Pages 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 8590 result(s) returned

Further reading

Berger and Luckmann (1967) is a classic text in the development of the social constructionist perspective within the sociological tradition. Burr (1995) offers a very thorough review of the social constructionist perspective, clearly outlining the methods of discourse analysis. Although the book draws significantly on debates within social psychology, it is of wide relevance to the social sciences more generally.


Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

Systems practice: Managing sustainability
This free course, Systems practice: Managing sustainability, introduces ways in which systems thinking can help support processes of decision making amongst stakeholders with different, often contrasting, perspectives on sustainable development in order to generate purposeful action to improve situations of change and uncertainty. You will learn about systems practice for managing sustainable development, and find out how 'learning systems' are designed for purposeful action in the domain of sus
Author(s): Creator not set

License information
Related content

Except for third party materials and otherwise stated (see http://www.open.ac.uk/conditions terms and conditions), this content is made available under a http://creativecommons.org/licenses/by-nc-sa/2

Digital communications
Optical-fibre communications became commercially viable in the 1970s and innovation continues today. This free course, Digital communications, will illustrate how very high data rates can be transmitted over long distances through optical fibres. You will learn how these fibres are linked, examine the technology used and assess the future direction of this continually developing area of communication. Author(s): Creator not set

License information
Related content

Except for third party materials and otherwise stated (see http://www.open.ac.uk/conditions terms and conditions), this content is made available under a http://creativecommons.org/licenses/by-nc-sa/2

Introduction

This key skill develops your information technology (IT) skills in your studies, work or other activities over a period of time. To tackle all of this key skill, you will need to plan your work over at least 3–4 months to give yourself enough time to practise and improve your skills, to seek feedback from others, to monitor your progress and evaluate your strategy and present outcomes.

Skills in information technology cover a broad range, from using software unitages to developing a c
Author(s): The Open University

License information
Related content

Copyright © 2016 The Open University

Managing complexity: A systems approach – introduction
Do you need to change the way you think when faced with a complex situation? This free course, Managing complexity: A systems approach introduction, examines how systemic thinking and practice enables you to cope with the connections between things, events and ideas. By taking a broader perspective complexity becomes manageable and it is easier to accept that gaps in knowledge can be acceptable. Author(s): Creator not set

License information
Related content

Except for third party materials and otherwise stated (see http://www.open.ac.uk/conditions terms and conditions), this content is made available under a http://creativecommons.org/licenses/by-nc-sa/2

Design thinking
Are you ever frustrated with something that you thought you could design better? Design thinking can structure your natural creativity to come up with solutions to all kinds of problems, and have fun in the process too! First published on Thu, 22 Dec 2011 as Author(s): Creator not set

4.3 Character code functions

Many programming languages provide two functions associated with the character codes (see Table 2). We shall call these functions ASC and CHR. ASC takes a character as input, and returns the integer giving the ASCII code of the input character. CHR returns the character whose ASCII code is the input integ
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

4.1 Functions

A function is a process that, when given an input of a specified type, yields a unique output. This is a key idea in providing a precise, mathematical, description of processes in computing.

To describe a particular function, we first give the set from which the input will be drawn and the set from which the output is drawn. This information is called the signature of the function. An example will make this clearer. Author(s): The Open University

Objectives for Section 3

After studying this section you should be able to do the following.

  • Recognise and use the terminology: disjoint union; power set (of a set); representation (of a data abstraction).

