The Research and Design of More Legible and Readable Key Legends for school children while operating Chinese computer keyboard

نویسندگان

  • Jen-Cheng Chen
  • Hsin-Hsi Lai
چکیده

For school children users, mostly less skilled in keying or unfamiliar with the keyboard, most key legends are important since a major proportion of the time is spent looking at the keyboard. The key legends need therefore to be as explicit and easy to understand as possible. In the initial experiment, we sampled twenty-one school children users to simulate the situation of computer keyboard operation. All subjects were requested to view the different designed key legends on the key-tops. We tried to find out the best Chinese character attributes including the style, shape, stroke width, size, and the location relationship on the computer key-tops. In the following experiments, we then adopted the well-known Chong-Je Keying words and tried the illegible Chinese keying words for the reference of related product designers.

منابع مشابه

اثر صفحه کلید های مختلف کامپیوتر بر وضعیت های مچ و ساعد

Introduction: In last decades, due to the increase in the number of VDT works prevalence of musculoskeletal disorders has increased among users. One of the main risk factors for those problems might be related to the computer keyboards. Keyboards might lead to these problems, in different ways. Keyboard geometry is one of the main ways. As a result, the various types and shapes of personal comp...

متن کامل

The Impact of Climate Change on Yield Potential of Maize across China

Maize is one of the major crops in China and its yield potential has been changedsignificantly by climate change induction during last five decades. The national policy of maizeproduction sufficiency emphasizes the necessity for a more accurate estimation of yieldpotential of maize at a national level. In this paper yield potential of maize was calculated usingthe Global Agro-Ecological Zones (...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Csc33200: Operating Systems, Cs-ccny, Fall 2003 I/o Management and Disk Scheduling 1 Diversity of I/o Devices 2 Operating System Design Issues 2.1 Generality

Why? I/O devices may differ from one another on all kinds of aspects. Some are human readable, suitable for communicating with the computer users, such as printers, monitors, speakers, keyboards, and mice. Some are machine readable, suitable for communicating with electronic equipments, such as disks and tapes. Some others are otherwise used for communicating with remote devices, such as modems...

متن کامل

An investigation Into Traditional Chinese Medicine Hospitals in China: Development Trend and Medical Service Innovation

Background This paper aims to investigate the development trend of traditional Chinese medicine (TCM) hospitals in China and explore their medical service innovations, with special reference to the changing co-existence with western medicine (WM) at TCM hospitals.   Methods Quantitative data at macro level was collected from official databases of China Health Statistical Yearbook and Extracts o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003