Keyboard Emulation System

Total Page:16

File Type:pdf, Size:1020Kb

Keyboard Emulation System Europaisches Patentamt J European Patent Office 0y Publication number: 0 441 032 A2 Office europeen des brevets EUROPEAN PATENT APPLICATION © Application number: 90312783.5 @) mt. ci.5: G06F 3/023 ® Date of filing: 23.11.90 The title of the invention has been amended Mail Stop 20 B-O, 3000 Hanover Street (Guidelines for Examination in the EPO, A-lll, Palo Alto, California 94304(US) 7.3). (§) Inventor: Poland, McKee D. © Priority: 29.12.89 US 458955 302 Portola Road Portola Valley, California 94028(US) @ Date of publication of application: 14.08.91 Bulletin 91/33 0 Representative: Colgan, Stephen James et al ® Designated Contracting States: DE FR GB IT CARPMAELS & RANSFORD 43 Bloomsbury Square @ Applicant: Hewlett-Packard Company London WC1A 2RA(GB) Keyboard emulation system. © The system unit (16) of an IBM compatible per- operation. The successful collection of encoded sonal computer generates a distinctive audible character data and transmission of that data to the "Beep" signal from the system unit's own sound keyboard port (28) of a host computer by a relatively transducer (32) in response to the successful de- unsophisticated operator is further enhanced by code of a barcode label (26) in a keyboard emulation built-in logic (40,42,44) for reliably and simply de- data collection device such as a barcode reader ducing which keyboard communication protocol from (10). To initiate the generation of such a Beep by the several candidates is currently in use and for deduc- system unit, the keyboard emulation system simu- ing the status of the computer's Caps Lock flag by lates (114,116) a benign error condition (OOH;FFH) eliciting a Reset Status Indicators command from the which does not affect the operation of any applica- system unit. If the Caps Lock flag is in its shifted tion programs resident in the system unit and which state, all case sensitive data is automatically trans- does not require any modifications to the operating posed (114) so that it will be correctly interpreted. system or any special device drivers for its proper (M CO Q_ Lll Rank Xerox (UK) Business Services EP 0 441 032 A2 KEYBOARD EMULATION SYSTEM HAVING IMPROVED OPERATOR INTERFACE Field of Invention (typically associated with the IBM PC XT) and "Mode 2" (typically associated with the IBM PC AT The present invention relates to a keyboard and the IBM PS/2). emulator type of data collection device, and more The system unit's operating system software particularly to improvements in the operator inter- 5 and hardware, typically including Basic Input Out- face thereof whereby the operator is assured of the put System (BIOS) firmware provided by the com- successful collection of encoded character data puter manufacturer, then converts the keyscan and transmission of that data to the keyboard port code signal appearing at the keyboard port into a of a host computer even if the operator is not corresponding sequence of character codes and/or viewing the decoded data as it is processed by the w status flags in a form usable by the application computer. programs. In particular, a keyboard I/O driver (or a special purpose driver included as part of a particu- Background of the Invention lar application program) handles the "hand-shake" protocol used to transfer keyscan data from the A keyboard is an example of a manual data 75 keyboard unit to the computer, defines which keys collection device for a computer system. Typically, are given the attributes of typematic, shift, toggle, an operator depresses keys similar to those of a and/or control, and updates one or more shift state typewriter or an adding machine, and the individual flags used to process the next incoming keyscan keystrokes are sequentially converted by built-in code. The actual code and protocol used will de- switches and logic circuitry within the keyboard unit 20 pend on the type of computer: The most common into a sequence of keyscan codes, each corre- types of keyboards are the 84 key keyboard typi- sponding to the actuation of a key on the keyboard. cally used with the IBM PC XT (Code 1) and the The sequence of keyscan codes is thereafter con- "enhanced" 101/102 key keyboard typically asso- verted into a corresponding sequence of alphanu- ciated with the IBM PC AT (Code 2). These two meric (eg, A-Z, a-z, 0-9), symbol (eg, !, @, #, $, %) 25 computer types are normally associated respec- and/or function (eg, [enter], [backspace], etc) char- tively with the two aforementioned protocols (Mode acter codes. A commonly used set of such char- 1 and Mode 2); however, as exemplified by certain acter codes is the 7-bit ASCII (American Standard of the IBM PS/2 personal computers, it is also Code for Information Interchange) code, which also possible to use a Code 1 code set with a Mode 2 exists in various "extended" 8-bit versions. 