Describe how research labs study how typography affects people's ability to read and understand content.  Include "eyetracking" and "heatmaps" in your response.

What will be an ideal response?


Some research looks at print-based materials or reading on-screen, while some research compares the two. To assess the readability and legibility of content, researchers ask subjects how comfortable or uncomfortable they were while reading; researchers can track the amount of time it takes for subjects to read a particular passage, and researchers can test subjects' understanding of the passage after reading.

In addition, some labs use eyetracking cameras and software to track people's eye movements as they read a page or screen of material. The software produces "heatmaps" with spots of color indicating the areas of the page that people viewed most. This provides valuable information on the success of different page layouts and the effects of different text formatting on people's reading behaviors.

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT listed in the textbook as a type of screening area that may be used by companies?

A) Driving record B) Criminal background C) Health history D) Employment history

Computer Science & Information Technology

Access uses ________ to speed searching and sorting

Fill in the blank(s) with correct word

Computer Science & Information Technology

There are several ways to do a compile-time initialization of two-dimensional arrays. All of the following are valid ways EXCEPT ____.

A. int [, ] anArray = {{100, 100, 100} {100, 100, 100}}; B. int [ , ] anArray = new int [ , ] {{100, 100, 100} {100, 100, 100}}; C. int [ ,  ] anArray = new int [2, 3 ] {{100, 100, 100} {100, 100, 100}}; D. int [ ] anArray = new int [10 ] {{100, 100, 100} {100, 100, 100}};

Computer Science & Information Technology

?Asymmetric encryption uses a pair of keys that are unique generated on each system. What are these two keys called?

A. ?normal key B. ?public key C. ?secret key D. ?private key

Computer Science & Information Technology