• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Sensing and control

Extracts from this document...

Introduction

VGCSE Assignment 4 Tasks 3-A/B sensing control There are hundred and millions of software's that use sensing and control. Companies need to use sensing and control. Otherwise computers will not be able to communicate with each other and we will not be able to live without the sensing and control program because it is an every day use. Sensing and control is mainly used to start and stop things without a human being there. An example of this would be traffic lights. They work automatically using sensors. Cameras use sensors to record what is going on. Speed cameras use sensors because when cars go over a limit of speed it takes pictures. ...read more.

Middle

We all depend on a little software that helps keep order among the streets. 1. A control system typically comprises: 2. A computer or microprocessor 3. A control program which handles data from sensors and sends signals to output devices. 4. An interface box to convert signals between the sensors and processor Most systems can response very quickly and efficiently to the computer. Most system run 24 hours a day and 365 days a year. Most systems are controlled by the computer. This is very efficient. This also prevents humans from working in very dangerous places and use controlled computers to do the work. ...read more.

Conclusion

Magnetic sensors are loops in the tarmac to detect metal above them. This is also used to detect over head cars passing by. In some case there are many dams that haves computer controlled computers. The data from a water level sensor is continually sent to the processor. The computer has a controlled program which usually stores the required level of water. If the water level gets too high a valve is opened to let the water out and similarly if the water level is too low a valve is opened to let the water in. this controlled program stores the details of the water level and the action the computer must take. This is how it works: ?? ?? ?? ?? Muhammad Talha Ghouri 11JH ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    A Java applet running on a Web page provides a much richer experience in terms of information and user interaction. Information can change in response to user input or be updated dynamically as a Web page is viewed. Although Web-based programs are strength of the language, Java is a general-purpose

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    A magnetic disc back up device will not be necessary because they are used to back up large amounts of data, my program will not save large amounts of data. There are more portable and efficient backup systems that I could advise.

  1. Different Control Sensors

    The picture on the top left of this paragraph is similar to what may be found in an industrial placement. A Rotary Switch A rotary switch is used when we have a devise that needs to operate or change to two or more different states, for example, a rotary switch

  2. Operating Systems

    when to start the processing, what to do with the output and so on. * Some instructions in the JCL program tell the computer to process the statements at a time where the network's resources are not needed for other more important things.

  1. Flexible Architectures in Communication Security Application

    A software only approach is the lowest-cost solution but with accordingly lower performance. An example of the hardware-only approach is the IDEA engine [23]. It is targeted specifically at the efficient execution of the IDEA cipher and renders excellent performance.

  2. Firewall Protection

    In order for the attacker to use this method, your computer must first be infected by a RAT. Prevention of infections by RATs is no different than prevention of infection by viruses. Antivirus programs can identify and remove most of the more common RATs.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work