- roll-service.by

Visual work for the computer and its consequences

Already in the early years of computerization was noted specific visual fatigue among users of displays, a common name of "computer vision syndrome" (CVS-Computer Vision Syndrome). Its causes few. And above all - formed over millions of years of evolution of human visual system that is suited to the perception of objects in the reflected light (Nature paintings, drawings, printed texts, etc.) rather than to work with the display. The image on the display is fundamentally different from the usual eye observation of objects - it glows, is composed of discrete points, but mertsaet, ie, those points with some frequency zazhigayutsya and extinguished; color computer image does not match the natural color (light spectra luminophores differ from the absorption spectra visual pigments in the cones retina that are responsible for our color vision). But not only features the image on the screen cause visual fatigue. When working on the computer for hours at the eye is never necessary phases of relaxation, eye strain, their performance declines. Much of the load body is when you enter the information as the user is often forced to move from screen to view text and a keyboard at different distances and in different lighting.
What is expressed visual fatigue? Today, millions of users complain zatumanivanie vision, difficulty in moving sight to the neighbors long and distant to near objects, the apparent change in the color of their dvoenie, unpleasant sensation in the eye - the sense of burning, "sand", redness century, when the pain Traffic eye.


Backing up the blog on Blogspot. Blogger Backup utility
The Office of visualization
Playing audio and video files
Development and dissemination of computer viruses
Version Mobile Forex 2.15: A new approach to reliability and convenience
Loss of information - whether it can be avoided?
New Decision on the market Soa
The structure of the PC
Animation on your computer desk
Spam and how to cope with it
Proxy Server - This effective way of protecting information as well as a barrier to attack, hackers
Concentrators Ethernet NetGear
Linux: Gentoo Vs Ubuntu Functionality
Optimal cache lifetime for Joomla CMS
Theft of computer data
Hide your important documents, a computer in seconds
Best Antivirus
The most demanded software!
Nosy about the habits of your guy online?
General characteristics of Cybercrime
Safety Data
Free software, whether or not to be
Availability of Linux: The importance of today's world
Erg-exercises to prevent PVPN
Computer virus
1C Program Office Trade 8
Your teenager safely use the Internet?
Spyware battle; Use of firewall protection
Tips software and programs connected branch
UAB Business Technology Conducted Integrated Automation Ltd. Insurance Company Amkopolis
ABOUT personal characteristics COMPUTER CRIMINALS
"Trojan horse"
Microprocessors used in CompactPCI-systems
Advantages of Mobile Commerce
SWISH Max or Flash animation effects
Rolling to previous versions of Microsoft Windows
Hackers can control a PC without the knowledge of their owners
Local bus
Changing the design desktop
How Stress Editor In Word 2007
The development control information tools for PADS
The device Netping Cooler Board Received At Warehouse Company Zao Light Kommunikeyshn
Linear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4)
Development of Software Development Projects
Type Danyh in C + + I Unlike Java
The physical medium for LANs
Gigabit Ethernet Technology
Fire systems company Satel now can be controlled by phone or Ethernet
Split Access database
Icons in the design. Stages and stage of development of computer
What your child is doing online?
The company Janet Systems Llc Presented Soa-Platform The exhibition E-Kazakhstan
Client accounting, Accounting orders - the most popular Software