Free Essay

Enginerring

In:

Submitted By sburton91
Words 553
Pages 3
Challenging Minds Inspiring Success

Module/Unit title: PROGRAMMABLE LOGIC CONTROLLERS (Level 4)
Module/Unit Code: UNIT 22 A/601/1625
Module Lecturer: C Maton
Assignment title: 2 – Information and communication techniques.
| |Date issued: |
|Ass 1 |10th Oct 2015 |
|Ass 2 | |
|Ass 3 |Date for submission: |
|Ass 4 |06th Nov 2015 |
| | |
|P1.1 |Date submitted: |
| | |
| | |
| |Assessor: |
| |Carl Maton |
| | |
|P1.2 |Resubmission date if applicable |
| | |
| | |
| |Word count : |
| |N/A |
| | |
|P1.3 |Internal Verifier: |
| |Peter Baker |
| | |
| | |
| | |
| | |
|P1.4 | |
| | |
| | |
| | |
| | |
| | |
|P2.1 | |
| | |
| | |
| | |
| | |
| | |
|P2.2 | |
| | |
| | |
| | |
| | |
| | |
|P2.3 | |
| | |
| | |
| | |
| | |
| | |
|P2.4 | |
| | |
| | |
| | |
| | |
| | |
|P3.1 | |
| | |
| | |
| | |
| | |
| | |
|P3.2 | |
| | |
| | |
| | |
| | |
| | |
|P3.3 | |
| | |
| | |
| | |
| | |
| | |
|P3.4 | |
| | |
| | |
| | |
| | |
| | |
|P4.1 | |
| | |
| | |
| | |
| | |
| | |
|P4.2 | |
| | |
| | |
| | |
| | |
| | |
|M1 | |
| | |
| | |
| | |
| | |
| | |
|M2 | |
| | |
| | |
| | |
| | |
| | |
|M3 | |
| | |
| | |
| | |
| | |
| | |
|D1 | |
| | |
| | |
| | |
| | |
| | |
|D2 | |
| | |
| | |
| | |
| | |
| | |
|D3 | |
| | |
| | |
| | |
| | |
| | |
|Date Due: | |
|9th Oct 2015 | |
|6th Nov 2015 | |
|04th Dec 2015 | |
|08th Jan 2016 | |
| | |

In submitting this assignment I make the following declaration:

I understand that the piece of work submitted will be considered as the final and complete version of my assignment of which I am the sole author. I understand both the meaning and consequences of plagiarism and that my work has been appropriately attributed unless otherwise stated. I have not knowingly allowed another to copy my work.
[pic]

Assessment of Learning Outcomes
The following Learning Outcomes* are assessed in this assignment:-
|Learning Outcome 2 |Assessment Criteria for Pass |
| | |
| |To achieve each outcome a learner must demonstrate the ability to: |
|Understand programmable logic controller |Evaluate the different forms of signal used in programmable logic control. |
|information and communication techniques |Describe the resolution and relationship between analogue inputs and outputs and word length. |
| |Express numbers using different number systems. |
| |Describe typical protocols used in signal communication and evaluate networking methods and |
| |networking standards. |

*The Learning Outcomes for the module are specified in the BTEC Unit specifications.
Assignment Instructions

To achieve a pass you must: • Evaluate two types of signal used by PLCs (e.g. analogue (0-10 v dc, 4-20mA), digital). • Describe the resolution and relationship between analogue inputs and outputs and word length e.g. a digital shaft encoder needs to be accurate to at least 1 degree in 360. How many binary digits are required to achieve this? What is the ultimate accuracy? Digital shaft encoders use Gray codes rather than pure binary. Why is this necessary? Give a tabulated example of 3-bit Gray codes.

• Showing your working, express the following Hexadecimal numbers in Binary, Denary and Binary Coded Decimal: FA, F001, C2B, C7D. What can BCD numbers do that pure Binary or Hexadecimal numbers cannot?

• a) Describe typical protocols used in signal communication (e.g. Ethernet/IP, DeviceNet ). b) Evaluate networking methods and networking standards (e.g. master to slave; peer to peer; ISO; IEE; MAP).

For Merits M2 & M3:
M2 - a range of methods and techniques have been applied.
M3 - coherent, logical development of principles/concepts for the intended audience. Extend your answer to the pass criteria by explaining the terms quantisation, quantisation error and aliasing.

For Distinctions D2 & D3:
D2- autonomy/independence has been demonstrated.
D3- problems have been solved. Write a ladder logic program to control the temperature of the washing machine using an analogue temperature feedback signal from the machine that is to be compared with a desired analogue temperature signal from a variable adjustable control. The maximum signal is 10V dc and you may assume that 1V is equivalent to 10(C. Your program should include thorough comments/documentation throughout.

Similar Documents

Free Essay

Enginerring Manager

...SELECT column_list FROM table-name  [WHERE Clause] [GROUP BY clause] [HAVING clause] [ORDER BY clause]; SELECT name, salary, salary*1.2 AS new_salary FROM employee  WHERE new_salary /salary*1.2 > 30000; SELECT first_name, last_name, subject  FROM student_details  WHERE subject IN/NOT IN ('Maths', 'Science');  Select * from product p  where EXISTS (select * from order_items o  where o.product_id = p.product_id) ------------------------------------------------- SELECT user.name, course.name ------------------------------------------------- FROM `user` ------------------------------------------------- RIGHT JOIN `course` on user.course = course.id SELECT name, salary FROM employee ORDER BY 1, 2; ELECT name, salary  FROM employee  ORDER BY name DESC, salary DESC; SELECT COUNT (DISTINCT name) FROM employee; HAVING Group functions (MAX,MIN) cannot be used in WHERE Clause but can be used in HAVING clause. SELECT dept, SUM (salary)  FROM employee  GROUP BY dept  HAVING SUM (salary) > 25000  INSERT INTO TABLE_NAME  [ (col1, col2, col3,...colN)]  VALUES (value1, value2, value3,...valueN); INSERT INTO employee (id, name, dept, age, salary location) SELECT emp_id, emp_name, dept, age, salary, location  FROM temp_employee; Copy data from A to B. Select first then insert If you are inserting data to all the columns, the above insert statement can also be written as, INSERT INTO employee  SELECT...

Words: 652 - Pages: 3

Free Essay

System Engineerring Roles in Software Enginerring

...Lovely professional university term paper topic-system engineerring roles in software enginerring cap 590 rollno.46 section-1101 reg no-11001009 submitted to-pawan sir submitted by-jaspreet singh TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one...

Words: 2390 - Pages: 10

Premium Essay

Business Process Re-Enginerring

...Name Professor Name Subject Name 25th September 2011 BPR-It’s meaning for underperforming Organizations According to Davenport (1990) a business process may be defined as a set of logically related tasks whose performance leads to a desired outcome. Re-engineering of these business processes means the analysis and re-design of workflow within and between enterprises. A cycle of BPR can be identified as under – (Radhakrishnan) * Identify the present processes and the outcomes of these processes * Analyze the process, review them and find out the points where business processes are lacking. * Make a new design to re-align the business processes along the lines of best practices within the industry or even outside the industry. * Implement the new business processes and test them. Once the BPR is done, we again analyze the processes which are being followed currently thus making BPR a continuous improvement process. When an underperforming organization embarks on a mission to re-engineer its business processes it can mean the turnaround of the firm or its complete collapse. As the firm is already underperforming so finding benchmarks will not be much difficult .However the difficulty with such a firm will be employee motivation and resource crunch. These are the key issues to be dealt with when doing BPR for an underperforming firm. IT is one of the means through which BPR can be achieved ; it is not an end itself. (Guy Doumeingts) The ERP package is there...

Words: 705 - Pages: 3

Premium Essay

Gene Technology

...Assignment 2: Gene Technology Felicia White Strayer University Professor Allen May 29, 2016 Science has advanced with the evolution of biotechnology. Animals models through genetic manipulation has greatly helped the development of scientific and biomedical knowledge. New ideas for treatment of genetic diseases and other diseases that benefit human and all living things The initial studies of George Mendel in 1865, researchers have contributed to the understanding and the consolidation of his idea which until then was only promising. (Chaible, 2010) During decades of studies important events took place such as discovery of relationship of DNA with the transmission of genetic traits, DNA cloning and sequencing, and allowing the production of the production of the first transgenic mice. (Chaible, 2010) The start of the 20th century, the appearance of the first genetic studies involving animal models. Mutant animals appeared in production colonies, differing from their parents and able to pass on this to their offspring. Rudolph Jaevisch published the first report of introduction of an exogenous DNA virus(SV40) into mouse embryos. (Chaible, 2010) Gordon and Ryddle reported the birth of a mouse that had been genetically modified through microinjection of purified DNA into single-cell mouse embryos. This methodology marked the birth of transgenesis and controlled genetic alteration in animal models. (Chaible, 2010) Some types of genetically modified animals are transgenic...

Words: 509 - Pages: 3

Free Essay

Op Project

...t Outline for OP Project 1. Background 1. Current situation New COO –YW is facing a lot of challenges to carry out lean manufacturing. Even the project is running very well, actually there were some conflicts between some departments, such as Therefore, YW is struggling to figure out how to solve with those conflicts production department and Lean manufacturing department. 2. History and background Ansen Electronics Company was incorporated in Hong Kong in 1989 by Mr Zhong and has established itself as a leading manufacturer. In 2008, Ansen’s business scope, management and capability have grown from strength to strength with the involvement of GEM (Global Emerging Markets).70% shares belonged to GEM,30% shares belonged to family business of Mr Zhong. At that time, YW joined in Ansen as new COO. Anthony was the CEO of this company before. 3. Product and industry With the competitive edge of a strong engineering team and vertically integrated factory facilities, Ansen has diversified ODM, OEM and China sales businesses in Personal Electronic Consumer Products such as Weather Stations & Electronic Kitchenware, as well as the LCD & LED related electronic products. 4. Structure In order to improve the capacity and cut off the cost of operation and manpower cost, YW initiated some changes for the organization: 1. Establish the Lean manufacturing department to do the improvements to save cost in company level 2. Hire more talents...

Words: 403 - Pages: 2

Free Essay

Seclarisum

...I. Secularism: For me secularism defines a person who does not believe in Jesus Christ. Which makes me question the lifestyle of a person not living for Christ, a secular way of living is a person who lives and tends to show a destructive behavior with no consequence for their actions. Example of the lifestyle would be premarital sex, drunkenness, drug abuse, abortion, lying, and homosexuality in our world today. Secularism was first discovered in 1400 this was during the Renaissance days, toward the end of this period empirical science developed and the key players were Nicholas Copernicus (1473-1543), Johannes Keller (1571-1630), and Galileo Galilee (1564-1642). According to Dean Halverson in his writing on secularism p.1. They viewed science as studying the handiwork of an almighty Creator and discovering his laws. The origin of secularism is that the universe is the product of chance or pure contingency. Everything that is, is an accident. Everything is the product of chaos, flux, and randomness are king, personality, meaning, and universal laws of logic clearly have no place. If the secular- evolutionary is true which their not, then your life and existence have no meaning whatsoever so what are they living for? For this reason I ask the question how do they fill about themselves? What would they say about their identity? They believe they evolve from an animal and they are nothing more than an animal, they believe they posses potential for improving life for people. They...

Words: 771 - Pages: 4

Premium Essay

Nt1310 Unit 1 Term Paper

...with each each others .  File system which provide higher level files out of low level unstructured data on disk .  High levels I/O facilities , which free a process from the low level details of interrupt handling . Program execution: The operating system loads the contents (or sections) of a file into memory and brings it to the execution. A user level program could not be trusted to properly allocate cup time. The main purpose of a cpu is to execute instructions .the cpu executes the binary representations Of the instructions , i.e., machine code .since programs can be very large ,and since cpu,s have limited memory , programs are stored in memory (RAM ). However ,cpu,s do its processing on pc.execution of computer and software enginerring is the processing by which a computer or a virtual machine performs the instructions of a computer program . the instructions in the program trigger sequences of a simple action on the executing machine . in computing , a system call is the programmatic way in which a computer program requests a services from the kernel of the operating system it is executed on cpu .system call provides an essential interface b/w a process and operating system . I/O operations: Disk tapes serial lines and other devices must be communicated at a low level. The user need only specify the device and the operation to perform on it, while the system converts that request into device- or controller-specific commands. User level programs cannot be trusted...

Words: 1174 - Pages: 5

Premium Essay

Training and Development Process

...Introduction Wayne Mondy defines training as “Activities designed to provide learners with the knowledge and skills needed for their present jobs.” Training, therefore, is job specific and is concerned with the day to day performance improvement of the employee. Teaching a new employee hired for the R&D department the use of design software training or teaching a plant worker the operation of a machine constitutes training. Training is also project related. Suppose a new project has arrived at an organization and very few people possess the technical know-how to execute the project. They are then entrusted with the task of spreading the knowledge of the skills required and ensuring that the right people know the right things required to execute the project. This constitutes training. A newly promoted employee needs training to be able to fit into his/her new role and perform as expected. A technically competent designer may have been promoted to a managerial or executive job on request or due to exceptional performance. He may not be comfortable with the use of for example, MS Office. He will then require training for the same. Development is defined as “Learning that goes beyond today’s job and has a more long-term focus.” It prepares every employee to keep pace with the organization’s pace of growth. In today’s world, where customer focus and changing customer needs are the key drivers for growth, development plays a pivotal role. It looks towards enhancing or adapting...

Words: 1330 - Pages: 6

Premium Essay

Cultural Borderlands

...within different communities of color could be established and maintained.”(187).The discussion of both individual as well as collective identities within the ethnic borderland is enlightened by the detailed description throughout the narrative of the interactions and conversations taking place in the Café. Aiming at unraveling the complexity of such cultural encounters between the different ethnicities visiting the Café, the creation of an ethnic borderland “involves an empowering act of of bridging interethnic gaps”(Conrey 193).In order to move beyond ethnic boundaries and in addition to the construction of a contact zone, Abu Jaber offers an accurate description of the different groups visting the café who are”Jenoob,Gharb,and Schmaal-enginerring students from Egypt;Shark , a math student from Kuwait;Lon Hayden,The Chair of Near Eastern Studies;Morris who owns the newwtand;Raphael-from-New-Jersey;Jay,Ron and Tro from Kappa.Something Something fraternity house;Odah,the Turkish butcher, and his many sons,”(Abu Jaber 20).As such, the very dividing lines between cultures are to be challenged and erased to encompass not only The Arab American experience but all ethnic experiences or in Anzaldùa’s term all Mestiza experiences.In this regard, the ethnic borderland in Cresecent initiates a comprehensive approach to ethnic relations in the way as Anzaldùa ‘s Bordelands/La Frontera does. The creation of ethnic borderland in Abu Jaber’s Crescent is not limited to the discussion of...

Words: 1685 - Pages: 7

Premium Essay

Ericsson

...|national economics university | |business school | |[pic] | |Ericsson Recruitment Process | |Human Resource | | | | | | | | | | ...

Words: 2101 - Pages: 9

Premium Essay

Ipad's Security Breach

...iPad’s Security Breach Samantha Phillips Dr. Prakash G. Menon BUS 508: The Business Enterprise May 29, 2011 Justifying Hacking into a Web site In 2010, McDonald’s said that customer information was exposed after a security breach involving an email marketing managing firm. McDonald’s released a statement explaining that information was obtained by an “unauthorized third party”, but added that financial information and social security numbers were not part of the data accidentally exposed. (Security Magazine, 2010) A security breach exposed iPad owners including dozens of CEOs, military officials, and top politicians. They, and every other buyer of the cellular-enabled tablet, were vulnerable to spam marketing and malicious hacking. The breach, which came just weeks after an Apple employee lost an iPhone prototype in a bar, exposed the most exclusive email list on the planet, a collection of early-adopter iPad 3G subscribers that includes thousands of A-listers in finance, politics and media, from New York Times Co. CEO Janet Robinson to Diane Sawyer of ABC News to Mayor Michael Bloomberg. It even appears that White House Chief of Staff Rahm Emanuel's information was compromised. In fact, it is believed 114,000 user accounts were compromised, although it's possible that confidential information about every iPad 3G owner in the U.S. has been exposed. (Tate, 2010) Earlier this year, the names and e-mails of customers of Citigroup Inc. and other large U.S. companies...

Words: 3288 - Pages: 14

Premium Essay

Yoyo

...S w 908E04 STARS AIR AMBULANCE: AN INFORMATION SYSTEMS CHALLENGE Professors Malcolm C. Munro and Sid Huff wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. Ivey Management Services prohibits any form of reproduction, storage or transmittal without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Management Services, c/o Richard Ivey School of Business, The University of Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca. Copyright © 2008, Ivey Management Services Version: (A) 2008-02-26 In a hangar near Calgary International Airport, three sleek red BK117 helicopters sat waiting to be dispatched to accident sites in southern Alberta. In an adjoining building overlooking a landing strip, dispatch staff quietly monitored multiple screens at a dozen workstations in the Emergency Link Centre. In the pilots’ lounge and surrounding offices, helicopter pilots, nurses and paramedics were on standby 24 hours a day, seven days a week. A myriad of other professionals, including experts in clinical operations...

Words: 4730 - Pages: 19

Premium Essay

Stars Air Ambulance - an Information Systems Challenge

...S w 908E04 STARS AIR AMBULANCE: AN INFORMATION SYSTEMS CHALLENGE Professors Malcolm C. Munro and Sid Huff wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. Ivey Management Services prohibits any form of reproduction, storage or transmittal without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Management Services, c/o Richard Ivey School of Business, The University of Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca. Copyright © 2008, Ivey Management Services Version: (A) 2008-02-26 In a hangar near Calgary International Airport, three sleek red BK117 helicopters sat waiting to be dispatched to accident sites in southern Alberta. In an adjoining building overlooking a landing strip, dispatch staff quietly monitored multiple screens at a dozen workstations in the Emergency Link Centre. In the pilots’ lounge and surrounding offices, helicopter pilots, nurses and paramedics were on standby 24 hours a day, seven days a week. A myriad of other professionals, including experts in clinical operations, aviation...

Words: 4730 - Pages: 19

Premium Essay

Management Information System

...S w 908E04 STARS AIR AMBULANCE: AN INFORMATION SYSTEMS CHALLENGE Professors Malcolm C. Munro and Sid Huff wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. Ivey Management Services prohibits any form of reproduction, storage or transmittal without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Management Services, c/o Richard Ivey School of Business, The University of Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca. Copyright © 2008, Ivey Management Services Version: (A) 2008-02-26 In a hangar near Calgary International Airport, three sleek red BK117 helicopters sat waiting to be dispatched to accident sites in southern Alberta. In an adjoining building overlooking a landing strip, dispatch staff quietly monitored multiple screens at a dozen workstations in the Emergency Link Centre. In the pilots’ lounge and surrounding offices, helicopter pilots, nurses and paramedics were on standby 24 hours a day, seven days a week. A myriad of other professionals, including experts in clinical operations...

Words: 4730 - Pages: 19

Premium Essay

Financial Statement Analysis

...Report on | Financial Statement Analysis & Valuation of Monno Jute Stafllers | A report on “Financial Statement Analysis & Valuation of Monno Jute Stafllers ” Course Title: FINANCIAL STATEMENT ANALYSIS & VALUATION Course Code: F-401 Submitted To: Dr. Mahmood Osman Imam Professor Department of Finance, University of Dhaka Hussain Ahmed Enamul Huda Lecturer Department of Finance, University of Dhaka Submitted By: Sayma Khair 17-115 BBA 17th batch 4th year 1st semester Department of Finance, University of Dhaka Date of Submission: July22, 2014. Letter of Transmittal July 22, 2014 Mahmood Osman Imam Professor Department of Finance University of Dhaka Subject: Submission of term paper on Financial Statement Analysis & Valuation of Monno Jute Stafllers Dear sir, I am extremely gratified & enthusiastic to present a report on Financial Statement Analysis & Valuation Of Monno Jute Stafllers as per as a part of requirement of our BBA Program of Course “FINANCIAL STATEMENT ANALYSIS & VALUATION”, Course no: F-401 . This report was assigned to us with a view to scrutinizing our skill and flamboyance when it comes to financial statement analysis know-how. Moreover, the purpose of this term paper was to extract our inner ability & enhance our financial statement analysis & valuation related potentials. We acknowledge the...

Words: 8567 - Pages: 35