0% found this document useful (0 votes)
9 views

Lesson 2a_input devices

Uploaded by

erickkimotho0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Lesson 2a_input devices

Uploaded by

erickkimotho0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 66

Lesson objectives

At the end of lesson, students should be able to:


1.Correctly describe the meaning of input
devices.
2.Explain the meaning of input devices with at
least one example.
3.State the respective functions of input devices
with at least one example.
What is input ?
Input is any data or instruction
that you enter into the memory of a computer

There are four types of input:


which are text, graphic, audio and video
What is input devices ?

Input devices are any electronic device


connected to a computer and produces
input signals.
TEXT DEVICES

Keyboard
Virtual Keyboard

Optical Reader Bar code Reader


GRAPHIC DEVICES

Scanner

Digital Camera
AUDIO DEVICES

Microphone

Midi Keyboard
VIDEO DEVICES

Webcam Digital Video Camera

Closed-Circuit Television (CCTV)


POINTING DEVICES

Mouse Track Ball


Touch Screen

Graphic Tablet
Keyboard
 Keyboard was the first input device to be used with computers and
it is still the major and most widely used among all the input
devices.
 It is the primary input device for entering text and numbers. It is
an arrangement of keys on a board in an organized way– this is
why it is called keyboard.
 A standard keyboard includes about 100 keys and each key sends
a different signal to the CPU.
 Keyboard includes the following types of keys: alphabetic keys,
numerical keys, function keys, cursor movement(arrow) keys,
modifier keys, scroll keys, punctuation mark keys and other special
purpose keys.
Introduction to Keyboard
Alphabetic keys
Function keys(F1-F12)
Different types of keys
 Alphanumeric keys: alphanumeric keys composed of alphabetic
keys and number keys with a few keys(TAB, CAPS LOCK,
BACKSPACE, ENTER).
 Modifier keys: The SHIFT, ALT(alternate) and CLTR(control) keys
are called modifier keys as they modify the input of other keys. In
other words, if a modifier key is held down while pressing another
key, then the operation or action of the second key is changed in
some way.
 For example if the key “c” is pressed it will simply type a letter
“c”(small c). But if the key “c” is pressed with the modifier key
“CLTR” it will copy something. Again if key “c” is pressed with the
modifier key “SHIFT” then it will type a letter “C” (Capital C).
Different types of keys
 Function keys: F1 to F12 these12 keys are called function keys. They
are used to perform special types of operation for the user. Most
IBM compatible keyboards have 12 function keys.
 Though F1 through F12 have some default primary and secondary
features, they can be used well in combination with keys like Ctrl and
Alt.
 F1: open help window
 F2: used to rename a file or folder. Alt + Ctrl + F2 opens the Documents
Library while on MS Office suite
 F3: used to find something. Shift + F3 toggles between capitalizing each
word, lower case and upper case for selected text on MS Word
 F4: Alt + F4 closes the current program. If no program is running then it
launches the Shutdown dialog box
 F5: used to refresh action. While using PowerPoint it is used to start a
slide show. Opens Find, Replace, Go to dialog on MS Office programs.
 F6: Focuses on the address bar on most browsers
 F7: Could not figure out anything for Windows. Turns on Caret
browsing on Mozilla Firefox. This feature places a moveable cursor in
web pages, allowing you to select text with the keyboard.
 F8: Enters the Windows Start Menu (commonly used to launch the
safe mode) if pressed during boot process
 F9: Generally, compiles and runs the code in combination with Ctrl
key.
 F10: Shows the Menu bar in Firefox and IE
 F11: Opens full screen mode in Windows Explorer and all browsers
 F12: Opens Save As window on MS Office. Ctrl + Shift + F12 is
equivalent to Ctrl + P on MS Office
Different types of keys
 Cursor movement keys(arrow keys): most standard keyboards
include a set of cursor movement keys, which enable an user to
move around the screen without using a mouse.
 Special purpose keys: IBM compatible keyboards include eight
special purpose keys, each of which performs a unique function.
These keys are ESC, PRINT SCREEN, SCROLL LOCK, PAUSE, INSERT,
DELETE, WINDOWS KEY(start key), MENU KEY(shortcut key)
How the computer accepts input from
keyboard
 When a key is pressed, a tiny chip called the keyboard controller notes
that a key has been pressed.
 Then the keyboard controller places a code into the keyboard buffer to
indicate which key is pressed (keyboard buffer is a part or memory of
keyboard controller ).
 Then the keyboard controller sends a signal to the computer’s system
software to tell that something has happened at the keyboard.
 When the system software receives the signal, then it reads the memory
location in the keyboard buffer that contains the code of the pressed key.
 Then the system software passes the code to the CPU.
 The keyboard buffer can store many keystrokes at one time. It is
necessary as the user may press multiple keys before the CPU read a key
from keyboard buffer.
1. A key is pressed on the keyboard
How the computer accepts input from
keyboard

