Input, Out and Processing
Input, Out and Processing
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
Q)
Estimated Time:
2 hours
LESSON 2
VOCABULARY
audio input
biometrics
digita I camera
Ident ify and describe how input and output devices are connected
to the computer.
expansion slot
inkjet printer
FireWire
input
keyboard
DATA FILES
laser printer
modem
monitor
mouse
output
plug-and-play
pointing device
port
printer
scan ner
trackball
Universal Seri al Bus (USB)
Modl-27
Page 7 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-28
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MDdl -28
MODULE 1
Computing Fundamentals
~ VOCABULAR Y
input
However, it need, help. II/Pil i , wh.ich is data or instructions, must be entered into
When it comes to processing data, it is the computer that does all of the work.
key boa rd
the computer and then stored temporarily or permanently on a storage media device.
To tum the data into inform.ation. it must be processed. The central processing unit
(C PU). which you learned about in Lesson I. processes tbe data . After the data is
processed. it is ",Presented" to t he user thro ugh an output device.
deyices enable the computer to give you the results of the processed data. Some
devices perfonn both input and output functions, slich .as the fax machine and
fax modem. You use these devices to send (outpUI) ;:Ind receive (input) data over
communications media.
The type of input device you use is determined by the task you need to complete.
An input device can be as simple as the keyboard or as sophisticated as those used
for specialized applications such as voice or retinal recognition.
Keyboard
The keyboard is the mosl commonly used input device for entering IlLII1leric and
alphabetic data into a computer. Lf you are going to use the compuler etlicielltly, it is
impommt that yOlt learn to type. Most of the keyboards provided with desktop com
pll ters are enhanced. An enhanced keyboard has 12 function keys .along the lOp, two
All keys, two Clrl keys. and a set of directional/arrow keys between the typing area
and the numeric keY]Jad.
Some keyboards. sllch as the one shown in Hgure 2- 1, have multimedia hot
keys that enable you to access e-mail and the Internet, adjus;t speaker volume. and
have other features such as:l zoom slider. This device makes it easy to zoom in for a
closer look .at documents, spreadsheets, pictures, maps, and Web pages .
FIGURE 2- 1
Enhanced keyboard
Not all keyboards. however, are traditional. Some other popular types of
keyboards arc:
Page 8 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-29
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
Speciali:ed: This keyboard h::t.<; specia lizoo keys that represent items such as
those used in fas t-food rcslllu rWl l S.
Secllrity: Th is keyboard provides security fe."uurt'S such as a biometric fingerprint reader. nmgnctic stri pe, and s mart card readers (sec J' jg ure 2-2).
Modl -29
Biometric
fingerprint
reader
FIGURE 2-2
FIGURE 2-3
Foldable keyboard
ulser \lirlual keyboard : Packaged in a case smaller Ih~ a soda can. a hlscr beam
is used
10
ge ne rate a full- size laser keyboard. This keyboard eas ily connects to
any person .. ] computer, including Macintosh, BlackBerry or ocher smart pho ne,
and most ot her handhe ld devices (sec Fig ure 2-4).
FIGURE 2-4
Page 9 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-30
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MODULE 1
Modl-30
Computing Fundamentals
Pointing Devices
A p oilltillg device is an inp ut device th~ll allows you to position the pointer on the
screen. TIle pointer Gill have scveml shapes, but the most common is an arrow. You
use a pointing dc\"ice to move the pointer: select objects, such as text or graphics: and
VOCABULARY
pointing devi c~
mouse
click buttons. icons, menu items, and links. The following sections discuss several
pointing devices.
Mouse
The //IO llse is the most commonly used poiming device for personal computers. Jt
moves on a flat surface and controls the pointer on the screen. TIle mouse fits conveniently in the palm of your hand. Yo u can use any of the following fouT types of mice:
Mechanical: This type of mouse has a ball located on the bottom that rolls
around on a flat surface as the mouse is moved. Sensors inside the mouse dete rmine the direction and distance of the movement. A mouse pad genemlly is used
wi th a mechanical mo use.
