SlideShare a Scribd company logo
THE COMPUTER
KEYBOARD & MOUSE
BY JULY LOBAN
S.No Keys & Description
1
Typing Keys
These keys include the letter keys (A-Z) and digit keys (09) which generally give the same layout as
that of typewriters.
2
Numeric Keypad
It is used to enter the numeric data or cursor movement. Generally, it consists of a set of 17 keys
that are laid out in the same configuration used by most adding machines and calculators.
3
Function Keys
The twelve function keys are present on the keyboard which are arranged in a row at the top of the
keyboard. Each function key has a unique meaning and is used for some specific purpose.
4
Control keys
These keys provide cursor and screen control. It includes four directional arrow keys. Control keys
also include Home, End, Insert, Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt),
Escape(Esc).
5
Special Purpose Keys/Navigation keys
Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock, Num Lock, Space
bar, Tab, and Print Screen.
Key name How to use it
Shift Press Shift in combination with a letter to type an uppercase letter.
Press Shift in combination with another key to type the symbol shown
on the upper part of that key.
Caps Lock Press Caps Lock once to type all letters as uppercase. Press Caps Lock
again to turn this function off. Your keyboard might have a light
indicating whether Caps Lock is on.
Tab Press Tab to move the cursor several spaces forward. You can also
press Tab to move to the next text box on a form.
Enter Press Enter to move the cursor to the beginning of the next line. In a
dialog box, press Enter to select the highlighted button.
Spacebar Press the Spacebar to move the cursor one space forward.
Backspace Press Backspace to delete the character before the cursor, or the
selected text.
Tips for using your keyboard safely
Using your keyboard properly can help avoid soreness or injury to your wrists,
hands, and arms, particularly if you use your computer for long periods. Here are
a few tips to help improve keyboard use:
•Place your keyboard at elbow level. Your upper arms should be relaxed at your
sides.
•Center your keyboard in front of you. If your keyboard has a numeric keypad,
you can use the spacebar as the centering point.
•Type with your hands and wrists floating above the keyboard, so that you can
use your whole arm to reach for distant keys instead of stretching your fingers.
•Avoid resting your palms or wrists on any type of surface while typing. If your
keyboard has a palm rest, use it only during breaks from typing.
•While typing, use a light touch and keep your wrists straight.
•When you're not typing, relax your arms and hands.
•Take short breaks from computer use every 15 to 20 minutes.
The mouse is the
primary input
device used to
interact with objects
in Windows.
Simple
Action
Interaction Typical effect
1.Pointing Position the pointer to a specific object
without clicking any mouse buttons.
Target displays its hover state and any
dynamic affordances.
2.Hovering Position the pointer to a specific object
without clicking any mouse buttons and
without moving for at least a second.
Target displays its tooltip, infotip, or
equivalent.
3.Clicking Position the pointer to a specific, non-
selectable object and press and release a
mouse button without moving. Clicking takes
effect on the mouse button release to allow
users the opportunity to cancel the click by
moving the mouse off the target. Therefore,
mouse press only indicates the selected
target.
For single clicks with the primary
button, activate the object. For
double-clicks with the primary button,
activate the object and perform the
default command. For the secondary
button, display the object's context
menu.
4.Selecting Position the pointer to a
specific, selectable object and
press and release a mouse
button.
For single clicks with the primary button,
select the object. If the users drags the
mouse, select a contiguous range of
objects. For double-clicks with the
primary button, select the object and
perform the default command.
For text, the right primary button click
sets the insertion point, the second
selects word at the insertion point, and
the third click selects the sentence or
paragraph.
5.Pressing Position the pointer to a specific
object and press a mouse button
without releasing.
For auto-repeat functions (such as
pressing a scroll arrow to
continuously scroll), activate
repeatedly. Otherwise indicates the
start of a move, resize, split, or drag,
unless followed by a release without
moving.
6.Wheeling Move mouse wheel. Window scrolls vertically in direction
of mouse wheel movement.
Compound Mouse Interactions
Compound
Action
Interaction Typical effect Pointers
1.Moving If moving is a mode (entered by
giving a command), enter the mode,
position the pointer over a movable
object, press button and move
mouse, release mouse button. in this
case, the pointer changes shape to
indicate the mode.
otherwise, position the pointer over
a movable object's grabber, press
button and move mouse, release
mouse button. in this case, the
pointer doesn't need to change
shape.
object moves in
direction of
pointer
movement.
move
used to move a
window in any
direction.
pan
Used to move an
object within a
window in any
direction.
2. Resizing Position the pointer over
a resizable border or
resize handle, press a
mouse button and move
mouse, and then release
the mouse button.
object resizes in direction of
pointer movement.
vertical and horizontal resize
used to resize a single
dimension.
diagonal resize
used to resize two dimensions
simultaneously.
row and column resize
Used to resize a row or column
in a grid.
3. Splitting Position the pointer over
a splitter, press a mouse
button and move mouse,
and then release the
mouse button.
split pane border
moves in direction
of pointer
movement.
window splitters
Used to resize a split
pane vertically or
horizontally.
4.Dragging and
Dropping
Position the pointer over
a valid object for
dragging, press a mouse
button and move mouse
to a drop target, and
then release the mouse
button.
object is moved or
copied to the drop
target.
normal select
used over valid drag
targets. may also have
an info tip to indicate
specific effect.
unavailable
Used to indicate a
surface isn't a valid drop
target.

More Related Content

Similar to 9 THE COMPUTER KEYBOARD & MOUSE.pptx

89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons
Paul Gonzales
 
Unit-2 keyboarding skills PowerPoint Presentation.pptx
Unit-2 keyboarding skills PowerPoint Presentation.pptxUnit-2 keyboarding skills PowerPoint Presentation.pptx
Unit-2 keyboarding skills PowerPoint Presentation.pptx
rishankPassi
 
How to use keyboard stHow to Use Keyboard Step by Step - Urdu Guideep by step...
How to use keyboard stHow to Use Keyboard Step by Step - Urdu Guideep by step...How to use keyboard stHow to Use Keyboard Step by Step - Urdu Guideep by step...
How to use keyboard stHow to Use Keyboard Step by Step - Urdu Guideep by step...
Cutee Munda
 
Mouse - R.D.Sivakumar
Mouse - R.D.SivakumarMouse - R.D.Sivakumar
Mouse - R.D.Sivakumar
Sivakumar R D .
 
Pc Fundamentalspart 2 Word
Pc Fundamentalspart 2 WordPc Fundamentalspart 2 Word
Pc Fundamentalspart 2 Word
LUZ PINGOL
 
Living in the IT Era L3.pptx
Living in the IT Era L3.pptxLiving in the IT Era L3.pptx
Living in the IT Era L3.pptx
elmervirtudazo1
 
Interacting With Your Computer
Interacting With Your ComputerInteracting With Your Computer
Interacting With Your Computer
ZOOBIA fatima
 
keyboard notes.pptx
keyboard notes.pptxkeyboard notes.pptx
keyboard notes.pptx
mbombongafu
 
INPUT DEVICES
INPUT DEVICESINPUT DEVICES
INPUT DEVICES
Fatima552
 
Unit 2 IT CODE 402 class 9-converted.pdf
Unit 2  IT CODE 402 class 9-converted.pdfUnit 2  IT CODE 402 class 9-converted.pdf
Unit 2 IT CODE 402 class 9-converted.pdf
ssuser7d5789
 
05. input devices computer
05. input devices   computer05. input devices   computer
05. input devices computer
TimesRide
 
Parts of computer
Parts of computerParts of computer
Parts of computerMukul Kumar
 
grade seven presentation topic: computer Mousepptx
grade seven presentation topic: computer Mousepptxgrade seven presentation topic: computer Mousepptx
grade seven presentation topic: computer Mousepptx
virginiarueda4
 
Computer keyboard
Computer keyboardComputer keyboard
Computer keyboard
Arlene Callang
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
Kelvin Smart Chiumia
 
Using Computer Keyboard
Using Computer KeyboardUsing Computer Keyboard
Using Computer Keyboard
Globelle Dala-Pasamante
 

