This is certainly probable because the artifact does not mirror the world around them (Naremore & Brantlinger, 1991).
At first, John will be perplexed by the robot and may not decipher what it is. The capability of the robot to mimic human behaviors and activities, inclusive of speech, will be of utmost importance in shaping John’s reaction. In such a case, the robot will be like a person, though not “ a real person.” The novelty of the robot will make John think that the robot is a divine device, but “ evil,” and a threat to his existence.
As the fear subsides, the interaction between John and the robot will increase, as it dawns to John that the robot is neither “ godly” nor “ evil” after all. The robot may be programmed to interact with John on matters that are familiar to John such as culture and language. To this end, the robot heralds an incremental cultural benefit to John, which stirs his consciousness. The robot can turn out to be a valuable tool in a cross-cultural exchange between “ John’s world” and the mainstream culture. The robot will act as a bridge between John’s world and the modern world.
Related Essay Examples
The role of ethics in technical communication
The role of ethics in technical communication: Technical communication is of ive nature and can have an opinion attached to it. The communication performed in such a way should fulfill the requirements of the readers and should fit the level ...
Voice over ip: a primer for small business
VoIP: A Primer for Small Business Presently, the modern and novel technology has greatly been improvising all the key sectors of business and enhancing almost all the business functional areas. As Internet telephony was once an idiosyncrasy most often overwhelmed ...
Acquisition of motorola by google
The reality is that Google needs to protect the breadth of its Android base at all costs. And that may be the scariest part of all for Google's investors.
American aviation during wwi
With a few trial and errors supported by the government, the Bureau of Aircraft Production and a separate Division of Military Aeronautics were established. This could be accredited to winning decisive battles and the U.S.being a " learning organization." With ...
Computer games advantages and disavantages
On the other hand because of interesting features and different types of games in computer, firstly children become too much dependent on it. Because of their widespread use, many studies provide data on the short- and long-term effects of regularly ...
Performance-based healthcare and its effect on cost access and quality in the us research paper
Some of the limits of the study included the lack of a control group in the experiment, making the assessment of secular trends in performance improvement impossible. The hypothesis is that, given a more challenging set of criteria to qualify ...
Paragon information systems
IMPLEMENTATION The First thing Paragon needs to do is to meet with their employees and inform them that excellent customer service is how the company plans to differentiate themselves. Implications: Paragon's strategy, to differentiate themselves in Atlantic Canada with excellent ...
Running head: how cellular phones has evolved
Internet Lee Rannals for redOrbit.com completed a survey and the results be evidence for over half of all cell phone owners' use their device to surf the Internet. The Internet is the most important function for the cell phone.
Ethics, privacy, and security sides of computer spammer issue
The interests of ordinary users are of no threat to anyone else especially their privacy and flow of information across the network. There are multiple legal issues faced in the usage and application of Spamhaus.
Describe the meaning of the terms in the selected standard form essay sample
Their website layout and elegant colours make the page look more welcoming to the customers and their aim is also to keep the customers coming and buying regularly from their website. Marks and Spencer's have different features that can help ...
Etiquette and rule
The seventh rule of the code is to be conservative in the emails you send. Lastly the tenth rule of this code is to always be discreet with what you do online.
Online therapy
A number of patients believe that online therapy works for them and that the service was worth the cost. On the other hand, the strongest disadvantage of this therapy is the absence of body language, visual and verbal cues that ...
Blood brothers – development task
We used the stage directions to produce movement and facial expressions which were the main content of the scene, including the dialog. We did this to give the effect of emphasising Mrs Lyons' frustration and madness and to add more ...
Economic transformation of ethiopia: causes and challenges ahead essay examples
Drought, pooled with underprivileged farming practices - with almost total reliance on rain fed cultivation - has definitely contributed to off-putting economic growth in Ethiopia in the past, but government policy restricting access to food and the extreme reliance of ...
Addiction research paper
Majority of the thieves and fraudsters are also gambling addicts and this is as a result to the persistent urge of having money. Gambling impacts on development in the sense that most working gamblers are under-performers and they also take ...
The effect of the internet on social interaction
Although some people claim that the possibilities of more convenient communication benefit chiefly from the Internet, others argue that this technology breakthrough may Isolate communication further regarding face- to- face interaction. It can be argued that this type of technology-internet ...
Internet history 3453
This was called the Internetting project and the system of networks which emerged from the research was known as the " Internet". The Internet Activities Board was created in 1983 to guide the evolution of the TCP/IP Protocol Suite and ...
Influenza is the main cause for not
Every year emergence of new strain of Influenza is the main cause for not the development of a permanent Vaccine for Influenza.a) Conservedepitopes from different viral strain of influenza can open up many waysfor the production of recombinant DNA vaccine ...
Reflection essay on nosql
Nouns can be a great asset when It pertains to dealing with large amounts of data and Its ability to be able to provide a better scalability and availability than the traditional READS can make It a plus. As mentioned ...
Free research paper on empathy and equality
This is an appropriate and defensible position, particularly given the strength of Gilligan's contention that care is a distinctive agent of moral development for females and the extent to which gender identity hinges on separation and individuation. The debate over ...
History of computers in us
First Generation Computers The Electronic Numerical Integrator and Computer, was developed as a collaborative approach between the University of Pennsylvania and the US government. Second Generation Computers Transistor replaced vacuum tubes around 1956 shrinking the size of computers and with ...
Heritage planning case study
The Name of the School The City and State where it is located Background of the Report The NSW government introduced the Heritage Act in 1977. The introduction of the Act was in response to the community concern about the ...
Application for masters degree in information technology
Chair's Name, It is my great pleasure that I submit my application for the Master's degree in Information Technology at the University of Florida Tech specializing in Enterprise Resource Planning. I believe that Master degree from Florida Tech specialized in ...
Cybersecurity and cyberwarfare critical thinking examples
Measures need to be put in place to separate any device that is compromised and ensure their interactions with the rest of the cyberspace system are stopped. Never settle to the level of technology that is in use.
Research paper on a matter of compliance
Psychology refers to punishment as the introduction of an aversive stimulus or the removal of the reinforcing stimulus after an action takes place, resulting to the weakening or the suppression of the action itself. This leads to the second point ...