30 protocol, although most PS/2 models use the Mode In many small computer systems, including the 2/Code 2 combination. (In fact, the IBM PS/2 sys- ubiquitous "IBM-compatible personal computer", a tem units are typically programmed to accommo- keyboard unit transmits keyscan codes to a system date both the Code 1 and the Code 2 keyscan unit via a keyboard port, and the system unit code sets, as well with a third keyscan code set, converts the keyscan codes to character codes 35 known as "Code 3"). which serve as input data to various user-oriented When using such an arrangement of keyboard applications programs. Two sets of such keyscan unit and system unit, the operator may press and codes are in common use, a "Code 1" code set release the keys faster than the corresponding typically associated with the original IBM PC and keyscan codes can be read (and processed into characterized by only 10 function keys and an 40 character codes) by the system unit. If the rate at integrated numeric/cursor keypad, and a "Code 2" which keyscan codes are entered into the keyboard code set associated with the IBM AT and char- buffer exceeds the rate at which the keyscan codes acterized by 12 function keys and dedicated cursor are removed from the buffer for transmission, the keys. result will be a "keyboard buffer overflow" con- In such a system, a programmed microproces- 45 dition, which is signified to the system unit of IBM sor inside the keyboard unit performs a number of compatible computers by a special keyscan code. functions, including self-test, scans the individual The system unit BIOS reacts to this special keys to determine their respective states, gener- keyscan code by executing a "Beep" routine, ates a keyscan code each time one of the keys which activates a small loudspeaker or other sound changes state ("make" or "break"), stores up to 16 so transducer inside the system unit, and thus pro- keyscan codes in a buffer, and transfers each vides the operator with an audible warning. A simi- keyscan code from the buffer to the system unit in lar situation will also be true for the keyboards accordance with a defined hand-shake protocol. connected not directly to a system unit, but rather Two such IBM compatible protocols are in common to a terminal connected to a remote host computer, use, which will be referred to herein as "Mode 1" in which case either the remote computer or built EP 0 441 032 A2 in logic within the terminal will detect a benign from another type of data collection device, it is keyboard error condition and cause a sound trans- preferable to provide the operator with visual and/or ducer inside the terminal to generate a distinctive audible feedback. One example of such feedback Beep. It should be noted that the keyboard buffer is the display of the characters on the computer's overflow condition is "benign" in the sense that it 5 video monitor as they are being input from the has no adverse influence on the operation of the keyboard. In addition, keyboard units are frequently computer system unit (or computer terminal), and provided with mechanical or electrical means to the normal operation of the computer continues, generate an audible "click" each time a key is but accompanied by an audible signal which alerts depressed, which provides an audible form of oper- the operator to a possible corruption of input data w ator feedback. In the case of ASCII data which is from the keyboard. input via a serial port, appropriate operator feed- Other data collection devices usable with com- back is sometimes provided by means of a special puter systems and computer terminals include con- software driver or application program that pro- tact barcode readers, non-contact (e.g. laser) bar- duces the desired feedback when it detects trans- code readers, magnetic stripe readers, electrical 75 mission of ASCII data. multimeters, OCR scanners, and electronic weigh- Although the ASCII character set includes a ing scales. "Bell" character (ASCII OOTio) which typically To accommodate these other types of data causes the MS-DOS operating system to generate input devices (as well as variety of other input and a Beep (using the computer's built-in sound trans- output devices) a small computer typically is also 20 ducer) if echoed to the display device, many soft- provided with a serial port and the necessary soft- ware programs either ignore the Bell character or ware and hardware to read and write ASCII data to treat it as just another displayable symbol ( 0 or and from the serial port. ~G). Using a special driver or application program A keyboard emulation device may be defined with a keyboard emulation device is especially as a data collection device which transmits data to 25 undesirable because it defeats its primary advan- a computer as keyscan codes through the com- tage, which is software transparency.
