Microcomputer - controlled breadmaking machine, Computer Engineering

Assignment Help:

Q. Microcomputer - Controlled Breadmaking Machine?

Figure shows a simplified schematic diagram of a microcomputer-controlled breadmaking machine. A microcomputer along with its timing circuit, keypad, and display unit controls the heating resistor, fan motor, and bread-ingredient mixing motor by means of digitally activated switches. An analog temperature sensor, through an A/D converter, provides the status of temperature to themicrocomputer.Adigital timer circuit counts down, showing the time remaining in the process.

The control programs are stored in ROM and determine when and how long the machine should mix the ingredients added to the bread pan, when and how long the heating resistor should be turned on or off for various parts of the cycle, and when and how long the fan should be on to cool the loaf after baking is finished. The parameters such as light, medium, or dark bread crust are entered through the keypad into RAM.

383_Microcomputer - Controlled Breadmaking Machine.png

According to the programs stored and the parameters entered, the machine initially mixes the ingredients for several minutes. The heating resistor is turned on to warm the yeast, causing the dough to rise while a temperature of about 90°F is maintained. The time remaining and the temperature are continually checked until the baked loaf is cooled, and the finished bread is finally ready in about 4 hours.

Microprocessors and computers in various forms are used extensively in household appliances, automobiles, and industrial equipment.


Related Discussions:- Microcomputer - controlled breadmaking machine

Control section in computer system, CONTROL SECTION: The control sectio...

CONTROL SECTION: The control section directs the flow of traffic (operations) and data. Also it maintains order within the computer. The control section chooses one program sta

Automated injection, There are tools to automate the process of SQL Injecti...

There are tools to automate the process of SQL Injection into login and other fields. One hacker process, using a one tool, will be to search out a number of weak targets using Goo

Explain how server form post-back works, Briefly explain how server form po...

Briefly explain how server form post-back works?  Post Back: The process in which a Web page sends data back to the similar page on the server. View State: View State is the m

Two ways in which one can retrieve data from tables, In general what are th...

In general what are the two ways in which one can retrieve data from tables? Using Select statements, Database Program.

What is electronic data interchange, What is Electronic Data Interchange? ...

What is Electronic Data Interchange? Electronic Data Interchange (EDI): It is used by organizations for transactions which arise on regular basis to a pre-found format.

DBMS SQL Queries, How to fetch random ID from table by SQL query Select ...

How to fetch random ID from table by SQL query Select * from Table_Name order by NewID()

State the implementation of a security policy, State the implementation of ...

State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,

Explain handlers classification, Handlers Classification In 1977, Wolfg...

Handlers Classification In 1977, Wolfgang Handler suggested a complex notation for representing the pipelining and parallelism of computers. Handler's categorization addresses

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd