“…Formally, a node A c-commands another node B if, and only if, A does not dominate B; and every node X that dominates A also dominates B (Reinhart, 1981); a node P dominates another node Q if P occurs at a depth higher than Q and a path exists from P to Q (the depth of a node from the root is the number of vertices traversed exactly once from root to node). As an illustration, consider Example 1a; here, No man c-commands ever, but a beard does not: Much controversy surrounds the precise constraints operating on negative polarity licensors (e.g., see Baker, 1970;Chierchia, 2006;Fauconnier, 1975aFauconnier, , 1975bGiannakidou, 1998;Horn, 2001;Israel, 2006;Krifka, 1995;Ladusaw, 1980;Linebarger, 1987;Szabolcsi, 2004;van der Wouden, 1997). However, for the above examples, it can be argued that 1b, 1c, 2b, and 2c violate the c-command constraint on NPIs.…”