SlideShare uma empresa Scribd logo
1 de 13
USER INTERFACE
By: Kiplangat Gideon
ICT Trainer
What is a User Interface?
The user interface, or the human/computer
interface is what the user sees, and includes:
• the physical controls – buttons, etc.
• what the system looks like (if there is a monitor –
the system could be a washing machine or a
photocopier)
• how the system accepts input from the user
• how the system responds to user input
• how the system outputs the results of processing
What Makes a Good User Interface?
Good user interfaces are:
• Safe – not ambiguous or confusing (especially in
safety critical applications)
• Effective – they do what they’re supposed to do,
and quickly
• Efficient – they are clear and easy to use
• User-friendly – intuitive and easy to learn
• Enjoyable – proper description
Designing the User Interface
When designing the HCI, what will you consider?
• Who will be using the system:
• What is their level of skill and knowledge?
• Are there any special physical requirements?
• Will there be a range of users?
• What does the system actually do? How many options
are there, and how accessible do they need to be?
• The environment in which it will be used – e.g. military
use, temperature, noise, motion, moisture
• The technology available – iris recognition, voice, etc.
Types of User Interface
There are six types of UI that you need to know:
• Command line – e.g. DOS or SQL
• Menu-driven – e.g. old DOS applications
• Natural language – beloved of science fiction!
• Forms and dialogue boxes – used in Windows
applications – e.g. Print or Browse
• Graphical User Interface – also known as GUIs,
or WIMP (window, icon, menu, pointer, or
window, icon, mouse, pull-down menu)
Command Line Interfaces
• Often very flexible
• Good for expert
users who know
the commands –
not hunting through
menus for the
option you require
• Usually require
fewest computer
resources
• Requires users to
learn commands
• Things you don’t
know about are
invisible
• Not very good for
novices or people
who can’t type
Menu-Driven Interfaces
• All of the options
are visible – no
hidden features
• No obscure
commands and
syntax to learn –
therefore the it will
be easier for new
users and less
training will be
required
• Can be frustrating for
experienced users
who want to do
something buried
behind 10 menus!
• The user interface
may be limited – e.g.
by the size of the
screen and the
number of options
you can fit on
Natural Language Interfaces
• No training required
– you just tell it what
you want!
• They could
potentially be as
powerful and flexible
as CLIs
• No menus to
negotiate
• Makes the computer
look intelligent to
naïve users
• Some sentences are
ambiguous – “Let him
have it!”
• It would be difficult to
recognise all the
different ways of
saying things (and
regional dialects)
• Artificial languages are
often more precise
• Not yet popular
Forms and Dialogue Boxes
Issues when designing forms and dialogue boxes:
• Navigation – order of fields, tabbing, etc.
• Layout – not too cluttered
• Field sizes appropriate to data expected
• Use of appropriate controls and validation –
combo-boxes, radio buttons, checkboxes, etc.
• Whether forms and dialogue boxes are modal –
i.e. can the user access anything else while they
are displayed?
Use of Sound
• Feedback using sound is easily noticed – e.g.
• Telephones
• Alarm clocks
• E-mails arriving in Outlook!
• Users can find too much noise distressing, so it
needs to be used carefully
• Sounds won’t necessarily be heard in a noisy
environment such as a factory
• Sound output could be in the form of speech –
either synthesised or digitised
Speech Recognition
Speech can also be used for input:
• Command and Control – small vocabulary
systems can be used for controlling devices or
systems. They are usually better at recognising
different voices as there are fewer words to
differentiate – e.g. just Yes or No
• Dictation systems – e.g. Office or ViaVoice,
these are large vocabulary systems used to
enter text. They require training for your voice,
and tend to be less reliable and more resource
hungry than voice control systems.
Common User Interfaces
• Many applications, especially those that run in
an operating system with a GUI have a similar
appearance – a common user interface.
• Windows applications, for example, all support:
• F1 to access help
• Ctrl C for copy, X for cut and V for paste
• Use of the Tab key to move between controls
• Use of the Alt key to operate menus
• Use of the spacebar to depress a button
• Use of Ctrl and click to select multiple items
• Plus many more!
Advantages of a Common Interface
Having a common user interface brings benefits:
• It’s quicker to learn new applications
• Familiar interfaces make applications easier to
use
• All applications looking the same makes
inexperienced users more confident
• Once an ICT “expert” is familiar with Windows,
they should be able to operate almost any
application

