• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Sensing and control

Extracts from this document...

Introduction

VGCSE Assignment 4 Tasks 3-A/B sensing control There are hundred and millions of software's that use sensing and control. Companies need to use sensing and control. Otherwise computers will not be able to communicate with each other and we will not be able to live without the sensing and control program because it is an every day use. Sensing and control is mainly used to start and stop things without a human being there. An example of this would be traffic lights. They work automatically using sensors. Cameras use sensors to record what is going on. Speed cameras use sensors because when cars go over a limit of speed it takes pictures. ...read more.

Middle

We all depend on a little software that helps keep order among the streets. 1. A control system typically comprises: 2. A computer or microprocessor 3. A control program which handles data from sensors and sends signals to output devices. 4. An interface box to convert signals between the sensors and processor Most systems can response very quickly and efficiently to the computer. Most system run 24 hours a day and 365 days a year. Most systems are controlled by the computer. This is very efficient. This also prevents humans from working in very dangerous places and use controlled computers to do the work. ...read more.

Conclusion

Magnetic sensors are loops in the tarmac to detect metal above them. This is also used to detect over head cars passing by. In some case there are many dams that haves computer controlled computers. The data from a water level sensor is continually sent to the processor. The computer has a controlled program which usually stores the required level of water. If the water level gets too high a valve is opened to let the water out and similarly if the water level is too low a valve is opened to let the water in. this controlled program stores the details of the water level and the action the computer must take. This is how it works: ?? ?? ?? ?? Muhammad Talha Ghouri 11JH ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Different Control Sensors

    The picture on the top left of this paragraph is similar to what may be found in an industrial placement. A Rotary Switch A rotary switch is used when we have a devise that needs to operate or change to two or more different states, for example, a rotary switch

  2. Smart Card System

    Access lists should be used in "firewall" routers, which are often positioned between the internal network and an external network, such as the Internet. We may also use access lists on a router positioned between two parts of the network, to control traffic entering or exiting a specific part of the internal network.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Spreadsheet software Spreadsheets are used for insertion and analyses of numerical data, they are good for creating charts and graphs to represent data input. It is possible to store alphabetic data, but you cannot really do much with it - usually used just for headings of columns and cells.

  2. Flexible Architectures in Communication Security Application

    We further extended this approach through the design of a fast and flexible cryptographic coprocessor. Our design, called the CryptoManiac, addresses the primary bottleneck in secret-key ciphers, namely efficiency, through the application of an efficient VLIW architecture with a well-matched instruction set and functional unit resources.

  1. Operating Systems

    * it requires similar processing, * the computer system has identifiable times when it is not being used, and so has available processor time * the application does not require human intervention. Typical examples of applications which would be done using batch processing include production of bank statements from customer files, production of gas (electricity, telephone)

  2. Firewall Protection

    In order for the attacker to use this method, your computer must first be infected by a RAT. Prevention of infections by RATs is no different than prevention of infection by viruses. Antivirus programs can identify and remove most of the more common RATs.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work