An improved approach for resolving overloaded keys (i.e., ambiguous keys)
in constrained data entry computing systems is disclosed. A combination
of an ambiguous key entry and a corresponding voice input are used to
particularly identify an entered key. Examples, of constrained data entry
computing systems include palm-sized computers, mobile phones (including
cellular), Portable Digital Assistants (PDAs), Internet appliances, etc.