Mais conteúdo relacionado

Semelhante a User Interface.ppt

UX Principles and Practice
UX Principles and PracticeUX Principles and Practice
UX Principles and PracticeIBM
 
Info2 sec 3_-_people__ict_systems
Info2 sec 3_-_people__ict_systemsInfo2 sec 3_-_people__ict_systems
Info2 sec 3_-_people__ict_systemssaltashict
 
e3-chap-03.power point presentaion on interst rate
e3-chap-03.power point presentaion on interst ratee3-chap-03.power point presentaion on interst rate
e3-chap-03.power point presentaion on interst rateseidmohammed44
 
e3-chap-03.ppt
e3-chap-03.ppte3-chap-03.ppt
e3-chap-03.pptKingSh2
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCIUsman Mukhtar
 
Intro to ux and how to design a thoughtful ui
Intro to ux and how to design a thoughtful uiIntro to ux and how to design a thoughtful ui
Intro to ux and how to design a thoughtful uiThanos Makaronas
 

Semelhante a User Interface.ppt (20)

Final
FinalFinal
Final
 
2nd part of Unit 1.ppt
2nd part of Unit 1.ppt2nd part of Unit 1.ppt
2nd part of Unit 1.ppt
 
Interaction
InteractionInteraction
Interaction
 
UX Principles and Practice
UX Principles and PracticeUX Principles and Practice
UX Principles and Practice
 
Imk pertemuan-4
Imk pertemuan-4Imk pertemuan-4
Imk pertemuan-4
 
HCI
HCIHCI
HCI
 
What is Interaction Design?
What is Interaction Design?What is Interaction Design?
What is Interaction Design?
 
Chapter3
Chapter3 Chapter3
Chapter3
 
Info2 sec 3_-_people__ict_systems
Info2 sec 3_-_people__ict_systemsInfo2 sec 3_-_people__ict_systems
Info2 sec 3_-_people__ict_systems
 
e3-chap-03.power point presentaion on interst rate
e3-chap-03.power point presentaion on interst ratee3-chap-03.power point presentaion on interst rate
e3-chap-03.power point presentaion on interst rate
 
e3-chap-03.ppt
e3-chap-03.ppte3-chap-03.ppt
e3-chap-03.ppt
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCI
 
ch3-interaction.pdf
ch3-interaction.pdfch3-interaction.pdf
ch3-interaction.pdf
 
ch3-interaction.pdf
ch3-interaction.pdfch3-interaction.pdf
ch3-interaction.pdf
 
Interaction.pptx
Interaction.pptxInteraction.pptx
Interaction.pptx
 
Hci [4]interaction
Hci [4]interactionHci [4]interaction
Hci [4]interaction
 
Intro to ux and how to design a thoughtful ui
Intro to ux and how to design a thoughtful uiIntro to ux and how to design a thoughtful ui
Intro to ux and how to design a thoughtful ui
 
Lesson 2 HCI 2.pptx
Lesson 2 HCI 2.pptxLesson 2 HCI 2.pptx
Lesson 2 HCI 2.pptx
 
E3 chap-03
E3 chap-03E3 chap-03
E3 chap-03
 
SDA-lecture-F5.pptx
SDA-lecture-F5.pptxSDA-lecture-F5.pptx
SDA-lecture-F5.pptx
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

