Deconstructing the “Any” Key Popular Techies’ Tale Goes Call This Desired Behavior Pens

Total Page:16

File Type:pdf, Size:1020Kb

Deconstructing the “Any” Key Popular Techies’ Tale Goes Call This Desired Behavior Pens Munindar P. Singh and Mona Singh Deconstructing the “Any” Key popular techies’ tale goes call this desired behavior pens. Press the caps lock key and as follows. A user calls “acknowledged continuation.” it may affect what you type later, A customer support with a This program might look some- but the program still doesn’t problem: “The program says thing like the following in budge. On some computers, ‘press any key to continue’ but I pseudo code: when the alt key is pressed, can’t find the any key on the key- something weird may happen. board.” <stuff done before> Ditto with the function keys. Stupid user. display(“press any key to continue”); Press the power on-off key, We suppose this story is apoc- get_character() <implied wait> which exists on some keyboards, ryphal. Most people have a rea- <stuff done after> and the results may be far more sonable understanding of dramatic than desired. It is fair language even if they aren’t This is a nice program and to say the program will not con- familiar with computers. But gives every indication of being tinue as promised. we’re not surprised if some user reliable. The program displays a Some key combinations count has had this very difficulty figur- message and awaits an input as one key. Press shift and a letter ing out the “any” key. from the user. As soon as an (say, j), and it works fine, as any Our point is that although an input, any input, arrives, the programmer would expect. How- actual user may or may not be as program can continue. ever, some key combinations are ill-informed as the apocryphal When the user sees the mes- dangerous. In the Windows one, virtually all real program- sage “press any key to continue,” world, the control-alt- delete mers are insensitive. And we he or she (usually) has a readily combination opens up a window don’t mean personal insensitivity. available keyboard. By definition, listing running programs that the We mean technical insensitivity, one would expect, a keyboard is user may kill. A second control- the kind that results from view- something with keys. alt-delete can reset the computer. ing a problem solely from one’s But not all keys are alike. In the Unix world, control-C can own perspective. Experienced users know to press kill a program and control-Z sus- We imagine the programmer a key that works, such as the pends it. Control-S can suspend writing the instructions to press space bar or the enter key. How- any output. any key wants to delay process- ever, this is more a matter of a The gist of this is that a speci- ing until the user has acknowl- user having been trained through fication saying “press any key to edged reading some message. past experience to press the right continue” is far from unambigu- (This is called a dialogue, keys than a matter of the specifi- ous to the user. It may seem clear although it doesn’t allow much in cation itself being clear. from the programmer’s perspec- the way of conversation.) The For instance, some of the keys tive because the program receives programmer writes a simple pro- have no effect. Press the shift or an input only under circum- gram to achieve this effect—let’s control key and nothing hap- stances that the underlying oper- COMMUNICATIONS OF THE ACM April 2000/Vol. 43, No. 4 107 ating system deems appropriate, the users’ perspective. To under- the case of the “any” key, we that is, only when an acceptable stand a communication from the must keep trying. key is pressed. So the right dis- perspective of its recipient is one As for the matter of acknowl- play message ought to be, “press of the lessons of deconstruction edged continuation, just ask the any acceptable key to continue.” theory. user to press the space bar. c However, such an instruction A lot of people talk of the Munindar P. Singh would be meaningless, because importance of being user-cen- ([email protected]) teaches computer science at North Carolina the term “acceptable” has no tered. Here is a case where being State University in Raleigh. obvious interpretation. user-centered has direct conse- Mona Singh ([email protected]) is The moral? We as program- quences on our programs. with the Ericsson New Concepts group in mers should take into account Although thinking from another Research Triangle Park, NC. alternative perspectives, especially perspective is rarely as easy as in © 2000 ACM 0002-0782/00/0400 $5.00 Jerzy W. Grzymala-Busse and Wojciech Ziarko Data Mining and Rough Set Theory his is in response to “Myths applications of rough set theory, existing discretization