摘要 |
The method is for inputting various characters of which number exceeds that of keys in a device of a limited key number. The method employs a key inputter (10) composed of keys (K1-K2), an alarm generator (20), a memory (30) for storing character data, and a microprocessor (40) for storing the character data into the memory (30) and generating alarm signal when key is mal- manipulated.
|