SlideShare a Scribd company logo
1 of 17
Download to read offline
© 2010 Pearson Addison-Wesley. All rights reserved.
Addison Wesley
is an imprint of
Designing the User Interface:
Strategies for Effective Human-Computer Interaction
Fifth Edition
Ben Shneiderman & Catherine Plaisant
in collaboration with
Maxine S. Cohen and Steven M. Jacobs
CHAPTER 7:
Command and Natural Languages
1-3
© 2010 Pearson Addison-Wesley. All rights reserved.
The Basic Goals
of Language Design
• Precision
• Compactness
• Ease in writing and reading
• Speed in learning
• Simplicity to reduce errors
• Ease of retention over time
7-3
1-4
© 2010 Pearson Addison-Wesley. All rights reserved.
Higher-Level Goals
of Language Design
• Close correspondence between reality and
the notation
• Convenience in carrying out manipulations
relevant to user's tasks
• Compatibility with existing notations
• Flexibility to accommodate novice and
expert users
• Expressiveness to encourage creativity
• Visual appeal
7-4
1-5
© 2010 Pearson Addison-Wesley. All rights reserved.
Functionality to Support
User’s Tasks
Users do wide range of work:
• text editing
• electronic mail
• financial management
• airline or hotel reservations
• inventory
• manufacturing process control
• gaming
7-5
1-6
© 2010 Pearson Addison-Wesley. All rights reserved.
Functionality to Support
User’s Tasks (cont.)
Designers should
• determine functionality of the system by studying users' task domain
• create a list of task actions and objects
• abstract this list into a set of interface actions and objects
• represent low-level interface syntax
• create a table of user communities and tasks, with expected use
frequency
• determine hierarchy of importance of user communities (i.e. prime
users)
• evaluate destructive actions (e.g. deleting objects) to ensure
reversibility
• identify error conditions and prepare error messages
• allow shortcuts for expert users, such as macros and customizing
system parameters
7-6
1-7
© 2010 Pearson Addison-Wesley. All rights reserved. 7-7
1-8
© 2010 Pearson Addison-Wesley. All rights reserved.
Command-Organization
Strategies
A unifying interface concept or metaphor aids
– learning
– problem solving
– retention
Designers often err by choosing a metaphor closer to
machine domain than to the user's task domain.
Simple command set
– Each command is chosen to carry out a single task. The number
of commands match the number of tasks.
– For small number of tasks, this can produce a system easy to
learn and use.
– E.g. the vi editor of Unix.
7-8
1-9
© 2010 Pearson Addison-Wesley. All rights reserved.
Command plus
arguments/options
Command plus arguments
• Follow each command by one or more arguments that indicate objects to be
manipulated, e.g.
– COPY FILEA, FILEB
– DELETE FILEA
– PRINT FILEA, FILEB, FILEC
• Keyword labels for arguments are helpful for some users, e.g. COPY
FROM=FILEA TO=FILEB.
• Commands may also have options to indicate special cases, e.g.:
– PRINT/3,HQ FILEA
– PRINT (3, HQ) FILEA
– PRINT FILEA -3, HQ
to produce 3 copies of FILEA on the printer in the headquarters building.
• Error rates and the need for extensive training increase with the number of
possible options.
7-9
1-10
© 2010 Pearson Addison-Wesley. All rights reserved.
The Benefits of Structure
Human learning, problem solving, and memory are greatly facilitated by
meaningful structure.
• Beneficial for
– task concepts
– computer concepts
– syntactic details of command languages
Consistent Argument Ordering
Inconsistent order of arguments Consistent order of arguments
SEARCH file no, message id SEARCH message id, file no
