1 / 47

Understanding Text Technology and Fonts - A Comprehensive Guide

This guide provides an in-depth overview of text technology, various types of fonts, their significance, and terminologies. Learn about different font categories, styles, sizes, and techniques to make text more legible.

brownarthur
Télécharger la présentation

Understanding Text Technology and Fonts - A Comprehensive Guide

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 4 TEXT TECHNOLOGY ~ Types of fonts ~ ~ Data types ~ ~ Significance of text ~ ~ Hypertext ~ ~ Encryption~ ~ Information Retrieval~

  2. Text Technology • Text Terminologies • … can be defined as an element of information media that used various typefaces to display a sequences of characters that helping people to understand and receive some important information. • Three categories: • Alphabet characters : Uppercase (A..Z), Lower case (a..z) and intercap • Numbers : 0..9 • Special characters :Punctuation [. , ; ‘ …] , Sign or Symbols [* & ^ % $ £ ! /\ ~ # @ .…] • May also include special icon or drawing symbols, mathematical symbols, Greek Letter etc.

  3. Text Technology • Text Terminologies • Typeface :graphic representations of the alphabet, numbers, and special characters and usually vary by type sizes and styles. Contains a series of fonts. For instance, Arial, Arial Black, Arial Narrow and Arial Unicode MS are actually 4 fonts under the same family. • Font :collection of characters of a particular size and style belonging to a particular typeface family. • Size :determined by measuring from the top of a capital letter to the bottom -> normally 0.138 inches.

  4. Text Technology • Text Terminologies • Style :effects that are useful for bringing the viewer's attention (e.g: bold, italic, underlined, etc) • Leading :the distance between two lines of words (line spacing). • Kerning :the distance between two characters.

  5. Making Text Legible • Contrast • Highest possible contrast • Dark on light background • Light on dark background • Type color • Printed material, is most readable in black and white. • It is better to use colour combinations only for larger or highlighted text, such as headlines and titles

  6. Making Text Legible

  7. Making Text Legible • Point size • The relationship between readability and point size differs somewhat among typefaces.

  8. Making Text Legible • Leading and Kerning • Leading, or spacing between lines of text, should be at least 25 to 30 percent of the point size. • Kerning, space between pairs of characters, usually as an overlap for improvement appearance • Text with close letter spacing often presents difficulties for readers.

  9. Making Text Legible

  10. Making Text Legible • Font Family • Avoid complicated, decorative or cursive fonts. • Sans-serif fonts are more legible when character size is small.

  11. Making Text Legible • Font Style • A roman typeface, using upper and lower cases, is more readable than italics, oblique or condensed.

  12. Making Text Legible • Margins • Extra-wide binding margins are especially helpful in bound material because it makes it easier to hold the volume flat. • Spiral binding can be helpful.

  13. Type of fonts • Serif and Sans Serif. • Serif fonts category: • Use decorative flags or tips at the ends of strokes. • Always been used in printed media because it helps to guide the reader's eye along the text. • Sans Serif fonts category: • Do not use any decorative flags at the end of each font types. • Best uses for computer display because it gives sharper contrast

  14. Type of fonts Serif Examples:Sans Serif Examples: Times New Roman Arial Courier New Microsoft Sans Serif Garamond Verdana A Z A Z

  15. Measurement of type

  16. Rasterization Process • Convert a letter from a mathematical representation to a recognizable symbol displayed on screen or printer • To allows graphical systems able to create and use fonts. • It occurs when the computer draws the font onto the display one pixel at a time. • They can appear jagged look calledpixelation (creating a blocky) -> making them more difficult to read and follow. • Anti-aliasing is a technique to deal with this problem (based on color transitioning approach). This is to minimize the jagged edges -> smoother edges.

  17. Fonts and Operating System • Are fonts cross-platform ??? • Able to be used on different types of computers or with different software packages • To make sure that the fonts are cross-platform, users must install the fonts into computer so that the operating system can easily conform the requirements. • If not, the fonts might be mapped to other fonts (this is related to the problem of ransom-note typography). • Font mapping is a process in which fonts are substituted for other fonts that are similar in format, size and other characteristics.

  18. Text Data Files (Character set) • ASCII Coding • American Standard Code for Information Interchange • 7-bit encoding scheme. • Can cover until 128 characters (27) -> each has a unique representation of bits. • Example of ASCII representation -> this must refer to the ASCII table. 01001101 01110101 01101100 01110100 01101001 01101101 01100101 01100100 01101001 01100001 M u l t i m e d i a

  19. Text Data Files • EBCDIC Coding • Extended ASCII Character Set. • Extended Binary-Coded Decimal Interchange Code • 8-bit encoding scheme. • Can cover until 256 characters -> each has a unique representation of bits. • The first 128 characters are still remain as ASCII table,and another extra 128 characters are consist of new characters defined.

  20. EBCDIC (part of)

  21. Text Data Files • UniCode – UTF-8 • Support 16-bits - can represent more than 65,000 unique characters. • Consists of many characters including jawi/arabic, japanese, chinese.. – provides the capacity to encode all of the characters used for written languages throughout the world • It is developed by following the requirements of certain region and country.

