sentence should be more difficult to process than its chronological counterpart (the same sentence, but beginning with "After"). Recent neuroscientific evidence supports this prediction. Event-related brain potential (ERP) measurements indicate that "before" sentences elicit, within 300 ms, greater negativity than "after" sentences. This difference in potential is primarily located in the left anterior part of the brain and is indicative of greater cognitive effort (Münte, Schiltz, & Kutas, 1998). In real life, events follow each other seamlessly. However, narratives can have temporal discontinuities, when writers omit events not relevant to the plot. Such temporal gaps, typically signalled by phrases such as *a few days later*, are quite common in narratives. Nonetheless, they present a departure from everyday experience. Therefore, time shifts should lead to (minor) disruptions of the comprehension process. And they do. Reading times for sentences that introduce a time shift tend to be longer than those for sentences that do not (Zwaan, 1996). `All other things being equal, events that happened just recently are more accessible to us than events that happened a while ago. `\ `Thus, in a situation model, `*`enter`*` should be less accessible after `*`An hour ago, John entered the building`*` than after `*`A moment ago, John entered the building`*`. `\ `Recent probe-word recognition experiments support this prediction (e.g., Zwaan, 1996).` ### Causation As we interact with the environment, we have a strong tendency to interpret event sequences as causal sequences. It is important to note that, just as we infer the goals of a protagonist, we have to infer causality; we cannot perceive it directly. Singer and his colleagues (e.g., Singer, Halldorson, Lear, & Andrusiak, 1992) have investigated how readers use their world knowledge to validate causal connections between narrated events. Subjects read sentence pairs, such as 1a and then 1b or 1a' and then 1b, and were subsequently presented with a question like 1c: (1a) Mark poured the bucket of water on the bonfire. (1a') Mark placed the bucket of water by the bonfire. (1b) The bonfire went out. (1c) Does water extinguish fire? Subjects were faster in responding to 1c after the sequence 1a-1b than after 1a'-1b. According to Singer, the reason for the speed difference is that the knowledge that water extinguishes fire was activated to validate the events described in 1a-1b. However, because this knowledge cannot be used to validate 1a'-1b, it was not activated when subjects read that sentence pair. ### Intentionality We are often able to predict people's future actions by inferring their intentionality, i.e. their goals. For example, when we see a man walking over to a chair, we assume that he wants to sit, especially when he has been standing for a long time. Thus, we might generate the inference "He is going to sit." Keefe and McDaniel (1993) presented subjects with sentences like *After standing through the 3-hr debate, the tired speaker walked over to his chair (and sat down)* and then with probe words (e.g., sat, in this case). Subjects took about the same amount of time to name sat when the clause about the speaker sitting down was omitted and when it was included. Moreover, naming times were significantly faster in both of these conditions than in a control condition in which it was implied that the speaker remained standing. ### Protagonists and Objects Comprehenders are quick to make inferences about protagonists, presumably in an attempt to construct a more complete situation model. Consider, for example, what happens after subjects read the sentence *The electrician examined the light fitting*. If the following sentence is *She took out her screwdriver*, their reading speed is slowed down compared with when the second sentence is *He took out his screwdriver*. This happens because she provides a mismatch with the stereotypical gender of an electrician, which the subjects apparently inferred while reading the first sentence (Carreiras, Garnham, Oakhill, & Cain, 1996). `Comprehenders also make inferences about the emotional states of characters. `\ `For example, if we read a story about Paul, who wants his brother Luke to be good in baseball, the concept of “pride” becomes activated in our mind when we read`\ `that Luke receives the Most Valuable Player Award (Gernsbacher, Goldsmith, & Robertson, 1992). `\ `Thus, just as in real life, we make inferences about people’s emotions when we comprehend stories.` ## Processing Frameworks ### Introduction In the process of language and text comprehension new information has to be integrated into the current situation model. This is achieved by a processing framework. There are various theories and insights on this process. Most of them only model one or some aspects of Situation Models and language comprehension. A list of theories, insights and developments in language comprehension frameworks: - an interactive model of comprehension (Kintsch and van Dijk, 1978) - early Computatinal Model (Miller, Kintsch, 1980) - Constructing-integration Model (Kintsch, 1988) - Structure-Building-Framework (Gernsbacher,1990) - Capacity Constraint Reader Model (Just, Carpenter, 1992) - Constructivist framework (Graesser, Singer, Trabasso, 1994) - Event Indexing Model (Zwaan, Langston, Graesser, 1995) - Landscape Model (van den Brock, Risden, Fletcher, & Thurlow, 1996) - Capacity-constrained construction-integration Model (Goldman, Varma, Coté, 1996) - The Immersed Experiencer Framework (Zwaan, 2003) In this part of the chapter on Situation Models we will talk about several models; we will start with some of the early stuff and then go to the popular later ones. We will start with the work of Kintsch in the 70s and 80s and then go on to later research which is based on this. ### An interactive Model of Comprehension This model was already developed in the 80s; it is the basis for many later models like the CI-Model, or even the Immersed-Experiencer Framework. According to Kintsch and van Dijk (1978), text comprehension proceeds in cycles. In every cycle a few propositions are processed, this number is determined by the capacity of the Short-Term Memory, so 7 plus or minus 2. In every cycle the new propositions are connected to existing ones, they therefore form a connected and hierarchical set. ### Early Computational Model This computational model from Miller and Kintsch tried to model earlier theories of comprehension, to make predictions according to these and compare them to behavioural studies and experiments. It consisted of several modules. One was a chunking program: It\'s task is to read in one word at the moment, identify if it is a proposition and decide whether to integrate it or not. This part of the model was not done computationally. The next part in the input order was the Microstructure Coherence Program (MCP). The MCP sorted the propositions and stored them in the Working Memory Coherence Graph. The task of the Working Memory Coherence Graph was then to decide which propositions should be kept active during the next processing cycle. All propositions are stored in the Long Term Memory Coherence Graph, this decided which propositions should be transferred back in to the Working Memory or it can construct a whole new Working Memory Graph with a different superordinate node. The problem with this Computational Model was that it show a really low performance. But still it led to further research which tried to overcome it\'s shortcomings. ### Event-Indexing Model The *Event-Indexing Model* was first proposed by Zwaan, Langston and Graesser (1995). It makes claims about how the incoming information in comprehension is processed and how it is represented in the long-term memory. According to the *Event-Indexing Model* all incoming actions events are split into five indexes. The five indexes are the same as the five situational dimensions, though Zwaan & Radvasnky(1998) claim that there are possibly more dimensions. These might be found in future research. One basic point of this model is the processing time of integrating new events into the current model. It is easier to integrate a new incoming event if it shares indexes with a previous event. The more contiguous the new event is, the easier it is integrated into the new Situation Model. This prediction made by Zwaan & Radvanksy (1998) is supported by some prior research (Zwaan, Magliano and Graesser, 1995). The other important point of the *Event-Indexing Model* is the representation in long-term memory. Zwaan & Radvasnky (1998) predict that this representation is a network of nodes, these nodes encode the events. The nodes are linked with each other through situational links according to the indexes they share. This connection does not only encode if two nodes share indexes but it also encodes the number of shared indexes through its strength. This second point already hints what the *Event-Indexing Model* lacks. There are several things which it does not include. For example it does not encode the temporal order of the events nor the direction of the causal relationships. The biggest disadvantage of the *Event-Indexing Model* is clearly that it treats the different dimensions as different entities though they probably interact with each other. Zwaan & Radvansky (1998) updated the *Event-Indexing Model* with some features. This new model splits the processed information into three types. These three types are the situational framework, the situational relations and the situational content. The situational framework grounds the situation in space and time, and its construction is obligatory. If no information is given this framework is probably built up by standard values retrieved from prior world knowledge or some empty variable would be instantiated. he situational relations are based on the five situational dimensions. These are analysed through the *Event-Indexing Model*. This kind of situational information includes not the basic information, which is given in the situational framework, but the relationships between the different entities or nodes in the network. In contrast to the situational framework the situational relations are not obligatory. If there is no information given or there are no possible inferences between entities, then there is simply no relationship there. There is also an index which addresses importance to the different relations. This importance consists of the necessity of the information to understand the situation, the easiness to inference it when it would not be mentioned and how easy the information can later be remembered. Another distinction this theory makes is the one between functional and non-functional relations (Carlson-Radvansky & Radvansky, 1996; Garrod & Sanford, 1989). Functional relations describe the interaction between different entities whereas non-functional relations are the ones between non-interacting entities. The situational content consists of the entities in the situation like protagonists and objects and their properties. These are only integrated explicitly in the Situation Model, like situational relations, if they are necessary for the understanding of the situation. Nonetheless the central and most important entities and their properties are obligatory again. It is proposed that, in order to keep the processing time low, non-essential information is only represented by something like a pointer so that this information can be retrieved if necessary. ### The Immersed Experiencer Framework The Immersed Experiencer Framework (IEF) is based on prior processing framework models (see above for a detailed list) but tries to include several other research findings too. For example it was found that during comprehension brain regions are activated, which are very close or even overlap with brain regions which are active during the perception or the action of the words meaning (Isenberg et al., 2000; Martin & Chao, 2001; Pulvermüller, 1999, 2002). During comprehension there is also a visual representation of shape and orientation of objects (Dahan & Tanenhaus, 2002; Stanfield & Zwaan, 2002; Zwaan et al., 2002; Zwaan & Yaxley, in press a, b). Visual-spatial information primes sentence processing (Boroditsky, 2000). These visual representations can interfer with the comprehension (Fincher-Kiefer, 2001). Findings from (Glenberg, Meyer, & Lindem, 1987; Kaup & Zwaan, in press; Morrow *et al.*, 1987; Horton & Rapp, in press; Trabasso & Suh, 1993; Zwaan et al., 2000) suggest that information which is part of the situation and the text is more active in the reader\'s mind than information which is not included. The fourth research finding is that people move their eyes and hand during comprehension in a consistent way with the described the situation. (Glenberg & Kaschak, in press; Klatzky et al., 1989; Spivey et al., 2000). The main point of the Immersed Experiencer Framework is the idea that words active experiences with their referents. For example \"an eagle in the sky\" activates a visual experience of a eagle with stretched-out wings while \"an eagle in the nest\" activates a different visual experience. According to Zwaan (2003) the IEF should be seen as an engine to make predictions about language comprehension. These predictions are then suggested for further research. According to the IEF the process of language comprehension consists of three components, these are activation, construal and integration. Each component works at a different level. Activation works at the world level, construal is responsible for the clause level while integration is active at the discourse level. Though the IEF shares many points with earlier models of language comprehension it differs in some main points. For example it suggests that language comprehension involves action and perceptual representations and not amodal propositions (Zwaan, 2003). ## Levels of Representation in Language and Text Comprehension A lot of theories try to explain the situation model or so called mental model in different representations. Several theories of the representation deal with the comprehension from the text into the situation model itself. How many levels are included or needed and how is the situation model constructed, is it done by once like: Sentence → Situation Model Or are there levels in between which have to be passed until the model is constructed? Here are three different representations shown which try to explain the construction of the situation model by a text. #### Propositional Representation The propositional Representation claims that a sentence will be structured in another way and then it is stored. Included information does not get lost. We will have a look at the simple sentence: *"George loves Sally"* the propositional representation is \[LOVES(GEORGE, SALLY)\] It is easy to see that the propositional representation is easy to create and the information is still available. #### Three levels of representation !Fletcher(1994); van Dijk & Kintch(1983); Zwaan & Radvansky (1998); van Dijk & Kintch(1983); Zwaan & Radvansky (1998)"){width="150"} This theory says that there exist three levels of representation the surface form, text base and the situation model. In this example the sentence "The frog ate the bug." Is already the surface form. We naturally create semantically relations to understand the sentence (semantic tree in the figure). The next level is the "Text base". \[EAT(FROG, BUG)\] is the propositional representation and *Text base* is close to this kind of representation, except that it is rather spatial. Finally the situation model is constructed by the "Text base" representation. We can see that the situation model does not include any kind of text. It is a mental picture of information in the sentence itself. #### Two levels of representation !Frank Koppen, Nordman, Vonk (to appear) Zwaan (2004) Zwaan (2004)"){width="150"} This theory is like the "three levels of representations" theory. But the "Text base" level is left out. The theory itself claims that the situation model is created by the sentence itself and there is no "Text base" level needed. Further situation model theories directing experiences exist. So not only text comprehension is done by situation models, learning through direct experience is handled by situation models, too. #### KIWi-Model !A unified model by \"Prof. Dr.\" Schmalhofer{width="250"} One unified model the so called KIWi-Model tries to explain how text representation and direct experience interact with a situation model. Additionally the domain knowledge is integrated. The domain knowledge is used by forming a situation model in different tasks like simple sentence comprehension (chapter: Why do we need Situation Models). The KIWi-Model shows that a permanent interaction between "text representation → situation model" and between "sensory encoding → situation model" exists. These interactions supports the theory of a permanent updating of the mental model. ## Inferencing Inferencing is used to build up complex situation models with limited information. For example: in 1973 John Bransford and Marcia Johnson made a memory experiment in which they had two groups reading variations of the same sentence. The first group read the text \"*John was trying to fix the bird house. He was **pounding** the nail when his father came out to watch him do the work*\" The second group read the text \"*John was trying to fix the bird house. He was **looking for** the nail when his father came out to watch him do the work*\" After reading, some test statements were presented to the participants. These statements contained the word *hammer* which did not occur in the original sentences, e.g.: \"*John was using a hammer to fix the birdhouse. He was looking for the nail when his father came out to watch him*\". Participants of the first group said they had seen 57% of the test statements, while the participants from the second group had seen only 20% of the test statements. As one can see, in the first group there is a tendency of believing to have seen the word *hammer*. The participants of this group made the inference, that John used a hammer to pound the nail. This memory influence test is good example to get an idea what is meant by making inferences and how they are used to complete situation models. While reading a text, inferencing creates information which is not explicitly stated in the text; hence it is a creative process. It is very important for text understanding in general, because texts cannot include all information needed to understand the sense of a story. Texts usually leave out what is known as *world knowledge*. World knowledge is knowledge about situations, persons or items that most people share, and therefore don\'t need to be explicitly stated. Each person should be able to infer this kind of information, as for example that we usually use hammers to pound nails. It would be impossible to write a text, if it had to include all information it deals with; if there was no such thing like inferencing or if it was not automatically done by our brain. There is a number of different kinds of inferences: ### Anaphoric Inference This kind of Inferencing usually connects objects or persons from one to another sentence. Therefore it is responsible for connecting cross-sentence information. E.g. in \"*John hit the nail. He was proud of his stroke*\", we directly infer that \"he\" and \"his\" relate to \"John\". We normally make this kind of inference quite easily. But there can be sentences where more persons and other words relating to them are mixed up and people have problems understanding the story at first. This is normally regarded as bad writing style. ### Instrumental Inference This type of Inference is about the tools and the methods used in the text, like the hammer in the example above. Or for example, if you read about somebody flying to New York, you would not infer that this person has built a dragon-flyer and jumped off a cliff but that he or she used a plane, since there is nothing else mentioned in the text and a plane is the most common form of flying to New York. If there is no specific information about tools, instruments and methods, we get this information from our *General World Knowledge* ### Causal Inference Causal Inference is the conclusion that one event caused another in the text, like in \"He hit his nail. So his finger ached\". The first sentence gives the reason why the situation described in the second sentence came to be. It would be more difficult to draw a causal inference in an example like \"He hit his nail. So his father ran away\", although one could create an inference on this with some fantasy. Causal inferences create causal connections between text elements. These connections are separated into *local connections* and *global connections*. Local connections are made within a range of 1 to 3 sentences. This depends on factors like the capacity of the working memory and the concentration due reading. Global connections are drawn between the information in one sentence together with the background information gathered so far about the whole text. Problems can occur with Causal Inferences when a story is *inconsistent.* For example, vegans eating steak would be inconsistent. An interesting fact about Causal Inferences (Goldstein, 2005) is that the kind of Inferences we draw here that are not easily seen at first are easier to remember. This may be due to the fact that they required a higher mental processing capacity while drawing the inference. So this \"not-so-easy\" inference seems to be marked in a way that it is easier to remember it. ### Predictive / Forward Inference Predictive/Forward Inferences uses the *General World Knowledge* of the reader to build his prediction of the consequences of what is currently happening in the story into the Situation Model. ### Integrating Inferences into Situation Models The question how models enter inferential processes is highly controversial in the two disciplines of cognitive psychology and artificial intelligence. A.I. gave a deep insight in psychological procedures and since the two disciplines crossed their ways and give two main bases of the cognitive science. The arguments in these are largely independent from each other although they have much in common. Johnson-Laird (1983) makes a distinction between three types of reasoning-theories in which inferencing plays an important role. The first class gears to logical calculi and have been implemented in many formal system. The programming language Prolog arises from this way of dealing with reasoning and in psychology many theories postulate formal rules of inference, a \"mental logic.\" These rules work in a purely syntactic way and so are \"context free,\" blind for the context of its content. A simple example clarifies the problem with this type of theory: `    If patients have cystitis, then they are given penicillin.` and the logical conclusion: `    If patients have cystitis and are allergic to penicillin, then they are given penicillin` This is logically correct, but seems to fail our common sense of logic. The second class of theories postulate content specific rules of inference. Their origin lies in programming languages and production systems. They work with forms like \"If x is a, then x is b\". If one wants to show that x is b, showing that x is a sub-goal of this argumentation. The idea of basing psychological theories of reasoning on content specific rules was discussed by Johnson-Laird and Wason and various sorts of such theories have been proposed. A related idea is that reasoning depends on the accumulation of specific examples within a connectionist framework, where the distinction between inference and recall is blurred. The third class of theories is based on mental models and does not use any rules of inferencing. The process of building mental models of things heard or read. The models are in an permanent change of updates. A model built, will be equipped with new features of the new information as long as there is no information, which generates a conflict with that model. If this is the case the model is generally re-built, so that the conflict generating information fits into the new model. ## Important Topics of current research ### Linguistic Cues versus World Knowledge According to many researchers, language is the set of processing instructions on how to build up the Situation Model of the represented situation (Gernsbacher, 1990; Givon, 1992; Kintsch, 1992; Zwaan & Radvansky, 1998). As mentioned, readers use the lexical cues and information to connect the different situational dimensions and integrate them into the model. Another important point here is prior world knowledge. World knowledge also influences how the different information in a situation model are related. The relation between linguistic cues and world knowledge is therefore an important topic of current and future research in the area of Situation Models. ### Multidimensionality Another important aspect of current research in the area of Situation Models is the Multidimensionality of the Models. The main aspect is here how the different dimensions relate to each other, how they influence and interact. The question here is also if they interact at all and which interact. Most studies in the field were only about one or a few of the situational dimensions. ## References Ashwin Ram, et al. (1999) Understanding Language Understanding - chapter 5 Baggett, P. (1979). Structurally equivalent stories in movie and text and the effect of the medium on recall. Journal of Verbal Learning and Verbal Behavior, 18, 333-356. Bertram F. Malle, et al. (2001) Intentions and Intentionality - chapter 9 Boroditsky, L. (2000). Metaphoric Structuring: Understanding time through spatial metaphors. Cognition, 75, 1-28. Carlson-Radvansky, L. A., & Radvansky, G. A. (1996). The influence of functional relations on spatial term selection. Psychological Science, 7, 56-60. Carreiras, M., et al. (1996). The use of stereotypical gender information in constructing a mental model: Evidence from English and Spanish. Quarterly Journal of Experimental Psychology, 49A, 639-663. Dahan, D., & Tanenhaus, M.K. (2002). Activation of conceptual representations during spoken word recognition. Abstracts of the Psychonomic Society, 7, 14. Ericsson, K. A., & Kintsch, W. (1995). Long-term working memory. Psychological Review, 102, 211-245. Farah, M. J., & McClelland, J. L. (1991). A computational model of semantic memory impairment: modality specificity and emergent category specificity. Journal of Experimental Psychology: General, 210, 339-357. Fincher-Kiefer (2001). Perceptual components of situation models. Memory & Cognition, 29 , 336-343. Fincher-Kiefer, R., et al. (1988). On the role of prior knowledge and task demands in the processing of text. Journal of Memory and Language, 27, 416-428. Garrod, S. C., & Sanford, A. J. (1989). Discourse models as interfaces between language and the spatial world. Journal of Semantics, 6, 147-160. Gernsbacher, M.A. (1990), Language comprehension as structure building. Hillsdale, NJ: Erlbaum. Glenberg, A. M., & Kaschak, M. P. (2002). Grounding language in action. Psychonomic Bulletin & Review, 9, 558-565. Glenberg, A. M., et al. (1987) Mental models contribute to foregrounding during text comprehension. Journal of Memory and Language 26:69-83. Givon, T. (1992), The grammar of referential coherence as mental processing instructions, Linguistics, 30, 5-55. Goldman, S.R., et al. (1996). Extending capacityconstrained construction integration: Towards \"smarter\" and flexible models of text comprehension. Models of understanding text (pp. 73--113). Goldstein, E.Bruce, Cognitive Psychology, Connecting Mind, Research, and Everyday Experience (2005) - . Graesser, A. C., Singer, M., & Trabasso, T. (1994), Constructing inferences during narrative text comprehension. Psychological Review, 101, 371-395. Holland, John H. , et al. (1986) Induction. Horton, W.S., Rapp, D.N. (in press). Occlusion and the Accessibility of Information in Narrative Comprehension. Psychonomic Bulletin & Review. Isenberg, N., et al. (1999). Linguistic threat activates the human amygdala. Proceedings of the National Academy of Sciences, 96, 10456-10459. Johnson-Laird, P. N. (1983). Mental models: Towards a cognitive science of language, inference, and consciousness. Cambridge, MA: Harvard University Press. John R. Koza, et al. (1996) Genetic Programming Just, M. A., & Carpenter, P. A. (1992). A capacity hypothesis of comprehension: Individual differences ih working memory. Psychological Review, 99, 122-149. Kaup, B., & Zwaan, R.A. (in press). Effects of negation and situational presence on the accessibility of text information. Journal of Experimental Psychology: Learning, Memory, and Cognition. Keefe, D. E., & McDaniel, M. A. (1993). The time course and durability of predictive inferences. Journal of Memory and Language, 32, 446-463. Kintsch, W. (1988), The role of knowledge in discourse comprehension: A construction-integration model, Psychological Review, 95, 163-182. Kintsch, W., & van Dijk, T. A. (1978), Toward a model of text comprehension and production, Psychological Review, 85, 363-394. Kintsch, W. (1992), How readers construct situation models for stories: The role of syntactic cues and causal inferences. In A. E Healy, S. M. Kosslyn, & R. M. Shiffrin (Eds.), From learning processes to cognitive processes. Essays in honor of William K. Estes (Vol. 2, pp. 261 -- 278). Klatzky, R.L., et al. (1989). Can you squeeze a tomato? The role of motor representations in semantic sensibility judgments. Journal of Memory and Language, 28, 56-77. Martin, A., & Chao, L. L. (2001). Semantic memory and the brain: structure and processes. Current Opinion in Neurobiology, 11, 194-201. McRae, K., et al. (1997). On the nature and scope of featural representations of word meaning. Journal of Experimental Psychology: General, 126, 99-130. Mehler, Jacques, & Franck, Susana. (1995) Cognition on Cognition - chapter 9 Miceli, G., et al. (2001). The dissociation of color from form and function knowledge. Nature Neuroscience, 4, 662-667. Morrow, D., et al. (1987). Accessibility and situation models in narrative comprehension. Journal of Memory and Language, 26, 165-187. Pulvermüller, F. (1999). Words in the brain\'s language. Behavioral and Brain Sciences, 22, 253-270. Pulvermüller, F. (2002). A brain perspective on language mechanisms: from discrete neuronal ensembles to serial order. Progress in Neurobiology, 67, 85--111. Radvansky, G. A., & Zwaan, R.A. (1998). Situation models. Schmalhofer, F., MacDaniel, D. Keefe (2002). A Unified Model for Predictive and Bridging Inferences Schneider, W., & Körkel, J. (1989). The knowledge base and text recall: Evidence from a short-term longitudinal study. Contemporary Educational Psychology, 14, 382-393. Singer, M., et al. (1992). Validation of causal bridging inferences. Journal of Memory and Language, 31, 507-524. Spivey, M.J., et al. (2000). Eye movements during comprehension of spoken scene descriptions. Proceedings of the Twenty-second Annual Meeting of the Cognitive Science Society (pp. 487--492). Stanfield, R.A. & Zwaan, R.A. (2001). The effect of implied orientation derived from verbal context on picture recognition. Psychological Science, 12, 153-156. Talmy, Leonard,(2000) Toward a Cognitive Semantics - Vol. 1 - chapter1 van den Broek, P., et al. (1996). A \"landscape\" view of reading: Fluctuating patterns of activation and the construction of a memory representation. In B. K. Britton & A. C. Graesser (Eds.), Models of understanding text (pp. 165--187). Van Dijk, T. A., and W. Kintsch. (1983).Strategies of discourse comprehension. Yekovich, F.R., et al. (1990). The influence of domain knowledge on inferencing in low-aptitude individuals. In A. C. Graesser & G. H. Bower (Eds.), The psychology of learning and motivation (Vol. 25, pp. 175--196). New York: Academic Press. Zwaan, R.A. (1996). Processing narrative time shifts. Journal of Experimental Psychology: Learning, Memory and Cognition, 22, 1196-1207 Zwaan, R.A. (2003), The Immersed Experiencer: Toward an embodied theory of language comprehension.B.H. Ross (Ed.) The Psychology of Learning and Motivation, Vol. 44. New York: Academic Press. Zwaan, R. A., et al. (1998). Situation-model construction during translation. Manuscript in preparation, Florida State University. Zwaan, R. A., et al. ( 1995 ). The construction of situation models in narrative comprehension: An event-indexing model. Psychological Science, 6, 292-297. Zwaan, R. A., et al. (1995). Dimensions of situation model construction in narrative comprehension. Journal of Experimental Psychology.\" Learning, Memory, and Cognition, 21, 386-397. Zwaan, R. A., Radvansky (1998), Situation Models in Language Comprehension and Memory. in Psychological Bulletin, Vol.123,No2 p. 162-185. Zwaan, R.A., et al. (2002). Do language comprehenders routinely represent the shapes of objects? Psychological Science, 13, 168-171. Zwaan, R.A., & Yaxley, R.H. (a). Spatial iconicity affects semantic-relatedness judgments. Psychonomic Bulletin & Review. Zwaan, R.A., & Yaxley, R.H. (b). Hemispheric differences in semantic-relatedness judgments. Cognition. ## Links Cognitive Psychology Osnabrück Summer School course on Situation Models and Embodied Language Processes Dr. Rolf A. Zwaan\'s Homepage with many Papers International Hanse-Conference on Higher level language processes in the brain: Inference and Comprehension Processes 2003 University of Notre Dame Situation Model Research Group
# Cognitive Psychology and Cognitive Neuroscience/Reasoning and Decision Making No matter which public topic you discuss or which personal aspect you worry about -- you need reasons for your opinion and argumentation. Moreover, the ability of reasoning is responsible for your cognitive features of decision making and choosing among alternatives. Everyone of us uses these two abilities in everyday life to the utmost. Let us, therefore, consider the following scene of Knut\'s life: *"It is again a rainy afternoon in Osnabrück (Germany) and as Knut and his wife are tired of observing the black crows in their garden they decide to escape from the shabby weather and spend their holidays in Spain. Knut has never been to Spain before and is pretty excited. They will leave the next day, thus he is packing his bag. The crucial things first: some underwear, some socks, a pair of pyjamas and his wash bag with a toothbrush, shampoo, soap, sun milk and insect spray. But, Knut cannot find the insect spray until his wife tells him that she lost it and will buy some new. He advises her to take an umbrella for the way to the chemist as it is raining outside, before he turns back to his packing task. But what did he already pack into his bag? Immediately, he remembers and continues, packing his clothing into the bag, considering that each piece fits another one and finally his Ipod as he exclusively listens to music with this device. Since the two of them are going on summer holidays, Knut packs especially shorts and T-Shirts into his bag. After approximately half an hour, he is finally convinced that he has done everything necessary for having some fine holidays."* With regard to this sketch of Knut\'s holiday preparation, we will explain the basic principles of reasoning and decision making. In the following, it will be shown how much cognitive work is necessary for this fragment of everyday life. After presenting an insight into the topic, we will illustrate what kind of brain lesions lead to what kind of impairments of these two cognitive features. ## Reasoning In a process of reasoning available information is taken into account in form of premises "wikilink"). Through a process of inferencing a conclusion is reached on the base of these premises. The conclusion's content of information goes beyond the one of the premises. To make this clear consider the following consideration Knut makes before planning his holiday: ` `**`1. Premise: In all countries in southern Europe it is pretty warm during summer.`**\ ` `**`2. Premise: Spain is in southern Europe.`**\ ` `**`Conclusion: Therefore, in Spain it is pretty warm during summer.`** The conclusion in this example follows directly from the premises but it entails information which is not explicitly stated in the premises. This is a rather typical feature of a process of reasoning. In the following it is decided between the two major kinds of reasoning, namely **inductive** and **deductive** which are often seen as the complement of one another. ### Deductive reasoning Deductive reasoning is concerned with syllogisms in which the conclusion follows logically from the premises. The following example about Knut makes this process clear: ` `**`1.Premise: Knut knows: If it is warm, one needs shorts and T-Shirts.`**\ ` `**`2.Premise: He also knows that it is warm in Spain during summer.`**\ ` `**`Conclusion: Therefore, Knut reasons that he needs shorts and T-Shirts in Spain.`** In the given example it is obvious that the premises are about rather general information and the resulting conclusion is about a more special case which can be inferred from the two premises. Hereafter it is differentiated between the two major kinds of syllogisms, namely categorical and conditional ones. #### Categorical syllogisms In categorical syllogisms the statements of the premises begin typically with "all", "none" or "some" and the conclusion starts with "therefore" or "hence". These kinds of syllogisms fulfill the task of describing a relationship between two categories. In the example given above in the introduction of deductive reasoning these categories are *Spain* and *the need for shorts and T-Shirts*. Two different approaches serve the study of categorical syllogisms which are the **normative approach** and the **descriptive approach**. ##### The normative approach The normative approach is based on logic and deals with the problem of categorizing conclusions as either valid or invalid. "Valid" means that the conclusion follows logically from the premises whereas "invalid" means the contrary. Two basic principles and a method called **Euler Circles** (Figure 1) have been developed to help judging about the validity. The first principle was created by Aristotle and says "If the two premises are true, the conclusion of a valid syllogism must be true" (cp. Goldstein, 2005). The second principle describes that "The validity of a syllogism is determined only by its form, not its content." These two principles explain why the following syllogism is (surprisingly) valid: ` `**`All flowers are animals. All animals can jump. Therefore, all flowers can jump.`** Even though it is quite obvious that the first premise is not true and further that the conclusion is not true, the whole syllogism is still valid. Applying formal logic to the syllogism in the example, the conclusion is valid. ![](eulercircles.jpg "eulercircles.jpg"){width="500"} *Figure 1, Euler Circles* Due to this precondition it is possible to display a syllogism formally with symbols or letters and explain its relationship graphically with the help of diagrams. There are various ways to demonstrate a premise graphically. Starting with a circle to represent the first premise and adding one or more circles for the second one (Figure 1), the crucial move is to compare the constructed diagrams with the conclusion. It should be clearly laid out whether the diagrams are contradictory or not. Agreeing with one another, the syllogism is valid. The displayed syllogism (Figure 1) is obviously valid. The conclusion shows that everything that can jump contains animals which again contains flowers. This agrees with the two premises which point out that flowers are animals and that these are able to jump. The method of Euler Circles is a good device to make syllogisms better conceivable. ##### The descriptive approach The descriptive approach is concerned with estimating people´s ability of judging validity and explaining judging errors. This psychological approach uses two methods in order to determine people\`s performance: **`Method of evaluation`**`: People are given two premises, a conclusion and the task to judge whether the syllogism is valid or not.`\ `                      (preferred one)`\ **`Method of production`**`: Participants are supplied with two premises and asked to develop a logically valid conclusion.`\ `                      (if possible)` While using the **method of evaluation** researchers found typical misjudgments about syllogisms. Premises starting with "All", "Some" or "No" imply a special atmosphere and influence a person in the process of decision making. One mistake often occurring is judging a syllogism incorrectly as valid, in which the two premises as well as the conclusion starts with "All". The influence of the provided atmosphere leads to the right decision at most times, but is definitely not reliable and guides the person to a rash decision. This phenomenon is called the **atmosphere effect**. In addition to the form of a syllogism, the content is likely to influence a person's decision as well and causes the person to neglect his logical thinking. The belief bias states that people tend to judge syllogisms with believable conclusions as valid, while they tend to judge syllogisms with unbelievable conclusions as invalid. Given a conclusion as like "Some bananas are pink", hardly any participants would judge the syllogism as valid, even though it might be valid according to its premises (e.g. Some bananas are fruits. All fruits are pink.) ##### Mental models of deductive reasoning It is still not possible to consider what mental processes might occur when people are trying to determine whether a syllogism is valid. After researchers observed that Euler Circles can be used to determine the validity of a syllogism, Phillip Johnson--Laird (1999) wondered whether people would use such circles naturally without any instruction how to use them. At the same time he found out that they do not work for some more complex syllogisms and that a problem can be solved by applying logical rules, but most people solve them by imagining the situation. This is the basic idea of people using mental models -- a specific situation that is represented in a person's mind that can be used to help determine the validity of syllogisms -- to solve deductive reasoning problems. The basic principle behind the Mental Model Theory is: A conclusion is valid only if it cannot be refuted by any mode of the premises. This theory is rather popular because it makes predictions that can be tested and because it can be applied without any knowledge about rules of logic. But there are still problems facing researchers when trying to determine how people reason about syllogisms. These problems include the fact that a variety of different strategies are used by people in reasoning and that some people are better in solving syllogisms than others. ##### Effects of culture on deductive reasoning People can be influenced by the content of syllogisms rather than by focusing on logic when judging their validity. Psychologists have wondered whether people are influenced by their cultures when judging. Therefore they have done cross--cultural experiments in which reasoning problems were presented to people of different cultures. They observed that people from different cultures judge differently to these problems. People use evidence from their own experience (empirical evidence) and ignore evidence presented in the syllogism (theoretical evidence). #### Conditional syllogisms Another type of syllogisms is called "conditional syllogism". Just like the categorical one, it also has two premises and a conclusion. In difference the first premise has the form "If ... then". Syllogisms like this one are common in everyday life. Consider the following example from the story about Knut: ` `**`` 1. Premise: If it is raining, Knut`s wife gets wet. ``**\ ` `**`2. Premise: It is raining.`**\ ` `**`` Conclusion: Therefore, Knut`s wife gets wet. ``** Conditional syllogisms are typically given in the abstract form: "If p then q", where "p" is called the **antecedent** and "q" the **consequent**. ##### Forms of conditional syllogisms There are four major forms of conditional syllogisms, namely **Modus Ponens**, **Modus Tollens**, **Denying The Antecedent** and **Affirming The Consequent**. These are illustrated in the table below (Figure 2) by means of the conditional syllogism above (i.e. If it is raining, Knut\`s wife gets wet). The table indicates the premises, the resulting conclusions and it shows whether these are valid or not. The lowermost row displays the relative number of correct judgements people make about the validity of the conclusions. +-------------+-------------+-------------+-------------+-------------+ | | Modus | Modus | Denying the | Affirming | | | Ponens | Tollens | Antecedent | the | | | | | | Consequent | +-------------+-------------+-------------+-------------+-------------+ | Description | The | The | The | The | | | antecedent | consequent | antecedent | antecedent | | | of the | of the | of the | of the | | | first | first | first | first | | | premise is | premise is | premise is | premise is | | | affirmed in | negated in | negated in | affirmed in | | | the second | the second | the second | the second | | | premise. | premise. | premise. | premise. | +-------------+-------------+-------------+-------------+-------------+ | Formal | If P then | If P then | If P then | If P then | | | Q. P\ | Q. Not-Q\ | Q. Not-P\ | Q. Q\ | | | Therefore | Therefore | Therefore | Therefore | | | Q. | Not-P. | Not-Q. | P. | +-------------+-------------+-------------+-------------+-------------+ | Example | If it is | If it is | If it is | If it is | | | raining, | raining, | raining, | raining, | | | Knut\'s | Knut\'s | Knut\'s | Knut\'s | | | wife gets | wife gets | wife gets | wife gets | | | wet. It is | wet. | wet. It is | wet. | | | raining.\ | Knut\'s | not | Knut\'s | | | Therefore | wife does | raining.\ | wife gets | | | Knut\'s | not get | Therefore | wet\ | | | wife gets | wet.\ | Knut\'s | Therefore | | | wet | Therefore | wife does | it is | | | | it is not | not get | raining. | | | | raining. | wet. | | +-------------+-------------+-------------+-------------+-------------+ | Validity | ! | ! | ![{ | mark.svg"){ | | | heck.svg"){ | heck.svg"){ | width="14"} | width="14"} | | | width="14"} | width="14"} | INVALID | INVALID | | | VALID | VALID | | | +-------------+-------------+-------------+-------------+-------------+ | Correct | 97% | 60% | 40% | 40% | | Judgements | correctly | correctly | correctly | correctly | | | identify as | identify as | identify as | identify as | | | valid. | valid. | invalid. | invalid. | +-------------+-------------+-------------+-------------+-------------+ : Figure 2, Different kinds of conditional syllogisms Obviously, the validity of the syllogisms with valid conclusions is easier to judge in a correct manner than the validity of the ones with invalid conclusions. The conclusion in the instance of the modus ponens is apparently valid. In the example it is very clear that Knut\`s wife gets wet, if it is raining. The validity of the modus tollens is more difficult to recognize. Referring to the example, in the case that Knut\`s wife does not get wet it can\`t be raining. Because the first premise says that if it is raining, she gets wet. So the reason for Knut\`s wife not getting wet is that it is not raining. Consequently, the conclusion is valid. The validity of the remaining two kinds of conditional syllogisms is judged correctly only by 40% of people. If the method of denying the antecedent is applied, the second premise says that it is not raining. But from this fact it follows not logically that Knut\`s wife does not get wet -- obviously rain is not the only reason for her to get wet. It could also be the case that the sun is shining and Knut tests his new water pistol and makes her wet. So, this kind of conditional syllogism does not lead to a valid conclusion. Affirming the consequent in the case of the given example means that the second premise says that Knut\`s wife gets wet. But again the reason for this can be circumstances apart from rain. So, it follows not logically that it is raining. In consequence, the conclusion of this syllogism is invalid. The four kinds of syllogisms have shown that it is not always easy to make correct judgments concerning the validity of the conclusions. The following passages will deal with other errors people make during the process of conditional reasoning. ##### The Wason Selection Task The Wason Selection Task is a famous experiment which shows that people make more errors in the process of reasoning, if it is concerned with abstract items than if it involves real-world items (Wason, 1966). In the abstract version of the Wason Selection Task four cards are shown to the participants with each a letter on one side and a number on the other (Figure 3, yellow cards). The task is to indicate the minimum number of cards that have to be turned over to test whether the following rule is observed: "If there is a vowel on one side then there is an even number on the other side". 53% of participants selected the 'E' card which is correct, because turning this card over is necessary for testing the truth of the rule. However still another card needs to be turned over. 64% indicated that the '4' card has to be turned over which is not right. Only 4% of participants answered correctly that the '7' card needs to be turned over in addition to the 'E'. The correctness of turning over these two cards becomes more obvious if the same task is stated in terms of real-world items instead of vowels and numbers. One of the experiments for determining this was the beer/drinking-age problem used by Richard Griggs and James Cox (1982). This experiment is identical to the Wason Selection Task except that instead of numbers and letters on the cards everyday terms (beer, soda and ages) were used (Figure 3, green cards). Griggs and Cox gave the following rule to the participants: "If a person is drinking beer then he or she must be older than 19 years." In this case 73% of participants answered in a correct way, namely that the cards with "Beer" and "14 years" on it have to be turned over to test whether the rule is kept. !*Figure 3, The Wason Selection Task*{width="400"} **Why is the performance better in the case of real--world items?** There are two different approaches which explain why participants' performance is significantly better in the case of the beer/drinking-age problem than in the abstract version of the Wason Selection Task, namely one approach concerning permission schemas and an evolutionary approach. The regulation: "If one is 19 years or older then he/she is allowed to drink alcohol", is known by everyone as an experience from everyday life (also called **permission schema**). As this permission schema is already learned by the participants it can be applied to the Wason Selection Task for real--world items to improve participants\` performance. On the contrary such a permission schema from everyday life does not exist for the abstract version of the Wason Selection Task. The evolutionary approach concerns the important human ability of **cheater-detection** . This approach states that an important aspect of human behaviour especially in the past was/is the ability for two persons to cooperate in a way that is beneficial for both of them. As long as each person receives a benefit for whatever he/she does in favour of the other one, everything works well in their social exchange. But if someone cheats and receives benefit from others without giving it back, some problem arises (see also chapter Cognitive Psychology and Cognitive Neuroscience/Evolutionary Perspective on Social Cognitions#3. Evolutionary Perspective on Social Cognitions). It is assumed that the property to detect cheaters has become a part of human\`s cognitive makeup during evolution. This cognitive ability improves the performance in the beer/drinking-age version of the Wason Selection Task as it allows people to detect a cheating person who does not behave according to the rule. Cheater-detection does not work in the case of the abstract version of the Wason Selection Task as vowels and numbers do not behave or even cheat at all as opposed to human beings. ### Inductive reasoning In the previous sections deductive reasoning was discussed, reaching conclusions based on logical rules applied to a set of premises. However, many problems cannot be represented in a way that would make it possible to use these rules to get a conclusion. This subchapter is about a way to be able to decide in terms of these problems as well: inductive reasoning. !*Figure 4, Deductive and inductive reasoning*{width="300"} Inductive reasoning is the process of making simple observations of a certain kind and applying these observations via generalization to a different problem to make a decision. Hence one infers from a special case to the general principle which is just the opposite of the procedure of deductive reasoning (Figure 4). A good example for inductive reasoning is the following: ` `**`Premise: All crows Knut and his wife have ever seen are black.`**\ ` `**`Conclusion: Therefore, they reason that all crows on earth are black.`** In this example it is obvious that Knut and his wife infer from the simple observation about the crows they have seen to the general principle about all crows. Considering figure 5 this means that they infer from the subset (yellow circle) to the whole (blue circle). As in this example it is typical in a process of inductive reasoning that the premises are believed to support the conclusion, but do not ensure it. ![{width="300"} *Figure 5* #### Forms of inductive reasoning The two different forms of inductive reasoning are \"**strong**\" and \"**weak**\" induction. The former describes that the truth of the conclusion is very likely, if the assumed premises are true. An example for this form of reasoning is the one given in the previous section. In this case it is obvious that the premise (\"All crows Knut and his wife have ever seen are black\") gives good evidence for the conclusion (\"All crows on earth are black\") to be true. But nevertheless it is still possible, although very unlikely, that not all crows are black. On the contrary, conclusions reached by \"weak induction\" are supported by the premises in a rather weak manner. In this approach the truth of the premises makes the truth of the conclusion possible, but not likely. An example for this kind of reasoning is the following: ` `**`Premise: Knut always hears music with his IPod.`**\ ` `**`Conclusion: Therefore, he reasons that all music is only heard with IPods.