COMPUTER Class – I Chapter-6 Part 1 COMPUTER KEYBOARD

Total Page:16

File Type:pdf, Size:1020Kb

COMPUTER Class – I Chapter-6 Part 1 COMPUTER KEYBOARD COMPUTER Class – I Chapter-6 Part 1 COMPUTER KEYBOARD A pencil or a pen is needed to write in a notebook, but we cannot use a pencil or pen for writing on a computer. You have to use the keyboard to write/enter the information and instruction into a computer. It looks like a typewriter’s keyboard. It has many small button on it. These buttons are called keys. Whatever we type on the keyboard appears on the monitor at the cursor position. Cursor is a small blinking line on the monitor. There are usually 104 keys on the keyboard. There are different types of keys to perform different tasks. The different types of keys are as follows: ❖ Alphabet Keys ❖ Number Keys ❖ Function Keys ❖ Special Keys ALPHABET KEYS These keys are used for typing letters and words. The letters A to Z are written on these keys. The alphabet keys resemble the keys of a typewriter. Due to its first row of alphabet (Q,W,E,R,T,Y), it is called a QWERTY keyboard/keypad. NUMBER KEYS These are keys with numbers written on them. These keys are used to type numbers. One set of number keys are placed above the alphabet keys and another set is on the right side of the keyboard.(0-9) Numeric keypad can be used only when the NUM LOCK is ON. EXERCISES 1. Fill in the blanks: a. Small buttons on the keyboard are called -------------. b. There are usually------------keys on the keyboard. c. Keyboard is used to enter ------------- and -------------- into the computer. d. -------------key is used to move to the next line while typing. e. ------------- is used to give space between two words. 2. Choose the correct answers: a. It is used to type special symbols written on the upper side of the numeric keys and some other keys: i. Special Key ii. Shift Key iii. Symbol Key b. It erases letter to the left of the cursor: i. Erase Key ii. Delete Key iii. Backspace Key c. Number of keys usually available on keyboard: i. 100 ii. 104 iii. 105 d. Longest key of the keyboard: i. Space Bar ii. Caps Lock Key iii. Alt Key e. It is used to write in capital letter: i. Capital Key ii. Letter Key iii. Caps Lock Key Answers 1. a) Keys b) 104 c) information, instruction d) Enter e) Space bar 2. a) Shift key b) Backspace key c) 104 d) Space Bar e) Caps Lock Key .
Recommended publications
  • Mul-T-Lock 2016 Product Catalog Mul-T-Lock High Security & Access Control Solutions
    Mul-T-Lock 2016 Product Catalog Mul-T-Lock High Security & Access Control Solutions Effective January 1, 2016 TABLE OF CONTENTS Introduction 1 Grade 1 Hercular® Deadbolts 65 How to Order 4 Hercular® Anti-Ligature & Latch Locks 66 Multiple Platforms – A Security Level for Every Need 6 Grade 2 Cronus® Deadbolts 67 MT5®+ Platform Introduction 7 Locksets & Hardware 68 Interactive®+ Platform Introduction 8 Rim Locks 69 Integrator® Platform Introduction 9 Mortise Locks 70 Access Control, Keyless Entry & Smart Solutions 10 Lever & Knob Locks 71 WatchLock™ 11 Utility, Furniture & Retail Locks 73 Traka® Key & Asset Management Solutions 14 Padlocks 76 ENTR™ Smart Lock Solution 16 ArmaD Locks 79 Yale® Key Safes & Boxes 18 Mul-T-Lock Junior 82 CLIQ® E-Cylinders & Smart Key Solutions 20 Mul-T-Lock Parts 84 SMARTair® Access Control Solutions 26 Cylinder Parts - Pins 86 SMARTair® E-Motion Electronic Cabinet & Locker Locks 32 Cylinder Parts 100 Yale® Shine™ Glass Digital Door Locks 36 Hercular® Deadbolt Parts 138 Code-It™ Electronic Pushbutton Levers 38 Anti-Ligature Deadbolt & Gate Latch Lock Parts 142 GotU®+ Digital Door Viewers 40 Top Guard® Parts 143 Mul-T-Lock Keys, Keying Options & Services 42 Utility & Furniture Lock Parts 144 Keys & Cards 43 Padlock Parts 160 Services 47 Key Cutting Machine Parts 170 Machinery, Pinkits & Tools 48 Standard Ordering Form 174 Locksmith Tools 49 Master Keying Information 175 Cylinders 51 Key & Cylinder Maintenance 178 Mortise Cylinders 52 Warranty 180 Mogul Cylinders 52 Conditions of Sale 182 Rim Cylinders 53 Available Finishes 187 Large Format Interchangeable Cores 53 Knob, Lever and Deadbolt Replacement Cylinders 54 Foreign Cylinders 62 Deadbolts & Deadlatches 64 Established in 1973, Mul-T-Lock is a worldwide leader in the developing, manufacturing, and marketing of high security products for Institutional, Commercial, Industrial, and Residential customers.
    [Show full text]
  • Mac Keyboard Shortcuts Cut, Copy, Paste, and Other Common Shortcuts
    Mac keyboard shortcuts By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Option ⌥ Caps Lock ⇪ Shift ⇧ Control ⌃ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command.
    [Show full text]
  • DEC Text Processing Utility Reference Manual
    DEC Text Processing Utility Reference Manual Order Number: AA–PWCCD–TE April 2001 This manual describes the elements of the DEC Text Processing Utility (DECTPU). It is intended as a reference manual for experienced programmers. Revision/Update Information: This manual supersedes the DEC Text Processing Utility Reference Manual, Version 3.1 for OpenVMS Version 7.2. Software Version: DEC Text Processing Utility Version 3.1 for OpenVMS Alpha Version 7.3 and OpenVMS VAX Version 7.3 The content of this document has not changed since OpenVMS Version 7.1. Compaq Computer Corporation Houston, Texas © 2001 Compaq Computer Corporation COMPAQ, VAX, VMS, and the Compaq logo Registered in U.S. Patent and Trademark Office. OpenVMS is a trademark of Compaq Information Technologies Group, L.P. Motif is a trademark of The Open Group. PostScript is a registered trademark of Adobe Systems Incorporated. All other product names mentioned herein may be the trademarks or registered trademarks of their respective companies. Confidential computer software. Valid license from Compaq or authorized sublicensor required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products.
    [Show full text]
  • Openvms: an Introduction
    The Operating System Handbook or, Fake Your Way Through Minis and Mainframes by Bob DuCharme VMS Table of Contents Chapter 7 OpenVMS: An Introduction.............................................................................. 7.1 History..........................................................................................................................2 7.1.1 Today........................................................................................................................3 7.1.1.1 Popular VMS Software..........................................................................................4 7.1.2 VMS, DCL................................................................................................................4 Chapter 8 Getting Started with OpenVMS........................................................................ 8.1 Starting Up...................................................................................................................7 8.1.1 Finishing Your VMS Session...................................................................................7 8.1.1.1 Reconnecting..........................................................................................................7 8.1.2 Entering Commands..................................................................................................8 8.1.2.1 Retrieving Previous Commands............................................................................9 8.1.2.2 Aborting Screen Output.........................................................................................9
    [Show full text]
  • Regulatory Guide 5.12, Revision 1
    U.S. NUCLEAR REGULATORY COMMISSION October 2016 OFFICE OF NUCLEAR REGULATORY RESEARCH Revision 1 Technical Lead A. Tardiff REGULATORY GUIDE REGULATORY GUIDE 5.12 (Draft was issued as DG-5027, dated January 2015) GENERAL USE OF LOCKS IN THE PROTECTION AND CONTROL OF: FACILITIES, RADIOACTIVE MATERIALS, CLASSIFIED INFORMATION, CLASSIFIED MATTER, AND SAFEGUARDS INFORMATION A. INTRODUCTION Purpose This regulatory guide (RG) describes methods and procedures that the staff of the U.S. Nuclear Regulatory Commission (NRC) considers acceptable for the selection, use, and control of locking devices. Locks can be used in the protection of: areas, facilities, certain radioactive materials, and specific types of information (e.g., classified matter, National Security Information (NSI), Restricted Data (RD), Formerly Restricted Data (FRD), Safeguards Information (SGI)). Applicable Regulations • U.S. Code of Federal Regulations, “Domestic Licensing of Production and Utilization Facilities,” Part 50, Chapter I, Title 10, “Energy” (10 CFR Part 50), (Ref. 1). Specifically Section 10 CFR 50.34 "Contents of applications" requires under (c)(1) that "[e]ach applicant for an operating license for a production or utilization facility that will be subject to §§ 73.50 and 73.60 of this chapter must include a physical security plan" and under (c)(2) "[e]ach applicant for an operating license for a utilization facility that will be subject to the requirements of § 73.55 of this chapter must include a physical security plan…" • 10 CFR Part 50, Appendix R, “Fire Protection Program for Nuclear Power Facilities Operating Prior to January 1, 1979,” requires under III.N.4, that the fire brigade leader shall have ready access to keys for any locked fire doors.