methods, about Rough Set Theory” discretization is used as a prepro- based on many different T(Nov. 1998, p. 102) by cessing. However, discretization is approaches to uncertainty, could W.W. Koczkodaj, M. Orlowski, required in all rule (or tree) induc- be used as preprocessing for and V.W. Marek. The authors tion systems. Such systems consti- KDD-R and LERS. Discretization raise some important issues and tute the core of data mining (or is a technique used in many areas, express some legitimate concerns. knowledge discovery). Many such including machine learning and We are surprised they list rough well-known systems (such as learning in Bayesian networks, set theory as the only discipline in C4.5, based on conditional and is definitely not restricted to which there are two of the cited entropy or CART, based on Bayes rule induction systems based on problems—the discipline in which rule) are equipped with their own rough set theory. discretization is necessary or which discretization schemes. Neither To illustrate the complexities deals with complex data. The C4.5 nor CART use rough set involved in data analysis, the third problem raised by the theory. Practically every machine authors refer to an example of a authors is associated with the dif- learning system uses discretization table with 10 attributes, each with ference between objective and sub- while very few of them are based 20 values, which is likely to lead jective approaches to uncertainty. on rough set theory. To compli- to a large “number of possible Let us start with discretization. cate matters, discretization meth- instances.” However, one could Many people deal with discretiza- ods used in rule induction systems cite this kind of example to illus- tion unknowingly. For example, in based on rough set theory, such as trate potential problems occurring grading student work, there are KDD-R or LERS, are not based in all disciplines dealing with data, usual cut-points (90% for an “A,” on rough set theory (for example, starting from statistics, through 80% for a “B,” and so forth); orig- both KDD-R and LERS use sta- database management, and ending inal scores are replaced by inter- tistical methods). Furthermore, with machine learning (for the vals, coded by “A,” “B,” and so these discretization methods could sake of correctness, it is not clear on. The authors are probably con- be used in other systems, (in C4.5 what the authors mean by “the fused by the fact that in some or CART). On the other hand, all number of possible instances.” 108 April 2000/Vol. 43, No. 4 COMMUNICATIONS OF THE ACM Most likely they refer to the num- well-established calculus of uncer- the same phenomena. However, in ber of possible different cases tainty. For a long time there was a rough set theory the basic tools are (rows) of the table. They are mis- dispute (and still is) between the sets: lower and upper approxima- taken. The correct number is objective approach to the defini- tions of the concept. These sets 2010^10 = 1.024*10^13). In all tion of probability (based on are well defined and are computed of these areas we may deal with experiments and relative frequen- directly from the input data. big data sets and with potentially cies of outcomes) and the subjec- Thus, rough set theory is objec- large number of different data tive approach (based on experts’ tive, but it does not mean that it is sets. Again, the problem is com- opinions). For example, an indi- superior (or inferior). For exam- mon to all of these disciplines and vidual may observe a game based ple, if input data were pre- by no means occurs just in rough on a random process and evaluate processed and numerical attributes set theory. Fortunately, rough set probabilities. This is the objective were discretized by an expert, the theory offers algorithms with approach. Or, the individual may resulting data might be subjective. polynomial time complexity and ask a gambler how he or she will But again, this preprocessing is space complexity with respect to bet his or her own money. This is not a part of rough set theory, as the number of attributes and the the subjective approach. Cur- we explained previously. Input number of cases. rently, subjectivism prevails in data must be given to initiate Finally, regarding the authors’ probability theory. The propo- rough set theory procedures, and, comments about objectivity of nents of the subjective approach when rough set theory comes into rough set theory, we are puzzled do not show any inferiority com- the picture, its methods are objec- why they assume objectivity plex. The problem is definitely tive with respect to given data. c means superiority. They confuse not which approach is superior. Jerzy W. Grzymala-Busse daily life with science.