TRIM message id, segment size TRIM message id, segment size
REPLACE message id, code no REPLACE message id, code no
INVERT group size, message id INVERT message id, group size
7-10
1-11
© 2010 Pearson Addison-Wesley. All rights reserved.
Hierarchical command structure
– The full set of
commands is
organized into a
tree structure
– 5x3x4 = 60 tasks
with 5 command
names and 1 rule
of formation
Action Object Destination
CREATE File File
DISPLAY Process Local printer
REMOVE Directory Screen
COPY Remote
printer
MOVE
7-11
1-12
© 2010 Pearson Addison-Wesley. All rights reserved.
Symbols versus Keywords
Command structure affects performance
Symbol Editor Keyword Editor
FIND:/TOOTH/;-1 BACKWARD TO "TOOTH"
LIST;10 LIST 10 LINES
RS:/KO/,/OK/;* CHANGE ALL "KO" TO "OK"
7-12
1-13
© 2010 Pearson Addison-Wesley. All rights reserved.
Naming and Abbreviations
There is often a lack of consistency or obvious strategy for
construction of command abbreviations.
Specificity Versus Generality
Infrequent, discriminating words insert delete
Frequent, discriminating words add remove
Infrequent, nondiscriminating words amble perceive
Frequent, nondiscriminating words walk view
General words (frequent, nondiscriminating) alter correct
Nondiscriminating nonwords (nonsense) GAC MIK
Discriminating nonwords (icons) abc-adbc abc-ab
7-13
1-14
© 2010 Pearson Addison-Wesley. All rights reserved.
Six Potential
Abbreviation Strategies
1. Simple truncation: The first, second, third, etc. letters of each
command.
2. Vowel drop with simple truncation: Eliminate vowels and use
some of what remains.
3. First and last letter: Since the first and last letters are highly
visible, use them.
4. First letter of each word in a phrase: Use with a hierarchical
design plan.
5. Standard abbreviations from other contexts: Use familiar
abbreviations.
6. Phonics: Focus attention on the sound.
7-14
1-15
© 2010 Pearson Addison-Wesley. All rights reserved.
Guidelines for using
abbreviations
Ehrenreich and Porcu (1982) offer this set of guidelines:
• A simple primary rule should be used to generate abbreviations for most items; a
simple secondary rule should be used for those items where there is a conflict.
• Abbreviations generated by the secondary rule should have a marker (for example,
an asterisk) incorporated in them.
• The number of words abbreviated by the secondary rule should be kept to a
minimum.
• Users should be familiar with the rules used to generate abbreviations.
• Truncation should be used because it is an easy rule for users to comprehend and
remember. However, when it produces a large number of identical abbreviations
for different words, adjustments must be found.
• Fixed-length abbreviations should be used in preference to variable-length ones.
• Abbreviations should not be designed to incorporate endings (ING, ED, S).
• Unless there is a critical space problem, abbreviations should not be used in
messages generated by the computer and read by the user.
7-15
1-16
© 2010 Pearson Addison-Wesley. All rights reserved.
Command-language guidelines
7-16
1-17
© 2010 Pearson Addison-Wesley. All rights reserved.
Natural Language in Computing
• Natural-language interaction
• Natural-language queries and question
answering
• Text-database searching
• Natural-language text generation
• Adventure games and instructional systems
7-17
1-18
© 2010 Pearson Addison-Wesley. All rights reserved.
Natural Language in Education
7-18
CognitiveTutor traces student progress in mastering skills and
concepts, then assigns individually tuned problems
Communicating with students via Natural Language

More Related Content

What's hot

HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basicsAlan Dix
 
USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTvicci4041
 
Module 1st USER INTERFACE DESIGN (15CS832) - VTU
Module 1st USER INTERFACE DESIGN (15CS832) - VTU Module 1st USER INTERFACE DESIGN (15CS832) - VTU
Module 1st USER INTERFACE DESIGN (15CS832) - VTU Sachin Gowda
 
HCI 3e - Ch 1: The human
HCI 3e - Ch 1:  The humanHCI 3e - Ch 1:  The human
HCI 3e - Ch 1: The humanAlan Dix
 
Design process interaction design basics
Design process interaction design basicsDesign process interaction design basics
Design process interaction design basicsPreeti Mishra
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignVrushali Dhanokar
 
HCI 3e - Ch 9: Evaluation techniques
HCI 3e - Ch 9:  Evaluation techniquesHCI 3e - Ch 9:  Evaluation techniques
HCI 3e - Ch 9: Evaluation techniquesAlan Dix
 
Usability Engineering Presentation Slides
Usability Engineering Presentation SlidesUsability Engineering Presentation Slides
Usability Engineering Presentation Slideswajahat Gul
 
HCI 3e - Ch 8: Implementation support
HCI 3e - Ch 8:  Implementation supportHCI 3e - Ch 8:  Implementation support
HCI 3e - Ch 8: Implementation supportAlan Dix
 
HCI - Chapter 2
HCI - Chapter 2HCI - Chapter 2
HCI - Chapter 2Alan Dix
 
Models of Interaction
Models of InteractionModels of Interaction
Models of InteractionjbellWCT
 
HCI 3e - Ch 11: User support
HCI 3e - Ch 11:  User supportHCI 3e - Ch 11:  User support
HCI 3e - Ch 11: User supportAlan Dix
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCIUsman Mukhtar
 

What's hot (20)

HCI 3e - Ch 5: Interaction design basics
HCI 3e - Ch 5:  Interaction design basicsHCI 3e - Ch 5:  Interaction design basics
HCI 3e - Ch 5: Interaction design basics
 
User interface-design
User interface-designUser interface-design
User interface-design
 
USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPT
 
Module 1st USER INTERFACE DESIGN (15CS832) - VTU
Module 1st USER INTERFACE DESIGN (15CS832) - VTU Module 1st USER INTERFACE DESIGN (15CS832) - VTU
Module 1st USER INTERFACE DESIGN (15CS832) - VTU
 
User centered Design
User centered DesignUser centered Design
User centered Design
 
Chap05
Chap05Chap05
Chap05
 
Chap13
Chap13Chap13
Chap13
 
HCI 3e - Ch 1: The human
HCI 3e - Ch 1:  The humanHCI 3e - Ch 1:  The human
HCI 3e - Ch 1: The human
 
Hypertext, multimedia and www
Hypertext, multimedia and wwwHypertext, multimedia and www
Hypertext, multimedia and www
 
Design process interaction design basics
Design process interaction design basicsDesign process interaction design basics
Design process interaction design basics
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction Design
 
HCI 3e - Ch 9: Evaluation techniques
HCI 3e - Ch 9:  Evaluation techniquesHCI 3e - Ch 9:  Evaluation techniques
HCI 3e - Ch 9: Evaluation techniques
 
Usability Engineering Presentation Slides
Usability Engineering Presentation SlidesUsability Engineering Presentation Slides
Usability Engineering Presentation Slides
 
HCI 3e - Ch 8: Implementation support
HCI 3e - Ch 8:  Implementation supportHCI 3e - Ch 8:  Implementation support
HCI 3e - Ch 8: Implementation support
 
HCI - Chapter 2
HCI - Chapter 2HCI - Chapter 2
HCI - Chapter 2
 
HCI
HCIHCI
HCI
 
Models of Interaction
Models of InteractionModels of Interaction
Models of Interaction
 
HCI 3e - Ch 11: User support
HCI 3e - Ch 11:  User supportHCI 3e - Ch 11:  User support
HCI 3e - Ch 11: User support
 
Interactive design basics
Interactive design basicsInteractive design basics
Interactive design basics
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCI
 

Similar to Chap07

LNotes_INFS336_chap02.ppt
LNotes_INFS336_chap02.pptLNotes_INFS336_chap02.ppt
LNotes_INFS336_chap02.pptjorair
 
CH # 1 preliminaries
CH # 1 preliminariesCH # 1 preliminaries
CH # 1 preliminariesMunawar Ahmed
 
Pl9ch1
Pl9ch1Pl9ch1
Pl9ch1Ved Ed
 
What should or not be programmed on the web
What should or not be programmed on the  webWhat should or not be programmed on the  web
What should or not be programmed on the webMohammad Kamrul Hasan
 
16 user interfacedesign
16 user interfacedesign16 user interfacedesign
16 user interfacedesignrandhirlpu
 
FP511 human computer interaction
FP511 human computer interactionFP511 human computer interaction
FP511 human computer interactionFatin Fatihayah
 
Free Open Source Software over Proprietary Software
Free Open Source Software over Proprietary SoftwareFree Open Source Software over Proprietary Software
Free Open Source Software over Proprietary SoftwareKawshalya Dushyan
 
Save time and your sanity: Increase your efficiency with Microsoft Word
Save time and your sanity: Increase your efficiency with Microsoft WordSave time and your sanity: Increase your efficiency with Microsoft Word
Save time and your sanity: Increase your efficiency with Microsoft WordRhonda Bracey
 
System administration with automation
System administration with automationSystem administration with automation
System administration with automationShivam Srivastava
 
Suresh nayak linux administrator
Suresh nayak linux administratorSuresh nayak linux administrator
Suresh nayak linux administratorSuresh Nayak
 
So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!Wes Morgan
 
Hindi speech enabled windows application using microsoft
Hindi speech enabled windows application using microsoftHindi speech enabled windows application using microsoft
Hindi speech enabled windows application using microsoftIAEME Publication
 
Writting Better Software
Writting Better SoftwareWritting Better Software
Writting Better Softwaresvilen.ivanov
 
FDMEE Can Do That?
FDMEE Can Do That?FDMEE Can Do That?
FDMEE Can Do That?Alithya
 

Similar to Chap07 (20)

LNotes_INFS336_chap02.ppt
LNotes_INFS336_chap02.pptLNotes_INFS336_chap02.ppt
LNotes_INFS336_chap02.ppt
 
CH # 1 preliminaries
CH # 1 preliminariesCH # 1 preliminaries
CH # 1 preliminaries
 
Chap11
Chap11Chap11
Chap11
 
Pl9ch1
Pl9ch1Pl9ch1
Pl9ch1
 
What should or not be programmed on the web
What should or not be programmed on the  webWhat should or not be programmed on the  web
What should or not be programmed on the web
 
16 user interfacedesign
16 user interfacedesign16 user interfacedesign
16 user interfacedesign
 
FP511 human computer interaction
FP511 human computer interactionFP511 human computer interaction
FP511 human computer interaction
 
Free Open Source Software over Proprietary Software
Free Open Source Software over Proprietary SoftwareFree Open Source Software over Proprietary Software
Free Open Source Software over Proprietary Software
 
Savitch_ch_01.ppt
Savitch_ch_01.pptSavitch_ch_01.ppt
Savitch_ch_01.ppt
 
Operating system done_by_ashok
Operating system done_by_ashokOperating system done_by_ashok
Operating system done_by_ashok
 
Save time and your sanity: Increase your efficiency with Microsoft Word
Save time and your sanity: Increase your efficiency with Microsoft WordSave time and your sanity: Increase your efficiency with Microsoft Word
Save time and your sanity: Increase your efficiency with Microsoft Word
 
Application Security
Application SecurityApplication Security
Application Security
 
Ui design
Ui designUi design
Ui design
 
DSL and EMFText
DSL and EMFTextDSL and EMFText
DSL and EMFText
 
System administration with automation
System administration with automationSystem administration with automation
System administration with automation
 
Suresh nayak linux administrator
Suresh nayak linux administratorSuresh nayak linux administrator
Suresh nayak linux administrator
 
So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!So, You're Going to the Cloud? Start Preparing NOW!
So, You're Going to the Cloud? Start Preparing NOW!
 
