Input device used in computer system, Computer Engineering

Input device used in computer system:

An input device is typically a mouse or keyboard, the input device is the conduit through which data and instructions enter a computer. A personal computer would be ineffective if you could not interact with it due to the machine could not receive instructions or deliver the results of its work. Input devices accept instructions and data from the user or from another computer system (such as a computer on the Internet). Output devices   return processed data to the user or to another computer system.

The most common input device is the keyboard, which accepts numbers, letters and commands from the user. Another essential type of input device is the mouse, which lets you select choice from on-screen menus. One uses a mouse by moving it across a flat surface and pressing its buttons. A range of other input devices work with personal computers, too: The touchpad and trackball are variations of the mouse and enable you to choose, draw or point on the  screen. The joystick is a rotating lever mounted on a stationary base that is fit for playing video games.

 

 

Posted Date: 10/13/2012 2:52:06 AM | Location : United States







Related Discussions:- Input device used in computer system, Assignment Help, Ask Question on Input device used in computer system, Get Answer, Expert's Help, Input device used in computer system Discussions

Write discussion on Input device used in computer system
Your posts are moderated
Related Questions

a. What are the activities included during the process of developing a formal specification of a sub-system interface? b. Explain the Pair Programming? What are the benefits of

Q. Task Information Displays in Search-based tools? Task Information Displays principally give visualization of different locations in parallel program where bottlenecks have o

Instruction Cycle The instruction cycle consists of a series of steps required for the execution of an Instruction in a program. A distinctive instruction in a program is compo

At time t when an infected machine scans and finds a vulnerable machine, the vulnerable one will be compromised and start to scan and infect others at time t+X, where X is a r.v. f

As an XML expert you are needed to model a system for an online furniture shop. After an interview with the shop manager you have the certain information: The detail of th

Question : a) Visual communication was first developed in pre-history. Write short notes on the following terms: i. Geoglyph ii. Petroglyphs b) Briefly describe the p

Q. Executing a parallel algorithm? Multiple processors need synchronization with one another when executing a parallel algorithm. So task which is running on processor X may ha

what are the different types of tablets?

is a technique of temporarily removing inactive programs from the memory of computer system? Swapping is a technique of temporarily eliminating inactive programs from the memor