1,370 search results

Introduction to cyber security: stay safe online Badge icon
Digital & Computing

Introduction to cyber security: stay safe online

...data moves between computers over the internet, how it can be attacked, and how it can be kept secure. What if you are attacked? We'll also be looking at ways to deal with the aftermath, as well as steps you can take to prevent any future attacks from being successful. By the end of the course, you'll know how to recognise online threats. You'll know what steps to take to...
Festival of Psychology
Health, Sports & Psychology

Festival of Psychology

...analysis will highlight how the role played by the adult ‘other,’ coupled with a sometimes-hostile sociocultural context, can exaggerate tensions or facilitate interactions in the parent-child relationship. The young people’s views and experiences illuminate how they navigate these complexities. Online Interventions for the Treatment of Movement Symptoms in...
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST) Badge icon
Digital & Computing

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

...data moves between computers over the internet, how it can be attacked, and how it can be kept secure. What if you are attacked? We'll also be looking at ways to deal with the aftermath, as well as steps you can take to prevent any future attacks from being successful. By the end of the course, you'll know how to recognise online threats. You'll know what steps to take to...
Challenges in advanced management accounting
Money & Business

Challenges in advanced management accounting

...analysis of management accounting data for use in developing and monitoring business strategy. Consistent with the notion of achieving competitive advantage, he advocates that attention be paid to competitors’ relative levels and trends in such factors as costs, prices, market share, cash flow and financial structure. Coad (1996, p. 387) SMA is identified as a generic...
Riddle of the Tay Bridge disaster
Science, Maths & Technology

Riddle of the Tay Bridge disaster

...analysis Mathematician Tom Martin uses the modern method of 'structural computer analysis' to understand the failure of the bridge, and looks at how this failure started at the base columns due to heavy winds. Forensic Engineering Dr Pete Lewis explains how he believes the dynamic effects of vibration and the inappropriate use of cast iron, caused fatigue to the Tay...
Do people need Peeple?
Digital & Computing

Do people need Peeple?

...data without truly informed consent. Or, as it was put in a Washington Post article: The most surprising thing about Peeple — basically Yelp, but for humans — may be the fact that no one has yet had the gall to launch something like it. It’s been pointed out that some dating apps, such as Lulu, have very similar features. However, these dating apps only allow people...
Simple Coding - Summary
Digital & Computing

Simple Coding - Summary

...data arithmetic operators (+, -, *) simple data types (strings and numbers, both integers and floating point) data structures (lists) sequence (one instruction per line) iteration (for and while loops) selection (if-else and if-elif-elif-...-else), comparisons (>, <, ==, !=, >=, <=) functions (len and sum for lists, int and float to convert strings to numbers) input from...
Lleihau ôl troed carbon digidol y cwmwl
Nature & Environment

Lleihau ôl troed carbon digidol y cwmwl

...data i raglenni, o raglenni a rhwng rhaglenni. Cyn i ni wneud hynny, mae'n werth nodi bod y broses o symud cyfrifiadura a storio i'r cwmwl wedi cynnig cyfle i ehangu oes asedau cyfrifiadura personol, fel y trafodir yn yr erthygl caffael cyfrifol. Mae'r cwmwl yn helpu i ehangu defnydd oes cyfrifiaduron personol Tua 2016, cafwyd trobwynt o ran technolegau cwmwl, a...