  22. Unicode (part of)

  23. ISO Latin 1 • a standard character set developed by the International Standards Organisation. The basis for HTTP and HTML protocols – used to represent non-ASCII characters on a Web page e.g. tab(9), space (32), printing characters (33-127)

  24. Using Text in Multimedia Applications • Primary delivery mechanism • It can offers captioning, menus, and user interaction. • Variety of purposes: • Providing identification of objects such as pictures or program labels. • Delivering information in the form of captions and bulk text. • Assisting the user in navigating around the application.

  25. Using Text in Multimedia Applications • Labels and Captions • Help to identify the relationship of a picture to other information. • Tend to be short and to the point. • Should stand out from the background and easy to read.

  26. Using Text in Multimedia Applications • Informational Text • Consists of a number of words,sentences,and paragraphs that convey a message. • Text should be easily to be positioned appropriately on the display. • Always make a simple sentence,emphasis on what should be there !!!. • Background and foreground also important. • Scroll bars should be used for large amounts of text rather than shrinking the text to fit on the display.

  27. Using Text in Multimedia Applications File menu Text input List box

  28. Using Text in Multimedia Applications • Navigation and User Support • Navigation will tell “where” the user is. • Consists of buttons, list boxes, drop-down lists, and window menus. • Text is critical as an identifier or a selection element in the case of a list box (therefore it must be clear and precise).

  29. Navigation and User Support Scroll bar

  30. Navigation and User Support Keep Navigation Aids Consistent • Use the same navigation aids (navigation scheme) on all pages. • To ensure that users can use the Web site navigation effectively.

  31. Navigation and User Support Use Text-Based Navigation Aids • Wherever possible, use text-based navigation aids. • Text-based navigation works better than image-based navigation because it enables users to understand the link destinations.

  32. Navigation and User Support Groups navigation elements • Group navigation elements in close proximity. • Navigation elements help users find and move to areas of the site that have the desired information. • Also help users to develop a mental model of the Web site

  33. Hypertext Technology • Hypertext systems use text that is indexed or “marked-up” to navigate through large volumes of information. • One kind of navigational device that is very popular in multimedia and World Wide Web applications. • Can support through large amounts of information. • Subset to a hypermedia application. • In certain systems, users allowed to search some information using a defined keyword -> huge database is required for this type of hypertext system.

  34. Hypertext Technology

  35. Hypertext Technology Indexed Retrieval Systems • Consist of text that is keyed or indexed to other words. • The systems are automated so that a software program is used to build the indexes from the raw text resource. e.g: help programs use this approach to create lists of terms to make finding help topics easier. • Partially indexed systems: • Text is usually highlighted indicating a link to another word or another part of the document containing related material. • Sets of words (keywords) are identified and automatically linked to other keywords or terms.

  36. Hypertext Technology Indexed Retrieval Systems • Fully indexedsystems: • Text is fully categorized -> all words are indexed for fast retrieval. • May require significant storage space to track all links.

  37. Hypertext Technology Linked or Hyperlinked Systems • Use specific linkages between text elements and bookmarks within a document or between documents. • Bookmarks are predefined locations in a document that can be referenced by hyperlinks. • Every link is defined and set by an author. • Hyperlinks consist of two elements: • A text expression that is highlighted or set apart by underlining, bolding or other means to differentiate its appearance from other text. • Link information that is correlated to the highlighted text and the destination.

  38. Hypertext Technology text expression link information

  39. Encryption Process of converting text/data into a coded form Mainly for transmission and security purposes Process of retrieving the original text/data is called decryption Encryption/decryption methods are often called ciphersfor short

  40. Encryption Process

  41. Encryption Methods (1) Modern encryption algorithms are mathematically based. 􏰀􏰀Encryption uses parameters called encryption keys to perform the process. 􏰀􏰀The encryption/decryption methods can be categorized into symmetric (secret key) or asymmetric (public key) ciphers

  42. Encryption Methods (2) First, text/data is first translated into a numeric representation (usually ASCII) 􏰀􏰀Second, the resulting string of binary digits is then blocked into a sequence of larger numbers 􏰀􏰀Third, the numbers are then transformed/coded using a mathematical procedure. 􏰀􏰀Fourth, the coded message is then transmitted 􏰀􏰀Fifth, the receiver will use an appropriate “inverse” mathematical procedure with decryption keys to restore the code to the original binary form

  43. Symmetric Encryption

  44. Asymmetric Encription

  45. Caesar Cipher Encryption Example

  46. Usage Encryption is a huge part of the digital world. For instance, data that is sent between your web browser and your bank's online banking system is encrypted so that an eavesdropper can not obtain your login username and  password and the details of your transactions and bank accounts. In fact, any transaction involving money or sensitive data that you do over a network (the Internet being one) is likely to be encrypted. On the Internet the HTTP protocol is used for such communication. This signifies that communication of login detail will be secured via encryption.

More Related