    [Show full text]
  • Master Lock Safety Series Catalogue
    MASTER LOCK SAFETY SAFETY PADLOCKS LOCKOUT HASPS ELECTRICAL LOCKOUT VALVE LOCKOUT CABLE LOCKOUT & LOCK BOXES PADLOCK STATIONS & KITS TAGS 1 SAFETY LOCKOUT WHAT IS LOCKOUT? Lockout/tagout is an important safety procedure that involves shutting off the power to industrial machines or equipment during maintenance or repair. This procedure protects employees from risks caused by power sources. Used properly in conjunction with a well-planned lockout process, the safety padlock helps ensure that employees will not inadvertently activate a piece of equipment while someone else is working on it. 1 employee - 1 padlock - 1 key, this means all employees carry a unique key and no one else’s key can open another colleague’s safety padlock. SAFETY PADLOCK ORDERING PROCEDURES MASTER LOCK SAFETY LOCK MASTER Is your customer a Registered or Non Registered End User on the Master Lock Oracle Key Charting System? NO YES NON REGISTERED END USER REGISTERED END USER Recommended for small - medium end users. Recommended for large end users or end users with a concern about key code duplications. Orders will be supplied with randomly picked padlocks from the 108,000 key codes available. Orders will be registered with the Master Lock Oracle Note: Duplications may occur in subsequent orders. Key Charting System and will be assigned key codes to avoid the DANGER of key duplications. Stock: Ex Mayo Hardware warehouse. Ordering Process: No Special Ordering Requirements. Stock: Ex manufacturer 4-6 week lead time. Ordering Process: Special Ordering Requirements (Refer to below instructions). REGISTERED END USER SPECIAL ORDERING REQUIREMENT How do I register my End User? Simply arrange for your end user to complete the “MASTER LOCK KEY CHARTING REGISTRATION FORM” and forward with your official purchase order to Mayo Hardware Pty Ltd.
    [Show full text]
  • Mul-T-Lock 2017 Price Catalog Mul-T-Lock High Security & Access Control Solutions
    Mul-T-Lock 2017 Price Catalog Mul-T-Lock High Security & Access Control Solutions Effective January 1, 2017 TABLE OF CONTENTS Introduction 1 Large Format Interchangeable Cores 54 How to Order 4 Knob, Lever and Deadbolt Replacement Cylinders 55 Multiple Platforms – A Security Level for Every Need 6 Foreign Cylinders 65 MT5®+ Platform Introduction 7 Deadbolts & Deadlatches 68 Interactive®+ Platform Introduction 8 Grade 1 Hercular® Deadbolts 69 ClassicPro™ Platform Introduction 9 Hercular® Anti-Ligature & Latch Locks 72 Access Control, Keyless Entry & Smart Solutions 10 Grade 2 Cronus® Deadbolts 74 CLIQ® E-Cylinders & Smart Key Solutions 11 Locksets & Hardware 75 SMARTair® Access Control Solutions 17 Rim Locks 76 SMARTair® E-Motion Electronic Cabinet & Locker Locks 23 Mortise Locks 77 DONNA™ Multifamily and Hospitality 25 Lever & Knob Locks 78 Code-It™ Electronic Pushbutton Levers 27 Utility, Furniture & Retail Locks 80 KonnectLock™ (Formerly WatchLock™) 29 Padlocks 86 Traka® Key & Asset Management Solutions 32 ArmaD Locks 92 ENTR™ Smart Lock Solution 34 Mul-T-Lock Junior 95 GotU®+ Digital Door Viewers 37 Mul-T-Lock Parts 97 Yale® Real Living™ Residential Digital Locks 39 Cylinder Parts - Pins 100 Mul-T-Lock Keys, Keying Options & Services 41 Cylinder Parts 114 MT5®+ Keys & Cards 42 Hercular® Deadbolt Parts 152 Interactive®+ Keys & Cards 43 Anti-Ligature Deadbolt & Gate Latch Lock Parts 156 Old Interactive Keys 43 Top Guard® Parts 157 ClassicPro™ Keys & Cards 44 Utility & Furniture Lock Parts 158 Classic / Integrator® Keys & Cards 44 Padlock Parts 174 Services 46 Key Cutting Machine Parts 186 Machinery, Pinkits & Tools 47 Standard Ordering Form 190 Locksmith Tools 48 Master Keying Information 191 Cylinders 50 Key & Cylinder Maintenance 194 Mortise Cylinders 51 Warranty 196 Mogul Cylinders 51 Conditions of Sale 198 Rim Cylinders 53 Available Finishes 203 Established in 1973, Mul-T-Lock is a worldwide leader in the developing, manufacturing, and marketing of high security products for Institutional, Commercial, Industrial, and Residential customers.
    [Show full text]
  • (12) Patent Application Publication (10) Pub. No.: US 2010/0120003 A1 Herman (43) Pub
    US 201001 20003A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2010/0120003 A1 Herman (43) Pub. Date: May 13, 2010 (54) HOLISTIC APPROACH TO LEARNING TO Publication Classification TYPE (51) Int. Cl. G09B I3/00 (2006.01) (75) Inventor: Rita P. Herman, Pittsburgh, PA (52) U.S. Cl. 434/227 Us) - - - - -- r. (US) (57) ABSTRACT Correspondence Address: The present invention is directed to a method of teaching THE WEBB LAW FIRM, P.C. typing wherein the student associates the keys on the key 700 KOPPERS BUILDING, 436 SEVENTH board with a person, place, thing or emotion and is able to AVENUE more readily learn the position of each key. Further, the PITTSBURGH, PA 15219 (US) method of the present invention provides immediate gratifi cation to the student as they are able to instantly visually and (73) Assignee: Keyboard Town PALS, LLC, auditorily appreciate the accuracy of their typing on a com Pittsburgh, PA (US) puter monitor or screen that is attached to the keyboard. The delete key and/or backspace key may be inactivated during (21) Appl. No.: 12/269,916 operation of the program. Further, the color of the letters and background displayed on the monitor or screen may be vari (22) Filed: Nov. 13, 2008 able. As Patent Application Publication May 13, 2010 Sheet 1 of 4 US 2010/01 20003 A1 z NMOINMOGA. Patent Application Publication May 13, 2010 Sheet 2 of 4 US 2010/01 20003 A1 Nºwolqawoaxax zºsi Patent Application Publication May 13, 2010 Sheet 3 of 4 US 2010/0120003 A1 Patent Application Publication May 13, 2010 Sheet 4 of 4 US 2010/01 20003 A1 FIG.
    [Show full text]
  • Chapter 4 Using a Word Processor
    Chapter 4 Using a Word Processor Word is the Microsoft Office word processor application. This chapter introduces Word for creating letters and simple documents. Modifying a document and collaborating on a document are explained. What is a Word Processor? A word processor is a computer application for creating, modifying, printing, and e-mailing documents. It is used to produce easy-to-read, professional-looking documents such as letters, résumés, and reports. The Microsoft Word 2003 window looks similar to: ��������� �������� ������� ������ ��������������������� ��������������� ���������� The Word window displays information about a document and includes tools for working with documents: • The file name of the current document is displayed in the title bar. The name Document1 is used temporarily until the document is saved with a descriptive name. • Select commands from menus in the menu bar. Using a Word Processor 87 • Click a button on the toolbar to perform an action. Click the New Blank Document button ( ) to create a new document. • The rulers show the paper size. Markers on the rulers are used for formatting text. • The vertical line is the insertion point that indicates where the next character typed will be placed. In a new document the insertion Overtype Mode point is in the upper-left corner. It blinks to draw attention to its Overtype mode means that as location. text is typed it replaces exist- ing text, instead of inserting • View information about the current document in the status bar. characters. Overtype mode is • Links for opening a document or creating a new document are in on if the OVR indicator on the the Getting Started task pane.
