Lesson 2a_input devices
Lesson 2a_input devices
Keyboard
Virtual Keyboard
Scanner
Digital Camera
AUDIO DEVICES
Microphone
Midi Keyboard
VIDEO DEVICES
Graphic Tablet
Keyboard
Keyboard was the first input device to be used with computers and
it is still the major and most widely used among all the input
devices.
It is the primary input device for entering text and numbers. It is
an arrangement of keys on a board in an organized way– this is
why it is called keyboard.
A standard keyboard includes about 100 keys and each key sends
a different signal to the CPU.
Keyboard includes the following types of keys: alphabetic keys,
numerical keys, function keys, cursor movement(arrow) keys,
modifier keys, scroll keys, punctuation mark keys and other special
purpose keys.
Introduction to Keyboard
Alphabetic keys
Function keys(F1-F12)
Different types of keys
Alphanumeric keys: alphanumeric keys composed of alphabetic
keys and number keys with a few keys(TAB, CAPS LOCK,
BACKSPACE, ENTER).
Modifier keys: The SHIFT, ALT(alternate) and CLTR(control) keys
are called modifier keys as they modify the input of other keys. In
other words, if a modifier key is held down while pressing another
key, then the operation or action of the second key is changed in
some way.
For example if the key “c” is pressed it will simply type a letter
“c”(small c). But if the key “c” is pressed with the modifier key
“CLTR” it will copy something. Again if key “c” is pressed with the
modifier key “SHIFT” then it will type a letter “C” (Capital C).
Different types of keys
Function keys: F1 to F12 these12 keys are called function keys. They
are used to perform special types of operation for the user. Most
IBM compatible keyboards have 12 function keys.
Though F1 through F12 have some default primary and secondary
features, they can be used well in combination with keys like Ctrl and
Alt.
F1: open help window
F2: used to rename a file or folder. Alt + Ctrl + F2 opens the Documents
Library while on MS Office suite
F3: used to find something. Shift + F3 toggles between capitalizing each
word, lower case and upper case for selected text on MS Word
F4: Alt + F4 closes the current program. If no program is running then it
launches the Shutdown dialog box
F5: used to refresh action. While using PowerPoint it is used to start a
slide show. Opens Find, Replace, Go to dialog on MS Office programs.
F6: Focuses on the address bar on most browsers
F7: Could not figure out anything for Windows. Turns on Caret
browsing on Mozilla Firefox. This feature places a moveable cursor in
web pages, allowing you to select text with the keyboard.
F8: Enters the Windows Start Menu (commonly used to launch the
safe mode) if pressed during boot process
F9: Generally, compiles and runs the code in combination with Ctrl
key.
F10: Shows the Menu bar in Firefox and IE
F11: Opens full screen mode in Windows Explorer and all browsers
F12: Opens Save As window on MS Office. Ctrl + Shift + F12 is
equivalent to Ctrl + P on MS Office
Different types of keys
Cursor movement keys(arrow keys): most standard keyboards
include a set of cursor movement keys, which enable an user to
move around the screen without using a mouse.
Special purpose keys: IBM compatible keyboards include eight
special purpose keys, each of which performs a unique function.
These keys are ESC, PRINT SCREEN, SCROLL LOCK, PAUSE, INSERT,
DELETE, WINDOWS KEY(start key), MENU KEY(shortcut key)
How the computer accepts input from
keyboard
When a key is pressed, a tiny chip called the keyboard controller notes
that a key has been pressed.
Then the keyboard controller places a code into the keyboard buffer to
indicate which key is pressed (keyboard buffer is a part or memory of
keyboard controller ).
Then the keyboard controller sends a signal to the computer’s system
software to tell that something has happened at the keyboard.
When the system software receives the signal, then it reads the memory
location in the keyboard buffer that contains the code of the pressed key.
Then the system software passes the code to the CPU.
The keyboard buffer can store many keystrokes at one time. It is
necessary as the user may press multiple keys before the CPU read a key
from keyboard buffer.
1. A key is pressed on the keyboard
How the computer accepts input from
keyboard
Keyboard
Keyboard Buffer System Software
Controller
There is an infrared
LED (clear) on one
side of the disk and
an infrared sensor
(red) on the other.
5. An on-board processor chip reads the pulses from the infrared
sensors and turns them into binary data that the computer can
understand. The chip sends the binary data to the computer
through the mouse's cord.
Advantages: Disadvantages:
1.It offers greater security than OCR 1.Only certain characters can be read.
since the printed characters cannot
be altered. 2.It is a more expensive method of data
entry.
2.There is no manual input, thus
errors are reduced.
1.Very fast way of inputting the 1.Input data may not be accurate if
results of a survey/research. forms are not carefully handled or
shaded.
2.It is more accurate than keyboards 2.There may be need for manual check if
and OMR. forms are not properly filled and this
may lead to a waste of time
3.Reduce cost of inputting.
Advantages: Disadvantages:
1.It is a more faster data entry 1.It usually have difficulties reading
system than manually keying in handwritings.
data.
2.It is not a very accurate technique.
2.Number of errors is reduced.
Reduce cost of inputting
Results of tests are needed very fast
Barcode Reader
Used in supermarkets, shops, libraries and other companies to read information in the
form of barcodes marks on product casings.
Advantages: Disadvantages:
1.Provides more secure payment 1.Someone else may read the PIN while
system than magnetic stripe. a user is typing in his PIN.
Advantages: Advantages:
1.Easier to navigate round a screen 1.A mouse is better and easier in controlling
more than a mouse on-screen pointers
Advantages: Disadvantages:
1.It is faster to read-in text than to 1.Sound files can use up a lot of
type it in using a keyboard. computer memory.
Advantages: Disadvantages:
1.It
Touch screens
Allows a user to simply touch the touch the button/icon on the screen to select
a text, task or action. It is mostly used on phones, ipads, petrol stations, ATMs,
Interactive boards and other payment methods.
Advantages: Advantages:
? 1
input data
database
Type of Biometrics
1) Physical biometrics:
• Fingerprint—Analyzing fingertip patterns
• Facial recognition/face location—Measuring facial
characteristics
• Hand geometry—Measuring the shape of the hand
• Iris scan—Analyzing features of colored ring of the eye.
• Retinal scan—Analyzing blood vessels in the eye
• Vascular patterns—Analyzing vein patterns
• DNA—Analyzing genetic makeup.
• Earprint—this method is based on geometric distances, force
field transformation
Biometric: authentication process
1. Sensing
– User’s characteristic must be presented to a sensor
– Output is a function of:
• Biometric measure
• The way it is presented
• Technical characteristics of sensor
2. Signal Processing
– Feature extraction
– Extract the desired biometric pattern
• remove noise and signal losses
• discard qualities that are not distinctive/repeatable
• Determine if feature is of “good quality”
3. Pattern matching
– Sample compared to original signal in database
– Closely matched patterns have “small distances”
between them
– Distances will hardly ever be 0 (perfect match)
4. Decisions
– Decide if the match is close enough
– Trade-off:
false non-matches leads to false matches
Authentication process
Labels of authentication
Something you have:
(token: key, card)
Something you know:
(Password, Pin )
Something you are:
(biometric :physiological, behavioral)
How biometric works?
Storage
Or database
Applications
• Biometrics is a rapidly evolving technology that is being
widely used in forensics, such as criminal identification and
prison security, and that has the potential to be used in a
large range of civilian application areas.
• Biometrics can be used to prevent unauthorized access to
ATMs, cellular phones, smart cards, desktop PCs,
workstations, and computer networks.
• It can be used during transactions conducted by telephone
and Internet (electronic commerce and electronic banking).
• In automobiles, biometrics can replace keys with keyless
entry devices.
Who are presently using ?
• Vertical markets that are using biometrics:
Government—Passports, national identification (ID) cards, voter cards,
driver’s licenses, social services, and so on
• ✓ Transportation—Airport security, boarding passes, and commercial
driver’s licenses
• ✓ Healthcare—Medical insurance cards, patient/employee identity cards
• ✓ Financial—Bankcards, ATM cards, credit cards, and debit cards
• ✓ Security—Access control and identity verifications, including time and
attendance
• ✓ Education—Student/teacher identity verification and access control.
Biometrics are now being implemented in large-scale ID systems around
the globe.
Some advantage of biometrics
• Biometrics cannot be lost, stolen or forgotten.
Barring disease or serious physical injury, the
biometric is consistent and permanent.
• It is also secure in that the biometric itself cannot
be socially engineered, shared or used by others.
• There is no requirement to remember
passwords, or PINs, thus eliminating an overhead
cost. The biometric is always available to the
individual;
Contd.
• Coupled with a smart card, biometrics provide
strong security for any credentials on the
smart card.
• Biometric system provide a high degree of
confidence in user identity.
• Organizations can implement recognition
systems to obviate the need to log onto a
system manually.
some disadvantages
Lack of standardization
While the reliability and the accuracy of biometric
devices continues to improve.
Biometric systems must be able to accommodate
changes to the biometric over time which may be
caused by ageing, illness or injury.
• The effectiveness of the sample collection process is
strongly influenced by environmental conditions, user
training and usability. For example, lighting, facial
orientations, expression, image resolution and the
wearing of hats can affect the quality of the sample.