SlideShare a Scribd company logo
INPUT DEVICE
TEXT AUDIO VIDEO GRAPHIC DATA
TEXT GRAPHIC VIDEO AUDIO
compact prosumer dSLR
dSLR
 
 
 
 
 
Name  : Keyboard  Category  :  Input Device Used for  : Input Text
Name  :  Barcode Reader Category  :  Input Device Use for  :  Input Text
Name  :  Scanner Category  :  Input Device Used for  :  Input Text & Graphic
Name  :  Video Digital Camera Category  :  Input Device Used for  :  Input Video
Name  :  Web cam Category  :  Input Device Used for  :  Input Video
Name  :  CCTV Category  :  Input Device Used for  :  Video
 
TOUCH SCREEN
 
Name  : Graphic Tablet Category  : Input Device Pointing Device
POINTING DEVICE
Input device  is  any hardware  that we  use to enter data into computer memory. Input  is  any data  that we enter  into computer memory. INPUT INPUT DEVICE text, video, graphic, audio
Input device  is any type of hardware  component that conveys information to user Output  is  information process  by computer OUTPUT OUTPUT DEVICE text, video, graphic, audio
SEKOLAH  RAJA  PEREMPUAN  TAAYAH
OUTPUT DEVICE
PRINTER
OHP
MONITOR
PLOTTER
LCD PROJECTOR
CENTER LEFT SURROUND RIGHT SURROUND SUBWOOFER LEFT RIGHT SPEAKER

More Related Content

Viewers also liked

Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
vasanthimuniasamy
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
Gunjan Mathur
 
Programming
ProgrammingProgramming
Programming
Sean Chia
 
Satellite data network communication
Satellite data network communicationSatellite data network communication
Satellite data network communication
Bowla
 
Computer System Basics
Computer System BasicsComputer System Basics
Computer System Basics
pathumbee
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Online
 
Block diagram of computer 02
Block diagram of computer 02Block diagram of computer 02
Block diagram of computer 02ZTE Nepal
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
Zafar Ayub
 
Network communication devices
Network communication devicesNetwork communication devices
Network communication devices
774474
 
Networking
NetworkingNetworking
Networking
Sean Chia
 
Network topology by ananya shukla
Network topology by ananya shuklaNetwork topology by ananya shukla
Network topology by ananya shukla
ananya_shukla
 
Multimedia
MultimediaMultimedia
Multimedia
Sean Chia
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Norhisham Mohamad Nordin
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devicesHarman Grewal
 
Communication network .ppt
Communication network  .pptCommunication network  .ppt
Communication network .ppt
Nargis Ehsan
 
Network topology
Network topologyNetwork topology
Network topology
lekshmik
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Shripal Oswal
 
Computer networking
Computer networkingComputer networking
Computer networking
Chinmoy Jena
 

Viewers also liked (20)

Input device
Input deviceInput device
Input device
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
Programming
ProgrammingProgramming
Programming
 
Satellite data network communication
Satellite data network communicationSatellite data network communication
Satellite data network communication
 
Computer System Basics
Computer System BasicsComputer System Basics
Computer System Basics
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Block diagram of computer 02
Block diagram of computer 02Block diagram of computer 02
Block diagram of computer 02
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
Network communication devices
Network communication devicesNetwork communication devices
Network communication devices
 
Networking
NetworkingNetworking
Networking
 
Network topology by ananya shukla
Network topology by ananya shuklaNetwork topology by ananya shukla
Network topology by ananya shukla
 
Multimedia
MultimediaMultimedia
Multimedia
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
 
Communication network .ppt
Communication network  .pptCommunication network  .ppt
Communication network .ppt
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Computer networking
Computer networkingComputer networking
Computer networking
 

Similar to Input and Output

Input devices
Input devicesInput devices
Input devices
Nabeel Ahsen
 
Input and Output Devices
Input and Output DevicesInput and Output Devices
Input and Output Devices
Forrester High School
 
Slides input devices
Slides input devicesSlides input devices
Slides input devicesHusni Munirah
 
Raja umair arshed
Raja umair arshedRaja umair arshed
Raja umair arshed
Raja Umair Arshed
 
Raja umair arshed
Raja umair arshedRaja umair arshed
Raja umair arshed
Raja Umair Arshed
 
3 input, output and storage technologies
3  input, output and storage technologies3  input, output and storage technologies
3 input, output and storage technologies
Nymphea Saraf
 
Peripheral devices
Peripheral devices Peripheral devices
Peripheral devices
BeeducatorComputer
 
Input and Output Devices of Computers (Powerpoint Presentation)
Input and Output Devices of Computers (Powerpoint Presentation)Input and Output Devices of Computers (Powerpoint Presentation)
Input and Output Devices of Computers (Powerpoint Presentation)
Anjenette Columnas
 
Introduction to Computer Lesson 1
Introduction to Computer Lesson 1Introduction to Computer Lesson 1
Introduction to Computer Lesson 1
Von Ryan Sugatan
 
CSC1100 - Chapter03 - Input
CSC1100 - Chapter03 - InputCSC1100 - Chapter03 - Input
CSC1100 - Chapter03 - Input
Yhal Htet Aung
 
Input and output
Input and outputInput and output
Input and output
BobbySingh0954
 
Input output devices
Input output devicesInput output devices
Input output devices
chirag patil
 
Computer Software System.Ppt Cardoza
Computer Software System.Ppt CardozaComputer Software System.Ppt Cardoza
Computer Software System.Ppt Cardoza
Glexcie
 
EDP111
EDP111EDP111
EDP111
Glexcie
 
Hardware input - output kerja khursus
Hardware  input - output kerja khursusHardware  input - output kerja khursus
Hardware input - output kerja khursusSMK Hamid Khan Tapah
 
PST SC015 Chapter 2 Computer System (II) 2017/2018
PST SC015 Chapter 2 Computer System (II) 2017/2018PST SC015 Chapter 2 Computer System (II) 2017/2018
PST SC015 Chapter 2 Computer System (II) 2017/2018
Fizaril Amzari Omar
 
Input output devices
Input output devicesInput output devices
Input output devices
Saheli Aich
 

Similar to Input and Output (20)

Hardware
HardwareHardware
Hardware
 
Input devices
Input devicesInput devices
Input devices
 
Input and Output Devices
Input and Output DevicesInput and Output Devices
Input and Output Devices
 
Slides input devices
Slides input devicesSlides input devices
Slides input devices
 
Raja umair arshed
Raja umair arshedRaja umair arshed
Raja umair arshed
 
Raja umair arshed
Raja umair arshedRaja umair arshed
Raja umair arshed
 
3 input, output and storage technologies
3  input, output and storage technologies3  input, output and storage technologies
3 input, output and storage technologies
 
Peripheral devices
Peripheral devices Peripheral devices
Peripheral devices
 
Input and Output Devices of Computers (Powerpoint Presentation)
Input and Output Devices of Computers (Powerpoint Presentation)Input and Output Devices of Computers (Powerpoint Presentation)
Input and Output Devices of Computers (Powerpoint Presentation)
 
Introduction to Computer Lesson 1
Introduction to Computer Lesson 1Introduction to Computer Lesson 1
Introduction to Computer Lesson 1
 
Hardware
HardwareHardware
Hardware
 
CSC1100 - Chapter03 - Input
CSC1100 - Chapter03 - InputCSC1100 - Chapter03 - Input
CSC1100 - Chapter03 - Input
 
Input and output
Input and outputInput and output
Input and output
 
Input output devices
Input output devicesInput output devices
Input output devices
 
Computer Software System.Ppt Cardoza
Computer Software System.Ppt CardozaComputer Software System.Ppt Cardoza
Computer Software System.Ppt Cardoza
 
EDP111
EDP111EDP111
EDP111
 
Chapter 5 (cdm 101)
Chapter 5 (cdm 101)Chapter 5 (cdm 101)
Chapter 5 (cdm 101)
 
Hardware input - output kerja khursus
Hardware  input - output kerja khursusHardware  input - output kerja khursus
Hardware input - output kerja khursus
 
PST SC015 Chapter 2 Computer System (II) 2017/2018
PST SC015 Chapter 2 Computer System (II) 2017/2018PST SC015 Chapter 2 Computer System (II) 2017/2018
PST SC015 Chapter 2 Computer System (II) 2017/2018
 
Input output devices
Input output devicesInput output devices
Input output devices
 

More from Sean Chia

Atomy
AtomyAtomy
Atomy
Sean Chia
 
Teknik menjawab soalan ict spm 2015
Teknik menjawab soalan ict spm 2015Teknik menjawab soalan ict spm 2015
Teknik menjawab soalan ict spm 2015
Sean Chia
 
Network cabling
Network cablingNetwork cabling
Network cabling
Sean Chia
 
Generation of Computer
Generation of ComputerGeneration of Computer
Generation of Computer
Sean Chia
 
Authentication
AuthenticationAuthentication
Authentication
Sean Chia
 
System software
System softwareSystem software
System software
Sean Chia
 
Motherboard
MotherboardMotherboard
Motherboard
Sean Chia
 
Crimping and Testing
Crimping and TestingCrimping and Testing
Crimping and TestingSean Chia
 

More from Sean Chia (8)

Atomy
AtomyAtomy
Atomy
 
Teknik menjawab soalan ict spm 2015
Teknik menjawab soalan ict spm 2015Teknik menjawab soalan ict spm 2015
Teknik menjawab soalan ict spm 2015
 
Network cabling
Network cablingNetwork cabling
Network cabling
 
Generation of Computer
Generation of ComputerGeneration of Computer
Generation of Computer
 
Authentication
AuthenticationAuthentication
Authentication
 
System software
System softwareSystem software
System software
 
Motherboard
MotherboardMotherboard
Motherboard
 
Crimping and Testing
Crimping and TestingCrimping and Testing
Crimping and Testing
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Input and Output