Recommended publications
  • Freestyle-Pro-Manual.Pdf
    User Manual KB900 Mac/Windows/PC SmartSet™ Cherry Low-Force Switchable Programming Engine Mechanical Keyswitches 1 Kinesis Corporation 22030 20th Avenue SE, Suite 102 Bothell, Washington 98021 USA Keyboard models covered by this manual: [email protected], [email protected] KB900-brn www.kinesis.com April 20, 2018 Edition This manual covers features included through firmware version 1.0.0. To download the latest firmware and to access all support resources visit www.kinesis.com/support. To shop for accessories visit https://www.kinesis-ergo.com/products/: Palm Supports (AC903)- Detachable Palm Supports. VIP3 Pro (AC920)- Adjustable tenting accessory and Palm Supports (5°/10°/15°). Palm Supports required for tenting. V3 Pro (AC930)- Adjustable tenting accessory (5°/10°/15°) for use without Palm Supports. Palm Pads (AC700blk)- Cushioned palm pads for use with Palm Supports. © 2018 by Kinesis Corporation, all rights reserved. Kinesis and Freestyle are registered trademarks of Kinesis Corporation. Freestyle Pro, SmartSet, and v-Drive are trademarks of Kinesis Corporation. All other trademarks are property of their respective owners. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any commercial purpose, without the express written permission of Kinesis Corporation. FCC Radio Frequency Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a residential installation.
    [Show full text]
  • QUICK START GUIDE (European Models)
    QUICK START GUIDE (European Models) Your Advantage2™ keyboard combines Kinesis’ time-tested Contoured™ design with low-force Cherry mechanical key switches and the powerful new SmartSet™ Programming Engine™. The fully programmable Advantage2 sets a new standard for comfort and productivity. With the driverless SmartSet Programming Engine, you can quickly remap keys, record macros, build custom layouts, and access all the Onboard Programming Tools using the Program Key. However, Power User Mode grants access to Advanced Features such as direct-editing, backup, and sharing of the configuration text files, and easy firmware updates, via the integrated v-drive™ (virtual removable drive). No special software or drivers are needed. The Advantage2 is plug- and-play with all operating systems that support full-featured USB keyboards.* This Quick Start Guide covers the installation and basic setup of the Advantage2. For detailed instructions on customizing your keyboard, Advanced Features, and Warranty Information please download the Advantage2 User’s Manual at: kinesis.com/support/advantage2- non-us-versions Installation 1. Plug Advantage2 into your computer’s USB port. A device installation notice will appear on your screen. 2. When the auto-installation is completed, you should see a “device is ready to use” notice on your screen. 3. For maximum comfort, install the replaceable adhesive palm pads onto the keyboard’s integrated palm rests. 4. OPTIONAL: If you are connecting an Advantage foot pedal (FS007RJ11, FS007TAF) to the keyboard, plug it into the telephone - style connector at the back of the keyboard using the coupler provided with the pedal. Important Note The SmartSet Programming Engine provides powerful tools for customizing the keyboard’s layout and settings.
    [Show full text]
  • Keyboard Scan Code Specification
    Windows Platform Design Notes Designing Hardware for the Microsoft® Windows® Family of Operating Systems Keyboard Scan Code Specification Abstract: This specification details the PS/2 Scan Codes and USB Usage Tables that are validated for compliance to the Microsoft® Windows® Logo Program testing standard. This document details the alternative make and break PS/2 scan code and USB code response for the Windows Logo Key and Application Keys, plus Advanced Configuration and Power Interface (ACPI) power controls. This specification was previous published, with the same content, as “Windows Hardware Quality Labs Keyboard Specification” and also referred to as “Windows Keys Specification” and “New Keys Specification.” Revision 1.3a — March 16, 2000 Disclaimer: The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Microsoft Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. The furnishing of this document does not give you any license to the patents, trademarks, copyrights, or other intellectual property rights except as expressly provided in any written license agreement from Microsoft Corporation. Microsoft does not make any representation or warranty regarding specifications in this document or any product or item developed based on these specifications.
    [Show full text]
  • Brief User's Guide Kinesis® Advantage™ Keyboard
    Brief User’s Guide Kinesis® Advantage™ Keyboard USB Contoured™ keyboard (Mac/PC Switchable) KB500USB, KB500USB-LF, KB500USB/QD, KB510USB This document is designed to be a quick overview and refer- ence guide for your new Advantage contoured™ keyboard. The full User’s Manual can be downloaded at kinesis.com (click on “support”). Connecting to your computer The Kinesis Advantage keyboard requires a USB port on your computer or on a wall-powered hub. For Macintosh® systems, the operating system must be OS 8.6 or more recent. For Win- Alphanumeric keys on the Advantage keyboard dows PCs, the operating system should be Windows® 2000 or The alphanumeric key layout is split into two separate sections newer. No special driver is required; just use the standard on the keyboard. However, the finger you use to press each driver provided by the operating system. Note: due to incom- key is the same one that you would use on a traditional key- plete backwards compatibility of some USB 3.0 hardware, the board. The middle row of keys is the home row. Advantage keyboard will not work on some USB 3.0 ports in a Windows 7 environment. This problem does not exist in Win- To help you to locate the home row, these keys are a different dows 8, Linux, or Macintosh OS X. color and are differently sculpted. It is important to be able to The first time you connect your keyboard to a Windows PC, find the home row by touch from anywhere on the keyboard. the system will identify the keyboard as a new USB device and To facilitate this, Kinesis has designed the tops of the home row keycaps with a cupped shape to comfortably hug your should install generic “HID” drivers provided by the operating system.
    [Show full text]
  • GP-Pro EX Ver. 2.50 Reference Manual
    36 Display or Operate a Computer from the GP This section reviews how to remotely access a server computer from a display unit. First, read the general overview about this feature in "36.1 Action Environment" (page 36-2), then go to "36.2 Settings Menu" (page 36-3) to find explanations of individual features. 36.1 Action Environment.......................................................................................36-2 36.2 Settings Menu ...............................................................................................36-3 36.3 Display or Operate a Computer from the GP................................................36-4 36.4 Settings Guide.............................................................................................36-21 36.5 Restrictions .................................................................................................36-29 36-1 Action Environment 36.1 Action Environment 36.1.1 Summary Remote PC Access (RPA) Remote PC Access (RPA) displays server computer data on the display unit using UltraVNC. With the Remote PC Access Display, you can view Microsoft Excel and PDF documents from the server computer on the display unit. You can also work with the mouse or keyboard on the server from the display unit. Remote PC Access is well-suited for computer maintenance and for viewing documents saved on the server computer. Filing Data Block0 Block1 Block2 Item Bread Butter Roll Croissant PC [PLC1]D00100 350 350 350 [PLC1]D00101 5 5 5 [PLC1]D00102 7 7 7 12Computer12 [PLC1]D00103 12 Screen LAN • Before using this feature, purchase the Remote PC Access key code (Type: EX-RPA) and provide the code for each display unit that uses Remote PC Access. • The key code cannot be reissued if you lose it. Please keep it at hand. • For more information on key code input, see )"36.3.2 Setup Procedure Detailed Procedure" (page 36-7) • You can use this feature when the GP is connected to the computer by a LAN port.
    [Show full text]
  • Windows XP Power-Users Troll the Web, Documentation, and Friends for Useful Tips and Tricks--A Keyboard Shortcut Here, an Undocu
    < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • How to Cure the SP2 Upgrade Blues • Power Hound Tips for Online Protection Windows XP Power Hound By Preston Gralla Publisher: O'Reilly Pub Date: September 2004 ISBN: 0-596-00619-5 Pages: 400 Windows XP power-users troll the web, documentation, and friends for useful tips and tricks--a keyboard shortcut here, an undocumented double-click there to eliminate annoyances, save time, and take control of their Windows XP. There's an easier way. This insightful and amusing book is packed with hundreds of power tips, cool tricks, and workarounds in one organized, easy-to-use resource--for everything from the desktop to Office programs to the registry. < Day Day Up > < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • How to Cure the SP2 Upgrade Blues • Power Hound Tips for Online Protection Windows XP Power Hound By Preston Gralla Publisher: O'Reilly Pub Date: September 2004 ISBN: 0-596-00619-5 Pages: 400 Copyright The Missing Credits About the Author About the Creative Team Acknowledgments The Missing Manual Series Introduction How This Book Works Some Experience Required About These Arrows About MissingManuals.com Chapter 1. Getting Started Section 1.1. Startup and Shutdown Section 1.2. Controlling Your Monitor and Sounds Section 1.3. Individual Windows Tricks Section 1.4. User Accounts and Logons Chapter 2. The Desktop and Interface Section 2.1. Desktop Makeover Section 2.2. The Start Menu Section 2.3. The Taskbar Section 2.4. The Control Panel Section 2.5.
