Types of Software used to help Disabled people
Specialist software was created because it helps other people with a disability to be able to access the computer and other facilities within the computer.
In addition this may help people with other disabilities and find it very easy to access the
computer software without any problems.This program doesn't
only help disabled people but it also makes them feel like they are part of
something.
There are different types of software that can help make disabled people use the computer more effectively, below I will be showing you some of the software and tools.
I got this image online |
This image is the first equipment I
found on the internet which is called a video magnifier, this equipment is used
by most impaired users because it is very easy to use, it has a seven inch
"HD" screen which is very clear, this equipment also has five buttons
with large symbols which is very visible and it is in white and black.
In addition they can also change the magnification by 2.2 times, however there are also twelve high contrast colour mode which they may choose from and it is suitable for reading.
To conclude these colour modes helps
to lower their eye strain, in addition it does this by calibrating the cursor and and choosing to call anybody. This website shows how it works, this website will
back up my explanation. https://www.youtube.com/watch?v=kXCvzVAiaTI. With the help of this video, i explained what it was and how it works.
I took this image online |
This is my second image I found on
the Internet and it is called "Camera Mouse" impaired users use this
program because it lets them control the mouse pointer on a computer, the
reason being that they will be using their head and eyes to move the pointer.
To conclude this website shows how it works.
https://www.youtube.com/watch?v=lrrJvW3aaE4. With the help of this video, i explained what it was and how it works.
I got this image online |
I found this image online and it is called Assistive technology, however
it is an automatic communication device that helps them communicate with
either their parents or with have peers. Additionally they can make the technolgy talk by just looking at the screen or an icon on the screen.
This device is censored in other words it works with the person's
head movement.
To conclude these users use this device to do everything with it, the
reason being that they cannot use any other device such laptops because it
will cause eye strain. This website will help backup my
evidence;
https://www.youtube.com/watch?v=g95TO20hnmo. By the help of this video I explained what is was and how it works.
The On-Screen Keyboard and Test Readers
The On-Screen keyboard
This keyboard helps a lot of disabled users to
write either an email or on a word document easily. The way they use it is by
using the mouse to click the letters of their choice whilst seeing on the
screen, additionally they could also touch the screen which means they will
have to set it to be touch screen.
I took this image online |
This image shows
they have inserted "On-screen keyword" to write using Word Pad and by
doing this it makes it very easy for a visually impaired user to write whatever
it is he or she is about to write whether it’s a letter or an email.
To conclude it is
all up to the user whether he or she wants to write whilst clicking or they
want to set it up as touch screen where they will be touching the screen whilst
typing.
Text Readers
Text readers is a very useful software because it helps the visually impaired to listen to their emails, and other activities such as the software alerts when either they have mail or message.
The software
says " YOU HAVE MAIL" and the software will then read out the mail or
message, to conclude screen readers is available on Microsoft Windows which is
called "Microsoft Narrator".
The image above shows the Microsoft Narrator that I was explaining about, the user can change the settings of the way it works it all depends on the user.
They could change the voice command
which means they are changing how fast or how loud they want it to speak,
in addition this application is found on "Accessories on their computer,
which then they will have to look for "Ease of Access" then click on
“Narrator".
This website will help back up my
explanation,
The Equipment for Partially Sighted
There are different types of
ways to help the partially sighted when using a computer, we should be able to
help the partially sighted so that it will allow them to work and make them not feel left out.
This image shows
how I am using magnifier to make my writing bigger, the dialogue on the right
of the page is the settings of how to get a magnifier, additionally the user
can change the size of the magnifier it all depends on how he or she wants it
to be.
The top application shows how the user can choose
how much they can zoom in and out of the screen. Furthermore to be able to find
this application the user will have to go to "Accessories" which the
he or she will have to click on "Ease of Access" and find magnifier.
Full-Screen Mode:
Full-Screen Mode
is all about the computer screen being zoomed in, for example; if it is set to
100% then the whole screen will be zoomed to 100%. If you have the zoom in is
too big you may not be able to see the whole of the screen at some point in time.
Lens Mode:
I used Lens Mode in my screenshot whilst changing the settings, it is where you have a certain space that get magnified around your mouse cursor. It all depends on how big the user sets the area to in the settings and also how much area is around your mouse which is magnified.Docked Mode:
Docked Mode is
when the magnifier screen is in one position and the rest of your screen is the
same size but when you move the mouse around the screen it becomes magnified.
For more information you can go to this website to find out how to use
it. http://windows.microsoft.com/en-GB/windows-xp/help/turn-on-magnifier
Staying Safe Whilst using Specialist Communication Channel
Safety and Security:
Staying
safe whilst using blogs is always a good idea because clicking unnecessary
content whilst using the blog could bring virus onto your computer. So it is
recommended that before clicking on any links the user must scan to see whether
it is safe to use then and only then may he or she click the link.
Additionally
when commenting on a blog the user should be sure to always limit the amount of
personal information that he or she put on their blog, to conclude adding to
much information will increase the risks of people obtaining their details.
I got this image from the Internet |
Furthermore it is always a good idea to
look at sites that are safe and they do not have any virus attached to it
because once the user opens it, it will spread all over the computer which
could bad because it might corrupt the users files. In addition the user could
also find disclaimer which says that the user personal details will be used
securely, this simply means that they are entitled to keeping your details
protected.
Most of all comments on blogs could have
spammers, this is where there is bad comments on different user’s blogs. To
conclude when taking precaution, user should always be aware of people posting
abusive or threatening images or posts, they should never in any case try to
interact with them or do anything they tell you to, as you never know what the
consequences might be.
"http://www.wikihow.com/Keep-Your-Blog-Safe" This is the website I took most of my information from but I added some other information from my imagination.
Securing Personal Data
When the user is using a blog he or she should know to never reveal
any personal information about themselves at all times. If they are required to
enter their names or email address they should use a different name which will
benefit them in many ways, additionally they should never expose their true
identity.
If they make their passwords or usernames untraceable it will be very
difficult for spammers or hackers to track them down.
These users may also find a comment section at the bottom of the
blog where people post links to trick users into clicking on a mysterious links
that will lead users into entering personal information, hackers can use this
information to obtain your bank details and most especially it will cost the
user to be in debt.
I got this image online |
It is always a good idea for users to keep their personal details safe
when they are online so that hackers cannot access the personal files or bank
details, which is why it is always a good idea that it is kept somewhere safe
where only they have access to it, additionally giving an email address on blog
sites can get a lot information about you just like that. This therefore means
that it is important to remember that giving even a little piece of information
can give hackers access to all of your information.
To conclude this term is most commonly known as identity theft, this
where hackers get money from users unexpectedly, the best way to deal with this
situation will be to inform the bank immediately to block your card, in that
way the hackers will lose access to your details and your personal details will
be secured.
"http://www.stylist.co.uk/life/how-to-protect-your-personal-data" This is the website I took most of my information from but I added some other information from my imagination.
Data Protection
The user should always include the “Data Protection Act” when
creating a blog because it is always good to stay safe online, the most
essential problem is that the creator of the blog must follow the rules and
regulations into keeping the visitors details safe at all times.
Additionally it is required to be on the safe side when dealing
with personal detail, which therefore means that no customer or users personal
information is to be misused or by any means, obtained by other blogs.
"I
copied most of this text from my previous assignment but i just added the bit
about how to be safe whilst using the blog".
I got this image online |
Firewalls (Strong Passwords)
When
browsing online it is always safe to use firewall to protect the user’s computer
from getting virus unintentionally, which is why when users create their blogs they
always try and use firewall because it gives them a clear idea of how to stay
safe online.
Additionally this software was created to prevent any unauthorized
access into any other person’s computer, it can keep the user secure by
automatically analyzing data, and deciding whether the data is harmful or not.
To
conclude if it is dangerous it will be removed and the user will be notified if
the computer is in danger of getting unexpected virus in to his or her computer.
In order to protect their computer, the firewall will act as shield against any
harmful sites.
I got this image online |
Strong
passwords will always help keep your data or document safe, the reason being
that it will reduce the risks of people guessing any users password, when
creating a password it must have a combination of symbols, numbers or letters
to stay unshakable.
This
is so that the password is going to be secure and the longer the password, the
more difficult it will become for the hackers to hack the password, it is
always recommended that password length should be more than 8 characters, which
will contain upper case and lower case letters.
To
conclude users should avoid using simple passwords such as common names or just
simple passwords like “1234” because it will be very east for a hacker to hack
in and go through your files. In addition to stay safe it is recommended that
users should change their passwords regularly, and most of all they should
never write their passwords either on a piece of paper or someplace else because
they never know what might happen.
"http://www.secureworks.com/resources/articles/other_articles/firewall-security/" This is the website I took most of my information from but I added some other information from my imagination.
Digital Content
Digital content is used anywhere nowadays, furthermore there are
many different types of digital content available in the market, this could
include videos, audio, graphics and pictures. In blogs, the content has some
form of digital subject because they can be created by everyone, which
therefore means people have the right putting whatever content they want. In some
case some content however, can be used for the wrong idea. For example, contents
that have negativity. These sort of content are usually seen online and is
usually found on social networking sites and other online resources such as blogs.
To conclude in order to protect yourself
from these bad digital content, you can set additional security options, where
you will be warned about the content. This will usually be with the use of an
antivirus program and you will instantly know whether the website is suitable
or safe.
Downloadable
digital content that are mostly available on the internet, can prove to be
quite useful in some ways. However, it is important to keep in mind of whose content you are
using and what you are using it for.
The
Copyright, Designs and Patents Act 1988, was designed so that people's content
will be kept secured. This therefore means that, it will be illegal to have content from someone else’s
without the owner's permission.
overall copying
content online and claiming that it is yours is also known as of plagiarism, which means the
consequences could result to penalty.
"http://www.econtentmag.com/Articles/Resources/Defining-EContent/What-is-Digital-Content-79501.htm" This website help me a lot because i barely new what digital content was, luckily by reading the information on this site it give me a bigger knowledge about digital content.
This is a very good blog and very helpful and is easy to navigate.
ReplyDeletethank you this is very simple to understand and nice explaining.
ReplyDeletethank you this is very simple to understand and nice explaining.
ReplyDelete