Multiple Choice - Revision.pdf Flashcards
What is an example of an Open-loop control system?
A) Fly by wire
B) Dynamic positioning system
C) Electric heater with thermostat
D) All the options
C
What is an example of a Closed-loop control system?
A) Fly by wire
B) Dynamic positioning system
C) Electric heater with thermostat
D) All the options
A
Three advantages of Open-loop control systems include:
A) Immediate response, Reduced stability, No reliance on feedback
B) Improved stability, Predictable output, Reduced energy consumption
C) Reduced stability, Increased energy consumption, Predictable output
D) No reliance on feedback, Immediate response, Increased energy consumption
B
Three disadvantages of Open-loop control systems include:
A) Increased energy consumption, Reduced stability, No reliance on feedback
B) No reliance on feedback, Immediate response, Increased energy consumption
C) Improved stability, Predictable output, Reduced energy consumption
D) Reduced stability, Increased energy consumption, Predictable output
D
Three advantages of Closed-loop control systems include:
A) No reliance on feedback, Immediate response, Increased energy consumption
B) Improved stability, Predictable output, Reduced energy consumption
C) Increased energy consumption, Reduced stability, No reliance on feedback
D) Reduced stability, Increased energy consumption, Predictable output
B
Three disadvantages of Closed-loop control systems include:
A) Reduced stability, Increased energy consumption, Predictable output
B) Increased energy consumption, Reduced stability, No reliance on feedback
C) No reliance on feedback, Immediate response, Increased energy consumption
D) Improved stability, Predictable output, Reduced energy consumption
A
Control systems monitor and control the operation of the process within a safe pre-set limit by adjusting the controlled variable (output) to control the manipulated variable (input).
A) True
B) False
A
Which fields are NOT a part of Modbus application protocol (MBAP) header?
A) Transaction ID
B) Protocol ID
C) Slave ID
D) Unit ID
D
Which is a cryptographic-based solution for CSP security?
A) Bump in the wire
B) Watermarking sensor data
C) Homomorphic encryption
D) All the options
C
Which attacks can exploit the control system instability design weaknesses?
A) Fuzzing
B) Sensor insertion
C) Zero dynamic
D) All
D