1.1 Introducing ‘family meanings’ Wendy: What's important about being in a family? Juliet: I've got mixed feelings in a way, cause I sometimes feel they are over-rated … You don't have to be suffocated in a two parents and a couple of kids situation. To me that is not the be all and end all. … Fred: … it's the natural flow of family life isn't it. You know that you get old 3.6 Summary The common-sense narratives of the crime problem in the UK can be broken down into a series of distinct claims that make assessing them easier. Those claims can be tested against quantitative and qualitative evidence. Both types of evidence suggest that the narrative of change from a secure to an insecure society is at best partial, overestimating the tranquillity of the past, and the uncertainty and riskiness of the present. Acknowledgements The content acknowledged below is Proprietary (see terms and conditions) This content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence Grateful acknowledgement is made to the following sources for permission to reproduce material in this Learning outcomes After studying this course, you should be able to: describe how photographs affect a globalised industry understand the global dimension of the Scottish oil industry and how that has affected the local population. Keep on learning   There are more than 800 courses on OpenLearn for you to References 3.5 Reactions and reflections 6 Conclusion As you moved through the various techniques we can use to analyse media texts in Sections 2 to Section 4, you should have discovered how rich even the simplest text can be in its drawing on political, social and cultural meanings discernible by close attention. Textual analysis enables you to register and negotiate the polysemy of texts and to see how the preferred reading is not the only one available. The preferred reading may be given prominence, however, by anchoring or by the genre chose Learning outcomes After studying this course, you should be able to: illustrate how CCTV is used for general surveillance give examples of how CCTV can be used for crime control. Learning outcomes After studying this course, you should be able to: describe New Labour's approach to Welfare Reconstruction. 6.10 To extend or include? Whatever kind of system you intend to develop, you will need to consider its security. Usually, we allow only trustworthy people to use a new system. Therefore, in a software solution we can envisage a log-on use case, which describes how a user gains access through some authentication procedure. How should such a requirement be included in the example of the hotel chain? By analogy with natural languages, the UML allows a number of ‘grammatically correct’ options each of which will 6.9 Alternatives to the main success scenario If a use case incorporates a scenario that is significantly different from the main success scenario, you may decide to create a new subsidiary use case. There may even be a need to create more than one subsidiary, depending on what happens in different circumstances. For example, when making a reservation in a typical hotel the receptionist would first determine whether the guest was already known to the hotel (among other advantages, this would speed up the reservation process since re-ente 6.7 Stereotypes In the UML, a stereotype is a way of adding detail to any part (element) of a model. It is a way of expressing variation or a usage distinction that tells you more about the original element. For example, the line drawn between an actor and a use case indicates that there is an association between them. We could add the stereotype «communication» to such a line to emphasise the communication that takes place between the two. In practice, this stereotype is left out because it is the 6.6 Modelling the relationships between use cases There are two situations when you would consider adding details to a use case diagram: to identify a common task (and its associated scenarios) that is shared between two or more use cases; to record any alternatives or additions to the main success scenario as separate use cases. In both situations, the new tasks are shown as new use cases (ovals) and, as you will see below, the UML provides a suitable notation (known as 6.4 Scenarios The purpose of a use case is to meet the goal of its associated actor(s), such as a guest making a reservation with a hotel. This implies that a use case should include everything that must be done to meet that goal. For example, if it is necessary to check the availability of rooms in the hotel for the desired length of stay before accepting a reservation, then we expect the use case to contain that check. In general, a use case contains a narrative about the flow of events that specifies a Acknowledgements The content acknowledged below is Proprietary (see terms and conditions) and is used under licence. Course image: gothopotam in Flickr made available under Author(s): Keep on learning   There are more than 800 courses on OpenLearn for you to Conclusion Relational database systems underpin the majority of the managed data storage in computer systems. In this course we have considered database development as an instance of the waterfall model of the software development life cycle. We have seen that the same activities are required to develop and maintain databases that meet user requirements. 1.8 Maintenance Databases are one of the more enduring software engineering artefacts; it is not uncommon to find database implementations whose use can be traced back for 15 years or more. Consequently, maintenance of the database is a key issue. Maintenance can take three main forms: Operational maintenance, where the performance of the database is monitored. If it falls below some acceptable standard, then reorganisation of the database, usuall 1.6.3 Supporting users and user processes Use of a database involves user processes (either application programs or database tools) which must be developed outside of the database development. In terms of the three-schema architecture we now need to address the development of the external schema. This will define the data accessible to each user process or group of user processes. In reality, most DBMSs, and SQL itself, do not have many facilities to support the explicit definition of the external schema. However, by using built-in q
Study another free course
Activity 8
Study another free course