• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Sensing and control

Extracts from this document...

Introduction

VGCSE Assignment 4 Tasks 3-A/B sensing control There are hundred and millions of software's that use sensing and control. Companies need to use sensing and control. Otherwise computers will not be able to communicate with each other and we will not be able to live without the sensing and control program because it is an every day use. Sensing and control is mainly used to start and stop things without a human being there. An example of this would be traffic lights. They work automatically using sensors. Cameras use sensors to record what is going on. Speed cameras use sensors because when cars go over a limit of speed it takes pictures. ...read more.

Middle

We all depend on a little software that helps keep order among the streets. 1. A control system typically comprises: 2. A computer or microprocessor 3. A control program which handles data from sensors and sends signals to output devices. 4. An interface box to convert signals between the sensors and processor Most systems can response very quickly and efficiently to the computer. Most system run 24 hours a day and 365 days a year. Most systems are controlled by the computer. This is very efficient. This also prevents humans from working in very dangerous places and use controlled computers to do the work. ...read more.

Conclusion

Magnetic sensors are loops in the tarmac to detect metal above them. This is also used to detect over head cars passing by. In some case there are many dams that haves computer controlled computers. The data from a water level sensor is continually sent to the processor. The computer has a controlled program which usually stores the required level of water. If the water level gets too high a valve is opened to let the water out and similarly if the water level is too low a valve is opened to let the water in. this controlled program stores the details of the water level and the action the computer must take. This is how it works: ?? ?? ?? ?? Muhammad Talha Ghouri 11JH ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Free essay

    Hardware and Functions of a Micro Processor

    The CPU is in charge of all the system and is how it functions. But what is it that controls the CPU? This is the control unit. Depending on system setup and what processor is being used ultimately impacts on the control unit to be used.

  2. Different Control Sensors

    may be used for; * A fan that regulates heat at different speeds * A radio that needs to operate on different frequencies The most common type of rotary switch is the rotary light switch, and the way in which this works is pretty straight forward.

  1. Smart Card System

    With lock-and-key, we can specify which users are permitted access to which source/destination hosts. These users must pass a user authentication process before they are permitted access to their designated host(s). Lock-and-key creates dynamic user access through a firewall, without compromising other configured security restrictions.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    It is also favourable to have more processing power. * Minimum ram - This is set to 32mb having more ram though means the software will run a lot faster. * Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows XP * Peripheral / Interface Devices - Mouse or compatible device, CD-ROM, SVGA monitor I also request that the system has a printer.

  1. Operating Systems

    * The processing begins. The output is not immediate- the processing might take hours. * There is no physical output in this particular case- the output is in the form of updated statements held in electronic form and prepared emails.

  2. Flexible Architectures in Communication Security Application

    We first examine the execution of eight widely known strong secret-key ciphers. We analyze their performance on detailed microarchitectural models, where we are able to clearly show their performance and the bottlenecks that slow their progress. Armed with these insights, we propose a general set of instructions that from which all these kernels can benefit.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work