Similar to 9 THE COMPUTER KEYBOARD & MOUSE.pptx (20)

89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons89 identify the parts of a window desktop and common desktop icons
89 identify the parts of a window desktop and common desktop icons
 
Unit-2 keyboarding skills PowerPoint Presentation.pptx
Unit-2 keyboarding skills PowerPoint Presentation.pptxUnit-2 keyboarding skills PowerPoint Presentation.pptx
Unit-2 keyboarding skills PowerPoint Presentation.pptx
 
How to use keyboard stHow to Use Keyboard Step by Step - Urdu Guideep by step...
How to use keyboard stHow to Use Keyboard Step by Step - Urdu Guideep by step...How to use keyboard stHow to Use Keyboard Step by Step - Urdu Guideep by step...
How to use keyboard stHow to Use Keyboard Step by Step - Urdu Guideep by step...
 
Mouse - R.D.Sivakumar
Mouse - R.D.SivakumarMouse - R.D.Sivakumar
Mouse - R.D.Sivakumar
 
Pc Fundamentalspart 2 Word
Pc Fundamentalspart 2 WordPc Fundamentalspart 2 Word
Pc Fundamentalspart 2 Word
 
Living in the IT Era L3.pptx
Living in the IT Era L3.pptxLiving in the IT Era L3.pptx
Living in the IT Era L3.pptx
 
Interacting With Your Computer
Interacting With Your ComputerInteracting With Your Computer
Interacting With Your Computer
 
keyboard notes.pptx
keyboard notes.pptxkeyboard notes.pptx
keyboard notes.pptx
 
INPUT DEVICES
INPUT DEVICESINPUT DEVICES
INPUT DEVICES
 
Parts of computer, keyboarding, mouse
Parts of computer, keyboarding, mouseParts of computer, keyboarding, mouse
Parts of computer, keyboarding, mouse
 
Unit 2 IT CODE 402 class 9-converted.pdf
Unit 2  IT CODE 402 class 9-converted.pdfUnit 2  IT CODE 402 class 9-converted.pdf
Unit 2 IT CODE 402 class 9-converted.pdf
 
Keyboard
KeyboardKeyboard
Keyboard
 
05. input devices computer
05. input devices   computer05. input devices   computer
05. input devices computer
 
Parts of computer
Parts of computerParts of computer
Parts of computer
 
SMART Board Tutorial
SMART Board TutorialSMART Board Tutorial
SMART Board Tutorial
 
grade seven presentation topic: computer Mousepptx
grade seven presentation topic: computer Mousepptxgrade seven presentation topic: computer Mousepptx
grade seven presentation topic: computer Mousepptx
 
Computer keyboard
Computer keyboardComputer keyboard
Computer keyboard
 
Point&Click
Point&ClickPoint&Click
Point&Click
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Using Computer Keyboard
Using Computer KeyboardUsing Computer Keyboard
Using Computer Keyboard
 

More from julitolosbanos

2. HAZARDS & RISK.pptx
2. HAZARDS & RISK.pptx2. HAZARDS & RISK.pptx
2. HAZARDS & RISK.pptx
julitolosbanos
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx
julitolosbanos
 
1 What is a computer_hardware.pptx
1 What is a computer_hardware.pptx1 What is a computer_hardware.pptx
1 What is a computer_hardware.pptx
julitolosbanos
 
8 PROCESS FLOW CHART.pptx
8 PROCESS FLOW CHART.pptx8 PROCESS FLOW CHART.pptx
8 PROCESS FLOW CHART.pptx
julitolosbanos
 
1.2 Computer - Input Devices.pptx
1.2 Computer - Input Devices.pptx1.2 Computer - Input Devices.pptx
1.2 Computer - Input Devices.pptx
julitolosbanos
 
1 What is a computer_hardware.pptx
1 What is a computer_hardware.pptx1 What is a computer_hardware.pptx
1 What is a computer_hardware.pptx
julitolosbanos
 
2 NEED THEORIES - Copy for G7.pptx
2 NEED THEORIES - Copy for G7.pptx2 NEED THEORIES - Copy for G7.pptx
2 NEED THEORIES - Copy for G7.pptx
julitolosbanos
 
