Top-Rated Free Essay
Preview

Suitability of event driven programs - D1

Satisfactory Essays
290 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Suitability of event driven programs - D1
Suitability of event driven programs (for non-graphical applications)

The washing machine sits idle waiting for a command from the user via the buttons (event triggers). It then identifies what button was pressed and then executes the code associated with that trigger. As the dial moves, it will hit the trigger point which will cause the next action however; the user can stop the process immediately with a certain button (trigger). A washing machine cannot assume because the code means that it will always perform the same things. Event driven programming is good as it sits there idle until the event trigger occurs and it is quick to respond to this. Event driven programming is also very simple when it comes to coding as it shows the possible commands for that part of the code, it also allows the user to put a code in without typing which is a lot faster and reduces error.

You have to put your ID cards over the detectors (event trigger) and they then execute the code for the barriers to open or closed. If the ID card is accepted, the code will be run for the light to change green and for the barrier to open but if the ID card isn’t accepted, then the code will be run for the red light to show and the barriers will not open. An event driven programme here is not really suitable here as it can take a long time for the card to be checked and this can cause long queues of people. Also, people go in and out from the same direction so this can also be a problem as someone may wanting to go out and someone may wanting to go in.

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    There are many reasons why Windows operating system could be called an event-driven application. The first reason why Windows operating system might be viewed as an event-driven application is that the start button on the operating system can be activated through a click event. This means if a user uses their mouse to click on the start button, the start button will activate and the start buttons list will appear with other functions. Nearly everything on the Windows operating system is event-driven. Another example of this is the fact that you can drag and drop most things on the operating system, you can drag applications and files to the recycling bin to dispose of, or you can drag an application or file to any destination on your computer, such as the documents folder in your hard drive. One more example that the Windows operating system can be referred to as an event-driven application, is the keyboard. The keyboard is event-driven because when a user presses a key on the keyboard, it is registered as a Key Down command. The Key Down command is linked with data that is also linked with the pressing of the key.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    These gates work by a system similar to radar--by firing out radio waves, but instead of waiting for them to bounce back, they simply wait for an activated tag to come through. The activated tag-- a small, functioning radio transmitter and receiver, will receive the gate’s signal and transmit one of its own, causing the alarms to go off. An inactivated tag, on the other hand, has been disabled at the checkout line by either destroying or deactivating the electronic component in the tag. Though the deactivation process doesn’t always work, the concept itself is simple and…

    • 536 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 210 Week 8 Checkpoint

    • 358 Words
    • 2 Pages

    | |sure that you can only turn the device on if |user who can open and close the door|opened or closed, it must inform the |…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The system stores all the necessary information about the user. A new user is first registered to the system and the corresponding information is burned in the RFID tag. This RFID tag will then be accessible through the system. When a registered user comes to the entry point and puts his/her tag into the reader, the system checks whether he/she is a registered user or an imposter. If the user is registered, then the tab information is matched with the user information stored in system. The door is opened after the successful authentication and is closed automatically after a specific time interval. The check-in information is also stored in the database with the corresponding date and time. A log is also generated by the system according to the check-in information. Finally, this check-in information is stored in a central server along with the basic information of the…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Good Essays

    Any special requirement would have also been discussed at the initial assessment ie entry by the front or back door, keysafe number, security door number, whether they would like the doorbell rung before entering etc.…

    • 832 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Authentication: The key badge given to each employee will be used to allow access and authenticate that employee. An initial temporary password will be applied to each employee logon information and require the employee to change the password on first login. The policy will be set up to ensure that the employees create strong passwords and are required to change their passwords every 60 to 90 days. Employees at higher levels who have access to sensitive information may also be required to use two-factor authentication such as fingerprint biometric access to get into rooms and buildings and/or simply login to their computer system. PIN numbers will be used to access server rooms. Token will be issued to provide access remotely to allow for secure logins.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1. Control entry to the restricted area and the individual resources. An Automated Entry Control System (AECS) may be used instead of an actual person, like a keypad that reads a Restricted Area Badge…

    • 19110 Words
    • 62 Pages
    Powerful Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Staff and visitors have to sign in and out using an electronic scanning system. Each member of staff/visitor has a card with photo ID, name and bar code to identify themselves and use to sign in and out of the premises.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Before entering the unit, we have a code that we have to enter to allow us entry to the building. This code unlocks the front door, and is for safety and security of staff and residents, and complies with our duty of care.…

    • 602 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 4 1.2 and 1.4

    • 2237 Words
    • 9 Pages

    We have a secure entry system which prevents unauthorised access into the nursery and a signing in book for staff and visitors so that the purpose of visitors within the building is monitored and known.…

    • 2237 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Each facility member and student will be issued an ID card that is encoded to open only what he/she been granted access to. This…

    • 366 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The use of sign in badges for visitors are used also anybody working in a school environment has to have a C.R.B check before entering.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the setting there should never be any unauthorized person. If a visitor comes into the setting it’s important for that person to sign in the visitor’s book. It’s also important for that visitor to wear a visitors badge so everyone in the setting is aware that the visitor is authorized. If I or the staff seen a visitor in the building without a badge on then it’s important for me to challenge the visitor. For example asking where they are going or what room do they…

    • 387 Words
    • 2 Pages
    Satisfactory Essays