Describe ergonomic keyboards, Computer Engineering

Assignment Help:

Q. Describe Ergonomic Keyboards?

Ergonomics is the study of environment, conditions as well as efficiency of workers. Ergonomics proposes that keyboard wasn't designed with human beings in mind. Certainly continuous typing can be dangerous to health.  This can lead to pain or some ailments like the Carpal Tunnel Syndrome.

For normal typing on a keyboard you have to place your hands separately bending them at wrists and hold this position for a long time. You also have to bend your wrist vertically in particular if you elevate your keyboard employing the little feet behind keyboards.  This stresses the wrist ligaments and squeezes the nerves running in the hand by the Carpal tunnel through wrist bones. 

To decrease the stress keyboards known as ergonomic keyboards have been designed.  These split the keyboard in two and angle the two halves so as to keep wrists straight. To decrease vertical stress many keyboards also offer extended wrist rests. For those who indulge in heavy, regular typing it's recommended that they employ more ergonomics based keyboards and follow ergonomic advice in all aspects of their workplace.


Related Discussions:- Describe ergonomic keyboards

State the term- interviewing, State the term- Interviewing This involv...

State the term- Interviewing This involves a one to one question & answer session between analyst and customer/employee. A good method if analyst wants to probe deeply into on

Define throughput, Define throughput?  Throughput in CPU scheduling is ...

Define throughput?  Throughput in CPU scheduling is the number of processes that are completed per unit time. For long processes, this rate might be one process per hour; for s

What are the disadvantages of fcfs scheduling algorithm, What are the disad...

What are the disadvantages of FCFS scheduling algorithm as compared to shortest job first (SJF) scheduling? Disadvantages: (i) Waiting time can be huge if short requests w

Game playing - artificial intelligence, Game Playing: We have now disp...

Game Playing: We have now dispensed with the necessary background material for AI problem solving techniques, and we just considered to looking at particular types of problems

Source and destination are named the same, What happens if the both source ...

What happens if the both source and destination are named the same? Ans) The import operation present in MS Access does not overwrite or change any of the existing tables or obj

.image forgery detection, what is the code to detect image forgery using Ma...

what is the code to detect image forgery using Matlab..??

De multiplexer, design a gray to bcd code converter using 16:1 de multiplex...

design a gray to bcd code converter using 16:1 de multiplexe

Explain the term confidentiality - firewall design policy, Explain the term...

Explain the term Confidentiality - Firewall Design Policy Whilst some corporate data is for public consumption, the vast majority of it should remain private.

Explain protection mechanism, Explain Protection mechanism. Protection...

Explain Protection mechanism. Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a) Access controls list

create a class called auditorium, Create a class called auditorium that sp...

Create a class called auditorium that specifies the seats in the auditorium. The class should include at least one data item: seat (two dimensional array of Char) and at least thre

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd