1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
10

Describe the role of the microprocessor in an automatic washing machine (IGCSE)

Computers and Technology
1 answer:
Ann [662]3 years ago
3 0
The microprocessor is programmed to follow the logic sequence of operation.

Monitoring various operator inputs, digital and analog inputs. Outputs to controlled devices take place.

Inputs: start switch, door safety contacts, water level sensor, wash cycle selector switch, etc.

Outputs: drive motor, motor speed regulation , reversing solenoids etc
You might be interested in
What is the missing term in the code that handles that error??
kykrilka [37]

Answer:

try typing that into gooy gle im sorry if i didnt help

if tickets >400 What is the missing term in the code that handles that error??wat over400error

Explanation:

3 0
3 years ago
What are the risks associated with this kind of connectivity?.
Eva8 [605]

Answer:

The risks associated with this kind of connectivity are that online hackers may see your information and that makes the human race too dependent on robots and technology which is never a good thing.

Explanation:

<h3>be happy</h3>
8 0
3 years ago
What is the answers please
Gre4nikov [31]
which question are u referring too
6 0
3 years ago
Write a C program that spins a child process. The child process reads a number from the keyboard and passes the number on to the
Murrr4er [49]

# include <stdio.h>

int main()

{    

   int pid;

   pid=getpid();

   printf(\"Current Process ID is : %d\\n\",pid);

   printf(\"[ Forking Child Process ... ] \\n\");    

   pid=fork(); /* This will Create Child Process and

              Returns Child\'s PID */

   if(pid < 0)

   {

       /* Process Creation Failed ... */

       exit(-1);

   }

   else if(pid==0)  

   {

       /* Child Process */

       printf(\"Child Process Started ...\\n\");

       printf(\"Child Process Completed ...\\n\");

   }

   else  

   {

       /* Parent Process */

       sleep(10);

       printf(\"Parent Process Running ... \\n\");

       printf(\"I am In Zombie State ...\\n\");

       while(1)

       {

           /*  

               Infinite Loop that Keeps the

                  Process Running

           */

       }

   }    

   return 0;

}

# include <stdio.h>

int main()

{    

   int pid;

   pid=getpid();

   printf(\"Current Process ID is : %d\\n\",pid);

   printf(\"[ Forking Child Process ... ] \\n\");    

   pid=fork(); /* This will Create Child Process and

              Returns Child\'s PID */

   if(pid < 0)

   {

       /* Process Creation Failed ... */

       exit(-1);

   }

   else if(pid==0)  

   {

       /* Child Process */

       printf(\"Child Process Started ...\\n\");

       printf(\"Child Process Completed ...\\n\");

   }

   else  

   {

       /* Parent Process */

       sleep(10);

       printf(\"Parent Process Running ... \\n\");

       printf(\"I am In Zombie State ...\\n\");

       while(1)

       {

           /*  

               Infinite Loop that Keeps the

                  Process Running

           */

       }

   }    

   return 0;

}

4 0
3 years ago
Which of the following should be performed to prove the value of a security awareness training program?
Helga [31]

Answer:

Schedule a convenient time and location for the training, to include as many people as possible.

Explanation:

The main purpose of security awareness program is to educate people about computer security. A good security awareness program should educate people about corporate policies and procedures for working with information technology  thus option b is the right answer.

8 0
3 years ago
Other questions:
  • Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a use
    14·1 answer
  • Janelle is shopping for jeans from Express. She clicks on a style she likes. The site quickly presents her with a close-up view
    5·1 answer
  • 2. Add a _______ to manually force text from one page to the next page. A. footer B. page break C. blank page D. header
    11·2 answers
  • How to see if your computer has bluetooth?
    6·1 answer
  • A section-lined area is always completely bounded or outlined by an?
    11·1 answer
  • Which of these is an example of gathering secondary data?
    15·1 answer
  • Identify a true statement about heuristics: a. They are more complicated than algorithms. b. Unlike algorithms, they do not perm
    15·1 answer
  • What does PR stand for ?
    15·1 answer
  • While working in a group of two the members are not getting along. You bring the two members together so they can discuss this i
    11·1 answer
  • Describe the method used by operating systems to differentiate between TCP connections.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!