4. The system software


responds to the interrupt
by reading the scan code
from the keyboard buffer

Keyboard
Keyboard Buffer System Software
Controller

2. The keyboard 3. The keyboard


controller sends the scan controller sends an
code for the key to the interrupt request to the
keyboard buffer system software

5. The system software passes


the scan code to the CPU
Types of keyboard
 Keyboards can be classified in many ways. One efficient way is to
classify them according to their key arrangements. But they can be
classified in many more different categories depending on types of
computer connector, size, number of keys etc.
Mouse
 A mouse is an input device that functions by detecting two-
dimensional motion relative to its supporting surface. Physically, a
mouse consists of an object held under the user's hands, with one
or more buttons.
 It is a hand-operated electronic device that controls the
coordinates of a cursor on the computer screen as the user moves
it around on a surface. It can be used only in graphical user
interface based computer system.
 Mouse performs the pointing operation through the following four
actions:
1. Clicking
2. Double clicking
3. Dragging
4. Right clicking
Mouse
 The computer mouse was invented by Douglas Englebart during
the 60's and was patented on November 17, 1970.
 This mouse was first used with the Xerox Alto computer system in
1973.
First Mouse invented by
Douglas Englebart
Types of Mouse
 A mouse can be classified in several ways.
 According to the working mechanism a mouse can be three
types:
1. Mechanical
2. Optomechanical
3. Optical
 A mouse can be three type according to how a computer mouse
hooks up or connects to the computer:
1. Serial mouse
2. PS/2 mouse
3. Cordless mouse
MOUSE
• Pointing device used to move a graphical pointer on the screen
• Graphical pointer also called cursor
• Mouse consists of a small case held under the user’s hand
• Mouse has a ball underneath that helps to roll over a flat surface
• Screen censors the direction of mouse movement and the
cursor on the screen follows the mouse path
• Has 2 or 3 buttons and can be clicked or double-clicked to perform tasks
• Optical mouse doesn’t have a ball but uses a laser to sense the motion
• Variations of mouse:
 Serial mouse
 PS/2 mouse
 USB mouse
 Optical mouse
 Wireless mouse
Basic Parts of a Mouse
 Almost all mice today do the translation using five components:
1. A Ball
2. Two rollers
3. An infrared LED and an infrared sensor
4. On-board processor chip
5. A shaft
1. A ball inside the mouse touches the desktop and
rolls when the mouse moves.
2. Two rollers inside the mouse touch the ball. One of the rollers is
oriented so that it detects motion in the X direction, and the other
is oriented 90 degrees to the first roller so it detects motion in the
Y direction. When the ball rotates, one or both of these rollers
rotate as well. The following image shows the two white rollers on
this mouse:

The rollers that touch


the ball and detect X
and Y motion
3. The rollers each connect to a shaft, and the shaft spins a disk with
holes in it. When a roller rolls, its shaft and disk spin. The following
image shows the disk:

Typical optical encoding


disk: This disk has 36
holes around its outer
edge.
4. On either side of the disk there is an infrared LED and an infrared
sensor. The holes in the disk break the beam of light coming from
the LED so that the infrared sensor sees pulses of light. The rate of
the pulsing is directly related to the speed of the mouse and the
distance it travels.

There is an infrared
LED (clear) on one
side of the disk and
an infrared sensor
(red) on the other.
5. An on-board processor chip reads the pulses from the infrared
sensors and turns them into binary data that the computer can
understand. The chip sends the binary data to the computer
through the mouse's cord.

