Instructional Elearning Technologies for the Vision Impaired

Total Page:16

File Type:pdf, Size:1020Kb

Instructional Elearning Technologies for the Vision Impaired Department of Electrical & Computer Engineering Instructional eLearning Technologies for the Vision Impaired Iain Murray This thesis is presented for the Degree of Doctor of Philosophy Curtin University of Technology November 2008 Declaration This Thesis contains no material which has been accepted for the award of any other degree or diploma in any university. To the best of my knowledge and belief this thesis contains no material previously published by any other person except where due acknowledgement has been made. Signature: …………………………….. Date: …………………………. Parts of this thesis been previously published as listed below: • Armstrong, H, Murray, I, 2005, Building a bridge for the sight impaired, 4th World Conference in Information Security Education, Moscow, Russia, 2006 • Armstrong, H, Murray, I, Permvattana, R, 2006 Evaluating e- Learning Cisco Courses Modified for the Vision Impaired, Information Technology based Higher Education and Training Conference, Sydney, Australia • Armstrong, H. & Murray, I., 2007, Remote and local delivery of Cisco education for the vision impaired, IT Innovation in Computer Science Education Conference 2007, Dundee, Scotland, UK i • Srivilailuck S, Beale P, Murray I, Kidd B 2006 ‚ Hidden Design: An Inquiry into the Design of Inclusive Environment for the Vision Impaired and Blind in their Learning Environment, 2nd International Universal Design Conference, Kyoto, Japan 22-26 October • Hollier, S, Murray, I, 2004, The evolution of e-inclusion: Technology in Education for the Vision Impaired. History of Computing in Education 2004, Toulouse, France • Hollier, S, Murray, I, 2004, Digital Disability – An examination into the effectiveness of multimodal interfaces for people with disabilities, Toulouse, France, 2004 • Hope, J, von Konsky, B, Murray, I, Chew, L, Farrugia, B, 2006, A Cisco Education Tool Accessible to the Vision Impaired, ASSETS 2006, Portland, Oregon USA • Murray, I, 2004, A Computing Education via eLearning for the Vision Impaired, Pathways 7, 2004, Alice Springs, Australia • Murray, I, Armstrong, H, 2004, A computing education vision for the sight impaired, Sixth conference on Australasian Computing Education, 2004, Dunedin, New Zealand • Murray, I, Armstrong, H, 2005, Teaching Sight Impaired IT Students, Proceedings of Educause 2005, Auckland, New Zealand • Permvattana, R, Murray, I, Hollier, S, 2006 Innovations in tertiary online learning for students who are blind or vision impaired, 7th International Conference on Information Technology Based Higher Education and Training, Sydney Australia 2006 ii Synopsis The principal sensory modality employed in learning is vision, and that not only increases the difficulty for vision impaired students from accessing existing educational media but also the new and mostly visiocentric learning materials being offered through on-line delivery mechanisms. Using as a reference Certified Cisco Network Associate (CCNA) and IT Essentials courses, a study has been made of tools that can access such on-line systems and transcribe the materials into a form suitable for vision impaired learning. Modalities employed included haptic, tactile, audio and descriptive text. How such a multi-modal approach can achieve equivalent success for the vision impaired is demonstrated. However, the study also shows the limits of the current understanding of human perception, especially with respect to comprehending two and three dimensional objects and spaces when there is no recourse to vision. iii Acknowledgements I would like to acknowledge the support and guidance given by my supervisors Drs Doug Myers, Helen Armstrong and Brian von Konsky. Their patience, advice and rigorous feedback was immensely helpful during this course of study. Thanks must also go to my wife, Susan Murray, for proofreading and editing support throughout the thesis production. For his assistance in the coding of the haptic showcase application, my thanks go to Kieren Eaton. I would also like to thank the software engineering students, in particular James Hope, for his contributions to the iNetSim network simulator. Thanks must also go to the Department of Electrical and Computer Engineering for the support offered over the several years of my enrolment. I would also like to express my gratitude to Cisco Systems, Mr Peter Scope in particular, for their generous donation of equipment that made the Cisco Academy for the Vision Impaired possible. iv Contents 1. INTRODUCTION.................................................................................................. 1 1.1. Introduction................................................................................................... 1 1.2. The Demographics of Disability.................................................................. 3 1.3. Improving access to eLearning resources for the vision impaired ........ 5 1.4. Achievements of the research .................................................................... 9 1.5. Structure of Thesis..................................................................................... 11 2. AN EXAMINATION OF ELEARNING AND ASSISTIVE TECHNOLOGY FOR PEOPLE WITH VISION IMPAIRMENT ................................................................. 12 2.1. Introduction................................................................................................. 12 2.2. Human Sensory Perception....................................................................... 12 2.2.1. Rate of Perception ................................................................................. 