Recommended publications
  • Keyboard Shortcuts for Windows Computers
    AbilityNet Factsheet – May 2019 Keyboard Shortcuts for Windows computers This factsheet highlights some of the actions you can carry out quickly on your computer by using key combinations rather than using the mouse to navigate menus and options. These key combinations are referred to as shortcuts as they are often a much quicker way of carrying out tasks. They can also be particularly useful for repetitive actions. AbilityNet Factsheet: Keyboard Shortcuts Page 1 of 12 www.abilitynet.org.uk/factsheets May 2019 Contents 1. What are shortcuts ............................................................................................. 3 A note on Apple (Mac) computers ........................................................................... 3 Conventions ............................................................................................................. 3 Navigating Within Windows Using the Keyboard ..................................................... 4 Reference Chart ...................................................................................................... 7 Autocorrect as a shortcut ......................................................................................... 9 2. How can AbilityNet help? ................................................................................. 10 Free advice and home visits .................................................................................. 10 My Computer My Way ........................................................................................... 10 Workplace
    [Show full text]
  • REMOVABLE CORE) ASSEMBLY for Installation Assistance, Contact SARGENT at 800-727-5477 •
    INSTRUCTIONS FOR REKEYING THE SARGENT® (65-)11-10- (6300) LARGE FORMAT INTERCHANGEABLE (REMOVABLE CORE) ASSEMBLY For installation assistance, contact SARGENT at 800-727-5477 • www.sargentlock.com The 6300 series LFIC (Removable Core) uses a control key whose bittings match the Top Master Key of the key system in positions 1, 2, 5 and 6. The control bittings in positions 3 and 4 are selected from the Key Bitting Array of the master key system. This method significantly reduces the bittings available in the Key Bitting Array of any Top Master Key. Increasing the levels in the master keying system and cross keying also has a significant impact on the yield of keys at each selected level. The chamber stack value for the 6300 series LFIC (removable core) is normally calculated by using a stack value of 15 in positions 1, 2, 5, and 6. This is the total value of the bottom pins, master splits and driver pins that would be required to pin the core (based on the keying levels). In chambers 3 and 4 of the 6300 series LFIC (removable core), the stack value is 20. This is done to allow the control key to achieve a shear line in chambers 3 and 4 of the control sleeve. Important Cylinders master keyed at the factory prior to January 2009 use hollow drivers and SARGENT recommends their continued use. Hollow drivers must be used in chambers 3 and 4. A different spring is used in conjunction with the hollow drivers. These special drivers and springs are included in a special pinning kit #437 RC/UL.
    [Show full text]
  • Keyboard Shortcuts for Avid Editors
    Keyboard Shortcuts for Avid Editors (Media Composer, Newscutter, and Symphony) • Audio • Bin • Capturing • Editing • Effect Mode • Playing & Marking • Timeline • Trim Mode • Tools • Other Note: = Command Key Audio Windows Macintosh Description Alt + click Pan slider Option + click Pan slider Snaps to Mid in Audio Mix tool Snaps to 0 dB in Audio EQ and Audio Alt + click Volume slider Option + click Volume slider tools Alt + click Audio Track Option + click Audio Track Selects track for audio scrub Monitor button Monitor button monitoring Alt + click Track Solo button Option + click Track Solo (Automation Gain tool) button (Automation Gain tool) or or Mutes selected track (1 to 8) Alt + number (1 to 8) at top Option + number (1 to 8) at of keyboard top of keyboard Moves selected audio keyframe Alt + drag keyframe Option + drag keyframe horizontally in Timeline Alt + click digital scrub parameters in Composer Option + click digital scrub monitorOption + click digital parameters in Composer Opens Audio Settings dialog box scrub parameters in monitor Composer monitor Bin Windows Macintosh Description Ctrl + N Creates a new bin + N Selects all items in the active bin or the Project Window, Ctrl + A + A if selected Ctrl + W Closes open windows, bins or dialog boxes + W Prints the selected bin in whatever view you have Ctrl + P + P selected (Text, Frame or Script View) Ctrl + D Duplicates selected clip(s), sequence(s), or title(s) + D Creates a Group Clip from selected Master Clips or Sub Shift + Ctrl + G + Shift + G Clips First, select clips or sequences in the bin, then use this Ctrl + I shortcut to open the Console window, which will display + I useful information Hold down these shortcut keys, then click on the Clip Shift + Ctrl + click Shift + Ctrl + click Menu.
