Input and output devices, Basic Computer Science

Assignment Help:

Input and Output Devices : The most common input devices that you will see in your PC are the keyboard and the mouse.

The keyboard of the computer looks like the keyboard of a typewriter with a few additional keys. One of the most common uses of the computer is as a word processor - basically a sophisticated typewriter that is capable of storing and manipulating text. With a few key strokes the writer can add or delete words and move entire similar sequences or paragraphs from one place to another in the text. Entire books can be written, edited, and printed with the use of computer discs without the manuscript even being committed to paper.

The mouse is a pointing device which is used while working with a display based computer system. It points or selects some area of display on the screen of the monitor and can be moved to another area of the screen. There are several other input devices like scanners, optical pens, joy-sticks that you may see associated with computing systems depending on the kind of requirements.

The output devices of the computer present the results of its work to users. The most common output device is the monitor which looks like a TV screen and the printer.

The input and output devices are so closely related that they are referred to as input/output or 110. The most common I10 devices are floppy discs, compact discs, modem (Modulator-DEModulator) that connect to telephone lines. There are several other devices that can be connected to the computer.

These are called peripherals. I10 peripherals are XY plotters to print graphs, devices that recognise and produce sounds, optical scanners to see text.

770_Components of a Computing System.png

 Figure : Components of a Computing System.


Related Discussions:- Input and output devices

C, board coloring

board coloring

Security threats on internet, Security threats on internet:  The Inter...

Security threats on internet:  The Internet has many advantages; however, it also opens up security threat. In this section we just want to highlight some of the threats that

Data communication , (iv) Suppose that the TCP entity receives a 1.5 megaby...

(iv) Suppose that the TCP entity receives a 1.5 megabyte file from the application layer and that the IP layer is willing to carry blocks of maximum size 1500 bytes. Calculate the

Programs - programming language, Programs - programming language: Prog...

Programs - programming language: Programs to implement algorithms on the computer must be written in a language that the computer can understand. It is fruitful, therefore, to

Write a long note on the types of charts, Question 1 Write a long note on ...

Question 1 Write a long note on the security features of Windows XP Question 2 Write a long note on computer peripherals, briefly describing some of the devices Question

Computer architecture, Consider a CPU that implements two parallel fetch-ex...

Consider a CPU that implements two parallel fetch-execute pipelines for superscalar processing. Show the performance improvement over scalar pipeline processing and no-pipeline pro

Finite Automata, (S**)*=S*** is this set bigger than S*??

(S**)*=S*** is this set bigger than S*??

Languages, Languages The language is a program containing rules and...

Languages The language is a program containing rules and guidelines to help us in making programs. There are various languages like C, Basic, COBOL, PASCAL, FORTRAN etc. Th

Data structures, let me know if you can do this assignment and how long it ...

let me know if you can do this assignment and how long it takes

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd