Four Alternative Input Devices
Four Alternative Input Devices
The world's only foot mouse with all hand mouse functions plus double click and
shortcut buttons
A smart mouse with a brain that stops the pain before it stops you.
OPINION
I have used the touch screen and it is the most easy and reliable input device to
use and is not that much problematic like the we use mouse and keyboard it has
the both facilities and work as the dual option like it work as a keyboard and the
mouse we can type on it and by finger we can use the mouse to
FEATURES
The touch screen interface - whereby users navigate a computer system by
touching icons or links on the screen itself - is the most simple, intuitive, and
easiest to learn of all PC input devices and is fast is fast becoming the interface of
choice for a wide variety of applications, such as:
Computer Based Training: Because the touch screen interface is more user-
friendly than other input devices, overall training time for computer
novices, and therefore training expense, can be reduced. It can also help to
make learning more fun and interactive, which can lead to a more
beneficial training experience for both students and educators.
DIFFERENCE BETWEEN RAID-0 AND RAID-1
RAID-0
It is a method of storing data in different places on a hard disk but without
redundancy it basically strips the data and save it.
EXAMPLE
Raid -0 is used when we do not want to store data on any other hard drive and
want to keep a backup on the same drive
RAID-1
This is a type of storing data in which all data is copied in the way it exist originally
it is also known as data mirroring RAID-1 provides the best performance and the
best fault-tolerance in a multi-user system.
EXAMPLE
Raid-1 is when we store data on multiple drives and want to keep a mirror image
Flash memory has become standard for portable storage needs.
1 GB is the standard usb size in the USB flash drive. It’s a 70mm device which
starts from 256 kbps.
The only thing which can be done to keep my usb data secure is to use encryption
techniques which are available in the market because it is not necessary that all
the people who may find a lost usb are that much computer literate to get the
data decrypted.
MUHAMMAD MANSOOR
REGISTRATION#2565
DATE: 21ST February 2010
IT FOR MANAGER
ASSIGNMENT#01
SUBMITTED TO: SHAHAB AZAM