OpTOlIlecJumica/: This mouse is the same as a mechanical mouse, but uses optical sensors to detect motion of the ball.
Optical: An optical mouse (see F igure 2-511) uses a laser to detect tbe mouse' s
move m ent. 0 p1iclll m ice h ave no mechani c al moving part~. T hey respon rl more
q uickly and precisely than mechanical and optomechanical mice.
Receiver
(al
(bl
FIGURE 2-5
Most miee have two or three buttons; some have a wheel. You use the left button
for most mouse opemtions. Genemlly, clicking the right button d isplays a shortcut
menu. After you pl.ace the on-screen pointer where you want it, press a button on the
mouse. This causes some type of action to take place in the computer: the type of
act ion depends on the program. Use the wheel to scroll or zoom a page.
You use the mouse to accomplish the followi ng techniques in most software
programs and Web pages:
Clicking: Pressi ng and relcasing the mOllse button to select a specific location
within a document
Draggil1g: Pressing down thc mouse button and moving the mouse whilc
continuing to hold down the button to highlight :I. selected portion of text
Page 10 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-31
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
Modl-31
Double-clicking: Pressing and releasing the mouse button two times in rapid
succession to select a word
Triple -clicking: Pressing and releasing the mouse button three times in rapid
succession to select a paragraph
Trackball
The IrackbaJ[ is a pointing device that works like a mouse turned upside down: the
ball is on top of the device. See Figure 2-6a. You usc your thumb and ringers \0
operate the ball, thus controlling the pointer on the screen. A trackbal l is a stationary
de ... ice and is a good altemative to the mouse whcn you nave limitcd desktop space.
Some trackballs arc built into the keyboard. See Figure 2-6b.
lal
FIGURE 2- 6
VOCABULARY
Inlckball
Ibl
(a) Trackball on a mouse (b) Trackball on a keyboard
Touchpad
A common feature on l.aptop computers is tbe touchpad. a pointing device wiib a
specialized surface that can conven the motion and position of your fingers to a
rel(Jtive position on screcn. Touchpads are a common femme of laptop computers
and can be fou nd on personal digital assistants (PDAs) and ponable media players.
Pointing Stick
Many notebook computers contain a pointing stick- a pressure-sensitive device that
looks like a penc il erascr. It is located on the keyboard. generally betwecn tne C. H.
and B keys. See Figure 2-7. It is moved with the forefinger, while the tnumb is used
to press related keys. In a confi ned space. a lot of people find 11 pointing stick more
convenient than a mousc. IBM popu larized tbis device by introducing the TrackPoi nl
on its 1l1inkPad notebooks.
Page 1 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-32
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
Modl -32
MODULE 1
Computing Fundamentals
FIGURE 2-7
Pointing stick
Audio Input
IJ VOCABULARY
A udio il/pllt is the process of inputting sound into the computer.TIlis could include
audiu input
speech, sound effects. and music. Audio in put devices include microphones. COl
output
DVD players. radios. and other hardware such as electronic kcytmards. Voice input is
a category of audio input. Voice-recognition devices are used to "speak" commands
monitor
into the computer and to ellier text. These devices usually are micropbones. The
computer must have some lype of voice-recognition software installed before you
can use a yo ice-recognition device. Directory assisHUlce is a type ofyoicc-rccognition
technology. as ar~ devices that dis:lbled persons use to command wheelchairs and
other objects that make them more mobile.
~
11.1 .5
Monitors
Desktop computers typi ca lly use a monitor as their dis play device. The screen is part
of the monitor, which also includes the housing for its electrical components. Screen
output is called soft copy because it is temporary.
Computer mOllitors come in many varieties. The cathode ray tube (CRT) was
one of the earliest types of mon itors. This type of monitor is similar to a standard
televisioll and can be either monochrome or color. A monochrome monitor screen has
a one-color display. which can be whjte. green, or amber. Most of today's monitors
are color monitors, which display thousands of colors. CRT monitors are available in
various sizes, with the more common being 17-, 19-, and 21 -inch. See }"igure 2-8<'1.
Some of the newest monitors are avai lable in sizes lip to 30 inches or more.
Flat-pallel monitors come in two varieties: liquid crystal display (LCD) and gas
plasma. Both types of monitors are more expensive than CRT monitors. They take
up less space. however, and are much lighter in weight.
LCD panels produce an image by manipulating light withi n a layer of liquid
crystal cells. See Figure 2-8b. Until recently, LCD p:mels were uscd p"imarily on
notebook computers and other mobi le devices such as cell phones and PDAs. 1n
1997, several manufacturers started producing full -size LCD panels as alternatives
to CRT monitors.
Page 2 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-33
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
Modl-33
la)
FIGURE 2-8
(b)
(e)
Printers
Pri"ter~ arc used to produce a paper or hard copy of the processing results. Printer
output is called hard copy because it is pemlanent. Several types ofprintcrs arc available. with significant differences in speed. print quality. price, and special feature.s
When selecting a printer, consider the following features:
Speed: Printer speed is measured in pages per minute (ppm). The number of
pages a printer can print per minute varies for text and for graphics. Graphics
print more slowly than regular text.
Prim qualiTY: Prillt quality is measured in dots per inch (dpi). The higher the dpi.
the higher the resolution or print qualit y.
Price: The price includes the original cost of the printer as well <IS what it
costs to maintain lhe printer. A good-quality printcr can be purchased very
inexpensiVely; however, a high-output system can cost thousands of dollars. The
ink cartridges and toners need to be replaced periodically. Printers are classified
as either impact or nonimpact. Impact printers usc a meehani~m that actually
strikes the paper to !"onn lettcrs and images. Dot matrix printers are impact
printers. Nonimpact printers form characters without striking the paper. The two
most popular types of printers. laser printers and inkjet printers, are examples of
nonimpact printcrs.
t VOCABULARY
printer
laser printer
Laser Printers
A la~er prillter produces images using the same technology as copier machines.
The image is made with a powdery .substance called toner. A laser printer produces
high-quality output. The cost of laser printers has come dO'Nn substantially ill recenl
years. Color laser printers, however. are still expensive. some costing thousands of
dollars. See Figure 2-9.
Page 3 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-34
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MODULE 1
MDdl-34
Computing Fundamentals
Output tray
1~
beam
__--::::::____TO""catridge
guide rollers
Manuill feed
picKup roller
SIMMs (RAM)
Fixi ng ,"1111''''; ~~
Input paper _ _
cassette
Printing process
manually. Manual
controlling of t he
printing process is do ne
from the computer by
the image on a
photosensitive drum.
T he developing cylinder
picks up a fine blacl:
powder ca lled toner,
which is attracted t o the
paper t o be used .
softwa re.
image
FIGURE 2-9
Inkjet Printers
VOCABULARY
illkjet printer
An illkjet primer provides good-quality color printing for less expense tllan a laser
printer. See Figure 2-10. Inkjet printing, like laser printing, is a nonimpact process.
Ink is squirted tiom nozzles as they pass over the media. Unlike earlier vcrsions of
the inkjel printer, newer versions c an use regular photocopy papcr.
Page 4 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-35
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
Modl -35
In put tray
Contro l panel
Carriage
Output tray
Printing process
Inkjet printers u se
single sheets of paper.
Since plain paper can
be too absorbent for
inkjets, manufacturers
recomme nd special ink
jet paper, w hich has a
~ arder surface.
FIGU RE 2-10
Speakers
Speakers are also a type of output device . Spe akers and headsets generate sound,
such as mmic or ins tructions on how to comple te a tuto rial. Indi viduals use headsets
o r earpho nes to hear the music o r othe r voice output privatel y.
Page 5 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-36
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MODULE 1
Modl -36
Computing Fundamentals
A variety of other input devices arc also available, most of which are used for
specialized applications. The following section describes these input devices.
Digital Cameras
VOCABULARY
The pictures taken with a digital call/era arc stored digitally and then transferred to
digital Cllme m
the computer's memory. Digital cameras usc a variety of storage media to store the
images, including flash memory cards, memory sticks, USB keys, m i lll~d i scs, and
other solid-state storage devices. After the pictures are transferred to the computer.
they can be viewed quickly and any imperfections can be edited with photo-editing
digital format.
software.
Video input is the process of capttlring full -Illotion images with a type of video
camera and then saving the video on a storage medium such as a hard drive, CD, or
OVD. After the video is saved, you can view .and edit it. A digital video (DV) camera
records video as digital signals: some cameras also capture still images, Some are
just a little klrger than 11 crcdjt card. See .' igure 2-11 . A PC video camera is 3typc of
digital video camera that allows the user to send live images over the internet. make
video telephone calls. and send e-mail messages with video attachments.
FIGURE 2- 11
Game Controllers
The joystick Rnd wheel are types of pointing devices. Joysticks and wheels, such as
the ones shown in Figure 2-12, most often Rre used for games. Th ejoy stick consists
of a plastic or metal rod mounted on a base. You can move thc rod in any direction.
Some joysticks have switches or buttons that c an input data in an onfoff respo nse.
A wheel is a steering-wheel type of device used to si mulate driving a vehicle. Most
wheels also include foot pedals used for braking and acceleration ~lctiom.
Page 6 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-37
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
I')
Modl -37
Ib)
FIGURE 2-12
III/age
scanller.~:
t VOCABULARY
scanner
Bar code scanllers: This type of sc~mner reads bar lines that are printed on prodlIcts (for example. in a grocery store or departmcnt store). Sec Fi gu re 2-1311.
Wireless SCl/Jlllers: A Bluetooth barcode scanner lIses Bluetooth wireless technology to SCllll data. such as from 11 hospital bracelet. and transmit it to 11 computer. Sce Figure 2-lJb.
I')
FIGURE 2-13
Ib)
(a) Optica l scanner (b) Bluetooth scanner
Page 7 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-38
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
Modl-J8
MODULE 1
Computing Fundamentals
or shapes. You li se your fingers to "point" to the desired object to make a selection.
You can find theie screens in many public pl.aces sllcn as airports, hotels, banks.
libmrics. delivery services, and fast - food restaurants. Many mobile devices have
touch screens.
Stylus
A stylus and digital pen are pen-like writing instruments. See F igure 2-1 5. These
II PDA or other mobiLe device
or to usc the pen as a pointer.
devices allow you to input information by writing on
Page 8 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-39
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
FIGURE 2- 15
Modl-39
Remote Controls
RemOTe conrrols. also a type of spec ialized inplll device, are used for numerous
standard applications, such as television, lights, fan s, and soon. Ind ustry and business
also use remote controls for various applications. For example, a construction worker
can use a remote comrol to control a crane. or a warehouse worker can have a remote
cOlltrol for a product cart.
Security Devices
Consider the following scenario: You are going on a two-weck vacation to Tahiti and
Bora Bora- you are packed and ready to go. but you do not need a wallet or credit
cards. You use your fingerprint as an input device to pay for all of your expe nses.
In infonTI:ltion technology. h iom etric .~ is an authcntic:ltion teChnique using
automated methods of recognizing a person based on a phys io logical or bebavioral
characteristic . Biometric devices consist of a reader or scanning device and software
that converts tbe scanned information into a digital format . The scanned information
then is compared to a database of stored bio metric data.
VOCABULARY
biomet ri cs
Page 9 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-40
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MDdl-40
MODULE 1
Computing Fundamentals
techniq ue.. are retina (analysis of the capillary vessels located at the bac k of the
eye), iris (analysis of the colored ring sunuunding the eye's pupil), hand geometry
(analysis of the s hape of thc hand and length of Ihe fingers). and vei n \a n.alysis of
pattern of veins 011 the back of the hand and the wrist}.
Enrollmem: The user enrolls in the system by establishing a baseline measurement for comparison.
Sllbmis.~ion: The user presents biological proof of his or her idclltity to tne
c apture systcm.
Verificatioll: Thc system compares tne submitted sample with the stored
sample.
Privacy and civil liberties advocates, however, are concerned about the
widespread adoption of biomctric systems. They argue that by using biometric data,
un authorized parties can access someone's dat~l witnout their conscllI and link it to
other information, resulting in secondal)' uses of the information. T nis erodes tne
users' personal control over their private infonnation. On the other hand, biometrics
can also be applied to private security. For ex.ample, several compani e~ now offer
biometric compute r keyboards and USB nash drives with finge rprint authentication
that can be used for personal applications. (Flash drives were discussed in Lesson I.)
Sec Figure 2-16.
(a)
FIGURE 2- 16
(b)
(a) Biometric keyboard scanner (b) Fingerprint scanner
Vi dual Devices
Similar to the la.s~r virtual keyboard mentioned earlier, virtual de vices usc the synchronized positiuning of light-emitting and sensing devices to detect user input.
Figure 2-l7a shows a virtual computer keyboard and Figure 2-17b shows a virtual
piano keyboard.
Page 10 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-41
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
(0)
Modl-41
(b)
FIGURE 2- 17
Touch-Sensitive Pads
llle louch -sensitive pad on a portable device, such as an iPod, enables you to scroll
through a list adjust the volume. play music. ,'iew videos or pit:1Ures. and customize
settings.
Some keyboards can be operated with one hand or with the feet.
A progrum called Camera Mouse enables users 10 use a Wcbcam and control the
mouse pointer by moving their heads.
Voice input devices allow visually impaired. blind. and physically challc ngcd
individuals to more easily interact with computers.
A compute r di spl ay screen is sensitive to hUlllan to UGh and allows the user to
intcmct with the computer by touching an active area or a targe!. or to control
d ata such as pictures or words on Ihe screen.
I ~c lip.~.
Pmjec/ors: A data projector projects the computer image onto a screen: this is
mostl y used for prcscnt.. tions.
Fax machilles {lillI/ax moJems : A fax machine and fax modem tmnsmit and
receive document s over a telephone line or through a computer.
COllI/vi devices/robots: The field of robotics is dclincd as the study, design. lUld
lISC of robot systems for m~mufacturin g. Some of the typical applic:.t!ions of robots
includc tcsti ng. product inspection, painting, assembly, packagi ng. and p<linting.
11.1.7
Page 1 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-42
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MODULE 1
MDdl -42
Computing Fundamentals
Specialized Printers
Impact printe rs, such as the dot matrix and line printer, have been around for a long
time. Dot matrix printers transfer ink to the paper by stri kin g a ribbon with pins. The
higher the number of pim. (dpi), the better the resolution or output. The mechanism
that act ually does the printing is called a printhcad. The speed of the dOl matrix
printer is measured in ehamelers per second (c ps). With the reduction in cost of
laser and ink jet printers, dot matrix printers are used less often toclay. A variation of
the dol matrix prin ter is the line printer. This type of high-speed printer is attached
primarily to large computers such as m ainfmmes or rnidnmgc servers.
Scycm] other types of specialty pri nters are available. Some examples are:
Ulbe! {wd poslllge: A label printer prints labels of various types and sizes on an
adhesive-type paper: a postage printer is a special type of label pri nter. This lype
of printer contains a built-in digit~11 scale and prints postage stamps.
Screen readers: A screen reader assists people who Me blind or otherwise visllally impaired. A speech synthesizer genera lly is used to read the screen content.
Some screen readers can also read sca nned documents.
Input and output devices must be connected to the comp uter. Some devices connect
to the computer through a physical co nnection. sllch as a port. For instance. you can
plug the cable for a physical device into an existing pon located on the back or front
of the computer. Some monitors also have ports. Wireless devices Cotlnt!ct through
infrared or radio waves.
Page 2 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-43
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
Modl-43
VOCABULARY
poet
modem
.-ireWire
FireWire port
USB potts
ports
FIGURE 2-18
Page 3 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-44
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MDdl -44
MODULE 1
Computing Fundamental s
In addition to the preceding ports. you mi ght find three additional specialpurpose ports on various computin g devices. These special-purpose po rls arc:
;:lIld
FIGURE 2- 19
VOCABULARY
e xpa nsion slul
Bluetooth device
Erpa ".~ioll slots are openings on the motherboard where :.111 expansion board .
also called an ad~pter card. elill be inserted. Expansion boards e nhance functions of
a component of the system unit lmd/or provide connections through a pon or other
connectors to peripheral devices. Exp.ansion boards are also called expansion cards,
add-ins. and add-ons. See Figu re 2-20.
Page 4 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-45
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
Modl-45
Expansion ---Il;"
card
Expansion
slots
FIGURE 2-20
Tr.tditio nally. rorts have been located on Ihe back of the system unie. With the
introduction of portable devices, such as digital camcr.lS and pocket pes, mnny
newer computers also indude pOrlS on the front of the sys tem unit. This provides fo r
easier :.ccess.
Hardware Installation
For most hardw:tre devices to work. they need a set of instruc tions Ihal communic,ltes with thc computer's operating system. This ~ ct of instructio ns is called u
driver. In many instances. the operating system includes drivers for the more popular
pe rip heral devices LInd performs tin automatic plug-and-play imnallutio n fOf newly
connected devices.
If thc opcrUling system docs not contain a driver for the hardware, the dri ver
needs 10 be inslalled manually. Usually, the software is included wilh the hurdwarc
device. If an installation di sk is nOi available, Ihe manuf(lourer"s Web site gcncmll y
prGvides a downloadable fil e.
1 1.1.9
Page 5 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-46
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MDdl -46
MODULE 1
Computing Fundamentals
parallel processing. With this type of processing. while one instruction is being
executed . the next instruction is fetched from memory and decoded. Th u s., thc
faster the processor, the more instructions per second it can process.
2.
R illlt/Oll! access memol)' (RAM ): The amount of RAM also helps to increase
the processing cycle and to enhance the computer's performance. When the
memory capacity is reached , the CP U stores data o n the hard drive. This slows
down the processi ng cycle because it takes longer for the CPU to read from a
3. Hard disk: The size and speed of the hard drive also affects a computer' s
performance. The bigger and faster the hard drive. the faster the data is
processed. In addition, how the disk is organized affects computer perfonn;mce.
If a hard disk contai ns many unneeded and outdated files , it takes longer for the
computer to find the information it needs.
4.
Video: The video device that is connected to the computer c a.n enhance or slow
down the comput er's perfannance. Having adequate video memory far the
video card allows the processor to petform 10 its full potential.
Step-by-Step 2_1
1. Click the Start button
Page 6 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-47
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
Modl-47
FIGURE 2- 22
----.,....._c ___ . __
--------- 1!lI - --
System window
System
window
--
<
---""'--. . . . .
<----
~-
~-~-
Change
" - setti ngs link
~-
--
---
3. What Microsoft Windows edit ion is listed for your computer? What processor does your computer contain? How much Memory (RAM) is in you r
FIGURE 2-23
Tabs
Wndow,
on the
u, e ~
nd"""'"
the I_
Coovi"'''
FUloo:rp.te rnarne:
O\OIUl
W'<MI<~ -..>:
WORKGR OUP
System Properties
dialog box
~ er
''''.9'.
OK button
Conce!
Page 7 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-48
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MDdl -48
MODULE 1
Computing Fundamentals
5 . Click each of the tabs in the dia l og box and read the information con-
ETHICS IN TECHNOLOGY
''''''
~ ~ ~
Computer Viruses
The word virus can put fear into anyone who uses the Internet or exchanges disks. How can such a small
.....ord cause such fear? It is because a virus can cause tremendous damage to your computer files!