`** In this instance the conclusion is obviously false. The information the premise contains is not very representative and although it is true, it does not give decisive evidence for the truth of the conclusion. To sum it up, strong inductive reasoning gets to conclusions which are very probable whereas the conclusions reached through weak inductive reasoning on the base of the premises are unlikely to be true. #### Reliability of conclusions If the strength of the conclusion of an inductive argument has to be determined, three factors concerning the premises play a decisive role. The following example which refers to Knut and his wife and the observations they made about the crows (see previous sections) displays these factors: When Knut and his wife observe in addition to the black crows in Germany also the crows in Spain, the **number of observations** they make concerning the crows obviously increases. Furthermore, the **representativeness of these observations** is supported, if Knut and his wife observe the crows at all different day- and nighttimes and see that they are black every time. Theoretically it may be that the crows change their colour at night what would make the conclusion that all crows are black wrong. The **quality of the evidence** for all crows to be black increases, if Knut and his wife add scientific measurements which support the conclusion. For example they could find out that the crows\' genes determine that the only colour they can have is black. Conclusions reached through a process of inductive reasoning are never definitely true as no one has seen all crows on earth and as it is possible, although very unlikely, that there is a green or brown exemplar. The three mentioned factors contribute decisively to the strength of an inductive argument. So, the stronger these factors are, the more reliable are the conclusions reached through induction. #### Processes and constraints In a process of inductive reasoning people often make use of certain heuristics which lead in many cases quickly to adequate conclusions but sometimes may cause errors. In the following, two of these heuristics (**availability heuristic** and **representativeness heuristic**) are explained. Subsequently, the **confirmation bias** is introduced which sometimes influences people\'s reasons according to their own opinion without them realising it. **The availability heuristic** Things that are more easily remembered are judged to be more prevalent. An example for this is an experiment done by Lichtenstein et al. (1978). The participants were asked to choose from two different lists the causes of death which occur more often. Because of the availability heuristic people judged more "spectacular" causes like homicide or tornado to cause more deaths than others, like asthma. The reason for the subjects answering in such a way is that for example films and news in television are very often about spectacular and interesting causes of death. This is why these information are much more available to the subjects in the experiment. Another effect of the usage of the availability heuristic is called **illusory correlations**. People tend to judge according to stereotypes. It seems to them that there are correlations between certain events which in reality do not exist. This is what is known by the term "prejudice". It means that a much oversimplified generalization about a group of people is made. Usually a correlation seems to exist between negative features and a certain class of people (often fringe groups). If, for example, one\'s neighbour is jobless and very lazy one tends to correlate these two attributes and to create the prejudice that all jobless people are lazy. This illusory correlation occurs because one takes into account information which is available and judges this to be prevalent in many cases. **The representativeness heuristic** If people have to judge the probability of an event they try to find a comparable event and assume that the two events have a similar probability. Amos Tversky and Daniel Kahneman (1974) presented the following task to their participants in an experiment: "We randomly chose a man from the population of the U.S., Robert, who wears glasses, speaks quietly and reads a lot. Is it more likely that he is a librarian or a farmer?" More of the participants answered that Robert is a librarian which is an effect of the representativeness heuristic. The comparable event which the participants chose was the one of a typical librarian as Robert with his attributes of speaking quietly and wearing glasses resembles this event more than the event of a typical farmer. So, the event of a typical librarian is better comparable with Robert than the event of a typical farmer. Of course this effect may lead to errors as Robert is randomly chosen from the population and as it is perfectly possible that he is a farmer although he speaks quietly and wears glasses. !*Figure 6, Feminist bank tellers*{width="500"} The representativeness heuristic also leads to errors in reasoning in cases where the **conjunction rule** is violated. This rule states that the conjunction of two events is never more likely to be the case than the single events alone. An example for this is the case of the feminist bank teller (Tversky & Kahneman, 1983). If we are introduced to a woman of whom we know that she is very interested in women's rights and has participated in many political activities in college and we are to decide whether it is more likely that she is a bank teller or a feminist bank teller, we are drawn to conclude the latter as the facts we have learnt about her resemble the event of a feminist bank teller more than the event of only being a bank teller. But it is in fact much more likely that somebody is just a bank teller than it is that someone is a feminist in addition to being a bank teller. This effect is illustrated in figure 6 where the green square, which stands for just being a bank teller, is much larger and thus more probable than the smaller violet square, which displays the conjunction of bank tellers and feminists, which is a subset of bank tellers. **Confirmation bias** This phenomenon describes the fact that people tend to decide in terms of what they themselves believe to be true or good. If, for example, someone believes that one has bad luck on Friday the thirteenth, he will especially look for every negative happening at this particular date but will be inattentive to negative happenings on other days. This behaviour strengthens the belief that there exists a relationship between Friday the thirteenth and having bad luck. This example shows that the actual information is not taken into account to come to a conclusion but only the information which supports one\'s own belief. This effect leads to errors as people tend to reason in a subjective manner, if personal interests and beliefs are involved. All the mentioned factors influence the subjective probability of an event so that it differs from the actual probability (**probability heuristic**). Of course all of these factors do not always appear alone, but they influence one another and can occur in combination during the process of reasoning. #### Why inductive reasoning at all? All the described constraints show how prone to errors inductive reasoning is and so the question arises, why we use it at all? But inductive reasons are important nevertheless because they act as shortcuts for our reasoning. It is much easier and faster to apply the availability heuristic or the representativeness heuristic to a problem than to take into account all information concerning the current topic and draw a conclusion by using logical rules. In the following excerpt of very usual actions there is a lot of inductive reasoning involved although one does not realize it on the first view. It points out the importance of this cognitive ability: *The sunrise every morning and the sunset in the evening, the change of seasons, the TV program, the fact that a chair does not collapse when we sit on it or the light bulb that flashes after we have pushed a button.* All of these cases are conclusions derived from processes of inductive reasoning. Accordingly, one assumes that the chair one is sitting on does not collapse as the chairs on which one sat before did not collapse. This does not ensure that the chair does not break into pieces but nevertheless it is a rather helpful conclusion to assume that the chair remains stable as this is very probable. To sum it up, inductive reasoning is rather advantageous in situations where deductive reasoning is just not applicable because only evidence but no proved facts are available. As these situations occur rather often in everyday life, living without the use of inductive reasoning is inconceivable. **Induction vs. deduction** The table below (Figure 7) summarises the most prevalent properties and differences between deductive and inductive reasoning which are important to keep in mind. ------------ --------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------- Deductive Reasoning Inductive Reasoning Premises Stated as *facts* or general principles (\"It is warm in the Summer in Spain.\") Based on *observations* of specific cases (\"All crows Knut and his wife have seen are black.\") Conclusion Conclusion is more *special* than the information the premises provide. It is reached directly by applying *logical rules* to the premises. Conclusion is more *general* than the information the premises provide. It is reached by *generalizing* the premises\' information. Validity If the premises are true, the conclusion *must be true*. If the premises are true, the conclusion *is probably true*. Usage More difficult to use (mainly in logical problems). One needs *facts* which are definitely true. Used often in everyday life (fast and easy). *Evidence* is used instead of proved facts. ------------ --------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------- : Figure 7, Induction vs. deduction ## Decision making According to the different levels of consequences, each process of making a decision requires appropriate effort and various aspects to be considered. The following excerpt from the story about Knut makes this obvious: "After considering facts like the warm weather in Spain and shirts and shorts being much more comfortable in this case (information gathering and likelihood estimation) Knut reasons that he needs them for his vacation. In consequence, he finally makes the decision to pack mainly shirts and shorts in his bag (final act of choosing)." Now it seems like there cannot be any decision making without previous reasoning, but that is not true. Of course there are situations in which someone decides to do something spontaneously, with no time to reason about it. We will not go into detail here but you might think about questions like *\"Why do we choose one or another option in that case?\"* ### Choosing among alternatives The psychological process of decision making constantly goes along with situations in daily life. Thinking about Knut again we can imagine him to decide between packing more blue or more green shirts for his vacation (which would only have minor consequences) but also about applying a specific job or having children with his wife (which would have relevant influence on important circumstances of his future life). The mentioned examples are both characterized by personal decisions, whereas professional decisions, dealing for example with economic or political issues, are just as important. #### The utility approach !*Figure 8, Relation between (monetary) gains/losses and their subjective value according to Prospect Theory* gains/losses and their subjective value according to Prospect Theory") There are three different ways to analyze decision making. The normative approach assumes a rational decision-maker with well-defined preferences. While the rational choice theory is based on a priori considerations, the descriptive approach is based on empirical observations and on experimental studies of choice behavior. The prescriptive enterprise develops methods in order to improve decision making. According to Manktelow and Reber´s definition, "utility refers to outcomes that are desirable because they are in the person's best interest" (Reber, A. S., 1995; Manktelow, K., 1999). This normative/descriptive approach characterizes optimal decision making by the maximum expected utility in terms of monetary value. This approach can be helpful in gambling theories, but simultaneously includes several disadvantages. People do not necessarily focus on the monetary payoff, since they find value in things other than money, such as fun, free time, family, health and others. But that is not a big problem, because it is possible to apply the graph (Figure 8), which shows the relation between (monetary) gains/losses and their subjective value / utility, which is equal to all the valuable things mentioned above. Therefore, not choosing the maximal monetary value does not automatically describe an irrational decision process. #### Misleading effects But even respecting the considerations above there might still be problems to make the "right" decision because of different misleading effects, which mainly arise because of the constraints of inductive reasoning. In general this means that our model of a situation/problem might not be ideal to solve it in an optimal way. The following three points are typical examples for such effects. **Subjective models** This effect is rather equal to the illusory correlations mentioned before in the part about the constraints of inductive reasoning. It is about the problem that models which people create might be misleading, since they rely on subjective speculations. An example could be deciding where to move by considering typical prejudices of the countries (e.g. always good pizza, nice weather and a relaxed life-style in Italy in contrast to some kind of boring food and steady rain in Great Britain). The predicted events are not equal to the events occurring indeed. (Kahneman & Tversky, 1982; Dunning & Parpal, 1989) **Focusing illusion** Another misleading effect is the so-called **focusing illusion**. By considering only the most obvious aspects in order to make a certain decision (e.g. the weather) people often neglect various really important outcomes (e.g. circumstances at work). This effect occurs more often, if people judge about others compared with judgments about their own living. **Framing effect** A problem can be described in different ways and therefore evoke different decision strategies. If a problem is specified in terms of gains, people tend to use a risk-aversion strategy, while a problem description in terms of losses leads to apply a risk-taking strategy. An example of the same problem and predictably different choices is the following experiment: A group of people is asked to imagine themselves \$300 richer than they are, is confronted with the choice of a sure gain of \$100 or an equal chance to gain \$200 or nothing. Most people avoid the risk and take the sure gain, which means they take the risk-aversion strategy. Alternatively if people are asked to assume themselves to be \$500 richer than in reality, given the options of a sure loss of \$100 or an equal chance to lose \$200 or nothing, the majority opts for the risk of losing \$200 by taking the risk seeking or risk-taking strategy. This phenomenon is known as **framing effect** and can also be illustrated by figure 8 above, which is a concave function for gains and a convex one for losses. (*Foundations of Cognitive Psychology*, Levitin, D. J., 2002) #### Justification in decision making Decision making often includes the need to assign a reason for the decision and therefore justify it. This factor is illustrated by an experiment by A. Tversky and E. Shafir (1992): A very attractive vacation package has been offered to a group of students who have just passed an exam and to another group of students who have just failed the exam and have the chance to rewrite it after the holidays coming up. All students have the options to buy the ticket straight away, to stay at home, or to pay \$5 for keeping the option open to buy it later. At this point, there is no difference between the two groups, since the number of students who passed the exam and decided to book the flight (with the justification of a deserving a reward), is the same as the number of students who failed and booked the flight (justified as consolation and having time for reoccupation). A third group of students who were informed to receive their results in two more days was confronted with the same problem. The majority decided to pay \$5 and keep the option open until they would get their results. The conclusion now is that even though the actual exam result does not influence the decision, it is required in order to provide a rationale. ### Executive functions !*Figure 9, Left frontal lobe*{width="350"} Subsequently, the question arises how this cognitive ability of making decisions is realized in the human brain. As we already know that there are a couple of different tasks involved in the whole process, there has to be something that coordinates and controls those brain activities -- namely the **executive functions**. They are the brain\'s conductor, instructing other brain regions to perform, or be silenced, and generally coordinating their synchronized activity (Goldberg, 2001). Thus, they are responsible for optimizing the performance of all "multi-threaded" cognitive tasks. Locating those executive functions is rather difficult, as they cannot be appointed to a single brain region. Traditionally, they have been equated with the frontal lobes, or rather the prefrontal regions of the frontal lobes; but it is still an open question whether all of their aspects can be associated with these regions. Nevertheless, we will concentrate on the prefrontal regions of the frontal lobes, to get an impression of the important role of the executive functions within cognition. Moreover, it is possible to subdivide these regions into functional parts. But it is to be noted that not all researchers regard the prefrontal cortex as containing functionally different regions. #### Executive functions in practice According to Norman and Shallice, there are five types of situations in which executive functions may be needed in order to optimize performance, as the automatic activation of behaviour would be insufficient. These are situations involving\... **1. \...planning or decision making.** **2. \...error correction or trouble shooting.** **3. \...responses containing novel sequences of actions.** **4. \...technical difficulties or dangerous circumstances.** **5. \...the control of action or the overcoming of strong habitual responses.** The following parts will have a closer look to each of these points, mainly referring to brain-damaged individuals. Surprisingly, intelligence in general is not affected in cases of frontal lobe injuries (Warrington, James & Maciejewski, 1986). However, dividing intelligence into **crystallised intelligence** (based on previously acquired knowledge) and **fluid intelligence** (meant to rely on the current ability of solving problems), emphasizes the executive power of the frontal lobes, as patients with lesions in these regions performed significantly worse in tests of fluid intelligence (Duncan, Burgess & Emslie, 1995). **1. _Planning or decision making_** **Impairments in abstract and conceptual thinking** To solve many tasks it is important that one is able to use given information. In many cases, this means that material has to be processed in an abstract rather than in a concrete manner. Patients with executive dysfunction have abstraction difficulties. This is proven by a card sorting experiment (Delis et al., 1992): The cards show names of animals and black or white triangles placed above or below the word. Again, the cards can be sorted with attention to different attributes of the animals (living on land or in water, domestic or dangerous, large or small) or the triangles (black or white, above or below word). People with frontal lobe damage fail to solve the task because they cannot even conceptualize the properties of the animals or the triangles, thus are not able to deduce a sorting-rule for the cards (in contrast, there are some individuals only perseverating; they find a sorting-criterion, but are unable to switch to a new one). These problems might be due to a general difficulty in strategy formation. **Goal directed behavior** Let us again take Knut into account to get an insight into the field of goal directed behaviour -- in principle, this is nothing but problem solving since it is about organizing behavior towards a goal. Thus, when Knut is packing his bag for his holiday, he obviously has a goal in mind (in other words: He wants to solve a problem) -- namely get ready before the plane starts. There are several steps necessary during the process of reaching a certain goal: _Goal must be kept in mind_ Knut should never forget that he has to pack his bag in time. _Dividing into subtasks and sequencing_ Knut packs his bag in a structured way. He starts packing the crucial things and then goes on with rest. _Completed portions must be kept in mind_ If Knut already packed enough underwear into his bag, he would not need to search for more. _Flexibility and adaptability_ Imagine that Knut wants to pack his favourite T-Shirt, but he realizes that it is dirty. In this case, Knut has to adapt to this situation and has to pick another T-Shirt that was not in his plan originally. _Evaluation of actions_ Along the way of reaching his ultimate goal Knut constantly has to evaluate his performance in terms of 'How am I doing considering that I have the goal of packing my bag?'. **Executive dysfunction and goal directed behavior** The breakdown of executive functions impairs goal directed behavior to a large extend. In which way cannot be stated in general, it depends on the specific brain regions that are damaged. So it is quite possible that an individual with a particular lesion has problems with two or three of the five points described above and performs within average regions when the other abilities are tested. However, if only one link is missing from the chain, the whole plan might get very hard or even impossible to master. Furthermore, the particular hemisphere affected plays a role as well. Another interesting result was the fact that lesions in the frontal lobes of left and right hemisphere impaired different abilities. While a lesion in the right hemisphere caused trouble in making recency judgements, a lesion in the left hemisphere impaired the patient's performance only when the presented material was verbal or in a variation of the experiment that required self-ordered sequencing. Because of that we know that the ability to sequence behaviour is not only located in the frontal lobe but in the left hemisphere particularly when it comes to motor action. **Problems in sequencing** In an experiment by Milner (1982), people were shown a sequence of cards with pictures. The experiment included two different tasks: recognition trials and recency trials. In the former the patients were shown two different pictures, one of them has appeared in the sequence before, and the participants had to decide which one it was. In the latter they were shown two different pictures, both of them have appeared before, they had to name the picture that was shown more recently than the other one. The results of this experiment showed that people with lesions in temporal regions have more trouble with the recognition trial and patients with frontal lesions have difficulties with the recency trial since anterior regions are important for sequencing. This is due to the fact that the recognition trial demanded a properly functioning recognition memory, the recency trial a properly functioning memory for item order. These two are dissociable and seem to be processed in different areas of the brain. The frontal lobe is not only important for sequencing but also thought to play a major role for working memory. This idea is supported by the fact that lesions in the lateral regions of the frontal lobe are much more likely to impair the ability of \'keeping things in mind\' than damage to other areas of the frontal cortex do. But this is not the only thing there is to sequencing. For reaching a goal in the best possible way it is important that a person is able to figure out which sequence of actions, which strategy, best suits the purpose, in addition to just being able to develop a correct sequence. This is proven by an experiment called \'Tower of London\' (Shallice, 1982) which is similar to the famous \'Tower of Hanoi\' task with the difference that this task required three balls to be put onto three poles of different length so that one pole could hold three balls, the second one two and the third one only one ball, in a way that a changeable goal position is attained out of a fixed initial position in as few moves as possible. Especially patients with damage to the left frontal lobe proved to work inefficiently and ineffectively on this task. They needed many moves and engaged in actions that did not lead toward the goal. **Problems with the interpretation of available information** Quite often, if we want to reach a goal, we get hints on how to do it best. This means we have to be able to interpret the available information in terms of what the appropriate strategy would be. For many patients of executive dysfunction this is not an easy thing to do either. They have trouble to use this information and engage in inefficient actions. Thus, it will take them much longer to solve a task than healthy people who use the extra information and develop an effective strategy. **Problems with self-criticism and -monitoring** The last problem for people with frontal lobe damage we want to present here is the last point in the above list of properties important for proper goal directed behavior. It is the ability to evaluate one\'s actions, an ability that is missing in most patients. These people are therefore very likely to \'wander off task\' and engage in behavior that does not help them to attain their goal. In addition to that, they are also not able to determine whether their task is already completed at all. Reasons for this are thought to be a lack of motivation or lack of concern about one\'s performance (frontal lobe damage is usually accompanied by changes in emotional processing) but these are probably not the only explanations for these problems. Another important brain region in this context -- the medial portion of the frontal lobe -- is responsible for detecting behavioral errors made while working towards a goal. This has been shown by ERP experiments where there was an error-related negativity 100ms after an error has been made. If this area is damaged, this mechanism cannot work properly any more and the patient loses the ability to detect errors and thus monitor his own behavior. However, in the end we must add that although executive dysfunction causes an enormous number of problems in behaving correctly towards a goal, most patients when assigned with a task are indeed anxious to solve it but are just unable to do so. **2. _Error correction and trouble shooting_** !*Figure 10, Example for the WCST: Cards sorted according to shape (a), number (b) or color (c) of the objects*, number (b) or color (c) of the objects"){width="350"} The most famous experiment to investigate error correction and trouble shooting is the Wisconsin Card Sorting Test (WCST). A participant is presented with cards that show certain objects. These cards are defined by shape, color and number of the objects on the cards. These cards now have to be sorted according to a rule based on one of these three criteria. The participant does not know which rule is the right one but has to reach the conclusion after positive or negative feedback of the experimenter. Then at some point, after the participant has found the correct rule to sort the cards, the experimenter changes the rule and the previous correct sorting will lead to negative feedback. The participant has to realize the change and adapt to it by sorting the cards according to the new rule. Patients with executive dysfunction have problems identifying the rule in the first place. It takes them noticeably longer because they have trouble using already given information to make a conclusion. But once they got to sorting correctly and the rule changes, they keep sorting the cards according to the old rule although many of them notice the negative feedback. They are just not able to switch to another sorting-principle, or at least they need many tries to learn the new one. They **perseverate**. **Problems in shifting and modifying strategies** Intact neuronal tissue in the frontal lobe is also crucial for another executive function connected with goal directed behavior that we described above: Flexibility and adaptability. This means that persons with frontal lobe damage will have difficulties in shifting their way of thinking -- meaning creating a new plan after recognizing that the original one cannot be carried out for some reason. Thus, they are not able to modify their strategy according to this new problem. Even when it is clear that one hypothesis cannot be the right one to solve a task, patients will stick to it nevertheless and are unable to abandon it (called \'tunnel vision\'). Moreover, such persons do not use as many appropriate hypotheses for creating a strategy as people with damage to other brain regions do. In what particular way this can be observed in patients can again not be stated in general but depends on the nature of the shift that has to be made. These earlier described problems of \'redirecting\' of one\'s strategies stand in contrast to the actual \'act of switching\' between tasks. This is yet another problem for patients with frontal lobe damage. Since the control system that leads task switching as such is independent from the parts that actually perform these tasks, the task switching is particularly impaired in patients with lesions to the dorsolateral prefrontal cortex while at the same time they have no trouble with performing the single tasks alone. This of course, causes a lot of problems in goal directed behavior because as it was said before: Most tasks consist of smaller subtasks that have to be completed. **3. _Responses containing novel sequences of actions_** Many clinical tests have been done, requiring patients to develop strategies for dealing with novel situations. In the Cognitive Estimation Task (Shallice & Evans, 1978) patients are presented with questions whose answers are unlikely to be known. People with damage to the prefrontal cortex have major difficulties to produce estimates for questions like: "How many camels are in Holland?". In the FAS Test (Miller, 1984) subjects have to generate sequences of words (not proper names) beginning with a certain letter ("F" , "A" or "S") in a one-minute period. This test involves developing new strategies, selecting between alternatives and avoiding repeating previous given answers. Patients with left lateral prefrontal lesions are often impaired (Stuss et al., 1998). **4. _Technical difficulties or dangerous circumstances_** One single mistake in a dangerous situation may easily lead to serious injuries while a mistake in a technical difficult situation (e.g. building a house of cards) would obviously lead to failure. Thus, in such situations, automatic activation of responses clearly would be insufficient and executive functions seem to be the only solution for such problems. Wilkins, Shallice and McCarthy (1987) were able to prove a connection between dangerous or difficult situations and the prefrontal cortex, as patients with lesions to this area were impaired during experiments concerning dangerous or difficult situations. The ventromedial and orbitofrontal cortex may be particularly important for these aspects of executive functions. **5. _Control of action or the overcoming of strong habitual responses_** **Deficits in initiation, cessation and control of action** We start by describing the effects of the loss of the ability to start something, to initiate an action. A person with executive dysfunction is likely to have trouble beginning to work on a task without strong help from the outside, while people with left frontal lobe damage often show impaired spontaneous speech and people with right frontal lobe damage rather show poor nonverbal fluency. Of course, one reason is the fact that this person will not have any intention, desire or concern on his or her own of solving the task since this is yet another characteristic of executive dysfunction. But it is also due to a psychological effect often connected with the loss of properly executive functioning: Psychological inertia. Like in physics, inertia in this case means that an action is very hard to initiate, but once started, it is again very hard to shift or stop. This phenomenon is characterized by engagement in repetitive behavior, is called perseveration (cp. WCST). Another problem caused by executive dysfunction can be observed in patients suffering from the so called **environmental dependency syndrome**. Their actions are impelled or obligated by their physical or social environment. This manifests itself in many different ways and depends to a large extent on the individual's personal history. Examples are patients who begin to type when they see a computer key board, who start washing the dishes upon seeing a dirty kitchen or who hang up pictures on the walls when finding hammer, nails and pictures on the floor. This makes these people appear as if they were acting impulsively or as if they have lost their 'free will'. It shows a lack of control for their actions. This is due to the fact that an impairment in their executive functions causes a disconnection between thought and action. These patients know that their actions are inappropriate but like in the WCST, they cannot control what they are doing. Even if they are told by which attribute to sort the cards, they will still keep sorting them sticking to the old rule due to major difficulties in the translation of these directions into action. What is needed to avoid problems like these are the abilities to start, stop or change an action but very likely also the ability to use information to direct behavior. #### Deficits in cognitive estimation Next to the difficulties to produce estimates to questions whose answers are unlikely known, patients with lesions to the frontal lobes have problems with cognitive estimation in general. Cognitive estimation is the ability to use known information to make reasonable judgments or deductions about the world. Now the inability for cognitive estimation is the third type of deficits often observed in individuals with executive dysfunction. It is already known that people with executive dysfunction have a relatively unaffected knowledge base. This means they cannot retain knowledge about information or at least they are unable to make inferences based on it. There are various effects which are shown on such individuals. Now for example patients with frontal lobe damage have difficulty estimating the length of the spine of an average woman. Making such realistic estimations requires inferencing based on other knowledge which is in this case, knowing that the height of the average woman is about 5 ft 6 in (168 cm) and considering that the spine runs about one third to one half the length of the body and so on. Patients with such a dysfunction do not only have difficulties in their estimates of cognitive information but also in their estimates of their own capacities (such as their ability to direct activity in goal -- oriented manner or in controlling their emotions). Prigatuno, Altman and O'Brien (1990) reported that when patients with anterior lesions associated with diffuse axonal injury to other brain areas are asked how capable they are of performing tasks such as scheduling their daily activities or preventing their emotions from affecting daily activities, they grossly overestimate their abilities. From several experiments Smith and Miler (1988) found out that individuals with frontal lobe damages have no difficulties in determining whether an item was in a specific inspection series they find it difficult to estimate how frequently an item did occur. This may not only reflect difficulties in cognitive estimation but also in memory task that place a premium on remembering temporal information. Thus both difficulties (in cognitive estimation and in temporal sequencing) may contribute to a reduced ability to estimate frequency of occurrence. Despite these impairments in some domains the abilities of estimation are preserved in patients with frontal lobe damage. Such patients also do have problems in estimating how well they can prevent their emotions for affecting their daily activities. They are also as good at judging how many dues they will need to solve a puzzle as patients with temporal lobe damage or neurologically intact people. ------------------------------------------------------------------------ #### Theories of frontal lobe function in executive control In order to explain that patients with frontal lobe damage have difficulties in performing executive functions, four major approaches have developed. Each of them leads to an improved understanding of the role of frontal regions in executive functions, but none of these theories covers all the deficits occurred. **Role of working memory** The most anatomically specific approach assumes the dorsolateral prefrontal area of the frontal lobe to be critical for working memory. The working memory which has to be clearly distinguished from the long term memory keeps information on-line for use in performing a task. Not being generated for accounting for the broad array of dysfunctions it focuses on the three following deficits: 1. Sequencing information and directing behavior toward a goal 2. Understanding of temporal relations between items and events 3. Some aspects of environmental dependency and perseveration Research on monkeys has been helpful to develop this approach (the delayed-response paradigm, Goldman-Rakic, 1987, serves as a classical example). **Role of Controlled Versus Automatic Processes** There are two theories based on the underlying assumption that the frontal lobes are especially important for controlling behavior in non-experienced situations and for overriding stimulus-response associations, but contribute little to automatic and effortless behavior (Banich, 1997). Stuss and Benson (1986) consider control over behavior to occur in a hierarchical manner. They distinguish between three different levels, of which each is associated with a particular brain region. In the first level sensory information is processed automatically by posterior regions, in the next level (associated with the executive functions of the frontal lobe) conscious control is needed to direct behavior toward a goal and at the highest level controlled self-reflection takes place in the prefrontal cortex. This model is appropriate for explaining deficits in goal-oriented behavior, in dealing with novelty, the lack of cognitive flexibility and the environmental dependency syndrome. Furthermore it can explain the inability to control action consciously and to criticise oneself. The second model developed by Shalice (1982) proposes a system consisting of two parts that influence the choice of behavior. The first part, a cognitive system called contention scheduling, is in charge of more automatic processing. Various links and processing schemes cause a single stimulus to result in an automatic string of actions. Once an action is initiated, it remains active until inhibited. The second cognitive system is the supervisory attentional system which directs attention and guides action through decision processes and is only active "when no processing schemes are available, when the task is technically difficult, when problem solving is required and when certain response tendencies must be overcome" (Banich , 1997). This theory supports the observations of few deficits in routine situations, but relevant problems in dealing with novel tasks (e.g. the Tower of London task, Shallice, 1982), since no schemes in contention scheduling exist for dealing with it. Impulsive action is another characteristic of patients with frontal lobe damages which can be explained by this theory. Even if asked not to do certain things, such patients stick to their routines and cannot control their automatic behavior. **Use of Scripts** The approach based on scripts, which are sets of events, actions and ideas that are linked to form a unit of knowledge was developed by Schank (1982) amongst others. Containing information about the setting in which an event occurs, the set of events needed to achieve the goal and the end event terminating the action. Such managerial knowledge units (MKUs) are supposed to be stored in the prefrontal cortex. They are organized in a hierarchical manner being abstract at the top and getting more specific at the bottom. Damage of the scripts leads to the inability to behave goal-directed, finding it easier to cope with usual situations (due to the difficulty of retrieving a MKU of a novel event) and deficits in the initiation and cessation of action (because of MKUs specifying the beginning and ending of an action.) **Role of a goal list** The perspective of artificial intelligence and machine learning introduced an approach which assumes that each person has a goal list, which contains the tasks requirements or goals. This list is fundamental to guiding behavior and since frontal lobe damages disrupt the ability to form a goal list, the theory helps to explain difficulties in abstract thinking, perceptual analysis, verbal output and staying on task. It can also account for the strong environmental influence on patients with frontal lobe damages, due to the lack of internal goals and the difficulty of organizing actions toward a goal. ------------------------------------------------------------------------ Brain Region Possible Function (left hemisphere) Possible Function (right hemisphere) Brodman\'s Areas which are involved --------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------- -------------------------------------- ventrolateral prefrontal cortex (VLPFC) Retrieval and maintenance of semantic and/or linguistic information Retrieval and maintenance of visuospatial information 44, 45, 47 (44 & 45 = Broca\'s Area) dorsolateral prefrontal cortex )DLPRF) Selecting a range of responses and suppressing inappropriate ones; manipulating the contents of working memory Monitoring and checking of information held in mind, particularly in conditions of uncertainty; vigilance and sustained attention 9, 46 anterior prefrontal cortex; frontal pole; rostral prefrontal cortex Multitasking; maintaining future intentions & goals while currently performing other tasks or subgoals same 10 anterior cingulate cortex (dorsal) Monitoring in situations of response conflict and error detection same 24 (dorsal) & 32 (dorsal) ## Summary It is important to keep in mind that reasoning and decision making are closely connected to each other: Decision making in many cases happens with a previous process of reasoning. People\'s everyday life is decisively coined by the synchronized appearance of these two human cognitive features. This synchronization, in turn, is realized by the executive functions which seem to be mainly located in the frontal lobes of the brain. ## References •Krawczyk,Daniel (2018). Reasoning: The Neuroscience of How We Think. Elsevier. Goldstein, E. Bruce (2005). Cognitive Psychology - Connecting, Mind Research, and Everyday Experience. Thomson Wadsworth. • Marie T. Banich (1997). Neuropsychology. The neural bases of Mental Function. Houghton Mifflin. • Wilson, Robert A.& Keil, Frank C. (1999). The MIT Encyclopedia of the Cognitive Sciences. Massachusetts: Bradford Book. • Ward, Jamie (2006). The Student\'s Guide To Cognitive Science. Psychology Press. • Levitin, D. J.(2002). Foundations of Cognitive Psychology. • Schmalhofer, Franz. Slides from the course: Cognitive Psychology and Neuropsychology, Summer Term 2006/2007, University of Osnabrueck ## Links **Reasoning** Quizz to check whether you understood the difference of deduction and induction Short text with graphics Reasoning in geometry Euler circles Wason Selection Task Difference: Induction, Deduction **Decision making** How to make good decisions Making ethical decisions Web-published journal by the Society for Judgement and Decision Making **Executive functions** Elaborate document (pdf) from the Technical University of Dresden (in German) Text from the Max Planck Society, Munich (in English) Short description and an extensive link list Executive functions & ADHD
# Cognitive Psychology and Cognitive Neuroscience/Present and Future of Research +:------------------------------+:----:+------------------------------:+ | Previous | [O | *Next Chapter* | | Chapter | niti | | | | ve_P | | | | sych | | | | olog | | | | y_an | | | | d_Co | | | | gnit | | | | ive_ | | | | Neur | | | | osci | | | | ence | | | | "wi | | | | kili | | | | nk") | | +-------------------------------+------+-------------------------------+ about the future.\"* Robert Storm Petersen ## Introduction / Until now Developing from the information processing approach, present cognitive psychology differs from classical psychological approaches in the methods used as well as in the interdisciplinary connections to other sciences. Apart from rejecting introspection as a valid method to analyse mental phenomena, cognitive psychology introduces further, mainly computer-based, techniques which have not been in the range of classical psychology by now. By using brain-imaging-techniques like fMRI, cognitive psychology is able to analyse the relation between the physiology of the brain and mental processes. In the future, cognitive psychology will likely focus on computer-based methods even more. Thus, the field will profit from improvements in the area of IT. For example, contemporary fMRI scans are plagued by many possible sources of error, which should be solved in the future, thereby improving the power and precision of the technique. In addition, computational approaches can be combined with classical behavioural approaches, where one infers a participant\'s mental states from exhibited behaviour. Cognitive psychology, however, does not only rely on methods developed by other branches of science. It also collaborates with closely related fields, including artificial intelligence, neuroscience, linguistics and the philosophy of mind. The advantage of this multidisciplinary approach is clear: different perspectives on the topic make it possible to test hypotheses using different techniques and to eventually develop new conceptual frameworks for thinking about the mind. Often, modern studies of cognitive psychology criticise classical information processing approaches, which opens the door for other approaches to acquire additional importance. For example, the classical approach has been modified to a parallel information processing approach, which is thought to be closer to the actual functioning of the brain. ## Today\'s approaches ### The momentary usage of brain imaging How are the known brain imaging methods used? What kind of information can be derived using this methods? #### fMRI fMRI is an non-invasive imaging method that pictures active structures of the brain in a high spatial resolution. For that the participant has to lie in a tube and his brain is pictured. While doing a task active structures in the brain of the participant can be recognised on the recordings. **How?**\ If parts of the brain are active, the metabolism is also stimulated. The blood, that has an important function in the metabolic transport is flowing to the active nerve cells. The haemoglobin in the red blood cells carries oxygen (oxyhaemogliobin) when flowing to the part that is active and that needs oxygen, to consume and work. With consumption the haemoglobin „delivers" the oxygen (desoxyhaemoglobin). This leads to local changes in the relative concentration of oxyhemoglobin and desoxyhemoglobin and changes in local blood volume and blood flow. While haemoglobin is oxygenated it is diamagnetic (meaning the material tends to leave the magnetic field), but paramagnetic (material tends to migrate into the magnetic field) while desoxygenated. The magnetic resonance signal of blood is therefore slightly different depending on the level of oxygenation. By being able to detect the magnetic properties mentioned above, the fMRI-scanner is able to determine alterations in blood flow and blood volume, and construct a picture. This picture shows the brain and its activated parts. While the participant is doing a task the researcher can derive, which brain regions are involved. This is an indirect measure, as the metabolism is measured and not the neuronal activity itself. Furthermore this imaging method has good spatial resolution(where the activity occurs) but low temporal resolution (when the activity occurs), as measurements occur after the neuronal activity. #### EEG The Electroencephalogram (EEG) is another non-invasive brain imaging method. Electronic signals from the human brain are recorded while the participant is doing a task. The electronic activity of the neuronal cells, that is adding can be measured. The electronic activity is measured by attaching electrodes to the skin of the head. In most cases the electrodes are installed on a cap, that the participant wears. It is very time-consuming to install the cap correctly on the head of the participant, but it is very important for the outcome, that everything is in the right place. To assure the adding of the signals the electrodes have to be installed geometric and in a parallel configuration. This technique is applied to measure the event-related potential (ERP), potential changes. They are correlated temporal to an emotional, sensoric, cognitive or motoric event. In the experiment a certain event has to be repeated again and again. The type ERP then can be extracted and calculated. This method is not only time-consumptive, also a lot of disrupting factors complicate the measuring. Moreover this method has a very high temporal resolution, but a very low spatial resolution. It is hardly possible to measure activity in deeper brain regions or to detect the source of the activity interpreting only the recordings. ### Interdisciplinary Approaches #### Cognitive Science Cognitive science is multidisciplinary science. It comprises areas of cognitive psychology, linguistics, neuroscience, artificial intelligence, cognitive anthropology, computer science and philosophy. Cognitive science concentrates to study the intelligent behaviour of humans, which includes perception, learning, memory, thought and language. Research in cognitive sciences are based on naturalistic research methods such as cognitive neuropsychology, introspection, psychological experimentation, mathematical modelling and philosophical argumentation. In the beginning of the cognitive sciences the most common method was introspection. It meant that the test subject evaluated his or her own cognitive thinking. In these experiments the researchers were using experienced subjects because they had to analyse and report their own cognitive thinking. Problems can occur when the results are interpreted and the subject has different reports from the same action. Obviously a clear separation is needed between the matters that can be studied by introspection and the ones that are not adequate for this method. Computational modelling in cognitive science means that the mind is seen as a machine. This approach seeks to express theoretical ideas through computational modelling that generate behaviour similar to humans. Mathematical modelling is based on flow charts. The model\'s quality is very important to ensure the equivalence of the input and results. Nowadays the researchers in cognitive sciences use often theoretical and computational models. \"This does not exclude their primary method of experimentation with human participants. In cognitive sciences it is also important to bring the theories and the experimenting together. Because it comprises so many fields of science it is important to bring together the most appropriate methods from all these fields. The psychological experiments should be interpreted through a theory that expresses mental representations and procedures. The most productive and revealing way to perform research in cognitive sciences is to combine different approaches and methods together. This ensures overall picture from the research area and it comprises the viewpoints of all the different fields.