Introduction This unit is based on a chapter from the book Living Political Ideas, which is part of the current course DD203 Power, Equality and Dissent. It really attempts to do two things at once. It is about the core concepts and processes with which human groups that think of themselves as nations challenge the existing order and assert their right to a state of their own. And at the same time it is a kind of gentle introduction to how to study political ideas. It is more theoretical, or
7.3 Summary of Section 7 The historian Linda Colley locates the birth of ‘Britain’ after 1707. She mentions three main factors that contributed to establishing the British nation: war, religion and the prospect of material advantage. The creation of the UK was not free from conflict, resistance, war and military intervention. The British Empire generated a unique opportunity for most UK nations to participate and enjoy some of the benefits it b
Class Room Instructions for ADHD
Class Room Instructions for ADHD. Part of the series: How to Tell if Your Child Has ADHD. Learn about class room instructions for ADHD in this children's health video.
6.4 Empirical analysis Three key hypotheses have been the focus of empirical evaluation of the segmented labour market theory. First, that the labour market can be represented as comprising at least two well-defined and self-contained segments. Second, that the labour market behaviour of workers and firms in each segment requires a different set of behavioural hypotheses. Finally, that there is limited mobility between the segments reflecting institutional and social barriers in the labour market rather than a lack
3.3 Other disadvantaged groups Information on other disadvantaged groups, such as older workers or people with disabilities, is even harder to come by. The problems faced by older workers in the labour market have become an increasing cause for concern in recent years. The nature of the disadvantage faced by older workers is, however, much harder to uncover and the evidence is often anecdotal. One trend that has become evident during the past three decades is the difficulty older workers have in obtaining any work and, in
Further reading Berger and Luckmann (1967) is a classic text in the development of the social constructionist perspective within the sociological tradition. Burr (1995) offers a very thorough review of the social constructionist perspective, clearly outlining the methods of discourse analysis. Although the book draws significantly on debates within social psychology, it is of wide relevance to the social sciences more generally.
Systems practice: Managing sustainability
This free course, Systems practice: Managing sustainability, introduces ways in which systems thinking can help support processes of decision making amongst stakeholders with different, often contrasting, perspectives on sustainable development in order to generate purposeful action to improve situations of change and uncertainty. You will learn about systems practice for managing sustainable development, and find out how 'learning systems' are designed for purposeful action in the domain of sus
Digital communications
Optical-fibre communications became commercially viable in the 1970s and innovation continues today. This free course, Digital communications, will illustrate how very high data rates can be transmitted over long distances through optical fibres. You will learn how these fibres are linked, examine the technology used and assess the future direction of this continually developing area of communication.
Author(s):
Introduction This key skill develops your information technology (IT) skills in your studies, work or other activities over a period of time. To tackle all of this key skill, you will need to plan your work over at least 3–4 months to give yourself enough time to practise and improve your skills, to seek feedback from others, to monitor your progress and evaluate your strategy and present outcomes. Skills in information technology cover a broad range, from using software unitages to developing a c
Managing complexity: A systems approach – introduction
Do you need to change the way you think when faced with a complex situation? This free course, Managing complexity: A systems approach introduction, examines how systemic thinking and practice enables you to cope with the connections between things, events and ideas. By taking a broader perspective complexity becomes manageable and it is easier to accept that gaps in knowledge can be acceptable.
Author(s):
Design thinking
Are you ever frustrated with something that you thought you could design better? Design thinking can structure your natural creativity to come up with solutions to all kinds of problems, and have fun in the process too! First published on Thu, 22 Dec 2011 as Author(s):
4.3 Character code functions Many programming languages provide two functions associated with the character codes (see Table 2). We shall call these functions ASC and CHR. ASC takes a character as input, and returns the integer giving the ASCII code of the input character. CHR returns the character whose ASCII code is the input integ
4.1 Functions A function is a process that, when given an input of a specified type, yields a unique output. This is a key idea in providing a precise, mathematical, description of processes in computing. To describe a particular function, we first give the set from which the input will be drawn and the set from which the output is drawn. This information is called the signature of the function. An example will make this clearer. Author(s):
Objectives for Section 3
After studying this section you should be able to do the following.
Recognise and use the terminology: disjoint union; power set (of a set); representation (of a data abstraction). Use and interpret the notation:
X
3.2 Combining data structures In Section 2, we introduced the notation SeqOfX for the set of all sequences whose members come from the set X. In Section 2, we looked only at sequences whose members were of one of the primitive forms of data (integers, characters or Booleans). We can have sequences whose members are themselves data with a more complicated form. For example, suppose that Jo is working at the till T1 and is replaced by Jessica. We might represent this handover by the 3-tuple (Jo, T1, Jes
Module team David Reed (Chair and author) Jill Alger (Editor) Chris Bissell (Critical reader and author) Philippa Broadbent (Print buyer) David Chapman (Author) Daphne Cross (Assistant print buyer) Glen Darby (Graphic designer) Donna Deacon (Course secretary) Alan Dolan (Course manager) Roger Jones (Author) Jo Lambert (Learning projects manager) Roy Lawrance (Gra
The T822 course team
3.3 Hypertext transfer protocol (HTTP) In this section, I shall look at one example of an application of the TCP/IP protocol suite – sending hypertext pages over the world wide web (WWW or simply the web). However, first I shall very briefly summarise the main features of the web that are relevant to this discussion. There are many sources of information about the web on the web itself for those who want to know more. In very basic terms, the web is an application of the Internet for accessing resources where
3.1 What does TCP/IP protocol architecture do? The Internet is a worldwide public internetwork, which allows computers to communicate with each other even though they may have different manufacturers and different operating systems. The origins of the Internet lie in a project of the US Defense Advanced Research Project Agency in the 1970s, where it was intended to foster communication between research institutions rather than operate for profit. However, a substantial amount of traffic carried by the Internet is now related to com
2.4 Examples of layer functions There are several functions that can be performed at one or more of the OSI layers. Some of the more common ones are discussed below.
Connection control
For connection-oriented services, a connection must be established between peer entities. A connection has three phases: connection set-up, data transfer and connection clear. If the peer protocol supports connections, each protocol data unit type corresponds to a primitive type; for instance, a connection request primiti
1.2 Protocols in multi-service networks: introduction Early automatic telephone networks were built to carry only voice traffic and to provide a very simple telephone service – now called plain old telephone service (POTS). When computer networks started to appear, either they were separate from telephone networks or the data carried between computers was a small proportion of the traffic on the telephone network. There are various estimates for the growth of voice and data traffic, and various dates have been given for when data traffic will