Premium Essay

In Gaining Knowledge, Each Area of Knowledge Uses a Network of Ways of Knowing

In:

Submitted By D4777
Words 799
Pages 4
IN GAINING KNOWLEDGE, EACH AREA OF KNOWLEDGE USES A NETWORK OF WAYS OF KNOWING

KQ
What does it mean to know?
THESIS
The two areas of knowledge are history and art and the ways that will be connected to them are memory, emotion, reason, imagination and faith.
ROAD MAP
I’ll approach my topic with connecting reality to ways of knowing and areas of knowledge using real life situations.
CLAIM
The only two ways in which humankind can produce knowledge is through passive observation or active experiment. Active learning is where the learner queries the world in the search of knowledge.
Passive learning is where the learner has no control over the knowledge that presents itself.
EXPLANATION
Taking other knowledge is as data, by logical operation knowledge can be inferred for example. Testimony which is knowledge based on the acceptance of testimony involves accepting what others say .
“There are only two ways in which humankind can produce knowledge: through passive observation or through active experiment." I agree with this quote because gaining knowledge from others and learning from them is passive observation while active experiment is actually experiencing something in order to gain knowledge in the situation.
COUNTERCLAIM
We don’t just produce knowledge we also discover it, like dinosaurs we didn’t produce them we discovered them.
EXPLAINATION
Creation is more discovery or giving meaning at least with respect to knowledge. It not like we produced knowledge of moon ,it was there we gave it names and gave a meaning to the existing moon, before that we had no name and did not know.
LINK TO KQ
To know things with passive observation and active experiment is either by seeing it with your own eyes to believe it real or hearing it and proving it to believe it’s true, people who gain knowledge by trying out things fall in active experiment.
CLAIM

Similar Documents

Premium Essay

My Practice Tok Essay

...TOK Essay | “In gaining knowledge, each area of knowledge uses a network of ways of knowing.” Discuss this statement with reference to two areas of knowledge. | 11 FEB, 2016 IB Theory of Knowledge “In gaining knowledge, each area of knowledge uses a network of ways of knowing.” Discuss this statement with reference to two areas of knowledge. Knowledge is the basis of living in our generation, knowledge can be anything like if we know what type of combination in clothes we should wear, or what type of food we should eat and even if you know how to propose a girl or a boy then that can be known as knowledge too. But where the focus goes on is the place where the knowledge comes from, it can be taken as an important question while pointing at the ways of knowing. Ways of knowing are the origins from which we gain knowledge such as TV, newspaper, radio, books, internet, family, etc. These were some examples of ways of knowing with which we can relate our daily life. But as far as I studied the main points for ways of knowing are: * Emotion * Faith * Imagination * Intuition * Language * Memory * Reason * Sense perception Now we must know what the areas of knowledge in Theory of knowledge are. Actually it is the division of knowledge into different areas: * Mathematics. * Natural Sciences. * Human Sciences. * History. * The Arts. * Ethics. * Religious Knowledge Systems. * Indigenous Knowledge Systems. From these...

Words: 898 - Pages: 4

Premium Essay

Ways Of Knowing Essay

...During my Theory of Knowledge (TOK) course I realized that everything in the world is linked to each other, there is nothing separate in the world. I also learned that the base of every subject, Science and project is “knowledge”. The basic definition of knowledge is “the fact or condition of knowing something with familiarity gained through experience or association”. The whole life of a person is based on the idea of learning and knowing everything which is around us. Nowadays people use different ways of knowing (WOK) in order to get a fully reliable information. ‘There are eight different ways of knowing. They are emotion, faith, imagination, intuition, language, memory, reason and sense perception.’ Each of them has its own purpose, value...

Words: 1518 - Pages: 7

Premium Essay

How Is Knowledge Gained?

...December, 2014 How is knowledge gained? Knowledge begins at birth, knowing you are hungry, tired, hurt, cold etc. This is transmitted via crying and interaction. From inception you bond with your mother and know her scent, her touch, her feel and thus you begin your journey of knowledge. As we continue to grow older in age we learn new things in our daily lives, whether it’s learning how to walk or a new language that relates to our culture and religious beliefs. We are always growing and learning new things increasing our knowledge in different ways to help us advance and develop our brains more which will then help us mature and develop ourselves. We also learn from books, and television or music created by other people but the only way to understand and process this new information and knowledge from them we would have to already know how to understand and interpret information. No matter what we do in life we always need to look for new ways to expand our knowledge and increase it by making it better with the new things that we learn. As an example increasing our knowledge in a certain area such as science we can learn new things about the brain and body so we can advance in a career and become a doctor or therapist, or maybe become a nurse. By advancing our knowledge we learn a better understanding of particular ideas and things, and we gain a better skill and a greater intelligence in that particular area. Knowledge is gained by direct experience, knowledge claims, and skills...

Words: 1565 - Pages: 7

Free Essay

It190 Document Shell

...Herrington May 25, 2015 Table of Contents Section 1: Information Systems Overview 3 MDHS: Program Selection and Job Functions 3 Job Functions 4 Section 2: Information Systems Concepts 6 Networks: WAN and LAN 6 Wi-Fi, Telecommuting, and Associated Issues 7 Section 3: Business Information Systems 9 Management Information Systems 9 Transaction Processing Systems 10 Decision Support Systems and Artificial Intelligence 11 Transforming Data to Information and Information to Knowledge 11 Section 4: System Development 13 Waterfall Model 13 Prototype Model 14 Section5: Information Systems and Society 15 Approaches Hackers Use to Steal Data 15 Preventing Hackers From Stealing Data 16 References 18 Section 1: Information Systems Overview MDHS: Program Selection and Job Functions The Mississippi Department of Human Services is an organization whose sole purpose is to assist and serve the residents of Mississippi. The services range from offering nutrition assistance through Supplemental Nutrition Assistance Program (SNAP) and employment assistance through the Temporary Assistance for Needy Families (TANF) to offering support for families and children. There are many different programs that are offered through programs in specific departments. Each department uses specific computer resources to assist the clients within their respective counties. It is important that the systems used by the department are encrypted, effective, and user friendly. These...

Words: 3669 - Pages: 15

Premium Essay

Ethical Hacking

...(proxy,hiding ip etc) 8. FTP 9. TCP/Ip , UDP , DHCP , 10. Get your hands dirty with networking 11. Learn diassembler language (its the most basic language for understanding machine language and very useful to ubderstand when anything is disassembled and decoded) 12. Learn to use a Unix os. (a Unix system is generally loaded with networking tools as well as a few hacking tools) 13. Learn how to use Exploits and compile them. (Perl and c++ is must) ETHICAL HACKER Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to work electronically. Hacker is a word that has two meanings: 1-Recently, Hacker has taken on a new meaning someone who maliciously breaks into systems for personal gain. 2-Technically, these criminals are Crackers as Criminal Hackers. Crackers break into systems with malicious Intentions An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing...

Words: 2587 - Pages: 11

Premium Essay

Perception Of Knowledge Essay

...We live in a world where massive amount of information is presented in the forms of books, websites, and communications. Reception of knowledge is one of the ways information transfers, but some parts of information may be misunderstood and misinterpreted by people themselves, probably causing inaccurate reception and cognition. The reason why knowledge may be misinterpreted is that people’s thoughts or feelings may affect how objectively they judge and receive the knowledge. For the purpose of this essay, some key words should be defined in order to fit the context of this prompt. ‘Gaining knowledge’ will be interpreted as ‘ways people get and process information’. In order for us to accurately receive, interpret and understand knowledge, we first need to know the relationship between emotion and reason. Knowledge question 1: Does emotion help or hinder reason in the production of knowledge? For this knowledge question, ‘Reason’ will be interpreted as ‘the rational way people receive and understand information’ and ‘Emotion’ will be interpreted as ‘thoughts and feelings that may cause inaccurate reception and interpretation of information’. Emotion and reason make people intelligent and unique among all the organisms in the world. Some may argue that rational people always act...

Words: 1481 - Pages: 6

Premium Essay

Career Management

...Career Management Guide In the current career environment, individuals with alternatives obtain more challenging and growth-oriented opportunities. Individuals with alternatives need not accept consequences, rather they create opportunities for themselves. Career Management Guide Section 1 Paaggee 11 SECTION 1: CAREERS TODAY Part 1 - The Environment, Career Issues and Trends The Importance of Education and Experience In the current economic environment, education is becoming increasingly critical to career success. While employment rose for Canadians with university and college educations, 651,000 fewer jobs existed for those people without high school qualifications. Unemployment rates in the U.S. exceed 10% for those with less than a high school diploma and approximately 2.5% for college graduates.1 When professional designations (i.e., accounting, engineering) are taken into account, the data on employability and income is skewed in favour of the professional, relative to those who possess only a post secondary educational background. However, in order to maintain a competitive edge, individuals must continue to invest in their development throughout their careers. Specifically, with respect to the future for business and accounting positions, “growth due to the increasing number and complexity of business operations will be offset somewhat by corporate restructuring and downsizing of management, resulting in average growth for executive, administrative and managerial...

Words: 6685 - Pages: 27

Premium Essay

Penetration Testing

...Using penetration testing to enhance your company's security Based on the fundamental principle that prevention is better than cure, penetration testing (pen-testing) is essentially an information assurance activity to determine if information is appropriately secured. Conducted by penetration testers, sometimes referred to as ‘white hats’ or ethical hackers, these tests use the same tools and techniques as the bad guys (‘black hat hackers’), but do so in a controlled manner with the express permission of the target organization. Vulnerability scans versus pen-testing A common area of confusion is the relationship between vulnerability scanning (automated) and pen-testing (expert-driven manual testing). Both involve a proactive and concerted attempt to identify vulnerabilities that could expose the organization to a potential malevolent attack. Vulnerability scanners are great at identifying ‘low-hanging’ vulnerabilities, such as common configuration mistakes or unpatched systems that offer an easy target for attackers. What they are unable to determine is the context or nature of the asset or data at risk. They are also less able than humans to identify unknown-unknowns (things not already on the risk register, or which haven't been theorized by the organization as potential security issues). Good pen-testing teams, however, do this very well. For instance, pen-testers can give countless examples of engagements where an environment was previously scanned only for vulnerabilities...

Words: 1752 - Pages: 8

Premium Essay

Mis 535 Course Project

...Consulting Gaining Market Leverage through New Technologies in Project Management Managerial Applications of Information Technology MIS 535 Abstract Technology tools are routinely used for collaboration, communication and deployment of project management practices; therefore, technology is important due to today’s challenges in a technology enabled workplace. Technology plays a major role in supporting project managers manage projects effectively and efficiently. The area of opportunity in project managing is still under study to pin point specific roles and responsibilities a project manager is responsible for in respect to the project team in an area that needs further study. Understanding relations between people related factors of project performance and a project manager’s performance. Interpretive structure modeling (ISM) methodology was used to determine the role of a project manager in both managing an improving performance. This project will analyze underlying interactions among these factors and understand the supportive function of technology to the project manager in improving project performance. Deloitte Consulting Gaining Market Leverage through New Technologies in Project Clients count on Deloitte to help them transform uncertainty into possibility and rapid change into lasting progress. Deloitte associates are skilled in knowing how to anticipate, collaborate, innovate and create. Even the most unforeseen complex obstacles don’t stand in the way of...

Words: 2981 - Pages: 12

Free Essay

Managemnet

...Preparing for Innovation: Understanding How IT Organizational Change Can Help Drive Success with Unified Communications Table of Contents Introduction ................................................................................................................................................................................................................................................. 1 Unification and Change ............................................................................................................................................................................................................................ 2 Microsoft and Unified Communications.............................................................................................................................................................................................. 2 Unified Communications Purchase Drivers and Process................................................................................................................................................................. 3 IT Organization Purchase Drivers ...................................................................................................................................................................................................... 3 Business Organization Purchase Drivers................................................................................................................................................

Words: 6159 - Pages: 25

Premium Essay

Communicaand Crisis Paper

... HCS/320 1/18/16 Ann Maleta Communication and Crisis Paper Official reports indicate that the public water supplies in several different towns in the area are contaminated with a biological agent that is life threatening. Being the director of the Emergency Management Office, there has to be a contingency plan put into place within the office’s organization and with the public without creating a widespread panic. Knowing the situations in the past, the issues have to be dealt with immediately. Doing research and using the information from the Three Mile Island nuclear reactor malfunction in 1979, will help to know how to respond to this disaster. Even though there were no deaths or injuries from this particular incident, it drew a lot of media attention and created great concern within the local area and surrounding areas. The major forms of communication used in this situation were three major television networks and the local radio stations. Also, there was another situation in 2005 when Hurricane Katrina went through New Orleans and left it devastated. Many of the local citizens and their families were affected and most of them had to be relocated. In this situation, there were newer communication technologies, like the Internet, that was used to disseminate information...

Words: 1488 - Pages: 6

Premium Essay

Chapter 1 Mis

...its Functions 8. Contemporary Approaches to Information Systems. 9. Dimensions of Information Systems 10. Defining IT infrastructure: 11. Evolution of IT infrastructure 12. The IT Infrastructure Ecosystem 13. Types of Structured Business Information Systems 14. Systems That Span the Enterprise Concepts of MIS/IS: Management Information Systems: MIS means the whole network of systems which support the organization to manage their business affairs. • Many organizations have information systems that are entirely manual. Such systems are a subset of a wider class of systems, computer-based information systems, which rely on information technology as well as humans for their operational functions. IS need not be necessarily computer-based. Management information systems (MIS) deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm. As such, MIS is defined as the study of information systems focusing on their use in business and management. • Management information systems (MIS) combines computer science, management science, operations research and practical orientation with behavioral issues • MIS can be used interchangeable with IS. Information System (IS) can be define as a set of procedures that collects, retrieves, processes, stores and disseminates...

Words: 6353 - Pages: 26

Free Essay

The Wisdom Paradox

...information, an aging person can gain wisdom and minimize clinical brain injury. Wisdom has intellectual, practical, moral, and spiritual facets. It can be defined as extensive pattern recognition of new information or situations as accurately being in some way similar to familiar information or situations, thus leading to successful problem-solving and reasoning abilities. There are many types of wisdom, including genetic, phylum wisdom, species or cultural wisdom, group wisdom, and individual wisdom. The wisdom of the phylum, which is contained in the amygdala, includes genetically-programmed, innate fears and survival mechanisms that have existed in all species for millions of years through evolution. This type of wisdom uses sensory and motor regions of the cortex, as well as subcortical regions of the brain. Cultural wisdom is expressed as language and other symbolic systems passed down through the generations for thousands of years. Language is made up of a self-organizing, complex neural network widely spread throughout various regions of the cortex that are not pre-wired. Group wisdom includes certain remarkable talents or expertise shared by a group of people, which also come from self-organization of the association areas of the cortex. Lastly, individual wisdom is expressed by a person’s unique cognitive templates and pattern recognition devices that also are not hardwired in the brain. This type of wisdom is the main topic of this book. There are three main stages of...

Words: 3619 - Pages: 15

Premium Essay

Management Information System

...structure and strategic positioning of the firm in terms of its portfolio products and services, looking only through the technology lenses could be misleading and incomprehensive. Also, organizations need to constantly research the market and recognize customer needs, so that they can deliver new products by utilizing technology and applying their knowledge. Strong understanding of industry structure and strategic positioning of the firm, allow organizations make necessary modification and adjustment to its business model. Moreover, new entrants wouldn’t be able to outperform industry giants by employing only technological resources. What drive these small startups upmarket are passionate and creative people, who are obsessed with winning. Moreover, Technology can be standardized and imitated, thus Technology infrastructure alone can’t be the only factor in decision making. For instance, to gain and sustain competitive advantage companies need to differentiate themselves and offer alternative products. Therefore, IT without the intellectual capital is impractical, because it needs the human mind to navigate it and effectively use, so new opportunities can be created. 2. Process of...

Words: 4899 - Pages: 20

Premium Essay

Analyziing Your Competition-a Ghanian Case

...Analyzing Your Competition Overview Almost everyone in business understands the principle of trying to offer something better than what their competitors are offering. Gaining an advantage is the key to success and even survival. But many of the so-called advantages that businesses rely on are not sustainable. They can be easily copied, stolen or negated. Real competitive advantages — things like brand name recognition, patented manufacturing processes or exclusive rights to a scarce resource — cannot be easily copied. Every company has a unique set of strengths, and it's critical that you determine yours, as well as your competitors'. Hold a brainstorming session with your staff and advisors to perform a formal SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis. This analysis helps you to see how your strengths stack up against your competitors' weaknesses and suggests ways to take  advantage of marketplace opportunities. After you have performed the analysis, there are four basic competitive strategies to consider. 1. Become the low-cost supplier. By under-pricing the competition, you can achieve greater volume, which can drive your costs down even further by realizing economies of scale. Of course, it's important to still maintain a healthy profit margin so the key here is to lower costs, not just prices. 2. Achieve product or service quality differentiation. Think about the hundreds of companies that have achieved such differentiation for themselves...

Words: 10912 - Pages: 44