Using the BBC micro:bit for Home Security

Slides:



Advertisements
Similar presentations
Alarms : Design Technology 4D. Alarms are used for lots of different reasons. Can you think of ways that alarms are used? Warn of fires Warn of Burglars.
Advertisements

1 TM SIMPLEST HOME “SECURITY” PRODUCTS TO PROTECT YOUR HOME, CAR & OFFICE Watchdog I Watchdog II Simulated Alarm Hunterco China USA Corp US:
Introduction By Katie Cribb burglar alarm (house alarm)
Communications Technology 2104 Jenn Sandifer. A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or area.
A Burglar Alarm. The idea of an intruder alarm is to simply try and deter a potential burglary occurring at your premises, and to an extent it works.
Electronics Travel Games Name: Centre Number: Candidate Number:
Flip-Flop Applications
PIR MOTION SENSOR Mohammed Muhid Ahmed S Checked By: Uzair Aakhoon.
Country house Control Panel Glass break detector Hooter alarm Magnetic sensor Motion detector Security light.
 The Circuit  Home Security Systems are a simple electric circuit. To open or close a light, you simply throw a switch. In a burglar alarm it?s the.
PIR MOTION SENSOR Created by: Zaryab Altaf S
PLC HOME SECURITY SYSTEM Wesley Roe EKU, Department of Technology Computer Electronic Networking.
PIR MOTION SENSOR By Talal BUTT Checked by Uzair Aakhoon.
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
Avon Intermediate School
Systems Approach Burglar Alarm Project PROBLEM SITUATION DESIGN
SURVEILLANCE SYSTEM HITRON DVR All rights reserved by Hitron Systems.
Chapter 2 What is an Alarm System? Alarms: The First Line of Defense
Our senses We can use our eyes to see things Our senses We use our ears to hear.
Wired Home Security Technologies Wired alarm systems require basic electrical wiring that extends from the control panel and keypad to door and window.
For: Communication Technology 2201 By: Chris Murphy.
Business type Education Institutions No.P019 Problem 1 These days, we hear a lot about people trespassing on school property and want to manage this risk.
Submitted By: Mark Stead Submitted To: Mr. Riche Submitted On: Sept,26,2102.
Home Security Leslie Locke 1. Did you know? According to the FBI, a home invasion occurs once every 14 seconds 2.
In a Digital Age Katy Doty. Technology Has Come A Long Way… Mobile Banking – Balance – Transfers Schedules/Itineraries – Flight confirmations –
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
My Fire Safety Book By:. My house is safe! My family has made my house word from fire. We have talked about fire safety in our home.
WHAT DO YOU DO WHEN THERE IS A FIRE DRILL? BY Sarah Cox MEd. CCC-SLP.
Object Oriented Analysis Unified Modeling Language By Mary Biddle.
Mechanics Security Solutions “Creating Next Generation Security Solutions”
People realize that security of their home is major concern, so they often employ security companies to help them out. Security companies’ offer varied.
Unit 9.1_Lesson 4_CD Resource 4a_Sensors and flowcharts Sensors and Flowcharts.
What the FLIP?. The flipping theory… “Flipping” recognizes that people learn, they aren’t “taught”. You will learn many things this year. No one will.
ZAHRA AND RANA SECURITY SYSTEMS. A.O.I Arts and Entertainment Art Gallery Vandalism and Robbery proof Security Systems are vital.
Home Security With AD HOC Networks. The Home Security Problem.
SMART WAYS TO SECURE YOUR HOME IN A BETTER WAY EVERY HOMEOWNER WANTS TO ENSURE THE SECURITY OF HIS OR HER FAMILY AND HOME. THESE ARE THE TOP TWO CONCERNS.
BJHS Laptop/ IMC Orientation Video.
XBee Based Industrial And Home Security System
How to be safe while RVing
Sensors Control Systems with Flowol.
GCSE COMPUTER SCIENCE Computers
Video 1 How to Change Your Life Principle 1
Security module SB-DN-SEC250K.
Video exercise - Answers
Control Control Devices.
Using the BBC micro:bit for Home Security
Personal Health Check BBC micro:bit Heart Rate Monitor
Avoid Holiday Shopping Heartbreak
Using the BBC micro:bit to Create a Flood Warning System
Geography of Crime Geographers study crime to find hotspots where crimes are likely to occur. The information is used to plan safer living spaces and to.
Get Gas Safe.
find-the-best-cctv-system-company-in-singapore
‘Keep off that bag!’ BBC micro:bit School Bag Alarm
JC Technology Relay.
Flip-Flop Applications
Flip-Flop Applications
What the FLIP?.
‘Keep off that bag!’ BBC micro:bit School Bag Alarm
Input-Output-Process Demo
BBC Microbit.
USED TO VS WOULD UNIT 4.
Inventor 2015 Training.
Maintaining order and safety in a city is no small task
Objectives Construct truth tables for the following logic gates:
Ways to keep my body safe and clean
Monday, August 20th, 2018 LT – Today I will independently read my book to increase my Lexile to grade level. Begin studying!
Design Situation Design Brief.
“The Theft Buster” Before you begin
Presentation transcript:

Using the BBC micro:bit for Home Security Analysis of needs for home security

Design Brief Situation Homeowners worry about the potential for burglary. A good security system can keep their home safe from unwelcome intruders. Brief Using the BBC micro:bit, create a working door access security system. The system must use sensors to detect an intruder and sound an alarm when this happens. It must also be possible for the homeowner to reset the system as needed.

Analysis of Needs of a Security System Watch the video: Interviews with reformed burglars What security system features are burglars not worried about? What security system features would put a burglar off invading a home? Write down four key things that your system should include as a result of what you have seen in the video.

Analysis of Needs of a Security System What worries burglars What doesn’t worry burglars You could print and hand this out for students to make notes on – alternatively they could use note paper or their exercise books. Four key things that my system should include: 1. ___________________________________ 2. ___________________________________ 3. ___________________________________ 4. ___________________________________ Other notes: