Describe three of the main methods of site location techniques used by modern archaeologists and assess their effectiveness.

Describe three of the main methods of site location techniques used by modern archaeologists and assess their effectiveness. Although the human eye is an extremely important instrument in the location of rescue archaeology sites, over the years, more advanced techniques have been developed. In this essay, I shall look at three of these: * Geological Survey techniques * Ground Survey techniques * Metal Detectors Geological Survey involves the use of a variety of methods and techniques to produce a detailed map of what is below the surface of the area being surveyed. The primary techniques are Magnetometry and Resistivity. Geophysical survey techniques are the most commonly used method of site identification when a suspected archaeological site lies beneath the land surface. They are non-intrusive and are subsequently invaluable when excavation is not possible. Before conducting either a Geological Survey, or a Ground Survey, a grid needs to be created for the area under investigation. Control points are established which allow the site to be synchronized with the National Grid. First of all, a Baseline is established in the prevailing direction of the site. The ends of this are co-ordinated by Triangulation. This fixes the baseline to the surround area, usually by using tape, which is then broken up into suitable units marked by stakes placed in the ground. Once this

  • Word count: 1312
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

What is a data frame? Show the layout of a data frame from a lower layer protocol (name the protocol) and describe its fields.

What is a data frame? Show the layout of a data frame from a lower layer protocol (name the protocol) and describe its fields. A data frame is used to describe a transmission packet in bit oriented protocols. It usually includes the original data with each higher layer's header, and data link layer its own header/trailer. The header has information about the destination where the data is going. Its purpose is to make sure each data reaches the correct destination. Here is an example of a DIX 8 Preamble 6 Dest. Addr. 6 Source Addr. 2 Type 46-1500 Data 4 CRC DIX data frame use a 6 octets to synchronize the transmitter and receiver. Receiver uses the synchronization bits to sense the incoming message and establish time or synchronization with the transmitter. The preamble is a bit pattern used to identify the start of the frame. The next field after the Preamble field is the 48 bits destination address, which identified the receiver. The field after is the source address, which used to identify the sender; it is also a 48-bit field. There are 3 address types, which are used for a destination address: * Address of a specific workstation, * A general address to a group of workstations * A broadcast address to all workstation The type field identifies the destination network protocol for the frame data. It verifies the type of the data. The CRC (Frame

  • Word count: 2146
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

What advice would you give to an organization considering introducing performance appraisal as part of a performance management system?

What advice would you give to an organization considering introducing performance appraisal as part of a performance management system? Performance Management is 'a strategic and integrated approach to increasing the effectiveness of organizations by improving the performance of the people who work in them and by developing the capabilities of teams and individual contributors'. (Hartle, 1997,pg 12) Performance management is a non - linear process that involves the following: Performance planning: where the manager and employee determine performance expectations and agree on what is to be done and how well it should be done. On-going performance communication throughout the year to track progress throughout the year and ensure that job tasks stay on track. This two-way communications red-flags problem before they grow and keep the manager and employee current. This can be done in short monthly or weekly status reports and informal communication whereby the manager walks around. In most cases, the manager may not produce anything on paper. Data gathering, observation and documentation are also vital in the performance management process. Data is gathered to get information relevant to improvement whether individual or organizational, observation is also a way of gathering data and documentation is a process of recording the data collected for future use.

  • Word count: 1586
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

'Setting up a financial planning model/tool to enable a family to plan their finances'.

Analysis of Task There is only one major subtask which is- 'Setting up a financial planning model/tool to enable a family to plan their finances'. This can be split into a number of smaller subtasks which are as follows- - Designed a model. Identifying formulae within the model. - Implement the design system using appropriate formulae. - Test the design system with no data to compare it with reality. Once I have set my model I will do the following- - Controlling - Measuring - Modelling Controlling You can control some of the bills that you pay so that you make sure you do not spend more than you are earning. You can set yourself a budget for over the next 12 months, which will control the way you spend your money. You can control bills such as the telephone bill. You are in control of how much time you talk on the telephone. You can reduce this bill by not talking so much. Also you can control your sky television bill. You choose the number of channels you want to be available and pay for them. You can also control how often you pay your bills, monthly, yearly etc. However, there are certain bills, which you cannot control. These are things such as council tax, which is a set amount, which you have to pay. Also you cannot control your water bill if you do not have a water meter. Measuring You can measure your expenditure by looking at patterns within the model

  • Word count: 935
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Precise analysis about The legal or illegal utilization of Internet cookies

Customers' privacy: Precise analysis about The legal or illegal utilization of Internet cookies ---------------------------------------------------------------------------------------------------- Introduction Increasingly, dependencies to the Internet and online shopping are being placed among People. Every wise business man can quickly realize this opportunity and its profitable commercial potential. According to Gilbert (cited in Palmer 2005, paras 2-3), in recent years, Internet sales have grown incredibly, by 2002, 67 million American were buying their goods via internet. Beside this potential place for businesses, marketers are always like to identify and track highly active customers. By growing the importance of commerce in the Internet, some of annoying marketing techniques such as cookies and spamming has been rapidly grown among marketers which are problem for most Internet users. It is clear that the most important thing in Internet for every user is privacy. These years, Cookies (not edible or delicious one), has been a controversial debate among users in case of Internet privacy threat. Despite apparent disaffection of Internet users about cookies it is still firmly used by most marketers. The problem is there is not any firm legislation and clear explanation about cookies. As Swartz argues (cited in Palmer

  • Word count: 3780
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

CAM, which stands for Computer aided manufacture, is used extensively within companies as a stand-alone system from CAD Computer Aided Design.

Date Submitted-: 24th June 2002. Contents CONTENTS 1 INTRODUCTION 2 TOOLING VERIFICATION 2 Fig. 1. - An Example of Qualified Tooling 3 Fig. 2. - Examples of block tooling. 3 DATUM AND LOCATION CHECKS 4 Fig. 3. - An example of a Grid plate 4 IN PROCESS MEASUREMENT 5 POST PROCESS INSPECTION 5 QUALITATIVE DATA AND ATTRIBUTES 6 STATISTICAL ANALYSIS 6 DATA CAPTURE 7 METHODS OF DATA CAPTURE 7 EXAMPLES OF DATA CAPTURE 7 Annular Rings 7 Fig. 4. - Example of how annular rings work 8 Considering the rings from left to right 8 Microchip 8 Barcode 9 Fig. 5. - Matrix comparing sensor methods 9 DATA TRANSMISSION FEATURES 10 APPENDIX A 11 ACKNOWLEDGEMENTS 11 Introduction CAM, which stands for COMPUTER AIDED MANUFACTURE, is used extensively within companies as a stand-alone system from CAD (Computer Aided Design). However, there is a distinct relationship between the two systems where data is exchanged between each system in a CAD/CAM set-up. Cam systems cover activities that translate the design of a component into instructions that define how the component will be produced. Also, CAM can be extended into providing feedback on the manufacturing process through the use of inspection and quality control tools that are controlled by computer. CAM is, therefore, any manufacturing process that is controlled by computer. CAM can be extended to cover more complicated

  • Word count: 3768
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

In this report I shall use BPS (Back Error Propagation Simulator), this program stimulates a multi layer neural network using back error propagation as a learning algorithm. I will use BPS to create two multi-layer perceptron networks,

Introduction In this report I shall use BPS (Back Error Propagation Simulator), this program stimulates a multi layer neural network using back error propagation as a learning algorithm. I will use BPS to create two multi-layer perceptron networks, which once completed and trained shall attempt to recognise five characters formed on a 5 x 5 pixel grid. The first network will consist of two layers (an input layer and an output layer). The second network will consist of three layers (an input layer, a hidden layer and an output layer). I will train and test both of these networks, in order to test the two significantly I will add noise to each of the five characters and record the output given from both networks and compare and contrast the two. . Representation of the digits and letters The following letters and digits were chosen to represent the input data: J, G, B, 1 and 2. The reason why these letters and digits were chosen is because they were fairly different from each other. For example the letters J and G have a significant difference between them. When I input these in two both of the networks, I will be able to add noise in various places and this will therefore allow me to test both of my networks more efficiently. As for the digits I decided to choose 1 and 2 this was also due to the fact that I could add more noise to both of these characters. When both of

  • Word count: 900
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

This report will discuss the benefits and constraints of network systems and topologies.

Transfer-Encoding: chunked Networking Technologies L 01 Understanding Networking principles Network arrangement in an organization might help to decrease the effort and enhance the data safety. The report will discuss the benefits and constraints of network systems and topologies. The report will discuss the impact of technology and standards along with actual application of different networking system. The report will also discuss the role of hardware and software components and control the server and terminal requirement of network. The report will present the network design and will evaluate the network along with implementation, testing of requirements and recommended solutions to possible problems in network. The report will present the network maintenance schedule. htts//wwwlifewire.com/computer-network-topology-8178840 28/05/2017 Task 1.1 Discuss the benefit and constraints of different networking system type and topologies. Topology is the layout of connecting devices. This object introduces the average topologies of networking. *Network type * WAN, LAN, WLAN, MAN *WAN- wide area network. *LAN- Local area network. *WLAN- Wireless local area network. *MAN- Metropolitan area network. * Wide Area Network (WAN)A wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN joins different smaller networks, including local area

  • Word count: 2299
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Computers

As each us of look at our lives, do we realize the importance of these electronic mechanisms we call computers? I shall now endeavor to elaborate upon how these mind tools have, and continue to affect me. Every morning, I awake to the awkward squawking of my alarm clock. Much to my dismay, I groggily smack the 'off' button and crawl out of bed. My first encounter of the day has just occurred. That small black box that faithfully rouses me, is a simple microcomputer. If it were not for this device, many days I would arrive late to

  • Word count: 400
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Forensic Tools and Techniques - EnCase & XRY

Contents Section 1 – Forensic Software Evaluation Section 2 – Forensic Software Portfolio Bibliography Section 1 – Forensic Software Evaluation Encase by Guidance Software EnCase by Guidance Software is an industry-standard computer investigation solution. It provides forensic practitioners with useful features to assist them with efficient, forensically sound data collection and investigation using a repeatable process. EnCase provides useful tools for data acquisition, file recovery and indexing/search file parsing. Two major features that EnCase boasts are the range of operating systems and file systems supported. Each operating system contains a different amount of file systems which the operating system utilises. It is useful to have this feature available to examiners due to the fact that there are many different electronic devices running these different Operating Systems and file systems. For example, EnCase provides support for Smartphone and Tablets running the following operating systems; Apple iOS, Android OS, Blackberry OS, Palm OS, Symbian and Windows Mobile OS. EnCase also organises files in a sensible and logical order. For example, it creates a directory for evidence files, which contains only the files or folders needed. Another feature of the data acquisition process is the Cyclical Redundancy Checksum (CRC) hash. Each

  • Word count: 1672
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay