Podcast
Questions and Answers
Which type of keyboard has no hardware and must be analyzed by a software routine or by special hardware?
Which type of keyboard has no hardware and must be analyzed by a software routine or by special hardware?
What is the technique called that is used to detect a key press by outputting to the column lines with a 'walking zero' pattern and sensing the row lines to see if a low voltage is detected?
What is the technique called that is used to detect a key press by outputting to the column lines with a 'walking zero' pattern and sensing the row lines to see if a low voltage is detected?
What is the main problem with keyboards that is caused by the fact that when the contacts of a mechanical switch close, they bounce for a short time before staying together?
What is the main problem with keyboards that is caused by the fact that when the contacts of a mechanical switch close, they bounce for a short time before staying together?
What is the name of the technique used to prevent wrong codes from being generated when more than one key is held down at the same time?
What is the name of the technique used to prevent wrong codes from being generated when more than one key is held down at the same time?
Signup and view all the answers
What is the name of the technique used to take into account only one key pressed, and any additional keys that might have been pressed and released do not generate any codes?
What is the name of the technique used to take into account only one key pressed, and any additional keys that might have been pressed and released do not generate any codes?
Signup and view all the answers
What is the name of the hardware device that is available to detect a key press without using processor-intensive process?
What is the name of the hardware device that is available to detect a key press without using processor-intensive process?
Signup and view all the answers
What is the name of the organization that is used for a larger number of keys, with an n by m key organization?
What is the name of the organization that is used for a larger number of keys, with an n by m key organization?
Signup and view all the answers
What is the name of the cost-effective method used to assign each key to each buffer or port line for a small number of keys (1-8 keys)?
What is the name of the cost-effective method used to assign each key to each buffer or port line for a small number of keys (1-8 keys)?
Signup and view all the answers
What is the name of the technique used to ignore the reading from the keyboard until only one key closure is detected?
What is the name of the technique used to ignore the reading from the keyboard until only one key closure is detected?
Signup and view all the answers
What is the name of the technique used to store all closures in an internal buffer if the order of keys pressed is not crucial?
What is the name of the technique used to store all closures in an internal buffer if the order of keys pressed is not crucial?
Signup and view all the answers
What is the name of the device that is needed to eliminate the problem created when three adjacent keys at a right angle are present when using n-key rollover protection?
What is the name of the device that is needed to eliminate the problem created when three adjacent keys at a right angle are present when using n-key rollover protection?
Signup and view all the answers
What is the name of the technique used to prevent second and later key closures from generating a strobe until the earlier ones are released in n-key rollover protection?
What is the name of the technique used to prevent second and later key closures from generating a strobe until the earlier ones are released in n-key rollover protection?
Signup and view all the answers
Which type of keyboard has no hardware and must be analyzed by a software routine or by special hardware?
Which type of keyboard has no hardware and must be analyzed by a software routine or by special hardware?
Signup and view all the answers
What is the technique called that is used to detect a key press by outputting to the column lines with a 'walking zero' pattern and sensing the row lines to see if a low voltage is detected?
What is the technique called that is used to detect a key press by outputting to the column lines with a 'walking zero' pattern and sensing the row lines to see if a low voltage is detected?
Signup and view all the answers
What is the main problem with keyboards that is caused by the fact that when the contacts of a mechanical switch close, they bounce for a short time before staying together?
What is the main problem with keyboards that is caused by the fact that when the contacts of a mechanical switch close, they bounce for a short time before staying together?
Signup and view all the answers
What is the name of the technique used to prevent wrong codes from being generated when more than one key is held down at the same time?
What is the name of the technique used to prevent wrong codes from being generated when more than one key is held down at the same time?
Signup and view all the answers
What is the name of the technique used to take into account only one key pressed, and any additional keys that might have been pressed and released do not generate any codes?
What is the name of the technique used to take into account only one key pressed, and any additional keys that might have been pressed and released do not generate any codes?
Signup and view all the answers
What is the name of the hardware device that is available to detect a key press without using processor-intensive process?
What is the name of the hardware device that is available to detect a key press without using processor-intensive process?
Signup and view all the answers
What is the name of the organization that is used for a larger number of keys, with an n by m key organization?
What is the name of the organization that is used for a larger number of keys, with an n by m key organization?
Signup and view all the answers
What is the name of the cost-effective method used to assign each key to each buffer or port line for a small number of keys (1-8 keys)?
What is the name of the cost-effective method used to assign each key to each buffer or port line for a small number of keys (1-8 keys)?
Signup and view all the answers
What is the name of the technique used to ignore the reading from the keyboard until only one key closure is detected?
What is the name of the technique used to ignore the reading from the keyboard until only one key closure is detected?
Signup and view all the answers
What is the name of the technique used to store all closures in an internal buffer if the order of keys pressed is not crucial?
What is the name of the technique used to store all closures in an internal buffer if the order of keys pressed is not crucial?
Signup and view all the answers
What is the name of the device that is needed to eliminate the problem created when three adjacent keys at a right angle are present when using n-key rollover protection?
What is the name of the device that is needed to eliminate the problem created when three adjacent keys at a right angle are present when using n-key rollover protection?
Signup and view all the answers
What is the name of the technique used to prevent second and later key closures from generating a strobe until the earlier ones are released in n-key rollover protection?
What is the name of the technique used to prevent second and later key closures from generating a strobe until the earlier ones are released in n-key rollover protection?
Signup and view all the answers
Which type of keyboard requires a software routine or special hardware to analyze it?
Which type of keyboard requires a software routine or special hardware to analyze it?
Signup and view all the answers
What is the technique used for scanning a keypad?
What is the technique used for scanning a keypad?
Signup and view all the answers
What is the most common problem with keyboards?
What is the most common problem with keyboards?
Signup and view all the answers
What is the purpose of a dedicated keyboard controller hardware?
What is the purpose of a dedicated keyboard controller hardware?
Signup and view all the answers
What is the technique used to prevent wrong codes from being generated when more than one key is held down at the same time?
What is the technique used to prevent wrong codes from being generated when more than one key is held down at the same time?
Signup and view all the answers
Which technique used to resolve the problem of multiple key presses stores all closures in an internal buffer if the order of keys pressed is not crucial?
Which technique used to resolve the problem of multiple key presses stores all closures in an internal buffer if the order of keys pressed is not crucial?
Signup and view all the answers
Which technique used to resolve the problem of multiple key presses takes into account only one key pressed, and any additional keys that might have been pressed and released do not generate any codes?
Which technique used to resolve the problem of multiple key presses takes into account only one key pressed, and any additional keys that might have been pressed and released do not generate any codes?
Signup and view all the answers
What is the technique used to scan a keyboard that has a large number of keys arranged in a row and column fashion?
What is the technique used to scan a keyboard that has a large number of keys arranged in a row and column fashion?
Signup and view all the answers
What is the purpose of a diode in series with every key?
What is the purpose of a diode in series with every key?
Signup and view all the answers
What is the technique used to detect which key has been pressed in a keyboard?
What is the technique used to detect which key has been pressed in a keyboard?
Signup and view all the answers
What is the technique used to read the keys in a keyboard that has a small number of keys (1-8 keys)?
What is the technique used to read the keys in a keyboard that has a small number of keys (1-8 keys)?
Signup and view all the answers
What is the main purpose of a keyboard?
What is the main purpose of a keyboard?
Signup and view all the answers
Encoded keyboards have no hardware and must be analyzed by software routines or by special hardware.
Encoded keyboards have no hardware and must be analyzed by software routines or by special hardware.
Signup and view all the answers
Detecting a key press is a processor-intensive process that requires continually selecting a column line and then reading the row lines.
Detecting a key press is a processor-intensive process that requires continually selecting a column line and then reading the row lines.
Signup and view all the answers
Row scanning is a technique used to detect a key press by outputting to the row lines with a 'walking zero' pattern and sensing the column lines to see if a low voltage is detected.
Row scanning is a technique used to detect a key press by outputting to the row lines with a 'walking zero' pattern and sensing the column lines to see if a low voltage is detected.
Signup and view all the answers
Non-encoded keyboards have no hardware and must be analyzed by a software routine or by special hardware.
Non-encoded keyboards have no hardware and must be analyzed by a software routine or by special hardware.
Signup and view all the answers
For a small number of keys (1-8 keys), each key can be assigned to each buffer or port line, and the keyboard can be connected directly to a buffer or port to read the keys by checking for a high level.
For a small number of keys (1-8 keys), each key can be assigned to each buffer or port line, and the keyboard can be connected directly to a buffer or port to read the keys by checking for a high level.
Signup and view all the answers
Contact bounce refers to the fact that when the contacts of a mechanical switch close, they bounce for a long time before staying together.
Contact bounce refers to the fact that when the contacts of a mechanical switch close, they bounce for a long time before staying together.
Signup and view all the answers
N-key rollover is the technique used to ignore the reading from the keyboard until only one key closure is detected.
N-key rollover is the technique used to ignore the reading from the keyboard until only one key closure is detected.
Signup and view all the answers
N-key lock-out takes into account all keys pressed and generates codes for all of them.
N-key lock-out takes into account all keys pressed and generates codes for all of them.
Signup and view all the answers
Most systems need a diode in series with every key to eliminate the problem created when three adjacent keys at a right angle are present with n-key rollover protection.
Most systems need a diode in series with every key to eliminate the problem created when three adjacent keys at a right angle are present with n-key rollover protection.
Signup and view all the answers
Hardware devices prevent second and later key closures from generating a strobe until the earlier ones are released in n-key lock-out.
Hardware devices prevent second and later key closures from generating a strobe until the earlier ones are released in n-key lock-out.
Signup and view all the answers
Dedicated keyboard controller hardware is available, but it reduces product cost.
Dedicated keyboard controller hardware is available, but it reduces product cost.
Signup and view all the answers
Scanning a keypad requires outputting to the row lines with a 'walking zero' pattern and sensing the column lines to see if a low voltage is detected, a technique known as 'column scanning'.
Scanning a keypad requires outputting to the row lines with a 'walking zero' pattern and sensing the column lines to see if a low voltage is detected, a technique known as 'column scanning'.
Signup and view all the answers
Study Notes
Keyboard Interfacing for Microprocessors
- A keyboard is a common method of input to microprocessors from humans, providing a low-cost way to input a large amount of information.
- A keyboard consists of pressure- or touch-activated switches arranged in a matrix, which requires a combination of hardware and/or software means to detect which key has been pressed.
- Two basic types of keyboards are available: encoded and non-encoded. Non-encoded keyboards have no hardware and must be analyzed by a software routine or by special hardware.
- For a small number of keys (1-8 keys), each key can be assigned to each buffer or port line, and the keyboard can be connected directly to a buffer or port to read the keys by checking for a low level.
- For a larger number of keys, the keyboard may be arranged in a row and column fashion, with an n by m key organization, also known as a matrix organization.
- Scanning a keypad requires outputting to the column lines with a "walking zero" pattern and sensing the row lines to see if a low voltage is detected, a technique known as "row scanning".
- Detecting a key press is a processor-intensive process that requires continually selecting a row line and then reading the column lines. Dedicated keyboard controller hardware is available, but it increases product cost.
- The most common problem with keyboards is contact bounce, which refers to the fact that when the contacts of a mechanical switch close, they bounce for a short time before staying together.
- When more than one key is held down at the same time, it is essential to detect this fact to prevent wrong codes from being generated. The two main techniques used to resolve this problem are the n-key rollover and the n-key lock-out.
- N-key rollover has two techniques: software ignores the reading from the keyboard until only one key closure is detected, or all closures are stored in an internal buffer if the order of keys pressed is not crucial. Hardware devices prevent second and later key closures from generating a strobe until the earlier ones are released.
- N-key lock-out takes into account only one key pressed, and any additional keys that might have been pressed and released do not generate any codes.
- A significant cost of n-key rollover protection is that most systems need a diode in series with every key to eliminate the problem created when three adjacent keys at a right angle are present. This increases the cost significantly and is seldom used on low-cost systems.
Keyboard Interfacing for Microprocessors
- A keyboard is a common method of input to microprocessors from humans, providing a low-cost way to input a large amount of information.
- A keyboard consists of pressure- or touch-activated switches arranged in a matrix, which requires a combination of hardware and/or software means to detect which key has been pressed.
- Two basic types of keyboards are available: encoded and non-encoded. Non-encoded keyboards have no hardware and must be analyzed by a software routine or by special hardware.
- For a small number of keys (1-8 keys), each key can be assigned to each buffer or port line, and the keyboard can be connected directly to a buffer or port to read the keys by checking for a low level.
- For a larger number of keys, the keyboard may be arranged in a row and column fashion, with an n by m key organization, also known as a matrix organization.
- Scanning a keypad requires outputting to the column lines with a "walking zero" pattern and sensing the row lines to see if a low voltage is detected, a technique known as "row scanning".
- Detecting a key press is a processor-intensive process that requires continually selecting a row line and then reading the column lines. Dedicated keyboard controller hardware is available, but it increases product cost.
- The most common problem with keyboards is contact bounce, which refers to the fact that when the contacts of a mechanical switch close, they bounce for a short time before staying together.
- When more than one key is held down at the same time, it is essential to detect this fact to prevent wrong codes from being generated. The two main techniques used to resolve this problem are the n-key rollover and the n-key lock-out.
- N-key rollover has two techniques: software ignores the reading from the keyboard until only one key closure is detected, or all closures are stored in an internal buffer if the order of keys pressed is not crucial. Hardware devices prevent second and later key closures from generating a strobe until the earlier ones are released.
- N-key lock-out takes into account only one key pressed, and any additional keys that might have been pressed and released do not generate any codes.
- A significant cost of n-key rollover protection is that most systems need a diode in series with every key to eliminate the problem created when three adjacent keys at a right angle are present. This increases the cost significantly and is seldom used on low-cost systems.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of keyboard interfacing for microprocessors with our quiz! From understanding the basics of keyboard organization to detecting key press and dealing with contact bounce, this quiz will cover all the essential topics. Learn about the different types of keyboards and techniques used to prevent wrong codes from being generated when multiple keys are pressed at the same time. Improve your understanding of n-key rollover and lock-out and their impact on system cost. Take our quiz now and see how much you know about keyboard interfacing for