Notes, summaries, assignments, exams, and problems for University

Sort by
Subject
Level

Schmidt's Noticing Hypothesis in Second Language Acquisition

Classified in Psychology and Sociology

Written on in English with a size of 3.1 KB

Schmidt’s Noticing Hypothesis (Explicit Learning)

Role of Attention and Awareness

Schmidt's Noticing Hypothesis posits that learners must consciously pay attention to and be aware of linguistic input to acquire a second language (L2). This contrasts with implicit learning theories, which suggest that language acquisition can occur subconsciously.

Intake refers to the portion of input that learners successfully process and integrate into their L2 knowledge. Attention plays a crucial role in selecting intake by:

  • Heightening the activation level of input in working memory, allowing it to remain available for further processing.
  • Facilitating the transfer of information to long-term memory.

Long-Term Memory Functions

Long-term memory serves two primary... Continue reading "Schmidt's Noticing Hypothesis in Second Language Acquisition" »

Communicative Language Teaching: Cognitivism, CLIL and Autonomy

Classified in Electronics

Written on in English with a size of 3.98 KB

Psychological Theory: Cognitivism

Meaningful learning: Learners need to understand what they are doing (the meaning is important). Connect new ideas with ideas they already have. They have to connect new knowledge with old knowledge.

Linguistic Theory: Functionalism

Functionalism: TL (target language) is used for a communicative purpose. Necesitamos la lengua con un significado comunicativo para expresar el significado — the language needs to be contextualized and is based on communicative functions (e.g., greeting, apologizing, making a request). These functions are related to activities or tasks (real-life situations of language).

Role of L2 and L1

L2: Used as a means of communication.

L1: Three main uses:

  1. Instructions
  2. To explain something difficult
... Continue reading "Communicative Language Teaching: Cognitivism, CLIL and Autonomy" »

Insolvency Proceedings and Out-of-Court Payment Options in Spain

Classified in Law & Jurisprudence

Written on in English with a size of 3.22 KB

Insolvency Proceedings: Pre-Insolvency Proceedings and Out-of-Court Payment

In Spain, when a debtor faces a plurality of creditors and cannot fulfill their obligations, the law provides a judicial process known as insolvency proceedings. Once insolvency is declared, the debtor loses the freedom to choose which creditors to pay and must request the formal declaration of insolvency.

The primary objective of insolvency proceedings is to salvage viable businesses. However, this process has its drawbacks. As an alternative to filing for insolvency, Spanish law allows debtors to notify the court of their intent to negotiate a refinancing agreement. If an agreement or out-of-court payment is not reached within three months of this notification, the... Continue reading "Insolvency Proceedings and Out-of-Court Payment Options in Spain" »

The Aztecs: History, Expansion, and Society

Classified in Geography

Written on in English with a size of 2.28 KB

The Aztecs

The Aztecs arrived to the valley of Mexico around the year 1218. They took refuge on the marshy lands around Lake Texcoco, where, in 1344 or 1345 they built the town of Tenochtitlan. At this time the Aztec community was composed of a small number of kinship, landholding groups called calpulli.

Aztec Imperial Expansion

For a long time the Aztec were subservient to the Azcopotzalco. But in 1428 the Aztec war chief Itzcoatl, the Texcoco and the Tlacopan joined forces to destroy the Azcopotzalco. This triple alliance led to the conquest of the valley of Mexico and much of Middle America. Gradually the Aztec got stronger than their allies. The conquest of the Valley of Mexico made it easier for the Aztecs to conquer the rest of Middle America... Continue reading "The Aztecs: History, Expansion, and Society" »

Essential Tech Terms: A Comprehensive Glossary

Classified in Computers

Written on in English with a size of 4.83 KB

RAM (Random Access Memory)

Random Access Memory is one of two basic types of memory. Portions of programs are stored in RAM when the program is launched so that the program will run faster. Though a PC has a fixed amount of RAM, only portions of it will be accessed by the computer at any given time. Also called memory.

Scrolling

Scrolling allows lines displayed on the screen to be moved up or down by one line as a new line is added and an existing one is removed.

Shooter

A shooter is a game whose main focus is combat involving guns or other projectile weapons such as missiles.

Shopping Cart

A shopping cart is software that keeps track of what you buy on a site.

Software Engineer

A software engineer is a person that writes computer programs.

Speech Recognition

Speech

... Continue reading "Essential Tech Terms: A Comprehensive Glossary" »

A Glossary of Computer and Internet Terms

Classified in Computers

Written on in English with a size of 3.71 KB

ASCII Code

American Standard Code for Information Interchange. A code in which each alphanumeric character is represented as a number from 0 to 127, translated into a 7-bit binary code for the computer. ASCII is used by most microcomputers and printers, and because of this, text-only files can be transferred easily between different kinds of computers.

Availability

A measure of how easy or difficult it is to obtain a piece of hardware or a computer application.

Backbone

High-speed lines or connections that form the major access pathways within the Internet.

Bandwidth

The capacity of a networked connection. Bandwidth determines how much data can be sent along the networked wires. Bandwidth is particularly important for Internet connections, since greater... Continue reading "A Glossary of Computer and Internet Terms" »

Window Operation Types and Installation Order

Classified in Physical Education

Written on in English with a size of 2.34 KB

WINDOW OPERATION TYPES

  1. Single (pico del triangulo en el abridor)
  2. Double casement
  3. Bottom hung
  4. Tilt and turn
  5. Vertical pivot (rombo)
  6. Horizontal pivot
  7. Top hung
  8. Fix
  9. Sliding/folding
  10. Horizontal sliding
  11. Single bottom sash

WINDOW INSTALLATION ORDER

  1. Dimension check
  2. Frame placement, wedging
  3. Alignment, adjustment
  4. Wedging with two
  5. Fastening
  6. Sash installation
  7. Removing the wedges
  8. Sealing
  9. Architraves

WALL

Window Arrangement with Thermal Insulation

Sketch top and side view (poner alfeizar/sill covering).

  1. Frame extension behind TI
  2. Frame extension in the middle of the wall
  3. Dummy frame at the thermal insulation
  4. Fastening frame window-wall connection

Wall Frame Sealing

  1. Inside and outside
  2. Sealing outside + foil inside
  3. Foil inside and outside

FRAME

Stop. Frame-sash connection (triple stop)

  1. External
... Continue reading "Window Operation Types and Installation Order" »

Big Five Personality Dimensions and Business Phases

Classified in Economy

Written on in English with a size of 2.51 KB

Big Five Personality Dimensions (Vecchio, 2003)

  1. Need for Achievement (importance of parental influences)
  2. Need for Autonomy
  3. Locus of Control: Internal (control of own destiny)/ External (others control my destiny)
  4. Risk Taking Propensity
  5. Entrepreneurial Self Efficacy (ESE)

PHASE 1: Start Up

Pitfalls

  1. The owner works for free.
  2. Less attention to financial aspects.
  3. Everybody feels responsible, no one is responsible.
  4. Too much excitement. Down to earth!

Skills

  1. Accounting skills
  2. Leadership skills
  3. Capability to slow down

PHASE 2: Steadying the Ship

Pitfalls

  1. Less attention for management of the company.
  2. Conflicts among managers and departments.
  3. Working in the company instead of working at the company.

Skills

  1. Managerial skills
  2. Able to analyze changes in the business environment

PHASE

... Continue reading "Big Five Personality Dimensions and Business Phases" »

Medieval Women & The Legend of King Arthur

Classified in English

Written on in English with a size of 3.32 KB

Medieval Women

The Role of Women in Society

Women in the Middle Ages were often seen as property within marriage contracts, used for trade and economic gain. The Church viewed them with suspicion, portraying them as temptresses and untrustworthy figures.

However, women also held active roles in society, particularly as femmes soles. These were women who managed businesses, such as butchers, chandlers, net makers, and spinsters. They also participated in the economy through "bye-industries" like brewing ale, sewing, and selling clothes.

While guilds generally excluded women, widows and daughters of guildsmen were sometimes allowed to run businesses. A notable example is the Wife of Bath from Chaucer's Canterbury Tales, an independent and sexually... Continue reading "Medieval Women & The Legend of King Arthur" »

The Anglo-Saxon Conquest

Classified in History

Written on in English with a size of 1.59 KB

Anglo Saxon Conquest - AS tribes came from Northern Germany. The first invaders were the Jutes who arrived in Kent in 449. Shortly after, bands of Saxons established themselves in the South. The Angles occupied East Anglia and Northumbria. Between their arrival and the 7th century, they occupied the whole of England, pushing the Celtic tribes to the margins. Therefore, the tribes were pushed to the borders. This caused the creation of seven kingdoms: The AS Heptarchy (Northumbria, Mercia, Wessex, East Anglia, Essex, Kent, Sussex). It marked the beginning of Britain as a country and the English language. Each kingdom established its own rule and there was constant power struggle, leading to the downfall of some kingdoms. Between 450-1066 (Norman... Continue reading "The Anglo-Saxon Conquest" »