SlideShare una empresa de Scribd logo
1 de 14
Discovering Our Reality Chapter 5 By Laura Maceri
“The  perception process is the method we use to create our reality from our environment” The environment is what is actually  surrounds you. Reality is  what or how you think of your environment Perception  is the  brain  trying to explain what is going on, thus creating our reality Reality is not real; only  your actual environment is real.
Through perception, realities are created.
We select data from our environment Our five senses allow us to be stimulated by the environment. We are exposed to a variety of stimuli at any given time. Some stimuli is filtered out, while other information is received.
The stimuli that we select is  what  brings about our awareness. For example: temperature, hot or cold, noise, pain, etc…
Organizing and Prioritizing Data The organization of information received is unique to each individual For example: Beauty
Interpreting the dataBrings meaning
No two people share the same reality
“the belief that one’s own reality is the only reality is the most dangerous of all delusions”                                                   Paul Watzlawick, Psychologist
Reality is not “real”, its what we think is real Fairy God Mother
Environment or  Reality? http://www.youtube.com/watch?v=6FahBBnfHAQ People use the internet to create and build friendships and relationships. These virtual relationships stimulate the senses in a way which look and appear real. Check out the  Face Book Parody  at the link to the left. It offers humorous insight to falling in love on the web.
                     Virtual Reality An artificial environment using a computer and hardware. Virtual reality use computer technology to create the effect of a 3 dimensional world in which objects have a sense of spatial presence.
Virtual Exercise              Wii Fit http://www.youtube.com/watch?v=qdNOfPesj2s d
Virtual Reality - People Won't Need To Leave The House/Cell http://www.youtube.com/watch?v=LlBgIO6Mp9A

Más contenido relacionado

Destacado

Interactional View
Interactional ViewInteractional View
Interactional ViewArun Jacob
 
Conflict Analysis
Conflict AnalysisConflict Analysis
Conflict Analysisaoux
 
Conflict Resolution: Tools for Analyzing, Diagnosing, and Resolving Organizat...
Conflict Resolution: Tools for Analyzing, Diagnosing, and Resolving Organizat...Conflict Resolution: Tools for Analyzing, Diagnosing, and Resolving Organizat...
Conflict Resolution: Tools for Analyzing, Diagnosing, and Resolving Organizat...David Williamson
 
Conflict Management
Conflict ManagementConflict Management
Conflict Managementmanalobrolon
 
Tools and Techniques for Managing and Resolving Conflict
Tools and Techniques for Managing and Resolving ConflictTools and Techniques for Managing and Resolving Conflict
Tools and Techniques for Managing and Resolving ConflictJlindstr
 
Collaborative communication
Collaborative communicationCollaborative communication
Collaborative communicationIcinga
 
Tools for conflict analysis
Tools for conflict analysisTools for conflict analysis
Tools for conflict analysisLo Ivan
 
30 communication quotes
30 communication quotes30 communication quotes
30 communication quotesHo Nguyen
 
Theories of Motivation
Theories of MotivationTheories of Motivation
Theories of Motivationmasumi kadali
 
10 Ways Your Boss Kills Employee Motivation
10 Ways Your Boss Kills Employee Motivation10 Ways Your Boss Kills Employee Motivation
10 Ways Your Boss Kills Employee MotivationOfficevibe
 

Destacado (15)

Interactional View
Interactional ViewInteractional View
Interactional View
 
Conflict Analysis
Conflict AnalysisConflict Analysis
Conflict Analysis
 
Conflict Resolution: Tools for Analyzing, Diagnosing, and Resolving Organizat...
Conflict Resolution: Tools for Analyzing, Diagnosing, and Resolving Organizat...Conflict Resolution: Tools for Analyzing, Diagnosing, and Resolving Organizat...
Conflict Resolution: Tools for Analyzing, Diagnosing, and Resolving Organizat...
 
Conflict Management
Conflict ManagementConflict Management
Conflict Management
 
Tools and Techniques for Managing and Resolving Conflict
Tools and Techniques for Managing and Resolving ConflictTools and Techniques for Managing and Resolving Conflict
Tools and Techniques for Managing and Resolving Conflict
 
In Conflict Resolution
In   Conflict ResolutionIn   Conflict Resolution
In Conflict Resolution
 
Collaborative communication
Collaborative communicationCollaborative communication
Collaborative communication
 
Tools for conflict analysis
Tools for conflict analysisTools for conflict analysis
Tools for conflict analysis
 
Resolving Conflict (Powerpoint)
Resolving Conflict (Powerpoint)Resolving Conflict (Powerpoint)
Resolving Conflict (Powerpoint)
 
30 communication quotes
30 communication quotes30 communication quotes
30 communication quotes
 
Key Principles of Communication by Madam. Marinita Schumacher
Key Principles of Communication by Madam. Marinita Schumacher Key Principles of Communication by Madam. Marinita Schumacher
Key Principles of Communication by Madam. Marinita Schumacher
 
Conflict resolution
Conflict resolutionConflict resolution
Conflict resolution
 
Theories of Motivation
Theories of MotivationTheories of Motivation
Theories of Motivation
 
Motivation ppt
Motivation pptMotivation ppt
Motivation ppt
 
10 Ways Your Boss Kills Employee Motivation
10 Ways Your Boss Kills Employee Motivation10 Ways Your Boss Kills Employee Motivation
10 Ways Your Boss Kills Employee Motivation
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Reality Slide Show

  • 1. Discovering Our Reality Chapter 5 By Laura Maceri
  • 2. “The perception process is the method we use to create our reality from our environment” The environment is what is actually surrounds you. Reality is what or how you think of your environment Perception is the brain trying to explain what is going on, thus creating our reality Reality is not real; only your actual environment is real.
  • 4. We select data from our environment Our five senses allow us to be stimulated by the environment. We are exposed to a variety of stimuli at any given time. Some stimuli is filtered out, while other information is received.
  • 5. The stimuli that we select is what brings about our awareness. For example: temperature, hot or cold, noise, pain, etc…
  • 6. Organizing and Prioritizing Data The organization of information received is unique to each individual For example: Beauty
  • 8. No two people share the same reality
  • 9. “the belief that one’s own reality is the only reality is the most dangerous of all delusions” Paul Watzlawick, Psychologist
  • 10. Reality is not “real”, its what we think is real Fairy God Mother
  • 11. Environment or Reality? http://www.youtube.com/watch?v=6FahBBnfHAQ People use the internet to create and build friendships and relationships. These virtual relationships stimulate the senses in a way which look and appear real. Check out the Face Book Parody at the link to the left. It offers humorous insight to falling in love on the web.
  • 12. Virtual Reality An artificial environment using a computer and hardware. Virtual reality use computer technology to create the effect of a 3 dimensional world in which objects have a sense of spatial presence.
  • 13. Virtual Exercise Wii Fit http://www.youtube.com/watch?v=qdNOfPesj2s d
  • 14. Virtual Reality - People Won't Need To Leave The House/Cell http://www.youtube.com/watch?v=LlBgIO6Mp9A