\" (Thagard, Cognitive Science) Nevertheless Cognitive Science has not yet managed to succeed in bringing the different areas together. Nowadays it is criticised for not establishing a science on its own. Rather few scientist really address themselves as cognitive scientists. Furthermore the basic metaphor of the brain functioning like a computer is challenged as well as the distinctions between their models and nature (cf. Eysenck & Keane, Cognitive Psychology, pp. 519-520). This of course brings up a lot of work for the future. Cognitive Science has to work on better models that explain natural processes and that are reliably able to make predictions. Furthermore these models have to combine multiple mental phenomena. In addition to that a general \"methodology for relating a computational model\'s behaviour to human behaviour\" has to be worked out. Hereby the strength of such models can be increased. Apart from that Cognitive Science needs to establish an identity with prominent researchers that avow themselves to Cognitive Science. And finally its biggest goal, the creation of a general unifying theory of human cognition (see Theory Part), has to be reached (cf. ibid, p. 520). ##### Experimental Cognitive Psychology Psychological experimentation studies mental functions. This is done with indirect methods meaning reasoning. These studies are performed to find causal relations and the factors influencing behaviour. The researcher observes visible actions and makes conclusions based on these observations. Variables are changed one at a time and the effect of this change is being observed. The benefits of experimental researching are that the manipulated factors can be altered in nearly any way the researcher wants. From this point it is finally possible to find causal relations. In being the classical approach within the field of cognitive psychology, experimental studies have been the basis for the development of numerous modern approaches within contemporary Cognitive Psychology. Its empirical methods have been developed and verified over time and the gained results were a foundation for many enhancements contributed to the field of psychology. Taking into consideration the established character of experimental cognitive psychology, one might think that methodological changes are rather negligible. But recent years came up with a discussion concerning the question, whether the results of experimental CP remain valid in the "real world" at all. A major objection is that the artificial environment in an experiment might cause that certain facts and coherences are unintentionally ignored, which is due to the fact that for reasons of clarity numerous factors are suppressed (cf. Eysenck & Keane, Cognitive Psychology, pp. 514--515). A possible example for this is the research concerning attention. Since the attention of the participant is mainly governed by the experimenter's instructions, its focus is basically determined. Therefore \"relatively little is known of the factors that normally influence the focus of attention\" (ibid, p. 514). Furthermore it turns out to be problematic that mental phenomena are often examined in isolation. While trying to make the experimental setup as concise as possible (in order to get clearly interpretable results) one decouples the aspect at issue from adjacent and interacting mental processes. This leads to the problem that the results turn out to be valid in the idealised experimental setting only but not in "real life". Here multiple mental phenomena interact with each other and numerous outer stimuli influence the behaviour of mental processes. The validity gained by such studies could only be characterised as an internal validity (which means that the results are valid in the special circumstances created by the experimenter) but not as an external validity (which means that the results stay valid in changed and more realistic circumstances) (cf. ibid, p. 514). These objections lead to experiments which have been developed to refer closer to \"real life\". According to these experiments \"real-world\" phenomena like \'absent-mindedness\', \'everyday memory\' or \'reading\' gain importance. Nevertheless the discussion remains whether such experiments really deliver new information about mental processes. And whether these \'everyday phenomenon studies\' really become broadly accepted greatly depends on the results current experiments will deliver. Another issue concerning experimental setups in cognitive psychology is the way individual differences are handled. In general the results from an experiment are generated by an analysis of variance. This causes that results which are due to individual differences are averaged out and not taken into further consideration. Such a procedure seems to be highly questionable, especially if put into the context of an investigation of Bowers in 1973, which showed that over 30% of the variance in such studies are due to individual differences or their interaction with the current situation (cf. ibid, p. 515). Based on such facts one challenge for future experimental cognitive psychology is the analysis of individual differences and finding way to include knowledge about such differences in general studies. ##### Cognitive Neuroscience Another approach towards a better understanding of human cognition is cognitive neuroscience. Cognitive neuroscience lies at the interface between traditional cognitive psychology and the brain sciences. It is a science whose approach is characterised by attempts to derive cognitive level theories from various types of information, such as computational properties of neural circuits, patterns of behavioural damage as a result of brain injury or measurements of brain activity during the execution of cognitive tasks (cf. www.psy.cmu.edu). Cognitive neuroscience helps to understand how the human brain supports thought, perception, affection, action, social process and other aspects of cognition and behaviour, including how such processes develop and change in the brain over time (cf. www.nsf.gov). Cognitive neuroscience has emerged in the last decade as an intensely active and influential discipline, forged from interactions among the cognitive sciences, neurology, neuroimaging, physiology, neuroscience, psychiatry, and other fields. New methods for non-invasive functional neuroimaging of subjects performing psychological tasks have been of particular importance for this discipline. Non-invasive functional neuroimaging includes: positron emission tomography (PET), functional magnetic resonance imaging (fMRI), magnetoencephalography (MEG), optical imaging (near infra-red spectroscopy or NIRS), anatomical MRI, and diffusion tensor imaging (DTI) The findings of cognitive neuroscience are directed towards enabling a basic scientific understanding of a broad range of issues involving the brain, cognition and behaviour. (cf. www.nsf.gov). Cognitive neuroscience becomes a very important approach to understand human cognition, since results can clarify functional brain organisation, such as the operations performed by a particular brain area and the system of distributed, discrete neural areas supporting a specific cognitive representation. These findings can reveal the effect on brain organization of individual differences (including even genetic variation) (cf. www.psy.cmu.edu, www.nsf.gov). Another importance of cognitive neuroscience is that cognitive neuroscience provides some ways that allow us to \"obtain detailed information about the brain structures involved in different kinds of cognitive processing\" (Eysenck & Keane, Cognitive Psychology, p. 521). Techniques such as MRI and CAT scans have proved of particular value when used on patients to discover which brain areas are damaged. Before non-invasive methods of cognitive neuroscience were developed localisation of \"brain damage could only be established by post mortem examination\" (ibid). Knowing which brain areas are related to which cognitive process would surely lead to obtain a clearer view of brain region, hence, in the end would help for a better understanding of human cognition processes. Another strength of cognitive neuroscience is that it serves as a tool to demonstrate the reality of theoretical distinctions. For example, it has been argued by many theorists that implicit memory can be divided into perceptual and conceptual implicit memory; support for that view has come from PET studies, which show that perceptual and conceptual priming tasks affected different areas of the brain (cf. ibid, pp. 521-522). However, cognitive neuroscience is not that perfect to be able to stand alone and answer all questions dealing with human cognition. Cognitive neuroscience has some limitations, dealing with data collecting and data validity. In most neuroimaging studies, data is collected from several individuals and then averaged. Some concern has arose about such averaging because of the existence of significant individual differences. Though the problem was answered by Raichle (1998), who stated that the differ in individual brain should be appreciated, however general organising principles emerge that transcend these differences, a broadly accepted solution to the problem has yet to be found (cf. ibid, p. 522). ##### Cognitive Neuropsychology Cognitive Neuropsychology maps the connection between brain functions and cognitive behaviour. Patients with brain damages have been the most important source of research in neuropsychology. Neuropsychology also examines dissociation ("forgetting"), double dissociation and associations (connection between two things formed by cognition). Neuropsychology uses technological research methods to create images of the brain functioning. There are many differences in techniques to scan the brain. The most common ones are EEG (Electroencephalography), MRI and fMRI (functional Magnetic Resonance Imaging) and PET (Positron Emission Tomography). Cognitive Neuropsychology became very popular since it delivers good evidence. Theories developed for normal individuals can be verified by patients with brain damages. Apart from that new theories could have been established because of the results of neuropsychological experiments. Nevertheless certain limitations to the approach as it is today cannot be let out of consideration. First of all the fact that people having the same mental disability often do not have the same lesion needs to be pointed out (cf. ibid, pp.516-517). In such cases the researchers have to be careful with their interpretation. In general it could only be concluded that all the areas that the patients have injured could play a role in the mental phenomenon. But not which part really is decisive. Based on that future experiments in this area tend to make experiments with a rather small number of people with pretty similar lesion respectively compare the results from groups with similar syndromes and different lesions. In addition to that the situation often turns out to be vice versa. Some patients do have pretty similar lesions but show rather different behaviour (cf. ibid, p.517). One probable reason therefore is that the patients differ in their age and lifestyle (cf. Banich, Neuropsychology, p.55). With better technologies in the future one will be better able to distinguish the cases in which really the various personalities make the difference or in which cases the lesions are not entirely equal. In addition to that the individual brain structures which may cause the different reactions to the lesions will become a focus of research. Another problem for Cognitive Neuropsychology is that their patients are rare. The patients which are interesting for such research have lesions of an accident or suffered during war. But in addition there are differences in the manner of the lesion. Often multiple brain regions are damaged which makes it very hard to determine which of them is responsible for the examined phenomenon. The dependency on chance whether there are available patients will remain in future. Thereby predictions concerning this aspect of the research are not very reliable. Apart from that it is not possible yet to localise some mental processes in the brain. Creative thought or organisational planning are examples (cf. Eysenck & Keane, Cognitive Psychology, p.517). A possible outcome of the research is that those activities rely on parallel processing. This would support the idea of the modification of the information processing theory that will be discussed later on. But if it shows up that a lot of mental processes depend on such parallel processing it would turn out to be a big drawback for Cognitive Psychology since its core is the modularization of the brain and the according phenomena. In this context the risk of overestimation and underestimation has to be mentioned. The latter occurs because Cognitive Psychology often only identifies the most important brain region for the mental task. Other regions that are related thereto could be ignored. This could turn out to be fundamental if really parallel processing is crucial to many mental activities. Overestimation occurs when fibers that only pass the damaged brain region are lesioned, too. The researcher concludes that the respective brain region plays an important role in the phenomenon he analyses even though only the deliverance of the information passed that region (cf. ibid). Modern technologies and experiments here have to be developed in order to provide valid and precise results. #### Unifying Theories A unified theory of cognitive science serves the purpose to bring together all the vantage points one can take toward the brain/mind. If a theory could be formed which incorporates all the discoveries of the disciplines mentioned above a full understanding would be tangible. ##### ACT-R ACT-R is a Cognitive Architecture, an acronym for Adaptive Control of Thought--Rational. It provides tools which enable us to model the human cognition. It consists mainly of five components: Perceptual-motor modules, declarative memory, procedural memory, chunks and buffers. The declarative memory stores facts in "knowledge-units", the chunks. These are transmitted through the modules respective buffers, which contain one chunk at a time. The procedural memory is the only one without an own buffer, but is able to access the contents of the other buffers. For example those of the perceptual-motor modules, which are the interface with the (simulated) outer world. Production is accomplished by predefined rules, written is LISP. The main character behind it is John R. Anderson who tributes the inspiration to Allan Newell. ##### SOAR SOAR is another Cognitive Architecture, an acronym for State, Operator And Result. It enables one to model complex human capabilities. Its goal is to create an agent with human-like behaviour. The working principles are the following: Problem-solving is a search in a problem-space. Permanent Knowledge is represented by production rules in the production memory. Temporary Knowledge is represented by objects in the working memory. New Goals are created only if a dead end is reached. The learning mechanism is Chunking. Chunking: If SOAR encounters an impasse and is unable to resolve it with the usual technique, it uses "weaker" strategies to circumvent the dead end. In case one of these attempts leads to success, the respective route is saved as a new rule, a chunk, preventing the impasse to occur again. SOAR was created by John Laird, Allen Newell and Paul Rosenbloom. #### Neural Networks There are two types of neural networks: biological and artificial. A biological NN consists of neurons which are physically or functionally connected with each other. Since each neuron can connect to multiple other neurons the number of possible connections is exponentially high. The connections between neurons are called synapses. Signalling along these synapses happens via electrical signalling or chemical signalling, which induces electrical signals. The chemical signalling works by various neurotransmitters. Artificial NN are divided by their goals. One is that of artificial intelligence and the other cognitive modelling. Cognitive modelling NN try to simulate biological NN in order to gain better understanding of them, for example the brain. Until now the complexity of the brain and similar structures has prevented a complete model from being devised, so the cognitive modelling focuses on smaller parts like specific brain regions. NNs in artificial intelligence are used to solve distinct problems. But though their goals differ the methods applied are very similar. An artificial NN consist of artificial neurons (nodes) which are connected by mathematical functions. These functions can be of other functions which in turn can be of yet other functions and so on. The actual work is done by following the connections according to their weights. Weights are properties of the connections defining the probability of the specific route to be taken by the program and can be changed by it, thus optimizing the main function. Hereby it is possible to solve problems for which it is impossible to write a function "by hand". ## Future Research #### Brain imaging/activity measuring As described in section 2.1. and 2.2. there are disadvantages of the brain imaging methods. fMRI has a low temporal resolution, but EEG a low spatial resolution. An interdisciplinary attempt is to combine both methods, to reach both a high spatial and temporal resolution. This technique (simultaneous EEG-measuring in the fMR) is used for instance in studying children with extratemporal epilepsy. It is important to assign the temporal progress to a region in which the epileptic seizure has its roots. In December 2006 a conference in Munich discussed another idea of this mixture of methods: the study of Alzheimer\'s disease. It could be possible to recognise this disease very early. This could lead to new therapies to reduce the speed and the amount of cell-dead. In December of 2006 a conference in Munich discussed this eventuality. Brain imaging methods are not only useful in medical approaches. Other disciplines could benefit from the brain imaging methods and derive new conclusions. For instance for social psychologist the brain imaging methods are interesting. Experiments with psychopathic personalities are only one possibility to explore the behaviour of humans. For literature scientists there could be a possibility to study stylistic devices and their effect of humans while reading a poem. Another attempt in future research is to synchronise the direction of sight and the stimuli, that was trigger for the change of direction. This complex project needs data from eye-tracking experiments and data from fMRI-studies. #### Unifying theories more unifying. Since the mind is a single system it should be possible to explain it as such without having to take different perspectives for every approach (neurological,psychological,computational). Having such a theory would enable us to understand our brain far more thorough than now, and might eventually lead an everyday application. But until now there is no working Unifying Theory of Cognition, which fulfils the requirements stated by Allen Newell in his book Unified Theories of Cognition. Accordingly a UTC has to explain: How intelligent organisms respond flexibly to the environment. How they exhibit goal-directed behaviour and choose goals rationally (and in response to interrupts: see previous point). How they use symbols. How they learn from experience. Even Newells own implementation SOAR does not reach these goals. ### Promising experiments Here I collected the abstracts of a few recent findings, feel free to modify or add to them. \>\>Unintentional language switch \[\] Kho, K.H., Duffau, H., Gatignol, P., Leijten, F.S.S., Ramsey, N.F., van Rijen, P.C. & Rutten, G-J.M. (2007) Utrecht Abstract 1 We present two bilingual patients without language disorders in whom involuntary language switching was induced. The first patient switched from Dutch to English during a left-sided amobarbital Wada-test. Functional magnetic resonance imaging yielded a predominantly left-sided language distribution similar for both languages. The second patient switched from French to Chinese during intraoperative electrocortical stimulation of the left inferior frontal gyrus. We conclude that the observed language switching in both cases was not likely the result of a selective inhibition of one language, but the result of a temporary disruption of brain areas that are involved in language switching. These data complement the few lesion studies on (involuntary or unintentional) language switching, and add to the functional neuroimaging studies of switching, monitoring, and controlling the language in use. \>\>Bilateral eye movement -\> memory Parker, A. & Dagnall, N. (2007) Manchester Metropolitan University, One hundred and two participants listened to 150 words, organised into ten themes (e.g. types of vehicle), read by a male voice. Next, 34 of these participants moved their eyes left and right in time with a horizontal target for thirty seconds (saccadic eye movements); 34 participants moved their eyes up and down in time with a vertical target; the remaining participants stared straight ahead, focussed on a stationary target. After the eye movements, all the participants listened to a mixture of words: 40 they\'d heard before, 40 completely unrelated new words, and 10 words that were new but which matched one of the original themes. In each case the participants had to say which words they\'d heard before, and which were new. The participants who\'d performed sideways eye movements performed better in all respects than the others: they correctly recognised more of the old words as old, and more of the new words as new. Crucially, they were fooled less often by the new words whose meaning matched one of the original themes - that is they correctly recognised more of them as new. This is important because mistakenly identifying one of these \'lures\' as an old word is taken as a laboratory measure of false memory. The performance of the participants who moved their eyes vertically, or who stared ahead, did not differ from each other. Episodic memory improvement induced by bilateral eye movements is hypothesized to reflect enhanced interhemispheric interaction, which is associated with superior episodic memory (S. D. Christman & R. E. Propper. 2001). Implications for neuropsychological mechanisms underlying eye movement desensitization and reprocessing (F. Shapiro, 1989, 2001), a therapeutic technique for posttraumatic stress disorder, are discussed \>\>is the job satisfaction--job performance relationship spurious? A meta-analytic examination Nathan A. Bowling(Department of Psychology, Wright State University) Abstract 2 The job satisfaction--job performance relationship has attracted much attention throughout the history of industrial and organizational psychology. Many researchers and most lay people believe that a causal relationship exists between satisfaction and performance. In the current study, however, analyses using meta-analytic data suggested that the satisfaction--performance relationship is largely spurious. More specifically, the satisfaction--performance relationship was partially eliminated after controlling for either general personality traits (e.g., Five Factor Model traits and core self-evaluations) or for work locus of control and was almost completely eliminated after controlling for organization-based self-esteem. The practical and theoretical implications of these findings are discussed. \>\>Mirror-touch synesthesia is linked with empathy Michael J Banissy & Jamie Ward (Department of Psychology, University College London) Abstract 3 Watching another person being touched activates a similar neural circuit to actual touch and, for some people with \'mirror-touch\' synesthesia, can produce a felt tactile sensation on their own body. In this study, we provide evidence for the existence of this type of synesthesia and show that it correlates with heightened empathic ability. This is consistent with the notion that we empathize with others through a process of simulation. ### Discussion points Where are the limitations of research? Can we rely on our intuitive idea of our mind? What impact could a complete understanding of the brain have on everyday life? #### Brain activity as a false friend In several experiments the outcome is not unambiguous. This hinders a direct derivation from the data. In experiments with psychopathic personalities researchers had to weaken their thesis, that persons with missing activity in the frontal lobe are predetermined for being violent psychopathic people, that are unethical murderers. Missing activity in the frontal lobe leads to a disregulation of threshold for emotional, impulsive or violent actions. But this also advantages for example fire fighters or policemen, who have to withstand strong pressures and who need a higher threshold. So missing activity is not a sufficient criterion for psychopathic personalities. ## Conclusion Today\'s work in the field of Cognitive Psychology gives several hints how future work in this area may look like. In practical applications improvements will probably mainly be driven by the limitations one faces today. Here in particular the newer subfields of Cognitive Psychology will develop quickly. How such changes look like heavily depends on the character of future developments in technology. Especially improvements in Cognitive Neuropsychology and Cognitive Neuroscience depend on the advancements of the imaging techniques. In addition to that the theoretical framework of the field will be influenced by such developments. The parallel processing theory may still be modified according to new insights in computer science. Thereby or eventually by the acceptance of one of the already existing overarching theories the theoretical basis for the current research could be reunified. But if it takes another 30 years to fulfil Newell\'s dream of such a theory or if it will happen rather quick is still open. As a rather young science Cognitive Psychology still is subject to elementary changes. All its practical and theoretical domains are steadily modified. Whether the trends mentioned in this chapter are just dead ends or will cause a revolution of the field could only be predicted which definitely is hard. ## References 4 5 6 7 8 9 10 11 Anderson, John R., Lebiere, Christian, The Atomic Components of Thought, Lawrence Erlbaum Associates, 1998\ Banich, Marie T., Neuropsycology - The Neural Bases of Mental Function, Hougthon Mifflin Company, 1997\ E. Br. Goldstein, Cognitive Psychology, Wadsworth, 2004\ Lyon, G.Reid, Rumsey, Judith M.: Neuroimaging. A Window to Neurological Foundations of Learning and Behaviour in Children. Baltimore. 1996.\ M. W. Eysenck, M. T. Keane, Cognitive Psychology - A Student\'s Handbook, Psychology Press Ltd, 2000\ Thagard, Paul, Cognitive Science in Edward N. Zalta (ed.), The Stanford Encyclopedia of Philosophy, 2004\ ## Links 12 13
# Cognitive Psychology and Cognitive Neuroscience/Hints for good writing First and most important: Always remember, that we are writing a scientific book, not a novel; an essay; or a wikipedia article. For a start you could read this article Try to write a consistent block of text, using subheadings, paragraphs and footnotes. **Do not** make listings, keywords and in general _articles_, but chapters. Your first assignment is the introduction to your chapter. Keep in mind that this is the basis for the rest of your chapter. You shouldn\'t later rewrite your Introduction completely, because you did not know what to write. This assignment already counts for your mark. \'\'The mentioned APA Publishing Manual is not online. However, there is a good overview here If you need help, check out the link section or write Iroewer and Aschoeke on their **discussion site** or via email.
# Cognitive Psychology and Cognitive Neuroscience/Some useful syntax ## Referencing From the Wikipedia about footnotes. On the Edit page, this is placed at the first insertion point of citation: : : \<ref name=\"Perry\"\>Perry\'s Handbook, Sixth Edition, McGraw-Hill Co., 1984.\</ref\> This is placed at the second insertion point of citation: : : \<ref name=\"Perry\"/\> This is placed at the third insertion point of citation: : : \<ref name=\"Perry\"/\> \... and so forth for further insertion points On the Edit page, this is placed in the References or the Footnotes section, so the area, were the footnotes should appear: : : \<references/\>
# Cognitive Psychology and Cognitive Neuroscience/Cross References The group Cross References responsibility is to make sure, that the chapter are related to each other and that the mentioning of source is not redundant. It will also help to connect groups which have similar topics and may work together on certain issues. The group works together with OverallStructure, to ensure that the book in its final state is consistent, but the CRG will concentrate more on sources and team work. Our tools will be mostly non visible in the book, as our work will happen on discussion pages, email and other not wiki related methods of communication. However, we see our work as most important, as we have to ensure the scientific mentioning of the sources and have an overview over every page written in this project.
# Cognitive Psychology and Cognitive Neuroscience/OverallStructure ## OverallStructure Our workgroup OverallStructure tries to work out this project of Cognitive Psychology and Cognitive Neuroscience by **helping** people how to do things right and remind them on the **laws** that we are all restricted to when we publish. We try to give, the groups that work on this book, useful help, inspiration and to remind them on certain **dead-lines**. Especially at the end we are going to put the chapters together as **one piece**, to make this a book worth being published and being read. Working voltage is necessary for a **workflow** of our project to succeed. A workflow needs to be split up in sub-units. These **subunits** fill up the work schedule which is necessary to keep track of the workload and to stay in the timeframe. Here it is important to delegate work to different groups and to have us that has an overlook about what needs to be done and when it is due. OverallStructure works with the group **CrossReferences** closely together. This is required, because otherwise there is the possibility, that we work counterproductive or that we work parallelly on the same thing. Therefor our groups need to find out together what our priorities are and how to put this into practice. **Social skills** is a highly recommended to work in this group. Remembering and criticizing people is risky field. Our comments need to be productive and not to be offensive. We need close interaction with everybody working on this project, just by that it is possible for us to do the required work. We depend on the different groups and they depend on us. Therefor we need some empathy for the nature of humans. Hence we expect of people working on this project and especially of ourselves: - We estimate people to have critical faculties, are able of some kind of self-reflection, self-discipline and tolerance. - In terms of working in groups, we anticipate everyone to be team-oriented, to cooperate with us and insight of the group, to be discountable, open to use communication skills and we hope to have at least one person in each group with some kind of leader-qualities. OverallStructure emphasizes very much **group-work**. Working in groups has a lot of advantages: It makes a project being more productive and more flexible. Groups always optimize themselves, because each member of the group enhances the work of the others resulting in improved work-results. Each member harvest their own individuality and their own creativity. A group contains a special selfcheck, each member not cooperating get in some ways punished by the rest of the group. Paraphrasing this we hope to find people being committed to this project. Our group is a very challenging and implies responsibility from both sides for this project to work and to succeed.
# Write Yourself a Scheme in 48 Hours/First Steps First, you\'ll need to install GHC. On GNU/Linux, it\'s often pre-installed or available via the package manager (`apt` or `yum` or `pacman` for example, depending on your distribution). It\'s also downloadable from <http://www.haskell.org/ghc/>. A binary package is probably easiest, unless you really know what you\'re doing. It should download and install like any other software package. This tutorial was developed on GNU/Linux, but everything should also work on Windows, as long as you know how to use the command line, or on the Macintosh from within the Terminal. For UNIX (or Windows Emacs) users, there is a pretty good Emacs mode, including syntax highlighting and automatic indentation. Windows users can use Notepad or any other text editor: Haskell syntax is fairly Notepad-friendly, though you have to be careful with the indentation. Eclipse users might want to try the eclipsefp plug-in. Now, it\'s time for your first Haskell program. This program will read a name off the command line and then print a greeting. Create a file ending in \".hs\" and type the following text. Be sure to get the indentation right, or else it may not compile. ``` haskell module Main where import System.Environment main :: IO () main = do args <- getArgs putStrLn ("Hello, " ++ args !! 0) ``` Let\'s go through this code. The first two lines specify that we\'ll be creating a module named Main that imports the System module. Every Haskell program begins with an action called `main` in a module named `Main`. That module may import others, but it must be present for the compiler to generate an executable file. Haskell is case-sensitive: module names are always capitalized, definitions always uncapitalized. The line `main :: IO ()` is a type declaration: it says that `main` is of type `IO ()`, which is an IO action carrying along values of unit type `()`. A unit type allows only one value, also denoted `()`, thus holding no information. Type declarations in Haskell are optional: the compiler figures them out automatically, and only complains if they differ from what you\'ve specified. In this tutorial, I specify the types of all declarations explicitly, for clarity. If you\'re following along at home, you may want to omit them, because it\'s less to change as we build our program. The IO type is an instance of the Monad class (a class of types). Monad is a concept. To say a value is of a type of the monad class is to say: 1. there is (a certain type of) extra information attached to this value; 2. most functions do not need to worry about these pieces of information. In this example, 1. the \"extra information\" is IO actions to be performed using the carried along values; 2. while the basic value (which attached with information) is void, represented as `()`. Both `IO [String]` and `IO ()` belong to the same `IO` monad type, but they have different base types. They act on (and pass along) values of different types, `[String]` and `()`. \"value attached with (hidden) information\" is called \"Monadic value\". \"Monadic value\" is often called \"actions\", because the easiest way to think about the using of IO monad is to think about a sequence of actions affecting the outside world. The sequence of actions maybe pass along basic values, and each action is able to act on the values. Haskell is a functional language: instead of giving the computer a sequence of instructions to carry out, you give it a collection of definitions that tell it how to perform every function it might need. These definitions use various compositions of actions and functions. The compiler figures out an execution path that puts everything together. To write one of these definitions, you set it up as an equation. The left hand side defines a name, and optionally one or more *patterns* (explained later) that will bind variables. The right hand side defines some composition of other definitions that tells the computer what to do when it encounters the name. These equations behave just like ordinary equations in algebra: you can always substitute the right hand side for the left within the text of the program, and it\'ll evaluate to the same value. Called \"referential transparency\", this property makes it significantly easier to reason about Haskell programs than other languages. How will we define our `main` action? We know that it must be an `IO ()` action, which we want to read the command line args and print some output, producing `()`, or nothing of value, eventually. There are two ways to create an IO action (either directly or by calling a function that performs them): 1. Lift an ordinary value into the IO monad, using the `return` function. 2. Combine two existing IO actions. Since we want to do two things, we\'ll take the second approach. The built-in action getArgs reads the command-line arguments and passes them along as a list of strings. The built-in function putStrLn takes a string and creates an action that writes this string to the console. To combine these actions, we use a do-block. A do-block consists of a series of lines, all lined up with the first non-whitespace character after the do. Each line can have one of two forms: 1. `name <- action1` 2. `action2` The first form binds the result of *action1* to *name*, to be available in next actions. For example, if the type of *action1* is `IO [String]` (an IO action returning a list of strings, as with `getArgs`), then *name* will be bound in all the subsequent *actions* to the list of strings thus passed along, through the use of \"bind\" operator `>>=`. The second form just executes *action2*, sequencing it with the next line (should there be one) through the `>>` operator. The bind operator has different semantics for each monad: in the case of the IO monad, it executes the actions sequentially, performing whatever external side-effects that result from *actions*. Because the semantics of this composition depend upon the particular monad used, you cannot mix actions of different monad types in the same do-block - only `IO` monad can be used (it\'s all in the same \"pipe\"). Of course, these *actions* may themselves call functions or complicated expressions, passing along their results (either by calling the `return` function, or some other function that eventually does so). In this example, we first take the first element of the argument list (at index 0, `args !! 0`), concatenate it onto the end of the string \"Hello, \" (`"Hello, " ++`), and finally pass that to `putStrLn` which creates new IO action, participating in the do-block sequencing. A new action thus created, which is a combined sequence of actions as described above, is stored in the identifier `main` of type `IO ()`. The Haskell system notices this definition, and executes the action in it. Strings are lists of characters in Haskell, so you can use any of the list functions and operators on them. A full table of the standard operators and their precedences follows: Operator(s) Precedence Associativity Description ---------------------------------- ------------------------------------ -------------------------------------------------------------- -------------------------------------------------------------------------------------------------- `.` 9 right function composition `<code>`{=html} `</code>`{=html} left list indexing `^`, `^^`, `**` 8 right exponentiation (integer, fractional, and floating-point) `*`, `/` 7 left multiplication, division `+`, `-` 6 left addition, subtraction `:` 5 right *cons* (list construction) `++` right list concatenation `` `elem` ``, `` `notElem` `` 4 left list membership `==`, `/=`, `<`, `<=`, `>=`, `>` left equality, inequality, and other relation operators `&&` 3 right logical and `<code>`{=html}`<nowiki>`{=html} `</nowiki>`{=html}`</code>`{=html} 2 right `>>`, `>>=` 1 left monadic bind ignoring the return value, monadic bind piping value to the next function `=<<` right reverse monadic bind (same as above, but arguments reversed) `$` 0 right infix function application (`f $ x` is the same as `f x`, but right-associative instead of left) To compile and run the program, try something like this: `debian:/home/jdtang/haskell_tutorial/code# ghc -o hello_you --make listing2.hs`\ `debian:/home/jdtang/haskell_tutorial/code# ./hello_you Jonathan`\ `Hello, Jonathan` The `-o` option specifies the name of the executable you want to create, and then you just specify the name of the Haskell source file.
# Write Yourself a Scheme in 48 Hours/Parsing ## Making project scaffolding and getting `parsec` We\'ll be using the Parsec library. To install it, you\'ll need `cabal-install`, which is invoked with the `cabal` command. On Debian/Ubuntu: `sudo apt-get install cabal-install`. Alternatively, you can use ghcup, which works for many platforms. After installing `cabal-install`, let\'s make a project: ``` sh $ cabal update $ mkdir myProject $ cd myProject $ cabal init ``` Now edit `myProject.cabal` such that `parsec` is listed in `build-depends` listing, in addition to `base`. Now, the project can be run using `cabal run`: Building executable 'myProject' for myProject-0.1.0.0.. [1 of 1] Compiling Main ( app/Main.hs ) Linking myProject-0.1.0.0/x/myProject/build/myProject/myProject ... Hello, Haskell! The last line is the output by the program. ## Writing a Simple Parser Now, let\'s try writing a very simple parser. Start by adding these lines to the import section of `app/Main.hs` (which was generated by `cabal init`): ``` haskell import Text.ParserCombinators.Parsec hiding (spaces) import System.Environment ``` This makes the Parsec library functions available to us, except the `spaces` function, whose name conflicts with a function that we\'ll be defining later. Now, we\'ll define a parser that recognizes one of the symbols allowed in Scheme identifiers: ``` haskell symbol :: Parser Char symbol = oneOf "!#$%&|*+-/:<=>?@^_~" ``` This is another example of a monad: in this case, the \"extra information\" that is being hidden is all the info about position in the input stream, backtracking record, first and follow sets, etc. Parsec takes care of all of that for us. We need only use the Parsec library function `oneOf`, and it\'ll recognize a single one of any of the characters in the string passed to it. Parsec provides a number of pre-built parsers: for example, `letter` and `digit` are library functions. And as you\'re about to see, you can compose primitive parsers into more sophisticated productions. Let\'s define a function to call our parser and handle any possible errors: ``` haskell readExpr :: String -> String readExpr input = case parse symbol "lisp" input of Left err -> "No match: " ++ show err Right val -> "Found value" ``` As you can see from the type signature, `readExpr` is a function (`->`) from a `String` to a `String`. We name the parameter `input`, and pass it, along with the `symbol` parser we defined above to the Parsec function `parse`. The second parameter to `parse` is a name for the input. It is used for error messages. `parse` can return either the parsed value or an error, so we need to handle the error case. Following typical Haskell convention, Parsec returns an `Either` data type, using the `Left` constructor to indicate an error and the `Right` one for a normal value. We use a `case...of` construction to match the result of `parse` against these alternatives. If we get a `Left` value (error), then we bind the error itself to `err` and return \"No match\" with the string representation of the error. If we get a `Right` value, we bind it to `val`, ignore it, and return the string \"Found value\". The `case...of` construction is an example of pattern matching, which we will see in much greater detail later on. Finally, we need to change our main function to call `readExpr` and print out the result: ``` haskell main :: IO () main = do (expr:_) <- getArgs putStrLn (readExpr expr) ``` To compile and run this, you can specify the command line parameters after the \"executable target\" which the project scaffolding generated with the call to `init` in the first section. For example: `$ cabal run myProject $`\ `Found value`\ `$ cabal run myProject a`\ `No match: "lisp" (line 1, column 1):`\ `unexpected "a"` ## Whitespace Next, we\'ll add a series of improvements to our parser that\'ll let it recognize progressively more complicated expressions. The current parser chokes if there\'s whitespace preceding our symbol: `$ cabal run myProject "   %"`\ `No match: "lisp" (line 1, column 1):`\ `unexpected " "` Let\'s fix that, so that we ignore whitespace. First, lets define a parser that recognizes any number of whitespace characters. Incidentally, this is why we included the `hiding (spaces)` clause when we imported Parsec: there\'s already a `spaces` function in that library, but it doesn\'t quite do what we want it to. (For that matter, there\'s also a parser called `lexeme` that does exactly what we want, but we\'ll ignore that for pedagogical purposes.) ``` haskell spaces :: Parser () spaces = skipMany1 space ``` Just as functions can be passed to functions, so can actions. Here we pass the Parser action `space` to the Parser action `skipMany1`, to get a Parser that will recognize one or more spaces. Now, let\'s edit our parse function so that it uses this new parser: ``` haskell readExpr input = case parse (spaces >> symbol) "lisp" input of Left err -> "No match: " ++ show err Right val -> "Found value" ``` We touched briefly on the `>>` (\"bind\") operator in lesson 2, where we mentioned that it was used behind the scenes to combine the lines of a do-block. Here, we use it explicitly to combine our whitespace and symbol parsers. However, bind has completely different semantics in the Parser and IO monads. In the Parser monad, bind means \"Attempt to match the first parser, then attempt to match the second with the remaining input, and fail if either fails.\" In general, bind will have wildly different effects in different monads; it\'s intended as a general way to structure computations, and so needs to be general enough to accommodate all the different types of computations. Read the documentation for the monad to figure out precisely what it does. Compile and run this code. Note that since we defined `spaces` in terms of `skipMany1`, it will no longer recognize a plain old single character. Instead you *have to* precede a symbol with some whitespace. We\'ll see how this is useful shortly: `$ cabal run myProject "   %"`\ `Found value`\ `$ cabal run myProject %`\ `No match: "lisp" (line 1, column 1):`\ `unexpected "%"`\ `expecting space`\ `$ cabal run myProject "   abc"`\ `No match: "lisp" (line 1, column 4):`\ `unexpected "a"`\ `expecting space` ## Return Values Right now, the parser doesn\'t *do* much of anything---it just tells us whether a given string can be recognized or not. Generally, we want something more out of our parsers: we want them to convert the input into a data structure that we can traverse easily. In this section, we learn how to define a data type, and how to modify our parser so that it returns this data type. First, we need to define a data type that can hold any Lisp value: ``` haskell data LispVal = Atom String | List [LispVal] | DottedList [LispVal] LispVal | Number Integer | String String | Bool Bool ``` This is an example of an *algebraic data type*: it defines a set of possible values that a variable of type LispVal can hold. Each alternative (called a *constructor* and separated by `|`) contains a tag for the constructor along with the type of data that the constructor can hold. In this example, a `LispVal` can be: 1. An `Atom`, which stores a String naming the atom 2. A `List`, which stores a list of other LispVals (Haskell lists are denoted by brackets); also called a *proper* list 3. A `DottedList`, representing the Scheme form `(a b . c)`; also called an *improper* list. This stores a list of all elements but the last, and then stores the last element as another field 4. A `Number`, containing a Haskell Integer 5. A `String`, containing a Haskell String 6. A `Bool`, containing a Haskell boolean value Constructors and types have different namespaces, so you can have both a constructor named `String` and a type named `String`. Both types and constructor tags always begin with capital letters. Next, let\'s add a few more parsing functions to create values of these types. A string is a double quote mark, followed by any number of non-quote characters, followed by a closing quote mark: ``` haskell parseString :: Parser LispVal parseString = do char '"' x <- many (noneOf "\"") char '"' return $ String x ``` We\'re back to using the `do`-notation instead of the `>>` operator. This is because we\'ll be retrieving the value of our parse (returned by `many(noneOf "\"")`) and manipulating it, interleaving some other parse operations in the meantime. In general, use `>>` if the actions don\'t return a value, `>>=` if you\'ll be immediately passing that value into the next action, and `do`-notation otherwise. Once we\'ve finished the parse and have the Haskell String returned from `many`, we apply the `String` constructor (from our LispVal data type) to turn it into a `LispVal`. Every constructor in an algebraic data type also acts like a function that turns its arguments into a value of its type. It also serves as a pattern that can be used in the left-hand side of a pattern-matching expression; we saw an example of this in Lesson 3.1 when we matched our parser result against the two constructors in the `Either` data type. We then apply the built-in function `return` to lift our `LispVal` into the `Parser` monad. Remember, each line of a `do`-block must have the same type, but the result of our String constructor is just a plain old LispVal. `return` lets us wrap that up in a Parser action that consumes no input but returns it as the inner value. Thus, the whole `parseString` action will have type `Parser LispVal`. The `$` operator is infix function application: it\'s the same as if we\'d written `return (String x)`, but `$` is right associative and low precedence, letting us eliminate some parentheses. Since `$` is an operator, you can do anything with it that you\'d normally do to a function: pass it around, partially apply it, etc. In this respect, it functions like the Lisp function `apply`. Now let\'s move on to Scheme variables. An *atom* is a letter or symbol, followed by any number of letters, digits, or symbols: ``` haskell parseAtom :: Parser LispVal parseAtom = do first <- letter <|> symbol rest <- many (letter <|> digit <|> symbol) let atom = first:rest return $ case atom of "#t" -> Bool True "#f" -> Bool False _ -> Atom atom ``` Here, we introduce another Parsec combinator, the choice operator `<|>`. This tries the first parser, then if it fails, tries the second. If either succeeds, then it returns the value returned by that parser. The first parser must fail before it consumes any input: we\'ll see later how to implement backtracking. Once we\'ve read the first character and the rest of the atom, we need to put them together. The \"`let`\" statement defines a new variable `atom`. We use the list cons operator `:` for this. Instead of `:`, we could have used the concatenation operator `++` like this `[first] ++ rest`; recall that `first` is just a single character, so we convert it into a singleton list by putting brackets around it. Then we use a case expression to determine which `LispVal` to create and return, matching against the literal strings for true and false. The underscore `_` alternative is a readability trick: case blocks continue until a `_` case (or fail any case which also causes the failure of the whole `case` expression), think of `_` as a *wildcard*. So if the code falls through to the `_` case, it always matches, and returns the value of `atom`. Finally, we create one more parser, for numbers. This shows one more way of dealing with monadic values: ``` haskell parseNumber :: Parser LispVal parseNumber = liftM (Number . read) $ many1 digit ``` It\'s easiest to read this backwards, since both function application (`$`) and function composition (`.`) associate to the right. The parsec combinator many1 matches one or more of its argument, so here we\'re matching one or more digits. We\'d like to construct a number `LispVal` from the resulting string, but we have a few type mismatches. First, we use the built-in function read to convert that string into a number. Then we pass the result to `Number` to get a `LispVal`. The function composition operator `.` creates a function that applies its right argument and then passes the result to the left argument, so we use that to combine the two function applications. Unfortunately, the result of `many1 digit` is actually a `Parser String`, so our combined `Number . read` still can\'t operate on it. We need a way to tell it to just operate on the value inside the monad, giving us back a `Parser LispVal`. The standard function `liftM` does exactly that, so we apply `liftM` to our `Number . read` function, and then apply the result of that to our parser. We also have to import the Monad module up at the top of our program to get access to `liftM`: ``` haskell import Control.Monad ``` This style of programming---relying heavily on function composition, function application, and passing functions to functions---is very common in Haskell code. It often lets you express very complicated algorithms in a single line, breaking down intermediate steps into other functions that can be combined in various ways. Unfortunately, it means that you often have to read Haskell code from right-to-left and keep careful track of the types. We\'ll be seeing many more examples throughout the rest of the tutorial, so hopefully you\'ll get pretty comfortable with it. Let\'s create a parser that accepts either a string, a number, or an atom: ``` haskell parseExpr :: Parser LispVal parseExpr = parseAtom <|> parseString <|> parseNumber ``` And edit readExpr so it calls our new parser: ``` haskell readExpr :: String -> String readExpr input = case parse parseExpr "lisp" input of Left err -> "No match: " ++ show err Right _ -> "Found value" ``` Compile and run this code, and you\'ll notice that it accepts any number, string, or symbol, but not other strings: `$ cabal run myProject "\"this is a string\""`\ `Found value`\ `$ cabal run myProject 25`\ `Found value`\ `$ cabal run myProject symbol`\ `Found value`\ `$ cabal run myProject (symbol)`\ `` bash: syntax error near unexpected token `symbol' ``\ `$ cabal run myProject "(symbol)"`\ `No match: "lisp" (line 1, column 1):`\ `unexpected "("`\ `expecting letter, "\"" or digit` ## Recursive Parsers: Adding lists, dotted lists, and quoted datums Next, we add a few more parser actions to our interpreter. Start with the parenthesized lists that make Lisp famous: ``` haskell parseList :: Parser LispVal parseList = liftM List $ sepBy parseExpr spaces ``` This works analogously to `parseNumber`, first parsing a series of expressions separated by whitespace (`sepBy parseExpr spaces`) and then apply the List constructor to it within the Parser monad. Note too that we can pass `parseExpr` to sepBy, even though it\'s an action we wrote ourselves. The dotted-list parser is somewhat more complex, but still uses only concepts that we\'re already familiar with: ``` haskell parseDottedList :: Parser LispVal parseDottedList = do head <- endBy parseExpr spaces tail <- char '.' >> spaces >> parseExpr return $ DottedList head tail ``` Note how we can sequence together a series of Parser actions with `>>` and then use the whole sequence on the right hand side of a do-statement. The expression `char '.' >> spaces` returns a `Parser ()`, then combining that with `parseExpr` gives a `Parser LispVal`, exactly the type we need for the do-block. Next, let\'s add support for the single-quote syntactic sugar of Scheme: ``` haskell parseQuoted :: Parser LispVal parseQuoted = do char '\'' x <- parseExpr return $ List [Atom "quote", x] ``` Most of this is fairly familiar stuff: it reads a single quote character, reads an expression and binds it to `x`, and then returns `(quote x)`, to use Scheme notation. The `Atom` constructor works like an ordinary function: you pass it the String you\'re encapsulating, and it gives you back a LispVal. You can do anything with this LispVal that you normally could, like put it in a list. Finally, edit our definition of parseExpr to include our new parsers: ``` haskell parseExpr :: Parser LispVal parseExpr = parseAtom <|> parseString <|> parseNumber <|> parseQuoted <|> do char '(' x <- try parseList <|> parseDottedList char ')' return x ``` This illustrates one last feature of Parsec: backtracking. `parseList` and `parseDottedList` recognize identical strings up to the dot; this breaks the requirement that a choice alternative may not consume any input before failing. The try combinator attempts to run the specified parser, but if it fails, it backs up to the previous state. This lets you use it in a choice alternative without interfering with the other alternative. Compile and run this code: `$ cabal run myProject "(a test)"`\ `Found value`\ `$ cabal run myProject "(a (nested) test)"`\ `Found value`\ `$ cabal run myProject "(a (dotted . list) test)"`\ `Found value`\ `$ cabal run myProject "(a '(quoted (dotted . list)) test)"`\ `Found value`\ `$ cabal run myProject "(a '(imbalanced parens)"`\ `No match: "lisp" (line 1, column 24):`\ `unexpected end of input`\ `expecting space or ")"` Note that by referring to `parseExpr` within our parsers, we can nest them arbitrarily deep. Thus, we get a full Lisp reader with only a few definitions. That\'s the power of recursion.
# Write Yourself a Scheme in 48 Hours/Evaluation, Part 1 ## Beginning the Evaluator Currently, we\'ve just been printing out whether or not we recognize the given program fragment. We\'re about to take the first steps towards a working Scheme interpreter: assigning values to program fragments. We\'ll be starting with baby steps, but fairly soon you\'ll be progressing to working with computations. Let\'s start by telling Haskell how to print out a string representation of the various possible `LispVal`s: ``` haskell showVal :: LispVal -> String showVal (String contents) = "\"" ++ contents ++ "\"" showVal (Atom name) = name showVal (Number contents) = show contents showVal (Bool True) = "#t" showVal (Bool False) = "#f" ``` This is our first real introduction to pattern matching. Pattern matching is a way of destructuring an algebraic data type, selecting a code clause based on its constructor and then binding the components to variables. Any constructor can appear in a pattern; that pattern matches a value if the tag is the same as the value\'s tag and all subpatterns match their corresponding components. Patterns can be nested arbitrarily deep, with matching proceeding in an inside → outside, left → right order. The clauses of a function definition are tried in textual order, until one of the patterns matches. If this is confusing, you\'ll see some examples of deeply-nested patterns when we get further into the evaluator. For now, you only need to know that each clause of the above definition matches one of the constructors of `LispVal`, and the right-hand side tells what to do for a value of that constructor. The `List` and `DottedList` clauses work similarly, but we need to define a helper function `unwordsList` to convert the contained list into a string: ``` haskell showVal (List contents) = "(" ++ unwordsList contents ++ ")" showVal (DottedList head tail) = "(" ++ unwordsList head ++ " . " ++ showVal tail ++ ")" ``` The `unwordsList` function works like the Haskell Prelude\'s `unwords` function, which glues together a list of words with spaces. Since we\'re dealing with a list of `LispVal`s instead of words, we define a function that first converts the `LispVal`s into their string representations and then applies `unwords` to it: ``` haskell unwordsList :: [LispVal] -> String unwordsList = unwords . map showVal ``` Our definition of unwordsList doesn\'t include any arguments. This is an example of *point-free style*: writing definitions purely in terms of function composition and partial application, without regard to individual values or \"points\". Instead, we define it as the composition of a couple of built-in functions. First, we partially-apply `map` to `showVal`, which creates a function that takes a list of `LispVal`s and returns a list of their string representations. Haskell functions are *curried*: this means that a function of two arguments, like `map`, is really a function that returns a function of one argument. As a result, if you supply only a single argument, you get back a function of one argument that you can pass around, compose, and apply later. In this case, we compose it with unwords: `map showVal` converts a list of `LispVal`s to a list of their string representations, and then `unwords` joins the result together with spaces. We used the function `show` above. This standard Haskell function lets you convert any type that\'s an instance of the class `Show` into a string. We\'d like to be able to do the same with `LispVal`, so we make it into a member of the class `Show`, defining its `show` method as `showVal`: ``` haskell instance Show LispVal where show = showVal ``` A full treatment of type classes is beyond the scope of this tutorial; you can find more information in other tutorials and the Haskell 2010 report. Let\'s try things out by changing our readExpr function so it returns the string representation of the value actually parsed, instead of just \"Found value\": ``` haskell readExpr input = case parse parseExpr "lisp" input of Left err -> "No match: " ++ show err Right val -> "Found " ++ show val ``` And compile and run... `$ ghc -package parsec -o parser listing4.1.hs`\ `$ ./parser "(1 2 2)"`\ `Found (1 2 2)`\ `$ ./parser "'(1 3 (\"this\" \"one\"))"`\ `Found (quote (1 3 ("this" "one")))` ## Beginnings of an evaluator: Primitives Now, we start with the beginnings of an evaluator. The purpose of an evaluator is to map some \"code\" data type into some \"data\" data type, the result of the evaluation. In Lisp, the data *types* for both code and data are the same, so our evaluator will return a `LispVal`. Other languages often have more complicated code structures, with a variety of syntactic forms. Evaluating numbers, strings, booleans, and quoted lists is fairly simple: return the datum itself. ``` haskell eval :: LispVal -> LispVal eval val@(String _) = val eval val@(Number _) = val eval val@(Bool _) = val eval (List [Atom "quote", val]) = val ``` This introduces a new type of pattern. The notation `val@(String _)` matches against any `LispVal` that\'s a string and then binds `val` to the *whole* `LispVal`, and not just the contents of the `String` constructor. The result has type `LispVal` instead of type `String`. The underbar is the \"don\'t care\" variable, matching any value yet not binding it to a variable. It can be used in any pattern, but is especially useful with @-patterns (where you bind the variable to the whole pattern) and with simple constructor-tests where you\'re just interested in the tag of the constructor. The last clause is our first introduction to nested patterns. The type of data contained by `List` is `[LispVal]`, a list of `LispVal`s. We match *that* against the specific two-element list `[Atom "quote", val]`, a list where the first element is the symbol \"quote\" and the second element can be anything. Then we return that second element. Let\'s integrate `eval` into our existing code. Start by changing `readExpr` back so it returns the expression instead of a string representation of the expression: ``` haskell readExpr :: String -> LispVal readExpr input = case parse parseExpr "lisp" input of Left err -> String $ "No match: " ++ show err Right val -> val ``` And then change our main function to read an expression, evaluate it, convert it to a string, and print it out. Now that we know about the `>>=` monad sequencing operator and the function composition operator, let\'s use them to make this a bit more concise: ``` haskell main :: IO () main = getArgs >>= print . eval . readExpr . head ``` Here, we take the result of the `getArgs` action (a list of strings) and pass it into the composition of: 1. take the first value (`head`); 2. parse it (`readExpr`); 3. evaluate it (`eval`); 4. convert it to a string and print it (`print`). Compile and run the code the normal way: `$ ghc -package parsec -o eval listing4.2.hs`\ `$ ./eval "'atom" `\ `atom`\ `$ ./eval 2`\ `2`\ `$ ./eval "\"a string\""`\ `"a string"`\ `$ ./eval "(+ 2 2)"`\ \ `Fail: listing6.hs:83: Non-exhaustive patterns in function eval` We still can\'t do all that much useful with the program (witness the failed `(+ 2 2)` call), but the basic skeleton is in place. Soon, we\'ll be extending it with some functions to make it useful. ## Adding basic primitives Next, we\'ll improve our Scheme so we can use it as a simple calculator. It\'s still not yet a \"programming language\", but it\'s getting close. Begin by adding a clause to eval to handle function application. Remember that all clauses of a function definition must be placed together and are evaluated in textual order, so this should go after the other eval clauses: ``` haskell eval (List (Atom func : args)) = apply func $ map eval args ``` This is another nested pattern, but this time we match against the cons operator \":\" instead of a literal list. Lists in Haskell are really syntactic sugar for a chain of cons applications and the empty list: `[1, 2, 3, 4] = 1:(2:(3:(4:[])))`. By pattern-matching against cons itself instead of a literal list, we\'re saying \"give me the rest of the list\" instead of \"give me the second element of the list\". For example, if we passed `(+ 2 2)` to eval, `func` would be bound to \"+\" and `args` would be bound to `[Number 2, Number 2]`. The rest of the clause consists of a couple of functions we\'ve seen before and one we haven\'t defined yet. We have to recursively evaluate each argument, so we map `eval` over the args. This is what lets us write compound expressions like `(+ 2 (- 3 1) (* 5 4))`. Then we take the resulting list of evaluated arguments, and pass it and the original function to apply: ``` haskell apply :: String -> [LispVal] -> LispVal apply func args = maybe (Bool False) ($ args) $ lookup func primitives ``` The built-in function `lookup` looks up a key (its first argument) in a list of pairs. However, lookup will fail if no pair in the list contains the matching key. To express this, it returns an instance of the built-in type `Maybe`. We use the function `maybe` to specify what to do in case of either success or failure. If the function isn\'t found, we return a `Bool False` value, equivalent to `#f` (we\'ll add more robust error-checking later). If it *is* found, we apply it to the arguments using `($ args)`, an operator section of the function application operator. Next, we define the list of primitives that we support: ``` haskell primitives :: [(String, [LispVal] -> LispVal)] primitives = [("+", numericBinop (+)), ("-", numericBinop (-)), ("*", numericBinop (*)), ("/", numericBinop div), ("mod", numericBinop mod), ("quotient", numericBinop quot), ("remainder", numericBinop rem)] ``` Look at the type of `primitives`. It is a list of pairs, just like `lookup` expects, *but the values of the pairs are functions from `[LispVal]` to `LispVal`*. In Haskell, you can easily store functions in other data structures, though the functions must all have the same type. Also, the functions that we store are themselves the result of a function, `numericBinop`, which we haven\'t defined yet. This takes a primitive Haskell function (often an operator section) and wraps it with code to unpack an argument list, apply the function to it, and wrap the result up in our `Number` constructor. ``` haskell numericBinop :: (Integer -> Integer -> Integer) -> [LispVal] -> LispVal numericBinop op params = Number $ foldl1 op $ map unpackNum params unpackNum :: LispVal -> Integer unpackNum (Number n) = n unpackNum (String n) = let parsed = reads n :: [(Integer, String)] in if null parsed then 0 else fst $ parsed !! 0 unpackNum (List [n]) = unpackNum n unpackNum _ = 0 ``` As with R5RS Scheme, we don\'t limit ourselves to only two arguments. Our numeric operations can work on a list of any length, so `(+ 2 3 4) = 2 + 3 + 4`, and `(- 15 5 3 2) = 15 - 5 - 3 - 2`. We use the built-in function `foldl1` to do this. It essentially changes every cons operator in the list to the binary function we supply, `op`. Unlike R5RS Scheme, we\'re implementing a form of *weak typing*. That means that if a value can be interpreted as a number (like the string \"2\"), we\'ll use it as one, even if it\'s tagged as a string. We do this by adding a couple extra clauses to `unpackNum`. If we\'re unpacking a string, attempt to parse it with Haskell\'s built-in `reads` function, which returns a list of pairs of (parsed value, remaining string). For lists, we pattern-match against the one-element list and try to unpack that. Anything else falls through to the next case. If we can\'t parse the number, for any reason, we\'ll return 0 for now. We\'ll fix this shortly so that it signals an error. Compile and run this the normal way. Note how we get nested expressions \"for free\" because we call eval on each of the arguments of a function: `$ ghc -package parsec -o eval listing7.hs`\ `$ ./eval "(+ 2 2)"`\ `4`\ `$ ./eval "(+ 2 (-4 1))"`\ `2`\ `$ ./eval "(+ 2 (- 4 1))"`\ `5`\ `$ ./eval "(- (+ 4 6 3) 3 5 2)"`\ `3`
# Write Yourself a Scheme in 48 Hours/Error Checking and Exceptions Currently, there are a variety of places within the code where we either ignore errors or silently assign \"default\" values like `#f` or 0 that make no sense. Some languages -- like Perl and PHP -- get along fine with this approach. However, it often means that errors pass silently throughout the program until they become big problems, which means rather inconvenient debugging sessions for the programmer. We\'d like to signal errors as soon as they happen and immediately break out of execution. First, we need to import `Control.Monad.Except` to get access to Haskell\'s built-in error functions: ``` haskell import Control.Monad.Except ``` On Debian based systems this needs `libghc6-mtl-dev` installed. Then, we should define a data type to represent an error: ``` haskell data LispError = NumArgs Integer [LispVal] | TypeMismatch String LispVal | Parser ParseError | BadSpecialForm String LispVal | NotFunction String String | UnboundVar String String | Default String ``` This is a few more constructors than we need at the moment, but we might as well foresee all the other things that can go wrong in the interpreter later. Next, we define how to print out the various types of errors and make `LispError` an instance of `Show`: ``` haskell showError :: LispError -> String showError (UnboundVar message varname) = message ++ ": " ++ varname showError (BadSpecialForm message form) = message ++ ": " ++ show form showError (NotFunction message func) = message ++ ": " ++ show func showError (NumArgs expected found) = "Expected " ++ show expected ++ " args; found values " ++ unwordsList found showError (TypeMismatch expected found) = "Invalid type: expected " ++ expected ++ ", found " ++ show found showError (Parser parseErr) = "Parse error at " ++ show parseErr instance Show LispError where show = showError ``` Then we define a type to represent functions that may throw a `LispError` or return a value. Remember how `parse` used an `Either` data type to represent exceptions? We take the same approach here: ``` haskell type ThrowsError = Either LispError ``` Type constructors are curried just like functions, and can also be partially applied. A full type would be `Either LispError Integer` or `Either LispError LispVal`, but we want to say `ThrowsError LispVal` and so on. We only partially apply `Either` to `LispError`, creating a type constructor `ThrowsError` that we can use on any data type. `Either` is yet another instance of a monad. In this case, the \"extra information\" being passed between `Either` actions is whether or not an error occurred. Bind applies its function if the `Either` action holds a normal value, or passes an error straight through without computation. This is how exceptions work in other languages, but because Haskell is lazily-evaluated, there\'s no need for a separate control-flow construct. If bind determines that a value is already an error, the function is never called. The `Control.Monad.Except` library automatically gives the `Either` monad two other functions besides the standard monadic ones: 1. `throwError`, which takes an `Error` value and lifts it into the `Left` (error) constructor of an `Either` 2. `catchError`, which takes an `Either` action and a function that turns an error into another `Either` action. If the action represents an error, it applies the function, which you can use to, e.g. turn the error value into a normal one via `return` or re-throw as a different error. In our program, we\'ll be converting all of our errors to their string representations and returning that as a normal value. Let\'s create a helper function to do that for us: ``` haskell trapError action = catchError action (return . show) ``` The result of calling `trapError` is another `Either` action which will always have valid (`Right`) data. We still need to extract that data from the `Either` monad so it can be passed around to other functions: ``` haskell extractValue :: ThrowsError a -> a extractValue (Right val) = val ``` We purposely leave `extractValue` undefined for a `Left` constructor, because that represents a programmer error. We intend to use `extractValue` only after a `catchError`, so it\'s better to fail fast than to inject bad values into the rest of the program. Now that we have all the basic infrastructure, it\'s time to start using our error-handling functions. Remember how our parser had previously just returned a string saying \"No match\" on an error? Let\'s change it so that it wraps and throws the original `ParseError`: ``` haskell readExpr :: String -> ThrowsError LispVal readExpr input = case parse parseExpr "lisp" input of Left err -> throwError $ Parser err Right val -> return val ``` Here, we first wrap the original `ParseError` with the `LispError` constructor `Parser`, and then use the built-in function `throwError` to return that in our `ThrowsError` monad. Since `readExpr` now returns a monadic value, we also need to wrap the other case in a return function. Next, we change the type signature of `eval` to return a monadic value, adjust the return values accordingly, and add a clause to throw an error if we encounter a pattern that we don\'t recognize: ``` haskell eval :: LispVal -> ThrowsError LispVal eval val@(String _) = return val eval val@(Number _) = return val eval val@(Bool _) = return val eval (List [Atom "quote", val]) = return val eval (List (Atom func : args)) = mapM eval args >>= apply func eval badForm = throwError $ BadSpecialForm "Unrecognized special form" badForm ``` Since the function application clause calls `eval` (which now returns a monadic value) recursively, we need to change that clause. First, we had to change `map` to `mapM`, which maps a monadic function over a list of values, sequences the resulting actions together with bind, and then returns a list of the inner results. Inside the `Error` monad, this sequencing performs all computations sequentially but throws an error value if any one of them fails -- giving you `Right [results]` on success, or `Left error` on failure. Then, we used the monadic \"bind\" operation to pass the result into the partially applied \"apply func\", again returning an error if either operation failed. Next, we change `apply` itself so that it throws an error if it doesn\'t recognize the function: ``` haskell apply :: String -> [LispVal] -> ThrowsError LispVal apply func args = maybe (throwError $ NotFunction "Unrecognized primitive function args" func) ($ args) (lookup func primitives) ``` We *didn\'t* add a return statement to the function application `($ args)`. We\'re about to change the type of our primitives, so that the function returned from the lookup itself returns a `ThrowsError` action: ``` haskell primitives :: [(String, [LispVal] -> ThrowsError LispVal)] ``` And, of course, we need to change the numericBinop function that implements these primitives so it throws an error if there\'s only one argument: ``` haskell numericBinop :: (Integer -> Integer -> Integer) -> [LispVal] -> ThrowsError LispVal numericBinop op [] = throwError $ NumArgs 2 [] numericBinop op singleVal@[_] = throwError $ NumArgs 2 singleVal numericBinop op params = mapM unpackNum params >>= return . Number . foldl1 op ``` We use an at-pattern to capture the single-value case because we want to include the actual value passed in for error-reporting purposes. Here, we\'re looking for a list of exactly one element, and we don\'t care what that element is. We also need to use `mapM` to sequence the results of `unpackNum`, because each individual call to `unpackNum` may fail with a `TypeMismatch`: ``` haskell unpackNum :: LispVal -> ThrowsError Integer unpackNum (Number n) = return n unpackNum (String n) = let parsed = reads n in if null parsed then throwError $ TypeMismatch "number" $ String n else return $ fst $ parsed !! 0 unpackNum (List [n]) = unpackNum n unpackNum notNum = throwError $ TypeMismatch "number" notNum ``` Finally, we need to change our main function to use this whole big error monad. This can get a little complicated, because now we\'re dealing with *two* monads (`Either` (for errors) and `IO`). As a result, we go back to do-notation, because it\'s nearly impossible to use point-free style when the result of one monad is nested inside another: ``` haskell main :: IO () main = do args <- getArgs evaled <- return $ liftM show $ readExpr (args !! 0) >>= eval putStrLn $ extractValue $ trapError evaled ``` Here\'s what this new function is doing: 1. `args` is the list of command-line arguments. 2. `evaled` is the result of: 1. taking first argument (`args !! 0`); 2. parsing it (`readExpr`); 3. passing it to `eval` (`>>= eval`; the bind operation has higher precedence than `$`); 4. calling `show` on it within the `Error` monad. (Note also that the whole action has type `IO (Either LispError String)`, giving `evaled` type `Either LispError String`. It has to be, because our `trapError` function can only convert errors to `String`s, and that type must match the type of normal values.) 3. Caught is the result of: 1. calling `trapError` on `evaled`, converting errors to their string representation; 2. calling `extractValue` to get a `String` out of this `Either LispError String` action; 3. printing the results through `putStrLn`. Compile and run the new code, and try throwing it a couple errors: `$ ghc -package parsec -o errorcheck [../code/listing5.hs listing5.hs]`\ `$ ./errorcheck "(+ 2 \"two\")"`\ `Invalid type: expected number, found "two"`\ `$ ./errorcheck "(+ 2)"`\ `Expected 2 args; found values 2`\ `$ ./errorcheck "(what? 2)"`\ `Unrecognized primitive function args: "what?"` Some readers have reported that you need to add a `--make` flag to build this example, and presumably all further listings. This tells GHC to build a complete executable, searching out all dependencies listed in the import statements. The command above works on my system, but if it fails on yours, give `--make` a try.
# Write Yourself a Scheme in 48 Hours/Evaluation, Part 2 ## Additional Primitives: Partial Application Now that we can deal with type errors, bad arguments, and so on, we\'ll flesh out our primitive list so that it does something more than calculate. We\'ll add boolean operators, conditionals, and some basic string operations. Start by adding the following into the list of primitives: ``` haskell ("=", numBoolBinop (==)), ("<", numBoolBinop (<)), (">", numBoolBinop (>)), ("/=", numBoolBinop (/=)), (">=", numBoolBinop (>=)), ("<=", numBoolBinop (<=)), ("&&", boolBoolBinop (&&)), ("||", boolBoolBinop (||)), ("string=?", strBoolBinop (==)), ("string<?", strBoolBinop (<)), ("string>?", strBoolBinop (>)), ("string<=?", strBoolBinop (<=)), ("string>=?", strBoolBinop (>=)), ``` These depend on helper functions that we haven\'t written yet: `numBoolBinop`, `boolBoolBinop` and `strBoolBinop`. Instead of taking a variable number of arguments and returning an integer, these both take exactly two arguments and return a boolean. They differ from each other only in the type of argument they expect, so let\'s factor the duplication into a generic `boolBinop` function that\'s parametrized by the unpacker function it applies to its arguments: ``` haskell boolBinop :: (LispVal -> ThrowsError a) -> (a -> a -> Bool) -> [LispVal] -> ThrowsError LispVal boolBinop unpacker op args = if length args /= 2 then throwError $ NumArgs 2 args else do left <- unpacker $ args !! 0 right <- unpacker $ args !! 1 return $ Bool $ left `op` right ``` Because each argument may throw a type mismatch, we have to unpack them sequentially, in a do-block (for the `Error` monad). We then apply the operation to the two arguments and wrap the result in the `Bool` constructor. Any function can be turned into an infix operator by wrapping it in backticks (`` `op` ``). Also, take a look at the type signature. `boolBinop` takes *two* functions as its first two arguments: the first is used to unpack the arguments from `LispVal`s to native Haskell types, and the second is the actual operation to perform. By parameterizing different parts of the behavior, you make the function more reusable. Now we define three functions that specialize `boolBinop` with different unpackers: ``` haskell numBoolBinop = boolBinop unpackNum strBoolBinop = boolBinop unpackStr boolBoolBinop = boolBinop unpackBool ``` We haven\'t told Haskell how to unpack strings from `LispVal`s yet. This works similarly to `unpackNum`, pattern matching against the value and either returning it or throwing an error. Again, if passed a primitive value that could be interpreted as a string (such as a number or boolean), it will silently convert it to the string representation. ``` haskell unpackStr :: LispVal -> ThrowsError String unpackStr (String s) = return s unpackStr (Number s) = return $ show s unpackStr (Bool s) = return $ show s unpackStr notString = throwError $ TypeMismatch "string" notString ``` And we use similar code to unpack booleans: ``` haskell unpackBool :: LispVal -> ThrowsError Bool unpackBool (Bool b) = return b unpackBool notBool = throwError $ TypeMismatch "boolean" notBool ``` Let\'s compile and test this to make sure it\'s working, before we proceed to the next feature: `$ ghc -package parsec -o simple_parser [../code/listing6.1.hs listing6.1.hs]`\ `$ ./simple_parser "(< 2 3)"`\ `#t`\ `$ ./simple_parser "(> 2 3)"`\ `#f`\ `$ ./simple_parser "(>= 3 3)"`\ `#t`\ `$ ./simple_parser "(string=? \"test\"  \"test\")"`\ `#t`\ `$ ./simple_parser "(string<? \"abc\" \"bba\")"`\ `#t` ## Conditionals: Pattern Matching 2 Now, we\'ll proceed to adding an if-clause to our evaluator. As with standard Scheme, our evaluator considers `#f` to be false and any other value to be true: ``` haskell eval (List [Atom "if", pred, conseq, alt]) = do result <- eval pred case result of Bool False -> eval alt otherwise -> eval conseq ``` As the function definitions are evaluated in order, be sure to place this one above `eval (List (Atom func : args)) = mapM eval args >>= apply func` or it will throw a `Unrecognized primitive function args: "if"` error. This is another example of nested pattern-matching. Here, we\'re looking for a 4-element list. The first element must be the atom `if`. The others can be any Scheme forms. We take the first element, evaluate, and if it\'s false, evaluate the alternative. Otherwise, we evaluate the consequent. Compile and run this, and you\'ll be able to play around with conditionals: `$ ghc -package parsec -o simple_parser [../code/listing6.2.hs listing6.2.hs]`\ `$ ./simple_parser "(if (> 2 3) \"no\" \"yes\")"`\ `"yes"`\ `$ ./simple_parser "(if (= 3 3) (+ 2 3 (- 5 1)) \"unequal\")"`\ `9` ## List Primitives: `car`, `cdr`, and `cons` For good measure, let\'s also add in the basic list-handling primitives. Because we\'ve chosen to represent our lists as Haskell algebraic data types instead of pairs, these are somewhat more complicated than their definitions in many Lisps. It\'s easiest to think of them in terms of their effect on printed S-expressions: 1. `(car '(a b c)) = a` 2. `(car '(a)) = a` 3. `(car '(a b . c)) = a` 4. `(car 'a) = error` -- not a list 5. `(car 'a 'b) = error` -- `car` only takes one argument We can translate these fairly straightforwardly into pattern clauses, recalling that `(x : xs)` divides a list into the first element and the rest: ``` haskell car :: [LispVal] -> ThrowsError LispVal car [List (x : xs)] = return x car [DottedList (x : xs) _] = return x car [badArg] = throwError $ TypeMismatch "pair" badArg car badArgList = throwError $ NumArgs 1 badArgList ``` Let\'s do the same with cdr: 1. `(cdr '(a b c)) = (b c)` 2. `(cdr '(a b)) = (b)` 3. `(cdr '(a)) = NIL` 4. `(cdr '(a . b)) = b` 5. `(cdr '(a b . c)) = (b . c)` 6. `(cdr 'a) = error` -- not a list 7. `(cdr 'a 'b) = error` -- too many arguments We can represent the first three cases with a single clause. Our parser represents `'()` as `List []`, and when you pattern-match `(x : xs)` against `[x]`, `xs` is bound to `[]`. The other ones translate to separate clauses: ``` haskell cdr :: [LispVal] -> ThrowsError LispVal cdr [List (x : xs)] = return $ List xs cdr [DottedList [_] x] = return x cdr [DottedList (_ : xs) x] = return $ DottedList xs x cdr [badArg] = throwError $ TypeMismatch "pair" badArg cdr badArgList = throwError $ NumArgs 1 badArgList ``` `cons` is a little tricky, enough that we should go through each clause case-by-case. If you cons together anything with `Nil`, you end up with a one-item list, the `Nil` serving as a terminator: ``` haskell cons :: [LispVal] -> ThrowsError LispVal cons [x1, List []] = return $ List [x1] ``` If you `cons` together anything and a list, it\'s like tacking that anything onto the front of the list: ``` haskell cons [x, List xs] = return $ List $ x : xs ``` However, if the list is a `DottedList`, then it should stay a `DottedList`, taking into account the improper tail: ``` haskell cons [x, DottedList xs xlast] = return $ DottedList (x : xs) xlast ``` If you `cons` together two non-lists, or put a list in front, you get a `DottedList`. This is because such a `cons` cell isn\'t terminated by the normal `Nil` that most lists are. ``` haskell cons [x1, x2] = return $ DottedList [x1] x2 ``` Finally, attempting to `cons` together more or less than two arguments is an error: ``` haskell cons badArgList = throwError $ NumArgs 2 badArgList ``` Our last step is to implement `eqv?`. Scheme offers three levels of equivalence predicates: `eq?`, `eqv?`, and `equal?`. For our purposes, `eq?` and `eqv?` are basically the same: they recognize two items as the same if they print the same, and are fairly slow. So we can write one function for both of them and register it under `eq?` and `eqv?`. ``` haskell eqv :: [LispVal] -> ThrowsError LispVal eqv [(Bool arg1), (Bool arg2)] = return $ Bool $ arg1 == arg2 eqv [(Number arg1), (Number arg2)] = return $ Bool $ arg1 == arg2 eqv [(String arg1), (String arg2)] = return $ Bool $ arg1 == arg2 eqv [(Atom arg1), (Atom arg2)] = return $ Bool $ arg1 == arg2 eqv [(DottedList xs x), (DottedList ys y)] = eqv [List $ xs ++ [x], List $ ys ++ [y]] eqv [(List arg1), (List arg2)] = return $ Bool $ (length arg1 == length arg2) && (all eqvPair $ zip arg1 arg2) where eqvPair (x1, x2) = case eqv [x1, x2] of Left err -> False Right (Bool val) -> val eqv [_, _] = return $ Bool False eqv badArgList = throwError $ NumArgs 2 badArgList ``` Most of these clauses are self-explanatory, the exception being the one for two `Lists`. This, after checking to make sure the lists are the same length, `zip`s the two lists of pairs, and then uses the function `all` to return `False` if `eqvPair` returns `False` on any of the pairs. `eqvPair` is an example of a local definition: it is defined using the `where` keyword, just like a normal function, but is available only within that particular clause of `eqv`. Since we know that `eqv` only throws an error if the number of arguments is not 2, the line `Left err -> False` will never be executed at the moment. ## `equal?` and Weak Typing: Heterogenous Lists Since we introduced weak typing above, we\'d also like to introduce an `equal?` function that ignores differences in the type tags and only tests if two values can be interpreted the same. For example, `(eqv? 2 "2") = #f`, yet we\'d like `(equal? 2 "2") = #t`. Basically, we want to try all of our unpack functions, and if any of them result in Haskell values that are equal, return `True`. The obvious way to approach this is to store the unpacking functions in a list and use `mapM` to execute them in turn. Unfortunately, this doesn\'t work, because standard Haskell only lets you put objects in a list *if they\'re the same type*. The various unpacker functions return different types, so you can\'t store them in the same list. We\'ll get around this by using a GHC extension -- Existential Types -- that lets us create a heterogenous list, subject to typeclass constraints. Extensions are fairly common in the Haskell world: they\'re basically necessary to create any reasonably large program, and they\'re often compatible between implementations (existential types work in both Hugs and GHC and are a candidate for standardization). Note you need to use a special compiler flag for this: `-fglasgow-exts` as mentioned below; the newer `-XExistentialQuantification`; or add the pragma `{-# LANGUAGE ExistentialQuantification #-}` to the beginning of your code (In general, the compiler flag `-Xfoo` can be replaced by the pragma `{-# LANGUAGE foo #-}` inside the source file). The first thing we need to do is define a data type that can hold any function from a `LispVal -> something`, provided that that `something` supports equality: ``` haskell data Unpacker = forall a. Eq a => AnyUnpacker (LispVal -> ThrowsError a) ``` This is like any normal algebraic datatype, except for the type constraint. It says, \"For any type that is an instance of `Eq`, you can define an `Unpacker` that takes a function from `LispVal` to that type, and may throw an error\". We\'ll have to wrap our functions with the `AnyUnpacker` constructor, but then we can create a list of `Unpacker`s that does just what we want it. Rather than jump straight to the `equal?` function, let\'s first define a helper function that takes an `Unpacker` and then determines if two `LispVal`s are equal when it unpacks them: ``` haskell unpackEquals :: LispVal -> LispVal -> Unpacker -> ThrowsError Bool unpackEquals arg1 arg2 (AnyUnpacker unpacker) = do unpacked1 <- unpacker arg1 unpacked2 <- unpacker arg2 return $ unpacked1 == unpacked2 `catchError` (const $ return False) ``` After pattern-matching to retrieve the actual function, we enter a do-block for the `ThrowsError` monad. This retrieves the Haskell values of the two `LispVal`s, and then tests whether they\'re equal. If there is an error anywhere within the two unpackers, it returns `False`, using the `const` function because `catchError` expects a function to apply to the error value. Finally, we can define `equal?` in terms of these helpers: ``` haskell equal :: [LispVal] -> ThrowsError LispVal equal [arg1, arg2] = do primitiveEquals <- liftM or $ mapM (unpackEquals arg1 arg2) [AnyUnpacker unpackNum, AnyUnpacker unpackStr, AnyUnpacker unpackBool] eqvEquals <- eqv [arg1, arg2] return $ Bool $ (primitiveEquals || let (Bool x) = eqvEquals in x) equal badArgList = throwError $ NumArgs 2 badArgList ``` The first action makes a heterogenous list of `[unpackNum, unpackStr, unpackBool]`, and then maps the partially applied `(unpackEquals arg1 arg2)` over it. This gives a list of booleans, so we use the Prelude function `or` to return true if any single one of them is true. The second action tests the two arguments with `eqv?`. Since we want `equal?` to be looser than `eqv?`, it should return true whenever `eqv?` does so. This also lets us avoid handling cases like the list or dotted-list (though this introduces a bug; see exercise #2 in this section). Finally, `equal?` `or`s both of these values together and wraps the result in the `Bool` constructor, returning a `LispVal`. The `let (Bool x) = eqvEquals in x` is a quick way of extracting a value from an algebraic type: it pattern matches `Bool x` against the `eqvEquals` value, and then returns `x`. The result of a let-expression is the expression following the keyword `in`. To use these functions, insert them into our primitives list: ``` haskell ("car", car), ("cdr", cdr), ("cons", cons), ("eq?", eqv), ("eqv?", eqv), ("equal?", equal)] ``` To compile this code, you need to enable GHC extensions with `-fglasgow-exts`: `$ ghc -package parsec -fglasgow-exts -o parser [../code/listing6.4.hs listing6.4.hs]`\ `$ ./parser "(cdr '(a simple test))"`\ `(simple test)`\ `$ ./parser "(car (cdr '(a simple test)))"`\ `simple`\ `$ ./parser "(car '((this is) a test))"`\ `(this is)`\ `$ ./parser "(cons '(this is) 'test)"`\ `((this is) . test)`\ `$ ./parser "(cons '(this is) '())"`\ `((this is))`\ `$ ./parser "(eqv? 1 3)"`\ `#f`\ `$ ./parser "(eqv? 3 3)"`\ `#t`\ `$ ./parser "(eqv? 'atom 'atom)"`\ `#t`
# Write Yourself a Scheme in 48 Hours/Building a REPL So far, we\'ve been content to evaluate single expressions from the command line, printing the result and exiting afterwards. This is fine for a calculator, but isn\'t what most people think of as \"programming\". We\'d like to be able to define new functions and variables, and refer to them later. But before we can do this, we need to build a system that can execute multiple statements without exiting the program. Instead of executing a whole program at once, we\'re going to build a *read-eval-print loop*. This reads in expressions from the console one at a time and executes them interactively, printing the result after each expression. Later expressions can reference variables set by earlier ones (or will be able to, after the next section), letting you build up libraries of functions. First, we need to import some additional IO functions. Add the following to the top of the program: ``` haskell import System.IO ``` Next, we define a couple of helper functions to simplify some of our IO tasks. We\'ll want a function that prints out a string and immediately flushes the stream; otherwise, output might sit in output buffers and the user will never see prompts or results. ``` haskell flushStr :: String -> IO () flushStr str = putStr str >> hFlush stdout ``` Then, we create a function that prints out a prompt and reads in a line of input: ``` haskell readPrompt :: String -> IO String readPrompt prompt = flushStr prompt >> getLine ``` Pull the code to parse and evaluate a string and trap the errors out of main into its own function: ``` haskell evalString :: String -> IO String evalString expr = return $ extractValue $ trapError (liftM show $ readExpr expr >>= eval) ``` And write a function that evaluates a string and prints the result: ``` haskell evalAndPrint :: String -> IO () evalAndPrint expr = evalString expr >>= putStrLn ``` Now it\'s time to tie it all together. We want to read input, perform a function, and print the output, all in an infinite loop. The built-in function `interact` *almost* does what we want, but doesn\'t loop. If we used the combination `sequence . repeat . interact`, we\'d get an infinite loop, but we wouldn\'t be able to break out of it. So we need to roll our own loop: ``` haskell until_ :: Monad m => (a -> Bool) -> m a -> (a -> m ()) -> m () until_ pred prompt action = do result <- prompt if pred result then return () else action result >> until_ pred prompt action ``` The underscore after the name is a typical naming convention in Haskell for monadic functions that repeat but do not return a value. `until_` takes a predicate that signals when to stop, an action to perform before the test, and a function-returning-an-action to do to the input. Each of the latter two is generalized over *any* monad, not just `IO`. That\'s why we write their types using the type variable `m`, and include the type constraint `Monad m =>`. Note also that we can write recursive actions just as we write recursive functions. Now that we have all the machinery in place, we can write our REPL easily: ``` haskell runRepl :: IO () runRepl = until_ (== "quit") (readPrompt "Lisp>>> ") evalAndPrint ``` And change our main function so it either executes a single expression, or enters the REPL and continues evaluating expressions until we type `quit`: ``` haskell main :: IO () main = do args <- getArgs case length args of 0 -> runRepl 1 -> evalAndPrint $ args !! 0 _ -> putStrLn "Program takes only 0 or 1 argument" ``` Compile and run the program, and try it out: `$ ghc -package parsec -fglasgow-exts -o lisp [../code/listing7.hs listing7.hs]`\ `$ ./lisp`\ `Lisp>>> (+ 2 3)`\ `5`\ `Lisp>>> (cons this '())`\ `Unrecognized special form: this`\ `Lisp>>> (cons 2 3)`\ `(2 . 3)`\ `Lisp>>> (cons 'this '())`\ `(this)`\ `Lisp>>> quit`\ `$`
# Write Yourself a Scheme in 48 Hours/Adding Variables and Assignment Finally, we get to the good stuff: variables. A variable lets us save the result of an expression and refer to it later. In Scheme, a variable can also be reset to new values, so that its value changes as the program executes. This presents a complication for Haskell, because the execution model is built upon functions that return values, but never change them. Nevertheless, there are several ways to simulate state in Haskell, all involving monads. The simplest is probably the state monad, which lets you hide arbitrary state within the monad and pass it around behind the scenes. You specify the state type as a parameter to the monad (e.g. if a function returns an integer but modifies a list of string pairs, it would have type `State [(String, String)] Integer`), and access it via the get and put functions, usually within a do-block. You\'d specify the initial state via the `runState myStateAction initialList`, which returns a pair containing the return value and the final state. Unfortunately, the state monad doesn\'t work well for us, because the type of data we need to store is fairly complex. For a simple top-level environment, we could get away with `[(String, LispVal)]`, storing mappings from variable names to values. However, when we start dealing with function calls, these mappings become a stack of nested environments, arbitrarily deep. And when we add closures, environments might get saved in an arbitrary Function value, and passed around throughout the program. In fact, they might be saved in a variable and passed out of the `runState` monad entirely, something we\'re not allowed to do. Instead, we use a feature called *state threads*, letting Haskell manage the aggregate state for us. This lets us treat mutable variables as we would in any other programming language, using functions to get or set variables. There are two flavors of state threads: the `ST` monad creates a stateful computation that can be executed as a unit, without the state escaping to the rest of the program. The `IORef` module lets you use stateful variables within the IO monad. Since our state has to be interleaved with IO anyway (it persists between lines in the REPL, and we will eventually have IO functions within the language itself), we\'ll be using `IORef`s. We can start out by importing `Data.IORef` and defining a type for our environments: ``` haskell import Data.IORef type Env = IORef [(String, IORef LispVal)] ``` This declares an `Env` as an `IORef` holding a list that maps `String`s to mutable `LispVal`s. We need `IORef`s for both the list itself and for individual values because there are *two* ways that the program can mutate the environment. It might use `set!` to change the value of an individual variable, a change visible to any function that shares that environment (Scheme allows nested scopes, so a variable in an outer scope is visible to all inner scopes). Or it might use `define` to add a new variable, which should be visible on all subsequent statements. Since `IORef`s can only be used within the IO monad, we\'ll want a helper action to create an empty environment. We can\'t just use the empty list `[]` because all accesses to `IORef`s must be sequenced, and so the type of our null environment is `IO Env` instead of just plain `Env`: ``` haskell nullEnv :: IO Env nullEnv = newIORef [] ``` From here, things get a bit more complicated, because we\'ll be simultaneously dealing with *two* monads. Remember, we also need an `Error` monad to handle things like unbound variables. The parts that need IO functionality and the parts that may throw exceptions are interleaved, so we can\'t just catch all the exceptions and return only normal values to the IO monad. Haskell provides a mechanism known as *monad transformers* that lets you combine the functionality of multiple monads. We\'ll be using one of these, `ExceptT`, which lets us layer error-handling functionality on top of the IO monad. Our first step is to create a type synonym for our combined monad: ``` haskell type IOThrowsError = ExceptT LispError IO ``` Like `ThrowsError`, `IOThrowsError` is really a type constructor: we\'ve left off the last argument, the return type of the function. However, `ExceptT` takes one more argument than plain old `Either`: we have to specify the type of monad that we\'re layering our error-handling functionality over. We\'ve created a monad that may contain IO actions that throw a `LispError`. We have a mix of `ThrowsError` and `IOThrowsError` functions, but actions of different types cannot be contained within the same do-block, even if they provide essentially the same functionality. Haskell already provides a mechanism, lifting, to bring values of the lower type (`IO`) into the combined monad. Unfortunately, there\'s no similar support to bring a value of the untransformed upper type into the combined monad, so we need to write it ourselves: ``` haskell liftThrows :: ThrowsError a -> IOThrowsError a liftThrows (Left err) = throwError err liftThrows (Right val) = return val ``` This destructures the `Either` type and either re-throws the error type or returns the ordinary value. Methods in typeclasses resolve based on the type of the expression, so `throwError` and `return` (members of `MonadError` and `Monad`, respectively) take on their `IOThrowsError` definitions. Incidentally, the type signature provided here is not fully general: if we\'d left it off, the compiler would have inferred `liftThrows :: (MonadError m a) => Either e a -> m a`. We\'ll also want a helper function to run the whole top-level `IOThrowsError` action, returning an IO action. We can\'t escape from the IO monad, because a function that performs IO has an effect on the outside world, and you don\'t want that in a lazily-evaluated pure function. But you can run the error computation and catch the errors. ``` haskell runIOThrows :: IOThrowsError String -> IO String runIOThrows action = runExceptT (trapError action) >>= return . extractValue ``` This uses our previously-defined `trapError` function to take any error values and convert them to their string representations, then runs the whole computation via `runExceptT`. The result is passed into `extractValue` and returned as a value in the IO monad. Now we\'re ready to return to environment handling. We\'ll start with a function to determine if a given variable is already bound in the environment, necessary for proper handling of `define`: ``` haskell isBound :: Env -> String -> IO Bool isBound envRef var = readIORef envRef >>= return . maybe False (const True) . lookup var ``` This first extracts the actual environment value from its `IORef` via `readIORef`. Then we pass it to lookup to search for the particular variable we\'re interested in. lookup returns a `Maybe` value, so we return `False` if that value was `Nothing` and `True` otherwise (we need to use the `const` function because `maybe` expects a function to perform on the result and not just a value). Finally, we use return to lift that value into the IO monad. Since we\'re just interested in a true/false value, we don\'t need to deal with the actual `IORef` that lookup returns. Next, we\'ll want to define a function to retrieve the current value of a variable: ``` haskell getVar :: Env -> String -> IOThrowsError LispVal getVar envRef var = do env <- liftIO $ readIORef envRef maybe (throwError $ UnboundVar "Getting an unbound variable" var) (liftIO . readIORef) (lookup var env) ``` Like the previous function, this begins by retrieving the actual environment from the `IORef`. However, `getVar` uses the `IOThrowsError` monad, because it also needs to do some error handling. As a result, we need to use the `liftIO` function to lift the `readIORef` action into the combined monad. Similarly, when we return the value, we use `liftIO . readIORef` to generate an `IOThrowsError` action that reads the returned `IORef`. We don\'t need to use `liftIO` to throw an error, however, because `throwError` is a defined for the `MonadError` typeclass, of which `ExceptT` is an instance. Now we create a function to set values: ``` haskell setVar :: Env -> String -> LispVal -> IOThrowsError LispVal setVar envRef var value = do env <- liftIO $ readIORef envRef maybe (throwError $ UnboundVar "Setting an unbound variable" var) (liftIO . (flip writeIORef value)) (lookup var env) return value ``` Again, we first read the environment out of its `IORef` and run a lookup on it. This time, however, we want to change the variable instead of just reading it. The `writeIORef` action provides a means for this, but takes its arguments in the wrong order (ref -\> value instead of value -\> ref). So we use the built-in function `flip` to switch the arguments of `writeIORef` around, and then pass it the value. Finally, we return the value we just set, for convenience. We\'ll want a function to handle the special behavior of `define`, which sets a variable if already bound or creates a new one if not. Since we\'ve already defined a function to set values, we can use it in the former case: ``` haskell defineVar :: Env -> String -> LispVal -> IOThrowsError LispVal defineVar envRef var value = do alreadyDefined <- liftIO $ isBound envRef var if alreadyDefined then setVar envRef var value >> return value else liftIO $ do valueRef <- newIORef value env <- readIORef envRef writeIORef envRef ((var, valueRef) : env) return value ``` It\'s the latter case that\'s interesting, where the variable is unbound. We create an IO action (via do-notation) that creates a new `IORef` to hold the new variable, reads the current value of the environment, then writes a new list back to that variable consisting of the new (key, variable) pair added to the front of the list. Then we lift that whole do-block into the `IOThrowsError` monad with `liftIO`. There\'s one more useful environment function: being able to bind a whole bunch of variables at once, as happens when a function is invoked. We might as well build that functionality now, though we won\'t be using it until the next section: ``` haskell bindVars :: Env -> [(String, LispVal)] -> IO Env bindVars envRef bindings = readIORef envRef >>= extendEnv bindings >>= newIORef where extendEnv bindings env = liftM (++ env) (mapM addBinding bindings) addBinding (var, value) = do ref <- newIORef value return (var, ref) ``` This is perhaps more complicated than the other functions, since it uses a monadic pipeline (rather than do-notation) and a pair of helper functions to do the work. It\'s best to start with the helper functions. addBinding takes a variable name and value, creates an `IORef` to hold the new variable, and then returns the name--value pair. `extendEnv` calls `addBinding` on each member of bindings (`mapM`) to create a list of `(String, IORef LispVal)` pairs, and then appends the current environment to the end of that `(++ env)`. Finally, the whole function wires these functions up in a pipeline, starting by reading the existing environment out of its `IORef`, then passing the result to `extendEnv`, then returning a new `IORef` with the extended environment. Now that we have all our environment functions, we need to start using them in the evaluator. Since Haskell has no global variables, we\'ll have to thread the environment through the evaluator as a parameter. While we\'re at it, we might as well add the `set!` and `define` special forms. ``` haskell eval :: Env -> LispVal -> IOThrowsError LispVal eval env val@(String _) = return val eval env val@(Number _) = return val eval env val@(Bool _) = return val eval env (Atom id) = getVar env id eval env (List [Atom "quote", val]) = return val eval env (List [Atom "if", pred, conseq, alt]) = do result <- eval env pred case result of Bool False -> eval env alt otherwise -> eval env conseq eval env (List [Atom "set!", Atom var, form]) = eval env form >>= setVar env var eval env (List [Atom "define", Atom var, form]) = eval env form >>= defineVar env var eval env (List (Atom func : args)) = mapM (eval env) args >>= liftThrows . apply func eval env badForm = throwError $ BadSpecialForm "Unrecognized special form" badForm ``` Since a single environment gets threaded through a whole interactive session, we need to change a few of our IO functions to take an environment. ``` haskell evalAndPrint :: Env -> String -> IO () evalAndPrint env expr = evalString env expr >>= putStrLn evalString :: Env -> String -> IO String evalString env expr = runIOThrows $ liftM show $ (liftThrows $ readExpr expr) >>= eval env ``` We need the `runIOThrows` in evalString because the type of the monad has changed from `ThrowsError` to `IOThrowsError`. Similarly, we need a `liftThrows` to bring `readExpr` into the `IOThrowsError` monad. Next, we initialize the environment with a null variable before starting the program: ``` haskell runOne :: String -> IO () runOne expr = nullEnv >>= flip evalAndPrint expr runRepl :: IO () runRepl = nullEnv >>= until_ (== "quit") (readPrompt "Lisp>>> ") . evalAndPrint ``` We\'ve created an additional helper function runOne to handle the single-expression case, since it\'s now somewhat more involved than just running `evalAndPrint`. The changes to `runRepl` are a bit more subtle: notice how we added a function composition operator before evalAndPrint. That\'s because `evalAndPrint` now takes an additional `Env` parameter, fed from `nullEnv`. The function composition tells `until_` that instead of taking plain old `evalAndPrint` as an action, it ought to apply it first to whatever\'s coming down the monadic pipeline, in this case the result of `nullEnv`. Thus, the actual function that gets applied to each line of input is `(evalAndPrint env)`, just as we want it. Finally, we need to change our main function to call `runOne` instead of evaluating `evalAndPrint` directly: ``` haskell main :: IO () main = do args <- getArgs case length args of 0 -> runRepl 1 -> runOne $ args !! 0 otherwise -> putStrLn "Program takes only 0 or 1 argument" ``` And we can compile and test our program: `$ ghc -package parsec -o lisp [../code/listing8.hs listing8.hs]`\ `$ ./lisp`\ `Lisp>>> (define x 3)`\ `3`\ `Lisp>>> (+ x 2)`\ `5`\ `Lisp>>> (+ y 2)`\ `Getting an unbound variable: y`\ `Lisp>>> (define y 5)`\ `5`\ `Lisp>>> (+ x (- y 2))`\ `6`\ `Lisp>>> (define str "A string")`\ `"A string"`\ `Lisp>>> (< str "The string")`\ `Invalid type: expected number, found "A string"`\ `Lisp>>> (string<? str "The string")`\ `#t`
# Write Yourself a Scheme in 48 Hours/Defining Scheme Functions Now that we can define variables, we might as well extend it to functions. After this section, you\'ll be able to define your own functions within Scheme and use them from other functions. Our implementation is nearly finished. Let\'s start by defining new `LispVal` constructors: ``` haskell | PrimitiveFunc ([LispVal] -> ThrowsError LispVal) | Func { params :: [String], vararg :: (Maybe String), body :: [LispVal], closure :: Env } ``` We\'ve added a separate constructor for primitives, because we\'d like to be able to store `+`, `eqv?`, etc. in variables and pass them to functions. The `PrimitiveFunc` constructor stores a function that takes a list of arguments to a `ThrowsError LispVal`, the same type that is stored in our primitive list. We also want a constructor to store user-defined functions. We store four pieces of information: 1. the names of the parameters, as they\'re bound in the function body; 2. whether the function accepts a variable-length list of arguments, and if so, the variable name it\'s bound to; 3. the function body, as a list of expressions; 4. the environment that the function was created in. This is an example of a record type. Records are somewhat clumsy in Haskell, so we\'re only using them for demonstration purposes. However, they can be invaluable in large-scale programming. Next, we\'ll want to edit our `show` function to include the new types: ``` haskell showVal (PrimitiveFunc _) = "<primitive>" showVal (Func {params = args, vararg = varargs, body = body, closure = env}) = "(lambda (" ++ unwords (map show args) ++ (case varargs of Nothing -> "" Just arg -> " . " ++ arg) ++ ") ...)" ``` Instead of showing the full function, we just print out the word `<primitive>` for primitives and the header info for user-defined functions. This is an example of pattern-matching for records: as with normal algebraic types, a pattern looks exactly like a constructor call. Field names come first and the variables they\'ll be bound to come afterwards. Next, we need to change `apply`. Instead of being passed the name of a function, it\'ll be passed a `LispVal` representing the actual function. For primitives, that makes the code simpler: we need only read the function out of the value and apply it. ``` haskell apply :: LispVal -> [LispVal] -> IOThrowsError LispVal apply (PrimitiveFunc func) args = liftThrows $ func args ``` The interesting code happens when we\'re faced with a user defined function. Records let you pattern match on both the field name (as shown above) or the field position, so we\'ll use the latter form: ``` haskell apply (Func params varargs body closure) args = if num params /= num args && varargs == Nothing then throwError $ NumArgs (num params) args else (liftIO $ bindVars closure $ zip params args) >>= bindVarArgs varargs >>= evalBody where remainingArgs = drop (length params) args num = toInteger . length evalBody env = liftM last $ mapM (eval env) body bindVarArgs arg env = case arg of Just argName -> liftIO $ bindVars env [(argName, List $ remainingArgs)] Nothing -> return env ``` The very first thing this function does is check the length of the parameter list against the expected number of arguments. It throws an error if they don\'t match. We define a local function `num` to enhance readability and make the program a bit shorter. Assuming the call is valid, we do the bulk of the call in monadic pipeline that binds the arguments to a new environment and executes the statements in the body. The first thing we do is zip the list of parameter names and the list of (already evaluated) argument values together into a list of pairs. Then, we take that and the function\'s closure (*not* the current environment -- this is what gives us lexical scoping) and use them to create a new environment to evaluate the function in. The result is of type `IO`, while the function as a whole is `IOThrowsError`, so we need to `liftIO` it into the combined monad. Now it\'s time to bind the remaining arguments to the varargs variable, using the local function `bindVarArgs`. If the function doesn\'t take `varargs` (the `Nothing` clause), then we just return the existing environment. Otherwise, we create a singleton list that has the variable name as the key and the remaining args as the value, and pass that to bindVars. We define the local variable `remainingArgs` for readability, using the built-in function `drop` to ignore all the arguments that have already been bound to variables. The final stage is to evaluate the body in this new environment. We use the local function `evalBody` for this, which maps the monadic function `eval env` over every statement in the body, and then returns the value of the last statement. Since we\'re now storing primitives as regular values in variables, we have to bind them when the program starts up: ``` haskell primitiveBindings :: IO Env primitiveBindings = nullEnv >>= (flip bindVars $ map makePrimitiveFunc primitives) where makePrimitiveFunc (var, func) = (var, PrimitiveFunc func) ``` This takes the initial null environment, makes a bunch of name/value pairs consisting of PrimitiveFunc wrappers, and then binds the new pairs into the new environment. We also want to change `runOne` and `runRepl` to `primitiveBindings` instead: ``` haskell runOne :: String -> IO () runOne expr = primitiveBindings >>= flip evalAndPrint expr runRepl :: IO () runRepl = primitiveBindings >>= until_ (== "quit") (readPrompt "Lisp>>> ") . evalAndPrint ``` Finally, we need to change the evaluator to support `lambda` and function `define`. We\'ll start by creating a few helper functions to make it a little easier to create function objects in the `IOThrowsError` monad: ``` haskell makeFunc varargs env params body = return $ Func (map showVal params) varargs body env makeNormalFunc = makeFunc Nothing makeVarArgs = makeFunc . Just . showVal ``` Here, `makeNormalFunc` and `makeVarArgs` should just be considered specializations of `makeFunc` with the first argument set appropriately for normal functions vs. variable args. This is a good example of how to use first-class functions to simplify code. Now, we can use them to add our extra eval clauses. They should be inserted after the define-variable clause and before the function-application one: ``` haskell eval env (List (Atom "define" : List (Atom var : params) : body)) = makeNormalFunc env params body >>= defineVar env var eval env (List (Atom "define" : DottedList (Atom var : params) varargs : body)) = makeVarArgs varargs env params body >>= defineVar env var eval env (List (Atom "lambda" : List params : body)) = makeNormalFunc env params body eval env (List (Atom "lambda" : DottedList params varargs : body)) = makeVarArgs varargs env params body eval env (List (Atom "lambda" : varargs@(Atom _) : body)) = makeVarArgs varargs env [] body ``` The following needs to replace the prior function-application eval clause. ``` haskell eval env (List (function : args)) = do func <- eval env function argVals <- mapM (eval env) args apply func argVals ``` As you can see, they just use pattern matching to destructure the form and then call the appropriate function helper. In define\'s case, we also feed the output into `defineVar` to bind a variable in the local environment. We also need to change the function application clause to remove the `liftThrows` function, since apply now works in the `IOThrowsError` monad. We can now compile and run our program, and use it to write real programs! `$ ghc -package parsec -fglasgow-exts -o lisp [../code/listing9.hs listing9.hs]`\ `$ ./lisp`\ `Lisp>>> (define (f x y) (+ x y))`\ `(lambda ("x" "y") ...)`\ `Lisp>>> (f 1 2)`\ `3`\ `Lisp>>> (f 1 2 3)`\ `Expected 2 args; found values 1 2 3`\ `Lisp>>> (f 1)`\ `Expected 2 args; found values 1`\ `Lisp>>> (define (factorial x) (if (= x 1) 1 (* x (factorial (- x 1)))))`\ `(lambda ("x") ...)`\ `Lisp>>> (factorial 10)`\ `3628800`\ `Lisp>>> (define (counter inc) (lambda (x) (set! inc (+ x inc)) inc))`\ `(lambda ("inc") ...)`\ `Lisp>>> (define my-count (counter 5))`\ `(lambda ("x") ...)`\ `Lisp>>> (my-count 3)`\ `8`\ `Lisp>>> (my-count 6)`\ `14`\ `Lisp>>> (my-count 5)`\ `19`
# Write Yourself a Scheme in 48 Hours/Creating IO Primitives Our Scheme can\'t really communicate with the outside world yet, so it would be nice if we could give it some I/O functions. Also, it gets really tedious typing in functions every time we start the interpreter, so it would be nice to load files of code and execute them. The first thing we\'ll need is a new constructor for `LispVal`s. `PrimitiveFunc`s have a specific type signature that doesn\'t include the IO monad, so they can\'t perform any IO. We want a dedicated constructor for primitive functions that perform IO: ``` haskell | IOFunc ([LispVal] -> IOThrowsError LispVal) ``` While we\'re at it, let\'s also define a constructor for the Scheme data type of a port. Most of our IO functions will take one of these to read from or write to: ``` haskell | Port Handle ``` A `Handle` is basically the Haskell notion of a port: it\'s an opaque data type, returned from `openFile` and similar IO actions, that you can read and write to. For completeness, we ought to provide `showVal` methods for the new data types: ``` haskell showVal (Port _) = "<IO port>" showVal (IOFunc _) = "<IO primitive>" ``` This\'ll let the REPL function properly and not crash when you use a function that returns a port. We also need to update apply, so that it can handle `IOFuncs`: ``` haskell apply (IOFunc func) args = func args ``` We\'ll need to make some minor changes to our parser to support `load`. Since Scheme files usually contain several definitions, we need to add a parser that will support several expressions, separated by whitespace. And it also needs to handle errors. We can reuse much of the existing infrastructure by factoring our basic readExpr so that it takes the actual parser as a parameter: ``` haskell readOrThrow :: Parser a -> String -> ThrowsError a readOrThrow parser input = case parse parser "lisp" input of Left err -> throwError $ Parser err Right val -> return val readExpr = readOrThrow parseExpr readExprList = readOrThrow (endBy parseExpr spaces) ``` Again, think of both `readExpr` and `readExprList` as specializations of the newly-renamed `readOrThrow`. We\'ll be using `readExpr` in our REPL to read single expressions; we\'ll be using `readExprList` from within load to read programs. Next, we\'ll want a new list of IO primitives, structured just like the existing primitive list: ``` haskell ioPrimitives :: [(String, [LispVal] -> IOThrowsError LispVal)] ioPrimitives = [("apply", applyProc), ("open-input-file", makePort ReadMode), ("open-output-file", makePort WriteMode), ("close-input-port", closePort), ("close-output-port", closePort), ("read", readProc), ("write", writeProc), ("read-contents", readContents), ("read-all", readAll)] ``` The only difference here is in the type signature. Unfortunately, we can\'t use the existing primitive list because lists cannot contain elements of different types. We also need to change the definition of `primitiveBindings` to add our new primitives: ``` haskell primitiveBindings :: IO Env primitiveBindings = nullEnv >>= (flip bindVars $ map (makeFunc IOFunc) ioPrimitives ++ map (makeFunc PrimitiveFunc) primitives) where makeFunc constructor (var, func) = (var, constructor func) ``` We\'ve generalized makeFunc to take a constructor argument, and now call it on the list of `ioPrimitives` in addition to the plain old primitives. Now we start defining the actual functions. `applyProc` is a very thin wrapper around apply, responsible for destructuring the argument list into the form apply expects: ``` haskell applyProc :: [LispVal] -> IOThrowsError LispVal applyProc [func, List args] = apply func args applyProc (func : args) = apply func args ``` `makePort` wraps the Haskell function `openFile`, converting it to the right type and wrapping its return value in the `Port` constructor. It\'s intended to be partially-applied to the `IOMode`, `ReadMode` for `open-input-file` and `WriteMode` for `open-output-file`: ``` haskell makePort :: IOMode -> [LispVal] -> IOThrowsError LispVal makePort mode [String filename] = liftM Port $ liftIO $ openFile filename mode ``` `closePort` also wraps the equivalent Haskell procedure, this time `hClose`: ``` haskell closePort :: [LispVal] -> IOThrowsError LispVal closePort [Port port] = liftIO $ hClose port >> (return $ Bool True) closePort _ = return $ Bool False ``` `readProc` (named to avoid a name conflict with the built-in read) wraps the Haskell `hGetLine` and then sends the result to `parseExpr`, to be turned into a `LispVal` suitable for Scheme: ``` haskell readProc :: [LispVal] -> IOThrowsError LispVal readProc [] = readProc [Port stdin] readProc [Port port] = (liftIO $ hGetLine port) >>= liftThrows . readExpr ``` Notice how `hGetLine port` is of type `IO String` yet `readExpr` is of type `String -> ThrowsError LispVal`, so they both need to be converted (with `liftIO` and `liftThrows`, respectively) to the `IOThrowsError` monad. Only then can they be piped together with the monadic bind operator. `writeProc` converts a `LispVal` to a string and then writes it out on the specified port: ``` haskell writeProc :: [LispVal] -> IOThrowsError LispVal writeProc [obj] = writeProc [obj, Port stdout] writeProc [obj, Port port] = liftIO $ hPrint port obj >> (return $ Bool True) ``` We don\'t have to explicitly call show on the object we\'re printing, because `hPrint` takes a value of type `Show a`. It\'s calling show for us automatically. This is why we bothered making `LispVal` an instance of `Show`; otherwise, we wouldn\'t be able to use this automatic conversion and would have to call `showVal` ourselves. Many other Haskell functions also take instances of `Show`, so if we\'d extended this with other IO primitives, it could save us significant labor. `readContents` reads the whole file into a string in memory. It\'s a thin wrapper around Haskell\'s `readFile`, again just lifting the IO action into an `IOThrowsError` action and wrapping it in a `String` constructor: ``` haskell readContents :: [LispVal] -> IOThrowsError LispVal readContents [String filename] = liftM String $ liftIO $ readFile filename ``` The helper function `load` doesn\'t do what Scheme\'s load does (we handle that later). Rather, it\'s responsible only for reading and parsing a file full of statements. It\'s used in two places: `readAll` (which returns a list of values) and `load` (which evaluates those values as Scheme expressions). ``` haskell load :: String -> IOThrowsError [LispVal] load filename = (liftIO $ readFile filename) >>= liftThrows . readExprList ``` `readAll` then just wraps that return value with the `List` constructor: ``` haskell readAll :: [LispVal] -> IOThrowsError LispVal readAll [String filename] = liftM List $ load filename ``` Implementing the actual Scheme `load` function is a little tricky, because `load` can introduce bindings into the local environment. Apply, however, doesn\'t take an environment argument, and so there\'s no way for a primitive function (or any function) to do this. We get around this by implementing `load` as a special form: ``` haskell eval env (List [Atom "load", String filename]) = load filename >>= liftM last . mapM (eval env) ``` Finally, we might as well change our `runOne` function so that instead of evaluating a single expression from the command line, it takes the name of a file to execute and runs that as a program. Additional command-line arguments will get bound into a list `args` within the Scheme program: ``` haskell runOne :: [String] -> IO () runOne args = do env <- primitiveBindings >>= flip bindVars [("args", List $ map String $ drop 1 args)] (runIOThrows $ liftM show $ eval env (List [Atom "load", String (args !! 0)])) >>= hPutStrLn stderr ``` That\'s a little involved, so let\'s go through it step-by-step. The first line takes the original primitive bindings, passes that into `bindVars`, and then adds a variable named `args` that\'s bound to a `List` containing `String` versions of all but the first argument. (The first argument is the filename to execute.) Then, it creates a Scheme form `load "`*`arg1`*`"`, just as if the user had typed it in, and evaluates it. The result is transformed to a string (remember, we have to do this before catching errors, because the error handler converts them to strings and the types must match) and then we run the whole `IOThrowsError` action. Then we print the result on `stderr`. (Traditional UNIX conventions hold that `stdout` should be used only for program output, with any error messages going to `stderr`. In this case, we\'ll also be printing the return value of the last statement in the program, which generally has no meaning to anything.) Then we change main so it uses our new `runOne` function. Since we no longer need a third clause to handle the wrong number of command-line arguments, we can simplify it to an if statement: ``` haskell main :: IO () main = do args <- getArgs if null args then runRepl else runOne $ args ```
# Write Yourself a Scheme in 48 Hours/Towards a Standard Library Our Scheme is almost complete now, but it\'s still rather hard to use. At the very least, we\'d like a library of standard list manipulation functions that we can use to perform some common computations. Rather than using a typical Scheme implementation, defining each list function in terms of a recursion on lists, we\'ll implement two primitive recursion operators (`fold` and `unfold`) and then define our whole library based on those. This style is used by the Haskell Prelude: it gives you more concise definitions, less room for error, and good practice using fold to capture iteration. We\'ll start by defining a few obvious helper functions. `not` and `null` are defined exactly as you\'d expect it, using if statements: ``` scheme (define (not x) (if x #f #t)) (define (null? obj) (if (eqv? obj '()) #t #f)) ``` We can use the varargs feature to define list, which just returns a list of its arguments: ``` scheme (define (list . objs) objs) ``` We also want an `id` function, which just returns its argument unchanged. This may seem completely useless -- if you already have a value, why do you need a function to return it? However, several of our algorithms expect a function that tells us what to do with a given value. By defining `id`, we let those higher-order functions work even if we don\'t want to do *anything* with the value. ``` scheme (define (id obj) obj) ``` Similarly, it\'d be nice to have a `flip` function, in case we want to pass in a function that takes its arguments in the wrong order: ``` scheme (define (flip func) (lambda (arg1 arg2) (func arg2 arg1))) ``` Finally, we add `curry` and `compose`, which work like their Haskell equivalents (partial application and the dot operator, respectively). ``` scheme (define (curry func arg1) (lambda (arg) (apply func (cons arg1 (list arg))))) (define (compose f g) (lambda (arg) (f (apply g arg)))) ``` We might as well define some simple library functions that appear in the Scheme standard: ``` scheme (define zero? (curry = 0)) (define positive? (curry < 0)) (define negative? (curry > 0)) (define (odd? num) (= (mod num 2) 1)) (define (even? num) (= (mod num 2) 0)) ``` These are basically done just as you\'d expect them. Note the usage of curry to define `zero?`, `positive?` and `negative?`. We bind the variable `zero?` to the function returned by curry, giving us a unary function that returns true if its argument is equal to zero. Next, we want to define a fold function that captures the basic pattern of recursion over a list. The best way to think about fold is to picture a list in terms of its infix constructors: `[1, 2, 3, 4] = 1:2:3:4:[]` in Haskell or `(1 . (2 . (3 . (4 . NIL))))` in Scheme. A fold function replaces every constructor with a binary operation, and replaces `NIL` with the accumulator. So, for example, `(fold + 0 '(1 2 3 4)) = (1 + (2 + (3 + (4 + 0))))`. With that definition, we can write our fold function. Start with a right-associative version to mimic the above examples: ``` scheme (define (foldr func end lst) (if (null? lst) end (func (car lst) (foldr func end (cdr lst))))) ``` The structure of this function mimics our definition almost exactly. If the list is null, replace it with the end value. If not, apply the function to the car of the list and to the result of folding this function and end value down the rest of the list. Since the right-hand operand is folded up first, you end up with a right-associative fold. We also want a left-associative version. For most associative operations like `+` and `*,` the two of them are completely equivalent. However, there is at least one important binary operation that is *not* associative: cons. For all our list manipulation functions, then, we\'ll need to deliberately choose between left- and right-associative folds. ``` scheme (define (foldl func accum lst) (if (null? lst) accum (foldl func (func accum (car lst)) (cdr lst)))) ``` This begins the same way as the right-associative version, with the test for null that returns the accumulator. This time, however, we apply the function to the accumulator and first element of the list, instead of applying it to the first element and the result of folding the list. This means that we process the beginning first, giving us left-associativity. Once we reach the end of the list, `'()`, we then return the result that we\'ve been progressively building up. Note that func takes its arguments in the opposite order from `foldr`. In `foldr`, the accumulator represents the *rightmost* value to tack onto the end of the list, after you\'ve finished recursing down it. In `foldl`, it represents the completed calculation for the *leftmost* part of the list. In order to preserve our intuitions about commutativity of operators, it should therefore be the left argument of our operation in `foldl`, but the right argument in `foldr`. Once we\'ve got our basic folds, we can define a couple of convenience names to match typical Scheme usage: ``` scheme (define fold foldl) (define reduce foldr) ``` These are just new variables bound to the existing functions: they don\'t define new functions. Most Schemes call `fold` \"`reduce`\" or plain old \"`fold`\", and don\'t make the distinction between `foldl` and `foldr`. We define it to be `foldl`, which happens to be tail-recursive and hence runs more efficiently than `foldr` (it doesn\'t have to recurse all the way down to the end of the list before it starts building up the computation). Not all operations are associative, however; we\'ll see some cases later where we *have* to use `foldr` to get the right result. Next, we want to define a function that is the opposite of `fold`. Given a unary function, an initial value, and a unary predicate, it continues applying the function to the last value until the predicate is true, building up a list as it goes along. ``` scheme (define (unfold func init pred) (if (pred init) (cons init '()) (cons init (unfold func (func init) pred)))) ``` As usual, our function structure basically matches the definition. If the predicate is true, then we cons a `'()` onto the last value, terminating the list. Otherwise, cons the result of unfolding the next value `(func init)` onto the current value. In academic functional programming literature, folds are often called *catamorphisms*, unfolds are often called *anamorphisms*, and the combinations of the two are often called *hylomorphisms*. They\'re interesting because *any for-each loop can be represented as a catamorphism*. To convert from a loop to a foldl, package up all mutable variables in the loop into a data structure (records work well for this, but you can also use an algebraic data type or a list). The initial state becomes the accumulator; the loop body becomes a function with the loop variables as its first argument and the iteration variable as its second; and the list becomes, well, the list. The result of the fold function is the new state of all the mutable variables. Similarly, *every for-loop (without early exits) can be represented as a hylomorphism*. The initialization, termination, and step conditions of a for-loop define an anamorphism that builds up a list of values for the iteration variable to take. Then, you can treat that as a for-each loop and use a catamorphism to break it down into whatever state you wish to modify. Let\'s go through a couple examples. We\'ll start with typical `sum`, `product`, `and` & `or` functions: ``` scheme (define (sum . lst) (fold + 0 lst)) (define (product . lst) (fold * 1 lst)) (define (and . lst) (fold && #t lst)) (define (or . lst) (fold || #f lst)) ``` These all follow from the definitions: - `(sum 1 2 3 4) = 1 + 2 + 3 + 4 + 0 = (fold + 0 '(1 . (2 . (3 . (4 . NIL)))))` - `(product 1 2 3 4) = 1 * 2 * 3 * 4 * 1 = (fold * 1 '(1 . (2 . (3 . (4 . NIL)))))` - `(and #t #t #f) = #t && #t && #f && #t = (fold && #t '(#t . (#t . (#f . NIL))))` - `(or #t #t #f) = #t || #t || #f || #f = (fold || #f '(#t . (#t . (#f . NIL))))` Since all of these operators are associative, it doesn\'t matter whether we use `foldr` or `foldl`. We replace the cons constructor with the operator, and the nil constructor with the identity element for that operator. Next, let\'s try some more complicated operators. `max` and `min` find the maximum and minimum of their arguments, respectively: ``` scheme (define (max first . rest) (fold (lambda (old new) (if (> old new) old new)) first rest)) (define (min first . rest) (fold (lambda (old new) (if (< old new) old new)) first rest)) ``` It\'s not immediately obvious what operation to fold over the list, because none of the built-ins quite qualify. Instead, think back to fold as a representation of a foreach loop. The accumulator represents any state we\'ve maintained over previous iterations of the loop, so we\'ll want it to be the maximum value we\'ve found so far. That gives us our initialization value: we want to start off with the leftmost variable in the list (since we\'re doing a `foldl`). Now recall that the result of the operation becomes the new accumulator at each step, and we\'ve got our function. If the previous value is greater, keep it. If the new value is greater, or they\'re equal, return the new value. Reverse the operation for `min`. How about `length`? We know that we can find the length of a list by counting down it, but how do we translate that into a fold? ``` scheme (define (length lst) (fold (lambda (x y) (+ x 1)) 0 lst)) ``` Again, think in terms of its definition as a loop. The accumulator starts off at 0 and gets incremented by 1 with each iteration. That gives us both our initialization value, 0, and our function, `(lambda (x y) (+ x 1))`. Another way to look at this is \"The length of a list is 1 + the length of the sublist to its left\". Let\'s try something a bit trickier: `reverse`. ``` scheme (define (reverse lst) (fold (flip cons) '() lst)) ``` The function here is fairly obvious: if you want to reverse two `cons` cells, you can just `flip cons` so it takes its arguments in the opposite order. However, there\'s a bit of subtlety at work. Ordinary lists are *right* associative: `(1 2 3 4) = (1 . (2 . (3 . (4 . NIL))))`. If you want to reverse this, you need your fold to be *left* associative: `(reverse '(1 2 3 4)) = (4 . (3 . (2 . (1 . NIL))))`. Try it with a `foldr` instead of a foldl and see what you get. There\'s a whole family of `member` and `assoc` functions, all of which can be represented with folds. The particular lambda expression is fairly complicated though, so let\'s factor it out: ``` scheme (define (mem-helper pred op) (lambda (acc next) (if (and (not acc) (pred (op next))) next acc))) (define (memq obj lst) (fold (mem-helper (curry eq? obj) id) #f lst)) (define (memv obj lst) (fold (mem-helper (curry eqv? obj) id) #f lst)) (define (member obj lst) (fold (mem-helper (curry equal? obj) id) #f lst)) (define (assq obj alist) (fold (mem-helper (curry eq? obj) car) #f alist)) (define (assv obj alist) (fold (mem-helper (curry eqv? obj) car) #f alist)) (define (assoc obj alist) (fold (mem-helper (curry equal? obj) car) #f alist)) ``` The helper function is parameterized by the predicate to use and the operation to apply to the result if found. Its accumulator represents the first value found so far: it starts out with `#f` and takes on the first value that satisfies its predicate. We avoid finding subsequent values by testing for a non-`#f` value and returning the existing accumulator if it\'s already set. We also provide an operation that will be applied to the next value each time the predicate tests: this lets us customize `mem-helper` to check the value itself (for `member`) or only the key of the value (for `assoc`). The rest of the functions are just various combinations of `eq?`, `eqv?`, `equal?` and `id`, `car`, folded over the list with an initial value of `#f`. Next, let\'s define the functions `map` and `filter`. `map` applies a function to every element of a list, returning a new list with the transformed values: ``` scheme (define (map func lst) (foldr (lambda (x y) (cons (func x) y)) '() lst)) ``` Remember that `foldr`\'s function takes its arguments in the opposite order as `fold`, with the current value on the left. Map\'s lambda applies the function to the current value, then conses it with the rest of the mapped list, represented by the right-hand argument. It\'s essentially replacing every infix cons constructor with one that conses, but also applies the function to its left-side argument. `filter` keeps only the elements of a list that satisfy a predicate, dropping all others: ``` scheme (define (filter pred lst) (foldr (lambda (x y) (if (pred x) (cons x y) y)) '() lst)) ``` This works by testing the current value against the predicate. If it\'s true, replacing cons with `cons`, i.e., don\'t do anything. If it\'s false, drop the `cons` and just return the rest of the list. This eliminates all the elements that don\'t satisfy the predicate, consing up a new list that includes only the ones that do. We can use the standard library by starting up our Lisp interpreter and typing `(load "stdlib.scm")`: `$ ./lisp`\ `Lisp>>> (load "stdlib.scm")`\ `(lambda ("pred" . lst) ...)`\ `Lisp>>> (map (curry + 2) '(1 2 3 4))`\ `(3 4 5 6)`\ `Lisp>>> (filter even? '(1 2 3 4))`\ `(2 4)`\ `Lisp>>> quit` There are many other useful functions that could go into the standard library, including `list-tail`, `list-ref`, append, and various string-manipulation functions. Try implementing them as folds. Remember, the key to successful fold programming is thinking only in terms of what happens on each iteration. Fold captures the pattern of recursion down a list, and recursive problems are best solved by working one step at a time.
# Write Yourself a Scheme in 48 Hours/Conclusion You now have a working Scheme interpreter that implements a large chunk of the standard, including functions, lambdas, lexical scoping, symbols, strings, integers, list manipulation, and assignment. You can use it interactively, with a REPL, or in batch mode, running script files. You can write libraries of Scheme functions and either include them in programs or load them into the interactive interpreter. With a little text processing via awk or sed, you can format the output of UNIX commands as parenthesized Lisp lists, read them into a Scheme program, and use this interpreter for shell scripting. There are still a number of features you could add to this interpreter. Hygienic macros let you perform transformations on the source code before it\'s executed. They\'re a very convenient feature for adding new language features, and several standard parts of Scheme (such as let-bindings and additional control flow features) are defined in terms of them. Section 4.3 of R5RS defines the macro system\'s syntax and semantics, and there is a whole collection of papers on implementation. Basically, you\'d want to intersperse a function between readExpr and eval that takes a form and a macro environment, looks for transformer keywords, and then transforms them according to the rules of the pattern language, rewriting variables as necessarily. Continuations are a way of capturing \"the rest of the computation\", saving it, and perhaps executing it more than once. Using them, you can implement just about every control flow feature in every major programming language. The easiest way to implement continuations is to transform the program into continuation-passing style, so that eval takes an additional continuation argument and calls it, instead of returning a result. This parameter gets threaded through all recursive calls to eval, but is only manipulated when evaluating a call to call-with-current-continuation. Dynamic-wind could be implemented by keeping a stack of functions to execute when leaving the current continuation and storing (inside the continuation data type) a stack of functions to execute when resuming the continuation. If you\'re just interested in learning more Haskell, there are a large number of libraries that may help: - For webapps: WASH, a monadic web framework - For databases: haskelldb, a library that wraps SQL as a set of Haskell functions, giving you all the type-safety of the language when querying the database - For GUI programming: Fudgets and wxHaskell. wxHaskell is more of a conventional MVC GUI library, while Fudgets includes a lot of new research about how to represent GUIs in functional programming languages - For concurrency: Software Transactional Memory, described in the paper Composable Memory Transactions - For networking: GHC\'s Networking libraries This should give you a starting point for further investigations into the language. Happy hacking! ## Acknowledgements Thanks to Ketil Malde, Pete Kazmier, and Brock for sending in questions and suggestions about this tutorial. Additional comments, clarifications, and corrections should go on the discussion page of this tutorial.
# Write Yourself a Scheme in 48 Hours/Answers | author = | section = Answers | previous = [[../Conclusion|Conclusion]] | next = | notes = }} ``` \_\_TOC\_\_ # Chapter 1 ### Exercise 1 `main :: IO ()`\ `main = do args <- getArgs`\ `          putStrLn ("Hello, " ++ args!!0 ++ " " ++ args!!1)` ### Exercise 2 `main :: IO ()`\ `main = do args <- getArgs`\ `          print ((read $ args!!0) + (read $ args!!1))` The `$` operator reduces the number of parentheses needed here. Alternatively you could write the function applications as `read (args!!0)`. ### Exercise 3 `main :: IO ()`\ `main = do putStrLn "What do they call thee at home?"`\ `          name <- getLine`\ `          putStrLn ("Ey up " ++ name)` # Chapter 2 ## Section 3 - Parsing ### Exercise 1 #### Part 1 `parseNumber :: Parser LispVal`\ `parseNumber = do x <- many1 digit`\ `                (return . Number . read) x` #### Part 2 In order to answer this question, you need to do a bit of detective work! It is helpful to read up on do notation. Using the information there, we can mechanically transform the above answer into the following. `parseNumber = many1 digit >>= \x -> (return . Number . read) x` This can be cleaned up into the following: `parseNumber = many1 digit >>= return . Number . read` ### Exercise 2 We need to create a new parser action that accepts a backslash followed by either another backslash or a doublequote. This action needs to return only the second character. `escapedChars :: Parser Char`\ `escapedChars = do char '\\' -- a backslash`\ `                  x <- oneOf "\\\"" -- either backslash or doublequote`\ `                  return x -- return the escaped character` Once that is done, we need to make some changes to parseString. `parseString :: Parser LispVal`\ `parseString = do char '"'`\ `                 x <- many $ escapedChars <|> noneOf "\"\\"`\ `                 char '"'`\ `                 return $ String x` ### Exercise 3 `escapedChars :: Parser Char`\ `escapedChars = do char '\\' `\ `                  x <- oneOf "\\\"nrt" `\ `                  return $ case x of `\ `                    '\\' -> x`\ `                    '"'  -> x`\ `                    'n'  -> '\n'`\ `                    'r'  -> '\r'`\ `                    't'  -> '\t'` ### Exercise 4 First, it is necessary to change the definition of symbol. `symbol :: Parser Char`\ `symbol = oneOf "!$%&|*+-/:<=>?@^_~"` This means that it is no longer possible to begin an atom with the hash character. This necessitates a different way of parsing #t and #f. `parseBool :: Parser LispVal`\ `parseBool = do`\ `    char '#'`\ `    (char 't' >> return (Bool True)) <|> (char 'f' >> return (Bool False))` This in turn requires us to make changes to parseExpr. `parseExpr :: Parser LispVal`\ `parseExpr = parseAtom`\ `        <|> parseString`\ `        <|> parseNumber`\ `        <|> parseBool` parseNumber need to be changed to the following. `parseNumber :: Parser LispVal`\ `parseNumber = parseDecimal1 <|> parseDecimal2 <|> parseHex <|> parseOct <|> parseBin` And the following new functions need to be added. `parseDecimal1 :: Parser LispVal`\ `parseDecimal1 = many1 digit >>= (return . Number . read)` `parseDecimal2 :: Parser LispVal`\ `parseDecimal2 = do try $ string "#d"`\ `                   x <- many1 digit`\ `                   (return . Number . read) x` `parseHex :: Parser LispVal`\ `parseHex = do try $ string "#x"`\ `              x <- many1 hexDigit`\ `              return $ Number (hex2dig x)` `parseOct :: Parser LispVal`\ `parseOct = do try $ string "#o"`\ `              x <- many1 octDigit`\ `              return $ Number (oct2dig x)` `parseBin :: Parser LispVal`\ `parseBin = do try $ string "#b"`\ `              x <- many1 (oneOf "10")`\ `              return $ Number (bin2dig x)` `oct2dig x = fst $ readOct x !! 0`\ `hex2dig x = fst $ readHex x !! 0`\ `bin2dig  = bin2dig' 0`\ `bin2dig' digint "" = digint`\ `bin2dig' digint (x:xs) = let old = 2 * digint + (if x == '0' then 0 else 1) in`\ `                         bin2dig' old xs` Import the *Numeric* module to use the readOct and readHex functions. ### Exercise 5 `data LispVal = Atom String`\ `             | List [LispVal]`\ `             | DottedList [LispVal] LispVal`\ `             | Number Integer`\ `             | String String`\ `             | Bool Bool`\ `             | Character Char` `parseCharacter :: Parser LispVal`\ `parseCharacter = do`\ ` try $ string "#\\"`\ ` value <- try (string "newline" <|> string "space") `\ `         <|> do { x <- anyChar; notFollowedBy alphaNum ; return [x] }`\ `  return $ Character $ case value of`\ `    "space" -> ' '`\ `    "newline" -> '\n'`\ `    otherwise -> (value !! 0)` The combination of anyChar and notFollowedBy ensure that only a single character is read. Note that this does not actually conform to the standard; as it stands, \"space\" and \"newline\" must be entirely lowercase; the standard states that they should be case insensitive. `parseExpr :: Parser LispVal`\ `parseExpr = parseAtom`\ `        <|> parseString`\ `        <|> try parseNumber -- we need the 'try' because `\ `        <|> try parseBool -- these can all start with the hash char`\ `        <|> try parseCharacter` ### Exercise 6 A possible solution for floating point numbers: ` parseFloat :: Parser LispVal`\ ` parseFloat = do x <- many1 digit`\ `                 char '.'`\ `                 y <- many1 digit`\ `                 return $ Float (fst.head$readFloat (x++"."++y))` Furthermore, add ` try parseFloat` *before* parseNumber in parseExpr and the line ` | Float Double` to the LispVal type. ### Exercise 7 **Ratio**, using Haskell\'s Rational type: ` parseRatio :: Parser LispVal`\ ` parseRatio = do x <- many1 digit`\ `                 char '/'`\ `                 y <- many1 digit`\ `                 return $ Ratio ((read x) % (read y))` Additionally, import the *Data.Ratio* module, add ` try parseRatio` *before* parseNumber in parseExpr and the line ` | Ratio Rational` to the LispVal type. **Real** is already implemented in the Float type from Exercise 6, unless I\'m mistaken. **Complex** using Haskell\'s Complex type: ` toDouble :: LispVal -> Double`\ ` toDouble(Float f) = realToFrac f`\ ` toDouble(Number n) = fromIntegral n` ` parseComplex :: Parser LispVal`\ ` parseComplex = do x <- (try parseFloat <|> parseDecimal)`\ `                   char '+' `\ `                   y <- (try parseFloat <|> parseDecimal)`\ `                   char 'i' `\ `                   return $ Complex (toDouble x :+ toDouble y)` As before, import the *Data.Complex* module, add ` try parseComplex` *before* parseNumber and parseFloat in parseExpr and the line `  | Complex (Complex Double)` to the LispVal type. ## Section 4 - Recursive Parsers: Adding lists, dotted lists, and quoted datums ### Exercise 1 These two are analogous to parseQuoted: ` parseQuasiQuoted :: Parser LispVal`\ ` parseQuasiQuoted = do`\ ``      char '`' ``\ `     x <- parseExpr`\ `     return $ List [Atom "quasiquote", x]` ` parseUnQuote :: Parser LispVal`\ ` parseUnQuote = do`\ `     char ','`\ `     x <- parseExpr`\ `     return $ List [Atom "unquote", x]` ` parseUnQuoteSplicing :: Parser LispVal`\ ` parseUnQuoteSplicing = do`\ `     char ','`\ `     char '@'`\ `     x <- parseExpr`\ `     return $ List [Atom "unquote-splicing", x]` Also add `       <|> parseQuasiQuoted`\ `       <|> parseUnQuote`\ `       <|> parseUnQuoteSplicing` to parseExpr. ### Exercise 2 I chose to go with Arrays as described in Data.Array and used list-array conversions for array construction. ` parseVector :: Parser LispVal`\ ` parseVector = do arrayValues <- sepBy parseExpr spaces`\ `                  return $ Vector (listArray (0,(length arrayValues - 1)) arrayValues)` In order to use this, import *Data.Array* and add the following to the LispVal type: `            | Vector (Array Int LispVal)` Add the following lines to parseExpr; *before* the parser for Lists and DottedLists. `       <|> try (do string "#("`\ `                   x <- parseVector`\ `                   char ')'`\ `                   return x)` ### Exercise 3 This took a fair amount of fiddling with `sepBy`, `endBy` and friends. I started by getting the `(. degenerate)` dotted list to work and then went from there. This code tolerates trailing and leading spaces. `parseAnyList :: Parser LispVal`\ `parseAnyList = do`\ `  P.char '('`\ `  optionalSpaces`\ `  head <- P.sepEndBy parseExpr spaces`\ `  tail <- (P.char '.' >> spaces >> parseExpr) <|> return (Nil ())`\ `  optionalSpaces`\ `  P.char ')'`\ `  return $ case tail of`\ `    (Nil ()) -> List head`\ `    otherwise -> DottedList head tail` Another implementation using more advanced functions from the Parsec library. `spaces` is the one from this tutorial. `parseList :: Parser LispVal`\ `parseList = between beg end parseList1`\ `           where beg = (char '(' >> skipMany space)`\ `                 end = (skipMany space >> char ')')` `parseList1 :: Parser LispVal`\ `parseList1 = do list <- sepEndBy parseExpr spaces`\ `               maybeDatum <- optionMaybe (char '.' >> spaces >> parseExpr)`\ `               return $ case maybeDatum of`\ `                  Nothing -> List list`\ `                  Just datum  -> DottedList list datum` Alternative solution. `spaces` is the spaces from Parsec and `spaces1` is the spaces from this tutorial. `parseList :: Parser LispVal`\ `parseList = do char '(' >> spaces`\ ``                head <- parseExpr `sepEndBy` spaces1 ``\ `               do char '.' >> spaces1`\ `                  tail <- parseExpr`\ `                  spaces >> char ')'`\ `                  return $ DottedList head tail`\ `                <|> (spaces >> char ')' >> (return $ List head))` # Chapter 3 ### Exercise 1 Here is one way of adding a few of them. `primitives :: [(String , [LispVal] -> LispVal)]`\ `primitives = [("+" , numericBinop (+)) ,`\ `              ("-" , numericBinop (-)) ,`\ `              ("*" , numericBinop (*)) ,`\ `              ("/" , numericBinop div) ,`\ `              ("mod" , numericBinop mod) ,`\ `              ("quotient" , numericBinop quot) ,`\ `              ("remainder" , numericBinop rem) ,`\ `              ("symbol?" , unaryOp symbolp) ,`\ `              ("string?" , unaryOp stringp) ,`\ `              ("number?" , unaryOp numberp) ,`\ `              ("bool?", unaryOp boolp) ,`\ `              ("list?" , unaryOp listp)]` `unaryOp :: (LispVal -> LispVal) -> [LispVal] -> LispVal`\ `unaryOp f [v] = f v` `symbolp, numberp, stringp, boolp, listp :: LispVal -> LispVal`\ `symbolp (Atom _)   = Bool True`\ `symbolp _          = Bool False`\ `numberp (Number _) = Bool True`\ `numberp _          = Bool False`\ `stringp (String _) = Bool True`\ `stringp _          = Bool False`\ `boolp   (Bool _)   = Bool True`\ `boolp   _          = Bool False`\ `listp   (List _)   = Bool True`\ `listp   (DottedList _ _) = Bool False`\ `listp   _          = Bool False` ### Exercise 2 `unpackNum :: LispVal -> Integer`\ `unpackNum (Number n) = n`\ `unpackNum _          = 0` ### Exercise 3 Add symbol-\>string and string-\>symbol to the list of primitives, then: `symbol2string, string2symbol :: LispVal -> LispVal`\ `symbol2string (Atom s)   = String s`\ `symbol2string _          = String ""`\ `string2symbol (String s) = Atom s`\ `string2symbol _          = Atom ""` This doesn\'t deal well with bad input, which is covered later. # Chapter 5 ### Exercise 1 `eval env (List [Atom "if", pred, conseq, alt]) = do `\ `   result <- eval env pred`\ `   case result of`\ `     Bool False -> eval env alt`\ `     Bool True  -> eval env conseq`\ `     _          -> throwError $ TypeMismatch "bool" pred` ### Exercise 2 Define a helper function that takes the equal/eqv function as an argument: ` eqvList :: ([LispVal] -> ThrowsError LispVal) -> [LispVal] -> ThrowsError LispVal`\ ` eqvList eqvFunc [(List arg1), (List arg2)] = return $ Bool $ (length arg1 == length arg2) && `\ `                                                     (all eqvPair $ zip arg1 arg2)`\ `       where eqvPair (x1, x2) = case eqvFunc [x1, x2] of`\ `                                     Left err -> False`\ `                                     Right (Bool val) -> val` Now adjust the eqv clause: ` eqv listPair@[List _, List _] = eqvList eqv listPair` And add clauses for List and DottedList to the equal function: ` equal :: [LispVal] -> ThrowsError LispVal`\ ` equal listPair@[List _, List _] = eqvList equal listPair`\ ` equal [(DottedList xs x), (DottedList ys y)] = equal [List $ xs ++ [x], List $ ys ++ [y]]`\ ` equal [arg1, arg2] = do`\ `     primitiveEquals <- liftM or $ mapM (unpackEquals arg1 arg2)`\ `                        [AnyUnpacker unpackNum, AnyUnpacker unpackStr, AnyUnpacker unpackBool]`\ `     eqvEquals <- eqv [arg1, arg2]`\ `     return $ Bool $ (primitiveEquals || let (Bool x) = eqvEquals in x)`\ ` equal badArgList = throwError $ NumArgs 2 badArgList` ### Exercise 3 #### cond Room for improvement here! `eval (List ((Atom "cond"):cs))              = do `\ `  b <- (liftM (take 1 . dropWhile f) $ mapM condClause cs) >>= cdr   `\ `  car [b] >>= eval `\ `    where condClause (List [p,b]) = do q <- eval p`\ `                                       case q of`\ `                                         Bool _ -> return $ List [q,b]`\ `                                         _      -> throwError $ TypeMismatch "bool" q `\ `          condClause v            = throwError $ TypeMismatch "(pred body)" v `\ `          f                       = \(List [p,b]) -> case p of `\ `                                                       (Bool False) -> True`\ `                                                       _            -> False` Another approach: `eval env (List (Atom "cond" : expr : rest)) = do`\ `    eval' expr rest`\ `    where eval' (List [cond, value]) (x : xs) = do`\ `              result <- eval env cond`\ `              case result of`\ `                   Bool False -> eval' x xs`\ `                   Bool True  -> eval env value`\ `                   otherwise  -> throwError $ TypeMismatch "boolean" cond`\ `          eval' (List [Atom "else", value]) [] = do`\ `               eval env value`\ `          eval' (List [cond, value]) [] = do`\ `              result <- eval env cond`\ `              case result of`\ `                   Bool True  -> eval env value`\ `                   otherwise  -> throwError $ TypeMismatch "boolean" cond` Yet another approach, piggy-backing off of the already-implemented if: `eval form@(List (Atom "cond" : clauses)) =`\ `  if null clauses`\ `  then throwError $ BadSpecialForm "no true clause in cond expression: " form`\ `  else case head clauses of`\ `    List [Atom "else", expr] -> eval expr`\ `    List [test, expr]        -> eval $ List [Atom "if",`\ `                                             test,`\ `                                             expr,`\ `                                             List (Atom "cond" : tail clauses)]`\ `    _ -> throwError $ BadSpecialForm "ill-formed cond expression: " form` Yet another approach ` eval (List ((Atom "cond") : alts)) = cond alts` ` cond :: [LispVal] -> ThrowsError LispVal`\ ` cond ((List (Atom "else" : value : [])) : []) = eval value`\ ` cond ((List (condition : value : [])) : alts) = do`\ `     result <- eval condition`\ `     boolResult :: Bool <- unpackBool result`\ `     if boolResult then eval value`\ `                   else cond alts`\ ` cond ((List a) : _) = throwError $ NumArgs 2 a`\ ` cond (a : _) = throwError $ NumArgs 2 [a]`\ ` cond _ = throwError $ Default "Not viable alternative in cond"` #### case This solution requires LispVal to have a deriving (Eq) clause, in order to use the \`elem\` function. `eval form@(List (Atom "case" : key : clauses)) =`\ `  if null clauses`\ `  then throwError $ BadSpecialForm "no true clause in case expression: " form`\ `  else case head clauses of`\ `    List (Atom "else" : exprs) -> mapM eval exprs >>= return . last`\ `    List ((List datums) : exprs) -> do`\ `      result <- eval key`\ `      equality <- mapM (\x -> eqv [result, x]) datums`\ ``       if Boolean True `elem` equality ``\ `        then mapM eval exprs >>= return . last`\ `        else eval $ List (Atom "case" : key : tail clauses)`\ `    _                     -> throwError $ BadSpecialForm "ill-formed case expression: " form` ### Exercise 4 Let\'s add string-length and string-ref: `   primitives = [...`\ `                 ("string-length", stringLen),                                     │`\ `                 ("string-ref", stringRef),`\ `                 ...]` `   stringLen :: [LispVal] -> ThrowsError LispVal`\ `   stringLen [(String s)] = Right $ Number $ fromIntegral $ length s`\ `   stringLen [notString]  = throwError $ TypeMismatch "string" notString`\ `   stringLen badArgList   = throwError $ NumArgs 1 badArgList` `   stringRef :: [LispVal] -> ThrowsError LispVal`\ `   stringRef [(String s), (Number k)]`\ `       | length s < k' + 1 = throwError $ Default "Out of bound error"`\ `       | otherwise         = Right $ String $ [s !! k']`\ `       where k' = fromIntegral k`\ `   stringRef [(String s), notNum] = throwError $ TypeMismatch "number" notNum`\ `   stringRef [notString, _]       = throwError $ TypeMismatch "string" notString`\ `   stringRef badArgList           = throwError $ NumArgs 2 badArgList`
# Lucid Dreaming/Introduction \ ## Disclaimer When attempting some of the techniques in this book, you may have some frightening experiences, such as falling sensations or sleep paralysis. Although the authors attest these are not dangerous, you should avoid techniques that create these sensations if you would prefer not to experience them. Your own expectations will have a significant effect on your dreams. If you believe that dream characters act dull and lifelessly, they are far more likely to do so. If you believe they can be creative, original, and surprising, they are far more likely to be. Remember that the easier you think it is to dream lucidly, the easier it will be. Many of the techniques and "facts" presented on these pages are not backed up by scientific research. This is not to say that these techniques do not work, only that they may be placebos or be ineffective much of the time. ## About dreaming ```{=html} <div style="float: right; margin: 0 0 1em 1em; font-style: oblique; font-size: smaller;"> ``` !Stages of sleep\ The stages of sleep ```{=html} </div> ``` Each night, we spend about one and a half to two hours dreaming. We dream about once every 90 minutes of sleep. The time you spend in dreams becomes longer throughout the night, from about 10 minutes to around 45 minutes or slightly longer. But what happens when we sleep? There are five stages of sleep: four stages of NREM (Non-REM) sleep, also called SWS (Slow-Wave Sleep), and one stage of REM (Rapid Eye Movement) sleep. The most vivid and remembered dreams occur during REM sleep. Research has shown that a person being woken from REM sleep will account having just been in a dream roughly 80% of the time, while this percentage is 15% during non-REM sleep.[^1] One sleep cycle is roughly 90 minutes long. - *(NREM 1)* The first stage is a transition state between wakefulness and sleep. This is the stage in which hypnagogic imagery occurs. It usually passes into stage 2 within a few minutes. - *(NREM 2)* During stage 2, the body gradually shuts down, and brain waves become longer in wavelength. - *(NREM 3)* Stage 3 usually occurs 30 to 45 minutes after falling asleep the first time. Large, slow delta brain waves are generated. - *(NREM 4)* Stage 4 is often called "deep sleep" or "delta sleep". The heart beats the slowest and there is the least brain activity. It is during this stage that sleepwalking usually occurs. - After stage 4, the NREM stages reverse and move back to stage 2, and then into REM sleep. - *(REM)* During REM sleep, some parts of the brain are nearly as active as while awake. In this stage, your eyes flicker rapidly (hence the acronym Rapid Eye Movement). Your body is paralyzed, preventing the body from acting out dreams.[^2] After the REM state, you sometimes wake briefly. This is usually forgotten by the time you wake up in the morning. If you don\'t wake up, you go to stage 2. **I never dream anyway.** Actually, everyone has dreams --- but some people simply don't remember them. In the next chapter, you will find out how to improve your dream recall. **Why do we dream? What do dreams mean?** These questions are outside the scope of this book, but you can find several hypotheses in the Wikipedia article on dream interpretation. ## About lucid dreaming Lucid dreaming is simply being aware that you are dreaming. With enough experience, you can increase control over your dreams --- anything from flying to creating people and places, and even changing into animals. Having a lucid dream is like being the director of your own movie! A passage from the fantasy novel *Harry Potter and the Deathly Hallows* (chapter at King\'s Cross) that may explain what this looks like: > For the first time, he wished he were clothed. Barely had the wish > formed in his head than robes appeared a short distance away. Lucid dreams have been scientifically proven to exist. Stephen LaBerge of The Lucidity Institute used a special machine to track eye movements during a dream (these are linked to your eye movements within the dream). He asked lucid dreamers to point their eyes left and right in quick succession once they became \"conscious\" in their dreams, and this movement was recorded on the machine. For more information on this and other experiments, read *Exploring the World of Lucid Dreaming* (ISBN in Further Reading). There are plenty of reasons you might want to dream lucidly: - For **fun**! Just flying in a lucid dream is an exhilarating feeling. Lucid dreams are generally far more intense and vivid than most non-lucid dreams. You can use a lucid dream to wind down after a long day. - Transforming into animals or getting superpowers is a **unique experience** that is hard to get any other way. - If you are particularly interested in dreams --- either spiritually or psychologically --- trying lucid dreaming could help you in your research. - If you\'re writing fiction or even **creating** a world for a computer game, lucid dreaming can help you visualize it. You could ask your characters how they feel about something or what they think will happen. - Some people compose music in their lucid dreams. - Lucid dreams can be realistic enough to **rehearse** a speech or musical performance. - You can **relive** previous dreams or experiences. - They can help in **dream interpretation** and **communicating with your subconscious**. **I can't control my dreams.** This is very rarely actually the case (though sometimes it is in nightmares). Usually it is just your memory which treats you as though it were beyond your control. If you become lucid in a dream where you have a body, you will almost always be able to control your body. However, you might not manage to do anything else. Don\'t worry, though --- most people have no problem with jumping very high or flying in a lucid dream! On the other hand, parts of your brain are less active while dreaming, which can lead to dream/trance logic and sometimes choices you will later regret. For example, you might choose to continue your lucid dream, although you know that once you wake you will only remember half of it. Once you wake up, you may wish that you had stopped your dream. Another example is of somebody who dreamt they were sitting next to Mother Theresa. They wondered if they might be dreaming, thinking *isn't Mother Theresa dead?* They then concluded that she was obviously right next to them and therefore alive, and that it wasn't a dream! **Are lucid dreams related to psi phenomena?** There are differing views on this. Some people claim to have organized shared dreams or precognitive dreams through lucid dreaming. Others say these are simply created in the brain like any other dream, something like self-hypnosis. **How long does it take to learn how to dream lucidly?** This completely depends on the person and circumstances. Some people have a lucid dream after just a few nights of learning about it, while for others, it may take months! If you don\'t get enough sleep or feel too stressed after work to regularly practice induction techniques, then it may take a long time, especially if you expect it to. It will also depend on how much effort you put in. However, *everybody* has the ability to dream lucidly. **I think I do this naturally. Does this happen?** It is quite rare to have regular lucid dreams naturally, although most people have had a lucid dream at some point in their lives. If you want to increase the frequency of your lucid dreams, carry on reading through the book; otherwise, skip to the Using section to get some ideas for your dreams. **I had \[a dream\], was I lucid?** In general, a lucid dream is defined as a dream in which you know you are dreaming at some point, regardless of anything else. Even if you were lucid one second but lost your lucidity, it is still technically a lucid dream. However, this can be a little misleading. Sometimes you dream that you fall asleep and have a lucid dream! This is often thought of as a sign that you will have a proper lucid dream soon, as your mind is thinking a lot about lucid dreams. Try using this table: +-----------------------------------+-----------------------------------+ | Signs you were lucid | Signs you weren\'t lucid | +===================================+===================================+ | - Doing a reality check which | - Dreaming that you were | | gave a positive result | dreaming | | - Attempting to stabilize the | - Having an unusually poor | | dream (see the | recall for that dream after | | Using | - Not recognizing illogical | | chapter) | parts of the dream as a dream | | - Attempting to fly, walk | - Attempting to fly, walk | | through mirrors, etc. | through mirrors, etc. without | | immediately after realizing | success | | you are dreaming | - Treating dream characters as | | - Waking up as soon as you | you would real people\* | | realize that you are dreaming | | | - Remarks to dream characters | | | that you are dreaming | | +-----------------------------------+-----------------------------------+ \* However, some people may have lucid dreams and deliberately choose to treat dream characters as if they were real. In fact, it can be intriguing to have real conversations with dream characters, such as physics or philosophy discussions - you may discover they know more than you do! ## Possible dangers of lucid dreaming There is no current evidence of lucid dreaming being abnormal or unhealthy in any way. However, there may be some more or less minor side effects associated with having lucid dreams. Please don't let this scare you away from trying this; rather, remember that with dreams you are dealing with your own subconscious mind and recklessness is not recommended. ### Alienation Most people have never even heard of lucid dreaming, much fewer ever experienced it. Some people are also less than open-minded and receptive to new ideas. Don't be surprised if someone considers this whole phenomenon "weird" or "crazy" (which it is not). Don't preach, either; you don\'t have to convince anybody. Often people who spontaneously lucid dream, especially children, may find it surprising that not everyone does. They may even start thinking that they are the only people in the world who have lucid dreams. If they're worried, the best support is to let them know that they're not alone. ### Dissociation Lucid dreaming may weaken the borders between waking and dreaming, the conscious and subconscious mind, reality and fantasy. This might lead to problems of a dissociative nature. Probably the most common form of dissociation involves having problems distinguishing your waking memories from dream memories. Everyone who recalls at least one dream will have to sort out their dreams from reality in the morning. This can really be a problem for those who have previously had zero recall and, due to lucid dreaming, have had a major uptick in recall. Now, suddenly, they have all these excess, illogical memories to sort out. **This is unlikely to be a major problem**, but may be a big annoyance. An example is when you have actually misplaced an item, and \"find it\" in a dream. If you cannot distinguish dream from reality you will now think you know where that item is, perhaps even placed it where you felt sure to find it later, but when you awake it will not be there. However, there are signs that you should watch for which indicate a larger problem may be developing. Lucid dreaming in itself should not cause these to appear *in a waking state*: - Ability to ignore extreme pain or what would normally cause extreme pain - Absorption in a computer game, television program or movie - Remembering the past so vividly one seems to be reliving it - Finding evidence of having done things one can't remember doing - Not remembering important events in one's life - Being in a familiar place but finding it unfamiliar - Seeing oneself as if looking at another person - Other people and objects do not seem real - Looking at the world through a fog or haze - Not recognizing friends or family members - Finding unfamiliar things among one's belongings - Finding oneself in a place but unaware of how one got there - Finding oneself dressed in clothes one doesn't remember putting on If this has happened, and there is no other cause (e.g. drugs), take a break from lucid dreaming for a while. In fact, take a break from anything fictional for a while, at least until symptoms stop. In addition, you may consider avoiding experimentation with lucid dreaming if you have a mental condition that will alter your perception of reality, eg. Schizophrenia, Hallucinations, Dementia. ### False awakenings One of the advantages of having lucid dreams is being able to change a dream or wake up if things are not turning out as planned. A false awakening is when you seem to have woken up but are actually still dreaming. For example, you may find yourself waking up in your room. But once there, new things will start happening---for example, someone might visit, or you might wander outside because of an odd noise, or there might be objects all over the place. There are no such things as loops of awakenings. You can simply shock your body awake by applying a stimulus in your dream. It\'s a good idea to get in the habit of doing a reality check just after waking up so that you\'ll realize when this happens and become lucid. When this happens repeatedly in the same night, it can be very tiring and often frightening. Not only can the belief of being fully awake in your room while being exposed to unusual situations be scary, but you also may start fearing you won\'t be able to actually wake up. And, depending on the content of the dream, since all your dreams tend to start in your room, you may fear what could happen once you actually do wake up. But this is not a very common situation. Once you are lucid, it is usually easier to wake up or lose the dream than it is to keep dreaming. ### Controversial: Accidentally encountering "spiritual" entities This depends on your worldview. If you believe that dreams are a creation of your brain and nothing more, you don't need to worry about spirits or anything similar. If you want to be on the safe side, treating objects in your dream decently and politely won't do you any harm. The book \"The Art of Dreaming\" by Carlos Castaneda has a lot to say on this subject. (See Further Reading) ### Controversial: Creating bad habits or becoming a control freak When lucid dreaming, you have the option to control the dream world in ways that are impossible in the waking world. You can, for example, make objects appear or disappear, or make people act according to your will. Some people believe this may lead your subconscious to desire this kind of control in the waking world, where it's highly inappropriate. Also, you might be tempted to apply dream-world solutions to waking-life problems instead of actually facing them; for example, just willing bad things to go away or escaping or destroying them by superpowers. Again, this is probably more of a problem if you are not mentally stable at the outset of your dreaming process. ### Controversial: Exhaustion Some people believe that experiencing many artificially induced lucid dreams often enough can be very exhausting. The main reason for this phenomenon is the result of the lucid dreams expanding the length of time between REM states. With fewer REMs per night, this state in which you experience actual sleep and your body recovers becomes infrequent enough to become a problem. This is just as exhausting as if you were to wake up every twenty or thirty minutes and watch TV. The effect is dependent on how often your brain attempts to lucidly dream per night. If you enter into a routine of attempting to lucidly dream, you may cause recursive lucid dreams that occur at each state change. ### Controversial: Inability to stop If you have trained your mind to the point where it can step over the boundary without conscious effort, you might find it difficult to stop. Do not become alarmed if you have trouble stopping the process of lucid dreaming, it is possible to get out of the habit. As long as you truly expect to stop having lucid dreams regularly, you will. You just need to stop any further attempts to lucid dream, and within a few months the lucid dreaming will go away by itself. Remember; do not be alarmed if, even with your attempts to stop, you experience further lucid dreams. It might take a while to break the habit. If you have real concerns, it may be advisable to talk with your doctor or therapist regarding appropriate treatment, including medication. ## Similar techniques **I can do astral projection, should I learn how to dream lucidly?** Possibly not. If you often enter a "dream world" after having the experience of leaving your body, that is basically the same as the method called Wake-Initiation of Lucid Dreams. Keep in mind that many people believe that "astral projection" or "out-of-body experiences" are actually lucid dreams. Whether these are real psi phenomena or the creative product of your dreaming mind, learning to dream lucidly will expand the variety of your experiences. **If this is so similar, why learn lucid dreaming and not astral projection?** Here are some reasons: - Lucid dreaming is something that everybody can understand. In fact, most people have already had a lucid dream. No single theory about astral projection is accepted even in the astral projection community. - If you are prepared to spend money, there are some gadgets that can help induce lucid dreams. They usually emit light or sound signals shortly after the REM state is detected. Hypnosis tapes usually focus more on self-improvement and you cannot decide what to do with your hypnotic trance. - If you don't believe in psi phenomena, you will likely be much more comfortable reading books about lucid dreaming than those on astral projection. If you have to keep stopping and thinking \"but that\'s not possible\", there\'s always the danger that your feelings of skepticism will affect the way you think about lucid dreaming and make it much harder for you to do. - You would be sleeping anyway, so it doesn\'t take up waking time. - You\'ll be able to use this Wikibook to your advantage! ## References ```{=html} <references/> ``` es:Sueño lúcido/Introducción it:Sogno lucido/Introduzione pl:Świadome_śnienie/Wstęp [^1]: Arno F. Wittig. *Schaum\'s outline of theory and problems of introduction to psychology*. McGraw-Hill, 1977. Retrieved from Google Books on September 23, 2009. [^2]: Rochelle Merilien. *Sleep Paralysis*. Retrieved September 21, 2009 from 1
# Lucid Dreaming/Using ## Dream stabilization Once you are able to dream lucidly, you may find that it is difficult to stay in the dream; for example, you may wake instantly or the dream may start "fading" which is characterized by loss or degradation of any of the senses, especially vision. Alternatively, a new lucid dreamer could easily forget that they are in a dream, as a result of the shock of the sensation. Don\'t worry if you wake immediately after becoming lucid. As you gain more experience of becoming lucid, it will come as less of a shock and you'll be less likely to wake up. Make sure you do a reality check to be sure you're not still dreaming. As you gain more experience, you will have an easier time identifying when and remembering that you are dreaming. You can avoid more gradual fadings by **stimulating your senses**. This means listening for sounds, feeling around with your hands, and paying attention to what you see and smell. The idea here is to load your senses with stimulation from the dream so that your senses cannot shift to the real world. If you close your eyes, you are removing a great deal of sensory information and might wake up. Staring at a single point can cause effectively the same problem if you stop seeing everything else in your peripheral vision, or don\'t see enough movement. If you hear something loud in real life and are hearing nothing in the dream, your senses may shift to the real world, causing you to wake up. Ideally you should be able to use the techniques below to stabilize your dream *before* it starts to fade (or "black out"). As always, prevention is better than treatment - and the more stable and vivid your dreams are, the more enjoyable they will be. However, if that doesn\'t work you may be able to use stabilization techniques to stop the fading; the spinning technique is probably the most effective in this case. If you still can't stabilize your dream, you may decide to try and wake up with the aim of remembering your dream as accurately as possible while its still fresh in your mind. ### Hand Touching Rub your hands together and concentrate on the rubbing. You should feel the friction and the heat of your hands. If you can concentrate on the feelings that this action generates, your dream is likely to stabilize and become more vivid and detailed. You can also keep one hand on your arm while exploring the dream for a constant sense of stimulation. This technique is most effective when used in conjunction with the "Slowing it down" technique, by staring at your hands while rubbing them together. ### Spinning You spin around in your dream much as you would if you suddenly want to feel dizzy in real life. The sensation of movement is the key here to stabilizing the dream. Many people report success with this technique, but it also tends to cause a complete change of your dream scene (see Changing the dream environment below). If the dream scene disappears completely (e.g., becomes black), it is necessary to visualize the dreamscape to return to the dream. ### Slowing it down Some people like to stabilize the dream by "stopping to smell the roses" and slowly staring at a dream object until it becomes clear. The dreamer would then look around elsewhere, noticing how detailed everything is, thereby stimulating the visual portion of the dream. *However, others find this can cause their lucid dream to end.* If you focus on one object for too long to the exclusion of everything else, you will likely wake up or lose the dream. It works best to pay attention to everything in your vision, including your peripheral vision, not just the center of the object you\'re staring at. If staring at a single object doesn\'t work for you, try to let your eyes wander around instead. ### Touching your dream If you feel that your dream is too abstract and fear that it might be fading, you can prevent this by grabbing hold of a solid object in your dream and focus on how real the sensation is. A good tip is to find something you know is stuck, for instance a table nailed to the ground, and pull it with all your muscular power (no *supernatural* powers!), and you should feel how solid it is. The idea is that you convince yourself that the dream is solid and real --- through tactile stimulation --- and nothing abstract. ### Regaining waking memory or skills This is also likely to enhance your degree of lucidity. Try to remember facts from your waking life, such as your phone number, address, etc., or do some simple math. Or, start reciting the lyrics to your favorite song. Or perhaps try some sports practice you know well --- this all depends on which senses / methods of thought process you tend to rely on most in your waking life. ### Dream Guide Summon a DC (Dream character) that you expect to Guide you through the dream. Summoning is easier if you always expect this Guide to be there in a dream. The Guide is useful for escaping scary or unpredicted environments (\"whooshing\" you away, killing or unsummoning the threat, reminding you that you are in control.). Imagine this Guide as powerful, knowledgeable, and protective over you. Guides can also walk you through summoning, flying, shapeshifting, etc. and be useful for learning and controlling your dreams. ### False awakening A couple of the users on the ld4all.com forums have had success with creating a false awakening to stabilize a dream. If the above techniques are failing and you find your dream still fading, *and you really want to continue your lucid dream*, do the following: 1. Expect to have a false awakening. 2. When you think you wake up, perform a reality check. You will either have a false awakening, reality check, and then end up with an even more vivid lucid dream, or will really wake up, perform a reality check, and realize that you just woke up (bad luck!). The most important part of this is the reality check. This is what will continue your lucid dream. You should be performing reality checks when you wake up. If you plan to induce false awakenings in order to stabilize a dream, the reality check that you perform as you wake up is as important as the one that got you lucid, if not more. Perform every check in the book until you are **positively, absolutely, and completely sure** that you aren't dreaming. A series of 10 reality checks is more likely to produce dream results in a dream, especially if you are expecting dream results. This technique is for those who are desperate! *If you have had a good experience with this technique, please go to the talk page and post your experiences, as there have not been many anecdotes of it working yet.* ```{=html} <div style="text-align: right; font-size: small"> ``` top ```{=html} </div> ``` ## Recovering from lost visuals There are a few things you can try to do if you lose your vision. Most of these are less likely to help prolong your dream than the above techniques. You can also try these if you have just woken up and are lying in your bed. You may be able to return to your dream. ### Autosuggestion You can repeat over and over a phrase similar to "I can see my dream," or otherwise enforce in your mind that you can see a dreamscape. (See Autosuggestion) ### Visualising You can visualise the scene as it would be if you could see it. You could take this as an opportunity to change the dreamscape by visualising a different environment from the previous one in the dream. This can be made easier by spinning as you visualize. (See Changing the dream environment below) ## Altering the dream ### Changing the dream environment You can change the dreamscape by simply visualizing a different environment. Stephen LaBerge, author of *Exploring the World of Lucid Dreaming*, suggests closing your eyes, spinning around, and visualizing a new location. Alan Worsley, a famous lucid dreamer, describes another technique of summoning a television and remote to switched dreamscapes. By simply "changing the channel" on the remote, imagine your surroundings switching to your desired location, as though you were switching through various television programs. In both of these methods, details are key. The more details you provide for your next dreamscape, the easier it will be to get there. For example, if you wanted go to the Superbowl in your dreams, you might simply state: : **"I want to be at the Superbowl."** But this statement could be improved by adding details: : **\"I want be in the endzone seats, drinking a Coke, and wearing my favorite player\'s jersey at the Super Bowl.\"** ### Summoning objects into your dream At some point in your lucid dreaming experience, you\'ll probably want to handle various objects, or talk with certain people. Both of these needs can be fulfilled by using your mind, and the power of suggestion. There is no set way to \"make\" things in the dream world; in fact, many lucid dreamers devise their own methods through experimentation. However, here are some of the more common \"summoning\" techniques: - Try reaching for objects that are not within your field of vision. For example, think to yourself: "When I reach into my pocket, there will be a green box of mints." Then, attempt to actually take a green box of mints out of your pocket. Other variations of this include reaching behind you for an object, or reaching through a mirror in hopes of getting a hold of what you want. - To summon a person, you might say to yourself: "When I turn around, \[person\'s name\] will be standing in front of me," or "When I walk through this mirror, I will see \[person\'s name\]," or "In a few moments, \[person\'s name\] will walk through that door (or around that corner)." - More experienced lucid dreamers can try making the object materialize right before their eyes. This will require a fair amount of concentration. Here is an example of this process:\ : I am lucid dreaming in my backyard, and it\'s currently night. Now, I don\'t like the dark in my lucid dreams because I\'m more likely to wake up, and I fear there are monsters lurking around every corner. So, I want to **make the sun appear** so that it\'ll be daytime. Focusing on the horizon, I visualize the sun rising above it.\ : At first nothing happens, but I continue focusing and\...yes! There\'s some light filtering over the horizon! And now the sun is rising to the sky and it settles there; so far, so good. But wait\...the sky is still black. Peering at bit closer at the sun, I can just make out a faint ring of blue sky encircling it. Lifting my hand towards it I shout, \"Blue!\". The blue ring quickly spreads across the sky, creating the full daytime effect."\ - Some dreamers may have success by closing their eyes and imagining the desired object in front of them once when they open their eyes . - Try using mechanical devices within the dream, such as a nearby lightswitch or button, to summon objects or people. (i.e. \"When I flip this switch/press this button, X will appear.\") - Convince yourself you have magical powers (or scientific). Then, use them to summon objects, shapeshift, etc. This can help you believe the creation of objects more easily. - (This one is dumb, but it works.) Begin singing *Friend Like Me*, and summon stuff to the beat. They may disappear after you finish singing, or start dancing, but hey, it\'s pretty darn fun. Remember, in the dream world, your expectations shape your surroundings. If you think a big, scary monster is going to step out of the shadows and attack you\...well, a big, scary monster probably *is* going to step out of the shadows and attack you. So, don\'t be a victim; take control of your thoughts and use them to your advantage. ```{=html} <div style="text-align: right; font-size: small"> ``` top ```{=html} </div> ``` ## What you can do This final section should see you off with a few ideas of what to do in a dream. It is advised to have a *clear purpose* for your lucid dreams whenever you go to sleep. In other words, every night you consider what you want to do when you have a lucid dream, and select one thing, or perhaps two or three if you are skilled. Avoid this: : \"What am I gonna do what am I gonna do? I wanna fly, walk through walls, eat until my stomach explodes, spy on my neighbours, drive in a car real fast, woooeeey I\'m gonna . . .\" You will either end up doing none of these things in your dream or getting overexcited and waking up. Now that that's clear, here's a list of possible things you could do, ordered in difficulty. Remember that you might find some things unusually hard (or easy) compared to most lucid dreamers, this is perfectly normal! This is a very rough guide --- if you've managed something in the Easy section, don\'t be scared to try for something from the Medium section. ### Easy - Fly : Most people enjoy flying around in dreams. There are different styles of flight that people use, each with a varied level of success for each individual. Methods such as "swimming through the air", "Superman style" (one arm outstretched), "Neo style" (both arms at your side), and "Airplane style" (both arms out) ,\"eagle style\" (gliding through the air currents, using your fingered wings to navigate altitudes) are often used. There are a few methods of getting up into the air, such as simply jumping (you can jump really high in dreams if you believe it) or imagining a great force pushing you from your feet or walking up on air as though it is a staircase. Some people summon jetpacks and slip them on to fly. Be creative and dream up your own methods. - Explore your dream world : Be warned, you are quite likely to forget you are dreaming when exploring! Doing reality checks often and muttering to yourself about how real everything seems can help to avoid this. You can also ask a dream character to tag along with you and remind you when you forget that you're dreaming. - Walk through a mirror or wall : You can pass through dream objects such as walls, glass, trees, and everything else. Confidence is really the key here. Some variations on going through stuff can be going in slowly, wiggling your finger in first, or running quickly into the object and telling yourself you would go through it. Some people particularly like to go through mirrors because of the unpredictable effects this action produces. However, if you tell yourself you will end up at a certain location before passing through a mirror, you can change the dream scene quickly. Be warned, some people experience nothing and wake up after passing through. You may want to hold your arm to keep yourself in the dream. - Look at the sky : People often report amazing skies in lucid dreams. You can also shout colors at it and paint some sunrises. - Show off to your friends ("Hey guys; I can go through this wall!") - Do plenty of sports (trampolining, skiing, swimming, dancing, etc.) - Use various power such as Telekinesis and magic (a shortcut if you are having problems would be to summon a magic wand/staff or other device) - Try to read a book that you have never read and remember the content - Try to browse the Internet and visit sites that you\'ve never visited - Use things that you have never used - Last but not least: Edit Wikipedia/Wikibooks articles (see question 106 of the Wikipediholic Test) and see if the changes remain when you awake! ### Medium - Eat until you're near bursting! - Teleport - Create some dream characters (possibly from a book or film) - Try to find your spirit guide - Experiments (in fact, researchers will often want people of various skills) - Body swapping/possession (where you enter a different body) - Morph - Take some drugs (this is more realistic if you've done so in real life) : Many people have also experienced realistic effects when trying drugs in dreams that they have never taken in real life. - Drive a vehicle (This is especially fun if you haven\'t ever driven in real life) - Fight : Nobody can tell you what you should and should not do in your dreams; the choice remains up to you. - Use weapons : It is usually more interesting to use melee weapons (knives, swords, brass knuckles) than projectile weapons. Machine guns and pistols often run out of ammo and summoning it can be difficult. Misfires and jamming is also common. *(Your subconscious expectations will shape your dreamscape in all manner of ways, If you believe it is hard to accomplish, if you believe it will jam or misfire, it will. I have had no issues with weaponry such as firearms in my dreams what-so-ever, take this \"advice\" lightly.)* However this can be overcome by using Directed Energy Weapons (Lasers, Plasma/pulse rifles), or weapons that can\'t jam (bows, simple firearms like muskets and so on). - \"Beat up\" your enemies ### Hard - Have sex : The excitement, or closing your eyes, can cause you to wake up. An additional reason for waking up may be fixing your eyes on your partner, as holding a gaze for long is also known to cause waking up. Also your dream partner has a strange way of transforming in the midst of ecstasy. Finding a sex partner isn\'t very hard, it\'s keeping them that is difficult. That is why it is best to not panic when they are transforming and accept them for what your subconscious brings you. - More morphing like 360 degree vision, sonar vision, etc. - Create false memories, etc. False memories can be made by having a lucid dream, but scripting it so you will think it is real, e.g. you think what happened in your dream happened in real life. This is hard because you will have to forget it is a dream while staying lucid (knowing it is a dream). - Compose music or poems (or request them from your subconscious) - Build a fantasy dream world! (some people build a dream world naturally) - Lucid Crossroads - Astral Pulse Island - H.P. Lovecraft\'s Dreamlands - Have precognition (your subconscious can be very good at predicting the future with relationships and career) - Experience death. This could be a very harsh experience, and depending on your religious or philosophical beliefs may summon you into a different world or nothingness. - Ask the dream to show you your worst fears/deepest traumas/etc. (be prepared for some bad stuff to surface) - Build/use impossible objects, such as hypercubes, Klein bottles, etc. - Rewind time ```{=html} <div style="text-align: right; font-size: small"> ``` top ```{=html} </div> ``` ## Conclusion With all the techniques in this book, you may feel overwhelmed and uncertain of what to do next. Don\'t worry --- just choose a few techniques to "map your way to lucidity", decide on a few things you will want to do from this page, and start! If you are still unsure of what to do, don't worry --- you might happen to have a lucid dream tonight! If you are beginning to feel a compulsive thirst for *more* information about dreams, head over to the Further Reading section for the sites to satisfy your cravings. Remember to come back occasionally and help make the wikibook grow! ```{=html} <div style="text-align: right; font-size: small"> ``` top ```{=html} </div> ``` es:Sueño lúcido/Uso it:Sogno lucido/Uso
# Lucid Dreaming/Glossary CAT :See *Cycle Adjustment Technique*.\ Cycle Adjustment Technique : Adjusting your sleep cycles to increase the likelihood of having a lucid dream. DC :See *Dream character*.\ DILD :See *Dream-Initiated Lucid Dream*.\ Dream character : Any character inside your dream. Some people believe they are real people or spirit guides, others that they\'re just products of the dreaming mind. Dream-Initiated Lucid Dream : A lucid dream that begins during a \"normal\", non-lucid dream. Dream recall : The ability to remember details of one\'s dreams. Dream Result : Result from a reality check that indicates that one is dreaming. *Ex: Breathing through your nose while pinching your nostrils.* Dreamscape : The landscape and scenery of one\'s dreams. Hypnagogic imagery : The images, sounds, etc. that you perceive as you fall asleep. Not to be confused with *phosphenes*. EILD :See *Erotically induced lucid dream*\ Erotically induced lucid dream : A lucid dream with sexual activity. They may trigger a real orgasm, a phenomenon know as nocturnal emission or wet dream. HI :See *Hypnagogic imagery*.\ LD :See *Lucid dream*.\ LILD :See *Lucid Induction of Lucid Dreams*.\ Lucid dream : A dream in which you are aware that you are dreaming. Lucid Induction of Lucid Dreams : The technique in which you do something in a lucid dream that theoretically will remind you that you\'re dreaming in your next dream. MILD :See *Mnemonic Induction of Lucid Dreams*.\ Mnemonic Induction of Lucid Dreams : The technique in which you mentally repeat to yourself, as you fall asleep, your future intention to realize that you\'re dreaming. Named Subconscious Technique : (See \"Getting more help with MILD from your subconscious\", in the forum links box in the MILD section.) This technique is a useful aid to the MILD and autosuggestion techniques where the dreamer actively engages his or her subconscious for dream results. NST :See *Named Subconscious Technique*.\ Oneironaut : A skilled lucid dreamer. Phosphenes : Patches of colour (usually red or blue) that you can constantly see while your eyes are closed. Rapid Eye Movement : The stage of the sleep cycle that your most vivid dreams occur in. RC :See *Reality check*.\ Reality check : A simple and quick method of determining if one is dreaming. *Ex: Breathing with your nose shut, faulty light switches, etc.* Real-life result : A reality check result which indicates one is may not be dreaming. *Ex: Being unable to will oneself to fly.* REM :See *Rapid Eye Movement*.\ Sleep paralysis (SP) : The body\'s natural phenomenon of paralyzing the limbs of the body while asleep. This may be experienced consciously, either by accident or during the WILD technique. VILD :See *Visual Induction of Lucid Dreams*.\ Visual Induction of Lucid Dreams : The technique in which you incubate a dream that reminds you to do a reality check and become lucid. Vivid dream (VD) : A dream with a notably higher level of detail. Wake-Back-To-Bed : The technique in which you wake up for a bit after a few hours of sleep and go back to sleep again. Usually used in combination with other techniques. Wake-Initiated Lucid Dream : A lucid dream triggered by consciously falling asleep. WBTB :See *Wake-Back-To-Bed*.\ WILD :See *Wake-Initiated Lucid Dream*.
# Tcl Programming/Introduction ### Introduction #### So what is Tcl? The name Tcl is derived from \"Tool Command Language\" and is pronounced \"tickle\". Tcl is a radically simple open-source interpreted programming language that provides common facilities such as variables, procedures, and control structures as well as many useful features that are not found in any other major language. Tcl runs on almost all modern operating systems such as Unix, Macintosh, and Windows (including Windows Mobile). While Tcl is flexible enough to be used in almost any application imaginable, it does excel in a few key areas, including: automated interaction with external programs, embedding as a library into application programs, language design, and general scripting. Tcl was created in 1988 by John Ousterhout and is distributed under a BSD style license (which allows you everything GPL does, plus closing your source code). The current stable version, in February 2008, is 8.5.1 (8.4.18 in the older 8.4 branch). The first major GUI extension that works with Tcl is Tk, a toolkit that aims to rapid GUI development. That is why Tcl is now more commonly called Tcl/Tk. The language features far-reaching introspection, and the syntax, while simple, is very different from the Fortran/Algol/C++/Java world. Although Tcl is a string based language there are quite a few object-oriented extensions for it like Snit, incr Tcl, and XOTcl to name a few. Tcl was originally developed as a reusable command language for experimental computer aided design (CAD) tools. The interpreter is implemented as a C library that could be linked into any application. It is very easy to add new functions to the Tcl interpreter, so it is an ideal reusable \"macro language\" that can be integrated into many applications. However, Tcl is a programming language in its own right, which can be roughly described as a cross-breed between - LISP/Scheme (mainly for its tail-recursion capabilities), - C (control structure keywords, expr syntax) and - Unix shells (but with more powerful structuring). #### One language, many styles Although a language where \"everything is a command\" appears like it must be \"imperative\" and \"procedural\", the flexibility of Tcl allows one to use functional or object-oriented styles of programming very easily. See \"Tcl examples\" below for ideas what one can do. The traditional, \"procedural\" approach would be ``` tcl proc mean list { set sum 0. foreach element $list {set sum [expr {$sum + $element}]} return [expr {$sum / [llength $list]}] } ``` Here is yet another style (not very fast on long lists, but depends on nothing but Tcl). It works by building up an expression, where the elements of the lists are joined with a plus sign, and then evaluating that: ``` tcl proc mean list {expr double([join $list +])/[llength $list]} ``` From Tcl 8.5, with math operators exposed as commands, and the expand operator, this style is better: ``` tcl proc mean list {expr {[tcl::mathop::+ {*}$list]/double([llength $list])}} ``` or, if you have imported the tcl::mathop operators, just ``` tcl proc mean list {expr {[+ {*}$list]/double([llength $list])}} ``` Note that all of the above are valid stand alone Tcl scripts. It is also very easy to implement other programming languages (be they (reverse) polish notation, or whatever) in Tcl for experimenting. One might call Tcl a \"CS Lab\". For instance, here\'s how to compute the average of a list of numbers in Tcl (after first writing somewhat more Tcl to implement a J-like functional language - see Tacit programming in examples): ``` tcl Def mean = fork /. sum llength ``` or, one could implement a RPN language similar to FORTH or Postscript and write: ``` tcl : mean dup sum swap size double / ; ``` A more practical aspect is that Tcl is very open for \"language-oriented programming\" - when solving a problem, specify a (little) language which most simply describes and solves that problem - then go implement that language\... #### Why should I use Tcl? Good question. The general recommendation is: \"Use the best tool for the job\". A good craftsman has a good set of tools, and knows how to use them best. Tcl is a competitor to other scripting languages like awk, Perl, Python, PHP, Visual Basic, Lua, Ruby, and whatever else will come along. Each of these has strengths and weaknesses, and when some are similar in suitability, it finally becomes a matter of taste. Points in favour of Tcl are: - simplest syntax (which can be easily extended) - cross-platform availability: Mac, Unix, Windows, \... - strong internationalization support: everything is a Unicode string - robust, well-tested code base - the Tk GUI toolkit speaks Tcl natively - BSD license, which allows open-source use like GPL, as well as closed-source - a very helpful community, reachable via newsgroup, Wiki, or chat :) Tcl is not the best solution for every problem. It is however a valuable experience to find out what is possible with Tcl. #### Example: a tiny web server Before spoon-feeding the bits and pieces of Tcl, a slightly longer example might be appropriate, just so you get the feeling how it looks. The following is, in 41 lines of code, a complete little web server that serves static content (HTML pages, images), but also provides a subset of CGI functionality: if an URL ends with *.tcl*, a Tcl interpreter is called with it, and the results (a dynamically generated HTML page) served. Note that no extension package was needed - Tcl can, with the **socket** command, do such tasks already pretty nicely. A socket is a channel that can be written to with **puts**. The **fcopy** copies asynchronously (in the background) from one channel to another, where the source is either a process pipe (the \"exec tclsh\" part) or an open file. This server was tested to work pretty well even on 200MHz Windows 95 over a 56k modem, and serving several clients concurrently. Also, because of the brevity of the code, this is an educational example for how (part of) HTTP works. ``` tcl # DustMotePlus - with a subset of CGI support set root c:/html set default index.htm set port 80 set encoding iso8859-1 proc bgerror msg {puts stdout "bgerror: $msg\n$::errorInfo"} proc answer {sock host2 port2} { fileevent $sock readable [list serve $sock] } proc serve sock { fconfigure $sock -blocking 0 gets $sock line if {[fblocked $sock]} { return } fileevent $sock readable "" set tail / regexp {(/[^ ?]*)(\?[^ ]*)?} $line -> tail args if {[string match */ $tail]} { append tail $::default } set name [string map {%20 " " .. NOTALLOWED} $::root$tail] if {[file readable $name]} { puts $sock "HTTP/1.0 200 OK" if {[file extension $name] eq ".tcl"} { set ::env(QUERY_STRING) [string range $args 1 end] set name [list |tclsh $name] } else { puts $sock "Content-Type: text/html;charset=$::encoding\n" } set inchan [open $name] fconfigure $inchan -translation binary fconfigure $sock -translation binary fcopy $inchan $sock -command [list done $inchan $sock] } else { puts $sock "HTTP/1.0 404 Not found\n" close $sock } } proc done {file sock bytes {msg {}}} { close $file close $sock } socket -server answer $port puts "Server ready..." vwait forever ``` And here\'s a little \"CGI\" script I tested it with (save as time.tcl): ``` tcl # time.tcl - tiny CGI script. if {![info exists env(QUERY_STRING)]} { set env(QUERY_STRING) "" } puts "Content-type: text/html\n" puts "<html><head><title>Tiny CGI time server</title></head> <body><h1>Time server</h1> Time now is: [clock format [clock seconds]] <br> Query was: $env(QUERY_STRING) <hr> <a href=index.htm>Index</a> </body></html>" ``` #### Where to get Tcl/Tk On most Linux systems, Tcl/Tk is already installed. You can find out by typing *tclsh* at a console prompt (xterm or such). If a \"%\" prompt appears, you\'re already set. Just to make sure, type *info pa* at the % prompt to see the patchlevel (e.g. 8.4.9) and *info na* to see where the executable is located in the file system. Tcl is an open source project. The sources are available from <http://tcl.sourceforge.net/> if you want to build it yourself. For all major platforms, you can download a binary **ActiveTcl** distribution from ActiveState. Besides Tcl and Tk, this also contains many popular extensions - it\'s called the canonical \"Batteries Included\" distribution. Alternatively, you can get Tclkit: a Tcl/Tk installation wrapped in a single file, which you don\'t need to unwrap. When run, the file mounts itself as a virtual file system, allowing access to all its parts. January 2006, saw the release of a new and promising one-file vfs distribution of Tcl; **eTcl**. Free binaries for Linux, Windows, and Windows Mobile 2003 can be downloaded from <http://www.evolane.com/software/etcl/index.html> . Especially on PocketPCs, this provides several features that have so far been missing from other ports: sockets, window \"retreat\", and can be extended by providing a startup script, and by installing pure-Tcl libraries. #### First steps To see whether your installation works, you might save the following text to a file *hello.tcl* and run it (type *tclsh hello.tcl* at a console on Linux, double-click on Windows): ``` tcl package require Tk pack [label .l -text "Hello world!"] ``` It should bring up a little grey window with the greeting. To make a script directly executable (on Unix/Linux, and Cygwin on Windows), use this first line (the \# being flush left): ``` tcl #!/usr/bin/env tclsh ``` or (in an older, deprecated tricky style): ``` tcl #! /bin/sh # the next line restarts using tclsh \ exec tclsh "$0" ${1+"$@"} ``` This way, the shell can determine which executable to run the script with. An even simpler way, and highly recommended for beginners as well as experienced users, is to start up tclsh or wish interactively. You will see a % prompt in the console, can type commands to it, and watch its responses. Even error messages are very helpful here, and don\'t cause a program abort - don\'t be afraid to try whatever you like! Example: `$ tclsh` ``` tcl info patchlevel ``` `8.4.12` ``` tcl expr 6*7 ``` `42` ``` tcl expr 42/0 ``` `divide by zero` You can even write programs interactively, best as one-liners: ``` tcl proc ! x {expr {$x<=2? $x: $x*[! [incr x -1]]}} ! 5 ``` `120` For more examples, see the chapter \"A quick tour\". ------------------------------------------------------------------------ ### Syntax Syntax is just the rules how a language is structured. A simple syntax of English could say (ignoring punctuation for the moment): - A text consists of one or more sentences - A sentence consists of one or more words Simple as this is, it also describes Tcl\'s syntax very well - if you say \"script\" for \"text\", and \"command\" for \"sentence\". There\'s also the difference that a Tcl word can again contain a script or a command. So ``` tcl if {$x < 0} {set x 0} ``` is a command consisting of three words: *if*, a condition in braces, a command (also consisting of three words) in braces. ``` tcl Take this for example ``` is a well-formed Tcl command: it calls *Take* (which must have been defined before) with the three arguments \"this\", \"for\", and \"example\". It is up to the command how it interprets its arguments, e.g. ``` tcl puts acos(-1) ``` will write the string \"acos(-1)\" to the stdout channel, and return the empty string \"\", while ``` tcl expr acos(-1) ``` will compute the arc cosine of -1 and return 3.14159265359 (an approximation of *Pi*), or ``` tcl string length acos(-1) ``` will invoke the *string* command, which again dispatches to its *length* sub-command, which determines the length of the second argument and returns 8. #### Quick summary A Tcl **script** is a string that is a sequence of commands, separated by newlines or semicolons. A **command** is a string that is a list of words, separated by blanks. The first word is the name of the command, the other words are passed to it as its arguments. In Tcl, *\"everything is a command\"* - even what in other languages would be called declaration, definition, or control structure. A command can interpret its arguments in any way it wants - in particular, it can implement a different language, like *expr*. A **word** is a string that is a simple word, or one that begins with { and ends with the matching } (braces), or one that begins with \" and ends with the matching \". Braced words are not evaluated by the parser. In quoted words, substitutions can occur before the command is called: - \$\[A-Za-z0-9\_\]+ substitutes the value of the given variable. Or, if the variable name contains characters outside that regular expression, another layer of bracing helps the parser to get it right: `puts "Guten Morgen, ${Schüler}!"` If the code would say *\$Schüler*, this would be parsed as the value of variable *\$Sch*, immediately followed by the constant string *üler*. - (Part of) a word can be an embedded script: a string in \[\] brackets whose contents are evaluated as a script (see above) before the current command is called. In short: Scripts and commands contain words. Words can again contain scripts and commands. (This can lead to words more than a page long\...) Arithmetic and logic expressions are not part of the Tcl language itself, but the language of the **expr** command (also used in some arguments of the **if**, **for**, **while** commands) is basically equivalent to C\'s expressions, with infix operators and functions. See separate chapter on *expr* below. ------------------------------------------------------------------------ #### The man page: 11 rules Here is the complete manpage for Tcl (8.4) with the \"endekalogue\", the 11 rules. (From 8.5 onward there is a twelfth rule regarding the {\*} feature). The following rules define the syntax and semantics of the Tcl language: **(1) Commands** A Tcl script is a string containing one or more commands. Semi-colons and newlines are command separators unless quoted as described below. Close brackets are command terminators during command substitution (see below) unless quoted. **(2) Evaluation** A command is evaluated in two steps. First, the Tcl interpreter breaks the command into words and performs substitutions as described below. These substitutions are performed in the same way for all commands. The first word is used to locate a command procedure to carry out the command, then all of the words of the command are passed to the command procedure. The command procedure is free to interpret each of its words in any way it likes, such as an integer, variable name, list, or Tcl script. Different commands interpret their words differently. **(3) Words** Words of a command are separated by white space (except for newlines, which are command separators). **(4) Double quotes** If the first character of a word is double-quote (\") then the word is terminated by the next double-quote character. If semi-colons, close brackets, or white space characters (including newlines) appear between the quotes then they are treated as ordinary characters and included in the word. Command substitution, variable substitution, and backslash substitution are performed on the characters between the quotes as described below. The double-quotes are not retained as part of the word. **(5) Braces** If the first character of a word is an open brace ({) then the word is terminated by the matching close brace (}). Braces nest within the word: for each additional open brace there must be an additional close brace (however, if an open brace or close brace within the word is quoted with a backslash then it is not counted in locating the matching close brace). No substitutions are performed on the characters between the braces except for backslash-newline substitutions described below, nor do semi-colons, newlines, close brackets, or white space receive any special interpretation. The word will consist of exactly the characters between the outer braces, not including the braces themselves. **(6) Command substitution** If a word contains an open bracket (\[) then Tcl performs command substitution. To do this it invokes the Tcl interpreter recursively to process the characters following the open bracket as a Tcl script. The script may contain any number of commands and must be terminated by a close bracket (\]). The result of the script (i.e. the result of its last command) is substituted into the word in place of the brackets and all of the characters between them. There may be any number of command substitutions in a single word. Command substitution is not performed on words enclosed in braces. **(7) Variable substitution** If a word contains a dollar-sign (\$) then Tcl performs variable substitution: the dollar-sign and the following characters are replaced in the word by the value of a variable. Variable substitution may take any of the following forms: \$name Name is the name of a scalar variable; the name is a sequence of one or more characters that are a letter, digit, underscore, or namespace separators (two or more colons). \$name(index) Name gives the name of an array variable and index gives the name of an element within that array. Name must contain only letters, digits, underscores, and namespace separators, and may be an empty string. Command substitutions, variable substitutions, and backslash substitutions are performed on the characters of index. \${name} Name is the name of a scalar variable. It may contain any characters whatsoever except for close braces. There may be any number of variable substitutions in a single word. Variable substitution is not performed on words enclosed in braces. **(8) Backslash substitution** If a backslash (\\) appears within a word then backslash substitution occurs. In all cases but those described below the backslash is dropped and the following character is treated as an ordinary character and included in the word. This allows characters such as double quotes, close brackets, and dollar signs to be included in words without triggering special processing. The following table lists the backslash sequences that are handled specially, along with the value that replaces each sequence. \\a : Audible alert (bell) (0x7). \\b : Backspace (0x8). \\f : Form feed (0xc). \\n : Newline (0xa). \\r : Carriage-return (0xd). \\t : Tab (0x9). \\v : Vertical tab (0xb). \\`<newline>`{=html}whiteSpace : A single space character replaces the backslash, newline, and all spaces and tabs after the newline. This backslash sequence is unique in that it is replaced in a separate pre-pass before the command is actually parsed. This means that it will be replaced even when it occurs between braces, and the resulting space will be treated as a word separator if it isn\'t in braces or quotes. \\\\ : Literal backslash (\\), no special effect. \\ooo : The digits ooo (one, two, or three of them) give an eight-bit octal value for the Unicode character that will be inserted. The upper bits of the Unicode character will be 0. \\xhh : The hexadecimal digits hh give an eight-bit hexadecimal value for the Unicode character that will be inserted. Any number of hexadecimal digits may be present; however, all but the last two are ignored (the result is always a one-byte quantity). The upper bits of the Unicode character will be 0. \\uhhhh : The hexadecimal digits hhhh (one, two, three, or four of them) give a sixteen-bit hexadecimal value for the Unicode character that will be inserted. Backslash substitution is not performed on words enclosed in braces, except for backslash-newline as described above. **(9) Comments** If a hash character (#) appears at a point where Tcl is expecting the first character of the first word of a command, then the hash character and the characters that follow it, up through the next newline, are treated as a comment and ignored. The comment character only has significance when it appears at the beginning of a command. **(10) Order of substitution** Each character is processed exactly once by the Tcl interpreter as part of creating the words of a command. For example, if variable substitution occurs then no further substitutions are performed on the value of the variable; the value is inserted into the word verbatim. If command substitution occurs then the nested command is processed entirely by the recursive call to the Tcl interpreter; no substitutions are performed before making the recursive call and no additional substitutions are performed on the result of the nested script. Substitutions take place from left to right, and each substitution is evaluated completely before attempting to evaluate the next. Thus, a sequence like ``` tcl set y [set x 0][incr x][incr x] ``` will always set the variable y to the value, 012. **(11) Substitution and word boundaries** Substitutions do not affect the word boundaries of a command. For example, during variable substitution the entire value of the variable becomes part of a single word, even if the variable\'s value contains spaces. #### Comments The first rule for comments is simple: comments start with \# where the first word of a command is expected, and continue to the end of line (which can be extended, by a trailing backslash, to the following line): ``` tcl # This is a comment \ going over three lines \ with backslash continuation ``` One of the problems new users of Tcl meet sooner or later is that comments behave in an unexpected way. For example, if you comment out part of code like this: ``` tcl # if {$condition} { puts "condition met!" # } ``` This happens to work, but any unbalanced braces in comments may lead to unexpected syntax errors. The reason is that Tcl\'s grouping (determining word boundaries) happens before the \# characters are considered. To add a comment behind a command on the same line, just add a semicolon: ``` tcl puts "this is the command" ;# that is the comment ``` Comments are only taken as such where a command is expected. In data (like the comparison values in **switch**), a \# is just a literal character: ``` tcl if $condition {# good place switch -- $x { #bad_place {because switch tests against it} some_value {do something; # good place again} } } ``` To comment out multiple lines of code, it is easiest to use \"if 0\": ``` tcl if 0 { puts "This code will not be executed" This block is never parsed, so can contain almost any code - except unbalanced braces :) } ``` ### Data types In Tcl, all values are strings, and the phrase \"**Everything is a string**\" is often used to illustrate this fact. But just as `2` can be interpreted in English as \"the number 2\" or \"the character representing the number 2\", two different functions in Tcl can interpret the same value in two different ways. The command `expr`, for example, interprets \"2\" as a number, but the command `string length` interprets \"2\" as a single character. All values in Tcl can be interpreted either as characters or something else that the characters represent. The important thing to remember is that every value in Tcl is a string of characters, and each string of characters might be interpreted as something else, depending on the context. This will become more clear in the examples below. For performance reasons, versions of Tcl since 8.0 keep track of both the string value and how that string value was last interpreted. This section covers the various \"types\" of things that Tcl values (strings) get interpreted as. #### Strings A string is a sequence of zero or more characters (where all 16-bit Unicodes are accepted in almost all situations, see in more detail below). The size of strings is automatically administered, so you only have to worry about that if the string length exceeds the virtual memory size. In contrast to many other languages, strings in Tcl don\'t need quotes for markup. The following is perfectly valid: ``` tcl set greeting Hello! ``` Quotes (or braces) are rather used for grouping: ``` tcl set example "this is one word" set another {this is another} ``` The difference is that inside quotes, substitutions (like of variables, embedded commands, or backslashes) are performed, while in braces, they are not (similar to single quotes in shells, but nestable): ``` tcl set amount 42 puts "You owe me $amount" ;#--> You owe me 42 puts {You owe me $amount} ;#--> You owe me $amount ``` In source code, quoted or braced strings can span multiple lines, and the physical newlines are part of the string too: ``` tcl set test "hello world in three lines" ``` To **reverse a string**, we let an index *i* first point at its end, and decrementing *i* until it\'s zero, append the indexed character to the end of the result *res*: ``` tcl proc sreverse str { set res "" for {set i [string length $str]} {$i > 0} {} { append res [string index $str [incr i -1]] } set res } sreverse "A man, a plan, a canal - Panama" ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text amanaP - lanac a ,nalp a ,nam A ``` ```{=html} </dd> ``` ```{=html} </dl> ``` **Hex-dumping** a string: ``` tcl proc hexdump string { binary scan $string H* hex regexp -all -inline .. $hex } hexdump hello ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 68 65 6c 6c 6f ``` ```{=html} </dd> ``` ```{=html} </dl> ``` **Finding a substring** in a string can be done in various ways: ``` tcl string first $substr $str ;# returns the position from 0, or -1 if not found ``` ``` tcl string match *$substr* $str ;# returns 1 if found, 0 if not ``` ``` tcl regexp $substr $str ;# the same ``` The matching is done with exact match in *string first*, with glob-style match in *string match*, and as a regular expression in *regexp*. If there are characters in *substr* that are special to *glob* or regular expressions, using *string first* is recommended. #### Lists Many strings are also well-formed **lists**. Every simple word is a list of length one, and elements of longer lists are separated by whitespace. For instance, a string that corresponds to a list of three elements: ``` tcl set example {foo bar grill} ``` Strings with unbalanced quotes or braces, or non-space characters directly following closing braces, cannot be parsed as lists directly. You can explicitly **split** them to make a list. The \"constructor\" for lists is of course called *list*. It\'s recommended to use when elements come from variable or command substitution (braces won\'t do that). As Tcl commands are lists anyway, the following is a full substitute for the *list* command: ``` tcl proc list args {set args} ``` Lists can contain lists again, to any depth, which makes modelling of matrixes and trees easy. Here\'s a string that represents a 4 x 4 unit matrix as a list of lists. The outer braces group the entire thing into one string, which includes the literal inner braces and whitespace, including the literal newlines. The list parser then interprets the inner braces as delimiting nested lists. ``` tcl {{1 0 0 0} {0 1 0 0} {0 0 1 0} {0 0 0 1}} ``` The newlines are valid list element separators, too. Tcl\'s list operations are demonstrated in some examples: ``` tcl set x {foo bar} llength $x ;#--> 2 lappend x grill ;#--> foo bar grill lindex $x 1 ;#--> bar (indexing starts at 0) lsearch $x grill ;#--> 2 (the position, counting from 0) lsort $x ;#--> bar foo grill linsert $x 2 and ;#--> foo bar and grill lreplace $x 1 1 bar, ;#--> foo bar, grill ``` Note that only **lappend**, above is mutating. To change an element of a list (of a list\...) in place, the **lset** command is useful - just give as many indexes as needed: ``` tcl set test {{a b} {c d}} ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text {a b} {c d} ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl lset test 1 1 x ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text {a b} {c x} ``` ```{=html} </dd> ``` ```{=html} </dl> ``` The **lindex** command also takes multiple indexes: ``` tcl lindex $test 1 1 ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text x ``` ```{=html} </dd> ``` ```{=html} </dl> ``` Example: To find out whether an element is contained in a list (from Tcl 8.5, there\'s the **in** operator for that): ``` tcl proc in {list el} {expr {[lsearch -exact $list $el] >= 0}} in {a b c} b ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 1 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl in {a b c} d ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text #ignore this line, which is only here because there is currently a bug in wikibooks rendering which makes the 0 on the following line disappear when it is alone 0 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` Example: remove an element from a list variable by value (converse to lappend), if present: ``` tcl proc lremove {_list el} { upvar 1 $_list list set pos [lsearch -exact $list $el] set list [lreplace $list $pos $pos] } set t {foo bar grill} ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text foo bar grill ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl lremove t bar ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text foo grill ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl set t ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text foo grill ``` ```{=html} </dd> ``` ```{=html} </dl> ``` A simpler alternative, which also removes all occurrences of *el*: ``` tcl proc lremove {_list el} { upvar 1 $_list list set list [lsearch -all -inline -not -exact $list $el] } ``` Example: To draw a random element from a list L, we first determine its length (using *llength*), multiply that with a random number \> 0.0 and \< 1.0, truncate that to integer (so it lies between 0 and length-1), and use that for indexing (*lindex*) into the list: ``` tcl proc ldraw L { lindex $L [expr {int(rand()*[llength $L])}] } ``` Example: Transposing a matrix (swapping rows and columns), using integers as generated variable names: ``` tcl proc transpose matrix { foreach row $matrix { set i 0 foreach el $row {lappend [incr i] $el} } set res {} set i 0 foreach e [lindex $matrix 0] {lappend res [set [incr i]]} set res } transpose {{1 2} {3 4} {5 6}} ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text {1 3 5} {2 4 6} ``` ```{=html} </dd> ``` ```{=html} </dl> ``` Example: pretty-printing a list of lists which represents a table: ``` tcl proc fmtable table { set maxs {} foreach item [lindex $table 0] { lappend maxs [string length $item] } foreach row [lrange $table 1 end] { set i 0 foreach item $row max $maxs { if {[string length $item]>$max} { lset maxs $i [string length $item] } incr i } } set head + foreach max $maxs {append head -[string repeat - $max]-+} set res $head\n foreach row $table { append res | foreach item $row max $maxs {append res [format " %-${max}s |" $item]} append res \n } append res $head } ``` Testing: ``` tcl fmtable { {1 short "long field content"} {2 "another long one" short} {3 "" hello} } ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text +---+------------------+--------------------+ | 1 | short | long field content | | 2 | another long one | short | | 3 | | hello | +---+------------------+--------------------+ ``` ```{=html} </dd> ``` ```{=html} </dl> ``` **Enumerations:** Lists can also be used to implement enumerations (mappings from symbols to non-negative integers). Example for a nice wrapper around lsearch/lindex: ``` tcl proc makeEnum {name values} { interp alias {} $name: {} lsearch $values interp alias {} $name@ {} lindex $values } makeEnum fruit {apple blueberry cherry date elderberry} ``` This assigns \"apple\" to 0, \"blueberry\" to 1, etc. ``` tcl fruit: date ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 3 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl fruit@ 2 ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text cherry ``` ```{=html} </dd> ``` ```{=html} </dl> ``` #### Numbers Numbers are strings that can be parsed as such. Tcl supports integers (32-bit or even 64-bit wide) and \"double\" floating-point numbers. From Tcl 8.5 on, bignums (integers of arbitrarily large precision) are supported. Arithmetics is done with the **expr** command, which takes basically the same syntax of operators (including ternary *x?y:z*), parens, and math functions as C. See below for detailed discussion of *expr*. Control the display format of numbers with the **format** command which does appropriate rounding: ``` tcl expr 2/3. ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 0.666666666667 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl format %.2f [expr 2/3.] ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 0.67 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` Up to the 8.4 version (the present version is 8.5), Tcl honored the C convention that an integer starting with 0 is parsed as octal, so `0377 == 0xFF == 255` This changes in 8.5, though - too often people stumbled over \"08\" meant as hour or month, raised a syntax error, because 8 is no valid octal number. In the future you\'d have to write 0o377 if you really mean octal. You can do number base conversions with the *format* command, where the format is %x for hex, %d for decimal, %o for octal, and the input number should have the C-like markup to indicate its base: ``` tcl format %x 255 ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` tcl ff ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl format %d 0xff ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` tcl 255 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl format %o 255 ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 377 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl format %d 0377 ``` ```{=html} <dl> ``` ```{=html} <dd> ``` : ``` text 255 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` Variables with integer value can be most efficiently modified with the *incr* command: ``` tcl incr i ;# default increment is 1 incr j 2 incr i -1 ;# decrement with negative value incr j $j ;# double the value ``` The maximal positive integer can be determined from the hexadecimal form, with a 7 in front, followed by several \"F\" characters. Tcl 8.4 can use \"wide integers\" of 64 bits, and the maximum integer there is ``` tcl expr 0x7fffffffffffffff ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 9223372036854775807 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` Demonstration: one more, and it turns into the minimum integer: ``` tcl expr 0x8000000000000000 ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text -9223372036854775808 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` **Bignums**: from Tcl 8.5, integers can be of arbitrary size, so there is no maximum integer anymore. Say, you want a big factorial: ``` tcl proc tcl::mathfunc::fac x {expr {$x < 2? 1: $x * fac($x-1)}} expr fac(100) ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 93326215443944152681699238856266700490715968264381621468592963895217599993229915608941463976156518286253697920827223758251185210916864000000000000000000000000 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` **IEEE special floating-point values**: Also from 8.5, Tcl supports a few special values for floating-point numbers, namely *Inf* (infinity) and *NaN* (Not a Number): ``` tcl set i [expr 1/0.] ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text Inf ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl expr {$i+$i} ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text Inf ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl expr {$i+1 == $i} ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 1 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl set j NaN ;# special because it isn't equal to itself ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text NaN ``` ```{=html} </dd> ``` ```{=html} </dl> ``` ``` tcl expr {$j == $j} ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text #ignore this line, which is only here because there is currently a bug in wikibooks rendering which makes the 0 on the following line disappear when it is alone 0 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` #### Booleans Tcl supports booleans as numbers in a similar fashion to C, with 0 being false and any other number being true. It also supports them as the strings \"true\", \"false\", \"yes\" and \"no\" and few others (see below). The canonical \"true\" value (as returned by Boolean expressions) is 1. ``` tcl foreach b {0 1 2 13 true false on off no yes n y a} {puts "$b -> [expr {$b?1:0}]"} ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text 0 -> 0 1 -> 1 2 -> 1 13 -> 1 true -> 1 false -> 0 on -> 1 off -> 0 no -> 0 yes -> 1 n -> 0 y -> 1 expected boolean value but got "a" ``` ```{=html} </dd> ``` ```{=html} </dl> ``` #### Characters Characters are abstractions of writing elements (e.g. letters, digits, punctuation characters, Chinese ideographs, ligatures\...). In Tcl since 8.1, characters are internally represented with Unicode, which can be seen as unsigned integers between 0 and 65535 (recent Unicode versions have even crossed that boundary, but the Tcl implementation currently uses a maximum of 16 bits). Any Unicode U+XXXX can be specified as a character constant with an \\uXXXX escape. It is recommended to only use ASCII characters (\\u0000-\\u007f) in Tcl scripts directly, and escape all others. Convert between numeric Unicode and characters with ``` tcl set char [format %c $int] set int [scan $char %c] ``` Watch out that int values above 65535 produce \'decreasing\' characters again, while negative int even produces two bogus characters. format does not warn, so better test before calling it. Sequences of characters are called strings (see above). There is no special data type for a single character, so a single character is just a string on length 1 (everything is a string). In UTF-8, which is used internally by Tcl, the encoding of a single character may take from one to three bytes of space. To determine the bytelength of a single character: ``` tcl string bytelength $c ;# assuming [string length $c]==1 ``` String routines can be applied to single characters too, e.g \[string toupper\] etc. Find out whether a character is in a given set (a character string) with ``` tcl expr {[string first $char $set]>=0} ``` As Unicodes for characters fall in distinct ranges, checking whether a character\'s code lies within a range allows a more-or-less rough classification of its category: ``` tcl proc inRange {from to char} { # generic range checker set int [scan $char %c] expr {$int>=$from && $int <= $to} } interp alias {} isGreek {} inRange 0x0386 0x03D6 interp alias {} isCyrillic {} inRange 0x0400 0x04F9 interp alias {} isHangul {} inRange 0xAC00 0xD7A3 ``` This is a useful helper to convert all characters beyond the ASCII set to their \\u\.... escapes (so the resulting string is strict ASCII): ``` tcl proc u2x s { set res "" foreach c [split $s ""] { scan $c %c int append res [expr {$int<128? $c :"\\u[format %04.4X $int]"}] } set res } ``` #### Internal representation In the main Tcl implementation, which is written in C, each value has both a string representation (UTF-8 encoded) and a structured representation. This is an implementation detail which allows for better performance, but has no semantic impact on the language. Tcl tracks both representations, making sure that if one is changed, the other one is updated to reflect the change the next time it is used. For example, if the string representation of a value is \"8\", and the value was last used as a number in an \[expr\] command, the structured representation will be a numeric type like a signed integer or a double-precision floating point number. If the value \"one two three\" was last used in one of the list commands, the structured representation will be a list structure. There are various other \"types\" on the C side which may be used as the structured representation. As of Tcl 8.5, only the most recent structured representation of a value is stored, and it is replaced with a different representation when necessary. This \"dual-porting\" of values helps avoid, repeated parsing or \"stringification\", which otherwise would happen often because each time a value is encountered in source code, it is interpreted as a string prior to being interpreted in its current context. But to the programmer, the view that \"everything is a string\" is still maintained. These values are stored in reference-counted structures termed objects (a term that has many meanings). From the perspective of all code that uses values (as opposed to code implementing a particular representation), they are immutable. In practice, this is implemented using a copy-on-write strategy. ### Variables Variables can be local or global, and scalar or array. Their names can be any string not containing a colon (which is reserved for use in namespace separators) but for the convenience of \$-dereference one usually uses names of the pattern \[A-Za-z0-9\_\]+, i.e. one or more letters, digits, or underscores. Variables need not be declared beforehand. They are created when first assigned a value, if they did not exist before, and can be unset when no longer needed: ``` tcl set foo 42 ;# creates the scalar variable foo set bar(1) grill ;# creates the array bar and its element 1 set baz $foo ;# assigns to baz the value of foo set baz [set foo] ;# the same effect info exists foo ;# returns 1 if the variable foo exists, else 0 unset foo ;# deletes the variable foo ``` Retrieving a variable\'s value with the \$foo notation is only syntactic sugar for \[set foo\]. The latter is more powerful though, as it can be nested, for deeper dereferencing: ``` tcl set foo 42 set bar foo set grill bar puts [set [set [set grill]]] ;# gives 42 ``` Some people might expect *\$\$\$grill* to deliver the same result, but it doesn\'t, because of the Tcl parser. When it encounters the first and second \$ sign, it tries to find a variable name (consisting of one or more letters, digits, or underscores) in vain, so these \$ signs are left literally as they are. The third \$ allows substitution of the variable *grill*, but no backtracking to the previous \$\'s takes place. So the evaluation result of *\$\$\$grill* is *\$\$bar*. Nested \[set\] commands give the user more control. #### Local vs. global A local variable exists only in the procedure where it is defined, and is freed as soon as the procedure finishes. By default, all variables used in a proc are local. Global variables exist outside of procedures, as long as they are not explicitly unset. They may be needed for long-living data, or implicit communication between different procedures, but in general it\'s safer and more efficient to use globals as sparingly as possible. Example of a very simple bank with only one account: ``` tcl set balance 0 ;# this creates and initializes a global variable proc deposit {amount} { global balance set balance [expr {$balance + $amount}] } proc withdraw {amount} { set ::balance [expr {$::balance - $amount}] } ``` This illustrates two ways of referring to global variables - either with the **global** command, or by qualifying the variable name with the :: prefix. The variable *amount* is local in both procedures, and its value is that of the first argument to the respective procedure. Introspection: ``` tcl info vars ;#-- lists all visible variables info locals info globals ``` To make all global variables visible in a procedure (not recommended): ``` tcl eval global [info globals] ``` #### Scalar vs. array All of the value types discussed above in *Data types* can be put into a scalar variable, which is the normal kind. Arrays are collections of variables, indexed by a key that can be any string, and in fact implemented as hash tables. What other languages call \"arrays\" (vectors of values indexed by an integer), would in Tcl rather be lists. Some illustrations: ``` tcl #-- The key is specified in parens after the array name set capital(France) Paris #-- The key can also be substituted from a variable: set country France puts $capital($country) #-- Setting several elements at once: array set capital {Italy Rome Germany Berlin} #-- Retrieve all keys: array names capital ;#-- Germany Italy France -- quasi-random order #-- Retrieve keys matching a glob pattern: array names capital F* ;#-- France ``` A fanciful array name is \"\" (the empty string, therefore we might call this the \"anonymous array\" :) which makes nice reading: ``` tcl set (example) 1 puts $(example) ``` Note that arrays themselves are not values. They can be passed in and out of procedures not as *\$capital* (which would try to retrieve the value), but by reference. The **dict** type (available from Tcl 8.5) might be better suited for these purposes, while otherwise providing hash table functionality, too. #### System variables At startup, tclsh provides the following global variables: argc : number of arguments on the command line\ argv : list of the arguments on the command line\ argv0 : name of the executable or script (first word on command line)\ auto_index : array with instructions from where to load further commands\ auto_oldpath : (same as auto_path ?)\ auto_path : list of paths to search for packages\ env : array, mirrors the environment variables\ errorCode : type of the last error, or {}, e.g. ARITH DIVZERO {divide by zero}\ errorInfo : last error message, or {}\ tcl_interactive : 1 if interpreter is interactive, else 0\ tcl_libPath : list of library paths\ tcl_library : path of the Tcl system library directory\ tcl_patchLevel : detailed version number, e.g. 8.4.11\ tcl_platform : array with information on the operating system\ tcl_rcFileName : name of the initial resource file\ tcl_version : brief version number, e.g. 8.4 One can use temporary environment variables to control a Tcl script from the command line, at least in Unixoid systems including Cygwin. Example scriptlet: ``` tcl set foo 42 if [info exists env(DO)] {eval $env(DO)} puts foo=$foo ``` This script will typically report ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text foo=42 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` To remote-control it without editing, set the DO variable before the call: ``` bash DO='set foo 4711' tclsh myscript.tcl ``` which will evidently report ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text foo=4711 ``` ```{=html} </dd> ``` ```{=html} </dl> ``` #### Dereferencing variables A *reference* is something that refers, or points, to another something (if you pardon the scientific expression). In C, references are done with \*pointers\* (memory addresses); in Tcl, references are strings (everything is a string), namely names of variables, which via a hash table can be resolved (dereferenced) to the \"other something\" they point to: ``` tcl puts foo ;# just the string foo puts $foo ;# dereference variable with name of foo puts [set foo] ;# the same ``` This can be done more than one time with nested set commands. Compare the following C and Tcl programs, that do the same (trivial) job, and exhibit remarkable similarity: ``` c #include <stdio.h> int main(void) { int i = 42; int * ip = &i; int ** ipp = &ip; int ***ippp = &ipp; printf("hello, %d\n", ***ippp); return 0; } ``` \...and Tcl: ``` tcl set i 42 set ip i set ipp ip set ippp ipp puts "hello, [set [set [set [set ippp]]]]" ``` The asterisks in C correspond to calls to `set` in Tcl dereferencing. There is no corresponding operator to the C `&` because, in Tcl, special markup is not needed in declaring references. The correspondence is not perfect; there are four `set` calls and only three asterisks. This is because mentioning a variable in C is an implicit dereference. In this case, the dereference is used to pass its value into printf. Tcl makes all four dereferences explicit (thus, if you only had 3 set calls, you\'d see hello, i). A single dereference is used so frequently that it is typically abbreviated with \$varname, e.g. ``` tcl puts "hello, [set [set [set $ippp]]]" ``` has set where C uses asterisks, and \$ for the last (default) dereference. The hashtable for variable names is either global, for code evaluated in that scope, or local to a proc. You can still \"import\" references to variables in scopes that are \"higher\" in the call stack, with the upvar and global commands. (The latter being automatic in C if the names are unique. If there are identical names in C, the innermost scope wins). #### Variable traces One special feature of Tcl is that you can associate traces with variables (scalars, arrays, or array elements) that are evaluated optionally when the variable is read, written to, or unset. Debugging is one obvious use for that. But there are more possibilities. For instance, you can introduce constants where any attempt to change their value raises an error: ``` tcl proc const {name value} { uplevel 1 [list set $name $value] uplevel 1 [list trace var $name w {error constant ;#} ] } const x 11 incr x ``` ```{=html} <dl> ``` ```{=html} <dd> ``` ``` text can't set "x": constant ``` ```{=html} </dd> ``` ```{=html} </dl> ``` The trace callback gets three words appended: the name of the variable; the array key (if the variable is an array, else \"\"), and the mode: - r - read - w - write - u - unset If the trace is just a single command like above, and you don\'t want to handle these three, use a comment \";#\" to shield them off. Another possibility is tying local objects (or procs) with a variable - if the variable is unset, the object/proc is destroyed/renamed away.
# Tcl Programming/Functions ### Commands ------------------------------------------------------------------------ Commands are basically divided into C-defined ones, procedures, and aliases (and, from Tcl 8.5 onwards, ensembles). You can rename any command with `rename oldname newname` To delete a command (make it no more reachable), use the empty string as new name: `rename oldname {}` Introspection: Get a list of all defined commands with `info commands` #### C-defined commands These are implemented in C and registered to be available in the Tcl interpreter. They can come from the Tcl core, or a loaded shared library (DLL) - for instance Tk. To get a list of built-in commands, subtract the result of *info procs* from that of *info commands*: `set builtins {}`\ `set procs [info procs]`\ `foreach cmd [info commands] {`\ `   if {[lsearch -exact $procs $cmd] == -1} {lappend builtins $cmd}`\ `}` The following C-defined commands are available in a fresh tclsh. For detailed documentation, see the respective man pages, e.g. at <http://www.tcl.tk/man/tcl8.5/TclCmd/> - I will characterize each only very briefly: after : group of commands for timed events\ after *msec ?script?* : waits, or executes the script after, some time\ append *varName arg..*: appends the arguments to a string variable\ array : group of commands for arrays\ binary : group of commands for binary scanning and formatting\ break : terminate current loop\ case : deprecated, use **switch**\ catch *script ?varName?* : catch possible error in *script*\ cd *path* : change working directory\ clock : group of commands dealing with date and time\ close *handle* : closes a channel (file, socket, etc.)\ concat *list..* : make one space-separated list of the arguments\ continue : start next turn of current loop\ encoding : group of commands dealing with character set encoding\ eof *handle* : 1 if channel is at end of file, else 0\ error *message ?info? ?code?* : raise an error with the given message\ eval *arg..* : evaluate the arguments as script\ exec *file arg..* : execute a separate process\ exit *?int?* : terminate this process, return status 0..127\ expr *arg..* : arithmetic and logic engine, using C-like syntax and functions (variables referenced with \$name). In addition, from Tcl 8.4 there are *eq* and *ne* operators for string equal or not; from 8.5, also *in* and *ni* operators for list inclusion or not `expr {"foo" in {foo bar grill}} == 1` The argument to expr should in most cases be {braced}. This prevents the Tcl parser from substituting variables in advance, while *expr* itself has to parse the value from the string. In a braced expression *expr* can parse variable references itself, and get their numeric value directly where possible. Much faster, usually. The only exception, where bracing should not be used, is if you want to substitute operators from variables: `foreach op {+ - * /} {puts [expr 1 $op 2]}` fblocked *handle* : returns 1 if the last input operation exhausted all available input, else 0\ fconfigure *handle -option value\...* : configure a channel, e.g. its encoding or line-end translation\ fcopy *handle1 handle2* : copy data from handle1 to handle2\ file : group of commands dealing with files\ fileevent : group of commands dealing with events from channels (readable, writable) but not files\ flush *handle* : make sure the channel\'s buffer is written out. Useful after *puts -nonewline*\ for *initbody condition stepbody body* : loop, somehow similar to C\'s *for*\ foreach *varlist list ?varlist list\...? body* : loop over one or more lists, The *varlist*s can be a single or multiple varNames. Example: `% foreach {x y} {1 0  1 2  0 2  0 0} {puts "x:$x, y:$y"}`\ `x:1, y:0`\ `x:1, y:2`\ `x:0, y:2`\ `x:0, y:0` format *fstring arg..* : put the arguments %-formatted into fstring, similar to C\'s sprintf()\ gets *handle ?varName?* : read a line from handle. If variable is given, assigns the line to it and returns the number of characters read; else returns the line. Guaranteed to be safe against buffer overflows\ glob *?-options? pattern..* : list of files matching the glob pattern (which can contain \* and ? wildcards)\ global *varName..* : declare the given variable(s) as global\ history : list the last interactive commands\ if *condition ?then? body1 ?elseif condition body2\...? ??else? bodyN?* : conditional\ incr *varName ?amount?* : increments the integer variable by given amount (defaults to 1). Use negative amount to decrement\ info : group of commands for introspection\ interp : group of commands for interpreters\ join *list ?separator?* : Turn a list into a string, with separator between elements (defaults to \" \")\ lappend *varName arg..* : appends the arguments to the list variable. Can also be used to make sure a variable exists: `lappend x ;# corresponds to: if {![info exists x]} {set x ""}` lindex *list int..* : retrieve an element from the list by integer index(es)\ linsert *list int arg..* : inserts the arguments at int position into list\ list *?arg..?* : creates a list from the arguments\ llength *list* : length of the list\ load *filename ?name?* : loads a shared library (DLL)\ lrange *list from to* : returns a sublist at integer indexes from-to\ lreplace *list from to arg..* : replaces the sublist in list with the arguments\ lsearch *?-options? list element* : searches the list for the element, returns its integer index, or -1 if not found. Can be used to select a subset of elements from a list (using the -all option)\ lset *varName int.. value* : sets an existing element in the named list variable, indexed by integer(s), to the given value\ lsort *?-options? list* : sorts the list\ namespace : group of commands dealing with namespaces\ open *name ?mode ?permissions??* : opens a file or pipe, returns the handle\ package : group of commands dealing with packages\ pid *?handle?*: returns the id of the current process. Can also return the list of pids for a pipeline given the pipeline channel ```{=html} <!-- --> ``` proc *name arglist body* : defines a procedure\ puts *?-nonewline? ?channel? string* : outputs a line to the given channel (default stdout) To prevent errors from closed pipe (like *more* or *head*), use `proc puts! str {if [catch {puts $str}] exit}` pwd : returns the current working directory\ read *handle ?int?* : reads int bytes from handle (all if int not given)\ regexp *?-options? re string ?varName\...?* : regular expression matching of re in string, possibly assigning parenthesized submatches to the given variables\ regsub *?-options? re value substring ?varName?*: substitutes occurrences of the regular expression re in value with substring. If varName is given, assigns the new value to it, and returns the number of substitutions; else returns the new value\ rename *cmdName1 cmdName2*: renames a command from cmdName1 to cmdName2, or deletes cmdName1 if cmdName2 is {}\ return *?value?* : exits from the current proc or sourced script\ scan *string format ?varName\...?* : extracts values by %-format in string to the given variables. Similar to C\'s sscanf()\ seek *channelId offset ?origin?* : moves pointer in file to the given position\ set *varName ?value?* : sets variable to value if given, and returns the variable\'s value\ socket *?-myaddr addr? ?-myport myport? ?-async? host port* : open the client side of a TCP connection as a channel\ socket *-server command ?-myaddr addr? port* : open the server side of a TCP connection, register a handler callbacvk command for client requests\ source *filename* : evaluate the contents of the given file\ split *list ?charset?* : splits a string into a list, using any of the characters in charset string as delimiters (defaults to \" \")\ string : group of commands dealing with strings\ subst *?-options? string* : performs command, variable, and/or backslash substitutions in string\ switch *?-options? ?\--? value alternatives* : performs one of the alternatives if the value matches\ tell *handle* : return the byte position inside a file\ time *body ?int?* : runs the body for int times (default 1), returns how many microseconds per iteration were used\ trace : group of commands to tie actions to variables or commands\ unset *varName..* : delete the given variable(s)\ update *?idletasks?* : services events\ uplevel *?level? body* : evaluates the body up in the call stack\ upvar *?level? varName localVarName\...* : ties the given variables up in the call stack to the given local variables. Used for calling by reference, e.g. for arrays\ variable *varName ?value ?varName value\...??* : declare the variables as being non-local in a namespace\ vwait *varName* : suspend execution until the given variable has changed. Starts event loop, if not active yet\ while *condition body*: performs body as long as condition is not 0 #### Procedures Procedures in Tcl cover what other languages call procedures, subroutines, or functions. They always return a result (even if it is the empty string \"\"), so to call them functions might be most appropriate. But for historical reasons, the Tcl command to create a function is called **proc** and thus people most often call them procedures. `proc name argumentlist body` Examples: `proc sum {a b} {return [expr {$a+$b}]}` The *return* is redundant, as the proc returns anyway when reaching its end, and returning its last result: `proc sum {a b} {expr {$a+$b}}` The following variant is more flexible, as it takes any number of arguments (the special argument name *args* collects all remaining arguments into a list, which is the value of the parameter *args*): `proc sum args {`\ `    set res 0`\ `    foreach arg $args {set res [expr {$res + $arg}]}`\ `    return $res`\ `}` An elegant but less efficient alternative builds a string by *join*ing the *args* with plus signs, and feeds that to *expr*: `proc sum args {expr [join $args +]}` If an argument in a proc definition is a list of two elements, the second is taken as default value if not given in the call (\"Sir\" in this example): `proc greet {time {person Sir}} {return "good $time, $person"}` `% greet morning John`\ `good morning, John`\ `% greet evening`\ `good evening, Sir` **Introspection:** Get the names of all defined procedures with `info procs` There are also **info** subcommands to get the argument list, and possible default arguments, and body of a proc. The following example combines them to recreate the textual form of a proc, given its name (*corp* being *proc* in reverse): `proc corp name {`\ `   set argl {}`\ `   foreach arg [info args $name] {`\ `      if [info default $name $arg def] {lappend arg $def}`\ `      lappend argl $arg`\ `   }`\ `   list proc $name $argl [info body $name]`\ `}` Using **rename**, you can overload any command, including the C-coded ones. First rename the original command to something else, then reimplement it with the same signature, where ultimately the original is called. Here is for instance an overloaded *proc* that reports if a procedure is defined more than once with same name: `rename proc _proc`\ `_proc proc {name argl body} {`\ `   if {[info procs $name] eq $name} {`\ `       puts "proc $name redefined in [info script]"`\ `   }`\ `   _proc $name $argl $body`\ `}` **Named arguments:** Arguments to commands are mostly by position. But it\'s very easy to add the behavior known from Python or Ada, that arguments can be named in function calls, which documents the code a bit better, and allows any order of arguments. The idea (as found in Welch\'s book) is to use an array (here called \"\" - the \"anonymous array\") keyed by argument names. Initially, you can set some default values, and possibly override them with the args of the proc (which has to be paired, i.e. contain an even number of elements): `proc named {args defaults} {`\ `   upvar 1 "" ""`\ `   array set "" $defaults`\ `   foreach {key value} $args {`\ `     if {![info exists ($key)]} {`\ `        set names [lsort [array names ""]]`\ `        error "bad option '$key', should be one of: $names"`\ `     }`\ `     set ($key) $value`\ `   }`\ `}` Usage example: `proc replace {s args} {`\ `  named $args {-from 0 -to end -with ""}`\ `  string replace $s $(-from) $(-to) $(-with)`\ `}` Testing: `% replace suchenwirth -from 4 -to 6 -with xx`\ `suchxxirth`\ `% replace suchenwirth -from 4 -to 6 -witha xx`\ `bad option '-witha', should be one of: -from -to -with` #### Argument passing by name or value Normally, arguments to commands are passed by value (as constants, or with \$ prefixed to a variable name). This securely prevents side-effects, as the command will only get a copy of the value, and not be able to change the variable. However, sometimes just that is wanted. Imagine you want a custom command to set a variable to zero. In this case, at call time specify the name of the variable (without \$), and in the proc use **upvar** to link the name (in the scope \"1 up\", i.e. the caller\'s) to a local variable. I usually put a \"\_\" before arguments that are variable names (e.g. \_var), and *upvar* to the same name without \"\_\" (e.g. var): `% proc zero _var {upvar 1 $_var var; set var 0}` `% set try 42`\ `42`\ `% zero try`\ `0`\ `% set try`\ `0` If you often use call by reference, you could indicate such arguments with a special pattern (e.g. &arg) and have the following code generate the necessary **upvar**s: `proc use_refs { {char &}} {`\ `   foreach v [uplevel 1 {info locals}] {`\ `       if [string match $char* $v] {`\ `           uplevel 1 "upvar 1 \${$v} [string range $v 1 end]"`\ `       }`\ `   }`\ `}` That\'s all. This command is preferably called first inside a proc, and upvars all arguments that begin with a specific character, the default being \"&\" - it runs code like `upvar 1 ${&foo} foo` in the caller\'s scope. Testing: `proc test_refs {a &b} {`\ `   use_refs`\ `   puts a=$a,b=$b`\ `   set b new_value`\ `}`\ `% set bar 42`\ `42`\ `% test_refs foo bar`\ `a=foo,b=42` So the values of a (by value) and b (by reference) are readable; and the side effect of changing b in the caller did also happen: `% set bar`\ `new_value` #### Variable scope Inside procedures, variables are by default local. They exist only in the proc, and are cleared up on *return*. However, you can tie local variables to others higher in the call stack (e.g. in the caller), up to the topmost global scope. Examples: `proc demo arg {`\ `   global g`\ `   set    g 0            ;# will effect a lasting change in g`\ `   set local 1           ;# will disappear soon`\ `   set ::anotherGlobal 2 ;# another way to address a global variable`\ `   upvar 1 $arg myArg    ;# make myArg point at a variable 1-up`\ `   set          myArg 3  ;# changes that variable in the calling scope`\ `}` #### Aliases One can also define a command as an alias to a sequence of one or more words, which will be substituted for it before execution. (The funny {} arguments are names of the source and target interpreter, which typically is the current one, named by the empty string {} or \"\"). Examples: `interp alias {} strlen {} string length`\ `interp alias {} cp     {} file copy -force` Introspection: Get the names of all defined aliases with `interp aliases` ------------------------------------------------------------------------ ### Advanced concepts ------------------------------------------------------------------------ #### Interpreters Tcl being an interpreted (plus on-the-fly byte-compiled) language, an interpreter is of course a central kind of object. Every time Tcl is running, at least one interpreter is running, who takes scripts and evaluates them. One can also create further \"slave\" interpreters to encapsulate data and processes, which again can have their \"sub-slaves\", etc., ultimately forming a tree hierarchy. Examples: `% interp create helper`\ `helper`\ `% helper eval {expr 7*6}`\ `42`\ `% interp delete helper`\ `% helper eval {expr 1+2}`\ `invalid command name "helper"` By deleting an interpreter, all its global (and namespaced) variables are freed too, so you can use this for modularisation and encapsulation, if needed. In particular, **safe interpreters** have intentionally limited capabilities (for instance, access to the file system or the Web) so that possibly malicious code from over the Web cannot create major havoc. Introspection: The following command lists the sub-interpreters (\"slaves\") of the current interpreter: `% interp slaves` #### Ensembles Ensembles, (from Tcl 8.5 on), are commands that are composed out of sub-commands according to a standard pattern. Examples include Tcl\'s built-in **chan** and **clock** commands. Dispatching of subcommands, as well as informative error message for non-existing subcommands, is built-in. Subcommands are in a *dict* structure called \"-map\", with alternating name and action. Very simple example: `namespace ensemble create -command foo -map \`\ `      {bar {puts Hello} grill {puts World}}` creates a command *foo* that can be called like `% foo bar`\ `Hello`\ `% foo grill`\ `World`\ `% foo help`\ `unknown or ambiguous subcommand "help": must be foo, or bar` Obviously, ensembles are also a good base for implementing object orientation, where the command is the name of the objects, and the map contains its methods. **Introspection:** Serialize an ensemble\'s map with `namespace ensemble configure $name -map` #### Namespaces Namespaces are containers for procedures, non-local variables, and other namespaces. They form a tree structure, with the root at the global namespace named \"::\". Their names are built with :: as separators too, so *::foo::bar* is a child of *::foo*, which is a child of *::* (similar to pathnames on Unix, where / is the separator as well as the root). In a nutshell, a namespace is a separate area, or *scope*, where procedures and variables are visible and private to that scope. To create a namespace, just *eval*uate some script (which may be empty) in it: `namespace eval ::foo {}` Now you can use it to define procedures or variables: `proc ::foo::test {} {puts Hello!}`\ `set  ::foo::var 42` To get rid of a namespace (and clean up all its variables, procs, and child namespaces): `namespace delete ::foo` Introspection: `namespace children ::`\ `info var namespace::*`\ `info commands namespace::*` The following code gives an approximate size in bytes consumed by the variables and children of a Tcl namespace (of which ::, the global namespace, is of particular interest - all the (grand)\*children are also added). If you call this proc repeatedly, you can observe whether data are piling up: `proc namespace'size ns {`\ `  set sum [expr wide(0)]`\ `  foreach var [info vars ${ns}::*] {`\ `      if {[info exists $var]} {`\ `          upvar #0 $var v`\ `          if {[array exists v]} {`\ `              incr sum [string bytelength [array get v]]`\ `          } else {`\ `              incr sum [string bytelength $v]`\ `          }`\ `      }`\ `  }`\ `  foreach child [namespace children $ns] {`\ `      incr sum [namespace'size $child]`\ `  }`\ `  set sum`\ `}` Usage example: `% puts [namespace'size ::]`\ `179914` #### Threads Tcl users have traditionally been skeptical about threads (lightweight concurrent sub-processes) - the event loop model has proved pretty powerful, and simpler to debug. Originally from Tk, the event loop has moved into Tcl and serves - fileevents (more on channels than real files) - timed events - UI events (mouse or keyboard actions by the user) However, there is a growing tendency to enable threads in Tcl builds. The underlying model is that every thread runs in an interpreter of its own, so it is mostly encapsulated from the rest of the world. Communication between threads must be done with explicit methods. ### Packages and extensions Packages are Tcl\'s recommended way to modularize software, especially supportive libraries. The user most often uses the command `package require name ?version?` One can write packages in pure Tcl, or as wrappers for extensions which come with one or more compiled shared libraries (plus optionally one or more Tcl scripts). Popular extensions are: - BWidget (adds useful widgets to Tk - more below) - Expect (supports remote execution over networks) - Img (adds support of additional image file formats to Tk) - snack (sound input/output) - Snit (OO extension, with support for \"megawidgets\" in Tk) - sqlite (a tiny yet powerful SQL database) - tcllib (a collection of pure-Tcl packages - see below) - TclOO (the canonical object-orientation extension from 8.5) - tcltcc (a built-in C compiler - see below) - TclX (collection of system-related extensions, like signal handling) - tdom (XML parser, SAX or DOM, with XPath query support) - Tk (the cross-platform GUI toolkit, see below) - tkcon (a vastly extended console) - XOTcl (advanced dynamic OO extension) #### A little example package The following script creates the trivial but educational package futil, which in a namespace of the same name implements two procs for reading and writing complete text files, and the little introspection helper function, futil::?. The command to register the package (package provide) is executed only after all went well - this way, buggy source code, which raises an error during package require, will not be registered. (Other bugs you\'d have to spot and fix for yourself\...) Common Tcl distribution practice has the good habit of profound testing, typically in a separate test directory. On the other hand, including a self-test in the same file with the code makes editing easier, so after the package provide comes a section only executed if this file is sourced as a top- level script, which exercises the commands defined in futil. Whether the string read should be equal to the string written is debatable - the present implementation appends \\n to the string if it doesn\'t end in one, because some tools complain or misbehave if they don\'t see a final newline. If the tests do not run into an error either, even the required construction of a package index is fired - assuming the simplified case that the directory contains only one package. Otherwise, you\'d better remove these lines, and take care of index creation yourself. A script that uses this package will only have to contain the two lines `lappend ::auto_path ``<directory of this file>`{=html}\ `package require futil` You can even omit the first line, if you install (copy) the directory with the source and pkgIndex.tcl below \${tcl_install_directory}/lib. } `namespace eval futil {`\ `    set version 0.1`\ `}` But now back to the single script that makes up the package (it would make sense to save it as *futil.tcl*). We provide a *read* and a *write* function in the *futil* namespace, plus a little introspection function *?* that returns the names of available functions: `proc futil::read {filename} {`\ `   set fp [open $filename]`\ `   set string [::read $fp] ;# prevent name conflict with itself`\ `   close $fp`\ `   return $string`\ `}`\ `proc futil::write {filename string} {`\ `   set fp [open $filename w]`\ `   if {[string index $string end]!="\n"} {append string \n}`\ `   puts -nonewline $fp $string`\ `   close $fp`\ `}`\ `proc futil::? {} {lsort [info procs ::futil::*]}`\ `# If execution comes this far, we have succeeded ;-)`\ `package provide futil $futil::version` `#--------------------------- Self-test code`\ `if {[info ex argv0] && [file tail [info script]] == [file tail $argv0]} {`\ `   puts "package futil contains [futil::?]"`\ `   set teststring {`\ `       This is a teststring`\ `       in several lines...}`\ `   puts teststring:'$teststring'`\ `   futil::write test.tmp $teststring`\ `   set string2 [futil::read test.tmp]`\ `   puts string2:'$string2'`\ `   puts "strings are [expr {$teststring==$string2? {}:{not}}] equal"`\ `   file delete test.tmp ;# don't leave traces of testing` `   # Simple index generator, if the directory contains only this package`\ `   pkg_mkIndex -verbose [file dirn [info scr]] [file tail [info scr]]`\ `}` #### Tcllib Tcllib is a collection of packages in pure Tcl. It can be obtained from sourceForge, but is also part of ActiveTcl. The following list of contained packages may not be complete, as Tcllib is steadily growing\... - aes - Advanced Encryption Standard. - asn - asn.1 BER encoder/decoder - http/autoproxy - code to automate the use of HTTP proxy servers - base64 - Base64 encoding and decoding of strings and files. - bee - BitTorrent serialization encoder/decoder. - bibtex - Neil Madden\'s parser for bibtex files. Not fully complete yet, therefore not set for installation. - calendar - Calendar operations (see also tcllib calendar module). - cmdline - Various form of command line and option processing. - comm - Socket based interprocess communication. Emulates the form of Tk\'s send command. - control - procedures for tcl flow structures such as assert, do/until, do/while, no-op - counter - procedures for counters and histograms - crc - Computation of various CRC checksums for strings and files. - csv - manipulate comma separated value data - des - Data Encryption Standard. ::DES::des (not yet installed) - dns - interact with the Domain Name Service. <dns::address>, <dns::cleanup>, <dns::cname>, <dns::configure>, <dns::name>, <dns::reset>, <dns::resolve>, <dns::status>, <dns::wait>, - doctools - System for writing manpages/documentation in a simple, yet powerful format. - exif - exif::analyze exif::fieldnames - fileutil - Utilities for operating on files, emulating various unix command line applications (cat, find, file(type), touch, \...). - ftp - Client side implementation of FTP (File Transfer Protocol). In dire need of a rewrite. - ftpd - Server side implementation of FTP - grammar_fa - Operations on finite automatons. - html - generate HTML from a Tcl script. html::author, html::author, html::bodyTag, html::cell, html::checkbox, html::checkSet, html::checkValue, html::closeTag, html::default, html::description, html::description, html::end, html::eval, html::extractParam, html::font, html::for, html::foreach, html::formValue, html::getFormInfo, html::getTitle, html::h, html::h1, html::h2, html::h3, html::h4, html::h5, html::h6, html::hdrRow, html::head, html::head, html::headTag, html::if, html::init, html::init, html::keywords, html::keywords, html::mailto, html::meta, html::meta, html::minorList, html::minorMenu, html::openTag, html::paramRow, html::passwordInput, html::passwordInputRow, html::radioSet, html::radioValue, html::refresh, html::refresh, html::row, html::select, html::selectPlain, html::set, html::submit, html::tableFromArray, html::tableFromList, html::tagParam, html::textarea, html::textInput, html::textInputRow, html::title, html::title, html::urlParent, html::varEmpty, html::while, - htmldoc - This is not a true module but the place where tcllib 1.3 installed the tcllib documentation in HTML format. - htmlparse - procedures to permit limited manipulation of strings containing HTML. ::htmlparse::parse, ::htmlparse::debugCallback, ::htmlparse::mapEscapes, ::htmlparse::2tree, ::htmlparse::removeVisualFluff, ::htmlparse::removeFormDefs, - ident - RFC 1413 ident client protocol implementation - imap4 - currently undocumented code for interacting with an IMAP server - inifile - code to manipulate an initialization file. ::ini::open, ::ini::close, ::ini::commit, ::ini::sections, ::ini::keys, ::ini::value - dns/ip - Manipulation of IP addresses. ::ip::version, ::ip::is, ::ip::normalize, ::ip::equal, ::ip::prefix - irc - Internet Relay Chat procedures. <irc::config>, <irc::connection>, - javascript - generate Javascript for including in HTML pages. <javascript::BeginJS>, <javascript::EndJS>, <javascript::MakeMultiSel>, <javascript::MakeClickProc>, <javascript::makeSelectorWidget>, <javascript::makeSubmitButton>, <javascript::makeProtectedSubmitButton>, <javascript::makeMasterButton>, <javascript::makeParentCheckbox>, <javascript::makeChildCheckbox> - jpeg - edit comment blocks, get image dimensions and information, read exif data of images in the JPG format - ldap - Client side implementation of LDAP (Lightweight Directory Access Protocol). - log - general procedures for adding log entries to files ::log::levels, ::log::logMsg, ::log::lv2longform, ::log::lv2color,::log::lv2priority, - logger - ::logger::walk, ::logger::services, ::logger::enable, ::logger::disable (part of the log module) - math - general mathematical procedures. ::math::calculus, ::math::combinatorics, ::math::cov, ::math::fibonacci, ::math::integrate, ::math::interpolate, ::math::max, ::math::mean, ::math::min, ::math::optimize, ::math::product, ::math::random, ::math::sigma, ::math::statistics, ::math::stats, ::math::sum - md4 - ::md4::md4, ::md4::hmac, ::md4::MD4Init, ::md4::MD4Update, ::md4::MD4Final - md5 - \[fill in the description of this module\] ::md5::md5, ::md5::hmac, ::md5::test, ::md5::time, ::md5::\<\<\< - md5crypt - ::md5crypt::md5crypt, ::md5crypt::aprcrypt - mime - ::mime::initialize, ::mime::parsepart, ::mime::finalize, ::<smtp::sendmessage> - multiplexer - \[fill in the external interfaces\] - ncgi - procedures for use in a CGI application. ::ncgi::reset, ::ncgi::urlStub, ::ncgi::urlStub - nntp - routines for interacting with a usenet news server. ::<nntp::nntp>, ::<nntp::NntpProc>, ::<nntp::NntpProc>, ::<nntp::okprint>, ::<nntp::message>, - ntp - network time protocol procedure ::ntp::time - png - edit comment blocks, get image dimensions and information for Portable Network Graphics format. - pop3 - Post Office Protocol functions for reading mail from a pop3 server. ::pop3::open, ::pop3::close, ::pop3::status, - pop3d - Post Office Protocol Server. pop3d::new - profiler - ::profiler::tZero, ::profiler::tMark, ::profiler::stats, ::profiler::Handler, ::profiler::profProc, ::profiler::init - rc4 - stream encryption. ::rc4::rc4 - report - format text in various report styles. ::report::report , ::report::defstyle, ::report::rmstyle, - sha1 - ::sha1::sha1, ::sha1::hmac - smtpd - ::smtpd::start, ::smtpd::stop, ::smtpd::configure, ::smtpd::cget - snit - Snit\'s Not Incr Tcl - OO package. Delegation based. ::snit::type, ::snit::widget, ::snit::widgetadaptor - soundex::knuth - string matching based on theoretical sound of the letters - stooop - OO package. stooop::class, stooop::virtual, stooop::new, stooop::delete, stooop::classof - struct1 - Version 1 of struct (see below), provided for backward compatibility. : : struct::list, ::struct::graph, ::struct::matrix, ::struct::queue, ::struct::stack, ::struct::Tree, ::struct::record, ::struct::skiplist, ::struct::prioqueue, new: ::struct::sets - tar - untar, list, and stat files in tarballs and create new tarballs - textutil - Utilities for working with larger bodies of texts. textutil::expand - the core for the expand macro processor. - tie - Persistence for Tcl arrays. - treeql - Tree Query Language, inspired by COST. - uri - Handling of uri/urls (splitting, joining, \...) - uuid - Creation of unique identifiers. #### TclOO TclOO is a loadable package to provide a foundation for object orientation, designed so that specific OO flavors like Itcl, Snit, or XOTcl can build on it. But it\'s a usable OO system in itself, offering classes, multiple inheritance, mixins and filters. Here is some example code to give you an impression: `#!/usr/bin/env tclsh85`\ `package require TclOO`\ `namespace import oo::*`\ `class create Account {`\ `   constructor { {ownerName undisclosed}} {`\ `       my variable total overdrawLimit owner`\ `       set total 0`\ `       set overdrawLimit 10`\ `       set owner $ownerName`\ `   }`\ `   method deposit amount {`\ `       my variable total`\ `       set total [expr {$total + $amount}]`\ `   }`\ `   method withdraw amount {`\ `       my variable {*}[info object vars [self]] ;# "auto-import" all variables`\ `       if {($amount - $total) > $overdrawLimit} {`\ `           error "Can't overdraw - total: $total, limit: $overdrawLimit"`\ `       }`\ `       set total [expr {$total - $amount}]`\ `   }`\ `   method transfer {amount targetAccount} {`\ `       my variable total`\ `       my withdraw $amount`\ `       $targetAccount deposit $amount`\ `       set total`\ `   }`\ `   destructor {`\ `       my variable total`\ `       if {$total} {puts "remaining $total will be given to charity"}`\ `   }`\ `}` #### tcltcc Tcltcc is a loadable package that wraps the Tiny C compiler (tcc) for use with Tcl. It can be used to - compile C code directly to memory - produce dynamic loadable libraries (DLLs) or executable files. Convenience functions generate wrapper code, so that the user needs only write the really substantial C code. **Examples:** Wrap a C function into a Tcl command \"on the fly\" (here shown in an interactive session): `% package require tcc`\ `0.2`\ `% namespace import tcc::*`\ `% cproc sigmsg {int i} char* {return Tcl_SignalMsg(i);} `\ `% sigmsg 4`\ `illegal instruction` Produce a DLL with a fast implementation of Fibonacci numbers: `% set d [tcc::dll]`\ `% $d ccode {`\ `     static int fib(int n) {return n <= 2? 1 : fib(n-1) + fib(n-2);}`\ `  }`\ `% $d cproc fiboy {int n} int {return fib(n);}`\ `% $d write -name fiboy`\ `% load fiboy[info sharedlibextension]`\ `% fiboy 20`\ `6765` Produce a tclsh with an extra *square* command: `% set code [tcc::wrapCmd square {double x} double x_square {return x*x;}]`\ `% append code {`\ `    int AppInit(Tcl_Interp *interp) {`\ `       int rc;`\ `       rc = Tcl_CreateObjCommand(interp,"square",x_square,NULL,NULL);`\ `           return Tcl_Init(interp);`\ `    }`\ `    int main(int argc, char *argv[]) {`\ `        Tcl_Main(argc, argv, AppInit);`\ `        return 0;`\ `    }`\ `}`\ `% tcc $::tcc::dir exe t`\ `% t add_file    $::tcc::dir/c/crt1.c`\ `% t add_library tcl8.5`\ `% t compile     $code`\ `% t output_file mytclsh.exe`\ `% exec mytclsh.exe {<<puts [square 5]}`\ `25.0` Tcltcc is open source, LGPL licensed, available at <http://code.google.com/p/tcltcc/> . The full functionality is at the current early stage (October 2007) only available on Windows 95/XP platforms, but in-memory compilation works on Linux too. #### tDOM tDOM is a popular extension for XML/HTML processing, allowing both SAX-style \"on-the-fly\" parsing and the DOM approach of representing a whole XML element in memory. Here is an example of a SAX-style application. The **expat** parser that comes with tDOM is instrumented with callbacks for element start, character data, and processing instructions. Elements, attributes, characters and processing instructions are counted, plus a tally for each element type is done. ``` tcl #!/usr/bin/env tclsh package require tdom #--- Callbacks for certain parser events proc el {name attlist} { global g incr ::nEl incr ::nAtt [llength $attlist] inc g($name) } proc ch data { incr ::nChar [string length $data] } proc pi {target data} { incr ::nPi } proc inc {varName {increment 1}} { upvar 1 $varName var if {![info exists var]} {set var 0} incr var $increment } #--- "main" loop if ![llength $argv] {puts "usage: $argv0 file..."} foreach file $argv { foreach i {nEl nAtt nChar nPi} {set $i 0} ;# reset counters array unset g set p [expat -elementstartcommand el \ -characterdatacommand ch \ -processinginstructioncommand pi ] if [catch {$p parsefile $file} res] { puts "error:$res" } else { puts "$file:\n$nEl elements, $nAtt attributes, $nChar characters,\ $nPi processing instructions" foreach name [lsort [array names g]] { puts [format %-20s%7d $name $g($name)] } } $p free } ```