BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Khamis, 25 Mac 2010

computer keyboard


In computing, a keyboard is an input device, partially modeled after the typewriter keyboard, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches. A keyboard typically has characters engraved or printed on the keys and each press of a key typically corresponds to a single written symbol. However, to produce some symbols requires pressing and holding several keys simultaneously or in sequence. While most keyboard keys produce letters, numbers or signs (characters), other keys or simultaneous key presses can produce actions or computer commands.
In normal usage, the keyboard is used to type text and numbers into a word processor, text editor or other program. In a modern computer, the interpretation of keypresses is generally left to the software. A computer keyboard distinguishes each physical key from every other and reports all keypresses to the controlling software. Keyboards are also used for computer gaming, either with regular keyboards or by using keyboards with special gaming features, which can expedite frequently used keystroke combinations. A keyboard is also used to give commands to the operating system of a computer, such as Windows' Control-Alt-Delete combination, which brings up a task window or shuts down the machine.

Computer Mouse


In computing, a mouse (plural mice, mouses, or mouse devices.) is a pointing device that functions by detecting two-dimensional motion relative to its supporting surface. Physically, a mouse consists of an object held under one of the user's hands, with one or more buttons. It sometimes features other elements, such as "wheels", which allow the user to perform various system-dependent operations, or extra buttons or features can add more control or dimensional input. The mouse's motion typically translates into the motion of a cursor on a display, which allows for fine control of a Graphical User Interface.
The name mouse, originated at the Stanford Research Institute, derives from the resemblance of early models (which had a cord attached to the rear part of the device, suggesting the idea of a tail) to the common mouse.[1]
The first marketed integrated mouse – shipped as a part of a computer and intended for personal computer navigation – came with the Xerox 8010 Star Information System in 1981. However, the mouse remained relatively obscure until the appearance of the Apple Macintosh; in 1984 PC columnist John C. Dvorak ironically commented on the release of this new computer with a mouse: “There is no evidence that people want to use these things.”[2][3]
A mouse now comes with most computers and many other varieties can be bought separately.

Computer monitor


A monitor or display (sometimes called a visual display unit) is an electronic visual display for computers. The monitor comprises the display device, circuitry, and an enclosure. The display device in modern monitors is typically a thin film transistor liquid crystal display (TFT-LCD), while older monitors use a cathode ray tube (CRT).
Contents[hide].
The size of a display is usually given as the distance between two opposite screen corners. One problem with this method is that it does not distinguish between the aspect ratios of monitors with identical diagonal sizes, despite the fact that the area of a given diagonal span decreases as it becomes less square. For example, a 4:3 21-inch (53.3 cm) monitor has an area of about 211 sq in (1,361 cm2), while a 16:9 21-inch widescreen has about 188 sq in (1,213 cm2).
This method of measurement is from the first types of CRT television, when round picture tubes were in common use. Being circular, they only needed to use their diameter to describe their tube size. When round tubes were used to display rectangular images, the diagonal measurement was equivalent to the round tube's diameter. This method continued even when cathode ray tubes were manufactured as rounded rectangles.
Another problematic practice was the direct measurement of a monitor's imaging element as its quoted size in publicity and advertising materials. Especially on CRT displays, a substantial portion of the imaging element is concealed behind the case's bezel or shroud in order to hide areas outside the monitor's safe area due to overscan. Seen as deceptive, widespread consumer objection and lawsuits eventually forced most manufacturers to instead measure viewable size.

Selasa, 23 Mac 2010

INTERNET

Multimedia Concepts
4.1.1 Definition of Multimedia1. Systems that support the interactive use of text, audio, still images, video, and graphics. Each of these elements must be converted in some way from analog form to digital form before they can be used in a computer application. Thus, the distinction of multimedia is the convergence of previously diverse systems.www.tamu.edu/ode/glossary.html
2. Presentations of sound and light, words in magnetically graven image - and any known combination thereof as well as nuances yet to come. Though computer CD is the dominant wrapper for these works, technological innovation is the hallmark of the electronic-publishing arena, and new formats will expand the creative and market potential. Multimedia books are publishing events; their advent suggests alternative avenues for authors as well as adaptational tie-ins with the world of print. ...www.brochure-design.com/brochure-design-publishing-terms.html
3. Presenting data in more than one medium, such as combining text, graphics and sound.www.micro2000uk.co.uk/hardware_glossary.htm
4. A combination of media types on a single document, including: text, graphics, animation, audio and video.www.vikont.com/clients/glossary.htm
5. A combination of various types of media, including sound, animation, video and graphics. Due to the generally large size of "multimedia" files, a CD-ROM is usually necessary to store files. As well, appropriate sound and video cards and speakers are also necessary.www.angelfire.com/bc/nursinginformatics/glossary4.html

Software

Computer software, or just software is a general term primarily used for digitally stored data such as computer programs and other kinds of information read and written by computers. Today, this includes data that has not traditionally been associated with computers, such as film, tapes and records.[1] The term was coined in order to contrast to the old term hardware (meaning physical devices); in contrast to hardware, software is intangible, meaning it "cannot be touched".[2] Software is also sometimes used in a more narrow sense, meaning application software only.
Examples:
Application software, such as word processors which perform productive tasks for users.
Firmware, which is software programmed resident to electrically programmable memory devices on board mainboards or other types of integrated hardware carriers.
Middleware, which controls and co-ordinates distributed systems.
System software such as operating systems, which govern computing resources and provide convenience for users.
Software testing is a domain independent of development and programming. Software testing consists of various methods to test and declare a software product fit before it can be launched for use by either an individual or a group.
Testware, which is an umbrella term or container term for all utilities and application software that serve in combination for testing a software package but not necessarily may optionally contribute to operational purposes. As such, testware is not a standing configuration but merely a working environment for application software or subsets thereof.
Video games (except the hardware part)
Websites

Computer security

Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.