Team B. Door Sensor Is someone at my door? My child is home alone, but I’d like to know if he is safe. I ordered a pizza, but I don’t have a doorbell.

Slides:



Advertisements
Similar presentations
2014 Redrock Software Conference Configuring System Communications s and Text Alerts Iliana Ramos.
Advertisements

My name is Luka I live on the second floor I live upstairs from you Yes I think you've seen me before.
Meeting. How safe are you on computers at school? Year 2 Most think they are safe Year3 17 very safe 3 a little bit Year3 / 4 19 feel safe 1 feels unsafe.
EMPLOYEE EMERGENCY CONTACT SYSTEM.  Employee Emergency contact system is an internet based portal where employees can update their safety status.  Portal.
Who Wants To Be A Safe Communicator? What does the ‘e’ stand for when it is in front of words? For example: , e-safety etc…
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Cyber Safety What Every Parent Needs to Know If your child is surfing the Web, you need to be paddling right alongside him/her.
1 Keeping Your Kids Safe On-Line Presented by Jason Sackett, LCSW USC Center for Work and Family Life.
SNAP-Ed /EFNED IT Time & Attendance Rau Sanchez SNAPED-Ed/EFNEP IT April 27, 2015.
Effective Agent Participation in Rescue Operations Brent Dutson CS7100 Fall 2009.
"Guide to Etiquette and Safety". What a student should do if he/she receives an with a flame, spam, or hoax? He/she shouldn't open it they.
Parking Space Finder Lucia Wiguno April 8,
E SAFETY. SOME FACTS A Talk Talk survey of 500 children aged 6-15 in Feb 2010 found: 5% had communicated with a stranger via webcam. 2% have actually.
 Proximity switches open or close an electrical circuit when they make contact with or come within a certain distance of an object. electrical circuit.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
PIR MOTION SENSOR Mohammed Muhid Ahmed S Checked By: Uzair Aakhoon.
Demystifying Hearing Assistive Technology Tina Thompson Beth Wilson CHHA Conference July 2008.
Challenge #1 – Relay Race Robot #1 will be randomly placed on starting line #1, #2 or #3. Robot #1 will drive until it detects the “Dark Line” - Robot.
I Can Stay Safe Online!. We can use the computer to…
How to keep your children safe online By angel Pena.
Internet Safety Keeping Kids and Teens Safe
REPORTSTAR Health Monitoring Software Overview. WHAT IS REPORTSTAR?
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
Internet Safety By: Kelly Tripi. Standards 1. Facilitate and Inspire Student Learning and Creativity b. Engage students in exploring real-world issues.
Click your mouse to continue. Ways to Merge Data When you have finished editing your main document and inserting the merge fields, you have several choices.
Telecommunication technology Then and Now. But First… What is telecommunication Technology? Telecommunication is the transmission of messages over a country.
evidence. Screenshot of my and logo attachment.
Click on any number and you’ll see your situation.
Obstacle Detection Introductory Presentation. Opening Activity If you were blindfolded, what senses would you use to find things in the room?
Instructions  There are 20 slides which list abilities and interests, such as “working with your hands” or “speaking in public.”  As you read the slide,
How to use the internet the right way!!! Safely and responsibly!!!
Online Services By Eleanor Monks. Entertainment Services This service gives us the privilege to be entertained with recent programmes or music genres.
What Every Parent Needs to Know About Cyberbullying.
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
Brandon McGee Eastern Kentucky University Capstone 2015.
EEL 6883 Spring 2007 Software Engineering II Gleyner Garden Video Surveillance Project.
Students’ Presentation. U20L2 Listening 寿县安丰高中 高二英语教研组.
Jason Holmes Matt Wickesberg Michael Piercy Matt Guenette Team 12 – Super Tank February 15, 2012.
Today we are teaching the Millennial Generation!!!!
Warm-up WHEN YOU COME IN…. ◦#1 Make sure you take one of each of the sheets on the front table ◦#2 Find your assigned table and sit down ◦#3 Make sure.
Reading is an Investment Kindergarten Lesson
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Digital Footprint This Presentation is on your digital footprint and how it might affect you at your job or in your everyday life.
Unit 6 Apologies (II) Step 1: Opening Remarks Step 2: Explain listening skills in Unit 6 Part A : Micro-Listening Listening for Details.
Obstacle Detection. In the previous program the robot moves forward and then checks for something in the way. As we observed it only checks for things.
MY NEST A TECHNOLOGICAL OVERVIEW. NECKLACE Reason: Hidden Less like being tagged and branded (jail)
Cell Phone Etiquette. Topics Screen Your Calls Limit Cell Phone Use Take a Break from Texting Be Aware of Your Behavior Keep Conversations Private Choose.
Forward Until Near Stop when near a wall.
RCCD Application: Part 1 Norco College Create an Account.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Robotics Programming Wall Follow Line tracking for a set amount of time Line tracking for a distance.
Module 4 山东省利津县 綦 昭颖 Unit 1 If you want to record, press the red key.
OUR GUIDE TO STAYING SAFE ONLINE
Using tools and the ‘Wait’ Block
Introduction to Wireless Technology
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
SCC Supplier Performance Management (SPM) Training
Introductory Presentation
Introductory Presentation
If I’d only known then what I know now about phishing…
Safety on the Internet By Luna.
Moral Compass Questions Rights and Responsibilities
Introductory Presentation
Processes and Process Table
Obstacle Detection.
Obstacle Detection.
Copyright Shy Bookman.
Large: $20.00 Small: $ cm 39 cm.
TALK DISCUSSIONS
Presentation transcript:

Team B

Door Sensor Is someone at my door? My child is home alone, but I’d like to know if he is safe. I ordered a pizza, but I don’t have a doorbell and can’t hear a knock. Proximity sensor Was someone in my workstation? How long were they at my computer? Is someone too close to something they shouldn’t be? (a piece of art in a museum possibly)

Detects an object within 80 cm of sensor Can be programmed to record for a certain amount of time before generating an alert Records and transmits the distance of the object and the time the object remained in front of the sensor. Programmable alert system allows alerts to be sent via text message, , or instant message.

Detects an object Records distance via an Infrared Sensor Continuously transmits the distance of an object to the receiver

Receives distance data from the transmitter Waits until a pre- programmed ‘threshold’ amount of time an object was near the sensor Generates an alert to be sent through desired alert channels complete with time the object was near the sensor and distance the object was from the sensor

Demonstration

Questions?