  • Use and interpret the notation:

     

    • X
      Author(s): The Open University

      License information
      Related content

      Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

3.2 Combining data structures

In Section 2, we introduced the notation SeqOfX for the set of all sequences whose members come from the set X. In Section 2, we looked only at sequences whose members were of one of the primitive forms of data (integers, characters or Booleans). We can have sequences whose members are themselves data with a more complicated form. For example, suppose that Jo is working at the till T1 and is replaced by Jessica. We might represent this handover by the 3-tuple (Jo, T1, Jes
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

Module team

The T822 course team

David Reed (Chair and author)

Jill Alger (Editor)

Chris Bissell (Critical reader and author)

Philippa Broadbent (Print buyer)

David Chapman (Author)

Daphne Cross (Assistant print buyer)

Glen Darby (Graphic designer)

Donna Deacon (Course secretary)

Alan Dolan (Course manager)

Roger Jones (Author)

Jo Lambert (Learning projects manager)

Roy Lawrance (Gra
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

3.3 Hypertext transfer protocol (HTTP)

In this section, I shall look at one example of an application of the TCP/IP protocol suite – sending hypertext pages over the world wide web (WWW or simply the web). However, first I shall very briefly summarise the main features of the web that are relevant to this discussion. There are many sources of information about the web on the web itself for those who want to know more.

In very basic terms, the web is an application of the Internet for accessing resources where
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

3.1 What does TCP/IP protocol architecture do?

The Internet is a worldwide public internetwork, which allows computers to communicate with each other even though they may have different manufacturers and different operating systems. The origins of the Internet lie in a project of the US Defense Advanced Research Project Agency in the 1970s, where it was intended to foster communication between research institutions rather than operate for profit. However, a substantial amount of traffic carried by the Internet is now related to com
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.4 Examples of layer functions

There are several functions that can be performed at one or more of the OSI layers. Some of the more common ones are discussed below.

Connection control

For connection-oriented services, a connection must be established between peer entities. A connection has three phases: connection set-up, data transfer and connection clear. If the peer protocol supports connections, each protocol data unit type corresponds to a primitive type; for instance, a connection request primiti
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

1.2 Protocols in multi-service networks: introduction

Early automatic telephone networks were built to carry only voice traffic and to provide a very simple telephone service – now called plain old telephone service (POTS). When computer networks started to appear, either they were separate from telephone networks or the data carried between computers was a small proportion of the traffic on the telephone network. There are various estimates for the growth of voice and data traffic, and various dates have been given for when data traffic will
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

3.1 Ghosts of departed quantities

They are neither finite quantities, or quantities infinitely small, nor yet nothing. May we not call them the ghosts of departed quantities?

(Bishop G. Berkeley, The Analyst)

This section follows up the ideas presented in and aims to:

  • define the terms analogue, discrete and digital;

  • look briefly at the human perceptual system, whic
    Author(s): The Open University

    License information
    Related content

    Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.4.4 Manipulation

Suppose I take a digital photograph of myself for my website. Horrified by my wrinkled, baggy appearance, what can I do? Actually, with the right software I can do more or less anything I like: I can smooth out the wrinkles; I can restore the grey hair to its former splendour; I can even put in a background of books to give me a scholarly appearance. In fact, I can so improve the picture that if you met the real me you probably wouldn't recognise me.

‘Massaging’ my photographic imag
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

8.3 The AND operation

The AND operation combines two binary words bit by bit according to the rules

  • 0 AND 0 = 0

  • 0 AND 1 = 0

  • 1 AND 0 = 0

  • 1 AND 1 = 1

In other words, only when both bits are 1 is the result 1. You may find it helpful to think of it this way: when one bit is one and the other bit is 1 the result is 1.

Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

7.4 Multiplying 2's complement integers

Multiplication can be thought of as repeated addition. For instance, in denary arithmetic

7 × 5

can be thought of as

7 + 7 + 7 + 7 + 7

There is therefore no need for a new process for the multiplication of binary integers; multiplication can be transformed into repeated addition.

In multiplication the result is very often much larger than either of the two integers being multiplied, and so a multiple-length representation may be needed to hold the result of a mu
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.2.3 Positive integers: converting denary numbers to binary

If computers encode the denary numbers of the everyday world as binary numbers, then clearly there needs to be conversion from denary to binary and vice versa. You have just seen how to convert binary numbers to denary, because I did a couple of examples to show you how binary numbers ‘work’. But how can denary numbers be converted to binary? I'll show you by means of an example.

Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

Pages 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430