Explain user-centered design principles in a brief memo

Assignment Help Basic Computer Science
Reference no: EM131370305

Terrier News

Terrier News is a monthly newsletter devoted to various breeds of terriers and topics of interest to terrier owners and breeders. Annie West, the editor and publisher, asked you to help her design a system to enter and manage the hundreds of classified ads that Terrier News publishes. Some ads are for dogs wanted; some are for dogs for sale; and some offer products and services.

Tasks

1. Design a suitable source document for ads that are telephoned or mailed in.

2. Explain user-centered design principles in a brief memo to Annie.

3. Suggest at least four user interface design guidelines for the new system.

4. Suggest several types of controls that might be used on a switchboard you plan to design. Explain why you chose each control, and create a storyboard that shows the switchboard layout

Reference no: EM131370305

Questions Cloud

How frequently should production run be made : The cost of holding a bearing in stock for one year is Rs.2 and the set-up cost of a production run is Rs.1,800. How frequently should production run be made?
What are the main principles of source document design : Describe modular design, and explain the two main prototyping methods.
Determine the economic manufacturing quantity : A product is to be manufactured on a machine. The cost, production, demand, etc are as follows:
Optimum number of units of the product : (I) What should be the optimum number of units of the product he should buy in one lot? (II) What quantity of the product should he allow to be back-ordered? (III) How much additional cost will he have to incur on inventory if he does not permit back..
Explain user-centered design principles in a brief memo : Suggest several types of controls that might be used on a switchboard you plan to design. Explain why you chose each control, and create a storyboard that shows the switchboard layout
Who are the main target customers and competitors : Which organisation is it? What are the main products and/or services provided by the organisation? Who are the main target customers and competitors?
Production cost of a single speaker : A television manufacturing company produces its own speakers, which are used in the production of its television sets. The television sets are assembled on a continuous production line at rate of 8,000 per month. The company is interested in deter..
Find the minimum cost and purchase quantity : The cost of initiating purchasing action is Rs. 15.00 per purchase and the holding cost is 15% of average inventory valuation per period. Item cost is Rs. 8.00 per unit. Find the minimum cost and purchase quantity.
Write the difference between plagiarizing and paraphrasing : Write the difference between plagiarizing and paraphrasing.- A good writer is one you can read without breaking a sweat.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Worlds biggest data breaches

Use one of your favorite search engines (preferably www.google.com) and search world's biggest data breaches. Select at least two of the major data breaches from the list you found and complete the following.

  Channel junction field effect transistor

Sketch and explain the basic structure of an N-channel junction field effect transistor.

  What is the amplitude of the current

The current I measured in amperes that is flowing through an alternating current at any time t in seconds is modeled

  Define a value-returning function

Write a Python program that defines a value-returning function named cuber that returns both the surface area and volume of a cube. A cube is a rectangular prism with all sides equal.

  What strategy would you use to determine

What strategy would you use to determine which system would be less expensive: pre-built or custom-built?

  Explain the technical issues in layman''s terms.

You will provide a detailed vulnerabilities assessment document, along with some specific recommendations to implement to address the vulnerabilities you have described. This document should be based on the scenario provided.

  Define an appropriate data structure for a sector

define an appropriate data structure for a sector, using methods discussed during the lecture. Declare three sectors. Use 31 asthe track number and 1, 2 , 3 as the sector numbers; Access the sectors using a pointer.

  Determine whether address variable contains the street name

Write the C++ code to determine whether the address variable contains the street name "Grove Street". Begin the search with the fifth character in the address variable and assign the result to an int variable named subNum variable.

  Install an anti-virus program

In a network that contains two servers and twenty workstations, where is the best place to install an Anti-virus program?

  Design a program that will allow a user to input a list

Design a program that will allow a user to Input a list of your family members along with their age and state where they reside. Determine and print the average age of your family and print the names of anyone who lives in Texas. For this part of the..

  Malware detection and prevention and log management

Discuss three (3) methods of safe computing to help in the prevention of Virus and Trojan attacks.  Present the basic technical knowledge that a layman would need in order to use the methods you identified.

  Very important component of your system

The user interface is a very important component of your system. In this assignment you are first asked to read and understand a popular set of usability heuristics. Readings (Jakob Nielsen is a very renowned usability expert):

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd