• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

HCI is the study of how the users of computers utilise them to complete tasks in the environment they will finally be used in

Extracts from this document...

Introduction

What Is HCI? - Task One Introduction HCI stands for either Human Computer Interface or Human Computer Interaction. HCI is the study of how the users of computers utilise them to complete tasks in the environment they will finally be used in. Each of these are specific to each task, a HCI cannot be designed for just one set of users for one set of tasks and then just expect a different set of users to respond the same to a similar set of tasks in the same HCI. When designing an HCI system it is important to consider how the users will interact with computer devices and the system that is being created. It is important to consider all aspects including the tasks to be completed, the technology that is going to be used (e.g. input/output), how they will interact with the system and the environment the users will be using the system in. Within HCI the designer needs to bring all these together to match the technology with the users and the environment so the right system can be created for the users. ...read more.

Middle

Instead of using a device such as a mouse or tracker ball, you can use your finger to point to objects on the screen. Touch screens provide a natural interface for users with limited knowledge. Most users find touch screens tiring to the arms after long use. Mouse A device that controls the movement of the cursor or pointer on a display screen. A mouse is a small hand shaped item you can roll along a hard, flat surface. Its name is comes from its shape, which looks a bit like a mouse, its wire you can imagine to be the mouse's tail, and the fact that the user must make it scurry along a surface. As you move the mouse, the pointer on the display screen moves in the same direction. Mice contain at least one button and sometimes as many as three. Some newer mice also include a scroll wheel for scrolling through long documents. Monitor Another term for display screen. The term monitor usually refers to the entire box, where display screen can mean just the screen, but also the term monitor often means the box has graphics capabilities. ...read more.

Conclusion

type in name and address. Environment This is where the system will be used, this could be: * In a Home Environment (e.g. checkout on a website) * In a Office Environment (e.g. sales order processing program) * On a Street (e.g. handheld pc with questionnaire program on it) The way the system is designed could also be based on: * Temperature of the environment - should be around 21 degrees. * Lighting - should be overhead lighting of satisfactory light level. * Surroundings - background noise of offices such as noisy CPU fans and printers constantly going can add to stress levels. Legal Issues There are many legal issues surrounding working with computers, these include: * Display Screen - not sitting too close, at a satisfactory resolution * Data Protection - keeping personal details (names, addresses, credit details) safe and secure with the use of firewalls and passwords * Ergonomics - making sure that the user and the computer are aligned correctly not to cause strain to the user * Software Design - make sure that the software has not been designed before and copyrighted. Examples of HCI's * GUI Systems - Windows And Linux * Virtual Reality - Mostly Gaming * Flight Simulators James Cole BTEC ND IT Practitioner 28/04/2007 HCI ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Networking Diagrams and Case Study

    3 star(s)

    would be one way to monitor the network. 2. Users/Groups ? It?s recommended that the users/groups of the network is monitored regularly, due to potential ?hackers? gaining access into the VPN and assigning their new user all of the permissions, becoming a security problem for your network.

  2. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    a compass, a faster processor and a video recorder, the fourth generation which is the iphone4 has a rear face camera and it features higher- resolution display. The iphones are a mobile phone and you can access anything online anytime and it does not matter where you are.

  1. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    The policies and procedures that may influence the technical advice would consist of the companies training policies, budget, type of organisation (charity/ other), company culture, work pressure, user IT expertise and other factors. Training Policies A company with a good training policy would most definitely run more efficiently and be more professional.

  2. Ways of Promoting a Website

    How could the site be improved? - The site could be improved with newer pictures, possibly from games from the weekends, better graphical representations and more focused text. The self assessment questionnaire is very important when trying to achieve a website that is constantly achieving its potential.

  1. Security Issues of E-Commerce

    For this reason both users and businesses are affected by fraud. On the flip side a business may become affected with viruses and spy ware and this would allow an attack by someone in attempting to steal personal information. Email harassment, Employee privacy The above two are all to do with the protection of data.

  2. Firewall Protection

    just are not aware of it, a personal firewall can identify and block any external effort to communicate with the NetBIOS server on your computer. The more flexible personal firewalls can be set to restrict the authorization to communicate with the NetBIOS.

  1. Smart Card System

    Lock-and-key is configured using IP dynamic extended access lists. Lock-and-key can be used in conjunction with other standard access lists and static extended access lists. When lock-and-key is configured, designated users whose IP traffic is normally blocked at a router can gain temporary access through the router.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Section 3.1 - Justification of the proposed solution Justification for computerizing system The main reason for justifying the computerization of the system is because of the manual way of working takes a long time and it was understood that it could be improved computerization.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work