Describe virtual and augmented reality

Assignment Help Management Information Sys
Reference no: EM131258275

Q1. Your software development company has been contracted to build a tool that will manage user accounts and rights in an Active Directory environment. One of your developers tells you that he wants the tool to make use of direct manipulation. A second developer argues that a command line structure would be a better and more secure approach. Take a stand on this argument, providing at least three positives of each approach, and then make a decision for this project and support it.

- Describe virtual and augmented reality. Suggest a way in which this technology could be used in the future; either to improve a current process / procedure or create a new process / procedure. Provide an example of your suggested use of the technology

Q2. Describe the considerations that you would take into account when selecting the menu style for an application and why. Support your response with examples.

•Imagine you have been asked to help a novice designer effectively organize his menu content in an application. Provide the novice designer with the advice you feel would be most helpful when organizing content for menus. Support your response.

Q1. The president of your company approached you with his iPhone in one hand and his iPad in the other. He has just purchased the iPhone 4S and is fascinated with Siri, the voice recognition software. He then pulls up an app your team developed for the company a few months ago and tells you that he wants it to work with voice commands just like Siri. When you pass this information on to your team, the news is met with groans and angry expressions. One of your developers tells you that it would be way too complicated to add voice recognition into the app and that you should have said no. Suggest three techniques to overcome the challenges of implementing natural language into interface designs.

Sally, a young developer, requests a meeting with you to discuss a project. Sally tells you that she wants to develop a new application in a computer language she has developed, hoping to use the project as proof of concept for her newly developed language. Your firm encourages technological development and advancement and has allowed similar developments to happen in the past. Discuss with Sally what is required to be considered an effective computer language. Suggest three characteristics that make up an effective computer language. Support your response with evidence from the textbook or an article you found.

e-Activity

•Read the article titled "Cooperation and Collaboration in Natural Command Language Dialogues", located here. Be prepared to discuss.

Q2. You have just finished reviewing a design project your team has submitted to you and noticed that the team members used a great deal of command abbreviations. Explain to your team the value of using abbreviations for commands and give them at least two advantages and disadvantages associated with using abbreviations. Support your answer.

From the e-Activity, Amore's and Quesada's article discusses the challenges of incorporating Natural Command Language Dialogs (NCLDs) into a phone system. One challenge pertains to sources of conflict in NCLDs. Discuss potential sources of conflict with an interface that you frequently use and devise a solution for preventing the conflicts.

Q1

•Touch screens are becoming extremely popular input devices for phones and tablets. Assess the value of touch screen devices related to human-computer interaction systems. Identify at least two advantages and two disadvantages of having touch screen devices in the workplace. Support your response by citing a quality resource.

•Chapter 8 currently has the following subsections, keyboards and keypads, pointing devices, and speech and auditory interfaces. Predict what the subsections may be if this book were written 10 years from now. Justify your predictions.

Q2

•While planning for a new project, a young developer mentions that she used Facebook as a collaborative group space for developing her senior project. She tells you that it was the ideal solution since it was free and all of her group members were friends with her. Further, she tells you that your company should do the same thing. Explain whether or not you think that Facebook would be a proper venue for your developers to collaborate. Give at least three reasons for your answer.

•Imagine you were going to be teaching this class next semester and you were given the choice to teach it asynchronously distributed interface, synchronously distributed interface, or face-to-face. Choose one of these techniques to teach the class and describe why you chose the presentation style you did. Discuss the advantages and disadvantages associated with the style you chose.

Reference no: EM131258275

Questions Cloud

Report income from continuing operations : Jacobsen Corporation prepares its financial statements applying U.S. GAAP. During its 2016 fiscal year, the company reported before-tax income of $622,000. Unusual gain $202,000 Loss on discontinued operations (302,000) The company's income tax rate ..
Factors designated team characteristics : Multiple factors are associated with team effectiveness. They include factors designated Team Characteristics, Nature of Work, and the environmental Context. Most issues are controllable by the leader with the exception of Organizational Culture a..
Determine the feed rate and time to complete the cut : The end milling cutter has two teeth and its diameter = 15.0 mm. Determine the feed rate and time to complete the cut
List some of best practices for active directory replication : Describe and detail three tools that can aid in the replication process. List and describe some of the best practices for Active Directory Replication.
Describe virtual and augmented reality : Describe virtual and augmented reality. Suggest a way in which this technology could be used in the future; either to improve a current process / procedure or create a new process / procedure. Provide an example of your suggested use of the techno..
An aging list of accounts receivables : An aging list of accounts receivables not only shows you how long it is taking to collect account receivables but also: the amount of working capital at hand.
Determine the manufacturing lead time : Determine the average level of work-in-process for the two alternatives in part (b). if the alternative shops operate at full capacity.
Examples of conflict situations : Share an examples of conflict situations that you have witnessed in the workplace. Please use positions and titles rather than names of specific individuals. What kind of conflicts are these examples, and how did the conflicts develop? What were t..
Question regarding the opportunity presents itself : A brief sales pitch will ensure that you are prepared to discuss your career goals whenever the opportunity presents itself. Review the following two Forbes' articles:

Reviews

Write a Review

Management Information Sys Questions & Answers

  Research assignment the final product of your team project

ltbrgtthe final product of your team project should include the following ltbrgt ltbrgt1.an executive summary of one

  Describe what hacking of memory or hacking of ram

Write two to three(3) page paper in which you: Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

  How the internet is used and viewed by consumersinclude

how the internet is used and viewed by consumersinclude information on how the internet is used and viewed by consumers

  Develop a vulnerability assessment plan

For this assignment, you will need to develop a vulnerability assessment plan. The concepts needed to complete this assignment are found in your reading assignment and in the unit lesson.

  How can information technology support a companys

How can information technology support a companys business operation and decision making and give them compitative advantage?

  Brochure advertising your services as a data repository

Create a brochure advertising your services as a data repository. Research commercial data repositories.

  Describing what the terminated employee may target

Write a 1,400- to 1,750-word paper describing what the terminated employee may target, what methods they may use, and the damage their activities might cause to the IS. Include your preventive actions and responses as the chief information securit..

  What is a troubleshooting model

What is a troubleshooting model? Describe how you would use a troubleshooting model to resolve a user's inability to connect to the Internet from a physically connected networked laptop in an office

  How long does the crime occur before it is discovered

What do you think? Is the propensity to engage in unlawful conduct systemic; that is, is it inherent in a competitive, free-enterprise economic system in a society oriented toward the individual Or was criminal behavior caused solely by "bad apple..

  Define each component of an information system

Define each component of an information system. Define how you can use the five-component model to guide your learning and thinking about information systems.

  Summarize the legal aspects of the information security

Summarize the legal aspects of the information security triad

  Prepare a presentation slides with good looking visual aid

Prepare a presentation slides with good looking visual aid and handouts for the topic project value management with harvard australia reference style.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd