• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Input & output devices.

Extracts from this document...

Introduction

Input & output devices Overlay Keyboards In many applications only a small number of different entries need to be made. It is faster to press a marked key than to enter a string of data. You are also less likely to make mistakes. The overlay keyboards works by having a membrane keyboard that has a number of areas/ keys on it. An overlay is put on top of the keyboard so that the user can select a specific for a particular entry. The computer is programmed to respond to each key in an appropriate manner. Touch Screens In some applications the concept keyboard application is replaced by a touch sensitive screen. The user touches the screen and the computer is programmed to respond in an appropriate way. One advantage of this method is that the program can change the screen layout at any time, and is possible to have several different menus (a bit like swapping the overlays on an overlay keyboard). These kind of terminals are used when the fast selection of information is important. ...read more.

Middle

The picture is thus made up of a string of 0's and 1's like 01101101110011010101100. This is in digital form. For a grey scale picture each dot may be one of several different shades of grey and this cannot be represented by just 0's and 1's is used to represent a shade. So for example 11111111= White 11111110= Light grey ............ 00000001= Dark grey 00000000= Black Using an 8-bit code like the one above gives us 256 different possible codes and so 256 possible shades of grey. For a colour picture a similar technique is used. Normally 3 different lights are shone on the picture and the reflected light from each is used to measure the colour value. Different colours are then represented using a collection of 0's and 1's as above. An 8-bit code will give us 256 colours. A 16 bit code will give us 65536 colours. Data capture Input methods that use a keyboard usually involve the transcription of the source data from the source document. This process clearly creates extra work, and if verification is employed to reduce errors made during transcription then the workload and the time taken is increased still further Documents readers are an automated method for putting data from the source document without the use of a keyboard. ...read more.

Conclusion

It is possible for documents typed on a normal typewriter or computer printer or even carefully hand printed documents to be read. The reliability of the reading depends on the clarity of the shape of the characters. The reader will expect a particular design of character (font) to be used. OCR is now quite common, and examples of OCR turnaround documents may be found on Gas and Electricity bills where the bill has figures printed on by the computer which can be read by OCR and enable the transfer of funds to take place. Advantages Disadvantages -Natural method for non-technical users -Cost of OCR readers -Data may be read by people -Not as reliable as OMR -Careful hand printing may be used Magnetic Ink Character Recognition (MICR) Here the characters are printed in special ink, which may be magnetised. Fonts used enable accurate reading of data. The typical example of this is it is used on bank cheques. Kimball tags Commonly used in fashion shops Bar Codes Commonly used in supermarkets Magnetic Strip Used for credit cards Voice Recognition Not yet good enough to become widely adopted Handwriting Recognition Progress being made on this but mainly used in specialist applications and with something other than normal handwriting e.g. PDAs. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. WAN Devices

    A network that needs an external connection will include a router as this makes external access possible but Local Area Networks could use hubs, switches or bridges to connect parts of the network together. Gateways are also a possibility when connecting devices together that don't necessarily know how to interface with each other.

  2. Smart Card System

    The Java Cryptography Extension (JCE) extends the JCA API to include encryption and key exchange. Together, it and the JCA provide a complete, platform-independent cryptography API. The JCE will be provided in a separate release because it is not currently exportable outside the United States The Java Cryptography Architecture (JCA)

  1. Flexible Architectures in Communication Security Application

    There is a unified secondlevel 512k 4-way set-associative cache with 32 byte blocks, with a 12 cycle hit latency. If there is a second-level cache miss it takes a total of 120 cycles to make the round trip access to main memory.

  2. You need to discuss the advantages and disadvantages of someone in your

    There are many disadvantages to this system. For example the filing cabinet in which the files are stored takes up a lot of valuable space in the shop. Also, if a customer changes address or phone number it is very difficult and time consuming to modify this neatly.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Internal modems are activated when you run a communications program and are turned off when you exit the program. This convenience is especially useful for novice users. These types of modems usually cost less. This is a diagram I have shown below of an internal modem.

  2. File transfer protocols

    Writeln( 'Menu') End; (* Menu *) (* 0 - Songs *) (* calls Set_Up to load song details into the table, Process_Votes to input votes and collate them, and Menu to offer options *) Var Songs_Table : Songs_Table_Type; Total_Votes : PosInt; Begin (* Songs *)

  1. According to John Searle, strong analytical devices that have Artificial Intelligence can, at most, ...

    A third batch of Chinese symbols and more instructions in English enable you "to correlate elements of this third batch with elements of the first two batches" and instruct you, thereby, "to give back certain sorts of Chinese symbols with certain sorts of shapes in response."

  2. The Value of Data and the Use of Databases

    EDI protocols they will use o Once this has been agreed, both companies will write programs that convert documents that they want to send and receive into the agreed EDI format Benefits of EDI o Savings in labor costs (through the elimination of data entry, paper document handling, reconciliation and other manually performed tasks).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work