The logic section of a


mouse is dominated by
an encoder chip, a small
processor that reads the
pulses coming from the
infrared sensors and
turns them into bytes
sent to the computer.
You can also see the two
buttons that detect clicks
(on either side of the
wire connector
Mechanical Mouse
• This is a type of computer mouse that has a rubber or metal
ball on its underside and it can roll in every direction.
• There are sensors within the mouse, which are mechanical,
detect the direction in which the ball is moving and moves the
pointer on the screen in the same direction. A mouse pad
should be used under the mouse to run on
How Mechanical Mouse Works?
 A mechanical mouse incorporates an internal ball that comes in
contact with the surface on which the mouse has been placed.
 The ball automatically rotates, when a user moves the mouse on
the surface or desktop.
 Two wheels are used for detecting the rolling. Both the wheels
are placed at 90 degree angles from each other for detecting
mouse movements and its direction.
 Here one wheel can detect up and down movements, whereas,
other is used for left and right movements.
 Furthermore, the guide wheel (third wheel) that comes loaded
with spring pushes the ball against the two sensor wheels for its
functioning.
Optical Mouse
With advances in mouse technology, now-preferred device for
pointing and clicking is the optical mouse.
Developed by Agilent Technologies and introduced to the world in
late 1999, the optical mouse actually uses a tiny camera to take
1,500 pictures every second.
How Optical Mouse Works?
 Optical mouse has a small and red light-emitting diode (LED) that
bounces light off that surface onto a (complimentary metal-oxide
semiconductor) CMOS sensor.
 The CMOS sensor sends each image to a digital signal processor (DSP)
for analysis.
 The DSP operates at 18 MIPS (million instructions per second), is able
to detect patterns in the images and see how those patterns have
moved or changed since the previous image.
 Based on the change in patterns over a sequence of images, the DSP
determines how far the mouse has moved and sends the
corresponding coordinates to the computer.
 The computer moves the cursor on the screen based on the
coordinates received from the mouse. This happens hundreds of
times each second, making the cursor appear to move very smoothly.
Advantages of Optical Mouse

Optical mice have several benefits over wheeled mice:


1.Able to work on almost any surface
2.No moving parts means less wear and a lower chance of failure.
3.There's no way for dirt to get inside the mouse and interfere
with the tracking sensors.
4.Increased tracking resolution means smoother response.
5.They don't require a special surface, such as a mouse pad.
Scanners
Used to scan documents and pictures and convert them into a format for use in
various application software.
Advantages: Disadvantages:

1.Images can be scanned and 1.Quality can be limited, depending on


edited. how good the scanner resolution is.

2.They are faster and more


accurate in data entry.

3.It makes it possible to recover


damaged images and documents
Magnetic Ink Character Recognition
Reads characters printed in a special ink (containing iron particles). MICR is primarily
used to process cheques in banking operations.

Advantages: Disadvantages:

1.It offers greater security than OCR 1.Only certain characters can be read.
since the printed characters cannot
be altered. 2.It is a more expensive method of data
entry.
2.There is no manual input, thus
errors are reduced.

3.Characters can still be read even


when somebody write on them.
Optical Mark Recognition
Reads marks written in pen and pencils. OMR devices are used to read questionnaires,
multiple choice examination papers and many other types of forms where responses
are registered in the form of lines or shaded areas.
Advantages: Disadvantages:

1.Very fast way of inputting the 1.Input data may not be accurate if
results of a survey/research. forms are not carefully handled or
shaded.
2.It is more accurate than keyboards 2.There may be need for manual check if
and OMR. forms are not properly filled and this
may lead to a waste of time
3.Reduce cost of inputting.

4.Very useful where results of tests


are needed very fast.
Optical Character Recognition
Takes scanned text and converts it into a computer readable form. The text can then
be used in various application packages.

Advantages: Disadvantages:

1.It is a more faster data entry 1.It usually have difficulties reading
system than manually keying in handwritings.
data.
2.It is not a very accurate technique.
2.Number of errors is reduced.
Reduce cost of inputting
Results of tests are needed very fast
Barcode Reader
Used in supermarkets, shops, libraries and other companies to read information in the
form of barcodes marks on product casings.
Advantages: Disadvantages:

1.Faster in data entry. 1.It is relatively expensive to setup.

2.Less data entry error. 2.It is relatively expensive to manage.

3.Enables automatic stock control. 3.Works with computers or POS terminals

4.When the price of an item


changes, only the central database
needs to be updated
Magnetic Stripe Readers
Used to read information on the magnetic stripe found on the back of credit cards,
debit cards, security card, etc.
Advantages: Disadvantages:

1.Data entry is faster. 1.Data are lost when card is damaged.

2.Data entered are error free. 2.Card readers do not work in a


distance.
3.Information held on magnetic
stripe is secured. 3.Information are not readable by card
4.It can not be damaged by oil, users.
water or moisture.

5.They are no moving parts, so the


are physically robust.
Chip and PIN Readers
Used where payment are made using cards (e.g. hotels, restaurants, supermarkets,
travel agencies.
Advantages: Disadvantages:

1.Provides more secure payment 1.Someone else may read the PIN while
system than magnetic stripe. a user is typing in his PIN.

2.Chip does not need to be in


contact with the reader.
Joysticks
Used in playing computer games and simulations to mimic actual controls.

Advantages: Advantages:

1.Easier to navigate round a screen 1.A mouse is better and easier in controlling
more than a mouse on-screen pointers

2.Control is in three dimensions.


Digital Cameras
Used to produce photographs for transfer to a computer directly or to print out by
connecting directly to a printer. Photographs can also be uploaded directly into
applications software such as word processors, DTP, etc.

Advantages: Disadvantages:

1.It produces better quality 1.User needs to be computer literate.


photographs.
2.There is some artistry lost since some
2.Easier and faster to upload clever software can make corrections to
photographs to a computer. photographs.

3.No need to develop photographs 3.Quality of photograph depends on


before printing. quality of camera lens.

4.It is easy to delete unwanted 4.Images can easily fill up computer


images. memory.

5.Memory card used can store


several photographs.
Web Cameras (WEBCAMS)
Used in video conferencing. That is, chatting online and at the same time displaying
the images of the people in the conversation.
Advantages: Disadvantages:

1.Can be left on constantly on the 1.Pictures are often of poorer quality.


computer rather than using a digital
camera. 2.Some webcam need to be connected
to the computer before use.
2.Allows images of someone
faraway to be viewed while
chatting.
Microphones
Used to input speech/ sounds to be used in various applications and also in voice
recognition software.
Advantages: Disadvantages:

1.It is faster to read-in text than to 1.Sound files can use up a lot of
type it in using a keyboard. computer memory.

2.Sound can be manipulated in real 2.Voice recognition software is not as


time rather than a recording done accurate as typing manually. For
at earlier stage. instance, it may not be able to
3.It can improve safety and security distinguish the difference between
when used in voice activation ‘there’ and ‘their’.
systems. E.g. switching on a radio
while driving.
Graphic Tablet
Like an electronic tracing paper used for graphic designing.

Advantages: Disadvantages:

1.It
Touch screens
Allows a user to simply touch the touch the button/icon on the screen to select
a text, task or action. It is mostly used on phones, ipads, petrol stations, ATMs,
Interactive boards and other payment methods.
Advantages: Advantages:

1.Fast entry of options than 1.Limited number of options


keyboards. are available.

2.Very easy to choose options. 2.Can lead to RSI.

3.User friendly method of 3.Screen can get damage or


inputting options dirty.
4..
5.They are tamper proof.
HOW TOUCH TECHNOLOGY DIFFERS
FROM OTHER DEVICES
• No special commands to learn.
• The user doesn’t need to look away from the
screen to a keyboard and back again.
• Entering wrong information is impossible, only
valid options are offered on the screen.
• There are no loose pieces of hardware to be
damaged or lost.
The Basic Touchscreen Components
TOUCH SENSOR
>>The touch sensor is a clear
glass panel with a touch
responsive area and it is
placed over the display
screen.
>>It allows the electric
current and signal to pass
through it and change in
these signal is used to detect
the location of touch on the
screen.
Controller
>>The controller connects
between the touch sensor and
the PC.

>>Take information from the


touch sensor and translate it
into the information that PC
can understand.
Software Driver
The driver allows the touch
screen and the computer to work
together

It tells the computer's operating


system how to interpret the touch
event information that is sent from
the controller.

This makes touching the screen


the same as clicking your mouse at
the same location on the screen.
CONCLUSION on touchsceen
• Designers are trying to use touchscreen to simplify
input commands for largely unsophisticated computer
users.

