This chapter discusses common computer input devices like the keyboard and mouse. It describes the standard QWERTY keyboard layout and the purpose of different types of keys. Mice can be mechanical or optical, and variants include trackballs and touchpads. Proper ergonomics are important to prevent repetitive strain injuries when using input devices extensively. The keyboard and mouse allow users to interact with computers by entering text, numbers, commands and selecting options.
Computer hardware are the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphic card, sound card and motherboard.
Computer hardware are the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphic card, sound card and motherboard.
Hardware devices
Parts of computer
Computer parts presentation
Keyboard mouse printer scanner joystick ppt
Computer ppt
Software devices ppt
Scanner
Plotter
Types of printer
Types of mouse
Types of scanner
Types of plotter
Difference between software and hardware devices
Function of keyboard keys
Function of joystick
Function of stylus
Monitor
Function of monitor
Difference between impact and non impact printer
Features of monitor
Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), random access memory (RAM), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.[1][2]
By contrast, software is the set of instructions that can be stored and run by hardware. Hardware is so-termed because it is hard or rigid with respect to changes, whereas software is soft because it is easy to change.
Hardware is typically directed by the software to execute any command or instruction. A combination of hardware and software forms a usable computing system, although other systems exist with only hardware.
Von Neumann architecture
Main articles: Von Neumann architecture and Stored-program computer
Von Neumann architecture scheme
The template for all modern computers is the Von Neumann architecture, detailed in a 1945 paper by Hungarian mathematician John von Neumann. This describes a design architecture for an electronic digital computer with subdivisions of a processing unit consisting of an arithmetic logic unit and processor registers, a control unit containing an instruction register and program counter, a memory to store both data and instructions, external mass storage, and input and output mechanisms.[3] The meaning of the term has evolved to mean a stored-program computer in which an instruction fetch and a data operation cannot occur at the same time because they share a common bus. This is referred to as the Von Neumann bottleneck and often limits the performance of the system.[4]
Personal computer
Basic hardware components of a personal computer, including a monitor, a motherboard, a CPU, a RAM, two expansion cards, a power supply, an optical disc drive, a hard disk drive, a keyboard and a mouse
Inside a custom-built computer: power supply at the bottom has its own cooling fan
The personal computer is one of the most common types of computer due to its versatility and relatively low price. Desktop personal computers have a monitor, a keyboard, a mouse, and a computer case. The computer case holds the motherboard, fixed or removable disk drives for data storage, the power supply, and may contain other peripheral devices such as modems or network interfaces. Some models of desktop computers integrated the monitor and keyboard into the same case as the processor and power supply. Separating the elements allows the user to arrange the components in a pleasing, comfortable array, at the cost of managing power and data cables between them.
Laptops are designed for portability but operate similarly to desktop PCs.[5] They may use lower-power or reduced size components, with lower performance than a similarly priced desktop computer.[6] Laptops contain the keyboard, display, and processor in one case. The monitor in the folding upper cover of the case can be closed for transportation, to protect the screen and keyboard. Instead of a mouse, laptops may have a touchpad or pointing
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
4. Overview
• If CPU is a computer’s brain
• Then input devices are its sensory
organs—the eyes, ears, and fingers.
• you interact directly with input devices
and only indirectly with the CPU.
• The most commonly used input devices
are the keyboard and the mouse.
3A-4
5. The Keyboard
3A-5
• The primary input device for entering
text and numbers
• Standard keyboard includes about 100
keys
• Each key sends a different signal to the
CPU
• Must be proficient with keyboard
• Skill of typing is called keyboarding
• It is the ability to enter text and numbers
with skill and accuracy
7. The Standard Keyboard Layout
• The IBM Keyboard. It has about 100
keys arranged in five groups
• (The term IBM-compatible computer
refers to any PC based on the first
personal computers, which were made
by IBM. Today, an IBM compatible PC is
any PC other than a Macintosh
computer.)
3A-7
8. The Alphanumeric Keys
• The alphanumeric keys: The area of the
keyboard that looks like a typewriter
• Keys are arranged the same way on
almost every keyboard.
• Sometimes this common arrangement is
called the QWERTY (pronounced
KWER-tee) layout because the first six
keys on the top row of letters are Q, W,
E, R, T, and Y.
3A-8
9. The Alphanumeric Keys
keys having specific functions
– The Tab key moves you to predefined tab stops in
many application programs (such as word
processors).
– The backspace key erases characters you have
just typed
– Caps lock key lets you "lock* the alphabet keys so
they produce only capital letters.
– The Enter key lets you finalize data entry
• used to choose commands and options in many
programs
3A-9
10. The Modifier Keys
• The SHIFT, ALT (Alternate), and CTRL
(Control) keys are called modifier keys
• They modify the input of other keys
• Holding down a modifier key while pressing
another key, changes the second key's input
in some way
• For example, if you press the ―j‖ key, you
input a small letter j.
• But if you hold down the shift key while
pressing the J key, you input a capital J.
3A-10
11. The Numeric Keypad
• Located on the right side of the
keyboard
• Looks like a calculator's keypad, with its
10 digits and mathematical operators (+,
-, *, and /)
• The NUM LOCK key, forces the numeric
keys to input numbers
• When NUM LOCK is deactivated, the
numeric keypad's keys perform cursor
movement control and other functions
3A-11
12. The Function Keys
• Labeled F1, F2, F3 and so on
• Arranged in a row along the top of the
keyboard.
• Allow to input commands without typing long
strings of characters
• Navigating dialog boxes
• Each function key's purpose depends on the
program being used
3A-12
13. The Function Keys
• In most programs, F1 is the help key
• F2 key renames selected files and
folders
• F3 will change the text from uppercase
to lowercase . Vice versa
• Most IBM-compatible keyboards have
12 function keys.
• Along with modifier keys give the
function keys more capabilities.
3A-13
14. The Cursor-Movement Keys
• A set of cursor-movement keys
• Let you move around the screen without
using a mouse
• a mark called cursor on the screen
indicates where the characters you type
will be entered.
• the cursor or insertion point, appears on
the screen as a blinking vertical line
3A-14
15. Special-Purpose Keys
• Start key,
– features the Windows logo (and is
sometimes called the Windows logo key),
– opens the Windows Start menu.
– same as clicking the Start button on the
Windows taskbar.
• shortcut key,
– features an image of a menu
– opens an on-screen shortcut menu in
application programs.
3A-15
16. Special-Purpose Keys
page up and page down keys
• let you ―flip― through a document, screen
by screen
• like turning the pages of a book.
• page up jumps to the previous screen
• press page down jumps to the next.
3A-16
17. Special-Purpose Keys
• HOME is pressed to move the cursor to
the beginning of a line.
• END to move to the end of a line.
• The Esc or ESCAPE key is used to
―back up" one level in a multilevel
environment.
• The Print Screen key allows the user to
capture whatever is shown on the
screen as an image
– This key does not work with all programs
3A-17
18. Special-Purpose Keys
• Scroll lock causes the cursor to remain
stationary on the screen, and the
document's contents move around It.
– This key doesn't function at all in some
programs.
• Delete removes one character at a time
at the cursor's location
– It erases characters to the right of the
cursor.
3A-18
19. Special-Purpose Keys
• The Insert key switches some programs
from Insert mode" (in which text is
inserted into the document at the cursor)
to ―overtype mode (in which new text is
typed over existing text), and vice versa.
3A-19
20. Multimedia Keys
• Feature buttons that can perform any number
of tasks
– Use the buttons to launch a Web browser,
– check e-mail,
– start your most frequently used programs.
– Control the computer’s CD-ROM or DVD
drive
– adjust the speaker volume.
3A-20
22. How the Computer Accepts Input
from the Keyboard
Input from the keyboard is complex
When you press a key, a tiny chip called the
―keyboard controller‖ notes that a key has
been pressed.
It places a code into part of its memory called
the ―keyboard buffer‖, to indicate which key
was pressed.
(A buffer is a temporary storage area that holds
data until it can be processed.)
3A-22
keyboard controller then sends a signal to the
computer's system software, notifying it that
something has happened at the keyboard
23. system software receives the signal
it determines the appropriate response.
When a keystroke has occurred the
system reads the memory location in the
keyboard buffer that contains the code
of the key that was pressed
The system software then passes that
code to the CPU.
3A-23
24. The keyboard buffer can store many
keystrokes at one time.
This capability is necessary because
some time elapses between the
pressing of a key and the computer’s
reading of that key from the keyboard
buffer.
With the keystrokes stored in a buffer,
the program can react to them when it is
convenient
3A-24
25. This all happens very quickly.
Unless the computer is very busy
handling multiple tasks,
you notice no delay between pressing
keys and seeing the letters on screen.
3A-25
27. The Mouse
• All modern computers have a mouse
today
• Allows users to select objects
– Pointer moved by the mouse
1). Mechanical mouse
– a small rubber ball that protrudes through a
hole in the bottom of the mouse's case
– The ball rolls inside the case when you
move the mouse around on a flat surface
3A-27
28. The Mouse
– Inside the mouse, rollers and sensors
send signals to the computer
– telling it the distance, direction, and
speed of the ball's motions
– Rubber ball determines direction and
speed
– The ball often requires cleaning
3A-28
31. The Mouse
2). Optical mouse
– Light shown onto mouse pad
– Emits a beam of light from its underside
– Uses the light's reflection to judge the
distance, direction, and speed of its travel
– Reflection determines speed and direction
– Requires little maintenance
3A-31
33. The Mouse
• Interacting with a mouse:
– use a mouse to move the pointer to a
location on the screen,
– ―a process called pointing(pushing the
mouse across your desk)‖
– In multi-button mice, one button must be
designated as the ―primary‖ button, referred
to as the mouse button.
3A-33
34. The Mouse
Actions involve :
– pointing to an object
– Clicking selects the object
– Clicking and holding drags the object
– Releasing an object is a drop
– Right clicking activates the shortcut menu
– Modern mice include a scroll wheel
3A-34
35. The Mouse
• Benefits
– Pointer positioning is fast
– Menu interaction is easy
– Users can draw electronically
• Mouse button configuration
– Configured for a right-handed user
–It Can be reconfigured
– Mostly they have between 1 and 6 buttons
– Extra buttons are configurable
3A-35
36. Variants of the Mouse
• The primary goals or these ―mouse
variant’s are to provide ease of use
while taking up less space than a mouse
• Trackballs
– Upside down mouse
– Hand rests on the ball
– User moves the ball with
index finger
– Uses little desk space
3A-36
37. Variants of the Mouse
•
3A-37
Track pads/ Touchpads
– Stationary pointing
device
– Small plastic rectangle
– Finger moves across
the pad
– Pointer moves with the
pointer
– Popular on laptops
38. Variants of the Mouse
• Track pointer/
Pointing Stick
– Little joystick on the
keyboard
– a pressure-sensitive
pointing device
– shaped like a pencil
eraser
– Move pointer by
moving the joystick
3A-38
39. – Typically between the G and H keys
– The pointer on the screen moves in
the direction you push the pointing
stick.
– By pressing buttons below the
keyboard users can click and perform
other mouse-type operations with a
pointing stick
3A-39
41. Ergonomics and Input Devices
• Ergonomics
– A tool or a workplace is designed to work
properly with the human body, and thus
reduces the risk of strain and injuries OR
– Study of human and tool interaction
– Its Concerned with physical interaction
– That attempts to improve safety and
comfort.
3A-41
42. Ergonomics and Input Devices
• Repetitive Strain Injury (RSI)
– They are Caused by continuous misuse of
the body
– Many professions suffer from RSI
Carpal Tunnel Syndrome
– Carpal tunnel is a passage in the wrist
which holds nerves and tendons
– Prolonged keyboarding swells tendons
which is called carpel tunnel syndrome.
3A-42
44. Ergonomics and Input Devices
• Office hardware suggestions
– Office chairs should have
• Adjustable height
• Adjustable Armrests
• Lower back support
– Desks should have
• Have a keyboard tray
• Keep hands at keyboard height
• Place the monitor at eye level
3A-44
45. Ergonomics and Input Devices
• Techniques to avoid RSI
– Sit up straight
– Have a padded wrist support
– Keep your arms & wrists straight
– Keyboard properly
– Take frequent breaks
– Learn to type( don’t ―hunt & peck‖)
3A-45