INPUT and OUTPUT Devices

Input and output devices

  • Any information or data that is entered or sent to the computer to be processed is considered input.
  • Anything that is sent from the computer to an internal or external device is output .

Input devices

  • An input device, such as a computer keyboard or mouse , can send information to the computer, but it cannot receive information from the computer.

Output devices

  • An output device, such as a computer monitor or printer , can receive information from the computer, but it cannot send information to the computer.
  • An input / output device, such as a CD-RW drive or USB flash drive , can send information to a computer and receive information from a computer.

Input / Output devices

CD-RW drive

USB flash drive

  • Find a USB port.
  • Insert a USB flash drive into the USB port.

How to create a folder

  • http://www.computerhope.com/issues/ch001355.htm
  • Google pictures
  • School Guide
  • Class 9 Syllabus
  • Maths Notes Class 9
  • Science Notes Class 9
  • History Notes Class 9
  • Geography Notes Class 9
  • Political Science Notes Class 9
  • NCERT Soln. Class 9 Maths
  • RD Sharma Soln. Class 9
  • Math Formulas Class 9
  • IBPS PO General Awareness Syllabus 2024
  • Khelo India
  • Most important National Sports Awards in India
  • List of Important Sports Cups and Trophies

General Knowledge-WorldGK

  • List of International Organizations and their Headquarters
  • 7 Continents Name List in Order with Countries, Oceans, & Size
  • Neighbouring Countries of India - Full List

Government Schemes

  • Soil Health Card Scheme
  • Sarva Shiksha Abhiyan (SSA) in Rural Areas
  • Women Empowerment Schemes In India
  • Senior Citizen Saving Scheme
  • Schemes for Sports Development in India
  • Welfare Schemes for Vulnerable Sections
  • Sabki Yojana Sabka Vikas Scheme
  • Schemes For Unorganized Sector
  • Fame India Scheme
  • Pooled Finance Development Fund Scheme
  • Nai Roshni Scheme
  • GMS Yojana: Features, Time Period and Effectiveness
  • Voluntary Disclosure of Income Scheme
  • Schemes For MSMEs in India
  • PRASHAD Scheme
  • Pradhan Mantri Kisan Samman Nidhi Scheme
  • Kusum Scheme

Computer Awareness

  • Computer Networking Aptitude Questions for Bank Exams
  • MCQ on Computer Networking for Bank Exams
  • Computer Awareness MCQ for Bank Exams
  • MCQ on Computer Fundamentals for Bank Exams
  • Important Questions on Computer Operating System for Bank Exams
  • MCQ on Computer Operating System for Bank Exams
  • Important Questions on Computer Hardware for Bank Exams
  • MCQ on Computer Hardware for Bank Exams
  • Important Questions on Computer Software for Bank Exams
  • MCQ on Computer Software for Bank Exams
  • MS Office MCQ for Competitive Exams
  • MCQ on Computer MS-Office for Bank Exams
  • Important Computer Abbreviations for Bank Exams
  • Important Questions for Computer Keyboard Shortcuts
  • Practice Questions for Computer Keyboard Shortcuts
  • Important Questions on Computer Memory for Bank Exams
  • Practice Questions on Internet for Bank Exams
  • Important Features of Microsoft Word
  • Important Questions On Computer Internet For Bank Exam

Economicsand Finance

  • Payment And Small Finance Banks With Its Headquarters
  • Private Sector Banks and their Headquarters
  • Public Sector Banks And Their Headquarters
  • Difference between Life Insurance and General Insurance
  • Types of Economic Systems and their Importance
  • List of Important Economy Terms
  • Important Features of Indian Economy
  • Different Branches of Economics
  • Monopoly Market
  • Characteristics of Monopolistic Competition
  • Perfect Competition : Functions, Features and Examples
  • Laws of Production
  • Marshallian Approach to Price Determination
  • Importance of LIC in India
  • FDI Limits in Various Sectors in India
  • Income & Cross Elasticity of Demand
  • Price Elasticity of Demand and Supply
  • Law of Demand and Elasticity of Demand
  • Meaning and Determinants of Demand
  • Production Possibilities Curve (PPC) in Economics
  • MCQs on Basic Economics
  • Importance of Securities and Exchange Board of India
  • Role of Reserve Bank of India
  • Methods of Economic Analysis
  • Basic Concepts Related To Economics
  • Indian Financial System - Overview and Components
  • Types of Taxes
  • Discuss Supply and Demand Reversal Of Environmental Resources
  • Tokenization of Card

Input and Output Devices

  • Types of Computers

General Knowledge (India GK)

  • National Park in India 2023 with State-wise List
  • States and Capitals in India - List of 28 States & 8 UT 2024
  • Folk Dances of Different States in India
  • National Language of India
  • List of Prime Ministers of India (1947-2024)
  • What are the functions of Lok Sabha and Rajya Sabha?
  • List of Ramsar Sites in India
  • List of Important Wildlife Sanctuaries in India
  • Bordering Countries of India
  • List of all Dams of India
  • Agnipath Scheme
  • List of Indian Presidents: Presidents of India (1950 to 2022)
  • List of Vice Presidents of India (1952 to 2023)
  • Constitution of India
  • Fundamental Rights (Articles 12-35): A Comprehensive Guide
  • List of Bharat Ratna Award Winners : Updated Full List Till 2024
  • List of Tiger Reserves in India 2023, Names, Schemes and Map
  • Indian Nobel Prize Winners from 1913 to 2023

Miscellaneous

  • NITI Aayog: National Institute for Transforming India
  • National Languages of India: List of 22 Official Languages
  • India's Ranking in Different Index 2024 (Latest Global Ranking)
  • List of Important Books and Authors
  • Digital India Mission
  • Integrated Child Development Scheme

An input/output device, often known as an IO device, is any hardware that allows a human operator or other systems to interface with a computer. Input/output devices, as the name implies, are capable of delivering data (output) to and receiving data from a computer (input). An input/output (I/O) device is a piece of hardware that can take, output, or process data. It receives data as input and provides it to a computer, as well as sends computer data to storage media as a storage output.

Input Devices

Input devices are the devices that are used to send signals to the computer for performing tasks. The receiver at the end is the CPU (Central Processing Unit), which works to send signals to the output devices. Some of the classifications of Input devices are:

  • Keyboard Devices
  • Pointing Devices
  • Composite Devices
  • Game Controller
  • Visual Devices
  • Audio Input Devices

Some of the input devices are described below.

The keyboard is the most frequent and widely used input device for entering data into a computer. Although there are some additional keys for performing other operations, the keyboard layout is similar to that of a typical typewriter. Generally, keyboards come in two sizes: 84 keys or 101/102 keys but currently keyboards with 104 keys or 108 keys are also available for Windows and the Internet.

Keyboard

Types of Keys

  • Numeric Keys: It is used to enter numeric data or move the cursor. It usually consists of a set of 17 keys.
  • Typing Keys: The letter keys (A-Z) and number keys (09) are among these keys.
  • Control Keys: These keys control the pointer and the screen. There are four directional arrow keys on it. Home, End, Insert, Alternate(Alt), Delete, Control(Ctrl), etc., and Escape are all control keys (Esc).
  • Special Keys: Enter, Shift, Caps Lock, NumLk, Tab, etc., and Print Screen are among the special function keys on the keyboard.
  • Function Keys: The 12 keys from F1 to F12 are on the topmost row of the keyboard.

The most common pointing device is the mouse. The mouse is used to move a little cursor across the screen while clicking and dragging. The cursor will stop if you let go of the mouse. The computer is dependent on you to move the mouse; it won’t move by itself. As a result, it’s an input device. A mouse is an input device that lets you move the mouse on a flat surface to control the coordinates and movement of the on-screen cursor/pointer. The left mouse button can be used to select or move items, while the right mouse button when clicked displays extra menus.

Mouse

A joystick is a pointing device that is used to move the cursor on a computer screen. A spherical ball is attached to both the bottom and top ends of the stick. In a socket, the lower spherical ball slides. You can move the joystick in all four directions.

Joystick

The joystick’s function is comparable to that of a mouse. It is primarily used in CAD (Computer-Aided Design) and playing video games on the computer.

Track Ball is an accessory for notebooks and laptops, which works on behalf of a mouse. It has a similar structure to a mouse. Its structure is like a half-inserted ball and we use fingers for cursor movement. Different shapes are used for this like balls, buttons, or squares.

A light pen is a type of pointing device that looks like a pen. It can be used to select a menu item or to draw on the monitor screen. A photocell and an optical system are enclosed in a tiny tube. When the tip of a light pen is moved across a monitor screen while the pen button is pushed, the photocell sensor element identifies the screen location and provides a signal to the CPU.

Light Pen

A scanner is an input device that functions similarly to a photocopier. It’s employed when there’s information on paper that needs to be transferred to the computer’s hard disc for subsequent manipulation. The scanner collects images from the source and converts them to a digital format that may be saved on a disc. Before they are printed, these images can be modified. 

Scanner

Optical Mark Reader (OMR)

An Optical Mark Reader is a device that is generally used in educational institutions to check the answers to objective exams. It recognizes the marks present by pencil and pen.

Optical Character Reader (OCR)

OCR stands for optical character recognition, and it is a device that reads printed text. OCR optically scans the text, character by character turns it into a machine-readable code, and saves it to the system memory.

Magnetic Ink Card Reader (MICR)

It is a device that is generally used in banks to deal with the cheques given to the bank by the customer. It helps in reading the magnetic ink present in the code number and cheque number. This process is very fast compared to any other process.

Bar Code Reader

A bar code reader is a device that reads data that is bar-coded (data that is represented by light and dark lines).Bar-coded data is commonly used to mark things, number books, and so on. It could be a handheld scanner or part of a stationary scanner. A bar code reader scans a bar code image, converts it to an alphanumeric value, and then sends it to the computer to which it is connected.

Bar Code Reader

Because a web camera records a video image of the scene in front of it, a webcam is an input device. It is either built inside the computer (for example, a laptop) or attached through a USB connection. A webcam is a computer-connected tiny digital video camera. It’s also known as a web camera because it can take images and record video. These cameras come with software that must be installed on the computer in order to broadcast video in real-time over the Internet. It can shoot images and HD videos, however, the video quality isn’t as good as other cameras (In Mobiles or other devices or normal cameras).

Web Camera

Digitizer is a device that is used to convert analog signals to digital signals. it converts signals into numeric values. An example of a Digitizer is Graphic Tablet, which is used to convert graphics to binary data.

The microphone works as an input device that receives input voice signals and also has the responsibility of converting it also to digital form. It is a very common device that is present in every device which is related to music.

Output Devices

Output Devices are the devices that show us the result after giving the input to a computer system. Output can be of many different forms like image, graphic audio, video, etc. Some of the output devices are described below.

Monitors, also known as Visual Display Units (VDUs) , are a computer’s primary output device. It creates images by arranging small dots, known as pixels, in a rectangular pattern. The amount of pixels determines the image’s sharpness.  The two kinds of viewing screens used for monitors are described below.

  • Cathode-Ray Tube (CRT) Monitor: Pixels are minuscule visual elements that make up a CRT display . The higher the image quality or resolution, the smaller the pixels.
  • Flat-Panel Display Monitor: In comparison to the CRT, a flat-panel display is a type of video display with less volume, weight, and power consumption. They can be hung on the wall or worn on the wrist.

Flat-panel displays are currently used in calculators, video games, monitors, laptop computers, and graphical displays.

Monitor

Television is one of the common output devices which is present in each and every house. It portrays video and audio files on the screen as the user handles the television. Nowadays, we are using plasma displays as compared to CRT screens which we used earlier.

Printers are output devices that allow you to print information on paper. There are certain types of printers which are described below.

  • Impact Printers

Character Printers

Line printers, non-impact printers, laser printers, inkjet printers.

Printer

Impact Printer

Characters are printed on the ribbon, which is subsequently crushed against the paper, in impact printers. The following are the characteristics of impact printers:

  • Exceptionally low consumable cost.
  • Quite noisy
  • Because of its low cost, it is ideal for large-scale printing.
  • To create an image, there is physical contact with the paper.

Character Printer has the capability to print only one character at a time. It is of two types.

  • Dot Matrix Printer
  • Daisy Wheel

Line Printers are printers that have the capability to print one line at a time. It is of two types.

  • Drum Printer
  • Chain Printer

Characters are printed without the need for a ribbon in non-impact printers. Because these printers print a full page at a time, they’re also known as Page Printers. The following are the characteristics of non-impact printers:

  • They don’t make a lot of noise.
  • Excellent quality
  • Supports a variety of typefaces and character sizes

Laser Printers use laser lights for producing dots which will produce characters on the page.

Inkjet printers are printers that use spray technology for printing papers. High-quality papers are produced in an Inkjet printer. They also do color printing. 

Speakers are devices that produce sound after getting a command from a computer. Nowadays, speakers come with wireless technology also like Bluetooth speakers.

Projectors are optical devices that have the work to show visuals on both types of screens, stationary and moving both. It helps in displaying images on a big screen. Projectors are generally used in theatres, auditoriums, etc.

Plotter is a device that helps in making graphics or other images to give a real view. A graphic card is mandatorily required to use these devices. These are the pen-like devices that help in generating exact designs on the computer.

Braille Reader

Braille Reader is a very important device that is used by blind users. It helps people with low vision or no vision to recognize the data by running their fingers over the device to understand easily. It is a very important device for blind persons as it gives them the comfort to understand the letters, alphabets, etc which helps them in study.

A video Card is a device that is fitted into the motherboard of the computer. It helps in improvising digital content in output devices. It is an important tool that helps people in using multiple devices. 

Global Positioning System (GPS)

Global Positioning System helps the user in terms of directions, as it uses satellite technology to track the geometrical locations of the users. With continuous latitudinal and longitudinal calculations, GPS gives accurate results. Nowadays, all smart devices have inbuilt GPS.

Headphones are just like a speaker, which is generally used by a single person or it is a single-person usable device and is not commonly used in large areas. These are also called headsets having a lower sound frequency.

The Input and Output Devices of a Computer

There are so many devices that contain the characteristics of both input and output. They can perform both operations as they receive data and provide results. Some of them are mentioned below.

USB Drive is one of the devices which perform both input and output operations as a USB Drive helps in receiving data from a device and sending it to other devices.

Modems are one of the important devices that helps in transmitting data using telephonic lines.

CD and DVD are the most common device that helps in saving data from one computer in a particular format and send data to other devices which works as an input device to the computer.

The headset consists of a speaker and microphone where a speaker is an output device and a microphone works as an input device.

A facsimile is a fax machine that consists of a scanner and printer, where the scanner works as an input device and the printer works as an output device.

FAQs on Input and Output Devices

1. list the disadvantages of crt monitor..

