• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Sensing and control

Extracts from this document...

Introduction

VGCSE Assignment 4 Tasks 3-A/B sensing control There are hundred and millions of software's that use sensing and control. Companies need to use sensing and control. Otherwise computers will not be able to communicate with each other and we will not be able to live without the sensing and control program because it is an every day use. Sensing and control is mainly used to start and stop things without a human being there. An example of this would be traffic lights. They work automatically using sensors. Cameras use sensors to record what is going on. Speed cameras use sensors because when cars go over a limit of speed it takes pictures. ...read more.

Middle

We all depend on a little software that helps keep order among the streets. 1. A control system typically comprises: 2. A computer or microprocessor 3. A control program which handles data from sensors and sends signals to output devices. 4. An interface box to convert signals between the sensors and processor Most systems can response very quickly and efficiently to the computer. Most system run 24 hours a day and 365 days a year. Most systems are controlled by the computer. This is very efficient. This also prevents humans from working in very dangerous places and use controlled computers to do the work. ...read more.

Conclusion

Magnetic sensors are loops in the tarmac to detect metal above them. This is also used to detect over head cars passing by. In some case there are many dams that haves computer controlled computers. The data from a water level sensor is continually sent to the processor. The computer has a controlled program which usually stores the required level of water. If the water level gets too high a valve is opened to let the water out and similarly if the water level is too low a valve is opened to let the water in. this controlled program stores the details of the water level and the action the computer must take. This is how it works: ?? ?? ?? ?? Muhammad Talha Ghouri 11JH ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Free essay

    Hardware and Functions of a Micro Processor

    Instruction Decoder - When processing information the CPU needs to decode it. This is controlled by the control unit. Each process contains what is known as opcode and the operand. The opcode is the data within the process and the operand is the way in which it should be processed.

  2. Different Control Sensors

    The picture on the top left of this paragraph is similar to what may be found in an industrial placement. A Rotary Switch A rotary switch is used when we have a devise that needs to operate or change to two or more different states, for example, a rotary switch

  1. Operating Systems

    when to start the processing, what to do with the output and so on. * Some instructions in the JCL program tell the computer to process the statements at a time where the network's resources are not needed for other more important things.

  2. Smart Card System

    Others use the term ``triple-DES'' for E(K1,D(K2,E(K3,x))) or E(K1,E(K2,E(K3,x))). Key encrypting keys may be a single DEA key or a DEA key pair. Key pairs should be used where additional security is needed (e.g., the data protected by the key(s) has a long security life). A key pair shall not be encrypted or decrypted using a single key.

  1. Firewall Protection

    Personal firewalls can identify and block remote communication efforts to the more common RATs and by thus blocking the attacker, and identifying the RAT. Blocking/Identifying Other Types of Trojans and WQorms? There are many other types of Trojan horses which may try to communicate with the outside from your computer.

  2. Flexible Architectures in Communication Security Application

    protocol [39]. SSL is a standard secure protocol that provides secure communication between web servers and web clients. It is supported by most popular web browsers [25]. SSL extends TCP/IP to support secure encrypted connections with authentication of senders and receivers.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work