Professional Documents
Culture Documents
TH Ree
TH Ree
THE HOME
MICROPROCESSOR-CONTROLLED DEVICES
Features include:
The use usually low power devices, meaning they down use a large
amount of electricity, especially in standby mode.
Preset Values
Microprocessor control applications often use input sensors with pre-set values –
these values are used to control when certain actions will happen.
Many common household devices are now fitted with microprocessors to control
a large number of their functions. The devices fall into two main groups:
LABOUR-SAVING DEVICES
1
Modern washing machines contain a microprocessor that controls all of the
complex washing cycles that modern washing machines have.
Inputs
Water sensors – to check if the watch has drained / has filled to the correct
level
Outputs
Preset Values
The dial on the front of the machine has a number of preset values:
2) Microwave Ovens
The microprocessor inside can read the barcodes on the package and then
automatically set the temperature and cooking time to the perfect level. A
2
smart microwave is a microwave oven that connects to your smart home
network, usually via Wi-Fi, and includes expanded features and capabilities
usually associated with smart devices. They have barcode-scanning
capabilities, which are used to download cooking instructions, as well as
moisture sensors and much more.
Smart microwaves can communicate with you through your smartphone. You
may even be able to control your microwave through your smart home's
virtual assistant, voice control etc
3) Automatic Cookers
Automatic cookers are becoming increasingly popular, especially for those people who
want to eat quality home-cooked food, but work full-time. They can be used to cook a
variety of meals and foods, including:
Slow-cooked stews, Pies, Pastries and Bread, Rice
Inputs
The cookers have temperature sensors to detect when the cooker has reached
the desired temperature
Output
The cookers turn on and off the heating elements
The cookers often also output a sound or tune when the food has finished
cooking
Preset Values
Preset values include:
The cooking temperature
The programme type ( what type of meal is being cooked)
Start time / delay so food only starts cooking at a certain time.
3
4. Automatic Dishwashers
Automatic dishwashers have features that can include Wi-Fi connectivity and
flexibility options such as voice controls via an enabled virtual home assistant
and smartphone controls. You could also start wash cycles anytime from your
smartphone, monitor performance, and check cycle status. They are also
energy savers , in built dispensers etc. They can receive alerts on your
smartphone when rinse aid or detergent is low, when a wash cycle finishes, or
if the sensors detect a malfunction or leak.
5) Robotic Vacuum Cleaners
High-end robotic vacuums use infrared lasers to navigate spaces, while cheaper
models map the floor using physical boundary stripes. Using either sensor, robot
vacs can detect obstacles, measure the distance they’ve traveled, detect
hazards, and find new areas to clean.
4
6) Smart fridges and freezers.
They can be hacked into just like any other device on internet .
Has a along with its timing circuit, keypad, and display unit controls the heating
resistor, fan motor, and bread-ingredient mixing motor by means of digitally
activated switches.
The control programs are stored in ROM and determine when and how long the
machine should mix the ingredients added to the bread pan, when and how long
5
the heating resistor should be turned on or off for various parts of the cycle, and
when and how long the fan should be on to cool the loaf after baking is finished.
The parameters such as light, medium, or dark bread crust are entered through
the keypad into RAM.
1) Alarm Clocks
Smart alarm clocks are bedside buzzers with smart features, letting you set an
alarm with just your voice, waking you up with your favorite Spotify playlist, possibly
tracking your sleep, and definitely controlling your smart home.
Most have touch screens, some have radar, very few have cameras , and others
can use lighting to wake you up more naturally than a jarring buzzer.
Disadvantage
2) Television Sets
Smart TVs have been around for years, but these days they're a lot smarter than
could have seemed possible when they first appeared. As streaming services
have changed the way we watch movies and shows, TVs have changed as well,
adding features such as streaming services and voice control. But while most
TVs today can be called smart TVs, they're not all the same. Not only will smart
TVs run different smart platforms if they're made by different manufacturers, but
6
some of those smart platforms run faster, experience fewer bugs and have
access to more streaming services than others. They offer internet connectivity
and support for a range of apps like Netflix
Challenges
they can be hacked
it can keep your browsing preferences just like your computer
Information you share on a Facebook app on a TV or when ordering on
Amazon or Netflix on the big screen is shared in the same way as when
you conduct such business on a PC or a smartphone.