Some of the disadvantages of CRT Monitor are : High power consumption Big back and take up a lot of desk space. Because it is less bright than an LCD , it is not ideal for excessively bright environments. They’re big, heavy, and clumsy.

2. Compare Input & Output Devices.

3. what are the types of flat-panel displays.

There are 2 types of flat-panel displays , which are described below. Emissive Display: Devices that turn electrical energy into light are known as emissive displays. For example, LEDs, Plasma panels, thin film electroluminescent displays, etc. Non-Emissive Display: Optical effects are used in Non-Emissive displays to turn sunshine or light from another source into graphical patterns. LCDs are a good example (Liquid Crystal Devices).

4. Explain the output device: Plotter.

A plotter is a device that prints graphics in a variety of color formats with high-quality images. It’s similar to a printer but with more advanced capabilities. Plotter allows us to create pictures, 3D postcards, advertising signs, charts, and various designs of the internal structure of building machines, as well as print large maps, architectural drawings, large-format printing, and create pictures, 3D postcards, advertising signs, charts, and various designs of the internal structure of building machines.

5. Compare Impact & Non-Impact Printers.

Please login to comment..., similar reads.

  • School Learning
  • School Programming
  • Google Releases ‘Prompting Guide’ With Tips For Gemini In Workspace
  • Google Cloud Next 24 | Gmail Voice Input, Gemini for Google Chat, Meet ‘Translate for me,’ & More
  • 10 Best Viber Alternatives for Better Communication
  • 12 Best Database Management Software in 2024
  • 30 OOPs Interview Questions and Answers (2024)

Improve your Coding Skills with Practice

 alt=

What kind of Experience do you want to share?

SlidePlayer

  • My presentations

Auth with social network:

Download presentation

We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!

Presentation is loading. Please wait.

Input Devices.

Published by Isaac Kelly Modified over 6 years ago

Similar presentations

Presentation on theme: "Input Devices."— Presentation transcript:

Input Devices

COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 5 Input and Output.

devices of the computer presentation

In put Devices and Media In order for a computer to do anything it must be told what to do.

devices of the computer presentation

Chapter 5 p. 6 What Is Input? What is input? p. 230 and 232 Fig. 5-1 Next  Input device is any hardware component used to enter data.

devices of the computer presentation

Lesson 4 Alternative Methods Of Input.

devices of the computer presentation

Input and Output By Stephen Folmer Comm 165 MWF 9-10 Dr. Cagel By Stephen Folmer Comm 165 MWF 9-10 Dr. Cagel.

devices of the computer presentation

Input and Outputs Leslie Flores. What is an Input? Input consists of data and instructions. Input devices translate what people understand into a form.

devices of the computer presentation

Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.

devices of the computer presentation

Intermediate GNVQ ICT Input Devices and Methods Manual input devices are used by people to enter data by hand. Keyboard Pointing devices Joystick Digital.

devices of the computer presentation

GCSE Information Technology Input Devices and Methods 3 Manual input devices are used by people to enter data by hand. Keyboard Pointing devices Joystick.

devices of the computer presentation

1 Introduction to Computers Day 2. 2 Input Devices Input devices are used to feed data and instructions to the computer systems.They consist of a range.

devices of the computer presentation

Standard Grade Computing COMPUTER STUDIES Standard Grade INPUT DEVICES Chapter 16.

devices of the computer presentation

Muhammad Tehseen Qureshi.  What is input?  Input device is any hardware component that allows users to enter data and instructions  Data or instructions.

devices of the computer presentation

04/05/031 Computer Input and Output Dairne Jesperson Charles Darwin University.

devices of the computer presentation

GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.

devices of the computer presentation

Input devices are hardware components that enable users to interact with a computer. Without input devices, you would not be able to feed instructions.

devices of the computer presentation

Chapter 5 Input. What Is Input? What are the input devices? Input device is any hardware component used to enter data or instructions Data or instructions.

devices of the computer presentation

INPUT DEVICES. KEYBOARD Most common input device for a computer.

devices of the computer presentation

   Input Devices Main Memory Backing Storage PROCESSOR

devices of the computer presentation

Examining Input Devices Computer Concepts Unit B.

devices of the computer presentation

About project

© 2024 SlidePlayer.com Inc. All rights reserved.

INPUT DEVICES

Input devices

1. input devices, 2. introduction •when we work with computer we need to enter data and insructions to the computer using some devices. •these, 3. keyboard •standart input device attached tp all computers •layout is same as the traditional typewriter of the type qwerty •of, 4. keyboard layout, 5. standart keyboard, 6. multimedia keyboard, 7. wireless keyboard, 8. foldable keyboard, 9. mouse •pointing device used to move a graphical pointer on the screen • graphical pointer also called cursor • mouse consists, 10. serial mouse, 11. ps/2 mouse, 12. usb mouse, 13. optical mouse, 14. wireless mouse, 15. scanner •used to input a picture •analyzes images,printed text,or handwriting and converts it to digital image •common scanner, 16. micr reader, 17. omr scanner, 18. ocr scanner, 19. barcode reader, 20. joystick • input device that is used to control onscreen objects • a small lever called stick is used instead of cursor keys or, 21. joystick, 22. microphone •input device that is used for recording audio in a computer •to do this we also need a sound card installed in, 23. microphone, 24. digital camera •input device used for capturing and storing still images •we can connect digital camera to a computer and, 25. digital camera.

PowerShow.com - The best place to view and share online presentations

  • Preferences

Free template

Computer Input Devices PowerPoint PPT Presentations

Human Computer Interface (HCI)  Computer Systems in which Humans and Computers interact PowerPoint PPT Presentation

  • Generative AI
  • Office Suites
  • Collaboration Software
  • Productivity Software
  • Augmented Reality
  • Emerging Technology
  • Remote Work
  • Artificial Intelligence
  • Operating Systems
  • IT Leadership
  • IT Management
  • IT Operations
  • Cloud Computing
  • Computers and Peripherals
  • Data Center
  • Enterprise Applications
  • Vendors and Providers
  • Enterprise Buyer’s Guides
  • United States
  • Netherlands
  • United Kingdom
  • New Zealand
  • Newsletters
  • Foundry Careers
  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright Notice
  • Member Preferences
  • About AdChoices
  • E-commerce Affiliate Relationships
  • Your California Privacy Rights

Our Network

  • Network World

JR Raphael

Chrome Remote Desktop: 4 easy steps to get started

Want to sign into a computer from another desktop or a mobile device here's how to use google's chrome remote desktop to make the connection..

chrome remote desktop blue background

Once upon a time, in a world not so far away, accessing a computer remotely required all sorts of costly, complicated software and technical know-how.

These days, it’s a different story. Google’s free Chrome Remote Desktop service makes it dead-simple to get on any computer — Windows, Mac, Linux, or ChromeOS — from practically any other desktop or mobile device. You can access all of the remote system’s contents and even click around as if you were sitting right in front of it.

Chrome Remote Desktop can be useful for signing into your own personal or work computer from afar, and it can be equally valuable for peeking in on someone else’s system — be it your co-worker’s or your mother’s — to provide hands-on help without having to be in the same location.

And best of all? Getting the service up and running is easy as can be. In fact, all you need to do is decide what type of connection you want and then complete a couple quick steps, and you’ll be remotely connecting like nobody’s business.

(Note that Chrome Remote Desktop might not work with company-managed Google Workspace accounts. In that scenario, it’s up to the IT department to decide .)

Using Chrome Remote Desktop to access your own computer

Step 1: prepare the computer for connections.

If you want to be able to access your own computer from another desktop or mobile device, start by opening up Chrome on the host computer (or downloading and installing Chrome , if you’re using a Windows, Mac, or Linux system that somehow doesn’t already have it).

Within Chrome, navigate to the “Remote Access” section of Google’s Chrome Remote Desktop web app and click the circular blue arrow icon inside the box labeled “Set up remote access.” (If you see a blue button labeled “Turn On” instead of a blue arrow, congratulations: You’re one step ahead! Skip the next paragraph, and you’ll be back on track.)

You’ll then be prompted to download the Chrome Remote Desktop extension . Follow that prompt, then click the blue “Add to Chrome” button on the page that pops up and confirm you want to proceed. Once that’s finished, go back to your original tab and click that same “Turn On” button we mentioned a moment ago. If you still don’t see it, refresh the page, and it should appear.

01 chrome remote desktop name computer

You can give your computer any name you want, so long as you’ll recognize it. (Click image to enlarge it.)

Once you’ve given the computer a name and clicked the “Next” button, you’ll be prompted to create a PIN with at least six digits. For security purposes, you’ll need that PIN — in addition to being signed into your Google account — in order to access the computer remotely. (Google says all Remote Desktop sessions are also encrypted for extra protection.)

And that’s just about it: Your operating system may pop up a warning making sure you want to allow the app access to initiate a remote connection (and some versions of macOS may additionally require you to grant a couple permissions to Chrome Remote Desktop in System Preferences), but after you’ve confirmed that, the Chrome Remote Desktop tab will show you that the computer is online and waiting.

The computer will remain available anytime it’s powered on and Chrome is running (and since Chrome typically starts itself automatically and runs in the background, that means it’ll probably be available anytime the computer is awake — period). Just note that if you want connections to remain possible for an extended period of time, you may have to visit your computer’s power management settings to make sure the system won’t enter hibernation mode (even if the display shuts off).

If you ever want to disable remote connections, just go back to remotedesktop.google.com/access or click the Chrome Remote Desktop icon within your browser’s extension menu (the puzzle-shaped icon to the right of the address bar). You can then click the trash can icon alongside your computer’s name to remove it from the app. Alternatively, you can simply uninstall the extension altogether by clicking the three-dot menu icon next to its icon within the Chrome extension menu and selecting “Remove from Chrome.”

Step 2: Connect to the computer from another desktop or mobile device

Here’s the easy part: With your host computer all set for connections, all you’ve gotta do to access it from another desktop computer is go to that same Remote Desktop website — remotedesktop.google.com/access — within the Chrome browser. You’ll need to be signed into Chrome, using the same Google account you used on the host system, but you won’t need any particular apps or extensions installed; you’ll just see your computer’s name appear, and you can click on it to start the connection.

After tapping in your PIN, you’ll be in — and you can move around your screen, click and run anything you want, and generally just use the computer as if you were sitting in front of it. A panel at the side of the screen will provide options for adjusting the display and sending complex commands such as Ctrl-Alt-Del as well as transferring files between the two systems. (If you don’t see that panel right away, look for a translucent left-facing arrow at the far-right edge of the window. Click that, and the panel should appear.)

You can even copy text from one computer (using Ctrl-C) and then paste it immediately on the other (using Ctrl-V), if you want.

02 chrome remote desktop session

The host computer’s desktop is fully accessible in a browser tab, with a collapsible panel for advanced commands. (Click image to enlarge it.)

For mobile access, you’ll want to download the Chrome Remote Desktop app for iOS or Android . Provided your phone or tablet is signed into the same Google account you used on your computer, the app will automatically show the remote computer and allow you to connect to it with one quick tap and a typing of your PIN.

You’ll then be able to mouse around on your desktop using your fingers, scroll by sliding in any direction with two fingers together, or zoom by pinching two fingers inward or apart.

In the Android app, a control bar at the top of the screen will let you switch from that default “Trackpad mode” into a “Direct touch mode” — in which every touch on your screen is interpreted by the remote computer — as well as a choice of two combination trackpad-touch modes for the best of both worlds. You can also activate a keyboard mode to pull up your device’s on-screen keyboard and enter text.

Those same controls are available in the iOS Chrome Remote Desktop app, too, though you’ll have to tap a menu button in the lower-right corner of the screen to reveal them.

03 chrome remote desktop android app

Your entire desktop, at your fingertips — on your phone. (Click image to enlarge it.)

It isn’t the most elegant way to get around a computer — and you probably wouldn’t want to use it for any sort of intensive work — but it can be handy for quick-hit tasks like restarting your system from afar or grabbing a file you forgot to save to the cloud.

Using Chrome Remote Desktop to access someone else’s computer

If seeing someone else’s screen is what you’re after, the process for setting up Chrome Remote Desktop is slightly different. And since you presumably won’t be physically present at the host computer, you’ll need to provide these instructions to the person who will be there and able to complete this part of the setup.

On the computer you want to be accessed remotely, start by going to the “Support” section of Google’s Remote Desktop web app. Click the circular blue arrow within the box labeled “Share this screen,” then click “Add to Chrome” in the window that appears and confirm you want to install the Chrome Remote Desktop companion extension. (If you don’t see the blue arrow, the extension is already installed — and you’re one step ahead. Give yourself a pat on the back and keep going.)

04 chrome remote desktop support

The setup for a remote support session is slightly different, but the end result is the same. (Click image to enlarge it.)

Go back to your original tab, and you’ll find a prompt instructing you to click a “Generate Code” button in order to give someone else access. (Once again, if you don’t see that button, refresh the page — and it should appear.)

Clicking that button will create a one-time access code that’ll remain valid for only five minutes. Share that code with the person to whom you want to give access — on the phone, in an email or text message, or whatever works best — and then sit back and wait for their connection to begin.

Step 2: Connect to the computer from another desktop

Once you have the access code and are ready to connect, simply go to remotedesktop.google.com/support within Chrome on any other computer. Enter the access code in the “Give Support” box and then click the “Connect” button to begin.

(If you want to connect from a mobile device, you’ll need to open a new tab within Chrome on your phone, check the box in the browser’s main menu to request the desktop version of a site, and then navigate to that same link from there. The Chrome Remote Desktop mobile app works only with connections that are associated with your own Google account, so you won’t be able to use it in this context.)

The person on the other end will have to manually click a button to approve the connection (and macOS users may also have to grant permissions in System Preferences), and then you’ll be connected to their computer and able to click around and control it in the same manner described in the first part of this guide.

Not even remotely difficult — right?

This story was originally published in October 2017 and most recently updated in February 2024.

Related content

Apple: people in more than 92 nations are being surveilled, how to use pivottables and pivotcharts in excel, 18 ways to speed up windows 10, google adds a premium option for chrome enterprise, from our editors straight to your inbox.

JR Raphael

JR Raphael has been covering Android and ChromeOS since their earliest days. You can ingest his advice and insight in his long-standing Android Intelligence column at Computerworld and get even more tasty tech knowledge with his free Android Intelligence newsletter at The Intelligence .

More from this author

What everyone’s getting wrong about google’s chrome incognito saga, android 14 upgrade report card: predictable unpredictability, a hidden new twist to a top android chrome trick, 27 advanced trello tips and tricks, most popular authors.

  • Howard Wen Contributing Writer

devices of the computer presentation

Show me more

Jamf brings powerful new compliance tools to apple it.

Image

Google Workspace gets new genAI pricing options, Vids app

Image

The AI talent shortage — can companies close the skills gap?

Image

Is AR/VR set for another growth spurt? | Ep. 143

Image

Voice cloning, song creation via AI gets even scarier

Image

The link between smartphones and social media addiction

Image

Is AR/VR set for another growth spurt?

Image

To revisit this article, visit My Profile, then View saved stories .

  • Backchannel
  • Newsletters
  • WIRED Insider
  • WIRED Consulting

By Andy Greenberg and Matt Burgess

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind

Image may contain Silhouette Person and Photography

The scourge of software supply chain attacks —an increasingly common hacking technique that hides malicious code in a widely used legitimate program—can take many forms. Hackers can penetrate an update server to seed out their malware, or even break into the network where the software was developed to corrupt it at the source. Or, in the case of one particularly insidious software supply chain attacker known as Jia Tan, they can spend two years politely and enthusiastically volunteering to help.

Padlock with computer motherboard architecture inside

By Dan Goodin, Ars Technica

Over the weekend, the cybersecurity and open source software community was shocked by the news that a relatively new, experimental version of XZ Utils —a compression utility integrated into many popular distributions of Linux—contained a backdoor that would have allowed hackers in possession of a specific private key to connect to the backdoored system and run their own commands as an administrator. Only some chance detective work carried out by a lone Microsoft engineer, Andres Freund—who’d detected a strange delay in how the remote connection protocol SSH was running in a version of the Linux variant Debian—caught the spy trick before it ended up in many millions of systems worldwide.

That XZ Utils backdoor, it’s now clear, was inserted by none other than the lead open source steward of XZ Utils, a developer who went by the name Jia Tan. In the wake of the backdoor's discovery, a mystery percolating through the tech world remains: Who is Jia Tan, and who did he, or she—or very likely they —truly work for?

Jia Tan exploited open source software’s crowdsourced approach to coding whereby anyone can suggest changes to a program on code repositories like GitHub, where the changes are reviewed by other coders before they’re integrated into the software. Peeling back Jia Tan’s documented history in the open source programming world reveals that they first appeared in November 2021 with the GitHub username JiaT75, then made contributions to other open source projects using the name Jia Tan, or sometimes Jia Cheong Tan, for more than a year before beginning to submit changes to XZ Utils.

By January 2023, Jia Tan’s code was being integrated into XZ Utils. Over the next year, they would largely take control of the project from its original maintainer, Lasse Collin, a change driven in part by nagging emails sent to Collin by a handful users complaining about slow updates. (Whether those users were unwitting accomplices, or actually working with Jia Tan to persuade Collin to relinquish control, remains unclear. None of the users replied to requests for comment from WIRED.) Finally, Jia Tan added their stealthy backdoor to a version of XZ Utils in February of this year.

That inhumanly patient approach, along with the technical features and sophistication of the backdoor itself, has led many in the cybersecurity world to believe that Jia Tan must, in fact, be a handle operated by state-sponsored hackers—and very good ones. “This multiyear operation was very cunning, and the implanted backdoor is incredibly deceptive,” says Costin Raiu, who until last year served as the most senior researcher and head of the global research and analysis team at Russian cybersecurity firm Kaspersky. “I’d say this is a nation-state-backed group, one with long-term goals in mind that affords to invest into multiyear infiltration of open source projects.”

This Woman Will Decide Which Babies Are Born

David Gilbert

DuckDuckGo Is Taking Its Privacy Fight to Data Brokers

Matt Burgess

Beeper Took On Apple’s iMessage Dominance. Now It’s Been Acquired

Lauren Goode

As for which nation, Raiu names the usual suspects: China, Russia, and North Korea. He says it’s still too early to know the true culprit. “One thing is for sure clear,” he adds. “This was more cunning than all previous software supply chain attacks I’ve seen.”

A Very Private, Very Busy Programmer

As scrutiny around Jia Tan has mounted since the revelation of the XZ Utils backdoor last Friday, researchers have noted that the persona has remarkably good operational security. Independent security reporter Brian Krebs writes that he could find “zero trace” of Jia Tan’s email address outside of the messages they sent to fellow open source contributors, even after scouring breached databases. Jia Tan also appears to have routed all their communications through a VPN with a Singaporean IP address .

The lack of any other online presence linked to Jia Tan points toward the account being a “single-purpose invented persona” and indicates how much sophistication, patience, and thought was put into developing the backdoor, says Will Thomas, an instructor at the SANS Institute, a cybersecurity training firm. The Jia Tan persona has vanished since the backdoor was discovered, and emails sent by WIRED to a Gmail address linked to it have gone unanswered. Jia Tan’s GitHub account has been suspended, a company spokesperson tells WIRED.

In fact, the only real footprints Jia Tan appears to have left behind were their contributions to the open source development community, where they were a prolific contributor: Disturbingly, Jia Tan’s first code change was to the “libarchive” compression library, another very widely used open source component. That first change swapped one function with a less secure alternative, potentially attempting another malicious code change, notes developer Evan Boehs in his detailed Jia Tan timeline —though the problem has since been fixed.

In total, Jia Tan made 6,000 code changes to at least seven projects between 2021 and February 2024, according to Michael Scott, the cofounder of the cybersecurity firm NetRise who previously worked in the Marine Corps cyberwarfare group under US Cyber Command. Determining all the branching effects of those changes is nearly impossible, Scott says. Because those changes, known as “commits,” are often batched into collections in a process known as “squashing commits,” it’s not always apparent which exact changes were made by Jia Tan. And the difficulty of tracing which of the many versions of a library like libarchive ended up in which software adds yet another layer of obfuscation. “It’s going to be a bit of a mess pulling on this thread and trying to figure out where all these things ended up,” Scott says.

Scott notes that, throughout this time, Jia Tan was also emailing with other contributors, writing in a “very concise, very dry,” but not unfriendly tone that Scott compares to the output of ChatGPT. “Nice job to both of you for getting this feature as far as it is already,” Jia Tan wrote at one point. Or, at another: “Let me know your thoughts on these patches when you have a chance :)” Jordi Mas, a developer who contributed to XZ Utils and had emailed “feedback” from Jia Tan, says in retrospect that the account went to extra levels to build trust in the persona.

Ultimately, Scott argues that those three years of code changes and polite emails were likely not spent sabotaging multiple software projects, but rather building up a history of credibility in preparation for the sabotage of XZ Utils specifically—and potentially other projects in the future. “He just never got to that step because we got lucky and found his stuff,” says Scott. “So that’s burned now, and he’s gonna have to go back to square one.”

Technical Ticks and Time Zones

Despite Jia Tan’s persona as a single individual, their yearslong preparation is a hallmark of a well-organized state-sponsored hacker group, argues Raiu, the former Kaspersky lead researcher. So too are the technical hallmarks of the XZ Utils malicious code that Jia Tan added. Raiu notes that, at a glance, the code truly looks like a compression tool. “It’s written in a very subversive manner,” he says. It’s also a “passive” backdoor, Raiu says, so it wouldn’t reach out to a command-and-control server that might help identify the backdoor’s operator. Instead, it waits for the operator to connect to the target machine via SSH and authenticate with a private key—one generated with a particularly strong cryptographic function known as ED448.

The backdoor’s careful design could be the work of US hackers, Raiu notes, but he suggests that’s unlikely, since the US wouldn’t typically sabotage open source projects—and if it did, the National Security Agency would probably use a quantum-resistant cryptographic function, which ED448 is not. That leaves non-US groups with a history of supply chain attacks, Raiu suggests, like China’s APT41 , North Korea’s Lazarus Group , and Russia’s APT29 .

At a glance, Jia Tan certainly looks East Asian—or is meant to. The time zone of Jia Tan’s commits are UTC+8: That’s China’s time zone, and only an hour off from North Korea’s. However, an analysis by two researchers , Rhea Karty and Simon Henniger, suggests that Jia Tan may have simply changed the time zone of their computer to UTC+8 before every commit. In fact, several commits were made with a computer set to an Eastern European or Middle Eastern time zone instead, perhaps when Jia Tan forgot to make the change.

“Another indication that they are not from China is the fact that they worked on notable Chinese holidays,” say Karty and Henniger, students at Dartmouth College and the Technical University of Munich, respectively. They note that Jia Tan also didn't submit new code on Christmas or New Year's. Boehs, the developer, adds that much of the work starts at 9 am and ends at 5 pm for Eastern European or Middle Eastern time zones. “The time range of commits suggests this was not some project that they did outside of work,” Boehs says.

Though that leaves countries like Iran and Israel as possibilities, the majority of clues lead back to Russia, and specifically Russia’s APT29 hacking group, argues Dave Aitel, a former NSA hacker and founder of the cybersecurity firm Immunity. Aitel points out that APT29—widely believed to work for Russia’s foreign intelligence agency, known as the SVR—has a reputation for technical care of a kind that few other hacker groups show. APT29 also carried out the Solar Winds compromise , perhaps the most deftly coordinated and effective software supply chain attack in history. That operation matches the style of the XZ Utils backdoor far more than the cruder supply chain attacks of APT41 or Lazarus, by comparison.

“It could very well be someone else,” says Aitel. “But I mean, if you’re looking for the most sophisticated supply chain attacks on the planet, that’s going to be our dear friends at the SVR.”

Security researchers agree, at least, that it’s unlikely that Jia Tan is a real person, or even one person working alone. Instead, it seems clear that the persona was the online embodiment of a new tactic from a new, well-organized organization—a tactic that nearly worked. That means we should expect to see Jia Tan return by other names: seemingly polite and enthusiastic contributors to open source projects, hiding a government’s secret intentions in their code commits.

Updated 4/3/2024 at 12:30 pm ET to note the possibility of Israeli or Iranian involvement.

You Might Also Like …

Navigate election season with our Politics Lab newsletter and podcast

Think Google’s “Incognito mode” protects your privacy? Think again

Blowing the whistle on sexual harassment and assault in Antarctica

The earth will feast on dead cicadas

Upgrading your Mac? Here’s what you should spend your money on

devices of the computer presentation

Dell Cameron

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

Andy Greenberg

It's Time to Switch to a Privacy-Focused Browser You Can Trust

David Nield

How to Protect Yourself (and Your Loved Ones) From AI Scam Calls

Reece Rogers

The Best Personal Safety Devices, Apps, and Wearables

Medea Giordano

The Incognito Mode Myth Has Fully Unraveled

' height=

Security Blog

How we built the new find my device network with user security and privacy in mind.

devices of the computer presentation

Keeping people safe and their data secure and private is a top priority for Android. That is why we took our time when designing the new Find My Device , which uses a crowdsourced device-locating network to help you find your lost or misplaced devices and belongings quickly – even when they’re offline. We gave careful consideration to the potential user security and privacy challenges that come with device finding services. During development, it was important for us to ensure the new Find My Device was secure by default and private by design. To build a private, crowdsourced device-locating network, we first conducted user research and gathered feedback from privacy and advocacy groups. Next, we developed multi-layered protections across three main areas: data safeguards, safety-first protections, and user controls. This approach provides defense-in-depth for Find My Device users.

How location crowdsourcing works on the Find My Device network

The Find My Device network locates devices by harnessing the Bluetooth proximity of surrounding Android devices. Imagine you drop your keys at a cafe. The keys themselves have no location capabilities, but they may have a Bluetooth tag attached. Nearby Android devices participating in the Find My Device network report the location of the Bluetooth tag. When the owner realizes they have lost their keys and logs into the Find My Device mobile app, they will be able to see the aggregated location contributed by nearby Android devices and locate their keys.

devices of the computer presentation

Find My Device network protections

Let’s dive into key details of the multi-layered protections for the Find My Device network:

  • Minimizing network data . End-to-end encrypted location data is minimally buffered and frequently overwritten. In addition, if the network can help find a Bluetooth tag using the owner’s nearby devices (e.g., if their own phone detects the tag), the network will discard crowdsourced reports for the tag.
  • Unknown tracker alerts. The Find My Device network is also compliant with the integration version of the joint industry standard for unwanted tracking. Being compliant with the integration version of the standard means that both Android and iOS users will receive unknown tracker alerts if the on-device algorithm detects that someone may be using a Find My Device network-compatible tag to track them without their knowledge, proactively alerting the user through a notification on their phone.
  • User Controls : Android users always have full control over which of their devices participate in the Find My Device network and how those devices participate. Users can either stick with the default and contribute to aggregated location reporting, opt into contributing non-aggregated locations, or turn the network off altogether. Find My Device also provides the ability to secure or erase data from a lost device .

In addition to careful security architectural design, the new Find My Device network has undergone internal Android red team testing. The Find My Device network has also been added to the Android security vulnerability rewards program to take advantage of Android’s global ecosystem of security researchers. We’re also engaging with select researchers through our private grant program to encourage more targeted research.

Prioritizing user safety on Find My Device

Together, these multi-layered user protections help mitigate potential risks to user privacy and safety while allowing users to effectively locate and recover lost devices.

As bad actors continue to look for new ways to exploit users, our work to help keep users safe on Android is never over. We have an unwavering commitment to continue to improve user protections on Find My Device and prioritize user safety.

For more information about Find My Device on Android, please visit our help center . You can read the Find My Device Network Accessory specification here .

Share on Twitter

No comments :

Post a Comment

  • #sharethemicincyber
  • #supplychain #security #opensource
  • android security
  • app security
  • chrome enterprise
  • chrome security
  • connected devices
  • federated learning
  • google play
  • google play protect
  • interoperability
  • iot security
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • private compute core
  • security rewards program
  • supply chain
  • targeted spyware
  • vulnerabilities

devices of the computer presentation

introduction to storage devices

Introduction to Storage Devices

Aug 07, 2014

4.71k likes | 12.12k Views

Introduction to Storage Devices. Storage Devices. Used to keep data when the power to the computer is turned off. Medium/media Location where data is stored. Hard Disk. Usually mounted inside the computer’s system unit. Can store billions of characters of data. Stated in forms of bytes:

Share Presentation

  • pleasant grove high school
  • external storage devices
  • medium media
  • optical storage

ova

Presentation Transcript

Storage Devices • Used to keep data when the power to the computer is turned off. • Medium/media • Location where data is stored.

Hard Disk • Usually mounted inside the computer’s system unit. • Can store billions of characters of data. • Stated in forms of bytes: • Megabytes, Gigabytes or Terabytes

Magnetic Storage • Recording of data onto disks or tape by magnetizing particles of an oxide based surface coating. • A fairly permanent type of storage that can be modified. • Used by mainframe or microcomputers

Floppy Disk • Round piece of flexible Mylar plastic covered with a thin layer of magnetic oxide and sealed inside a protective covering. • May be referred to as a “floppy” • 3½ disk capacity is 1.44 MB or 1,440,000 bytes

Solid-State Storage • Flash memory cards • Widely used in notebook computers • Used to record MP3 music files • Key chain hard drives • Key chain flash memory devices • Connects to a USB port

Optical Storage • Means of recording data as light and dark spots on CD or DVD. • Reading is done through a low-power laser light. • Pits • Dark spots • Lands • Lighter, non-spotted surface areas

CD-ROM • “CD – Read Only Memory” • Also called CD-R • CD-Read • Storage device that uses laser technology to read data that is permanently stored on compact disks, cannot be used to write data to a disk.

CD-RW • “CD-Read Write” • A storage device that reads data from CD’s and also can write data to CD’s. • Similar to a CD-ROM, but has the ability to write to CD.

DVD • DVD ROM • Digital Video Disk which is read only. • DVD-R • Digital Video Disk which can be written to one time. It then becomes read only. • DVD-RW • Digital Video Disk which can be rewritten to.

Blu-Ray Technology • New standard in storage • Blu-Ray • New disks use blue laser light instead of the red laser light used in traditional CD players • Disks may ultimately hold • Over 30GB on one-sided disks • Over 50GB on two-sided disks

Flash or Jump Drives • External storage devices that can be used like a external hard drive. • They have the capability to be saved to, deleted from, and files can be renamed just like with a normal hard drive.

Hot Swappable • A hot swappable device is one which can be replaced whilst the server is still in operation. • You should only hot swap components when the component and operating system supports it. • The following components can be hot swapped: RAM, disk drive, power supply, NIC, graphics cards. • Hot swappable components are more expensive. Often only necessary when you need to keep a server operational 24/7.

List of Devices for Secondary Storage • Magnetic tape and disks • Compact Disk Read-Only Memory (CD-ROM) • Write Once Read Many - (WORM) • Magneto-optical disks • Redundant Array of Inexpensive Disks (RAID) • Optical disks • Digital Video Disks • Memory cards • Flash memory • Removable storage

References • Computing Essentials 2005 • M. Guymon. Pleasant Grove High School

  • More by User

Storage Devices

Storage Devices

Storage Devices. A storage device is used to store instructions, data, and information when they are not being used in memory Magnetic disks use magnetic particles to store items on a disk’s surface. Storage Devices.

2.06k views • 18 slides

Storage Devices

Storage Devices. Intro. Most electronic devices need digital storage. It is important to understand the differences in storage devices and file sizes before making a purchase. Objectives. To understand File sizes To be able to mentally visualize file sizes

581 views • 0 slides

storage devices

storage devices

storage devices. Name : noor el- ostaz. Under the supervision of Ahmed Abu mosameh : Professor. Define Storage Devices.

576 views • 10 slides

Storage Devices

Storage Devices. Magnetic Storage Optical Storage Digital Storage. Magnetic Storage Devices. Surface is coated with magnetically sensitive material that reacts to a magnetic field. Types: Floppy Disks (Diskettes) Hard Disks External High Capacity Floppy Disks

890 views • 17 slides

Storage Devices

Storage Devices. Momina. What is a storage Device?. A storage device is a device used for storing something. Types of Storage Devices. Optical Eg . BLU Ray Compact Disks – CD-ROMS ; CD-R; or CD-RW DVD’s Magnetic Eg Hard Disks Magnetic tape Floppy Solid State Eg .

596 views • 16 slides

Storage Devices

Storage Devices. Contents. Introduction Types of Secondary storage devices Floppy Disks Hard Disks CD- Roms DVDs Pen Drives Blu Ray Disk. Introduction.

1.21k views • 19 slides

Storage Devices

Storage Devices. What is a storage device ?. Computer data storage, often called storage or memory, refers to computer components, devices, and recording media that retain digital data used for computing for some interval of time . .

633 views • 8 slides

Storage devices

Storage devices

Storage devices. Bits, Bytes, Kilobytes, MB, GB, Terabytes Hardware Moore’s law Disks Internal hard disk 500 GB – 2 TB (50-100 €) External hard disk 500 GB – 2 TB (50-100 €) Solid State Drive SSD 60 GB – 500 GB (50-300 €). Storage devices. Discs CD 700 MB and DVD 4 GB (~ 1 €)

257 views • 7 slides

Storage Devices

Storage Devices. Angela Baskerville Jessie Huynh Michael Lucado James Onley III. What is a storage device?. Any device on which data can be stored. Common Types of Storage Devices. FDD HDD Solid State vs. Magnetic Optical Drives CD/DVD/RW Blu-Ray Removable Storage Tape Drive

892 views • 48 slides

Storage Devices

Storage Devices. By : Reem Hasayen. Storage device. A storage device is a hardware device capable of storing information. There are two types of storage devices used in computers P rimary storage device such as RAM and Cache 2. Secondary storage device

1.17k views • 18 slides

Storage Devices

Storage Devices. or How to keep the stuff you’ve got. What is a storage device?. Provide a place to save your work RAM Way to give stuff to others Place for programs and data. Types of storage devices. Floppy disk (Removable) Hard disk (Fixed) CD-ROM

4.98k views • 8 slides

Storage Devices

Storage Devices. By Artiom Nistrean, Jimmy Aky ü z . Not forgetting Daniel Brown. Introduction. With out a storage devices you can not save anything and all your hard work will be for NOTHING! There is a different storage device for different tasks. Such as: floppy disk USB sticks CDs

765 views • 19 slides

Storage Devices

Storage Devices. Understanding Computers. Learning Objectives. State the typical capacities, strengths and weaknesses of different storage devices Describe how data is stored on a CD Describe how 0s and 1s are represented by pits and lands on a CD Name three types of optical storage device.

705 views • 14 slides

Storage Devices

Storage Devices. Magnetic devices. Optical Devices. Solid State Devices. Amazon warehouse. Wal -mart warehouse. Small Press Warehouse. Performance related specs. Access Speed or Access Time Capacity Life-time Price per byte. Poster Activity. Store, to store and storage.

844 views • 15 slides

Storage Devices

Storage Devices. Objectives. In this chapter, you will: -Understand how hard drives read and write data -Know the difference between tracks, sectors and cylinders -Understand the difference between high-level and low-level formatting

599 views • 28 slides

Storage Devices

Storage Devices. Primary storage: is the storage provided by memory in a computer system e.g. ROM/RAM. Secondary storage: is storage provided by peripheral devices other than memory. Storage Devices. Secondary storage: is required in a computer system for three reasons.

1.63k views • 17 slides

Introduction to Storage Devices

Introduction to Storage Devices. PROFITT Curriculum Basic Computer Skills Module 1 Hardware Concepts. Adapted from CTAE Resource Network – Used with permission. http://www.gactaern.org/curriculum_compnet_itessentials.html. Storage Devices.

533 views • 15 slides

Introduction to Storage Devices

367 views • 15 slides

Storage Devices

Storage Devices. Chapter 4. Memory Cache. Speeds up computer by storing data the computer has recently used Internal Cache: On CPU chip (L1 or primary cache External Cache: On the system board and consists of Static RAM (SRAM chips) Sometimes built into chip RAM – slower main memory

432 views • 16 slides

Introduction to Storage Devices

283 views • 15 slides

STORAGE DEVICES Introduction Comparision Storage Hierarchy

IMAGES

  1. 10 Input Devices Of Computer System

    devices of the computer presentation

  2. Introduction to Computing Devices and their usage

    devices of the computer presentation

  3. PPT

    devices of the computer presentation

  4. Explain various input devices of computer ?

    devices of the computer presentation

  5. presentation computer input devices

    devices of the computer presentation

  6. Computer technologies evolution

    devices of the computer presentation

VIDEO

  1. Basics of Computers

  2. Input Devices of Computer

  3. Basics of Computers

  4. Computer Basics: Basic Parts of a Computer

  5. Introduction To Computer System

  6. Output Devices of Computer| (Examples and purpose)

COMMENTS

  1. Input and output devices.pptx

    Output devices. An output device, such as a computer monitor or printer, can receive information from the computer, but it cannot send information to the computer. An input / output device, such as a CD-RW drive or USB flash drive, can send information to a computer and receive information from a computer.

  2. Introduction to Computers: What Is It and How Does It Work

    A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing. Generally, the term is used to describe a collection of devices that function together as a system. 2.

  3. Computer devices

    5 likes • 3,198 views. Dheenathayalan Ramasamy. Crisp power point presentation on devices used in computer. Education. 1 of 36. Download Now. Download to read offline. Computer devices - Download as a PDF or view online for free.

  4. Introduction to the Main Parts and Types of Computers

    It covers the following points, viz., 1. Introduction to Computer 2. Main Parts of Computer 3. Types of Computer 4. Storage Unit vs. Memory Unit 5. Classification on Working System 6. Types of Network 7. Classification of Computer- Based on Size 8. Some Important Extensions.

  5. Chapter 1: Introduction to Computer

    Download ppt "Chapter 1: Introduction to Computer". Computer A computer is an electronic device, operating under the control of instructions stored in its own memory that can accept data (input), process the data according to specified rules, produce information (output), and store the information for future use.

  6. Input and Output Devices

    Input/output devices, as the name implies, are capable of delivering data (output) to and receiving data from a computer (input). An input/output (I/O) device is a piece of hardware that can take, output, or process data. It receives data as input and provides it to a computer, as well as sends computer data to storage media as a storage output.

  7. Chapter 1 Computer Hardware.

    Physical devices (aspect) of a computer. Computer hardware can be classified into two: CPU (Central Processing Unit) and Peripherals. 5 X Place a cpu and system unit. 6 COMPUTER PERIPHERALS Input/output (I/O) devices. Usually electromechanical devices Online devices vs offline devices. 7 INPUT DEVICES.

  8. PPT

    MONITOR/DISPLAY Monitors or displays are the primary output devices for computers. They present visual information, text, images, videos, and graphical user interfaces (GUIs) to users. Monitors come in various types, including LCD (liquid crystal display), LED (light-emitting diode), OLED (organic light-emitting diode), and more. PRINTERS ...

  9. Input and output devices PowerPoint

    An informative PowerPoint to introduce pupils to the concept of computer inputs and outputs. The presentation explains the role of these devices and introduces children to the common examples they will encounter. Check out this page for some more useful 'Switched On' IPC resources all about technology.

  10. Input Devices.

    22 Microphone. 23 Digital Camera Input device used to take pictures and to store directly into the computer in digital form. 24 Digital Scanner Light sensing input device. Read images and text printed on paper and then translates into electronic form that can be processed and stored by the computer Also called image scanner.

  11. Input devices

    INPUT DEVICES. 2. INTRODUCTION •When we work with computer we need to enter data and insructions to the computer using some devices. •These. devices are called input devices. • These devices convert data and instructions to a form that. can be recognized by the computer. • Some of the commonly ised input devices are: Keyboard.

  12. Input and output devices PowerPoint

    This beautifully-illustrated and teacher-made input and output devices PowerPoint will teach children about different technological devices and how to use them. Computers and digital technology are a huge part of all of our lives. But it can be hard for young children to learn and understand how they interact with one another. This PowerPoint provides children with a clear explanation of the ...

  13. Input Device Of Computer System

    The Input devices of computer systems are electromagnetic devices which acknowledge information and accept data or set of instruction from outside the world and translate this data into machine meaningful and readable form. Computer Input devices acts as a medium of communication and correspondence between computer and the outside world. - A free PowerPoint PPT presentation (displayed as an ...

  14. PPT

    Qwerty Keyboard eITnotes.com. Point & Draw Devices A Pointing device is an input device that allows a user to input continuous and multi-dimensional data to a computer. Some of the point and draw devices are:-> • Mouse • Track Ball • Joy Stick • Light Pen • Touch Screen eITnotes.com. 1.

  15. PPT

    INPUT OUTPUT DEVICES A computer system needs to communicate with its external environment its user). The Input/output devices provide this capability to a computer system. they are also known as peripheral devices, because they surround a computer's cpu and memory. Download Presentation. dimensional movement. stereo phones. right signals movement.

  16. PPT on INPUT & OUTPUT DEVICES

    PPT on INPUT & OUTPUT DEVICES - Download as a PDF or view online for free ... The term "Audio Output Device" refers to any device that attaches to a computer for the purpose of playing sound, such as music or speech. The term can also refer to a computer sound card. Types Of Audio Output Device:- 1. Speakers 2. HeadPhones 3.

  17. Computer Input Devices PowerPoint PPT Presentations

    Computers can be defined as electronic devices that receive, store, and process input data, to generate the correct output, and to get the correct and desired output, the correct information or data must be entered into computers, computers process different types of data, which are entered by users, and these electronic devices implement ...

  18. 11 screen-mirroring devices for presenting wirelessly

    The Wireless Display Adapter works with Miracast systems, including Android and Windows systems, but it snubs sharing the screens of Macs, iPhones, iPads, and Chromebooks. The device is on the ...

  19. Chrome Remote Desktop: 4 easy steps to get started

    Step 2: Connect to the computer from another desktop or mobile device. Here's the easy part: With your host computer all set for connections, all you've gotta do to access it from another ...

  20. Presentation on computer

    Description on basic computer, Input and output devices. Engineering Technology. 1 of 14. Download Now. Download to read offline. Presentation on computer - Download as a PDF or view online for free.

  21. PPT

    During download, if you can't get a presentation, the file might be deleted by the publisher. E N D . ... Manual Input Devices: enter data into computer by hand Direct Data Entry Devices: transfer information automatically from a source document such as form or barcode into the computer. Manual Input Devices.

  22. The Mystery of 'Jia Tan,' the XZ Backdoor Mastermind

    However, an analysis by two researchers, Rhea Karty and Simon Henniger, suggests that Jia Tan may have simply changed the time zone of their computer to UTC+8 before every commit. In fact, several ...

  23. How we built the new Find My Device network with user security and

    How location crowdsourcing works on the Find My Device network. The Find My Device network locates devices by harnessing the Bluetooth proximity of surrounding Android devices. Imagine you drop your keys at a cafe. The keys themselves have no location capabilities, but they may have a Bluetooth tag attached. Nearby Android devices participating ...

  24. Presentation on input devices...

    110 likes • 85,382 views. simmi khera. an impressive presentation on input devices are here for you. Education. 1 of 33. Download Now. Download to read offline. Presentation on input devices... - Download as a PDF or view online for free.

  25. PPT

    4.71k likes | 12.05k Views. Introduction to Storage Devices. Storage Devices. Used to keep data when the power to the computer is turned off. Medium/media Location where data is stored. Hard Disk. Usually mounted inside the computer's system unit. Can store billions of characters of data.

  26. Intel® Gaudi® 3 AI Accelerator

    Scale Large Systems, Scale Great Performance. Great networking performance starts at the processor where Intel® Gaudi® 3 accelerator integrates 24200 Gigabit Ethernet ports on chip, enabling more efficient scale up in the server and massive scale out capacity for cluster-scale systems that support blazing-fast training and inference of models—large and small.