    [Show full text]
  • PC Basics Bronze Level
    PC Basics Bronze Level Keyboard Call us on 03333 444019 Learning Guide Getting Started: Using the Keyboard The Keyboard is, along with the mouse, vital to controlling your computer. Keyboards work by translating your keystrokes into a signal that a computer can understand. Keyboards usually have a standard layout but there are some “special keys” and “shortcuts” which are helpful to know about: Light sensors (for Tab Key Function Keys Delete Number Lock and Caps Lock) Escape Caps Lock Backspace Space Bar Number Keys Shift Enter Control Alt Arrow Keys Menu Key Windows Key Tip : The keyboard shown above is the FULL version that would come as a separate piece of equipment when you have a DESKTOP computer. The keyboard that is built-in on LAPTOPS is sometimes a smaller version of the one above. Please see over for a full explanation of all the above keys and buttons… Learning Guide Keyboard Commands Tab: Tab is used to advance the cursor to the next “tab spot”, which could be in a form (on the Internet) or in a letter (word processor) Caps Lock: Locks the keyboard so that anything you type is in CAPITAL LETTERS. Usually the computer shows some kind of warning that you have pressed this key e.g. a light on the keyboard Shift: Holding down the Shift key (usually denoted with a ↑on the key) has a number of uses, both to type capital letters and to access the symbols on the upper part of a key, e.g. the £ sign above the number 3. There are Shift keys on both sides of the keyboard.
    [Show full text]
  • Startup Keyboard Shortcuts Press the Key Or Key Combination Until The
    Startup keyboard shortcuts Press the key or key combination until the expected function occurs/appears (for example, hold Option during startup until Startup Manager appears, or Shift until "Safe Boot" appears). Tip: If a startup function doesn't work and you use a third-party keyboard, connect an Apple keyboard and try again. Key or key combination What it does Option Display all bootable volumes (Startup Manager) Shift Perform Safe Boot (start up in Safe Mode) C Start from a bootable disc (DVD, CD) T Start in FireWire target disk mode N Start from NetBoot server X Force Mac OS X startup (if non-Mac OS X startup volumes are present) Command-V Start in Verbose Mode Command-S Start in Single User Mode To use a keyboard shortcut, or key combination, you press a modifier key with a character key. For example, pressing the Command key (the key with a symbol) and the "c" key at the same time copies whatever is currently selected (text, graphics, and so forth) into the Clipboard. This is also known as the Command-C key combination (or keyboard shortcut). A modifier key is a part of many key combinations. A modifier key alters the way other keystrokes or mouse clicks are interpreted by Mac OS X. Modifier keys include: Command, Control, Option, Shift, Caps Lock, and the fn key (if your keyboard has a fn key). Here are the modifier key symbols you can see in Mac OS X menus: (Command key) - On some Apple keyboards, this key also has an Apple logo ( ) (Control key) (Option key) - "Alt" may also appear on this key (Shift key) (Caps Lock) - Toggles Caps Lock on or off fn (Function key) Startup keyboard shortcuts Press the key or key combination until the expected function occurs/appears (for example, hold Option during startup until Startup Manager appears, or Shift until "Safe Boot" appears).
