Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

EFFECTS OF USING MICROPROCESSOR-CONTROLLED DEVICES IN

THE HOME

MICROPROCESSOR-CONTROLLED DEVICES

Microprocessors (aka Micro-controllers) are tiny computers embedded in


household items, such as televisions, washing machines, burglar alarms and
greenhouses. Through the use of input and output connections they can monitor
and control the devices in real time.

Features include:

 Wired / wireless internet connectivity – so that they can be monitored,


controlled and updated over the internet.

 They have a number of input ports, so that they can be connected to


buttons and sensors.

 Output ports, so that they can turn on motors, devices or alarms.

 The use usually low power devices, meaning they down use a large
amount of electricity, especially in standby mode.

Preset Values

Microprocessor control applications often use input sensors with pre-set values –
these values are used to control when certain actions will happen.

Many common household devices are now fitted with microprocessors to control
a large number of their functions. The devices fall into two main groups:

LABOUR-SAVING DEVICES

1) Automatic Washing Machines

1
Modern washing machines contain a microprocessor that controls all of the
complex washing cycles that modern washing machines have.

Inputs

 Water sensors – to check if the watch has drained / has filled to the correct
level

 Temperature sensors – to see if the water has heated up to the required


temperature for the wash.

 Vibration sensors – if the machine is incorrectly loaded and vibrates too


much, the machine will switch off to avoid damage to the machine and
avoid a potenital leak.

Outputs

 Turn on the motors that spin the machine

 Turn on the draining pumps

 Turn on the heating coil that heats the water

Preset Values

 The dial on the front of the machine has a number of preset values:

 The washing temperature

 The cycle type (eco, intense, soak)

 The spin speed

2) Microwave Ovens

The microprocessor inside can read the barcodes on the package and then
automatically set the temperature and cooking time to the perfect level. A

2
smart microwave is a microwave oven that connects to your smart home
network, usually via Wi-Fi, and includes expanded features and capabilities
usually associated with smart devices. They have barcode-scanning
capabilities, which are used to download cooking instructions, as well as
moisture sensors and much more.
Smart microwaves can communicate with you through your smartphone. You
may even be able to control your microwave through your smart home's
virtual assistant, voice control etc

3) Automatic Cookers
Automatic cookers are becoming increasingly popular, especially for those people who
want to eat quality home-cooked food, but work full-time. They can be used to cook a
variety of meals and foods, including:
 Slow-cooked stews, Pies, Pastries and Bread, Rice

Inputs
The cookers have temperature sensors to detect when the cooker has reached
the desired temperature
Output
 The cookers turn on and off the heating elements
 The cookers often also output a sound or tune when the food has finished
cooking

Preset Values
Preset values include:
 The cooking temperature
 The programme type ( what type of meal is being cooked)
 Start time / delay so food only starts cooking at a certain time.

3
4. Automatic Dishwashers

Automatic dishwashers have features that can include Wi-Fi connectivity and
flexibility options such as voice controls via an enabled virtual home  assistant 
and smartphone controls. You could also start wash cycles anytime from your
smartphone, monitor performance, and check cycle status. They are also
energy savers , in built dispensers etc. They can receive alerts on your
smartphone when rinse aid or detergent is low, when a wash cycle finishes, or
if the sensors detect a malfunction or leak.
5) Robotic Vacuum Cleaners

A robotic vacuum is a self-propelled floor cleaner that uses brushes, a rotating


brush, or an air-driven turbine to pick up dirt and debris from carpets and hard
floors. They work on their own without any human intervention.

How Does a Robotic Vacuum Work?

High-end robotic vacuums use infrared lasers to navigate spaces, while cheaper
models map the floor using physical boundary stripes. Using either sensor, robot
vacs can detect obstacles, measure the distance they’ve traveled, detect
hazards, and find new areas to clean.

Advantages of Robotic Vacuums

1. They Save Cleaning Time

2. They Can Clean Underneath Furniture

3. They Can Be Used for Emergency Cleaning

Limitations of Robotic Vacuum Cleaners

1. They’re Not Entirely Hands-off

4
6) Smart fridges and freezers.

Smart refrigerators feature a touchscreen interface and the ability to connect to


the internet through Wi-Fi to provide a number of additional features. Smart
refrigerators include internal cameras, more flexible user-controlled cooling
options, and the ability for you to interact with its features using your smartphone
or tablet when away from home. Some smart refrigerators can even connect with
other smart devices in your home; such as speakers, smart TVs, and even your
smart dishwasher or smart microwave, coordinate schedules for every member
of the family, look up recipes and have your fridge read the steps while you cook,
create grocery lists that sync to your smartphone in real-time. etc

Comon Concerns About Smart Refrigerators:

 They are much more expensive than regular refrigerators

 They can be hacked into just like any other device on internet .

 Repairs for smart refrigerators are more expensive than ordinary


refrigerators.
7) Microcomputer controlled Bread Making Machine

Has a along with its timing circuit, keypad, and display unit controls the heating
resistor, fan motor, and bread-ingredient mixing motor by means of digitally
activated switches.

An analog temperature sensor, through an A/D converter, provides the status of


temperature to the microcomputer. A digital timer circuit counts down, showing
the time remaining in the process.

The control programs are stored in ROM and determine when and how long the
machine should mix the ingredients added to the bread pan, when and how long

5
the heating resistor should be turned on or off for various parts of the cycle, and
when and how long the fan should be on to cool the loaf after baking is finished.
The parameters such as light, medium, or dark bread crust are entered through
the keypad into RAM.

Other devices (group 2):

1) Alarm Clocks

Smart alarm clocks are bedside buzzers with smart features, letting you set an
alarm with just your voice, waking you up with your favorite Spotify playlist, possibly
tracking your sleep, and definitely controlling your smart home.

Most have touch screens, some have radar, very few have cameras , and others
can use lighting to wake you up more naturally than a jarring buzzer.

Disadvantage

 None of them have is a backup battery meaning no power means no


working.
 More expensive than normal watches.

2) Television Sets

Smart TVs have been around for years, but these days they're a lot smarter than
could have seemed possible when they first appeared. As streaming services
have changed the way we watch movies and shows, TVs have changed as well,
adding features such as streaming services and voice control. But while most
TVs today can be called smart TVs, they're not all the same. Not only will smart
TVs run different smart platforms if they're made by different manufacturers, but

6
some of those smart platforms run faster, experience fewer bugs and have
access to more streaming services than others. They offer internet connectivity
and support for a range of apps like Netflix

Challenges
 they can be hacked
 it can keep your browsing preferences just like your computer
 Information you share on a Facebook app on a TV or when ordering on
Amazon or Netflix on the big screen is shared in the same way as when
you conduct such business on a PC or a smartphone.
 Browsing the web on your TV can be a bit of a challenge, though. Unless
you can add on a wireless keyboard

3)Central Heating

Central heating systems now include increasingly complex micro-processing


units. Modern systems can be controlled via an app on your phone, or even
control themselves through location and behavior monitoring.

Inputs
 Temperature input
 Location sensors ( central heating only activates when the owner comes home)

Outputs
 Turn on the boiler
 Close automated windows and vents

Preset Values
 Temperature setting on the dial
 Heating on/off times

4) Burglar Alarms

Burglar alarm systems have become increasingly popular, and now have a vast
array of different sensors and control devices.

7
Inputs
Heat sensors, Pressure sensors, Infra-red sensors,Magnetic reed switches
Outputs
Audio and visual alarms, Automatic text / email notifications, Automatic police
telephone calls, Lockdown motors that protect expensive items / rooms
Preset values
Arm / disarm times
5) Home Entertainment Systems
There really is no limit to smart entertainment options. With today’s technology,
almost everything can be smart. We even have smart light bulbs now. However,
there are a few standard options when considering what you can add to your
system. Smart TVs are usually the center of a smart entertainment system. You
can add smart speakers, controllers, and various Bluetooth devices, such as
video game consoles, Blu-ray players, Roku devices, stereos, tablets,
smartphones, and more. It’s really a matter of personal preference

6) Mobile Phones And Tablets.


(Check notes on types of computers)

A microprocessor-controlled labour-saving device allows people to get on with


other things while the device carries out their tasks.Microprocessors within the
second group of devices make them easier to use and gives them additional
features, such as ‘intelligent tuning’ in television sets.

Effects of using microprocessor-controlled devices in the home


Effects
 lifestyle
 data security
 leisure time
 social interaction

8
 physical fitness
General
Advantages of microprocessor-controlling device:
 save energy because they are far more efficient

 It can be easier 'programming' these devices to perform tasks rather than


turning knobs and pressing buttons manually

Disadvantages of microprocessor-controlling device:

 it is usually not cost effective to repair circuit boards once they fail; the
device is then usually just thrown away.

 They can be more complex to operate for people who are technophobes or
who are not very confident around electronic devices.

 Leaving some devices on standby (such as televisions or satellite


receivers) is very wasteful of electricity.

Lifestyle, leisure time and physical fitness

Advantages of microprocessor-controlled labour-saving devices on a


person’s lifestyle, leisure time and physical fitness:

 No manual tasks at home.


 They give people more time for leisure activities, hobbies, shopping and
socialising.
 There is no longer a need to stay home while food is cooking or clothes
are being washed.
 Remote control when the owner is not at home
 Automated burglar Alarm give people sense of security and well-being

9
 Smart fridges and freezers can lead to more healthy lifestyles (they can
automatically order fresh food from supermarkets using their internet
connections) as well as prevent food waste.

Disadvantages of microprocessor-controlled labour-saving devices on a


person’s lifestyle, leisure time and physical fitness:

Labour-saving devices can lead to unhealthy lifestyles

 They tend to make people rather lazy because there is a dependence on


the devices.

 There is a potential to lose household skills.

 As with any device which contains a microprocessor and can communicate


using the internet, there is the risk of cyber security threats

Social Interactions

Positive impacts of microprocessor-controlled devices on social interactions:

 easier to make new friends using chat rooms

 easier to find people who share similar interests/hobbies

 less expensive to keep in touch using VoIP technology.

Negative impacts of microprocessor-controlled devices on social interactions:

 people do not meet face-to-face as much (social isolation)

 a lack of social interaction may make people more anxious of meeting


people in real life

10
 people behave differently when interacting online – sometimes they can be
ruder or more aggressive, and cyberbullying is a real problem, particularly
for young people.

Data security

Microprocessor-controlled devices connected to the internet can lead to cyber


security issues. If you are able to communicate remotely with devices in your
home, then so can a hacker.

Any household device which can be remotely-controlled could allow a hacker to


gain personal data about you. These devices are often set with a default (or no)
password, making it easy for cybercriminals to obtain personal details.

For example, by hacking into a central-heating controller (or the app used to
communicate with the controller) it is possible to find out holiday dates, which
then makes a home an easy target for break-ins. If the fridge/freezer
automatically orders food from a supermarket, then it is possible for a hacker to
gain key data, such as credit card numbers. It is therefore important to manage
passwords (and have a different password on each device) and also install
software updates, which often contain new security features.

11
POTENTIAL HEALTH PROBLEMS RELATED TO THE PROLONGED
USE OF IT EQUIPMENT

Using IT equipment for long periods of time can impact on a user’s health

HEALTH CAUSES OF HEALTH ELIMINATION OR REDUCTION


RISK RISK OF HEALTH RISK

Back and neck Caused by sitting in front » Use fully adjustable chairs to give
strain of a computer screen for the correct posture
long periods of time » Use foot rests to reduce posture
problems » Use tiltable screens,
raised to the correct height, to
ensure the neck is at the right angle
Repetitive Damage to fingers and » Ensure correct posture is
wrists caused by maintained(for example correct
strain injury
continuous use of a angle of arms to the keyboard and
(RSI) keyboard or repetitive mouse)
clicking of mouse » Make proper use of a wrist rest
buttons, for example a when using a mouse or keyboard
mouse or keyboard » Take regular breaks (+ exercise)
»Make use of ergonomic keyboards
»Use voice-activated software if the
user is prone to problems using
Eyestrain Caused by staring at a » If necessary, change screens to
computer screen for too LCD if older CRT screens are still
long or by having used
incorrect lighting in the » Take regular breaks (+ exercise)
room (causing screen » Make use of anti-glare screens if
reflections) the room lighting is incorrect (or use
window blinds to cut out direct
12
sunlight)
» Users should have their eyes
tested on a regular basis (middle
vision glasses should be prescribed
if the user has a persistent problem
with eye strain, dry eyes, headaches,
etc.)
Headaches Caused by incorrect » Make use of anti-glare screens if
lighting, screen the room lighting is incorrect (or use
reflections, flickering window blinds to cut out reflections
screens, and so on which cause squinting, leading to
headaches)
» Take regular breaks (+ exercise)
» Users should have their eyes
tested on a regular basis (middle
vision glasses should be prescribed
if the user has a persistent problem
with headaches)
Ozone Caused by laser printers » Proper ventilation should exist to
in an office (symptoms lower the ozone gas levels to
irritation
are dry skin and acceptable values
respiratory problems) » Laser printers should be housed in
a designated printer room
» Change to using inkjet printers
where possible

SAFETY AND SECURITY

As the use of computers continues to expand, the health risks and security risks
continue to increase. Many of these risks are associated with the internet which,
by its very nature, poses a great risk to younger people unless they are vigilant at
all times. But large businesses are also at risk from a number of threats,
including hackers, pharming attacks and viruses.

PHYSICAL SAFETY

Safety issues

13
Physical safety is a different issue to health risks While health safety is how to
stop people becoming ill, or being affected by daily contact with computers,
physical safety is concerned with the dangers that could lead to serious injuries
or even loss of life. Some of the more common risks, together with their major
causes and possible prevention measures, are listed in below
Safety risk Cause of safety risk Prevention measures
Electrocution » Spilling liquids/drinks » Do not allow drinks to
on electric equipment be taken into the
» Exposed computer room
wires/damaged insulation » Check all wires on a
» Unsafe electrical regular basis and renew
equipment wires if there is any sign
» Unsafe electrics (for of damaged insulation
example, wall sockets) in » Ensure all equipment is
the office checked by a qualified
electrician on a regular
basis
» Make use of an RCB
(residual current breaker)
to prevent electrocution
Fire hazard » Overloaded wall » Increase the number of
sockets (several items wall sockets and
plugged into one wall do not use too many
socket) extension blocks
» Overheating of » Do not cover the
computer equipment (due cooling vents on
to poor heat dissipation) computer equipment
» Exposed wires causing » Clean out dust
a short circuit accumulation in
computers to prevent
overheating
» Make sure all
equipment is fully tested
on a regular basis
» Ensure there is good
room ventilation
» Use low-voltage
equipment wherever
possible

14
» Have a number of fully
tested carbon
dioxide/dry powder fire
extinguishers

Tripping hazard » Trailing wires on the » Use cable ducts to


floor make the wires safe
» Damaged carpets and » Cover exposed wires
other flooring and hide wires
under desks away from
general
thoroughfare
» Use wireless
connectivity wherever
possible, therefore
eliminating the
need for trailing cables
Personal injury » Heavy equipment » Use desks strong
unstable or falling from enough to take the
desks weight of the computer
» Desks collapsing equipment
under weight/desks not » Use large desks and
designed to take the tables so that
weigh hardware is not too close
to the edge
where it could fall off

E-SAFETY
Data protection
Most countries have some form of data protection act (DPA). This is legislation
designed to protect individuals and to prevent incorrect or inaccurate data being
stored.

15
Main principles of data protection act

There are general guidelines about how to stop data being obtained unlawfully:
 » do not leave personal information lying around on a desk when not
attended
 » lock filing cabinets at the end of the day or when the room is unoccupied
 » do not leave data on a computer monitor if it is unattended; log off from
the computer if away from your desk for any length of time
 » use passwords and user IDs, which should be kept secure; passwords
should be difficult to guess/break and should be changed frequently (see
earlier notes on passwords)
» make sure that anything sent in an email or fax (including attachments) is not of
a sensitive nature

16
PERSONAL DATA
Personal data refers to any data concerning a living person who can be identified
from the data itself or from the data in conjunction with other information. For
example, ‘Peter Smith has long purple hair and lives at 40 Green Street’ would
very clearly identify this individual! Examples of personal data include:
 » name
 » address or email address (such as
myname.lastname@mycompany.com)
 »an ID card number/passport number
 » an IP address » cookie ID
 » the advertising identifier on a mobile phone
 » date of birth » banking details
 » photographs of the individual (for example, in full school uniform).
 Some personal data is often referred to as sensitive (personal) data.
Examples of sensitive data include:
 » ethnicity or race
 » political views
 » membership of a political party
 » membership of a trade union
 » religion/philosophical beliefs
 » sexual orientation/gender
 » criminal record
 » medical history
 » genetic data/DNA
 » biometric data.

17
Extra special care needs to be taken of sensitive personal data. Whether data is
personal or sensitive, it is imperative that all precautions are taken to keep it
confidential, and prevent any inappropriate disclosure. This includes keeping
data safe from hackers, for example, but it also means keeping data safe from
accidental disclosure.
One way to protect data if it is accidentally disclosed is to encrypt it.
E-SAFETY
E-safety refers to the benefits, risks and responsibilities when using ICT. It
is often defined to be the safe and responsible use of technology. However,
e-safety is as much about user behaviour as it is about electronic security.
In particular:
 » when using the internet
 » sending and receiving emails
 » taking part in social media
 » online gaming.

1) USING THE INTERNET


The following is a list of the precautions that can be taken to minimise the
potential danger when using the internet:
 » When using the internet make sure that the websites being used can be
trusted (for example, look out for websites including https and/or the green
padlock symbol ).
 » Only purchase items from websites that offer secure, encrypted
connections

 » When using search engines, always make sure the device settings are
set to ‘safe search’ and the highest possible level of security is used

 » Only use websites recommended by teachers, parents or from trusted


sources–

18
 » Be careful what you download; is the material potentially harmful? Could
it be malware? It is essential that anti-virus or anti-malware software is always
running in the background and is kept up to date.
 » Always remember to log out of sites when you have finished using them;
remember that cookies are used every time you log into a website (take
particular care with websites that store key data such as bank account or
credit/debit card details).
2) SENDING AND RECEIVING EMAILS
It is important to have an awareness of the risks when opening emails and how
to deal with emails from unknown sources.
 » Only open emails or attachments from known sources.
 » Make sure your internet service provider (ISP) has an effective email
filtering feature to ensure emails from unknown sources are put into your
spam folder.
 » Only reply to an email if you know the person who sent it (or the
organisation, if you are 100 per cent certain it is genuine).
 » Check that email addresses or website addresses pertaining to come
from a genuine company always contain the real company’s website address;
for example, a web page with the address customer_accounts@gmail.com
should be treated with caution, whereas customer_accounts@amazon.com
is more likely to be genuine.
 » Think carefully before replying to an email and never include the name of
your school/college, or any personal data that could identify you.
 » Never send photos of yourself (particularly in school uniform, which could
be used to identify your school).
 » Beware of phishing and pharming scams
 » Protect your email account by using passwords which are difficult to
guess, and change them on a regular basis

19
 » Take care when forwarding emails
 » Manually type in email addresses (do not copy and paste an email
address from a recipient) because you may not spot typing errors or other
clues that it is not genuine.
 » Avoid clicking on hyperlinks within emails because it could be part of a
phishing scam.
 » Remember, the unsubscribe link at the bottom of an email could itself be
fraudulent.
 » Avoid using the Cc or To boxes when sending multiple emails; it is
always a good idea to create emailing groups and put the name of the group
into the Bcc box; in the To box, send the email to yourself – this will give you
and your friends some protection because any unauthorised access will not
get to see the email addresses of those in the emailing group

3) SOCIAL MEDIA
When using social media sites, it is important to be careful and make sure you
know how to block undesirable people.
The following list shows some of the dangers and some of the ways to protect
yourself:
 » Do not publicly post or give out personal information to people you do not
know, including email addresses or house addresses, because this could be
used to find information about you or carry out identity theft.
 » Do not send out photos of yourself to people you do not know; again this
could lead to identity theft or somebody impersonating you (many of the
photos on social media sites are false).
 » Always make sure you use the privacy settings when posting photos of
yourself on social media sites, so that only people you trust can see them.

20
 » It is important that none of the photos you post can link you to a place or
an address (for example, it is not a good idea to show the number plate on a
car because it is possible to find your address from this information).
 » Particular care should be taken not to post photos of yourself in some
form of
 school uniform; again, this gives somebody information about where they
can ind you.
 » Always maintain privacy settings to stop ‘non-friends’ from contacting
you and also make sure you control who has access to your profile.
 » Only make friends with people you know or are very well-known to other
friends.
 » Avoid using, or forwarding messages containing, inappropriate language.
4) E-SAFETY
 » It is extremely important to be very vigilant when using social networking
sites, instant messaging or chat rooms:
 Block or report anybody who acts suspiciously or uses inappropriate
language.
 Be very careful with the language used in chat rooms:
– Always use a nickname and NEVER your real name
– Keep private and personal data secret.
 Do not enter private chat rooms – stay in public spaces (the danger signs
are if someone wants to enter a private chat room, asks you to instant
message or email, requests your telephone number or even suggests that you
meet).
 Never arrange to meet anyone on your own, always tell an adult first and
meet the person in a public place.
 Avoid the misuse of images, including forwarding on other images from
other people.

21
 Always respect people’s confidentiality.
5) ONLINE GAMING
Online gaming has increased over the last few years. There are many reasons
for this, such as better internet connections, more sophisticated mobile devices
(phones and tablets) and greater realism in recent games.
It is important to be careful when using online gaming because is also carries
risks.
Many users think all the games players are like-minded and, therefore, there are
no real risks associated with this type of communication. That is a dangerous
assumption.
Some of the known risks, associated with online gaming, reported over the years,
include:
 » predators (people who prey on others who they see as vulnerable)
 » cyber bullying (the use of electronic communication to bully a person,
typically by sending messages of an intimidating or threatening nature)
 » use of webcams (the risks here are obvious!)
 » voice-masking technology (to disguise a voice so you cannot tell their
sex, age, or even their accent)
 » it is often overlooked that online games are also a source of cyber attacks
on a user’s computer or mobile phone – viruses, phishing or spyware are
wellreported examples of problems associated with certain online gaming
 » violence in the game itself, which can lead to violent behavior in reality.
As when using other platforms, you should not reveal any personal information
about you or anyone else to anyone while gaming. This includes not using your
real name.+

22

You might also like