The recycling vending machine requires lots of hardware components. The machine needs a programed system and a graphic display like a monitor to allow communication. A memory will allow access to data and information that were processed through the machine. The monitor can display graphics, texts, instructions and reports on how the individual recycler is doing. Another hardware that is built in the machine is a scanner. The machine needs a scanner in order to identify each material that enters the machine. This also requires databases to be installed into the scanner hardware to recognize individual bottles, cans, etc. Also, since this machine will have students swipe their IDs, an outer scanner that will recognize student’s SUID is needed. This will be another set of databases that the machine needs.
Just like a computer’s case, this machine’s case is very important too. The case determines the outer visual layer of the machine, and it can help expand the storage area for recycling. It also can be used for displaying the logo, or advertising the benefits from recycling or just make it look attractive so students can be interested in them. Another hardware that may be needed for these recycling machines is a printer. Most recycling machines have a little slip printer that has all the information of the session. This printing option can allow students to see how much they earned or have in their account. It will keep them updated and more organized.
But having printed materials lying around might lead to an identity theft. Especially because it involves student’s meal plan account and it’s their college identification number. So the printed paper will only show the first name and no written proof of any SUID or last names. All recycle vending machine sshould be programmed and connected to one mother computer. All sessions and data will be recorded in the main computer. If a session is not properly ended by mistake, then the machine will have a self-timed session ending program like in local ATMs. If by any chance, the machine breaks down the memory and data part of the machine should be properly destroyed and the machine in general should be kept as a well secured and protected device.