5 SELECTING MEASURING TOOLS.pptx
5 SELECTING MEASURING TOOLS.pptx5 SELECTING MEASURING TOOLS.pptx
5 SELECTING MEASURING TOOLS.pptx
julitolosbanos
 
10 netiquette rules.pptx
10 netiquette rules.pptx10 netiquette rules.pptx
10 netiquette rules.pptx
julitolosbanos
 
PERSONAL ENTREPRENEURIAL COMPETENCIES.pptx
PERSONAL ENTREPRENEURIAL COMPETENCIES.pptxPERSONAL ENTREPRENEURIAL COMPETENCIES.pptx
PERSONAL ENTREPRENEURIAL COMPETENCIES.pptx
julitolosbanos
 

More from julitolosbanos (10)

2. HAZARDS & RISK.pptx
2. HAZARDS & RISK.pptx2. HAZARDS & RISK.pptx
2. HAZARDS & RISK.pptx
 
6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx6 Computer-Memory-PPT.pptx
6 Computer-Memory-PPT.pptx
 
1 What is a computer_hardware.pptx
1 What is a computer_hardware.pptx1 What is a computer_hardware.pptx
1 What is a computer_hardware.pptx
 
8 PROCESS FLOW CHART.pptx
8 PROCESS FLOW CHART.pptx8 PROCESS FLOW CHART.pptx
8 PROCESS FLOW CHART.pptx
 
1.2 Computer - Input Devices.pptx
1.2 Computer - Input Devices.pptx1.2 Computer - Input Devices.pptx
1.2 Computer - Input Devices.pptx
 
1 What is a computer_hardware.pptx
1 What is a computer_hardware.pptx1 What is a computer_hardware.pptx
1 What is a computer_hardware.pptx
 
2 NEED THEORIES - Copy for G7.pptx
2 NEED THEORIES - Copy for G7.pptx2 NEED THEORIES - Copy for G7.pptx
2 NEED THEORIES - Copy for G7.pptx
 
5 SELECTING MEASURING TOOLS.pptx
5 SELECTING MEASURING TOOLS.pptx5 SELECTING MEASURING TOOLS.pptx
5 SELECTING MEASURING TOOLS.pptx
 
10 netiquette rules.pptx
10 netiquette rules.pptx10 netiquette rules.pptx
10 netiquette rules.pptx
 
PERSONAL ENTREPRENEURIAL COMPETENCIES.pptx
PERSONAL ENTREPRENEURIAL COMPETENCIES.pptxPERSONAL ENTREPRENEURIAL COMPETENCIES.pptx
PERSONAL ENTREPRENEURIAL COMPETENCIES.pptx
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

9 THE COMPUTER KEYBOARD & MOUSE.pptx

  • 1. THE COMPUTER KEYBOARD & MOUSE BY JULY LOBAN
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. S.No Keys & Description 1 Typing Keys These keys include the letter keys (A-Z) and digit keys (09) which generally give the same layout as that of typewriters. 2 Numeric Keypad It is used to enter the numeric data or cursor movement. Generally, it consists of a set of 17 keys that are laid out in the same configuration used by most adding machines and calculators. 3 Function Keys The twelve function keys are present on the keyboard which are arranged in a row at the top of the keyboard. Each function key has a unique meaning and is used for some specific purpose. 4 Control keys These keys provide cursor and screen control. It includes four directional arrow keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt), Escape(Esc). 5 Special Purpose Keys/Navigation keys Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen.
  • 7. Key name How to use it Shift Press Shift in combination with a letter to type an uppercase letter. Press Shift in combination with another key to type the symbol shown on the upper part of that key. Caps Lock Press Caps Lock once to type all letters as uppercase. Press Caps Lock again to turn this function off. Your keyboard might have a light indicating whether Caps Lock is on. Tab Press Tab to move the cursor several spaces forward. You can also press Tab to move to the next text box on a form. Enter Press Enter to move the cursor to the beginning of the next line. In a dialog box, press Enter to select the highlighted button. Spacebar Press the Spacebar to move the cursor one space forward. Backspace Press Backspace to delete the character before the cursor, or the selected text.
  • 8. Tips for using your keyboard safely Using your keyboard properly can help avoid soreness or injury to your wrists, hands, and arms, particularly if you use your computer for long periods. Here are a few tips to help improve keyboard use: •Place your keyboard at elbow level. Your upper arms should be relaxed at your sides. •Center your keyboard in front of you. If your keyboard has a numeric keypad, you can use the spacebar as the centering point. •Type with your hands and wrists floating above the keyboard, so that you can use your whole arm to reach for distant keys instead of stretching your fingers. •Avoid resting your palms or wrists on any type of surface while typing. If your keyboard has a palm rest, use it only during breaks from typing. •While typing, use a light touch and keep your wrists straight. •When you're not typing, relax your arms and hands. •Take short breaks from computer use every 15 to 20 minutes.
  • 9. The mouse is the primary input device used to interact with objects in Windows.
  • 10. Simple Action Interaction Typical effect 1.Pointing Position the pointer to a specific object without clicking any mouse buttons. Target displays its hover state and any dynamic affordances. 2.Hovering Position the pointer to a specific object without clicking any mouse buttons and without moving for at least a second. Target displays its tooltip, infotip, or equivalent. 3.Clicking Position the pointer to a specific, non- selectable object and press and release a mouse button without moving. Clicking takes effect on the mouse button release to allow users the opportunity to cancel the click by moving the mouse off the target. Therefore, mouse press only indicates the selected target. For single clicks with the primary button, activate the object. For double-clicks with the primary button, activate the object and perform the default command. For the secondary button, display the object's context menu.
  • 11. 4.Selecting Position the pointer to a specific, selectable object and press and release a mouse button. For single clicks with the primary button, select the object. If the users drags the mouse, select a contiguous range of objects. For double-clicks with the primary button, select the object and perform the default command. For text, the right primary button click sets the insertion point, the second selects word at the insertion point, and the third click selects the sentence or paragraph.
  • 12. 5.Pressing Position the pointer to a specific object and press a mouse button without releasing. For auto-repeat functions (such as pressing a scroll arrow to continuously scroll), activate repeatedly. Otherwise indicates the start of a move, resize, split, or drag, unless followed by a release without moving. 6.Wheeling Move mouse wheel. Window scrolls vertically in direction of mouse wheel movement.
  • 13. Compound Mouse Interactions Compound Action Interaction Typical effect Pointers 1.Moving If moving is a mode (entered by giving a command), enter the mode, position the pointer over a movable object, press button and move mouse, release mouse button. in this case, the pointer changes shape to indicate the mode. otherwise, position the pointer over a movable object's grabber, press button and move mouse, release mouse button. in this case, the pointer doesn't need to change shape. object moves in direction of pointer movement. move used to move a window in any direction. pan Used to move an object within a window in any direction.
  • 14. 2. Resizing Position the pointer over a resizable border or resize handle, press a mouse button and move mouse, and then release the mouse button. object resizes in direction of pointer movement. vertical and horizontal resize used to resize a single dimension. diagonal resize used to resize two dimensions simultaneously. row and column resize Used to resize a row or column in a grid.
  • 15. 3. Splitting Position the pointer over a splitter, press a mouse button and move mouse, and then release the mouse button. split pane border moves in direction of pointer movement. window splitters Used to resize a split pane vertically or horizontally. 4.Dragging and Dropping Position the pointer over a valid object for dragging, press a mouse button and move mouse to a drop target, and then release the mouse button. object is moved or copied to the drop target. normal select used over valid drag targets. may also have an info tip to indicate specific effect. unavailable Used to indicate a surface isn't a valid drop target.

Editor's Notes

  1. Alternatively referred to as the Sholes keyboard, the QWERTY keyboard was invented by Christopher Sholes, who was issued a patent for a typewriter on July 14, 1868. The QWERTY keyboard is named after the first five alphabetic letter keys on the top row keys and is the official computer keyboard standard (ISO 9995).