2.1 How the programme progresses
The programme takes the form of a visit to Glasgow. We talked to people and asked about their image(s) of Glasgow and whether these had changed – what was the ‘old’ image; what is the ‘new’; how has it changed; what will it be like in another ten years?
The five main participants have different experiences of Glasgow and these are represented in the images which they hold and aspects of the city's character which they highlight. The themes and ideas behind the programme are al
Economic globalisation maybe defined as the increasing interdependence and integration of economic activity in different countries (Thompson, 2000, p. 92). Interdependence means that the production of goods in one country is affected by the production of goods in another. For example, the import of Japanese cars into the UK has affected the UK car industry by taking sales away from it. Integration is a closer relation than interdependence, implying that production processes in different count
1 The problem with crime: Glasgow
Sean Damer examines the problem of crime in relation to Glasgow. The audio programme was recorded in 2001.
Participants in the audio programme were:
Sean Damer Staff Tutor in Politics for The Open University, Scotland and is based in the University of Glasgow;
Moira Burgess a pre-eminent bibliographer of Glasgow and analyst of Glasgow in fiction;
Jimmy Boyle a graduate of Barlinnie Prison's
7.2 On Britishness
Earlier in this unit I considered how Scotland, Wales and Northern Ireland came to be included in the UK. That incorporation was often not free from conflict, resistance, war and military intervention. Hence, as well as cooperation and a common fellowship, suspicion, lack of trust, sometimes hatred, expressed in various forms, have characterised the relationship between England, the leading power, and those nations which were annexed or conquered by it or amalgamated with it.
5.4 Empirical evidence
The neoclassical approach to discrimination produces a number of different explanations for why discrimination may exist in the labour market. Empirical analysis has tended, however, to focus not so much on testing these explanations but rather on establishing how much of an observed earnings differential between, say, men and women, can be accounted for by differences in their relative skill and education levels, their different work histories and differences in hours of work. That part of t
In the previous section we looked at the issue of competing explanations of social problems. Here we want to take a rather different approach by starting from one of the major dividing lines between different types of explanation. These dividing lines are ones that recur in the definition, interpretation and explanation of a range of social issues: for example, patterns of inequality between men and women; crime and juvenile delinquency; the persistence of poverty, and so on. Despite the fact
4.2.3 ATM adaptation layer
The basic function of the ATM adaptation layer is to convert the user data supplied by higher layers into 48-byte blocks of data. The ATM adaptation layer is divided into two sub-layers – the convergence sub-layer, and the segmentation and re-assembly sub-layer. The convergence sub-layer provides services to higher layers through a set of protocols, but I do not need to describe these here. The segmentation and re-assembly sub-layer separates the messages from the conve
A plotter is a special type of printing device mostly used by architects, engineers and map makers. Here the printed output is produced by moving a pen across the paper. Sometimes several differently coloured pens are available. Plotters are obviously most suitable for line drawings, which is why architects, for instance, use them. I've mentioned them here, however, because – in contrast with monitors and printers – they produce an analogue output directly.
Study note: You may like to have the Numeracy Resource to hand as you study Section 15. It offers extra practice with the logic operations, and you may find this useful.
Please click on the 'View document' link below to read the Numeracy Resource.
Study note: You may like to click on the link below to the Numeracy Resource as you study Section 2. It offers additional explanations and extra practice on some of the topics, and you may find this useful.
Click on the 'View document' link below to open the Numeracy Resource.
16.2.1 Receiving data
In a supermarket ICT system, there needs to be some way for the computer to receive information about the items a customer is buying.
Activity 13 (exploratory)
Think back to a recent visit to your local supermarket and how you mad
2.2.2 Drawing the boundary
Deciding where to place the system boundary is an important consideration in that we have to think about what to include and exclude. This isn't always an easy decision to make and it often depends on the perspective of the person viewing the system.
The system maps in Figures 1
In many countries, e-government has become part of government policy. The UK government has a large e-government project under way, as do the governments of the USA, Australia and Japan, to name just a few. The ‘e’ at the start of ‘e-government’ stands for ‘electronic’, and e-government usually refers to the use by governments of ICTs. In many ways e-government is not a single activity but many activities. However, in the UK and many other countries, there is a degree of central c
6.3 Asset identification
You have now completed your study of the ISMS documentation task in the ISMS planning process. In this subsection we study the asset identification task.
You saw in Section 5 that asset identification consists solely of Stage 4.1 of the ISMS planning process, in which the information assets at risk are identified, along with their owners, their locations, their values and their information security requirements. This stage can be subdivided into four steps.
3.2 What do we mean by patches?
Microsoft Windows is an example of an operating system (OS). These operating systems contain millions of lines of code, and inevitably there will be some errors in that code. Some malware writers set out to find these errors, or holes, in the code and exploit them to their own benefit. Whenever holes are found (by IT security people or groups, malware writers or the software developer) the operating system manufacturer will issue a fix for the particular problem. These fixes are referred to a
2.1 What is a virus?
A virus is a piece of computer code – a program – that has been written to gain access to files or programs on your computer. The virus may enter your computer via floppy disk, by email or by your Internet connection. It will look at the files on your computer and infect some of them if it can.
An alternative to searching by simple text matching is to look inside a database specifically structured for genealogical searching. Probably the largest such database is freely available on the Internet. It has been constructed by the Church of Jesus Christ of Latter-day Saints (often abbreviated LDS and known as the Mormons) and is available through their FamilySearch website. Links from the home page of the FamilySearch website explain the purpose and background to the Church's interest in
8.3 Issues and concerns about RFID
As you've seen, RFID tags can be very small devices – certainly small enough to be inserted unobtrusively under the skin or thin enough to be incorporated into a paper label. Their size (both current and potential), coupled with the expected drop in the cost of RFID tags, means that the technology is likely to find its way into many aspects of our lives. You don't have to search far on the Web to find ideas of how RFID tags might be used in the future. We used a Google search and entered th
Copyright 2009 University of Nottingham