StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Locking Devices - Assignment Example

Cite this document
Summary
The author of this assignment entitled "Security Locking Devices" comments on the difference of two locking devices for doors and windows and the means of generating power through alternative means to that of the existing modes of power generation. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Security Locking Devices
Read Text Preview

Extract of sample "Security Locking Devices"

INTRODUCTION The two texts to be compared are to do with security locking devices for doors and windows and the means of generating power through alternative means to that of the existing modes of power generation. While the first text is to do with the microcontrollers and processors that make up the security locking system, the second text is to do with the photovoltaic cells, Wind turbines and the CHP systems that make up the power generating capacity. The texts are part of the final project and the dissertation that is to be submitted by the concerned students. This paper attempts to compare the two texts in the structure in which they have been presented with an eye for the way in which they have been presented. As far as possible, I try to minimize the use of technical jargon in describing the texts and instead use simple language to convey the sense of the texts that are being compared. I address the content presented in the text from the point of view of organization, structure and style of presentation as well as looking for similarities in the text and pointing out differences. As mentioned above, both the texts are highly technical in nature and hence I limit myself to a discussion about the overall content instead of going into the details presented in the text. NOTE ON THE TWO TEXTS The two texts begin with a concise introduction of the subject and they present the material in a lucid if not slightly technical jargon. Thus, the texts attempt to convey the central idea about the locking devices and power generation mechanisms in a way that is comprehensible with some knowledge of the engineering specifics. Security is one of the most important subjects in the world’s agenda. This term especially after huge technologic improvements became a name of the sector because safety techniques and equipments developed as much as weapons and other criminal devices. Every day we hear lots of news about security problems and crimes from newspapers and TV channels. Thus day by day peoples need to have safer life in their homes, work places and outside. To keep our living areas safer is the main issue. Every time we have to be careful about our doors or windows whether all of them are closed safely. But sometimes we get bored because of these details. Also if you are a person who hates to carry something (i.e. a key of his house) with you every time this situation is harder for you Nowadays electronic, informatics and electrical devices are widely used all around the world. It makes that electrical energy demand is very high and it is still increasing. Currently, most of the electricity is generated in large centralized power stations, such as coal power plants, nuclear reactors, hydropower or gas powered plant. These plants have very good economies of scale, but usually transmit electricity long distances. The disadvantage of coal power stations is heavy air pollution. Nuclear reactors fundamental problem is that they produce radioactive waste. Due to this fact the environmental friendly issues are becoming very important. One of the main aspects is to reduce greenhouse gas emissions. Both the texts make a good job of providing relevant information to the intended audience in terms of the information that they seek to convey and the flow and the style of the content. The texts have adequate detail in terms of design and the way in which the material is structured with an emphasis on the technical as well as the general. The style of writing is academic with a bent towards the content being engineering specific in its approach. ORGANISATION AND STYLE In this section, I introduce the overall content of the two texts in turn and then elaborate on the introduction that is provided in the two texts. I quote from the two texts to buttress my points about the content presented in the two texts. The emphasis is on the content provided in the introduction and the ways in which it is presented to the audience. Both the texts are highly technical in their description of the procedures for designing a security system as well as generating power. The texts have a lot of technical jargon and make extensive use of graphics and flow path diagrams to explain the procedure. The network diagrams or the graphic component of the texts is adequate and is explained by means of sub texts and foot notes to each of the graphs or the flow diagrams. The first text is more technical than the second one in its use of language and academic style. The second text starts off with a general introduction about the CHP, photovoltaic cells and other power generating mechanisms. It then goes on to describe in numerical quantities (by means of tables) to explain the ways in which the power load factors and the other quantitative data that is needed has to be presented. Though both the texts are incomprehensible to the lay person, this is more of an intended difference as the target audience for both the texts are persons with knowledge of the subject matter. They do this well with a combination of academic styles and technical knowledge thrown in that make the texts structured and well laid out. SIMILARITIES The similarity between the two texts lies in the description of the microprocessors and network flow diagrams that are used to describe the flow of power through the circuits. The network diagrams in the texts refer to the ways in which the systems are correlated and then used in conjunction with regular power devices to generate power in the second case and to improve security in the first case. The first text gives an in depth introduction to the use of processors and controllers for regulating the flow of power through the circuits. The microprocessors and the LED’s are explained in detail in the first text. The second text gives a detail of the flow of power through the grids by means of diagrams conveying the sense of networks that are involved. Thus, this can be said to be a similarity in the way in which the texts are interpreted. Apart from these similarities, there does not seem to be any place for technical or subject matter convergence as both the texts deal with two different approaches to the different issues at hand. It has to be said that the questions or the briefs that were asked of the authors of the texts have been answered well in the texts. DIFFERENCES The main point of difference between the two texts is that the first one deals with issues on a micro scale whereas the second one deals with issues on a macro scale. Thus, the first text is about microprocessors and the ways in which they are used to light up the LED’s and be useful for door locking mechanisms whereas the second text is to do with power generation by alternative means. The other major difference has to do with the scale of the network diagrams that are presented in the texts. While the microprocessor based diagrams are presented in the first text, the second text has to do with the larger flow diagrams that describe the extent of flow of electricity and power throughout the grid. Thus, as mentioned in the previous sections, the first text has to do with the micro scale and the second text has to do with the macro scale of things. Apart from the scale or the scope of the texts, the divergence is also accounted by the fact that the texts deal with fundamentally different approaches and topics. While the first text is concerned with the use of power for security systems, the second text is concerned with the production and distribution of power. Thus, this accounts for one fundamental difference in the texts. CONCLUSION I have attempted to compare the two texts from the style and content overview point of view. It is apparent that the texts have conveyed the purpose for which they were written and they have done an admirable job of it. Though the intention of this paper was not to delve into the details of the texts with regards to the technical content, it is suffice to state that I have conveyed the overall idea presented by the texts. Both the texts are an attempt at describing a technical solution to a problem faced by power generators and security locking device manufacturers. Thus, both the texts address technical issues by relying on diagrams and technical details to explain the processes behind the solutions offered for the issues. In conclusion, it was interesting to go through both the texts and realise the differences and note the similarities. The field of power transmission and generation is an interesting and exciting one and thus my interest in making a career out of is worth the effort that I have put in all these years. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Locking Devices Assignment Example | Topics and Well Written Essays - 1500 words, n.d.)
Security Locking Devices Assignment Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/engineering-and-construction/1721395-compare-between-two-texts
(Security Locking Devices Assignment Example | Topics and Well Written Essays - 1500 Words)
Security Locking Devices Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/engineering-and-construction/1721395-compare-between-two-texts.
“Security Locking Devices Assignment Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/engineering-and-construction/1721395-compare-between-two-texts.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Locking Devices

How Mobile Phones Are Used in Business

PART -1 There are multiple approaches to how the smart phone devices are integrated into the corporate infrastructure for tapping best benefits out of them.... Many IT industries connect BYO devices via Wi-Fi (Bring Your Own Device) “which allow employees to work from the device of their choice” which help the employees to have “full access to specific services” (Smartphones and Tablets in the Enterprise: Managing BYO Device Programs 1).... Different Options Available for Mobile devices 1....
6 Pages (1500 words) Essay

Mobile Device Security Policies

The administrator formulates mobile device security policy to protect all the mobile devices and other software from unauthorized access, use,… The purpose of these policies and restrictions is to ensure appropriate use of mobile devices and software.... The administrator formulates mobile device security policy to protect all the mobile devices and other software from unauthorized access, use, disclosure, alteration, modification, deletion, destruction and removal....
2 Pages (500 words) Research Paper

Sam 488 unit 5

In this case, the purchase and installation of the locking devices for security purposes also depends on a number of factors.... Some of these factors include the security cameras to be used, type of the locking devices, card readers, and a proper response protocol (Fay, 2011).... The equipment, however, must be integrated into… This paper aims at analyzing the factors of purchasing and installing the security devices, the visitor access control system, and environmental variables that ensure proper security operation. The definition of SECURITY MANAGEMENT Introduction The fundamental concepts of physical security and access control security remain constant....
2 Pages (500 words) Assignment

Physical Tamper-Resistant Devices

Various Physical tamper-resistant devices exist.... These include high-end, low-end, and mid-range devices.... However, one aspect worth noting is that these devices vary in cost and range classification in various countries.... Below is the list: Just like the 4785 IBM, these resistant devices are of a very strong crypto system that is surrounded with a tamper sensing mesh.... These kind of resistant devices comprise of a symmetric cryptosystem key....
4 Pages (1000 words) Essay

Network and Data Security of the Building

The measures include installing of cameras for monitoring, application of Crime Prevention through environmental design (CPTED),… ng surveillance devices, constructing outdoor barriers within or around the facility, use of locks, alarms, lighting the facility, controlling entry of persons into the facility among other factors.... Surveillance can assist to closely monitor individuals with a lot of secrecy and thus it's recommended to install these devices at places where people cannot recognize them easily....
3 Pages (750 words) Essay

What Will Provide the Best Input Control - EAC System or Biometrics

rdquo; provides peculiarities of the systems (EAC is security gear while biometrics is an authentication process) and emphasizes that company should undergo an evaluation process to identify the claims to introduce EAC.... hellip; An Electronic Access Control System (EAC) is a mechanism for security control which is used physically or automatically in order to manage the entry and exit of protected areas of an organization or site of work.... On the other hand, controlled exit system practices the similar security system for the individuals moving in both the ways i....
14 Pages (3500 words) Coursework

The Impact of Mobile Devices on Cyber Security

hus, at such an age where The paper “The Impact of Mobile devices on Cyber Security" is a cogent example of a term paper on technology.... Thus, at such an age where the technological mobile device use is so rampant, the question that begs an answer is whether the population is aware of the potential security threats to their devices.... The increased use of wireless technological devices opens a floodgate of cybersecurity threats to the owners of such gadgets (Global Focus, 2013)....
3 Pages (750 words) Essay

The Impact of Mobile Devices on Cyber-security

"The Impact of Mobile devices on Cyber-security" paper argues that mobile devices such as smartphones are the most abused by hackers, thus, they need not to be used in storing organizations' information.... By 2013, over 80% of the people in the whole world were using mobile phones and currently, the number of mobile devices in the world exceeds 6 billion.... In connection to this, the paper will expound on the impact of mobile devices on cyber-security....
5 Pages (1250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us