Fuzzy-trace theory explains critical intrusions in the DRM method in which way?
a. Items in the DRM method are not encoded in a non-veridical format, leaving them vulnerable to suggestibility.
b. We encode the gist of the list, which includes the critical intrusion, which is then mistaken for a true memory at the time of recall.
c. False memories are the inevitable result of correspondence problems.
d. Suggestibility occurs for all items, but especially for critical intrusions.
Ans: b
You might also like to view...
Between the ages of 4 and 5, children's drawings reflect the convergence of ______.
A. gross and fine motor skills B. metacognition and self-control C. egocentrism and centration D. fine motor skills and cognitive development
Which of the following did Watson’s objective psychology have in common with Russian objective psychology?
a. Rejection of introspection as a research tool b. Use of mentalism in an explanation of behavior c. An interest in brain physiology d. A focus on cognitive processes
Marcy is just entering second grade, and she is happy because she has many friends who will be there too. According to research findings on peer relations, Marcy is likely to
a. experience academic difficulties. b. make the transition to second grade very easily. c. experience school anxiety. d. be socially anxious.
What are time-factored markings?
a. Markings that correspond to astronomical events like phases of the moon b. Markings that date to a particular time period c. Markings used in carbon 14 dating of artifacts d. Markings that enable the user to judge how much time has passed