Minds and Computers
Dennett explains that what a person believes must be based at least in part on something which they can ascribe to be true based on evidence that they possess. It is impossible to believe something based on nothing; even religions have certain basic facts such as the existence of known locations or even the fact that human beings exist is a fact in and of itself. When there is information gathered which then produces a belief, the person or machine will come to desire a potential outcome based on the information acquired; the mind forms a prediction which we either anticipate positively or negatively. Subconsciously, that prediction, at least according to this perspective, will likely be what we hope to occur rather than what the logic of the situation tells us is more probable. This desire will be based upon what we consider to be a rational extension of the known evidence. Psychological conflict occurs when a belief becomes challenged later when new evidence is proven which shows those beliefs to be wrong. The discussion of belief makes sense. When some information is given which occurs at all times of that person's life, then a person makes conclusions which they believe to be logical, which is a form of making a prediction because it predicts a potential version of the impending future; however, I do not think that these predictions are necessarily equated to desire because often what we assume will occur is not favorable, but negative which is not what is desired.
2. Dennett uses the intentional stance to explain that a person's intent is the first function of the human mind and which, in turn, impacts all other functions, including the abilities to perceive or understand. Intent is, by definition, what a person plans to do in a given situation, although what someone intends is seldom what comes to pass because people are conflicted with the intentions and desires of others. According to the intentional stance, all the predictions that a person makes are intentional, whether or not we are aware of this (Dennett 1971,-page 90). No one performs an action without some part of the brain informing the body to do so; no part of the body acts independently but is controlled by the mind. In the act of predicting a person will inadvertently apply everything that they have learned or experienced up to this point in their lives. This prediction will ultimately be based on what they know of the world, knowledge which is based on the experiences of the individual, either direct experience or second-hand experiences as heard by the individual. It is therefore clearly an example of the theory of methodological behaviorism. This methodological theory states that the human mind, and potentially animals too, needs to explain away behaviors which it cannot understand through the application of basic logic, so they look for ways to take what they do know to be factually true and apply it to the current situation, even if it is not a proper fit (Churchland 1999,-page 88). It is essentially downloading material from the human brain and using that information in the current situation, hoping that these experiences will apply and thus provide help for the current occasion. If something is unexplainable, then we do not accept it as normal, but rather attribute it to something wrong or incorrect. If it cannot be explained in some way through application of past experience, then it is illogical.
3. Dennett explains that the design stance is one where human beings make predictions about the behavior of computers and other mechanical devices because of what we know of them to be true before this first-hand experience (1971,-page 88). He gives the example that when a typewriter reaches the end of a line, we know that a bell will ring. In the modern period we do not necessarily understand this but instead we...
Personal Statement My major is in Computer Information. As a senior level student, I look forward to graduating and taking my skills to the next level -- both in the workplace and in the academic world. However, in order to obtain my goals, I require financial assistance from my university. In the hopes that my successes thus far will show that I will put this assistance to good use, allow me
Computers and the Internet The Naked Mind When Roszak refers to the "naked mind," he means to speak about the capacity and ability of the human mind as compared to the capabilities that the computer machines can do. According to Roszak, how the human mind works has vital differences from how computers process information. Roszak praises the human mind because according to him, the human mind is more dynamic and more independent
From a general public perspective, the computer user tends to focus less upon competition than user utility. As a general user, for example, I would therefore not use the term "Killer Application" to define Microsoft's Web browser. Instead, the way in which my friends and I view such a browser is an extremely useful tool to find as much information as possible in as short a time as possible. The
Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions
Computer Security Although it is never possible to fully prevent the unauthorized use of information from people with security clearances and access, the use of security clearance and access is important to ensure that people without security clearance cannot access the confidential information. In other words, the concept of 'absolute security' is a chimera. It is the nature of security that makes it necessary to weigh up the threats, the risks,
(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now