SlideShare a Scribd company logo
Your Interactive Guide
to the Digital World
Discovering
Computers 2012
What Is Input?
• Input is any data and instructions entered into the
memory of a computer
Discovering Computers 2012: Chapter 5
2Pages 258 – 259
Figure 5-1
What Is Input?
Discovering Computers 2012: Chapter 5
3Pages 258 - 259
• Instructions can be entered into the computer in the
form of programs, commands, and user responses
A program is a series of related
instructions that tells a computer what
tasks to perform and how to perform
them
Programs respond to commands that a
user issues
A user response is an instruction a user
issues by replying to a question
displayed by a program
What Are Input Devices
An input device
is any hardware
component that
allows users to
enter data and
instructions into
a computer
Discovering Computers 2012: Chapter 5
4Page 260
The Keyboard
• A keyboard is an input device that contains keys
users press to enter data and instructions into a
computer
Discovering Computers 2012: Chapter 5
5Page 260
Figure 5-2
Mouse
• A mouse is a pointing device that fits under the
palm of your hand comfortably
– Most widely used pointing device on desktop
computers
• A mouse can be wired or wireless
Discovering Computers 2012: Chapter 5
6Pages 263 – 264
Figures 5-6 and 5-7
Mouse
• Mouse operations
Discovering Computers 2012: Chapter 5
7Page 264
Figure 5-8
Point Click Right-click Double-click
Triple-click Drag Right-drag
Rotate
wheel
Free-spin
wheel
Press wheel Tilt wheel
Press thumb
button
Touch Screens and Touch-Sensitive Pads
• A touch screen is a touch-sensitive display device
Discovering Computers 2012: Chapter 5
8Page 266
Figures 5-12 – 5-13
Touch Screens and Touch-Sensitive Pads
Microsoft Surface Touch-sensitive pads
Discovering Computers 2012: Chapter 5
9Page 267
Figures 5-14 – 5-15
Pen Input
• With pen input, you touch a stylus or digital pen on a flat
surface to write, draw, or make selections
Discovering Computers 2012: Chapter 5
10Page 268
Figure 5-16

More Related Content

Similar to Input OR Input devices

introduction to computer by shellay cashman .ppt
introduction to computer by shellay cashman .pptintroduction to computer by shellay cashman .ppt
introduction to computer by shellay cashman .ppt
SohaibAlviWebster
 
Input lectr# 4
Input lectr# 4Input lectr# 4
Input lectr# 4
Yo yo Nody khan
 
ICT Chapter 5 .pptx
ICT Chapter 5 .pptxICT Chapter 5 .pptx
ICT Chapter 5 .pptx
RajjaRashad1
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
Abdur Rahman
 
input and devices
input and devicesinput and devices
input and devices
knowledge1995
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 input
Muhammad Faisal
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 input
haider ali
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05
Anna Stirling
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
Sukanya Ben
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
haider ali
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application software
haider ali
 
ICT Chapter 3.pptx
ICT Chapter 3.pptxICT Chapter 3.pptx
ICT Chapter 3.pptx
RajjaRashad1
 
ICT Chapter 1.pptx
ICT Chapter 1.pptxICT Chapter 1.pptx
ICT Chapter 1.pptx
RajjaRashad1
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
Abdur Rahman
 
Lesson II: Computer Basic
Lesson II: Computer BasicLesson II: Computer Basic
Lesson II: Computer Basic
Abdul Bature
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
Fancy Fiction
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
PercyJackson245
 
m,ia
m,iam,ia
m,ia
rockikay
 

Similar to Input OR Input devices (20)

introduction to computer by shellay cashman .ppt
introduction to computer by shellay cashman .pptintroduction to computer by shellay cashman .ppt
introduction to computer by shellay cashman .ppt
 
Input lectr# 4
Input lectr# 4Input lectr# 4
Input lectr# 4
 
ICT Chapter 5 .pptx
ICT Chapter 5 .pptxICT Chapter 5 .pptx
ICT Chapter 5 .pptx
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
input and devices
input and devicesinput and devices
input and devices
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 input
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 input
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application software
 
Topic 3 input
Topic 3   inputTopic 3   input
Topic 3 input
 
ICT Chapter 3.pptx
ICT Chapter 3.pptxICT Chapter 3.pptx
ICT Chapter 3.pptx
 
ICT Chapter 1.pptx
ICT Chapter 1.pptxICT Chapter 1.pptx
ICT Chapter 1.pptx
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
Lesson II: Computer Basic
Lesson II: Computer BasicLesson II: Computer Basic
Lesson II: Computer Basic
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
m,ia
m,iam,ia
m,ia
 
Chapter 01.pdf
Chapter 01.pdfChapter 01.pdf
Chapter 01.pdf
 

More from vicky vicky

Electric potential energy in a uniform field
Electric potential energy in a uniform fieldElectric potential energy in a uniform field
Electric potential energy in a uniform field
vicky vicky
 
Chap 04 solutions_ex_4.4_calculus
Chap 04 solutions_ex_4.4_calculusChap 04 solutions_ex_4.4_calculus
Chap 04 solutions_ex_4.4_calculus
vicky vicky
 
Chap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.3_calculusChap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.3_calculus
vicky vicky
 
