chapter 3

the interaction

extras …

more about widgets

ELEMENTS OF THE WIMP INTERFACE -We studied previously that the four key features of the WIMP interface, that give it its name are – windows, icons, pointers and menus – and we will now describe these in turn. -There are also many additional interaction objects and techniques commonly used in WIMP interfaces, some designed for specific purposes and others more general. We will look at buttons, toolbars, palettes and dialog boxes. -Together, these elements of the WIMP interfaces are called widgets, and they comprise the toolkit for interaction between user and system.

Windows - Windows are areas of the screen that behave as if they were independent terminals (forming a limit, boundary) in their own right. A window can usually contain text or graphics, and can be moved or resized. More than one window can be on a screen at once, allowing separate tasks to be visible at the same time. Users can direct their attention to the different windows as they switch from one thread of work to another. -Tiling Windows If one window overlaps the other, the back window is partially obscured, and then refreshed when exposed again. Overlapping windows can cause problems by obscuring vital information, so windows may also be tiled, when they adjoin but do not overlap each other.

Windows (cntd) - Alternatively, windows may be placed in a cascading fashion, where each new window is placed slightly to the right and below the previous window. In some systems this layout policy is fixed, in others it can be selected by the user.

Windows (cntd) -Usually, windows have various things associated with them that increase their usefulness. Scrollbars are one such attachment, allowing the user to move the contents of the window up and down, or from side to side. This makes the window behave as if it were a real window onto a much larger world, where new information is brought into view by manipulating the scrollbars. - There is usually a title bar attached to the top of a window, identifying it to the user, and there may be special boxes in the corners of the window to aid resizing, closing, or making as large as possible.

Icons -A small picture is used to represent a closed(minimized) window, and this representation is known as an icon. -By allowing icons, many windows can be available on the screen at the same time, ready to be expanded to their full size by clicking on the icon. Shrinking a window to its icon is known as iconifying the window. -When a user temporarily does not want to follow a particular thread of dialog, he can suspend that dialog by iconifying the window containing the dialog. The icon saves space on the screen and serves as a reminder to the user that he can subsequently resume the dialog by opening up the window.

Icons (cntd) -Icons can also be used to represent other aspects of the system, such as a recycle-binfor throwing unwanted files into. -Ideally Icons should be realistic representations of the objects that they stand for and not some arbitrary image. Arbitrary symbols are difficult for users to interpret.

Pointers - The pointer is an important component of the WIMP interface, since the interaction style required by WIMP relies very much on pointing and selecting things such as icons. -The different shapes of cursor are often used to distinguish modes, for example the normal pointer cursor may be an arrow, but change to cross-hairs when drawing a line. -Cursors are also used to tell the user about system activity, for example a watch, hour-glass cursor or an activity indicator may be displayed when the system is busy reading a file.

Pointers (cntd)

- All cursors have a hot-spot, the location to which they point. For example, take a look at the two arrows at the start of first arrow ( from left). The first arrow has a hot-spot at the top right, whereas the second arrow has a hot-spot on its top left. Sometimes the hotspot is not clear from the appearance of the cursor, in which case users will find it hard to click on small targets. When designing your own cursors, make sure the image has an obvious hot-spot.

Menus -A menu presents a choice of operations that can be performed by the system at a given time. We discussed before that our ability to recall information is inferior to our ability to recognize it from some visual cue. - Menus provide information cues in the form of an ordered list of operations that can be scanned. This implies that the names used for the commands in the menu should be meaningful and informative. - The pointing device is used to indicate the desired option. As the pointer moves to the position of a menu item, the item is usually to indicate that it is the potential candidate for selection.

Menus (cntd) - Menus are inefficient when they have too many items, and so cascading menus are utilized, in which item selection opens up another menu adjacent to the item, allowing refinement of the selection. Several layers of cascading menus can be used.

Menus (cntd)

-Another approach to menu selection is to arrange the options in a circular fashion. The pointer appears in the center of the circle, and so there is the same distance to travel to any of the selections. This has the advantages that it is easier to select items, since they can each have a larger target area, and that the selection time for each item is the same, since the pointer is equidistant from them all. However, these pie menus, as they are known, take up more screen space and are therefore less common in interfaces.e.g Circle Dock for windows.

Menus(cntd) - The major problems with menus in general are deciding what items to include and how to group those items. -Menu items should be ordered in the menu according to importance and frequency of use, and opposite functionalities (such as ‘save’ and ‘delete’) should be kept apart to prevent accidental selection of the wrong function, with potentially disastrous consequences.

Buttons -Buttons are individual and isolated regions within a display that can be selected by the user to invoke specific operations. - ‘Pushing’ the button invokes a command, the meaning of which is usually indicated by a textual label or a small icon. - Buttons can also be used to toggle between two states, displaying status information such as whether the current font is italicized or not in a word processor. -Toggle buttons can be grouped together to allow a user to select one feature from a set of mutually exclusive options, such as the size in points of the current font.

Buttons (cntd) - If a set of options is not mutually exclusive, such as font characteristics like bold, italics and underlining, then a set of toggle buttons can be used to indicate the on/off status of the options. This type of collection of buttons is sometimes referred to as check boxes.

Toolbars -Many systems have a collection of small buttons, each with icons, placed at the top or side of the window and offering commonly used functions. -The function of this toolbar is similar to a menu bar, but as the icons are smaller than the equivalent text more functions can be simultaneously displayed. - Sometimes the content of the toolbar is fixed, but often users can customize it, either changing which functions are made available, or choosing which of several predefined toolbars is displayed.

