Input Devices Edited 2021
Input Devices Edited 2021
Input Devices Edited 2021
Class Notes
Edited 2021
Input Devices
• Pointing devices
• Text input devices
• Imaging devices
• Audio input devices
• Gaming devices
• Biometric input devices
1. Pointing devices:
• These are input devices which allow the user
to move a pointer and make selections on the
computer screen.
– Clicking
– Dragging
– Resizing
– Selecting or highlighting
• Examples include:
2.1 Keyboard
• Examples include;
4.1 Scanner
• A light sensing device used to change a hard copy
document into a softcopy document that can be
viewed, edited and stored in a computer.
• It converts handwritten, printed text and pictures
on paper into an digital file format. The image is
viewed on a monitor.
• Phones with scanning apps may also help to scan
a document, edit, store or transmit it on network.
Images of scanners
4 types of scanners
• Flatbed - provides a flat glass surface to hold a sheet
of paper, book or other object for scanning.
• Sheet-fed - allows only paper to be scanned rather
than books or other thick objects. It moves the paper
across a stationary scan head.
• Handheld –small and less expensive scanners, moved
by hand over the material being captured.
• Drum scanners- the original document is wrapped
around a drum, detector head is moved longitudinally
as the drum is rotated hence high quality images.
4.2 Digital camera
• These take still photographs and record video,
store them as data on a memory card in the
camera. The image is later transferred into the
computer for further editing and printing.
4.3 Digital video (DV) Camera
• Captures live motion picture information from
live environments, converts it into digital
form, and then transfers it into a computer for
editing and storage.
4.4 Webcam (PC camera)
• This is a kind of digital camera that allows the
computer user to record, edit, capture video and
still images and also to make video phone calls
on the internet.
• PC cameras can also be used in video
conferencing.
• They can also be set to take digital photographs
at preset time intervals or whenever it detects
motion (for security purposes).
4.5 CCTV camera
• A closed-circuit television camera can produce
images or recordings for surveillance or other
private purposes.
• “Closed-circuit” means broadcasts are usually
transmitted to a limited (closed) number of
monitors, unlike “regular” TV, which is
broadcast to the public at large.
• CCTV networks are commonly used to monitor
criminal activities and record traffic infractions.
Images of CCTV
5. Gaming devices
• Are specialized computer systems designed for
interactive video gameplay and display.
• For a computer to play games, it must have a
video card.
• Examples include;
5.1 Joy stick
• A joystick is an input device consisting of a
stick that pivots on a base and reports its angle
or direction to the device it is controlling.
• They are commonly used to control video
games, and usually have one or more
push-buttons whose state can also
be read by the computer.
5.2 Video Game console
• A video game console is an electronic or
device that outputs a video signal or visual
image to display a video game that one or
more people can play through some type of
game controller.
5. Biometric input devices
• Are devices used to translate biological
characteristics into a digital code that is stored
or compared with a code earlier stored in the
computer.
• They are used to perform functions related to
user legitimacy and authentication.
• Among the features measured are face,
fingerprints, hand geometry, handwriting, iris,
retinal, vein, and voice.
Common examples include;
• Fingerprint recognition systems
• Iris recognition systems
• Face recognition systems
• Signature verification systems
• Voice recognition systems
• Ear recognition systems
• DNA Matching systems (Digital Forensic)
Some Biometric devices
Features that make biometric devices
dependable
• Permit controlled entry to only legitimate people
to have access to a computer resource or venue.
• Can hardly be forged by unauthorized people.
• Are able to take actual record of time signed in
or signed out.
• When connected on a network to a certain
database, the captured events are safely shared
and managed.
• They cannot be bribed like the security guards.