    [Show full text]
  • POKER II User Manual
    POKER II User Manual Main Features: 1. Removable 2. 60% keyboard with QWERTY layout (61 Key) 3. Cherry MX key switch (Black, Blue, Brown, Red) 4. Dual layer PCB 5. Key cap material: ABS(UV coating- Backlit version only) 、PBT 6. LED backlight (Backlit version only) 7. USB Interface Package Material 1. Keyboard x 1 2. User Manual x 1 3. USB Cable x 1 Technical Specification Number of keys: US ASCII (61 keys) = US Layout Dimension: 29.5 x 10.2 x 3.8cm (Keyboard) Cable: Interface: 1.5 meters (mini USB B type) USB (DC5V ----100mA) Key switch life time: Available layout: Cherry: >50 million actuation US USA Package: 20 keyboards / 1 outer box Programming Instruction 1. Press PMode(FN + Right CTRL) to enter the programming mode (Spacebar right LED flashing) 2. Press the key you want to program ( Spacebar right LED on) 3. Key in the programming content and then press PN ( Spacebar right LED flashing again) 4. Repeat step 2 and step 3 to program other keys 5. Press PMode(FN + Right CTRL) to exit programming mode ( Spacebar right LED off) Note: • Support FN layer programming, you can select the FN combination key (e.g., FN + A) to program it • Under SELECT state (step 1), you can press PN + any key to view its content in a word processing software (e.g., Notepad) • Support time delay, press 15ms key(FN + F) each time to delay 15ms, press 0.1s key(FN + G) each time to delay 0.1s, press 0.5s key(FN + H) each time to delay 0.5s.
    [Show full text]
  • User Interface Programming
    User Interface Programming IDL Version 7.1 May 2009 Edition Copyright © ITT Visual Information Solutions All Rights Reserved 0509IDL71UIP Restricted Rights Notice The IDL®, IDL Advanced Math and Stats™, ENVI®, and ENVI Zoom™ software programs and the accompanying procedures, functions, and documentation described herein are sold under license agreement. Their use, duplication, and disclosure are subject to the restrictions stated in the license agreement. ITT Visual Information Solutions reserves the right to make changes to this document at any time and without notice. Limitation of Warranty ITT Visual Information Solutions makes no warranties, either express or implied, as to any matter not expressly set forth in the license agreement, including without limitation the condition of the software, merchantability, or fitness for any particular purpose. ITT Visual Information Solutions shall not be liable for any direct, consequential, or other damages suffered by the Licensee or any others resulting from use of the software packages or their documentation. Permission to Reproduce this Manual If you are a licensed user of these products, ITT Visual Information Solutions grants you a limited, nontransferable license to reproduce this particular document provided such copies are for your use only and are not sold or distributed to third parties. All such copies must contain the title page and this notice page in their entirety. Export Control Information The software and associated documentation are subject to U.S. export controls including the United States Export Administration Regulations. The recipient is responsible for ensuring compliance with all applicable U.S. export control laws and regulations. These laws include restrictions on destinations, end users, and end use.
    [Show full text]
  • Function Code Has Not Been Assigned to a Function Key
    Function Code Has Not Been Assigned To A Function Key hallucinatingDovelike Lin culminatedLawson never some armours declaration his chalazas! and hospitalizing Jessant Hartwell his pech denaturising so across-the-board! minimally. Saphenous and The help menu and a key press secondly, second and end of a mac, we can we will turn on the content. Customising PF-STATUS Adding custom iconfunction in. Machine downtime that link been assigned a code automatically by using PLC codes or. After bank a custom screen for our program we further call the PF-STATUS by following code. If you want to assign a wreath or key combination to ship custom function that minute not. How you Use Python Lambda Functions Real Python. When air press a function key image a Microsoft keyboard the function key does. Function Keys Shortcut In Microsoft Excel Excel Tip. It easier to a chain is interested. The keyboard would not being requested via rdp from sap answers to simulate the assigned function code has not been to a key is another function keys to welcome email. The general rule to use. You don't call a function like succeed you fix something like Code. Etiquette In general etiquette refers to a code manners or mammal of rules that. Introduction ASUS Keyboard hotkeys function ASUS Keyboard Hotkeys can be used with the Fn key property provide correct access or certain. Generation all the loadable code for TopKey is started with menu function Generate code and. T Therefore depression and selfish of voice Control accessory alone do not indicate any. A function key issue been assigned to a new type of arming STAY mode.
    [Show full text]
  • Comfort Keys Pro
    Comfort Keys Pro Copyright (c) by Comfort Software Group Title page 1 Use this page to introduce the product by This is "Title Page 1" - you may use this page to introduce your product, show title, author, copyright, company logos, etc. This page intentionally starts on an odd page, so that it is on the right half of an open book from the readers point of view. This is the reason why the previous page was blank (the previous page is the back side of the cover) Comfort Keys Pro Copyright (c) by Comfort Software Group All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Printed: Ноябрь 2020 in (whereever you are located) Special thanks to: Publisher All the people who contributed to this document, to mum and dad ...enter name..
    [Show full text]
  • Keyboard-And-Console-HOWTO.Pdf
    The Linux keyboard and console HOWTO The Linux keyboard and console HOWTO Table of Contents The Linux keyboard and console HOWTO......................................................................................................1 Andries Brouwer, aeb@cwi.nl.................................................................................................................1 1. Useful programs...................................................................................................................................1 2. Keyboard generalities..........................................................................................................................1 3. Console generalities.............................................................................................................................1 4. Resetting your terminal........................................................................................................................1 5. Delete and Backspace..........................................................................................................................1 6. The console character sets...................................................................................................................1 7. Console switching................................................................................................................................1 8. Ctrl−Alt−Del and other special key combinations..............................................................................2 9. How to get out
    [Show full text]
  • User's Manual- Advantage2 6-28-16.Pub
    USER’S MANUAL Advantage2 Family of Contoured Keyboards™ with SmartSet™ Technology KB605 KB600 Designed and Assembled in the USA Mac/Windows/PC Contoured SmartSet™ Onboard Cherry Mechanical Switchable Keyboard™ Programming Engine Keyswitches 2 USER’S MANUAL Kinesis® Advantage2™ Keyboard with SmartSet™ Technology Keyboard Models Covered by This Manual: • KB600: Advantage2 • KB600LF: Advantage2 LF (“Linear Feel”) • KB600QD: Advantage2 QD (“QWERTY/Dvorak”) • KB605: Advantage2 Silver • KB620-XX: Advantage2 Limited July 2016 Edition © 2016 by Kinesis Corporation, all rights reserved. Printed in the USA on recycled paper. KINESIS is a registered trademark of Kinesis Corporation. ADVANTAGE2, CONTOURED KEYBOARD, SMARTSET and V-DRIVE are trademarks of Kinesis Corporation. WINDOWS, MAC, and ANDROID are registered trademarks of Microsoft Corporation, Apple, Inc., and Google, Inc., respectively. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any commercial purpose, without the express written permission of Kinesis Corporation. KINESIS CORPORATION 22030 20th Avenue SE, Suite 102 Bothell, Washington 98021 USA [email protected], www.kinesis.com 3 FCC Radio Frequency Interference Statement Note This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
    [Show full text]