• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Input & output devices.

Extracts from this document...


Input & output devices Overlay Keyboards In many applications only a small number of different entries need to be made. It is faster to press a marked key than to enter a string of data. You are also less likely to make mistakes. The overlay keyboards works by having a membrane keyboard that has a number of areas/ keys on it. An overlay is put on top of the keyboard so that the user can select a specific for a particular entry. The computer is programmed to respond to each key in an appropriate manner. Touch Screens In some applications the concept keyboard application is replaced by a touch sensitive screen. The user touches the screen and the computer is programmed to respond in an appropriate way. One advantage of this method is that the program can change the screen layout at any time, and is possible to have several different menus (a bit like swapping the overlays on an overlay keyboard). These kind of terminals are used when the fast selection of information is important. ...read more.


The picture is thus made up of a string of 0's and 1's like 01101101110011010101100. This is in digital form. For a grey scale picture each dot may be one of several different shades of grey and this cannot be represented by just 0's and 1's is used to represent a shade. So for example 11111111= White 11111110= Light grey ............ 00000001= Dark grey 00000000= Black Using an 8-bit code like the one above gives us 256 different possible codes and so 256 possible shades of grey. For a colour picture a similar technique is used. Normally 3 different lights are shone on the picture and the reflected light from each is used to measure the colour value. Different colours are then represented using a collection of 0's and 1's as above. An 8-bit code will give us 256 colours. A 16 bit code will give us 65536 colours. Data capture Input methods that use a keyboard usually involve the transcription of the source data from the source document. This process clearly creates extra work, and if verification is employed to reduce errors made during transcription then the workload and the time taken is increased still further Documents readers are an automated method for putting data from the source document without the use of a keyboard. ...read more.


It is possible for documents typed on a normal typewriter or computer printer or even carefully hand printed documents to be read. The reliability of the reading depends on the clarity of the shape of the characters. The reader will expect a particular design of character (font) to be used. OCR is now quite common, and examples of OCR turnaround documents may be found on Gas and Electricity bills where the bill has figures printed on by the computer which can be read by OCR and enable the transfer of funds to take place. Advantages Disadvantages -Natural method for non-technical users -Cost of OCR readers -Data may be read by people -Not as reliable as OMR -Careful hand printing may be used Magnetic Ink Character Recognition (MICR) Here the characters are printed in special ink, which may be magnetised. Fonts used enable accurate reading of data. The typical example of this is it is used on bank cheques. Kimball tags Commonly used in fashion shops Bar Codes Commonly used in supermarkets Magnetic Strip Used for credit cards Voice Recognition Not yet good enough to become widely adopted Handwriting Recognition Progress being made on this but mainly used in specialist applications and with something other than normal handwriting e.g. PDAs. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    can only be represented by a limited number of digits, restricting the accuracy with which it can be measured. Secondly, the original signal is only sampled at the end of discrete intervals of time, and we know nothing of what is happening to the signal between these intervals.

  2. WAN Devices

    LAN Connectivity Local Area Networks are very easily constructed with the use of these devices. LANs are quite easily created using; routers; hubs, switches, bridges; gateways and repeaters as well as UTP wiring. The network consists of many devices. Depending on the purpose of the network; the devices attached to it will be different.

  1. Smart Card System

    Security kernel and a library of encapsulated functions will be included in the platform to offer built-in security at all levels. The platform will be compliant with industry standards including ISO, EMV, and Java Card; * The chips will be used highly advanced silicon processing with process technologies of 0.35 down to 0.25 microns.

  2. I will explain what the specifications are for an input and output device. I ...

    Data (subject of the calculations), are momentarily, are transferred to the arithmetic/logic unit (ALU). The operations are performed and the answers to the calculations return to the main storage. The ALU is also used to make 'Logical' comparisons, which will mostly determine the route to be taken throughout the program.

  1. You need to discuss the advantages and disadvantages of someone in your

    It is also a very laborious task for the user search through the data that has been stored to find particular pieces of information. In the following section I will attempt to find a suitable solution to these problems. You need to discuss the advantages and disadvantages of someone in your company using a manual system..........

  2. File transfer protocols

    Var Songs_Table : Songs_Table_Type; Total_Votes : Posint; Begin (* Songs *) Set_Up (Songs_Table); Process_Votes(Songs_Table, Total_Votes); Menu(Songs_Table, Total Votes); End. (* Songs *) A Test Plan should be constructed which indicates an incremental development where each module is to be tested in turn, with appropriate test stubs.

  1. Flexible Architectures in Communication Security Application

    In Chapter 4, we introduce the architectural extensions to support fast cryptographic processing. In Chapter 5, we present the CryptoManiac design, detailing the processor architecture, the system architecture, and the instruction set. We then examine performance results in Chapter 6.

  2. According to John Searle, strong analytical devices that have Artificial Intelligence can, at most, ...

    speaker " second batch of Chinese script" and "a set of rules" in English "for correlating the second batch with the first batch." The rules "correlate one set of formal symbols with another set of formal symbols"; "formal" (or "syntactic") meaning you "can identify the symbols entirely by their shapes."

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work