This website uses cookies to ensure you have the best experience. Learn more

I/O Devices Essay

314 words - 2 pages

Kyle Poindexter
NT1110 Computer Structure and Logic
I/O Devices
Mrs. Coleman

What critical I/O devices are necessary to use a personal computer? Which ones are not necessary for normal day-to-day use and why?
A monitor and a keyboard are the two I/O devices necessary to use a personal computer. The monitor is the most important output device. It allows one to see the information that is being sent out by the computer. ...view middle of the document...

It is the primary method used to send information to a computer. Data entry cannot be performed without a keyboard. The keyboard can even be used to navigate the desktop if a mouse is not connected.
A mouse, game controller, printer, and modem are devices not necessary for day-to-day use of a PC. You cannot connect to the internet without a modem. Having a mouse makes using a computer more efficient. Day-to-day use can still be achieved even without a mouse, game controller, printer and a modem.
Why is a modem considered an I/O device?
A modem is a device connected to a personal computer and other computers via a network through a telephone or cable line. I sends and receives information to and from servers connected to the network simultaneously. This makes a modem both an input and output device.
Why may a printer be classified as an input device?
The printer is essentially an output device. The computer sends the printer the data to be printed. The printer does send information back to the computer. It will send the computer messages about low paper or errors. This sending of information from the printer to the computer makes the printer an input device as well.

Other Papers Like I/O Devices

Android Development For Beginners Essay

798 words - 4 pages devices powered by Android. The first beta version of the Android Software Development Kit (SDK) was released by Google in 2007 where as the first commercial version, Android 1.0, was released in September 2008. On June 27, 2012, at the Google I/O conference, Google announced the next Android version, 4.1 Jelly Bean. Jelly Bean is an incremental update, with the primary aim of improving the user interface, both in terms of functionality and

Operating System Essay

643 words - 3 pages the OS maintain tables of information for management purposes? * Memory- keep track of both main(real) second(virtual) memory * I/O- manage the I/O devices and channels of the computer system. * File- provide information about the existence of files, their location on secondary memory, their current status and other attributes. * Process- to mange processes. 3.9 List 3 general categories of information in a process control

Hardware & Software Concepts

572 words - 3 pages digit in a binary number is known as a bit. 6. What is the function of computer software? Data that provides the instructions for telling a computer what to do and how to do it. 7. Explain the function of I/O components and give at least three examples. Input components- Keyboard, mouse, CD/DVD, mic Output components- Speaker, printer, monitor, usb devices 8. What is the area along the boundary of a system that links the system’s


528 words - 3 pages to connect with the audience sense of reason. Logos was used in this ‘Google Chrome: Dear Sophie” to show the viewer how google email is use and possible features that come along with it. Besides, it also tells you that “Google is what you make it”. Nevertheless, I found this commercial to be persuasive, because it efficiently use all three rhetorical devices. Thus the commercial make the viewer used google on daily basic and as well as have

Rh Bill

870 words - 4 pages N O T O R E P R O D U C T I V E H E A L T H B I L L ! With the population of the country growing fast—three births following only one death of an individual—the government has been frantic about what to do as a response. Overpopulation has been one of the reasons why Philippines has been on twelfth of the most populated countries in the world and maybe even why our country tops the list of the poorest countries in the world. In

Information Security For Managers

2401 words - 10 pages century. Due to the new emerging technology like RFID and wireless devices there have been various issues regarding privacy and security of person and an enterprise. Security can be understood as a condition to protect against unauthorized access. In terms of IT, security can be categorized into application security, computing security, data security, information security, and network security. Source: (Whitman & Mattord 2007, p.5) Even

Cms And The Controversial Preventative Maintenance Mandate

1429 words - 6 pages Kyle Havens BMET 44000 Prof. Rachel Meyer 10/5/2014 Assignment #2 CMS and the Controversial Preventative Maintenance Mandate When I first opened up assignment #2, I noticed the topic was CMS and that was a good thing because I currently work for a medical delivery company that deals with the CMS on a daily basis. This research into their organization would allow me to understand them a little further than what I already know. CMS stand

Aceptable Use Policy

3671 words - 15 pages the system. n. I will address any questions regarding policy, responsibilities, and duties to my IASO and/or the Network Enterprise Center (NEC) Information Assurance Manager (IAM). o. I understand that each Information System (IS) is the property of the Army and is provided to me for official and authorized use. p. I understand that monitoring of SIPRNET and NIPRNET will be conducted for various purposes and information captured during monitoring

Patton-Fuller Community Hospital Networking

1230 words - 5 pages network more functional and efficient. Network Improvements The network at Patton-Fuller Community hospital for sure is good enough to run the hospital in is good enough to keep it operational but with newer medical devices, I think the Patton-Fuller can expand their network even further to compete with new hospital organizations that have recently updated their network to meet the needs support their new devices. For example, it is noted that in the

Impact Of Mobile Information And Communication Technology On Cybercrime

6752 words - 28 pages transaction volume and value is expected to have an average 42% annual growth between 2011 and 2016. As users continue to move more of their TABLE I. Ran k 01 02 03 Country region World China India United States No. of mobile phones 6,800,000,000+ 1,227,360,000 1,104,480,000 327,577,529 IJE RT Population 7,012,000,000 1,349,585,838 1,220,800,359 350,000,000 97 89.2 93.6 daily lives to their mobile devices, it is expected that

Business Proposal For Johnson And Johnson

1122 words - 5 pages Business Proposal for Johnson and Johnson ECOX/561 October 7, 2013 Karen Yancey Business Proposal for Johnson and Johnson Johnson and Johnson is a multinational medical devices, pharmaceutical, and consumer packaged goods company founded in 1886 by three brothers: Robert Wood Johnson, James Wood Johnson, and Edward Mead Johnson (Johnson and Johnson , 2013). In this business proposal the focus will be on

Related Essays

Vinegar Battery Essay

595 words - 3 pages microcontroller. For illustration- 8031 microcontroller does not have program memory on the chip. Embedded Memory Microcontroller – When an embedded structure is built with a microcontroller which comprise of all the functioning blocks existing on a chip it is named as embedded memory microcontroller. For illustration- 8051 microcontroller has all program & data memory, counters & timers, interrupts, I/O ports and therefore its embedded memory

Exploring Motherboard And Busses Essay

628 words - 3 pages efficiency when it comes to performance and installment, but may provide problems when it comes to repair. Modern motherboards include two or more memory slots. Memory slots vary in design according to the type of memory the system supports. Each memory slot includes locking levers that secure memory in place. Motherboards use expansion slots to provide support for additional I/O devices and high-speed video/graphics cards. The most common

Poetic Diction Essay

353 words - 2 pages or allusion given from Act III, below, to the purpose or theme of the play. Submit to the dropbox. Select another one yourself and post it to the discussion board. | If you would like to see how a close reading for allusion and other literary devices is executed, refer to the multimedia presentation “A Guided Tour of Close Reading”. | Allusion | Literal meaning | How it develops theme | Sources | I would have such a fellow whipped for

Term Paper

316 words - 2 pages . Utilizing the correct network switches per each domain. g. WPA 2 encryption policies to wireless access points. h. Securing server rooms from unauthorized access. 5.) LAN to WAN Domain i. Deactivating and closing off unused ports per the firewall to reduce the chance of unwanted network access. j. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent