- From: Charles McCathieNevile <charles@w3.org>
- Date: Sun, 23 Jun 2002 08:38:31 -0400 (EDT)
- To: Doyle B <doyleb@alaska.net>
- cc: jonathan chetwynd <j.chetwynd@btinternet.com>, Lisa Seeman <seeman@netvision.net.il>, <w3c-wai-gl@w3.org>
This is true. There are systems that have a way of dealing with this - either by providing a defined way of reassigning keys (and finding out what got reassigned) or by providing a pass-through mechanism - for example, a special key in a screen reader that can be used to make the next command pass through the screen reader instead of activating its normal function, so that the underlying application processes it to activate some function. Cheers Charles On Sun, 23 Jun 2002, Doyle B wrote: With respect to acces keys or combinations thereof, many assistive technology computer software programs use access keys as well. The problem starts arising when there are conflicts between keys. Meaning, if a person had multiple programs going for one reason or another the more likely it would be that assigned function keys could conflict. The operating system has a set of its own access )or maybe function keys), and any additional program would have its set of access keys. Doyle Burnett
Received on Sunday, 23 June 2002 08:38:38 UTC