• Today, a larger share of population is PC literate, yet


the touchscreen has become adopted by computer
users of all abilities because it is simple, fast, and
innovative.

• In future there is no usage of mouse and keyboards as


they will be replaced by touchscreens.
Biometric
• In the terms of computer security, biometrics refers
to authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified.
• A Biometric System is a system for the automated
recognition of individuals based on their behavioral
and biological characteristics.
• Depending on the context, in a biometric system, there
are two different ways to resolve a person’s identity
• I) verification
• Ii) identification
Verification
• Verification:- Comparing a sample against a
single stored template is called verification

? 1

» Input stored Template


Identification
Identification :- Search a sample against a database
of templates.

input data
database
Type of Biometrics
1) Physical biometrics:
• Fingerprint—Analyzing fingertip patterns
• Facial recognition/face location—Measuring facial
characteristics
• Hand geometry—Measuring the shape of the hand
• Iris scan—Analyzing features of colored ring of the eye.
• Retinal scan—Analyzing blood vessels in the eye
• Vascular patterns—Analyzing vein patterns
• DNA—Analyzing genetic makeup.
• Earprint—this method is based on geometric distances, force
field transformation
Biometric: authentication process
1. Sensing
– User’s characteristic must be presented to a sensor
– Output is a function of:
• Biometric measure
• The way it is presented
• Technical characteristics of sensor

2. Signal Processing
– Feature extraction
– Extract the desired biometric pattern
• remove noise and signal losses
• discard qualities that are not distinctive/repeatable
• Determine if feature is of “good quality”
3. Pattern matching
– Sample compared to original signal in database
– Closely matched patterns have “small distances”
between them
– Distances will hardly ever be 0 (perfect match)

4. Decisions
– Decide if the match is close enough
– Trade-off:
 false non-matches leads to false matches
Authentication process
Labels of authentication
 Something you have:
(token: key, card)
 Something you know:
(Password, Pin )
 Something you are:
(biometric :physiological, behavioral)
How biometric works?

Biometric Capture & Feature Template


representation processing extraction creation

Storage
Or database
Applications
• Biometrics is a rapidly evolving technology that is being
widely used in forensics, such as criminal identification and
prison security, and that has the potential to be used in a
large range of civilian application areas.
• Biometrics can be used to prevent unauthorized access to
ATMs, cellular phones, smart cards, desktop PCs,
workstations, and computer networks.
• It can be used during transactions conducted by telephone
and Internet (electronic commerce and electronic banking).
• In automobiles, biometrics can replace keys with keyless
entry devices.
Who are presently using ?
• Vertical markets that are using biometrics:
Government—Passports, national identification (ID) cards, voter cards,
driver’s licenses, social services, and so on
• ✓ Transportation—Airport security, boarding passes, and commercial
driver’s licenses
• ✓ Healthcare—Medical insurance cards, patient/employee identity cards
• ✓ Financial—Bankcards, ATM cards, credit cards, and debit cards
• ✓ Security—Access control and identity verifications, including time and
attendance
• ✓ Education—Student/teacher identity verification and access control.
Biometrics are now being implemented in large-scale ID systems around
the globe.
Some advantage of biometrics
• Biometrics cannot be lost, stolen or forgotten.
Barring disease or serious physical injury, the
biometric is consistent and permanent.
• It is also secure in that the biometric itself cannot
be socially engineered, shared or used by others.
• There is no requirement to remember
passwords, or PINs, thus eliminating an overhead
cost. The biometric is always available to the
individual;
Contd.
• Coupled with a smart card, biometrics provide
strong security for any credentials on the
smart card.
• Biometric system provide a high degree of
confidence in user identity.
• Organizations can implement recognition
systems to obviate the need to log onto a
system manually.
some disadvantages
 Lack of standardization
 While the reliability and the accuracy of biometric
devices continues to improve.
 Biometric systems must be able to accommodate
changes to the biometric over time which may be
caused by ageing, illness or injury.
• The effectiveness of the sample collection process is
strongly influenced by environmental conditions, user
training and usability. For example, lighting, facial
orientations, expression, image resolution and the
wearing of hats can affect the quality of the sample.

You might also like