12 2.2.2. Cognition ................................................................................................ 13 2.2.3. Tactile and Haptic perception ................................................................ 14 2.2.4. Auditory Perception................................................................................ 18 2.3. Braille - A Written Communications System ........................................... 21 2.3.1. Properties of the Braille System ............................................................ 21 2.3.2. Braille Literacy in Education and Employment ...................................... 22 2.4. Human Computer Interaction.................................................................... 24 2.5. Assistive Technologies.............................................................................. 28 2.5.1. Human Senses and Assistive Technology ............................................ 28 2.5.2. An Historical Perspective on Assistive Technology............................... 28 2.6. Haptic Devices ............................................................................................ 33 2.6.1. Haptics and perception .......................................................................... 33 v 2.6.2. Haptic Receptors ................................................................................... 34 2.6.3. Haptic Device Types .............................................................................. 35 2.6.4. Haptics Research................................................................................... 38 2.6.5. Three-dimensional haptic devices ......................................................... 39 2.6.5.1. Devices and overview ..................................................................... 39 2.6.5.2. Tablets............................................................................................. 49 2.6.5.3. Static displays ................................................................................. 53 2.6.5.4. Other forms of tactile display........................................................... 55 2.6.6. Use of haptic Devices ............................................................................ 57 2.6.7. Haptic Device Summary ........................................................................ 58 2.7. Auditory Devices ........................................................................................ 59 2.7.1. The use of the human auditory system.................................................. 59 2.7.2. Methods of audio presentation .............................................................. 63 2.7.3. Audio feedback as a supplement to a visual interface .......................... 68 2.7.4. Auditory navigation tools........................................................................ 70 2.8. Challenges in HCI: The Digital Divide ...................................................... 72 2.8.1. Usability: Comprehension of Graphics .................................................. 72 2.8.2. Traditional Methods of Graphical Data Representation to Vision Impaired.............................................................................................................. 73 2.8.3. The Haptic User Interface...................................................................... 73 2.8.4. Audio Desktop or Audio User Interface ................................................. 74 2.8.5. Speech Interfaces and Screen Readers................................................ 76 2.9. Combining Modalities in HCI..................................................................... 79 2.10. e-Learning and the Vision Impaired ......................................................... 80 2.10.1. The Vision Impaired Learner ............................................................... 80 2.10.2. Vision in Learning ................................................................................ 83 2.10.3. The Move to e-Learning......................................................................
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • 50 Are Gnome and KDE Equal? KNOW-HOW 50
    KNOW-HOW Ask Klaus! ASK KLAUS! and even with its very reduced features, linking of KDE or Gnome programs is it has always been sufficient for me. more likely fail because of this modular There were quarrels between develop- structure than for any other reason.) ers and users about KDE being “non- This can get you into some problems. Klaus Knopper is the creator of free” in the old days, because of the qt li- If you use KDE regularly, and you want Knoppix and co-founder of the cense (for the library KDE is based on); to install a single Gnome program such that it was more memory-consuming as Gnopernicus, you end up installing LinuxTag expo. He currently than Gnome; or that its graphics were the entire Gnome software suite because poorer. None of these are genuine prob- you won’t be able to to get the program works as a teacher, program- lems today, and I don’t know if the ru- to run otherwise. In very bad cases, mer, and consultant. If you have mors about graphics and memory con- Gnome dependencies try to deinstall sumption ever were true, or whether parts of KDE (or vice versa) because of a configuration problem, or if they were just part of the creative com- conflicting services that are present in petition between different groups and both (a very rare case, though). you just want to learn more philosophies. OK, I cheated a little in this example. about how Linux works, send Nowadays, Gnome consumes the Gnopernicus is more like a suite of pl- same amount of system resources as ugins and addons for Gnome than like a your questions to: KDE (if not more), performance bench- standalone application.
