<<

CB-ROM Utilization

If, based on factors mentioned in the previous topic, a person's personal B-ROM is underdeveloped, his CB-ROM utilization also gets affected, which can go to the level where they don't find it necessary to build CB-ROMs (more under title Hereditary Causes).

Patterns of CB-ROM utilization can be divided in the following seven categories:

None for all: People of this category don't have CB-ROMs as they are not capable of building them. Causes for the same may be due to biological defects in the DOS resulting out of genetic mutations or inherited strength (more under title Inherited Strength).

Self for all: People of this category don't have CB-ROMs as they are habituated using their own personal B-ROM for other people.

Other's for all: People of this category don't build CB-ROMs as they are habituated using personal B-ROM of a person they trust and/or are frequently in touch with (e.g. on a daily basis) to deal with other people.

Others' for all: This category is similar to the above, except people of this category are habituated using personal B-ROMs of people whose capabilities they trust to deal with other people, where they select personal CB-ROMs of trusted people based on situations and/or characteristics of target people.

One for all: People of this category use one CB-ROM for all other people.

Some for all: People of this category deal with others using a fixed set of CB-ROMs they have built. They do so by detecting which profile the person they are dealing with matches from the set of CB-ROMs they have built and interact using the same.

One for each: People of this category have one CB-ROM for each person they interact with frequently.

However, it is not necessary that a person will only use a particular CB-ROM utilization pattern.

In detail: In all above categories, based on evaluation by their VP, their respective utilization pattern (mentioned in above points) may not be used when critical and significant interactions demand a change for optimizing same or similar interactions. In such cases, they may process them with IPS, use another utilization pattern or follow utilization patterns or interactions learnt from external sources.

© Copyright 2017 Parag Jasani. All Rights Reserved.