In a web browser an access key or accesskey allows a
computer userto immediately jump to a specific part of a web pagevia the keyboard. They were introduced in 1999 and quickly achieved near-universal browser support (including Internet Explorer 4, Netscape 6, Safari, Omniweb, and iCab).
In most web browsers, the user invokes the access key by pressing keypress|Alt (on PC) or keypress|
Ctrl(on Mac) simultaneously with the appropriate character on the keyboard. In Opera, the user presses keypress|⇧ Shift+keypress|Esc followed by the access key (without Alt). In Mozilla Firefox 2.0 the access key keyboard combination was changed to keypress|Alt + keypress|⇧ Shift (still configurable via about:config), while in Amaya, the preferences allow the user the option of choosing keypress|Ctrl "or" keypress|Alt. In Firefox 3.0, this has been changed so that the key combination only focuses on the link, and an keypress|Enter is required after the access key combo. In Konqueror on Linux, The keypress|Ctrl key is pressed and released, and then the access key is pressed.
Whilst Mozilla and Firefox versions prior to 3.0 will execute the corresponding links immediately on the press of the access key, IE will just focus on the link and require keypress|↵ Enter to be pressed in order to activate the link. If multiple identical access keys are assigned within the same document, IE will tab through them on each keypress (IE will tab backwards if keypress|⇧ Shift is pressed as well). This way, links can be logically grouped in various access key rings for easier navigation. IE 4.0 only supported letters of the English alphabet as accesskeys. Firefox 2.0 will activate the last of a group of links assigned the same accesskey.
In the summer of 2002, a Canadian Web Accessibility consultancy did an informal survey to see if implementing accesskeys caused issues for users of
adaptive technology, especially screen reading technology used by blind and low vision users. These users require numerous keyboard shortcuts to access web pages, as "pointing and clicking" a mouse is not an option for them. Their research showed that most key stroke combinations did in fact present a conflict for one or more of these technologies, and their final recommendation was to avoid using accesskeys altogether. (See the link below: [http://www.wats.ca/show.php?contentid=32 Using Accesskeys - Is it worth it?] ).
The [http://www.w3.org/ World Wide Web Consortium] , the organization responsible for establishing internet standards, has acknowledged this short-coming, and in their latest draft documents for a revised web authoring language ( [http://www.w3.org/TR/2005/WD-xhtml2-20050527/ XHTML 2] ), they have deprecated (retired) the ACCESSKEY attribute in favor of the [http://www.w3.org/TR/2005/WD-xhtml2-20050527/mod-role.html#s_rolemodule XHTML Role Access Module] .
pecifying access keys
Access keys are specified using the accesskey attribute. The value of the accesskey attribute is what the user will press in order to follow that specific link. Though the accesskey attribute sets the key that can be pressed it does not automatically notify the user of the bound access key. One convention is for the page author to show the access key value by using the '<u>' tag to underline the a letter in the link's text corresponding to the accesskey assigned. For the link below you would press keypress|Alt+keypress|H on a PC, keypress|Ctrl+keypress|H on a Mac (the command key can give undesired results) and keypress|⇧ Shift+keypress|Esc+keypress|H on Opera to be directed to index.html.
The underlining '<u>' isn't necessary, but can be useful to the user. It helps them identify which key to press to navigate to where they want to. Another possible ways of displaying which accesskeys do what is to create a page with all the accesskeys displayed. Or the webmaster could do both.
Use of standard access key mappings
As of 2004, a standard emerged using numbers, which promotes consistency and enables users more easily to predict keyboard shortcuts on different sites. These include, for example, 1 to go to the homepage, 4 for search, 9 for contact, and others. This scheme is now in use on popular sites such as ft.com and bbc.co.uk , as well as being built into popular message board software such as
Listed below is the recommended UK Government accesskeys standard:
* S - Skip navigation
* 1 - Home page
* 2 - What's new
* 3 - Site map
* 4 - Search
* 5 - Frequently Asked Questions (FAQ)
* 6 - Help
* 7 - Complaints procedure
* 8 - Terms and conditions
* 9 - Feedback form
* 0 - Access key details
* [http://www.wats.ca/show.php?contentid=32 Using Accesskeys - Is it worth it?]
* [http://www.wats.ca/show.php?contentid=43 Accesskeys and Reserved Keystroke Combinations]
* [http://www.wats.ca/show.php?contentid=47 ACCESS + KEY = Accesskey (XHTML Role Access Module still flawed)]
* [http://www.alistapart.com/articles/accesskeys/ Accesskeys: Unlocking Hidden Navigation]
* [http://www.sitepoint.com/article/accesskeys Using Accesskeys is Easy]
* [http://www.skillsforaccess.org.uk/howto.php?id=96 Optimise for keyboard access]
* [http://bugzilla.wikimedia.org/show_bug.cgi?id=477 A bug report for the MediaWiki software regarding conflicts with Accesskeys] - includes lengthy discussion of various problems on different platforms
* [http://juicystudio.com/article/firefox2-accesskeys.php Changes to Accesskeys in Firefox 2.0]
* [http://archive.cabinetoffice.gov.uk/e-government/resources/handbook/html/2-4.asp UK Government suggested numerical key standard]
* [http://www.blether.com/archives/2006/02/userdefined_acc.php User-defined Accesskeys using PHP]
* [http://userstyles.org/styles/10407 A CSS stylesheet to make access keys on a website visible]
Wikimedia Foundation. 2010.
Look at other dictionaries:
access key — prieigos raktas statusas T sritis informatika apibrėžtis Duomenų rinkinys, kuriame yra informacija apie asmenį, besikreipiantį į sistemą, ir apie jo ↑prieigos teises. atitikmenys: angl. access key; access token; token ryšiai: dar žiūrėk –… … Enciklopedinis kompiuterijos žodynas
access key — prieigos raktas statusas T sritis informatika apibrėžtis Nedidelis įtaisas, pagal kurį sistema atpažįsta jo savininką ir suteikia jam leidžiamas ↑prieigos teises. Įkišamas į sistemos aparatinės įrangos lizdą. Gali turėti įmontuotą… … Enciklopedinis kompiuterijos žodynas
Single-access key — A key in Biology is a modeling method used for categorizing species using logical choices. A single access key (Dichotomous key also called sequential key , analytical key , or pathway key ) is a key where the sequence and structure of… … Wikipedia
Multi-access key — In biology or medicine, a multi access key is an identification key which overcomes the problem of the more traditional single access keys (dichotomous or polytomous identification keys) of requiring a fixed sequence of identification steps. A… … Wikipedia
Reticulation (single-access key) — In biology, a reticulation of a single access identification key connects different branches of the identification tree to improve error tolerance and identification success [Osborne, D. V. 1963. Some Aspects of the theory of dichotomous keys.… … Wikipedia
access token — prieigos raktas statusas T sritis informatika apibrėžtis Duomenų rinkinys, kuriame yra informacija apie asmenį, besikreipiantį į sistemą, ir apie jo ↑prieigos teises. atitikmenys: angl. access key; access token; token ryšiai: dar žiūrėk –… … Enciklopedinis kompiuterijos žodynas
access token — prieigos raktas statusas T sritis informatika apibrėžtis Nedidelis įtaisas, pagal kurį sistema atpažįsta jo savininką ir suteikia jam leidžiamas ↑prieigos teises. Įkišamas į sistemos aparatinės įrangos lizdą. Gali turėti įmontuotą… … Enciklopedinis kompiuterijos žodynas
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Key Largo Woodrat — Conservation status Endangered ( … Wikipedia
Key escrow — (also known as a fair cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may… … Wikipedia