Browsing the web on your TV can be a bit of a challenge, though. Unless
you can add on a wireless keyboard
3)Central Heating
Inputs
Temperature input
Location sensors ( central heating only activates when the owner comes home)
Outputs
Turn on the boiler
Close automated windows and vents
Preset Values
Temperature setting on the dial
Heating on/off times
4) Burglar Alarms
Burglar alarm systems have become increasingly popular, and now have a vast
array of different sensors and control devices.
7
Inputs
Heat sensors, Pressure sensors, Infra-red sensors,Magnetic reed switches
Outputs
Audio and visual alarms, Automatic text / email notifications, Automatic police
telephone calls, Lockdown motors that protect expensive items / rooms
Preset values
Arm / disarm times
5) Home Entertainment Systems
There really is no limit to smart entertainment options. With today’s technology,
almost everything can be smart. We even have smart light bulbs now. However,
there are a few standard options when considering what you can add to your
system. Smart TVs are usually the center of a smart entertainment system. You
can add smart speakers, controllers, and various Bluetooth devices, such as
video game consoles, Blu-ray players, Roku devices, stereos, tablets,
smartphones, and more. It’s really a matter of personal preference
8
physical fitness
General
Advantages of microprocessor-controlling device:
save energy because they are far more efficient
it is usually not cost effective to repair circuit boards once they fail; the
device is then usually just thrown away.
They can be more complex to operate for people who are technophobes or
who are not very confident around electronic devices.
9
Smart fridges and freezers can lead to more healthy lifestyles (they can
automatically order fresh food from supermarkets using their internet
connections) as well as prevent food waste.
Social Interactions
10
people behave differently when interacting online – sometimes they can be
ruder or more aggressive, and cyberbullying is a real problem, particularly
for young people.
Data security
For example, by hacking into a central-heating controller (or the app used to
communicate with the controller) it is possible to find out holiday dates, which
then makes a home an easy target for break-ins. If the fridge/freezer
automatically orders food from a supermarket, then it is possible for a hacker to
gain key data, such as credit card numbers. It is therefore important to manage
passwords (and have a different password on each device) and also install
software updates, which often contain new security features.
11
POTENTIAL HEALTH PROBLEMS RELATED TO THE PROLONGED
USE OF IT EQUIPMENT
Using IT equipment for long periods of time can impact on a user’s health
Back and neck Caused by sitting in front » Use fully adjustable chairs to give
strain of a computer screen for the correct posture
long periods of time » Use foot rests to reduce posture
problems » Use tiltable screens,
raised to the correct height, to
ensure the neck is at the right angle
Repetitive Damage to fingers and » Ensure correct posture is
wrists caused by maintained(for example correct
strain injury
continuous use of a angle of arms to the keyboard and
(RSI) keyboard or repetitive mouse)
clicking of mouse » Make proper use of a wrist rest
buttons, for example a when using a mouse or keyboard
mouse or keyboard » Take regular breaks (+ exercise)
»Make use of ergonomic keyboards
»Use voice-activated software if the
user is prone to problems using
Eyestrain Caused by staring at a » If necessary, change screens to
computer screen for too LCD if older CRT screens are still
long or by having used
incorrect lighting in the » Take regular breaks (+ exercise)
room (causing screen » Make use of anti-glare screens if
reflections) the room lighting is incorrect (or use
window blinds to cut out direct
12
sunlight)
» Users should have their eyes
tested on a regular basis (middle
vision glasses should be prescribed
if the user has a persistent problem
with eye strain, dry eyes, headaches,
etc.)
Headaches Caused by incorrect » Make use of anti-glare screens if
lighting, screen the room lighting is incorrect (or use
reflections, flickering window blinds to cut out reflections
screens, and so on which cause squinting, leading to
headaches)
» Take regular breaks (+ exercise)
» Users should have their eyes
tested on a regular basis (middle
vision glasses should be prescribed
if the user has a persistent problem
with headaches)
Ozone Caused by laser printers » Proper ventilation should exist to
in an office (symptoms lower the ozone gas levels to
irritation
are dry skin and acceptable values
respiratory problems) » Laser printers should be housed in
a designated printer room
» Change to using inkjet printers
where possible
As the use of computers continues to expand, the health risks and security risks
continue to increase. Many of these risks are associated with the internet which,
by its very nature, poses a great risk to younger people unless they are vigilant at
all times. But large businesses are also at risk from a number of threats,
including hackers, pharming attacks and viruses.
PHYSICAL SAFETY
Safety issues
13
Physical safety is a different issue to health risks While health safety is how to
stop people becoming ill, or being affected by daily contact with computers,
physical safety is concerned with the dangers that could lead to serious injuries
or even loss of life. Some of the more common risks, together with their major
causes and possible prevention measures, are listed in below
Safety risk Cause of safety risk Prevention measures
Electrocution » Spilling liquids/drinks » Do not allow drinks to
on electric equipment be taken into the
» Exposed computer room
wires/damaged insulation » Check all wires on a
» Unsafe electrical regular basis and renew
equipment wires if there is any sign
» Unsafe electrics (for of damaged insulation
example, wall sockets) in » Ensure all equipment is
the office checked by a qualified
electrician on a regular
basis
» Make use of an RCB
(residual current breaker)
to prevent electrocution
Fire hazard » Overloaded wall » Increase the number of
sockets (several items wall sockets and
plugged into one wall do not use too many
socket) extension blocks
» Overheating of » Do not cover the
computer equipment (due cooling vents on
to poor heat dissipation) computer equipment
» Exposed wires causing » Clean out dust
a short circuit accumulation in
computers to prevent
overheating
» Make sure all
equipment is fully tested
on a regular basis
» Ensure there is good
room ventilation
» Use low-voltage
equipment wherever
possible
14
» Have a number of fully
tested carbon
dioxide/dry powder fire
extinguishers
E-SAFETY
Data protection
Most countries have some form of data protection act (DPA). This is legislation
designed to protect individuals and to prevent incorrect or inaccurate data being
stored.
15
Main principles of data protection act
There are general guidelines about how to stop data being obtained unlawfully:
» do not leave personal information lying around on a desk when not
attended
» lock filing cabinets at the end of the day or when the room is unoccupied
» do not leave data on a computer monitor if it is unattended; log off from
the computer if away from your desk for any length of time
» use passwords and user IDs, which should be kept secure; passwords
should be difficult to guess/break and should be changed frequently (see
earlier notes on passwords)
» make sure that anything sent in an email or fax (including attachments) is not of
a sensitive nature
16
PERSONAL DATA
Personal data refers to any data concerning a living person who can be identified
from the data itself or from the data in conjunction with other information. For
example, ‘Peter Smith has long purple hair and lives at 40 Green Street’ would
very clearly identify this individual! Examples of personal data include:
» name
» address or email address (such as
myname.lastname@mycompany.com)
»an ID card number/passport number
» an IP address » cookie ID
» the advertising identifier on a mobile phone
» date of birth » banking details
» photographs of the individual (for example, in full school uniform).
Some personal data is often referred to as sensitive (personal) data.
Examples of sensitive data include:
» ethnicity or race
» political views
» membership of a political party
» membership of a trade union
» religion/philosophical beliefs
» sexual orientation/gender
» criminal record
» medical history
» genetic data/DNA
» biometric data.
17
Extra special care needs to be taken of sensitive personal data. Whether data is
personal or sensitive, it is imperative that all precautions are taken to keep it
confidential, and prevent any inappropriate disclosure. This includes keeping
data safe from hackers, for example, but it also means keeping data safe from
accidental disclosure.
One way to protect data if it is accidentally disclosed is to encrypt it.
E-SAFETY
E-safety refers to the benefits, risks and responsibilities when using ICT. It
is often defined to be the safe and responsible use of technology. However,
e-safety is as much about user behaviour as it is about electronic security.
In particular:
» when using the internet
» sending and receiving emails
» taking part in social media
» online gaming.
» When using search engines, always make sure the device settings are
set to ‘safe search’ and the highest possible level of security is used
18
» Be careful what you download; is the material potentially harmful? Could
it be malware? It is essential that anti-virus or anti-malware software is always
running in the background and is kept up to date.
» Always remember to log out of sites when you have finished using them;
remember that cookies are used every time you log into a website (take
particular care with websites that store key data such as bank account or
credit/debit card details).
2) SENDING AND RECEIVING EMAILS
It is important to have an awareness of the risks when opening emails and how
to deal with emails from unknown sources.
» Only open emails or attachments from known sources.
» Make sure your internet service provider (ISP) has an effective email
filtering feature to ensure emails from unknown sources are put into your
spam folder.
» Only reply to an email if you know the person who sent it (or the
organisation, if you are 100 per cent certain it is genuine).
» Check that email addresses or website addresses pertaining to come
from a genuine company always contain the real company’s website address;
for example, a web page with the address customer_accounts@gmail.com
should be treated with caution, whereas customer_accounts@amazon.com
is more likely to be genuine.
» Think carefully before replying to an email and never include the name of
your school/college, or any personal data that could identify you.
» Never send photos of yourself (particularly in school uniform, which could
be used to identify your school).
» Beware of phishing and pharming scams
» Protect your email account by using passwords which are difficult to
guess, and change them on a regular basis
19
» Take care when forwarding emails
» Manually type in email addresses (do not copy and paste an email
address from a recipient) because you may not spot typing errors or other
clues that it is not genuine.
» Avoid clicking on hyperlinks within emails because it could be part of a
phishing scam.
» Remember, the unsubscribe link at the bottom of an email could itself be
fraudulent.
» Avoid using the Cc or To boxes when sending multiple emails; it is
always a good idea to create emailing groups and put the name of the group
into the Bcc box; in the To box, send the email to yourself – this will give you
and your friends some protection because any unauthorised access will not
get to see the email addresses of those in the emailing group
3) SOCIAL MEDIA
When using social media sites, it is important to be careful and make sure you
know how to block undesirable people.
The following list shows some of the dangers and some of the ways to protect
yourself:
» Do not publicly post or give out personal information to people you do not
know, including email addresses or house addresses, because this could be
used to find information about you or carry out identity theft.
» Do not send out photos of yourself to people you do not know; again this
could lead to identity theft or somebody impersonating you (many of the
photos on social media sites are false).
» Always make sure you use the privacy settings when posting photos of
yourself on social media sites, so that only people you trust can see them.
20
» It is important that none of the photos you post can link you to a place or
an address (for example, it is not a good idea to show the number plate on a
car because it is possible to find your address from this information).
» Particular care should be taken not to post photos of yourself in some
form of
school uniform; again, this gives somebody information about where they
can ind you.
» Always maintain privacy settings to stop ‘non-friends’ from contacting
you and also make sure you control who has access to your profile.
» Only make friends with people you know or are very well-known to other
friends.
» Avoid using, or forwarding messages containing, inappropriate language.
4) E-SAFETY
» It is extremely important to be very vigilant when using social networking
sites, instant messaging or chat rooms:
Block or report anybody who acts suspiciously or uses inappropriate
language.
Be very careful with the language used in chat rooms:
– Always use a nickname and NEVER your real name
– Keep private and personal data secret.
Do not enter private chat rooms – stay in public spaces (the danger signs
are if someone wants to enter a private chat room, asks you to instant
message or email, requests your telephone number or even suggests that you
meet).
Never arrange to meet anyone on your own, always tell an adult first and
meet the person in a public place.
Avoid the misuse of images, including forwarding on other images from
other people.
21
Always respect people’s confidentiality.
5) ONLINE GAMING
Online gaming has increased over the last few years. There are many reasons
for this, such as better internet connections, more sophisticated mobile devices
(phones and tablets) and greater realism in recent games.
It is important to be careful when using online gaming because is also carries
risks.
Many users think all the games players are like-minded and, therefore, there are
no real risks associated with this type of communication. That is a dangerous
assumption.
Some of the known risks, associated with online gaming, reported over the years,
include:
» predators (people who prey on others who they see as vulnerable)
» cyber bullying (the use of electronic communication to bully a person,
typically by sending messages of an intimidating or threatening nature)
» use of webcams (the risks here are obvious!)
» voice-masking technology (to disguise a voice so you cannot tell their
sex, age, or even their accent)
» it is often overlooked that online games are also a source of cyber attacks
on a user’s computer or mobile phone – viruses, phishing or spyware are
wellreported examples of problems associated with certain online gaming
» violence in the game itself, which can lead to violent behavior in reality.
As when using other platforms, you should not reveal any personal information
about you or anyone else to anyone while gaming. This includes not using your
real name.+
22