123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Tty

Profile Picture
By Author: Margaret Wilson
Total Articles: 3764
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In the early days of Unix, teletypewriters or ttys were used by users to communicate over a serial line with the mainframe computer. The mainframe had no keyboard or monitor as it has now and so during those early days, all commands were issued through the tty. The output of the commands was typed on the printer that was part of the tty. The tty terminals had no processing power of their own and hence were known as dumb terminals.

Every character that was typed on the tty was sent character by character over the serial line. While some ttys had the capability to send and receive mixed case letters, others did not. The mainframe responded to the type of characters that it received when the user logged on to the system. If the user has used small case to logon, the mainframe recognized that the tty was capable of mixed case and sent the output to the tty in mixed case as well. On the other hand, if it received only upper case characters from the user, it responded with upper case only.

Some ttys sported special features like the ability to use two colored ribbons: the standard black ribbon and a special red ribbon ...
... for typing words that carried special emphasis. The printers could also type bold face by typing a character twice in the same place.

Very soon, CRTs were added to the terminal as the standard output device eliminating the need to rely on the printer. These CRTs were predominantly monochrome with a green color character output. If the need arises, regular PCs can also be connected to a mainframe computer with the aid of a terminal emulation software. This software enables the PC to send requests to the mainframe and receive the output to be displayed on the monitor. tty is also the name of a Unix command that prints the name of the file connected to standard input on the standard output device.

Another electronic device that helps people with hearing impairment or speech disabilities to communicate over a regular telephone is also sometimes called a tty.
It is also called the telecommunications device for the deaf (TDD). The device helps people to carry on a conversation by typing text much similar to the way that text chat is done using Internet Messengers these days except the tty uses a regular telephone line for
the call.

This tty has a cradle and special acoustic cups to place the telephone receiver in order to convert each character typed on the keyboard to a unique sound. This sound travels through the telephone line to its destination, where the sound is again deciphered to its corresponding character and displayed as output. ttys are normally needed at both ends to carry on a text-based conversation. But a normal person wishing to communicate with another tty user can make use of a Telecommunications Relay Service (TRS) where an intermediate telephone operator listens to the voice of the phone user and types the message to the tty user and reads the feedback from the tty user back to the phone user.

Total Views: 215Word Count: 516See All articles From Author

Add Comment

Computers Articles

1. How To Develop An App From Scratch In 13 Steps
Author: goodcoders

2. 7 Steps To Create A Safe Mobile App
Author: goodcoders

3. Why Do Businesses Need Vendor Management Software?
Author: Kiran

4. React Native App Development By Alvi Software
Author: Alvi Software

5. Custome
Author: Owner

6. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

7. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

8. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

9. The Rise Of User Centered Web Design
Author: goodcoders

10. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

11. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

12. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

13. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

14. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

15. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: