Browse Definitions :
Definition

capacitive touch screen

Contributor(s): Matthew Haughn

A capacitive touch screen is a control display that uses the conductive touch of a human finger or a specialized device for input.

Unlike resistive and surface wave panels, which can sense input from either fingers or simple styluses, capacitive touch screen panels must be touched with a finger or a special capacitive pen or glove. The panel is coated with a material that can store electrical charges and the location of touch to the screen is signaled by the change in capacitance in that location.

When a capacitive panel is touched, a small amount of charge is drawn to the point of contact, which becomes a functional capacitor. The change in the electrostatic field is measured to find the location. In some designs, circuits located at each corner of the panel measure the charge and send the information to the controller for processing. In multi-touch screens, sensors are arranged in a grid to enable more complex input.

Input to resistive touch screens works through pressure resulting in two conductive layers being pressed together. In comparison, capacitive touch screens are not affected by outside elements, have high clarity and allow for easier functioning with lighter contact and greater accuracy.

Many current smartphones, tablets and other mobile devices rely on capacitive touch, including Android phones and Microsoft Surface, as well as Apple’s iPhone, iPad and iPod Touch.

See a video explanation of capacitive touch screens:

This was last updated in October 2013

Continue Reading About capacitive touch screen

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close