    [Show full text]
  • List of NMAP Scripts Use with the Nmap –Script Option
    List of NMAP Scripts Use with the nmap –script option Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved acarsd-info by this script includes the daemon version, API version, administrator e-mail address and listening frequency. Shows extra information about IPv6 addresses, such as address-info embedded MAC or IPv4 addresses when available. Performs password guessing against Apple Filing Protocol afp-brute (AFP). Attempts to get useful information about files from AFP afp-ls volumes. The output is intended to resemble the output of ls. Detects the Mac OS X AFP directory traversal vulnerability, afp-path-vuln CVE-2010-0533. Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type afp-serverinfo (for example Macmini or MacBookPro). Shows AFP shares and ACLs. afp-showmount Retrieves the authentication scheme and realm of an AJP service ajp-auth (Apache JServ Protocol) that requires authentication. Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by ajp-brute web servers to communicate with back-end Java application server containers. Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol ajp-headers server and returns the server response headers. Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists ajp-methods potentially risky methods. ajp-request Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file).
    [Show full text]
  • New Gnome 2.16 Desktop? NEW GNOME
    REVIEWS Gnome 2.16 What’s new in the new Gnome 2.16 desktop? NEW GNOME The changes in Gnome 2.16 are more than cosmetic: the current release sees a leaner and faster version of the desktop. BY CHRISTIAN MEYER ust six months ago, when Gtk#. The libraries makes it easier for Although Metacity, the original Gnome Gnome 2.14 reached the mirror developers who prefer not to use C to window manager, does not support all Jservers, the Gnome developers enter the world of Gnome. Gnome bind- the effects I just referred to, it will still proved they can set milestones without ings are available for C++, C#, and perform well with the new 3D X servers. sacrificing usability. Programs such as Python. The features are not enabled by default, the Deskbar applet demonstrate the but enabling them will give you a first power of Gnome’s underpinnings, pro- 3D Desktop impression of the capabilities you can viding an attractive GUI that is both effi- In last couple of years, much time and expect with the new X server extensions. cient and remarkably uncluttered. money has gone into investigating new You don’t even need to terminate the The latest 2.16 version adds a variety GUI concepts. One of the results is the current session (that is, log off and back of new features, and there have been Looking Glass project [1] by Sun Micro- on) to disable the effects. major improvements with respect to per- systems, which gives users the ability to formance and memory consumption.
    [Show full text]
  • Manuale Per L'utente
    Vivavoce personale CHAT 50 MANUALE PER L’UTENTE SOMMARIO TEL +1.800.283.5936 +1.801.974.3760 FAX +1.801.977.0087 EMAIL [email protected] MANUALE PER L’UTENTE DEL CHAT 50 CLEARONE NUMERO PARTE 800-159-001. MARZO 2006 (REV 1.0) © 2005 ClearOne Communications, inc. Tutti i diritti riservati. È vietata la riproduzione di qualsiasi parte di questo documento in qualunque formato e con qualunque mezzo senza autorizzazione scritta da parte di ClearOne Communications. Stampato negli Stati Uniti. ClearOne si riserva specifici privilegi. Le informazioni contenute in questo documento sono soggette a modifiche senza preavviso. SOMMARIO CONTINUA CAPITOLO 1: INTRODUZIONE Presentazione del prodotto . 1 Servizio e Assistenza . 1 Informazioni importanti sulla sicurezza . 2 Apertura della confezione . 3 CAPITOLO 2: PER INIZIARE Installazione del software del Chat 50. 5 Configurazione e prova del Chat 50 . 10 Come collegare il Chat 50 . 14 Come collegare il Chat 50 con un telefono . 14 Come collegare il Chat 50 con un telefono cellulare . 15 Come collegare il Chat 50 con un riproduttore MP3 . 16 Come collegare il Chat 50 con un sistema per videoconferenze . 17 CAPITOLO 3: USO DEL SOFTWARE DI CONFIGURAZIONE DEL CHAT 50 Device Setup . 19 My Devices. 20 Update Firmware . 21 Help . 24 Advanced . 24 Advanced Settings: Audio Settings . 25 Advanced Settings: Database . 26 Advanced Settings: Log . 28 CAPITOLO 4: USO DI CHAT 50 Indicatore LED di alimentazione . 29 Tasti volume su/giù e Mute . 29 CAPITOLO 5: MANUTENZIONE Come prendersi cura del Chat 50 . 31 Risoluzione dei problemi . 31 Ripristino in caso di aggiornamento firmware interrotto.