Hindi speech enabled windows application using microsoft
Hindi speech enabled windows application using microsoftHindi speech enabled windows application using microsoft
Hindi speech enabled windows application using microsoft
 
Writting Better Software
Writting Better SoftwareWritting Better Software
Writting Better Software
 
FDMEE Can Do That?
FDMEE Can Do That?FDMEE Can Do That?
FDMEE Can Do That?
 

More from Nada G.Youssef

Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Nada G.Youssef
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorNada G.Youssef
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsNada G.Youssef
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementNada G.Youssef
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control ManagementNada G.Youssef
 

More from Nada G.Youssef (20)

مجلة 1
مجلة 1مجلة 1
مجلة 1
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
 
Chapter Six
Chapter SixChapter Six
Chapter Six
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Chapter Four
Chapter FourChapter Four
Chapter Four
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Chapter one
Chapter oneChapter one
Chapter one
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
 

Recently uploaded

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligencePrecisely
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 

Recently uploaded (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 

Chap07

  • 1. © 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of Designing the User Interface: Strategies for Effective Human-Computer Interaction Fifth Edition Ben Shneiderman & Catherine Plaisant in collaboration with Maxine S. Cohen and Steven M. Jacobs CHAPTER 7: Command and Natural Languages
  • 2. 1-3 © 2010 Pearson Addison-Wesley. All rights reserved. The Basic Goals of Language Design • Precision • Compactness • Ease in writing and reading • Speed in learning • Simplicity to reduce errors • Ease of retention over time 7-3
  • 3. 1-4 © 2010 Pearson Addison-Wesley. All rights reserved. Higher-Level Goals of Language Design • Close correspondence between reality and the notation • Convenience in carrying out manipulations relevant to user's tasks • Compatibility with existing notations • Flexibility to accommodate novice and expert users • Expressiveness to encourage creativity • Visual appeal 7-4
  • 4. 1-5 © 2010 Pearson Addison-Wesley. All rights reserved. Functionality to Support User’s Tasks Users do wide range of work: • text editing • electronic mail • financial management • airline or hotel reservations • inventory • manufacturing process control • gaming 7-5
  • 5. 1-6 © 2010 Pearson Addison-Wesley. All rights reserved. Functionality to Support User’s Tasks (cont.) Designers should • determine functionality of the system by studying users' task domain • create a list of task actions and objects • abstract this list into a set of interface actions and objects • represent low-level interface syntax • create a table of user communities and tasks, with expected use frequency • determine hierarchy of importance of user communities (i.e. prime users) • evaluate destructive actions (e.g. deleting objects) to ensure reversibility • identify error conditions and prepare error messages • allow shortcuts for expert users, such as macros and customizing system parameters 7-6
  • 6. 1-7 © 2010 Pearson Addison-Wesley. All rights reserved. 7-7
  • 7. 1-8 © 2010 Pearson Addison-Wesley. All rights reserved. Command-Organization Strategies A unifying interface concept or metaphor aids – learning – problem solving – retention Designers often err by choosing a metaphor closer to machine domain than to the user's task domain. Simple command set – Each command is chosen to carry out a single task. The number of commands match the number of tasks. – For small number of tasks, this can produce a system easy to learn and use. – E.g. the vi editor of Unix. 7-8
  • 8. 1-9 © 2010 Pearson Addison-Wesley. All rights reserved. Command plus arguments/options Command plus arguments • Follow each command by one or more arguments that indicate objects to be manipulated, e.g. – COPY FILEA, FILEB – DELETE FILEA – PRINT FILEA, FILEB, FILEC • Keyword labels for arguments are helpful for some users, e.g. COPY FROM=FILEA TO=FILEB. • Commands may also have options to indicate special cases, e.g.: – PRINT/3,HQ FILEA – PRINT (3, HQ) FILEA – PRINT FILEA -3, HQ to produce 3 copies of FILEA on the printer in the headquarters building. • Error rates and the need for extensive training increase with the number of possible options. 7-9
  • 9. 1-10 © 2010 Pearson Addison-Wesley. All rights reserved. The Benefits of Structure Human learning, problem solving, and memory are greatly facilitated by meaningful structure. • Beneficial for – task concepts – computer concepts – syntactic details of command languages Consistent Argument Ordering Inconsistent order of arguments Consistent order of arguments SEARCH file no, message id SEARCH message id, file no TRIM message id, segment size TRIM message id, segment size REPLACE message id, code no REPLACE message id, code no INVERT group size, message id INVERT message id, group size 7-10
  • 10. 1-11 © 2010 Pearson Addison-Wesley. All rights reserved. Hierarchical command structure – The full set of commands is organized into a tree structure – 5x3x4 = 60 tasks with 5 command names and 1 rule of formation Action Object Destination CREATE File File DISPLAY Process Local printer REMOVE Directory Screen COPY Remote printer MOVE 7-11
  • 11. 1-12 © 2010 Pearson Addison-Wesley. All rights reserved. Symbols versus Keywords Command structure affects performance Symbol Editor Keyword Editor FIND:/TOOTH/;-1 BACKWARD TO "TOOTH" LIST;10 LIST 10 LINES RS:/KO/,/OK/;* CHANGE ALL "KO" TO "OK" 7-12
  • 12. 1-13 © 2010 Pearson Addison-Wesley. All rights reserved. Naming and Abbreviations There is often a lack of consistency or obvious strategy for construction of command abbreviations. Specificity Versus Generality Infrequent, discriminating words insert delete Frequent, discriminating words add remove Infrequent, nondiscriminating words amble perceive Frequent, nondiscriminating words walk view General words (frequent, nondiscriminating) alter correct Nondiscriminating nonwords (nonsense) GAC MIK Discriminating nonwords (icons) abc-adbc abc-ab 7-13
  • 13. 1-14 © 2010 Pearson Addison-Wesley. All rights reserved. Six Potential Abbreviation Strategies 1. Simple truncation: The first, second, third, etc. letters of each command. 2. Vowel drop with simple truncation: Eliminate vowels and use some of what remains. 3. First and last letter: Since the first and last letters are highly visible, use them. 4. First letter of each word in a phrase: Use with a hierarchical design plan. 5. Standard abbreviations from other contexts: Use familiar abbreviations. 6. Phonics: Focus attention on the sound. 7-14
  • 14. 1-15 © 2010 Pearson Addison-Wesley. All rights reserved. Guidelines for using abbreviations Ehrenreich and Porcu (1982) offer this set of guidelines: • A simple primary rule should be used to generate abbreviations for most items; a simple secondary rule should be used for those items where there is a conflict. • Abbreviations generated by the secondary rule should have a marker (for example, an asterisk) incorporated in them. • The number of words abbreviated by the secondary rule should be kept to a minimum. • Users should be familiar with the rules used to generate abbreviations. • Truncation should be used because it is an easy rule for users to comprehend and remember. However, when it produces a large number of identical abbreviations for different words, adjustments must be found. • Fixed-length abbreviations should be used in preference to variable-length ones. • Abbreviations should not be designed to incorporate endings (ING, ED, S). • Unless there is a critical space problem, abbreviations should not be used in messages generated by the computer and read by the user. 7-15
  • 15. 1-16 © 2010 Pearson Addison-Wesley. All rights reserved. Command-language guidelines 7-16
  • 16. 1-17 © 2010 Pearson Addison-Wesley. All rights reserved. Natural Language in Computing • Natural-language interaction • Natural-language queries and question answering • Text-database searching • Natural-language text generation • Adventure games and instructional systems 7-17
  • 17. 1-18 © 2010 Pearson Addison-Wesley. All rights reserved. Natural Language in Education 7-18 CognitiveTutor traces student progress in mastering skills and concepts, then assigns individually tuned problems Communicating with students via Natural Language