What’s Interactive Computing?

Print anything with Printful



Interactive computing involves data or commands entered into a computer by a person, using devices such as keyboards or touch screens. Biometric systems and cameras can also be used. All commands ultimately come from a person, and biometrics are often used for security. Some systems use motion-activated cameras or eye-tracking instead of traditional controllers.

Interactive computing is a generic name given to any form of data or commands that are entered into a computer by a person; this differs from non-interactive computing, where computer processes and functions are controlled by inputs from software, applications, or other computers. In a general sense, interactive computing consists of any software, whether it’s a game, word processor, or database, into which information or data is entered manually by a person, but some argue that all computers are technically interactive. A computer mouse and keyboard are often used to interact with a computer, but there are also biometric systems and touch screens that remove this hardware from the picture. Cameras can also be used to control a computer without the need for a mouse or computer.

Inputs for interactive computation can come from many sources, but must be done by a person. The most common form of interactive computing involves input given to the computer via keyboard and mouse. When a person types with a keyboard or clicks with a mouse, it sends an interactive signal to the computer to tell it to do something. This can be as simple as pressing a key on your keyboard. It can also be more complex, such as a person clicking a hyperlink that tells the computer to initiate a string of non-interactive commands.

It can be argued that all commands and inputs are ultimately a form of interactive computation. This is partially true because all commands, no matter how complex or seemingly non-interactive, come from a person typing a command or string of commands at some point. When a command is completed, the computer can start following its own non-interactive commands, but the primary command was in the form of interactive processing. Others argue that interactive commands are only those that engage the user, without requiring the computer to employ extensive non-interactive operation.

Electronic security commonly uses biometrics, a method of combining interactive computers with security. Smart cards, fingerprint readers, and retina scans are interactive computing methods used for security purposes. The person enters their biometric information to access phones, computers, and even facilities.

Along the same lines, other areas of interactive computing have allowed the mouse and keyboard to be removed entirely from the image. Some computers and gaming rigs have done away with keyboards, mice, and other controllers and use motion-activated cameras and programs that can track a person’s eyes or movements. These means offer users the ability to interact with their computers without having to use a control device.




Protect your devices with Threat Protection by NordVPN


Skip to content