The processing of information into the memory system is called:
Rashad is studying for tomorrow's biology exam. He has been reading and taking notes for hours, and he feels like he cannot study any longer. To avoid retroactive interference, the best thing for Rashad to do at this point is:
go directly to sleep.
Tarik has a chemistry test in two days. He has to memorize the elements on the periodic table, so he writes them on index cards. He keeps the cards with him at all times and periodically reads through them. Tarik is using _______________ to encode information for storage.
Even after we learn the material, _______________ increases retention.
Contrary to all of the Hollywood stars who claim to have been molested as toddlers and infants, memories of things happening before age ____ are unreliable.
Ceci and Bruck's study of children's memories showed that ________ percent of the children who had not received genital examinations from a pediatrician still pointed to either genital or anal areas when asked.
It is not uncommon for us to recognize a person, but to have no idea where we met him. Or, we may HEAR something but later recall instead that we SAW it. This type of misattribution is known as:
In terms of the three sins of distortion, this sin refers to the confusing source of information such as remembering a movie scene as an actual experience.
Events that are forgotten are like books that cannot be found in a library. Which of the following scenarios can BEST be used to explain the encoding problem?
The book was never purchased.
If you ask your classmates to draw either side of a U.S. penny from memory, the vast majority will not be very successful. This is likely due to:
We use retrieval cues to access target information. The best retrieval cues are the:
tastes, smells, or sights that were part of the original context when the memory was encoded. result of associations formed when the memory was encoded. experiences or words associated with the memory.
When you encode a piece of target information, other bits of information become associated with it. The bits of information connected with the target information are known as: