Premium Essay

Nt1310 Unit 8 Lab Report

Submitted By
Words 427
Pages 2
b. Functions and operates
According to Woodford (2016), automatic washing machine are electrically controlled which consist of inner drum, valves, water pump and heating element. The washing machine working by switching one stage to another stage in a sensible sequence:
1. First put dirty laundry into washing machine and pour detergent either in the drum itself or in detergent tray up above.
2. After that switch on the power and set the program wanted.
3. Washing machine program the water valves so hot or cold water enter the washing machine and fill the outer and inner drums. The water will enters from the top and trickles down through the detergent tray and washing down the detergent into the washing machine.
4. When the water is fill enough …show more content…
After the water is hot enough it will switch off the heater and it will switch on motor to rotate the inner drum back and forth, sloshing the clothes through the soapy water.
7. The detergent work with water pulls out the dirt or stain from the clothes and trap the dirt in the water.
8. After finish wash the washing machine will switch on the water valves to drains from both drums. Then will be rinse mode where the pump is switched on to help empty the water in the drums.
9. Now the microcontroller will invoke the water valves to switches on again to allow clean water enter the drums.
10. The microcontroller invoke the inner drums to rotate back and forth again in order the clean water to rinses the clothes that have detergent. Then will empties the drums again and repeats this process few times to get rid all the soap.
11. After the clothes are rinsed from the detergent then the microcontroller invoke the inner drum rotate in very high speed, speed may reach around 80 mph. All the clothes will flung against the outside edge of the inner drum, then the water contain in the clothes will extract out to through the inner drum tiny holes to the outer drum.
12. Next the he pump drain out the remaining water from the outer drum and wash cycles is

Similar Documents

Premium Essay

Nt1310 Unit 8 Lab Report

...Lab 8 This chapter give as closer look into binoculars and telescopes. Hans Lippershey invented the telescope. He tested this by looking at small object in the floor. There are two different kinds of telescopes. These two different kinds of telescopes are the refractor and reflector. As the name states it the reflecting telescope uses mirrors to reflect the image and come back into the pupil. First the light goes through the front of the telescope and goes in the concave mirror. When this is done the light and image is passed on to the flat mirror and is reflected into the eye piece and the image goes into the pupil. The refractor telescope uses lenses to magnify the image. The light first goes in the primary lens and then the light goes...

Words: 1707 - Pages: 7

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10