Browse Definitions :
Definition

help system (help file)

A help system (sometimes called a help file ) is a documentation component of a software program that explains the features of the program and helps the user understand its capabilities. A bit like an extensive, organized, and thorough collection of FAQ s (frequently asked questions), the help system's purpose is to provide the answers that a user needs to understand to use the program effectively.

In most Windows applications, pressing the F1 key opens the help system for the program. Most often, a help system consists of a multi-part window with a program overview, an index, a contents listing, and a search capacity. In Microsoft Word, however, pressing F1 may summon an extremely persistent animated paper clip character called Clippit, often referred to as "Clippy." Designed to be user-friendly, Clippit does his best to respond to natural language questions.

In Word '97 and 2000, if you'd prefer a different assistant, you can select another one: Go to Help > select Show the Office assistant (if Clippit is already selected, just right-click and select Options ) > select the Gallery tab, and hit the Next button to choose among an Albert Einstein look-alike, Mother Nature, a robot, and others (assuming you've installed them). If you'd prefer to look for answers yourself, click the Options tab and deselect Use the Office Assistant . Then, the Help menu will take you to the traditional help system for Word.

There are a number of products, such as RoboHelp and ComponentOne, that are used to automate the tasks involved in help system development.

This was last updated in March 2011
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close