Solved

Relais IO-print for the p.c.

Posted on 1998-06-29
1
202 Views
Last Modified: 2010-04-27
Help me please...

I want to make an relais-print for my p.c. to switch on/off some 220 Volt -devices.
Where can I find the information I need to make such a self-made computer-board?
Are there any companys who sell these things?

Thanx.
Stefan.
0
Comment
Question by:roosiedb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 2

Accepted Solution

by:
richrussell earned 20 total points
ID: 1136673
Check out electronics catalogues for kits and cards that do this.

In the UK, there is such a device in the RS catalogue (www.rswww.co.uk), and also in Maplin (www.maplin.co.uk), CPC (www.cpc.co.uk) and Farnell (www.farnell.co.uk).

Check out local electronics shops (Tandy etc.) they can be helpful (sometimes!)


0

Featured Post

How Blockchain Is Impacting Every Industry

Blockchain expert Alex Tapscott talks to Acronis VP Frank Jablonski about this revolutionary technology and how it's making inroads into other industries and facets of everyday life.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question