Cursor (user interface)
This article needs additional citations for verification. (May 2017) |

In human–computer interaction, a cursor is an indicator used to show the current position on a computer monitor or other display device that will respond to text input.
îÏá
Text cursor

The pointer hotspot is the active pixel of the pointer, used to target a click or drag. The hotspot is normally along the pointer edges or in its center, though it may reside at any location in the pointer.[1][2]
In many GUIs, moving the pointer around the screen may reveal other screen hotspots as the pointer changes shape depending on the circumstances. For example:
- In-the text that the user can select or edit, the pointer changes to a vertical bar with little cross-bars (or curved serif-like extensions) at the top and bottom — sometimes called an "I-beam" since it resembles the cross-section of the construction detail of the same name.
- When displaying a document, the pointer can appear as a hand with all fingers extended allowing scrolling by "pushing" the displayed page around.
- Graphics-editing pointers such as brushes, pencils, or paint buckets may display when the user edits an image.
- On an edge or corner of a window the pointer usually changes into a double arrow (horizontal, vertical, or diagonal) indicating that the user can drag the edge/corner in an indicated direction to adjust the size and shape of the window.
- The corners and edges of the whole screen may also act as hotspots. According to Fitts's law, which predicts the time it takes to reach a target area, moving mouse and stylus pointers to those spots is easy and fast. As the pointer usually stops when reaching a screen edge, the size of those spots can be considered of virtual infinite size, so the hot corners and edges can be reached quickly by throwing the pointer toward the edges.[3][4]
- While a computer process is performing tasks and cannot accept user input, a wait pointer (an hourglass in Windows before Vista and many other systems, spinning ring in Windows Vista and later, watch in classic Mac OS, or spinning pinwheel in macOS) is displayed when the mouse pointer is in the corresponding window.
- When the pointer hovers over a hyperlink, a mouseover event changes the pointer into a hand with an outstretched index finger. Often some informative text about the link may pop up in a tooltip, which disappears when the user moves the pointer away. The tooltips revealed in the box depending on the implementation of the web browser; many web browsers will display the "title" of the element, the "alt" attribute, or the non-standard "tooltips" attribute. This pointer shape was first used for hyperlinks in Apple Computer's HyperCard.
- In Windows 7, when Windows Touch was introduced in the mainstream to make Windows more touch-friendly, a touch pointer is displayed instead of the mouse pointer. The touch pointer can be switched off in Control Panel and resembles a small diamond shape. When the screen is touched a blue ripple appears around the touch pointer to provide visual touch feedback. When swiping to scroll etc., the touch pointer would follow the finger as it moves. If touch and hold to right-click is enabled, touching and holding will show a thick white ring around the touch pointer. When this ring appears, releasing one's finger would perform a right-click.
- If a pen is used the left-click ripple is colorless instead of blue and the right-click ring is a thinner ring that appears closer to the pen tip making contact with the screen. A click (either left or right) will not show the touch pointer, but swiping would still show the pointer which would follow the pen tip.
- Also, the touch pointer would only appear on the desktop once a user has signed in to Windows 7. On the sign-in screen, the mouse pointer would simply jump to the point touched and a left click would be sent on a tap, similar to when a touch input is used on operating systems before Windows 7.
- In Windows 8 and above, visual touch feedback displays a translucent circle where the finger makes contact with the screen, and a square when attempting to touch and hold to right-click. A swipe is shown by a translucent line of varying thickness. Feedback can be switched on and off in Pen and Touch settings of the Control Panel in Windows 8 and Windows 8.1 or in the Settings app on Windows 10, and feedback can also be made darker and larger where it needs to be emphasized, such as when presenting. However, the touch pointer is normally less commonly visible in touchscreen environments of Windows operating systems later than Windows 7.
- The mouse-over or hover gesture can also show a tooltip, which presents information about what the pointer is hovering over; the information is a description of what selecting an active element is for or what it will do. The tooltip appears only when stationary over the content. A common use of viewing the information is when browsing the internet to know the destination of a link before selecting it, if the URL of the text is not recognizable.
- When using touch or a pen with Windows, hovering when supported or performing a set gesture or flick may show the tooltip
I-beam pointer

The I-beam pointer (also called the I-cursor) is a cursor shaped like a serifed capital letter "I". The purpose of this cursor is to indicate that the text beneath the cursor can be highlighted and sometimes inserted or changed.[5]
Pointer trails and animation

Pointer trails can be used to enhance its visibility during movement. Pointer trails are a feature of GUI operating systems to enhance the visibility of the pointer. Although disabled by default, pointer trails have been an option in every version of Microsoft Windows since Windows 3.1x.
When pointer trails are active and the mouse or stylus is moved, the system waits a moment before removing the pointer image from the old location on the screen. A copy of the pointer persists at every point that the pointer has visited at that moment, resulting in a snake-like trail of pointer icons that follow the actual pointer. When the user stops moving the mouse or removes the stylus from the screen, the trails disappear and the pointer returns to normal.
Pointer trails have been provided as a feature mainly for users with poor vision and for screens where low visibility may become an issue, such as LCD screens in bright sunlight.
In Windows, pointer trails may be enabled in the Control Panel, usually under the Mouse applet.
Introduced with Windows NT, an animated pointer was a small looping animation that was played at the location of the pointer.[6] This is used, for example, to provide a visual cue that the computer is busy with a task.[7] After their introduction, many animated pointers became available for download from third party suppliers. Unfortunately, animated pointers are not without their problems. In addition to imposing a small additional load on the CPU, the animated pointer routines did introduce a security vulnerability. A client-side exploit known as the Windows Animated Cursor Remote Code Execution Vulnerability used a buffer overflow vulnerability to load malicious code via the animated cursor load routine of Windows.[8]
3D cursor

The idea of a cursor being used as a marker or insertion point for new data or transformations, such as rotation, can be extended to a 3D modeling environment. Blender, for instance, uses a 3D cursor to determine where operations such as placing meshes are to take place in the 3D viewport.[9]
See also
- Susan Kare, designer of several of the common cursor shapes
- Microangelo Toolset
- Mouse Sonar
- Screen hotspot
- Throbber
- Tooltip
- Cursorial
References
- ^ "Mouse". Archived from the original on 2009-02-03. Retrieved 2008-05-29.
- ^ "Setting a Cursor's Hot Spot". May 2, 2008. Archived from the original on May 2, 2008.
- ^ Hale, Kevin (3 October 2007). "Visualizing Fitts' Law". Particle Tree.
- ^ Atwood, Jeff (9 August 2006). "Fitts' Law and Infinite Width". Coding Horror.
- ^ ComputerHope.com
- ^ Staff (2007). Encyclopedia Of Information Technology. Atlantic Publishers & Distributors. p. 24. ISBN 978-81-269-0752-6.
- ^ Lock & Philander (2009). Michael Sangster (ed.). FCS Systems Analysis & Design L4. Pearson Education South Africa. p. 149. ISBN 978-1-77025-428-2.
- ^ McClure, Stuart; Scambray, Joel; Kurtz, George (2009). Hacking exposed: network security secrets & solutions (6th ed.). McGraw Hill Professional. p. 177. ISBN 978-0-07-161374-3.
- ^ "3D Cursor — Blender Manual". docs.blender.org. Retrieved 2022-04-04.
Cite error: A list-defined reference named "Markoff_2005" is not used in the content (see the help page).
Cite error: A list-defined reference named "Markoff_2013" is not used in the content (see the help page).