541 search results

An introduction to design engineering
Science, Maths & Technology

An introduction to design engineering

...mathematical methods in design engineering...An introduction to design engineering: 4.4 Using numbers to design - To move forward with the desk problem, you needed to know how many other people might be your height. You found a certain desk height acceptable and might reasonably assume this is a good size for everyone of the same height. But how might you find out how...
Astronomy: images of the Universe
Science, Maths & Technology

Astronomy: images of the Universe

...mathematically similar to an inclined elliptical orbit. Figure 6b shows the effect of orientation on the inferred length of a linear extended structure (perhaps an extended gas cloud or a jet-like feature). [Described image] Figure 6 The effects of orientation on measured sizes and shapes of astronomical objects: (a) a disc-shaped object, and (b) a rod-shaped object. At...
Level 2: Intermediate 6 hrs
Early modern Europe: an introduction
History & The Arts

Early modern Europe: an introduction

...mathematics, physics, astronomy and anatomy. For example, Andreas Vesalius (1514–1564), professor of anatomy at Padua University, published De Humani Corporis Fabrica (‘On the fabric of the human body’) in 1543 (Figure 10). Where medieval anatomy texts drew the human body in ways that fitted with humoral theory, Vesalius based his illustrations on observations made...
Artists and authorship: the case of Raphael
History & The Arts

Artists and authorship: the case of Raphael

...mathematics text, lute, quadrant, and other objects depicted in vividly realistic detail behind them belong to the disciplines known as the quadrivium, the arts of Mathematics, Geometry, Astronomy and Music. The other disciplines taught in universities at the time were part of the trivium, Grammar, Logic and Rhetoric, which, Greenblatt suggests, were represented by the...
Learning from major cyber security incidents
Digital & Computing

Learning from major cyber security incidents

...mathematics (or algorithm) responsible for turning plaintext into ciphertext and reverting ciphertext to plaintext (you might also see the word ‘code’ used – there is a technical difference between the two but it need not concern you now). Encryption is the process of converting plaintext to ciphertext (occasionally you may see it called ‘encipherment’)....
The database development life cycle
Science, Maths & Technology

The database development life cycle

...mathematically prove properties of the conceptual data model that would then be realised in the database design. Figure 6 summarises the iterative (repeated) steps involved in database design, based on the overview given. Its main purpose is to distinguish the general issue of what tables should be used from the detailed definition of the constituent parts of each table...
Diversity and inclusion in the workplace Badge icon
Money & Business

Diversity and inclusion in the workplace

...podcasts to support your diversity development. For more practical support, The Advisory, Conciliation and Arbitration Service (ACAS) works with employers and employees to improve workplace relationships, providing advice, policy templates and training as well as useful news updates. The UK’s Equality and Human Rights Commission offers advice and guidance to individuals...
An introduction to school librarianship Badge icon
Education & Development

An introduction to school librarianship

...podcasts and audio-visual materials, can help you create a wealth of digital resources, whatever your budget. For example, free e-books and audiobooks can be obtained from public libraries or websites such as Librivox and Project Gutenberg. Links to these resources can be embedded into your LMS or the school’s VLE. If you require help you should seek assistance from...