    [Show full text]
  • Hyperx Cloud Pro Gaming Headset
    HyperX Cloud Pro Gaming Headset hyperxgaming.com Comfortable headset with in-line audio control for serious console gamers. HyperX Cloud™ is designed to meet the demands of serious console gamers. Cloud in silver has convenient in-line audio control that saves you from navigating through system menus and puts control at your ngertips. The durable aluminum frame is designed for long-lasting reliability and to withstand the damage of daily gaming. The 100% memory foam ear cushions and leatherette-padded headband provide award-winning comfort for those long weekends and late nights of gaming. HiFi capable 53mm drivers and enhanced bass reproduction pump out crystal clear high, mids and lows, and the closed cup design silences the outside world to completely immerse you in your game. Cloud’s microphone can be adjusted the way you like it, and it eliminates background noise so you come across loud and clear. When you’re ready to listen to music, simply unplug the microphone and stow it for later. HyperX Cloud has been certi ed by TeamSpeak™ and Discord and is compatible with Skype™, Ventrilo, Mumble, RaidCall and many more chat applications. During HyperX Cloud testing, no audible echoes, background noise or voice distortions were detected, so you and your team will be able to communicate clearly. HyperX Cloud’s 3.5mm plug (4 pole) is compatible with PS4™, Xbox One™, Wii U™, Mac® and mobile devices, and it comes with a 2M extension cable with stereo and mic plugs for PC use. > In-line audio volume control and microphone mute > Durable aluminum
    [Show full text]
  • Hyperx Cloud Revolver S
    HyperX Cloud Revolver S hyperxgaming.com/headsets Premium-grade headset featuring virtual Dolby Surround 7.1 audio with Push-to-Dolby convenience. HyperX Cloud Revolver™ S is primed for action with Plug N Play virtual Dolby® Surround 7.1 audio – no software required. Hear every footstep, explosion and gunshot with cinematic clarity as the simulated seven positional speakers provide precise sound with distance and depth. The advanced USB digital signal processing sound card handles everything, delivering consistent premium-quality sound, no matter what system you’re playing on. Backlit buttons on the clippable audio control box allow you to quickly activate Dolby audio, mute and regulate mic and output levels. New bass boost, flat and vocal equaliser modes let you swap between setups tuned for games, streaming, music or movies. Revolver S has a studio-grade sound stage that excels in FPS and open-environment settings, letting you hear sounds further away more accurately. The unique Revolver S driver design separates the lows, mids and highs, and the re-engineered profiles produce sounds that audiophiles will rave about. Serious gamers and streamers will love the higher- quality, dense HyperX signature memory foam and the new wider headband that reduces head pressure and more evenly distributes weight. The German-designed Cloud Revolver S has a solid-steel frame for long-lasting durability and stability and is built to deliver sonic perfection for years. HyperX Cloud Revolver S features next-gen 50mm directional drivers aligned parallel to the ears for precise audio output. Closed ear cups block out outside noise to fully immerse you in Cloud’s signature crisp, clear sound quality and enhanced bass.
    [Show full text]
  • Firmware Analysis of Linksys E900 V. 1.0.09.002
    Firmware Analysis of Linksys E900 v. 1.0.09.002 HID Linksys E900 v. 1.0.09.002 Device Name E900 Vendor Linksys Device Class Routers Version 1.0.09.002 Release Date 1970-01-01 Size 7.39 MiB (7,746,560 Byte) Unpacker (v. 0.7) Plugin generic carver Extracted 2 Output: DECIMAL HEXADECIMAL DESCRIPTION ——————————————————————————– 0 0x0 BIN-Header, board ID: E900, hardware version: 4702, firmware v ersion: 1.0.0, build date: 2018-08-08 32 0x20 TRX firmware header, little endian, image size: 7745536 bytes, CRC32: 0x756770AD, flags: 0x0, version: 1, header size: 28 bytes, loader offset: 0x1C, linux kernel offset: 0x14FDFC, rootfs offset: 0x0 60 0x3C gzip compressed data, maximum compression, has original file n ame: ”piggy”, from Unix, last modified: 2018-08-08 05:28:28 1375772 0x14FE1C Squashfs filesystem, little endian, non-standard signature, ve rsion 3.0, size: 6365444 bytes, 1718 inodes, blocksize: 65536 bytes, created: 2018-08-08 05:33:15 Entropy 0.89 1 File Type (v. 1.0) File Type data MIME application/octet-stream Containing Files application/CDFV2 (2) application/gzip (1) application/octet-stream (3) application/x-executable (67) application/x-object (27) application/x-sharedlib (116) filesystem/squashfs (1) image/gif (42) image/jpeg (8) image/png (17) image/x-icon (1) inode/symlink (7) text/plain (990) 2 Binwalk (v. 0.5.2) Signature Analysis: DECIMAL HEXADECIMAL DESCRIPTION ——————————————————————————– 0 0x0 BIN-Header, board ID: E900, hardware version: 4702, firmware version: 1.0.0, build date: 2018-08-08 32 0x20 TRX firmware header, little endian,
    [Show full text]
  • Multi-Lingual Screen Reader and Processing of Font-Data in Indian Languages Submitted by A
    MULTI-LINGUAL SCREEN READER AND PROCESSING OF FONT-DATA IN INDIAN LANGUAGES A THESIS submitted by A. ANAND AROKIA RAJ for the award of the degree of Master of Science (by Research) in Computer Science & Engineering LANGUAGE TECHNOLOGIES RESEARCH CENTER INTERNATIONAL INSTITUTE OF INFORMATION TECHNOLOGY HYDERABAD - 500 032, INDIA February 2008 Dedication I dedicate this work to my loving parents ANTONI MUTHU RAYAR and MUTHU MARY who are always behind my growth. i THESIS CERTIFICATE This is to certify that the thesis entitled Multi-Lingual Screen Reader and Processing of Font-Data in Indian Languages submitted by A. Anand Arokia Raj to the International Institute of Information Technology, Hyderabad for the award of the degree of Master of Science (by Research) in Computer Science & Engineering is a bonafide record of research work carried out by him under our supervision. The contents of this thesis, in full or in parts, have not been submitted to any other Institute or University for the award of any degree or diploma. Hyderabad - 500 032 (Mr. S. Kishore Prahallad) Date: ACKNOWLEDGMENTS I thank my adviser Mr.Kishore Prahallad for his guidance during my thesis work. Because of him now I am turned into not only a researcher but also a developer. I thank Prof.Rajeev Sangal and Dr.Vasudeva Varma for their valuable advices and inputs for improving the screen reading software. I am also thankful to my speech lab friends and other IIIT friends who helped me in many ways. They were with me when I needed a help and when I needed a relaxation.
    [Show full text]
  • Assets Portfolio
    Assets Portfolio October 6, 2014 CONFIDENTIAL Assets Portfolio Contents 1 Foreword 7 1.1 Document Formatting.................................... 7 1.2 Properties and Definitions.................................. 7 1.2.1 Vulnerability Properties............................ 7 1.2.2 Vulnerability Test Matrix........................... 9 1.2.3 Asset Deliverables............................... 9 1.2.4 Exploit Properties............................... 10 2 Adobe Systems Incorporated 13 2.1 Adobe Reader........................................ 13 14-004 Adobe Reader Client-side Remote Code Execution............. 13 2.2 Flash Player......................................... 15 12-033 Adobe Flash Player Client-side Remote Code Execution........... 15 2.3 Photoshop CS6....................................... 17 13-011 Adobe Photoshop CS6 Client-side Remote Code Execution......... 18 3 Apple, Inc. 20 3.1 Mac OS X.......................................... 20 14-010 Apple Mac OS X Local Privileged Command Execution........... 20 4 ASUS 22 4.1 BIOS Device Driver..................................... 22 13-015 ASUS BIOS Device Driver Local Privilege Escalation............ 23 October 6, 2014 CONFIDENTIAL Page 1 of 134 Assets Portfolio 5 AVAST Software a.s. 25 5.1 avast! Anti-Virus...................................... 25 13-005 avast! Local Information Disclosure..................... 25 13-010 avast! Anti-Virus Local Privilege Escalation................. 27 6 Barracuda Networks, Inc. 29 6.1 Web Filter.......................................... 29 13-000 Barracuda
    [Show full text]
  • FOSS Accessibility Tools for Libraries Step-By-Step Guide
    FOSS Accessibility Tools for Libraries Step-By-Step Guide Simon Ball November 2012 Table of Contents Table of Contents .................................................................................................................................. 2 Introduction ............................................................................................................................................ 3 Languages and Localisations .............................................................................................................. 3 Display Enhancement Tools - to support users who need larger text, different colours, screen magnification, etc... ............................................................................................................................... 4 DESKTOPZOOM ............................................................................................................................... 4 QUICKRES ...................................................................................................................................... 8 RAPIDSET ....................................................................................................................................... 9 SONAR .......................................................................................................................................... 11 VIRTUAL MAGNIFYING GLASS ........................................................................................................ 12 Audio Tools – to support users who prefer to listen
    [Show full text]