    [Show full text]
  • REALFORCE Software User's Manual
    REALFORCE Software User's Manual Wrining!An electrical product may cause a fire, injury, or death if the safety precautions are not observed. Thank you for purchasing our product. This user manual describes the important precautions to prevent an accident and the methods of handling this product. Please read this manual carefully and use this product safely. This manual should be kept in a handy place for reference. 2018 Topre Corporation August 2018(First edition) 1 Contents ●Introduction 3 1. Installing procedure 3 2. Starting REALFORCE software 6 3. Adjusting the Actuation Point (for Models with the APC Function Only) 7 4. Adjust RGB-LED (For the REALFORCE RGB Series Only) 11 5. Selecting the key to be locked 19 6. Adjusting settings 20 7. Updating firmware 27 8. Saving of Settings for Keyboard and Saving and Reading of Setting Profile Data 34 9. Selecting a keyboard when two or more keyboards are connected 38 10. Exiting software 41 11. If you have a problem 42 2 ●Introduction This User’s Manual explains how to use REALFORCE with its exclusive software to adjust the settings for REALFORCE. 1. Installing procedure First, install the installer from the following URL: www.realforce.co.jp/support/ Cautiion! The software should be downloaded and used at your own risk. Topre will assume no responsibility for any problem or damage that has taken place as a result of downloading or using the software. Double-click and execute the installer. “Select language” will be displayed. Select “Japanese” or “English” and click “Next” in the lower right corner.
    [Show full text]
  • GLASS LOCKS CABINET LOCKS SHEET METAL CAM LOCKS PUSH LOCKS CAM LOCKS 624 623 623 621 622 614 614 615 615 616 616 617 618 618 619 Page Page 619~622 619~622
    LOCKS GLASS LOCKS CABINET LOCKS SHEET METAL CAM LOCKS PUSH LOCKS CAM LOCKS 612 HOW TO ORDER INDEX - LOCKS For all lock orders, please specify one of the following keying options at the time of order: • Keyed Alike: All locks will have the same key number, and can be unlocked with the same key. Good option for low-security environments, or when multiple displays need to be easily accessed. • Keyed Differently: Each lock will have a different key number, and cannot be unlocked with the same key. Option for higher security environments, lockers, etc, when access must be restricted. • Keyed Differently with Master Keying: Each lock will have a different key number; a master key can be used to access all locks. For higher security environments with restricted access, where a supervisor or custodian requires complete access. (Not available for all models, available by special order only. A master key surcharge may apply.) GLASS LOCKS Picture Item No. Key Changes Master Key Option Page XL-GC01 24 - 614 XL-GC02 24 - 614 XL-GC03 24 - 615 2100GLK 12 - 615 1300GL 1 Million 2520 changes per master key 616 2200GL 12 Master key option available 616 NO990 40,000 - 617 1310GL 1 Million 2520 changes per master key 618 1310GLW 1 Million 2520 changes per master key 618 MD-N1 7800 750 changes per master key 619~622 MD-MK1, K1 - - 619~622 1330GL-MK 7800 750 changes per master key 619 MILLION CABINET LOCKS Picture Item No. Key Changes Master Key Option Page 1830-MK 7800 750 changes per master key 621 6830-30MK 7800 750 changes per master key 622 7810 1 Million 2520 changes per master key 623 6810-SP - - 623 8810-24 3 Million 3000 changes per master key 624 www.sugatsune.com 1-800-562-5267 (U.S.A.
    [Show full text]
  • Lakeview School District 1:1 Chromebook Initiative Student Guide Introduction Chromebooks Are Simple and Easy to Use
    Lakeview School District 1:1 Chromebook Initiative Student Guide Introduction Chromebooks are simple and easy to use. They are easy to setup and manage. If you know how to use Google Chrome, the browser, you know most of it already. Then there are a few things that Chromebooks do differently. This quick guide will help you with those little things, and get started on your school work using your Chromebook! Chrome OS Chrome OS is the operating system used by Chromebooks. On a PC, the operating system is Windows, and for a MacBook, it is MacOS. Similarly, your Chromebook uses Chrome OS. If you have used Google Chrome, the browser, you will find this new operating system very familiar. On Chrome OS, you will use the browser, Google Chrome, to get things done. You will also be using various apps. The Keyboard You might have noticed even before Caps Lock switching on your Chromebook that the Chromebooks have a Search key instead of the Caps Lock key (it has a magnifying glass icon on it). keyboard is slightly different from other ● The Search key launches the apps menu. keyboards that you have used. By the way, to ● What if you really need caps lock? There is a keyboard switch on your Chromebook, you just have to shortcut. Alt + Search will enable caps lock. Use the same shortcut to disable caps lock. open the lid! For starters, there is no Caps Lock key. Delete The Delete key is also missing. Instead of the Most of the Chromebooks come without a Delete key.
    [Show full text]