User Interface.ppt

  • 1. USER INTERFACE By: Kiplangat Gideon ICT Trainer
  • 2. What is a User Interface? The user interface, or the human/computer interface is what the user sees, and includes: • the physical controls – buttons, etc. • what the system looks like (if there is a monitor – the system could be a washing machine or a photocopier) • how the system accepts input from the user • how the system responds to user input • how the system outputs the results of processing
  • 3. What Makes a Good User Interface? Good user interfaces are: • Safe – not ambiguous or confusing (especially in safety critical applications) • Effective – they do what they’re supposed to do, and quickly • Efficient – they are clear and easy to use • User-friendly – intuitive and easy to learn • Enjoyable – proper description
  • 4. Designing the User Interface When designing the HCI, what will you consider? • Who will be using the system: • What is their level of skill and knowledge? • Are there any special physical requirements? • Will there be a range of users? • What does the system actually do? How many options are there, and how accessible do they need to be? • The environment in which it will be used – e.g. military use, temperature, noise, motion, moisture • The technology available – iris recognition, voice, etc.
  • 5. Types of User Interface There are six types of UI that you need to know: • Command line – e.g. DOS or SQL • Menu-driven – e.g. old DOS applications • Natural language – beloved of science fiction! • Forms and dialogue boxes – used in Windows applications – e.g. Print or Browse • Graphical User Interface – also known as GUIs, or WIMP (window, icon, menu, pointer, or window, icon, mouse, pull-down menu)
  • 6. Command Line Interfaces • Often very flexible • Good for expert users who know the commands – not hunting through menus for the option you require • Usually require fewest computer resources • Requires users to learn commands • Things you don’t know about are invisible • Not very good for novices or people who can’t type
  • 7. Menu-Driven Interfaces • All of the options are visible – no hidden features • No obscure commands and syntax to learn – therefore the it will be easier for new users and less training will be required • Can be frustrating for experienced users who want to do something buried behind 10 menus! • The user interface may be limited – e.g. by the size of the screen and the number of options you can fit on
  • 8. Natural Language Interfaces • No training required – you just tell it what you want! • They could potentially be as powerful and flexible as CLIs • No menus to negotiate • Makes the computer look intelligent to naïve users • Some sentences are ambiguous – “Let him have it!” • It would be difficult to recognise all the different ways of saying things (and regional dialects) • Artificial languages are often more precise • Not yet popular
  • 9. Forms and Dialogue Boxes Issues when designing forms and dialogue boxes: • Navigation – order of fields, tabbing, etc. • Layout – not too cluttered • Field sizes appropriate to data expected • Use of appropriate controls and validation – combo-boxes, radio buttons, checkboxes, etc. • Whether forms and dialogue boxes are modal – i.e. can the user access anything else while they are displayed?
  • 10. Use of Sound • Feedback using sound is easily noticed – e.g. • Telephones • Alarm clocks • E-mails arriving in Outlook! • Users can find too much noise distressing, so it needs to be used carefully • Sounds won’t necessarily be heard in a noisy environment such as a factory • Sound output could be in the form of speech – either synthesised or digitised
  • 11. Speech Recognition Speech can also be used for input: • Command and Control – small vocabulary systems can be used for controlling devices or systems. They are usually better at recognising different voices as there are fewer words to differentiate – e.g. just Yes or No • Dictation systems – e.g. Office or ViaVoice, these are large vocabulary systems used to enter text. They require training for your voice, and tend to be less reliable and more resource hungry than voice control systems.
  • 12. Common User Interfaces • Many applications, especially those that run in an operating system with a GUI have a similar appearance – a common user interface. • Windows applications, for example, all support: • F1 to access help • Ctrl C for copy, X for cut and V for paste • Use of the Tab key to move between controls • Use of the Alt key to operate menus • Use of the spacebar to depress a button • Use of Ctrl and click to select multiple items • Plus many more!
  • 13. Advantages of a Common Interface Having a common user interface brings benefits: • It’s quicker to learn new applications • Familiar interfaces make applications easier to use • All applications looking the same makes inexperienced users more confident • Once an ICT “expert” is familiar with Windows, they should be able to operate almost any application