Touchstone Words

How External Peripherals Are Connected To A Computer | Touchstone Words

Popular Articles

Sexual activity and body health
Do You Know If You Are Sexually Active
Biofuel, Biodiesel, Environment, Fuel, Fossil Fuel, Energy, biohydrogen, biomethanol, biohyrdrogen d
Pros and Cons of Biofuel Energy
Porn actors who go to Hollywood
From Porn performances to Hollywood
social and economical state of a country
Pros and cons of capitalism vs socialism
Blockchain Hyperledger family
Intro to Hyperledger Family and Hyperledger Blockchain Ecosystem
Perceptions and mind thinking
What are perceptions and how to manage them
Hyperledger design model and framework architecture
Overview of Hyperledger Design Philosophy and Framework Architecture
Hyperledger fabric and its components
The Survey of Hyperledger Fabric Architecture and Components for Blockchain Developers
Taylor Swift nightmare songs
Top Ten Worst Taylor Swift Songs Shared by her Fans
Blow job tips
Pros and Cons of Blow Jobs

How External Peripherals are Connected to a Computer

By Shane Staret on 2018-05-14

Have you ever wondered exactly what is going on that allows a mouse to actually move the cursor on the screen? Or how a computer knows what key you are pressing on the keyboard? Or even, how a computer can manipulate the pixels on a monitor? Obviously, electricity plays a role in this, but how have we managed to actually utilize electricity to allow us to do these things?

Well, have you ever heard of the Universal Serial Bus (USB) cable? It’s that cable that takes three tries putting it in before you finally get it right every single time. Well, computers typically have a lot of ports for these kinds of cables, so basically everything used with a computer except for headphones which use a jack, are connected with a USB cable.

But connecting peripherals to the computer is not exactly all about just putting the end of the cable into the port. The computer has to actually install the device that has been plugged into the USB port. Modern operating systems typically support USB cables since their use is so widespread, so sometimes when you plug in a USB you don’t even realize that it had to be installed because the process was so quick. Essentially, what happens during the installation process is the exact same as when installing software. Code from the installer is being given to the local system (your computer) to be copied and placed in different sections of the computer. This is done so that the local system can then execute the code in its own way and the device can become usable on the system. So, the code installed when a new keyboard is plugged into a computer specifies what occurs when each button is pressed. Other programs on the system can then manipulate that code so that when a button is pressed, something else happens that what initially is supposed to. That is how we can use “w” when playing games to move the character “up”.

But, as stated before, USB cables are not the only way to connect a device to a computer. A jack can also be used to establish connection. A jack is typically used for headphones instead of a USB because of how they each process data, which can affect the sound. With modern computers, jacks are usually only used for audio output as they can be specialized to only transfer audio signals out of the jack and to the device (your headphones or speakers). Whereas, USB ports are typically used to transfer data from the device (like a mouse) and possibly even back to the device.

That is pretty much how it all works.  A device that has some kind of cable attached to it gets plugged into the computer, then the device attempts to install itself onto the local system. After this, the computer can allow the execution of the code that was installed onto it, which allows the external device to actually manipulate what is done on the computer. It is all quite fascinating as there truly is a lot that is going on, but all we have to worry about is plugging the cable into the right port...which can amazingly be the most difficult part of the process.

Article Comments

By Same Author

why Computer Ethics matter
Computer Ethics and the Moral Dilemma of the Internet
More info about internet speed
The Speed Limit of the Internet
Knowing syntax versus understanding coding
The Difference Between Knowing Syntax and Knowing How to Program
Learn about VPS
Why Virtual Private Networks are so Lovely
Learn coding now
How to Improve your Personal Programming Skills
How technology may go backward
Could Technology Possibly Regress
Cyber attacks via backdoors
Why Backdoors Are A Necessary Evil
Learn about computer freezing tasks
What Is Happening When Your Computer Freezes
Computer-generated Imagery and its evolution
The History of Computer-generated Imagery
Russian cyber attack on US election
Lessons to be Learned from the Russian Router Attack

Affiliated Companies

Disclaimers And Things

Copyright © WEG2G, All Rights Reserved
Designed & Developed by DC Web Makers