A virus is a computer program that is written intentionally to attach itself to other programs or disk boot
sectors and dup licates itself whenever those programs are executed or the i nfected disks are accessed . A
virus can wipe out all of t he files on your computer.
Viruses can sit on your computer for weeks or months and not cause any damage unti l a predetermined
date or time code is activated . Not all viruses cause damage . Some are just pranks; maybe your mon itor will
display some sil ly message . Viruses are created by persons who are impressed with the power they possess
because of their expertise in the area of computers; sometimes they create them just for fun . To protect your
c:lmputer from virus damage, insta ll an antivirus software program on your computer and keep it running at
all times so that it can continuously scan for viruses.
SUMMARY
In this lesson, you Il'arnro:
Input devices enable you to inpul data and commands into the
computer. The most C0l111110n input devices arc the keyboard
and mouse.
Page 8 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-49
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
VOCABULARY REVIEW
Detin~
th e- following t('rms:
audio inplII
biometrics
d igital camcra
cxpansion slot
FireWirc
inkjct printer
input
keyboard
laser prinler
modcm
monitor
mouse
output
plug -and-play
Modl-49
pointing device
port
printer
scanner
trackball
Universal Scrial Bus (US B)
REVIEW QUESTIONS
TRUEI FALSE
Cirde T if the statement is true- or F irthe state-ment is false_
1.
Vidco input is thc proccss of capturing full -motion images with a vidco camcra.
2.
3.
A data projector is a type of specializcd output device that projects the computer image onto a screen.
u~ually
duri llg a
presentation.
4.
In put and output deviccs can stand alone-they do not nced to be connected to the computer.
5.
MULTIPLE CHOICE
Select the best response for the following statements.
I. Wh ich of the fol lowing is 110/ considered an input device?
C. mouse
B.
scanner
D. monitor
2. \hich onc of the follow ing is a type of scanner that con"erL~ graphics into an eleetronic form?
A.
image scanner
B.
magnetic scanner
D. OCR scanner
A.
B.
C.
D.
4.
A.
C. CRT monitors
B.
LCD panels
D. Scanners
fingerprint
C. V01ee
B.
face
Page 9 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-50
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
MODULE 1
Modi -50
Computing Fundamentals
i~
cor~ct
the most widely used device for entering data into the computer.
S. A(n) _ _ _ _ _ _ _ _ is a small. battery-powered printer. primarily used to print from a notebook computer.
PROJECTS
PROJECT 2- 1
PROJECT 2- 2
Gmai! is a frcc Web mail service provided through Goog lc. Complete
the following sleps to create an account.
to
TI1Cil
3. Type your first and las t name and desired 10Bin name. C lick the
2.
Ba~ed on your findings, creale a d(K; ument listing the pros and
cons of biometric tech nology. Include your personal opi n ion
about this topic.
stre ngth level- poor, fai r, and strong. Your goal is \0 create a
strong password. It must be a minimum of eight character.;..
Be sure to wri te down your password or send the password to
yourself in an e-mail.
PROJECT 2- 3
Preparc a wriltc n report on input devices.
I . Select at least fivc input dcviccs discussed in Ihis lesson.
2. Create a document for the report. Include a table i[1 your report
7. If you have anothe r e-mai! address. you can emer it illlo thc
Secondary c-mai! text box. However, this is nOl necessary or
required.
Page 10 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-51
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
LESSON 2
CRITICAL THINKING
You wan! to leam more about how the computer processes data
and the factors that innucncc the processing speed. Your ins tructor
thinks this is a great idea and asks you to prepare a report on what
Modl-51
ONLINE DISCOVERY
Google has a feature thai focuses solely on blog searching. This featurc. called Blog Search. is located at www.google.comlblogsearch.
Access this Web site and then search for increase COmpl/fer speed.
Wri te a one-page report on what you learned.
Page 1 of 10
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition, page: Mod1-52
No part of any book may be reproduced or transmitted by any means without the publishers prior permission. Use (other than qualified fair use) in violation of the law or
Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law.
Page 2 of 10