Keyboard and Mouse Sample Clauses

The 'Keyboard and Mouse' clause defines the requirements and specifications for the provision, use, or compatibility of keyboards and mice in relation to a product or service. This clause may outline standards such as the type of keyboard (e.g., QWERTY layout), connectivity (wired or wireless), or ergonomic features that must be met. It can also specify whether these peripherals are included with a device or must be supplied by the user. The core function of this clause is to ensure that users have the necessary input devices to operate the product effectively, thereby preventing usability issues and clarifying responsibilities regarding hardware provision.
Keyboard and Mouse. 1. Key boards and mouse are to be replaced with a new one of reputed make as and when they are found to be malfunctioning/ Not working.
Keyboard and Mouse. 1) These items are to be checked regularly and made dust free and problem free. In case of defects they are to be replaced with reputed make.
Keyboard and Mouse. ❑ Keyboard-to-user distance allows user to relax shoulders with elbows hanging close to body. ❑ Keyboard position is flat. ❑ Mouse-to-user distance - mouse is directly next to the keyboard. ❑ Mouse is on the same level as the keyboard.
Keyboard and Mouse. 7.7.3.1 THE KEYBOARD DESIGN MUST PREVENT MALFUNCTION DUE TO KEY "BOUNCE," SIMULTANEOUS CLOSURE OF MULTIPLE KEYS OR SPILLAGE OF LIQUIDS. The keyboard design WILL prevent malfunction to key "bounce," simultaneous closure of multiple keys or spillage of liquids. 7.7.3.2 THE KEYS SHOULD BE FORMED BY DOUBLE-SHOT MOLDING TO PREVENT DIRT AND DUST FROM OBLITERATING THE LEGENDS. The keys WILL be formed by double-shot molding to prevent dirt and dust from obliterating the legends. 7.7.3.3 THE KEYBOARD MUST BE DETACHED OR DETACHABLE FROM THE WORKSTATION ON AN EXTENDED, COILED CABLE, AND ITS POSITION MUST BE ADJUSTABLE BY THE OPERATOR. The keyboard WILL be detached or detachable from the workstation on an extended, coiled cable, and its position CAN be adjustable by the operator.

Related to Keyboard and Mouse

  • Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Metadata Where the Contractor has or generates metadata as a result of services provided to the Province, where that metadata is personal information, the Contractor will: not use it or disclose it to any other party except where the Agreement otherwise specifies; and remove or destroy individual identifiers, if practicable.