Existential construction - artificial intelligence, Computer Engineering

Assignment Help:

The English existential construction involves so-called there-sentences such as these:

(1)  There is a dog in the yard

(2)  There were no children at the party

(3)  There are three cars available

 NPs with weak quantifiers can be the subject of a there-sentence, but proper names, definite NPs, and NPs with strong quantifiers can't:

(4)  *There was John at the party

(5)  *There were the children at the party

(6)  *There are all/most cars available

Find an existential construction in a language other than English that is the equivalent of English there-sentences. Give at least two examples of the construction, and give word-by-word glosses as well as a translation for each example. Explain the syntactic structure of the construction as best as you can to someone who does not speak the language. If you are not a native speaker of the language, make sure to check the grammaticality of your examples with a native speaker.

After you have identified the existential construction in the language, try to determine whether it has the same restrictions on what can be the subject as the English there-sentences. Test at least proper names, two different strong quantifiers, and two different weak quantifiers. Summarize your results and make an explicit comparison with English.


Related Discussions:- Existential construction - artificial intelligence

Transition management system, please help me with psudocode for schedule ma...

please help me with psudocode for schedule management which contains stakeholder and application table

Data rate limitations in PSTN's by using nyquist theorem, Explain with the ...

Explain with the help of Nyquist theorem, the data rate limitations in PSTN's. Data rates in PSTNs : A voice channel in a public switched telephone network is band restricted

Stencil duplicating, Stencil Duplicating Equipment Required Stenci...

Stencil Duplicating Equipment Required Stencil Duplicator Thermal copier (optional) Electronic stencil cutter Materials Stencil COPY paper Ink Clean

Explain anonymous FTP, Explain Anonymous FTP. Use of a login password...

Explain Anonymous FTP. Use of a login password and name helps maintain file secure from unauthorized access. Though, sometimes these authorizations can also be inconvenient.

Conversion of decimal number 82.67 to its binary equivalent, Conversion of ...

Conversion of Decimal number 82.67 to its Binary Equivalent Ans. Firstly see the integer part 82 and determine its binary equivalent  as The Binary equivalent is (101001

Explain random-access semiconductor memories, Q. Explain Random-access Sem...

Q. Explain Random-access Semiconductor Memories Q. What is Basic memory cell? Explain Two Dimension Memory Organization with diagram.

Hard disk architecture, Hard disk Architecture: A hard disk drive ...

Hard disk Architecture: A hard disk drive having the platters and motor hub removed indicating the copper colored stator coils surrounding a bearing at the cen

Define about exe programs, Q. Define about EXE Programs? An EXE program...

Q. Define about EXE Programs? An EXE program is stored on disk with extension .exe. EXE programs are longer than COM programs as every EXE program is related with an EXE header

What is page stealing, What is Page stealing? Ans. Taking page frames o...

What is Page stealing? Ans. Taking page frames other working sets is called Page stealing.

Explain instruction level of parallel processing, Instruction Level It ...

Instruction Level It refers to condition where different instructions of a program are implemented by different processing elements. Most processors have various execution unit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd