A cursor is the position indicator on a computer display screen where a user can enter text. It is also known as a “caret.” The word cursor comes from the Latin word “cursorem,” which means runner.
The cursor is a visible and moving pointer that the user controls with a mouse, touchpad or similar input device such as a trackball. When a user moves the cursor, the computer redraws it at the new location.
Cursors are often used to highlight text or objects on the screen so that they can be selected. For example, in a word processor, the cursor can be used to select text, format it, and insert new text.
In a web browser, the cursor can be used to click links and scroll through pages. In many cases, the cursor can also be customized to suit the needs of the user. For example, some users may prefer to have a larger cursor that is easier to see, while others may prefer a smaller cursor that takes up less space on the screen.
In an operating system (OS) with a graphical user interface (GUI), the cursor is used to select and activate various user interface elements, such as menus, buttons and windows.
There are four main types of cursors: text insertion, pointing, selection and busy.
There are two ways to control a cursor: with a mouse and with keyboard shortcuts.
To control a cursor with a mouse or touchpad, simply move the mouse or finger in the direction you want the cursor to go. The cursor will follow the mouse pointer. To select text or other items, click and drag the cursor over the desired area.
To control a cursor with keyboard shortcuts, use the arrow keys on your keyboard to move the cursor in the desired direction. To select text or other items, hold down the Shift key and use the arrow keys to highlight the desired area.
While they may seem insignificant, cursors are one of the most essential elements of any operating system, as they provide one of the few ways for users to interact with the interface and perform various actions.
See also: TrackPoint, mickey, context menu, assistive technology, fetch, command prompt, brain-computer interface, natural user interface, command-line interface, hierarchical menu, Ctrl-Alt-Delete, mobile user interface, system tray.
Adversarial machine learning is a technique used in machine learning to fool or misguide a model with malicious input.
Data center interconnect (DCI) technology links two or more data centers together to share resources.
Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
Network availability is the amount of uptime in a network system over a specific time interval.
GPS jamming is the act of using a frequency transmitting device to block or interfere with radio communications.
A checksum is a value that represents the number of bits in a transmission message and is used by IT professionals to detect …
Security information and event management (SIEM) is an approach to security management that combines security information …
FMEA (failure mode and effects analysis) is a step-by-step approach for collecting knowledge about possible points of failure in …
A proof of concept (POC) is an exercise in which work is focused on determining whether an idea can be turned into a reality.
Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.
Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related …
A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (…
Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business …
The law of diminishing returns is an economic principle stating that as investment in a particular area increases, the rate of …
Customer engagement is the means by which a company creates a relationship with its customer base to foster brand loyalty and …
Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of …
All Rights Reserved, Copyright 1999 – 2022, TechTarget
Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information