• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Sensing and control

Extracts from this document...

Introduction

VGCSE Assignment 4 Tasks 3-A/B sensing control There are hundred and millions of software's that use sensing and control. Companies need to use sensing and control. Otherwise computers will not be able to communicate with each other and we will not be able to live without the sensing and control program because it is an every day use. Sensing and control is mainly used to start and stop things without a human being there. An example of this would be traffic lights. They work automatically using sensors. Cameras use sensors to record what is going on. Speed cameras use sensors because when cars go over a limit of speed it takes pictures. ...read more.

Middle

We all depend on a little software that helps keep order among the streets. 1. A control system typically comprises: 2. A computer or microprocessor 3. A control program which handles data from sensors and sends signals to output devices. 4. An interface box to convert signals between the sensors and processor Most systems can response very quickly and efficiently to the computer. Most system run 24 hours a day and 365 days a year. Most systems are controlled by the computer. This is very efficient. This also prevents humans from working in very dangerous places and use controlled computers to do the work. ...read more.

Conclusion

Magnetic sensors are loops in the tarmac to detect metal above them. This is also used to detect over head cars passing by. In some case there are many dams that haves computer controlled computers. The data from a water level sensor is continually sent to the processor. The computer has a controlled program which usually stores the required level of water. If the water level gets too high a valve is opened to let the water out and similarly if the water level is too low a valve is opened to let the water in. this controlled program stores the details of the water level and the action the computer must take. This is how it works: ?? ?? ?? ?? Muhammad Talha Ghouri 11JH ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    Relation Description Form Name: Invalid User Description: This data flow represented unauthorised application user Source: User login verification process Destination: Student Entity Type of Data Flow: [ ] File [ ] Screen [ ] Report [ ] Form [?] Internal Data Structure traveling with the flow: Warning notification Volume /

  2. Different Control Sensors

    may be used for; * A fan that regulates heat at different speeds * A radio that needs to operate on different frequencies The most common type of rotary switch is the rotary light switch, and the way in which this works is pretty straight forward.

  1. Free essay

    Hardware and Functions of a Micro Processor

    This type of logic gate will give a high output either, but not if both of its two inputs are high. To show this operation the following symbol is used, . Here is the truth table for the EOR logic gate.

  2. Firewall Protection

    computer, but many users do not set a password for their user on Windows, or set a trivial password. Older versions of Win95 had file and print sharing over NetBIOS enabled by default. On Win98, and WinMe it was disabled by default, but many technicians, when they set a home

  1. Flexible Architectures in Communication Security Application

    While trivial to implement in hardware with a wire network (called an XBOX), these permutations are quite expensive to implement in software. Consequently, newer ciphers strictly avoid permutations. We still consider them, however, as they are used in DES [13], the US encryption standard put into practice in the early 1970's and still in wide use today.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    It must be able to provide a printable output of this data if the user requires * After customer details have been input into the system it should be possible to search for a customer to find their contact information and the option of editing their details should be available.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work