Browse Definitions :
Definition

help system (help file)

A help system (sometimes called a help file ) is a documentation component of a software program that explains the features of the program and helps the user understand its capabilities. A bit like an extensive, organized, and thorough collection of FAQ s (frequently asked questions), the help system's purpose is to provide the answers that a user needs to understand to use the program effectively.

In most Windows applications, pressing the F1 key opens the help system for the program. Most often, a help system consists of a multi-part window with a program overview, an index, a contents listing, and a search capacity. In Microsoft Word, however, pressing F1 may summon an extremely persistent animated paper clip character called Clippit, often referred to as "Clippy." Designed to be user-friendly, Clippit does his best to respond to natural language questions.

In Word '97 and 2000, if you'd prefer a different assistant, you can select another one: Go to Help > select Show the Office assistant (if Clippit is already selected, just right-click and select Options ) > select the Gallery tab, and hit the Next button to choose among an Albert Einstein look-alike, Mother Nature, a robot, and others (assuming you've installed them). If you'd prefer to look for answers yourself, click the Options tab and deselect Use the Office Assistant . Then, the Help menu will take you to the traditional help system for Word.

There are a number of products, such as RoboHelp and ComponentOne, that are used to automate the tasks involved in help system development.

This was last updated in March 2011

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close