    [Show full text]
  • Key Control Policy
    Virginia Polytechnic Institute and State University Access Control: Key Control Policy No. 5620 1.0 Purpose This is a statement of policy regarding access control of buildings and property owned or Policy Effective Date: occupied by Virginia Tech. This policy will serve as the framework by which keys to 6/16/1993 university buildings will be issued, monitored, and maintained. The Key Control Office within the Facilities Department and the Virginia Tech Police Department shall implement Last Revision Date: and oversee the procedures set forth herein. 1/3/2017 The Key Control Office and Virginia Tech Police Department shall work closely with the Policy Owner: campus community to ensure that all university access needs are met. The dual Chris Kiwus responsibility of the two organizations will ensure checks and balances to a critical, high- risk university program. Key issuance and control for Housing and Residence Life is Policy Author: (Contact governed by the Hokie Handbook (www.hokiehandbook.vt.edu). Person) Jon Clark Teglas The issuing of keys, maintenance of physical security devices, and other arrangements concerning security for leased properties other than those at the Virginia Tech Corporate Affected Parties: Research Center are covered by the specific lease agreement for the property in question. Faculty 1.1 Objectives Staff 1. To achieve maximum physical security with minimum logistics. 1.0 Purpose 2. To establish control of the campus keying system including key duplication and 2.0 Policy distribution. 3.0 Procedures 4.0 Definitions 3. To establish a recorded chain of accountability for all keys issued. 5.0 References 4.
    [Show full text]
  • MACBOOK Keyboard Shortcuts
    MACBOOK Keyboard Shortcuts Learn about common OS X keyboard shortcuts. A keyboard shortcut is a way to invoke a function in OS X by pressing a combination of keys on your keyboard. To use a keyboard shortcut, or key combination, you press a modifier key with a character key. For example, pressing the Command key (the key that has a symbol) and the "c" key at the same time copies whatever is currently selected (text, graphics, and so forth) into the Clipboard. This is also known as the Command-C key combination (or keyboard shortcut). A modifier key is a part of many key combinations. A modifier key alters the way other keystrokes or mouse/trackpad clicks are interpreted by OS X. Modifier keys include: Command, Shift, Option, Control, Caps Lock, and the Fn key. If your keyboard has an Fn key, you may need to use it in some of the key combinations listed below. For example, if the keyboard shortcut is Control-F2, press Fn-Control-F2. Here are the modifier key symbols you may see in OS X menus: ⌘ Command key ⌃ Control key ⌥ Option key ⇧ Shift Key ⇪ Caps Lock Fn Function Key Startup shortcuts Press the key or key combination until the expected function occurs/appears (for example, hold Option during startup until Startup Manager appears, or Shift until "Safe Boot" appears). Tip: If a startup function doesn't work and you use a third-party keyboard, try again with an Apple keyboard. Key or key combination What it does Display all bootable volumes (Startup Option Manager) Shift Perform a Safe Boot (start up in Safe Mode) Left Shift Prevent
    [Show full text]
  • JAWS Keystrokes
    JAWS Keystrokes The keystrokes listed here are in tables and are grouped by headings. Major divisions are level two headings. Use the JAWS List of Headings (INSERT+F6) or the navigation quick key, H, to move quickly to the section of your choice. You can also use the navigation quick key, T, to move from one table to the next. Use the SHIFT key in combination with most navigation quick keys to move backwards. New JAWS Keystrokes Layered Keystrokes Layered keystrokes are keystrokes that require you to first press and release INSERT+SPACEBAR, and then press a different key to perform a function in JAWS. Layered keystrokes are easy to use and remember, and they do not interfere with native keystrokes within applications. Once you enter a layer, press the QUESTION MARK key to get a list of available keyboard commands within that layer. Description Command Helpful keystrokes within QUESTION MARK - ? each layer Text Analyzer INSERT+SPACEBAR, A View text on clipboard INSERT+SPACEBAR, C Show recent speech history INSERT+SPACEBAR, H INSERT+SPACEBAR, Clear recent speech history SHIFT+H Keyboard Lock on and off INSERT+SPACEBAR, L INSERT+SPACEBAR, M Select from marked place in (Mark Place first with Word (Microsoft Word only) CTRL+WINDOWS Key+K) Convenient OCR INSERT+SPACEBAR, O Research It INSERT+SPACEBAR, R Description Command Toggle Speech On or Off INSERT+SPACEBAR, S Table Layer INSERT+SPACEBAR, T Customize Web page with INSERT+SPACEBAR, X Flexible Web Windows Live Messages 1 through 5 numbers row JAWS Tandem Session Keystrokes Description Command Toggle Target and Controller Desktop Tandem Session INSERT+ALT+TAB (Controller User) Terminate JAWS Tandem Session (Controller or Target INSERT+ALT+T User) Pause Video (Controller INSERT+CTRL+SHIFT+V User) Web Pages and HTML Navigation quick keys make it faster and easier to move around on a Web page and anywhere else the Virtual Cursor is active.
