Existential construction - artificial intelligence, Computer Engineering

Assignment Help:

The English existential construction involves so-called there-sentences such as these:

(1)  There is a dog in the yard

(2)  There were no children at the party

(3)  There are three cars available

 NPs with weak quantifiers can be the subject of a there-sentence, but proper names, definite NPs, and NPs with strong quantifiers can't:

(4)  *There was John at the party

(5)  *There were the children at the party

(6)  *There are all/most cars available

Find an existential construction in a language other than English that is the equivalent of English there-sentences. Give at least two examples of the construction, and give word-by-word glosses as well as a translation for each example. Explain the syntactic structure of the construction as best as you can to someone who does not speak the language. If you are not a native speaker of the language, make sure to check the grammaticality of your examples with a native speaker.

After you have identified the existential construction in the language, try to determine whether it has the same restrictions on what can be the subject as the English there-sentences. Test at least proper names, two different strong quantifiers, and two different weak quantifiers. Summarize your results and make an explicit comparison with English.


Related Discussions:- Existential construction - artificial intelligence

How cloud can be used in event schedules, How cloud can be used in Event Sc...

How cloud can be used in Event Schedules and Management with an example. Web-based calendars can be used to post dates and schedules for specific public events, such as school

Call the masm procedure, Assignment:  write a C program and a MASM procedur...

Assignment:  write a C program and a MASM procedure.  The C program calls the MASM procedure to perform letter case conversion. Text sections covered:  12.1 to 12.3.1 Write a

Maximum size of a database, What is the maximum size of a database that can...

What is the maximum size of a database that can be opened in Microsoft Access? Ans) 1 Gigabyte

What is read only memory (rom) and define the use of it?, What is Read only...

What is Read only memory (ROM) and Define the Use of it? A simple kind of ROM can be constructed from a decoder, Or gates, and a number of wires. Input

Parallel computer architecture , Parallel Computer Architecture Intr...

Parallel Computer Architecture Introduction We have talked about the classification of parallel computers and their interconnection networks in that order in units 2 and

What is the cih, CIH, also known  as Chernobyl or Spacefiller, is a Microso...

CIH, also known  as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform

Explain briefly how firewalls protect network, Explain briefly how firewall...

Explain briefly how firewalls protect network.       A firewall is simply a program or hardware device that filters the information coming by the Internet connection into your

Design a 3-bit counter using sequential logic, Q. Design a 3-bit counter us...

Q. Design a 3-bit counter using sequential logic with following counting sequence using JK- flip-flops which counts the sequence 0, 3, 2, 7, 5 and repeat.

Logic diagrams for same boolean expression, Q. Logic diagrams for same Bool...

Q. Logic diagrams for same Boolean expression? The expression F can be simplified using Boolean algebra. The logic diagram of simplified expression is drawn in fig (b)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd