SlideShare a Scribd company logo
Y-symbol Why –Y THE LETTER Y Phase IA By: Group Y Samba Will Gabrielle
Etymology Definition A late developing letter in Eng. Called ipsilon in Gk., the Eng. Name is of obscure origin. The sound at the beginning of yard, yes, yield, etc. is from O.E.  Words with initial g- as in got an y-  as in yet, which were considered the same sound and often transcribed as a character that looks something like 3, known as yogh. The system was altered by Fr. Scribes, who brought over the continental use –g- and from the early 1200’s used –y- and sometimes –gh- to replace 3. http://www.etymonline.com/index.php?search=Y&searchmode=none
Dictonary.com ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Quantities: Three forms One triangle and two trapezoid Three linear forms Three separates areas One triangle
Y is theorized to have  evolved  from proto-voweltaic ancestors which roamed the  Earth   billions and billions  of years ago. Later, in  1066 , a horrific and bloody  civil war  erupted in  France  over Y's ambiguous  vowel / consonant  status. There were no survivors.  Continuing this bloody history,  Congress  decreed Y to be an unnecessary addition to the  alphabet  in December 8th, 1769, on the grounds that can be replaced by  I  under pretty much every conceivable circumstance. Y was already envious of I and his resemblance of an erect  penis , and proceeded to go on a bloody  rampage  during the biannual Alphabet Gathering Convention Meeting Assembly Thing (AGCMAT). However, Congress re-assessed its decision and concluded that Y was useful in the popular internet combination of "( o Y o )", representing  female   breasts . Unfortunately, there were losses during Y's Rampage of the Alphabet Congress, the only notable ones being the annihilation of the letters " Þ " (pronounced "grojj") and " Æ " (pronounced "penis", and later replaced by the letter  J ).  http://en.wikipedia.org/wiki/Y Interesting Fact
Phenomenology Phase IB
Phenomenology: to be or do ,[object Object],[object Object],[object Object],[object Object],[object Object]
Phenomenology: to be or do cont. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Phenomenology: not to be or do ,[object Object],[object Object]

More Related Content

Viewers also liked

Semiotics
SemioticsSemiotics
Semiotics
Sana Hasan
 
Visual Symbol Presentation
Visual Symbol PresentationVisual Symbol Presentation
Visual Symbol Presentation
Rachel Villegas
 
Symbolism in Virginia Woolf's 'To The Lighthouse'
Symbolism in Virginia Woolf's 'To The Lighthouse'Symbolism in Virginia Woolf's 'To The Lighthouse'
Symbolism in Virginia Woolf's 'To The Lighthouse'
Dilip Barad
 
Weld design symbols
Weld design symbolsWeld design symbols
Weld design symbols
Ravi Shankar
 
Cosonant phonetic symbols
Cosonant phonetic symbolsCosonant phonetic symbols
Cosonant phonetic symbols
MaryamAlJohani
 
Symbolism -examples of symbols and symbols used in literature
Symbolism -examples of symbols and symbols used in literatureSymbolism -examples of symbols and symbols used in literature
Symbolism -examples of symbols and symbols used in literature
bsontag
 
Dynamics of Brand Personality
Dynamics of Brand PersonalityDynamics of Brand Personality
Dynamics of Brand Personality
Sj -
 

Viewers also liked (7)

Semiotics
SemioticsSemiotics
Semiotics
 
Visual Symbol Presentation
Visual Symbol PresentationVisual Symbol Presentation
Visual Symbol Presentation
 
Symbolism in Virginia Woolf's 'To The Lighthouse'
Symbolism in Virginia Woolf's 'To The Lighthouse'Symbolism in Virginia Woolf's 'To The Lighthouse'
Symbolism in Virginia Woolf's 'To The Lighthouse'
 
Weld design symbols
Weld design symbolsWeld design symbols
Weld design symbols
 
Cosonant phonetic symbols
Cosonant phonetic symbolsCosonant phonetic symbols
Cosonant phonetic symbols
 
Symbolism -examples of symbols and symbols used in literature
Symbolism -examples of symbols and symbols used in literatureSymbolism -examples of symbols and symbols used in literature
Symbolism -examples of symbols and symbols used in literature
 
Dynamics of Brand Personality
Dynamics of Brand PersonalityDynamics of Brand Personality
Dynamics of Brand Personality
 

Similar to Phase I Presentation Y Symbol

Poetic terminology
Poetic terminologyPoetic terminology
Poetic terminology
mslenihan
 
Y13 Introduction and Early Modern English
Y13 Introduction and Early Modern EnglishY13 Introduction and Early Modern English
Y13 Introduction and Early Modern English
mjrodger
 
A Free Short Dictionary of Literary Terms
A Free Short Dictionary of Literary TermsA Free Short Dictionary of Literary Terms
A Free Short Dictionary of Literary Terms
Carl William Brown
 
historicismaeliya.pdf
historicismaeliya.pdfhistoricismaeliya.pdf
historicismaeliya.pdf
alamzeb101
 
Historicism- The school of thought
Historicism- The school of thoughtHistoricism- The school of thought
Historicism- The school of thought
Naqvisailya
 
Module-0-Intro-to-Lit-9.4.23.pptx
Module-0-Intro-to-Lit-9.4.23.pptxModule-0-Intro-to-Lit-9.4.23.pptx
Module-0-Intro-to-Lit-9.4.23.pptx
ShelsyFrancisco
 
vii- Peter\'s confession
vii- Peter\'s confessionvii- Peter\'s confession
vii- Peter\'s confession
joseph adamson
 
Oral Communication and Philippine Literature LET Reviewer
Oral Communication and Philippine Literature LET ReviewerOral Communication and Philippine Literature LET Reviewer
Oral Communication and Philippine Literature LET Reviewer
ronadelarosa
 
Story of scripts – Part 3 Egyptian Hieroglyphs
Story of scripts – Part 3 Egyptian HieroglyphsStory of scripts – Part 3 Egyptian Hieroglyphs
Story of scripts – Part 3 Egyptian Hieroglyphs
Subramanian Swaminathan
 
General Quiz
General QuizGeneral Quiz
General Quiz
Srinath Bhashyam
 
Mojica powerpoint-morice vanoverbergh
Mojica powerpoint-morice vanoverberghMojica powerpoint-morice vanoverbergh
Mojica powerpoint-morice vanoverbergh
lecelmojica
 
Mojica powerpoint-morice vanoverbergh
Mojica powerpoint-morice vanoverberghMojica powerpoint-morice vanoverbergh
Mojica powerpoint-morice vanoverbergh
lecelmojica
 
pdfcoffee.com_a-guide-to-korean-characters-hanja-pdf-free.pdf
pdfcoffee.com_a-guide-to-korean-characters-hanja-pdf-free.pdfpdfcoffee.com_a-guide-to-korean-characters-hanja-pdf-free.pdf
pdfcoffee.com_a-guide-to-korean-characters-hanja-pdf-free.pdf
LEARNLANGUANGESFASTE
 
Reichenbach - tenses of verbs_1947.pdf
Reichenbach - tenses of verbs_1947.pdfReichenbach - tenses of verbs_1947.pdf
Reichenbach - tenses of verbs_1947.pdf
Carla Lopes
 
The Great Eskimo vocabulary hoax.pdf
The Great Eskimo vocabulary hoax.pdfThe Great Eskimo vocabulary hoax.pdf
The Great Eskimo vocabulary hoax.pdf
stazybohorn1
 
The Great Eskimo vocabulary hoax.pdf
The Great Eskimo vocabulary hoax.pdfThe Great Eskimo vocabulary hoax.pdf
The Great Eskimo vocabulary hoax.pdf
stazybohorn1
 
Freemasonry 077 the letter 'g'
Freemasonry 077 the letter 'g'Freemasonry 077 the letter 'g'
Freemasonry 077 the letter 'g'
ColinJxxx
 
stylisticdevices_21st century lit.pptx
stylisticdevices_21st century lit.pptxstylisticdevices_21st century lit.pptx
stylisticdevices_21st century lit.pptx
MICHAELISIDORO2
 
Primary Source Responses When I assign you to read one or.docx
Primary Source Responses  When I assign you to read one or.docxPrimary Source Responses  When I assign you to read one or.docx
Primary Source Responses When I assign you to read one or.docx
stilliegeorgiana
 
Poetic Devices.pptx
Poetic Devices.pptxPoetic Devices.pptx
Poetic Devices.pptx
Muhammad Haris Nadeem
 

Similar to Phase I Presentation Y Symbol (20)

Poetic terminology
Poetic terminologyPoetic terminology
Poetic terminology
 
Y13 Introduction and Early Modern English
Y13 Introduction and Early Modern EnglishY13 Introduction and Early Modern English
Y13 Introduction and Early Modern English
 
A Free Short Dictionary of Literary Terms
A Free Short Dictionary of Literary TermsA Free Short Dictionary of Literary Terms
A Free Short Dictionary of Literary Terms
 
historicismaeliya.pdf
historicismaeliya.pdfhistoricismaeliya.pdf
historicismaeliya.pdf
 
Historicism- The school of thought
Historicism- The school of thoughtHistoricism- The school of thought
Historicism- The school of thought
 
Module-0-Intro-to-Lit-9.4.23.pptx
Module-0-Intro-to-Lit-9.4.23.pptxModule-0-Intro-to-Lit-9.4.23.pptx
Module-0-Intro-to-Lit-9.4.23.pptx
 
vii- Peter\'s confession
vii- Peter\'s confessionvii- Peter\'s confession
vii- Peter\'s confession
 
Oral Communication and Philippine Literature LET Reviewer
Oral Communication and Philippine Literature LET ReviewerOral Communication and Philippine Literature LET Reviewer
Oral Communication and Philippine Literature LET Reviewer
 
Story of scripts – Part 3 Egyptian Hieroglyphs
Story of scripts – Part 3 Egyptian HieroglyphsStory of scripts – Part 3 Egyptian Hieroglyphs
Story of scripts – Part 3 Egyptian Hieroglyphs
 
General Quiz
General QuizGeneral Quiz
General Quiz
 
Mojica powerpoint-morice vanoverbergh
Mojica powerpoint-morice vanoverberghMojica powerpoint-morice vanoverbergh
Mojica powerpoint-morice vanoverbergh
 
Mojica powerpoint-morice vanoverbergh
Mojica powerpoint-morice vanoverberghMojica powerpoint-morice vanoverbergh
Mojica powerpoint-morice vanoverbergh
 
pdfcoffee.com_a-guide-to-korean-characters-hanja-pdf-free.pdf
pdfcoffee.com_a-guide-to-korean-characters-hanja-pdf-free.pdfpdfcoffee.com_a-guide-to-korean-characters-hanja-pdf-free.pdf
pdfcoffee.com_a-guide-to-korean-characters-hanja-pdf-free.pdf
 
Reichenbach - tenses of verbs_1947.pdf
Reichenbach - tenses of verbs_1947.pdfReichenbach - tenses of verbs_1947.pdf
Reichenbach - tenses of verbs_1947.pdf
 
The Great Eskimo vocabulary hoax.pdf
The Great Eskimo vocabulary hoax.pdfThe Great Eskimo vocabulary hoax.pdf
The Great Eskimo vocabulary hoax.pdf
 
The Great Eskimo vocabulary hoax.pdf
The Great Eskimo vocabulary hoax.pdfThe Great Eskimo vocabulary hoax.pdf
The Great Eskimo vocabulary hoax.pdf
 
Freemasonry 077 the letter 'g'
Freemasonry 077 the letter 'g'Freemasonry 077 the letter 'g'
Freemasonry 077 the letter 'g'
 
stylisticdevices_21st century lit.pptx
stylisticdevices_21st century lit.pptxstylisticdevices_21st century lit.pptx
stylisticdevices_21st century lit.pptx
 
Primary Source Responses When I assign you to read one or.docx
Primary Source Responses  When I assign you to read one or.docxPrimary Source Responses  When I assign you to read one or.docx
Primary Source Responses When I assign you to read one or.docx
 
Poetic Devices.pptx
Poetic Devices.pptxPoetic Devices.pptx
Poetic Devices.pptx
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 

Phase I Presentation Y Symbol

  • 1. Y-symbol Why –Y THE LETTER Y Phase IA By: Group Y Samba Will Gabrielle
  • 2. Etymology Definition A late developing letter in Eng. Called ipsilon in Gk., the Eng. Name is of obscure origin. The sound at the beginning of yard, yes, yield, etc. is from O.E. Words with initial g- as in got an y- as in yet, which were considered the same sound and often transcribed as a character that looks something like 3, known as yogh. The system was altered by Fr. Scribes, who brought over the continental use –g- and from the early 1200’s used –y- and sometimes –gh- to replace 3. http://www.etymonline.com/index.php?search=Y&searchmode=none
  • 3.
  • 4.  
  • 5. Quantities: Three forms One triangle and two trapezoid Three linear forms Three separates areas One triangle
  • 6. Y is theorized to have evolved from proto-voweltaic ancestors which roamed the Earth billions and billions of years ago. Later, in 1066 , a horrific and bloody civil war erupted in France over Y's ambiguous vowel / consonant status. There were no survivors. Continuing this bloody history, Congress decreed Y to be an unnecessary addition to the alphabet in December 8th, 1769, on the grounds that can be replaced by I under pretty much every conceivable circumstance. Y was already envious of I and his resemblance of an erect penis , and proceeded to go on a bloody rampage during the biannual Alphabet Gathering Convention Meeting Assembly Thing (AGCMAT). However, Congress re-assessed its decision and concluded that Y was useful in the popular internet combination of "( o Y o )", representing female breasts . Unfortunately, there were losses during Y's Rampage of the Alphabet Congress, the only notable ones being the annihilation of the letters " Þ " (pronounced "grojj") and " Æ " (pronounced "penis", and later replaced by the letter J ). http://en.wikipedia.org/wiki/Y Interesting Fact
  • 8.
  • 9.
  • 10.

Editor's Notes

  1. Gabielle,samba,Will