CSCI 120 Introduction to Computation Ports and I / O devices ( cont . ) ( draft

نویسنده

  • Saad Mneimneh
چکیده

This is the most basic input device. The keyboard contains keys users press to enter data into a computer. Desktop computer keyboards typically have from 101 to 105 keys. Keyboards for smaller computers, such as laptops, contain fewer keys. All computer keyboards have a typing area that includes the letters of the alphabet, numbers, punctuation marks, and other basic keys. The keys originally were arranged to reduce the frequency of key jams on old mechanical typewriters. The first six letters on the top alphabetic line spell QWERTY, thus giving the name QWERTY keyboard. A DVORAK keyboard, by contrast, places frequently typed letters in the middle of the typing area. Despite the logical design of a DVORAK keyboard, all keyboards today are QWERTY. Many keyboards also have a numeric keypad on the right side of the keyboard, two CTRL keys, two ALT keys, a set of arrow and additional keys between the typing area and the numerical keypad, and twelve function keys (enhanced keyboard). The command associated with a function key may vary, depending on the program with which we are interacting.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CSCI 120 Introduction to Computation Operating System (draft)

So far, we have studied computation from different perspectives, starting from its abstract nature and the design of algorithms all the way to the physical issues involving the electronic representation (bits) and the computer architecture required to carry out the computation. We identified essential components of such an architecture including the CPU, the control unit, the ALU, the registers...

متن کامل

CSCI 120 Introduction to Computation Introduction (draft)

ion/generalization: thinking at high level, e.g. ability to view two different systems as being the same representation: modeling the ideas and entities that are being dealt with, e.g. shapes as strings algorithm: finding ways and methods to ahieve what is needed (this is not always possible) program: representation or encoding of an algorithm, usually machine dependent, e.g. the same addition ...

متن کامل

Csci 493.65 Parallel Computing Chapter 3 Parallel Algorithm Design Chapter 3 Parallel Algorithm Design

A task consists of an executable unit (think of it as a program), together with its local memory and a collection of I/O ports. The local memory contains program code and private data, i.e., the data to which it has exclusive access. An access to this memory is called a local data access. The only way that a task can send copies of its local data to other tasks is through its output ports, and ...

متن کامل

CSCI 120 Introduction to Computation Computer Networks (draft)

Primitive forms of data networks have a long history. After all, it is all about communication. Early societies used smoke signal to communicate information. In the 19 century, telegraphy was used as means of communicating messages. Messages were manually encoded into strings of symbols and then manually transmitted and received. When necessary, the messages were manually relayed at intermediat...

متن کامل

CSCI 120 Introduction to Computation Bits... and pieces (draft)

You may recall from the previous lecture that the use of electro mechanical relays, and in subsequent years, diodes and transistor, made it possible to construct more advanced computers, e.g. ENIAC. This is accredited to the fact that these devices could function as on/off switches. On one hand, they create the ability to encode logic into the circuits of the computer. This means that the compu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008