Acknowledgements

The content acknowledged below is Proprietary (see terms and conditions) and is used under licence.

Grateful acknowledgement is made to the following sources for permission to reproduce material in this unit:

Video Materials

This video extract is from Coast Se
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.2 Background and recordings

Sorley MacLean, 1911–98, is now regarded as one of the greatest Scottish poets of the twentieth century. Until the 1970s, his verse was known by very few people. In that decade, publication of English translations and the impact of his public readings established him in the eyes of poetry lovers in Scotland, Ireland and England, as well as further afield, as a major poet.

Yet, curiously, this impact depended on work that mostly derived from a very specific conjunction of personal and
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.1.1 Aims

The aims of these recordings, in which Sorley MacLean is interviewed by Iain Crichton-Smith, are to:

  • (a) help you to sense the power of MacLean's poetry in its original Gaelic;

  • (b) assist your understanding of the English texts of the poems, translated by MacLean himself.


Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

5.4 Activity 8

Activity 8

The M & S case study illustrates the importance of managing relationships. Having read it, try to answer the following questions.

  • On which value discipline has the company chosen to f
    Author(s): The Open University

    License information
    Related content

    Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

Acknowledgements

The content acknowledged below is Proprietary (see terms and conditions) and is used under licence.

Grateful acknowledgement is made to the following sources for permission to reproduce material in this unit:

Table

Table 1: Eurobarometer 49, September 1998, © European Communities.

Unit Image

www.flickr.com TPCOM

All other materials included in this unit are derived from co
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

1 What does the philosophy of the social science offer?

Why study the philosophy of the social sciences? Before we can answer this question we need to ask briefly a whole series of preliminary questions, such as:

  • Why do we study social phenomena?

  • How do we study social phenomena?

  • How does theory help us to deal with complex evidence?

  • Which theory is the most appropriate?

  • Which concepts are most useful for the task?

  • How do
    Author(s): The Open University

    License information
    Related content

    Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

WO-339_19222 Casualty notification form Captain Alfred Edward Bland

The National Archives UK posted a photo:

WO-339_19222 Casualty notification form Captain Alfred Edward Bland

The casualty notification form for Captain Alfred Ed
Author(s): nobody@flickr.com (The National Archives UK)

License information
Related content

https://www.flickr.com/commons/usage/

7.5 The spread of spam

A staggering 25 per cent of all incoming mail messages to the Open University in February 2004 were marked as spam by our automated spam filter. Is this a problem that is getting worse?

There are companies that act as filtering agents for email; they check and stop viruses, spam and pornography.

  • Do, using the link below, look at the proportion of messages that one such company, Messagelabs, has blocked in the last 12 months.


  • Author(s): The Open University

    License information
    Related content

    Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.3 Trojans

The term Trojan comes from the Greek legend about the fall of the city of Troy. The story goes that, during the seige of the city by the Greeks, a huge, hollow wooden horse was left in front of the gates. The inhabitants thought that it was a peace offering from the Greek army and dragged it into the city. Unknown to them, it was being used to conceal Greek soldiers, who were thus able to use this Trojan horse to enter the city and open the gates for the rest of their army.

Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.2.1 What is the difference between a worm and a virus?

Unlike a virus, a worm does not infect files on a host computer. Instead it adds a file to the computer that is malicious code, and runs it ‘in the background’. A computer has many programs running in this way in order for its system to operate. For instance, when you create a document you can see the text editor, such as Microsoft Word, Notepad or Star Office, but in the background the spell checker or the printer program are working even though you do not see them on the screen.

W
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.1.1 What do we mean by 'infect'?

A virus will attach itself in various ways to a file that already exists on a ‘host’ computer, and when that file is run, the virus activates as well. A computer virus works in a similar way to a biological virus.

Biological virus: an infectious agent of small size and simple composition that can multiply only in living cells of animals, plants or bacteria.

Computer virus: an infectious program of small size
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.1 What is a virus?

A virus is a piece of computer code – a program – that has been written to gain access to files or programs on your computer. The virus may enter your computer via floppy disk, by email or by your Internet connection. It will look at the files on your computer and infect some of them if it can.


Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.2 Fixed and adaptive protocols

The protocol described above for a simple naming service is an example of a fixed protocol. This is a protocol whose vocabulary is fixed: it is embedded in the client and server's code and data and does not change. An adaptive protocol is one where the protocol changes. A fixed protocol could change over a period of time because the functionality provided by a server changes. However, this change will be over months or years rather than over seconds.

There are some instances wher
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

4.5 Vulnerability and rights

One of the assumptions that is made in order to justify social workers making such life-changing judgements is that some people are vulnerable and therefore need decisions made on their behalf. This assumption is not held by everyone and is often challenged by groups and individuals representing service users and by service users themselves.

Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

ES200 Final Project_Ramirez

Final Project


Author(s): No creator set

License information
Related content

Introducing Rhodes finalist Giuseppe Del Gobbo
Rhodes Scholarship finalist Giuseppe Del Gobbo talks about why he chose engineering, and why it's important to be a well-rounded student.
Author(s): No creator set

License information
Related content

15. Langston Hughes
Modern Poetry (ENGL 310) with Langdon Hammer The poetry of Langston Hughes is considered as a representation of the African-American experience. The distinctive concerns of Hughes's poetic project are juxtaposed with the works of other modernists, such as Pound, Eliot, Frost, and Stevens. Hughes's interest in and innovative use of musical forms, such as blues and jazz, is explored with particular attention to their role in African-American culture, as well as their use by Hughes to forge an al
Author(s): No creator set

License information
Related content

06.12.2012 – Langsam gesprochene Nachrichten
Trainiere dein Hörverstehen mit den Nachrichten der Deutschen Welle von Donnerstag – als Text und als verständlich gesprochene Audio-Datei. *** Der Machtkampf in Ägypten ist in der Nacht weiter eskaliert. Bei Straßenschlachten zwischen Anhängern der regierenden Islamisten und der Opposition in der Hauptstadt Kairo wurden mindestens fünf Menschen getötet, wie staatliche Medien berichteten. Rund 350 Menschen seien bei den Ausschreitungen rund um den Palast von Präsident Mohammed Mursi
Author(s): No creator set

License information
Related content

Bubble Suspension
In this activity, learners observe as soap bubbles float on a cushion of carbon dioxide gas. Learners blow bubbles into an aquarium filled with a slab of dry ice. Learners will be amazed as the bubbles hover on the denser layer of carbon dioxide gas, then begin to expand and sink before freezing on the dry ice. Use this activity to discuss sublimation, density, and osmosis as well as principles of buoyancy, semipermeability, and interference.
Author(s): Creator not set

License information
Related content

Rights not set

Lesson 08 - One Minute Romanian
In lesson 8 of One Minute Romanian you will learn to count from one to ten. Remember - even a few phrases of a language can help you make friends and enjoy travel more. Find out more about One Minute Romanian at our website - http://www.oneminutelanguages.com. One Minute Romanian is brought to you by the Radio Lingua Network and is ©Copyright 2008.Author(s): No creator set

License information
Related content