Palettes -A palette is usually a collection of icons that are reminders of the purpose of the various modes. An example in a drawing package would be a collection of icons to indicate the pixel color or pattern that is used to fill in objects.e.g mspaint color palette at the bottom. -Palettes are a mechanism for making the set of possible modes and the active mode visible to the user.

Lecture 13.pdf

Page 2 of 20. ELEMENTS OF THE WIMP INTERFACE. -We studied previously that the four key features of the WIMP. interface, that give it its name are ...

3MB Sizes 1 Downloads 130 Views

Recommend Documents

Lecture 7
Nov 22, 2016 - Faculty of Computer and Information Sciences. Ain Shams University ... A into two subsequences A0 and A1 such that all the elements in A0 are ... In this example, once the list has been partitioned around the pivot, each sublist .....

LECTURE - CHECKLIST
Consider hardware available for visual aids - Computer/ Laptop, LCD ... Decide timing- 65 minutes for lecture and 10 minutes for questions and answers.

Lecture 3
Oct 11, 2016 - request to the time the data is available at the ... If you want to fight big fires, you want high ... On the above architecture, consider the problem.

pdf-1490\record-of-agard-lecture-series-lecture ...
... the apps below to open or edit this item. pdf-1490\record-of-agard-lecture-series-lecture-series-i ... unne-j-c-north-atlantic-treaty-organization-vannucci.pdf.

Lectures / Lecture 4
Mar 1, 2010 - Exam 1 is next week during normal lecture hours. You'll find resources to help you prepare for the exam, which will be comprehensive, on the.

Prize Lecture slides
Dec 8, 2011 - Statistical Model for government surplus net-of interest st st = ∞. ∑ ... +R. −1 bt+1,t ≥ 0. Iterating backward bt = − t−1. ∑ j=0. Rj+1st+j−1 + Rtb0.

Lecture Note_Spectrophotometry.pdf
Aug 18, 2016 - ... rival UV‐Visible spectrometry. for its simplicity simplicity, versatility versatility, speed, accuracy accuracy and. cost‐effectiveness. Page 1 of 34 ...

Lecture 9
Feb 15, 2016 - ideological content have persisted among the American public from 1987 to 2012.2 ... That is, learning is social and takes place within the individuals' ... independent network structures, deriving always consensus results.

Lectures / Lecture 4
Mar 1, 2010 - course website. After lecture today, there will also be a review section. • Assignments are graded on a /–, /, /+ basis whereas exams are graded.

Lectures / Lecture 7
Apr 5, 2010 - Contents. 1 Introduction (0:00–5:00). 2. 2 Security (5:00–112:00). 2 .... use it to distribute pornography, you don't have to pay for disk space or bandwidth, but you might make money off ... requests—the more of a threat you pose

Inaugural lecture
Jan 31, 2001 - Contemporary global capitalism results from interactions between economics, finance, and technology. Any number of ... the form of software, but in the creation of images, and symbols. You could view it as a .... formal structures, rul

Frederick Sanger - Nobel Lecture
and hence the number of amino acid residues present. Values varying from ... In order to study in more detail the free amino groups of insulin and other proteins, a general ... disulphide bridges of cystine residues. Insulin is relatively rich in ...

Lecture Capture - USFSM
Step 2 on the Crestron: Touch the Lecture Capture Mode to turn on the projector and camera. Page 2. Step 3 on the Crestron Choose Podium PC. Now you will see your desktop on the projector. Panopto. Step 1 Log in to myUSF. Page 3. Step 2 Launch Canvas

Lecture 1 - GitHub
Jan 9, 2018 - We will put special emphasis on learning to use certain tools common to companies which actually do data ... Class time will consist of a combination of lecture, discussion, questions and answers, and problem solving, .... After this da

Lecture(PDF)
Structured programming uses an approach whichistop down,. OOPuses an ... anyshape it get rotated clockwise 360 degree and a soundis also played.

Inquisitive semantics lecture notes
Jun 25, 2012 - reformulated as a recursive definition of the set |ϕ|g of models over a domain. D in which ϕ is true relative to an assignment g. The inductive ...

Lecture 1
Introduction to object oriented programming. • The C++ primitive data types (int, float, double, char, etc) can be used by declaring a variable and assigning a value to it. • Consider creating your own data type, a variable of which can hold mult

Lecture 02
Engr. Syed Rizwan Ali, MS(CAAD) UK,. PDG(CS) UK, PGD (PM) IR, BS (BCE) PK. HEC Certified – Master Trainer (MT-FPDP). Computer Sciences Department.

Lecture: 10
Create a class Circle derived from Point class. Apart from data of Point class circle should store its radius. W rite constructor and appropriate methods .

Lecture(PDF)
Use java.io package and throWS Exception. ... jaVa. ENProgram Filles NuJava Nijdk1.6.0_11NbinXjava Comments ... proce&&Or &Cheduling.memory J83ge.

Lectures / Lecture 7
Apr 5, 2010 - Next we might try passing a phrase like “DELETE FROM ... your hard drive. This is why you should never open attachments from sources you don't trust! • Worms are more insidious because they don't require user interaction in order to

Lecture Ludhiana - Al Islam
Publishers' Note. Lecture Ludhiana is the lecture delivered by Hadrat. Mirza Ghulam Ahmad, the Promised Messiah and. Mahdi, (1835-1908), on 4 November ...

Lecture Contents
May 12, 2012 - 3. Structure data type. Dr. Amal Khalifa, 2012. 5. Structure data Types. Dr. Amal Khalifa, 2012. 6. Type definition. Variable declaration. Member access ... 7 struct CDAccountV1 ←Name of new "type". { double balance;. ← member name