1,370 search results

Choose your own philosophy adventure
History & The Arts

Choose your own philosophy adventure

...analysis of your choices and a map of how your opinions compare to different philosophers through the ages. Are you ready to turn the first page? If so, select the image below to open the book... [Black and white illustration of a castle surrounded by trees with a tower in the centre. Dot like dashes create a sea around the island the castle is on top of.] Open the book...
Rural entrepreneurship in Wales
Money & Business

Rural entrepreneurship in Wales

...data about your area; it is worth exploring these either by going directly to your Local Authority’s website or by going to the Business Wales website where you will find links to all of the 22 LAs as well as additional information and support. At the end of this section we suggest some possible sources of information and support. Task 1: Personal objectives Write down...
Level 1: Introductory 30 hrs
Understanding ADHD
Health, Sports & Psychology

Understanding ADHD

...analysis determines to some extent the amount of data that needs to be collected, the amount of data collected in qualitative methods is based on the principle of reaching a saturation point – the point at which no new information is obtained when further data are collected. The interviews by Mofokeng and van der Wath (2017) centred on one question, ‘What are your...
Level 2: Intermediate 12 hrs
Everyday maths 2
Science, Maths & Technology

Everyday maths 2

...data, and organising and representing information in different ways finding the mean, median and range of a group of numbers. Finding the mean from grouped data using data to assess the likelihood of an outcome and expressing this in different forms working with area, perimeter and volume, scale drawings and plans...Session 4: Shape and space: 8 Next steps - Take your...
Free course 48 hrs
What's up with Whatsapp - and should we weaken its security?
Digital & Computing

What's up with Whatsapp - and should we weaken its security?

...data. Most recently, in the wake of the March attack at Westminster, Amber Rudd, the UK home secretary, said it was unacceptable that the government couldn’t read the encrypted messages of suspected terrorists. [The Conversation] The main argument behind this request is that access to messages will allow authorities to thwart future terror attacks. On the other hand,...
Someone’s attacking our connection to the internet - part one
Science, Maths & Technology

Someone’s attacking our connection to the internet - part one

...data associated with the image is. Like most digital photos, the image has associated EXIF data usually used to store information about the type of camera and lens used to take the photo, the exposure settings, the location and so on. This image contains fake EXIF longitude and latitude data; VPNFilter extracts six numbers from this fake EXIF to form a valid IP number –...
Large language models - the chatty computer
Digital & Computing

Large language models - the chatty computer

...data sets. During the training process, LLMs learn the statistical relationships between words in the training set. In the case of ChatGPT, this eventually amounted to some 175 billion relationships derived from 45 terabytes of text. Given the enormous volumes of data being processed, most of this training process is completely automated; running for months on giant...
The taste of love on different tongues: What language tells us about love
Languages

The taste of love on different tongues: What language tells us about love

...Analysis, I’ve made a start by searching the world’s languages for words relating to love that don’t exist in English. Most of us use the word love fairly liberally. I use it for the deep ardour, care and respect I have for my wife. But I will also call upon it to describe the unshakeable bonds of kinship and history I share with my family, and the connections and...