Monday February 12, 2024
Quiz over Modules 31, 32, and 33 on Wednesday
Homework that is due when we get back from break: Modules 34, 35 and 36 on pages 365-392.
Circle: TBA
How do we want to study: Lets look at what is available to us. Wow! You mean everything I need to know about encoding, storage and retrieval is all over the internet?
Vocabulary, Quizlet, Crash Course, Practice Quiz, Kahoots
Memory-the persistence of learning over time through the storage and retrieval of information
Three basic steps in the information processing model: Encoding, storage and retrieval.Student Activity: M32: Flashbulb Memory
Student Activity: M32: Retrieval Cues
Teacher Demonstration: M32: Expertise and Retrieval Rates
Student Activity: M32: Serial Position Effects in Recall
What are some of the most surprising ways that people have been able to enhance their memories according to the documentary "Memory Hackers"?
How do scientists believe that memories are formed and stored in the brain, and what implications does this have for memory hacking?
What role does the hippocampus play in memory formation, and how have researchers been able to manipulate it to enhance or erase memories?
What are some of the ethical concerns surrounding memory hacking, and how do researchers plan to address them?
How have people with conditions like PTSD and Alzheimer's disease been able to benefit from memory hacking techniques?
What impact do emotions have on memory formation, and how have scientists been able to manipulate emotional responses to enhance memories?
How have individuals been able to use technology like brain implants and virtual reality to enhance their memories, and what are some of the limitations of these techniques?
What have researchers learned from studying individuals with exceptional memories, and how might these findings be applied to memory hacking?
What are some of the potential future applications of memory hacking, and how might they impact society?
How have ancient memory techniques, like the method of loci, been used and adapted in modern memory hacking?
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.