    [Show full text]
  • Magic Flip Chart
    MAGic Most Used General Commands Description MAGic Keyboard Combination Keyboard Launch MAGic: Starts MAGic or closes MAGic if it is CTRL+ALT+M (only starts MAGic) running. Toolbar: Displays or hides the MAGic toolbar (user CAPS LOCK+U interface). CAPS LOCK+APPLICATION KEY MAGic Context Menu: Opens the MAGic context or menu for quick changes to MAGic settings. CAPS LOCK+RIGHT MOUSE BUTTON CLICK Decrease Rate: Decreases the MAGic speech rate. Increase Rate: Increases the MAGic speech rate. 440557-001 Rev. F www.FreedomScientific.com 800-444-4443 MAGic Magnification Commands Description MAGic Keyboard Combination Keyboard Visual Enhancements: Toggles all visual enhancements including magnification, mouse CAPS LOCK+DELETE enhancements, color enhancements, focus enhancements, and cursor enhancements. Mag Level Toggle: Switches between the current CAPS LOCK+SHIFT+DELETE magnification level and 1x magnification. All visual or enhancements will remain active. CAPS LOCK+MOUSE WHEEL CLICK CAPS LOCK+NUM PAD PLUS or Increase Magnification CAPS LOCK+MOUSE WHEEL UP or CTRL+EQUALS CAPS LOCK+NUM PAD PLUS or Decrease Magnification CAPS LOCK+MOUSE WHEEL UP or CTRL+DASH www.FreedomScientific.com 800-444-4443 MAGic Visual Enhancement Toggles Description MAGic Keyboard Combination Keyboard Mouse Enhancements: When enabled, mouse enhancements make the mouse pointer easier to track CAPS LOCK+F4 and maneuver on the screen. Cursor Enhancements: When enabled, this makes the cursor easier to locate and follow when writing or CAPS LOCK+F8 editing text. Color Enhancements: Color enhancements can be adjusted to meet individual needs for handling glare CAPS LOCK+F12 and contrast. Focus Enhancement: Displays a rectangular border that identifies and tracks the control that currently has CAPS LOCK+F the focus.
