• Home
  • Tutorials
  • Ten Daily Electronic Common Sense-Section 70

    What is the main role of the Event Trigger (ET) module?

    Accepts event inputs from the Time Base Counter (TBCTR) and Count Compare (CC) modules. Use the direction information of the time base counter (TBCTR) to respond to increment/decrement events. Provides full visualization of event generation through event counters and flags. Allows software to force interrupts and start ADC conversions.

    Infrared temperature measurement is a relatively advanced measurement method. What are its characteristics?

    1. Infrared temperature measurement can be used for long-distance and non-contact measurement.
    2. Infrared temperature measurement has a fast response speed.
    3. Infrared temperature measurement has high sensitivity.
    4. Infrared temperature measurement has high accuracy.
    5. Wide range of infrared temperature measurement. It can measure the temperature range of several thousand degrees Celsius below zero to several thousand degrees Celsius above zero.

    What are the usage rules for arithmetic operators?

    The rules for using arithmetic operators are as follows.
    -: Stop and negative operations, which can be integers, real numbers, or physical quantities.
    +: The use range of the addition and subtraction operators can be integers and real numbers, and the two operands involved in the addition and subtraction operations must be of the same type.
    *: Operands of multiplication and division operations are both integers and real numbers. The physical quantity multiplied or divided by an integer is still the physical property divided by the same property, and the quotient is an integer or a real number.
    MOD, REM: The operands of modulo and remainder operations must be M-integer type data.
    Addition, subtraction, and multiplication can be compiled into logic circuits, and the rest of the operations are difficult to compile into logic circuits.

    What is the composition of the ultrasound system?

    It consists of sending sensor, receiving sensor, control part and power supply part.

    What is the encapsulated VLAN ID?

    The VLAN specified here will be used to encapsulate the frames to be mirrored. Frames may be transmitted over uplinks that may use different VLAN IDs. Be sure to check the “Preserve Original VLAN” option if you want Port Mirroring to remember the original VLAN ID used by the traffic. Otherwise, the encapsulated VLAN will replace the original VLAN.

    What is MFM, what does magnetic microscopy mean?

    The so-called magnetic force microscopy of MFM refers to a Scanning Probe Microscopy (SPM) that uses the magnetic interaction between the magnetic probe and the sample to obtain the surface magnetization structure.
    In 1987, Martin and Wickramasinghe first utilized the non-contact mode of operation of Atomic Force Microscopy, (AFM). A chemically etched iron needle was magnetized and then bent as a magnetic probe, and the first MFM images were observed on a thin-film magnetic head. However, what Martin and two obtained were only magnetic images, but not the surface structure. Moreover, the preparation of probes is complicated. After more than ten years of development, these shortcomings have been overcome.
    A magnetic sample that has surface geometry in addition to surface magnetization. The probe of the AFM is coated with a magnetic film, and then the pattern image of the sample surface is obtained by tapping the operation mode. After taking the height of a point, the probe is pulled up to a fixed distance. Then, the changes in the vibration frequency or phase of the probe are measured to obtain a magnetic image.

    What are the digital frequency measurement methods?

    There are three commonly used digital frequency measurement methods: direct measurement method (hereinafter referred to as M method), periodic measurement method (hereinafter referred to as T method) and comprehensive measurement method (hereinafter referred to as M/T method).

    In order to avoid crosstalk, what are the design and routing methods that are effective during the PCB layout?

    • Classify the logic family of the device by function. Tightly control the bus structure.
    • In the layout stage, the physical distance between components is reduced.
    • Reduce the line length of parallel wiring.
    • Place the device away from I/O interconnects and other circuit areas sensitive to signal degradation and coupling.
    • Terminate the traces with controlled impedance or traces rich in harmonic energy.
    • Avoid parallel wiring. Keep sufficient spacing between traces to reduce inductive coupling effects.
    • The adjacent wiring layers (microstrip line or strip line) should adopt the orthogonal wiring method. This prevents capacitive coupling between adjacent wiring layers.
    • Reduce the distance from the signal layer to the reference ground.
    • Reduce the line impedance and the level of the drive signal.
    • Use solid planar structures to isolate wiring layers that must be routed in the same direction (typical backplane stack-up distribution).
    • Split or isolate high-noise transmitters (clocks, I/Os, high-speed interconnects, etc.) in different layers of distribution in stack distribution.
    • A filter with band-limiting function is installed on the special transmission line to remove the direct coupling between the source and the disturbed trace. This filter consists of a simple FLC resonant bypass in series between the interfering trace and the zero-volt reference line.

    With NativeLink, what kinds of EDA tools can use the process to complete the design?

    1. Quartus II driver process;
    2. Third-party tool driver process;
    3. File-based control process.

    What are the system protections?

    1. The “watchdog” (COP) reset that monitors the normal operation of the microcontroller, supports the selection of a dedicated backup lkHz internal clock source or bus clock operation.
    2. Low voltage detection circuit with reset and interrupt, selectable voltage threshold.
    3. Support illegal command code reset.
    4. Support illegal operation address reset.
    5. Support Flash block protection.
    6. Support clock signal loss protection.

    COMMENTS

    WORDPRESS: 0
    DISQUS: 0