Chap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.3_calculusChap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.3_calculus
vicky vicky
 
Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.2Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.2
vicky vicky
 
Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.2Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.2
vicky vicky
 
Chap 04 solutions_ex_4.1
Chap 04 solutions_ex_4.1Chap 04 solutions_ex_4.1
Chap 04 solutions_ex_4.1
vicky vicky
 
Operating systems
Operating systemsOperating systems
Operating systems
vicky vicky
 
Network
NetworkNetwork
Network
vicky vicky
 
Database
DatabaseDatabase
Database
vicky vicky
 
Output OR Output devices
Output OR Output devicesOutput OR Output devices
Output OR Output devices
vicky vicky
 
Transformers basic electrical engineering
Transformers basic electrical engineeringTransformers basic electrical engineering
Transformers basic electrical engineering
vicky vicky
 
Biot and savarat law
Biot and savarat law Biot and savarat law
Biot and savarat law
vicky vicky
 
Magnetic fields
Magnetic fieldsMagnetic fields
Magnetic fields
vicky vicky
 
Motors
MotorsMotors
Motors
vicky vicky
 
Filtration
FiltrationFiltration
Filtration
vicky vicky
 
Crystallization
Crystallization Crystallization
Crystallization
vicky vicky
 
Mixing
 Mixing Mixing
Mixing
vicky vicky
 
Separation, screening
Separation, screening Separation, screening
Separation, screening
vicky vicky
 
Nuclear fission
Nuclear fissionNuclear fission
Nuclear fission
vicky vicky
 

More from vicky vicky (20)

Electric potential energy in a uniform field
Electric potential energy in a uniform fieldElectric potential energy in a uniform field
Electric potential energy in a uniform field
 
Chap 04 solutions_ex_4.4_calculus
Chap 04 solutions_ex_4.4_calculusChap 04 solutions_ex_4.4_calculus
Chap 04 solutions_ex_4.4_calculus
 
Chap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.3_calculusChap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.3_calculus
 
Chap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.3_calculusChap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.3_calculus
 
Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.2Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.2
 
Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.2Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.2
 
Chap 04 solutions_ex_4.1
Chap 04 solutions_ex_4.1Chap 04 solutions_ex_4.1
Chap 04 solutions_ex_4.1
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Network
NetworkNetwork
Network
 
Database
DatabaseDatabase
Database
 
Output OR Output devices
Output OR Output devicesOutput OR Output devices
Output OR Output devices
 
Transformers basic electrical engineering
Transformers basic electrical engineeringTransformers basic electrical engineering
Transformers basic electrical engineering
 
Biot and savarat law
Biot and savarat law Biot and savarat law
Biot and savarat law
 
Magnetic fields
Magnetic fieldsMagnetic fields
Magnetic fields
 
Motors
MotorsMotors
Motors
 
Filtration
FiltrationFiltration
Filtration
 
Crystallization
Crystallization Crystallization
Crystallization
 
Mixing
 Mixing Mixing
Mixing
 
Separation, screening
Separation, screening Separation, screening
Separation, screening
 
Nuclear fission
Nuclear fissionNuclear fission
Nuclear fission
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Input OR Input devices

  • 1. Your Interactive Guide to the Digital World Discovering Computers 2012
  • 2. What Is Input? • Input is any data and instructions entered into the memory of a computer Discovering Computers 2012: Chapter 5 2Pages 258 – 259 Figure 5-1
  • 3. What Is Input? Discovering Computers 2012: Chapter 5 3Pages 258 - 259 • Instructions can be entered into the computer in the form of programs, commands, and user responses A program is a series of related instructions that tells a computer what tasks to perform and how to perform them Programs respond to commands that a user issues A user response is an instruction a user issues by replying to a question displayed by a program
  • 4. What Are Input Devices An input device is any hardware component that allows users to enter data and instructions into a computer Discovering Computers 2012: Chapter 5 4Page 260
  • 5. The Keyboard • A keyboard is an input device that contains keys users press to enter data and instructions into a computer Discovering Computers 2012: Chapter 5 5Page 260 Figure 5-2
  • 6. Mouse • A mouse is a pointing device that fits under the palm of your hand comfortably – Most widely used pointing device on desktop computers • A mouse can be wired or wireless Discovering Computers 2012: Chapter 5 6Pages 263 – 264 Figures 5-6 and 5-7
  • 7. Mouse • Mouse operations Discovering Computers 2012: Chapter 5 7Page 264 Figure 5-8 Point Click Right-click Double-click Triple-click Drag Right-drag Rotate wheel Free-spin wheel Press wheel Tilt wheel Press thumb button
  • 8. Touch Screens and Touch-Sensitive Pads • A touch screen is a touch-sensitive display device Discovering Computers 2012: Chapter 5 8Page 266 Figures 5-12 – 5-13
  • 9. Touch Screens and Touch-Sensitive Pads Microsoft Surface Touch-sensitive pads Discovering Computers 2012: Chapter 5 9Page 267 Figures 5-14 – 5-15
  • 10. Pen Input • With pen input, you touch a stylus or digital pen on a flat surface to write, draw, or make selections Discovering Computers 2012: Chapter 5 10Page 268 Figure 5-16