Solved

Mouses. graphics tablets, trackballs

Posted on 2000-02-23
2
580 Views
Last Modified: 2013-12-09
How do mouses, graphic tablets, trackballs work?? I would like to know how these devices are made and what the adv's and disadv's of them are!

Cheers


Melanie
0
Comment
Question by:Meltz_99
2 Comments
 

Accepted Solution

by:
DontPanic earned 100 total points
Comment Utility
Inside both mice and trackballs, there are two rollers that sense the horizontal and vertical movement of the ball.  This information is sent to a PS/2 or serial port on the computer, and a software driver decodes the information, and tells the operating system what the mouse is doing.
The main difference between a trackball and a mouse is user preference. (They both do the exact same thing).


I am not exactly sure about the grahic tablet, but usually they use a magnetic surface to detect the movement of the pointer. These devices are usually used when working with a complicated graphics design/presentation programs.

Mice and trackballs are more portable then a large graphic tablet, and unless the user was involved in a heavy amount of graphics design, a mouse or trackball would be best.
0
 
LVL 2

Expert Comment

by:Gryphon031198
Comment Utility
Tablets works on pressure senistive plates.  If you move the pen, the pressure you apply tells the computer where the pointer should be on the screen.

Ditto on the mouse/trackball

Gryphon
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now