    [Show full text]
  • =RS PRICE MF02/PC21 Plus Postage
    DOCUMENT RESUME ED 283 307 it 192 419 AUTHOR Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed. TITLE Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 3: Software and Hardware. Rehab/Education Technology ResourceBook Series-. INSTITUTION Wisconsin Univ., Madison. Trace Ceater. SPONS AGENCY Department of Education, Washington, DC. REPORT NO ISBN-0-316-896144 PUB_DATE 87 GRANT G008300045 NOTE 502p.; A product of the kesea=ch and Development Center on Communication, Control, and ComputerAccess for Handicapped Individuals, For ResourceBnoks1 and 2,_see BC 192 417-418. AVAILABLE FROMTrace Research and De-..elopment Center 5-151 Weisman Center, 1500 Highland Ave., Hadison, WI 53705-2280. PUB TYPE Reference MaterialS = Dire toties/Catalogs (132) =RS PRICE MF02/PC21 Plus Postage. DESCRIPTORS *Accessibility (for DisableOr Braille; *Comptvers; *computer Software; *Disabilities; *Electronic Equipment; Input Output Devices; Older Adults; Tactile Adaptation ABSTRACT One of a series of three resource guides concerned with communication, control, andcomputer access for the disabled or the elderly, the book foccseson hardware and software. The gnide's 13 chapters_each cover products with thesame primary function. Cross reference_indexes allow access to listings of productsby function, input/output feature,and computer model. Switchesare listed_ separately by input/output features. Typically providedfor each product are usually an illustration, the productname, vendor, size, weight, power source, connector_type,cost,
    [Show full text]
  • Hot Key Reference Guide
    Hot Key Reference Guide Hot Keys for Desktops, Laptops & Touch Screens This information is available in alternative formats from www.YourDolphin.com Introduction 1 This booklet lists the most useful hot keys to control the three editions of Dolphin SuperNova: Magnifier Magnifier & Speech Magnifier & Screen Reader A list of all the hot keys for your SuperNova software can be found in the user manual. To open the manual, press F1 or click the “Help” button on the SuperNova Control Panel. To get context help and a list of available hot keys while using particular applications press CAPS LOCK + F1 from within your application. Most users prefer the default Dolphin hot key set as the most popular Speak commands can be operated by pressing a single key. When a hot key includes “NUMPAD”, this means that the key is situated on the numeric keypad, a block of keys usually on the right end of your keyboard. On a laptop the Numpad keys are usually available by holding down the FN key. Where the Numpad is unavailable or difficult to use, we recommend using the Laptop Keyboard layout. Throughout this document, Laptop hot keys that differ from the desktop are shown inside square brackets. Choosing the Keyboard Layout and Hot Key Set While SuperNova is running, open the SuperNova Control Panel by holding LEFT CONTROL and pressing SPACEBAR. Then press ALT + G to open the "General" menu, press K to open the "Keyboard and hot keys" dialogue where you can choose: keyboard layout, keyboard language and preferred hot key set. Press OK to save any changes and close the dialogue.
    [Show full text]
  • Corrosion Mechanisms of Mild Steel in Weak Acids
    Corrosion Mechanisms of Mild Steel in Weak Acids A dissertation presented to the faculty of the Russ College of Engineering and Technology of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Thu N.B. Tran August 2014 © 2014 Thu N.B. Tran. All Rights Reserved. 2 This dissertation titled Corrosion Mechanisms of Mild Steel in Weak Acids by THU N.B. TRAN has been approved for the Department of Chemical and Biomolecular Engineering and the Russ College of Engineering and Technology by Srdjan Nesic Professor of Chemical and Biomolecular Engineering Dennis Irwin Dean, Russ College of Engineering and Technology 3 ABSTRACT TRAN, THU N.B., Ph.D., August 2014, Chemical Engineering Corrosion Mechanisms of Mild Steel in Weak Acids Director of Dissertation: Srdjan Nesic The corrosion of mild steel in the presence of weak acids is a challenge for the oil and gas industry. Weak acids, such as carbonic acid (in CO2 corrosion) and acetic acid, are reported to accelerate the cathodic reaction, but there is still little agreement as to their role in corrosion mechanisms. Although assumed in many studies, there is no proof that direct reduction of these weak acids occurs and needs to be taken into account. Therefore, the intent of this research is to determine whether these weak acids mainly provide hydrogen ions via their dissociation, with resultant hydrogen ions being directly reduced at the steel surface, or if the direct reduction of weak acids is also important. Electrochemical techniques including linear polarization resistance (LPR), electrochemical impedance spectroscopy (EIS), and polarization sweeps were used to investigate the corrosion mechanisms.
    [Show full text]