Various techniques for exploring emerging design ideas

Assignment Help Basic Computer Science
Reference no: EM13926887

Outcomes addressed in this activity:

Unit Outcomes:
•Compare various techniques for exploring emerging design ideas.
•Apply heuristic evaluation to a physical design.

Course Outcome:
•IT302-2: Evaluate human-computer interaction principles and the discovery process.
GEL Outcome:
•GEL-1.1: Demonstrate college-level communication through the composition oforiginal materials in Standard American English.

Assignment Instructions and Requirements:

Heuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface.

Part of this assignment's value is to practice paraphrasing information; if you are unsure how to rewrite from source material, please visit the Writing Center or check for resources offered by your professor in the classroom. Make sure you follow APA style requirements as you prepare your Assignment.

Gathering Information Before Writing

Use the textbook and/or other suitable sources to learn about Jakob Nielsen's 10 Heuristics for User Interface Design. Pick one of the following interfaces to complete the assignment and use the same one for all heuristic evaluations in your paper. Approved choices:
•Word, Excel, or PowerPoint
•Photoshop, Dreamweaver, or Flash
•Your favorite email system
•An anti-virus software interface

•Quicken or another financial software application

The Assignment Itself
For each of the 10 heuristics:
•Write the heuristic itself as a paper subheading. These subheadings should be:
1.Visibility of system status
2.Match between system and the real world
3.User control and freedom
4.Consistency and standards

Unit 4 [IT302: Human-Computer Interaction]

5. Error prevention
6. Recognition rather than recall
7. Flexibility and efficiency of use
8. Aesthetic and minimalist design
9. Help users recognize, diagnose, and recover from errors
10. Help and documentation

• In a first paragraph under each heading, summarize or paraphrase what that heuristic means. Use source material and in-text citation at the end of this paragraph, but do not quote or copy from your sources.

• In a second paragraph under each heading, apply the heuristic to your chosen application, explaining if and/or how it meets expectations. If not, surmise why the developers did not consider the heuristic.

• Each heuristic's two paragraphs combined must be at least 45 words in length.
Provide a last page for properly-formatted APA reference entries.

Additional Requirements
• Your paper should show an understanding of the unit reading.
• Use the textbook and/or other sources appropriate for university work.
• Submit your work as a Word document in APA format. You must use 10- or 12-size Times New Roman or Arial font and meet other formatting requirements. Please note that an Abstract page and Table of Contents are not required.

• Cite your sources within the body of the paper and provide a list of references at the end in a separate References page. In-text citations and references should be properly formatted according to APA guidelines.

• Use subheadings as instructed so that your professor clearly sees where each of the parts begins.

Written work should be free of spelling, grammar, and APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor's discretion.

Please download the file "Writing Center Resources" from Doc Sharing to assist you with meeting APA expectations. Ensure that your work is not copied from any sources. Copying does not prove an understanding of the material, and plagiarism will not be tolerated.

Directions for Submitting Your Assignment:

• Use the following convention to name your Assignment: IT302-Unit4-LastName-FirstName, where your own name is typed (example: IT302-Unit4-Bhatt-Ajay). Submit the completed document as an attachment to the Unit 4 Assignment Dropbox before the deadline.

Requirements for the assignment continue following the badging information below.

Challenge Levels

Anyone up for a challenge? This course offers you the opportunity to go beyond the required course material. Two Challenge Levels are offered to supercharge your coursework: Design Whiz and Rock Star Professional.

Challenge Levels are a great way for you to learn more about the topic, better improve your existing skills and abilities, and/or highlight how knowledgeable you are in the unit material. These levels do not count for additional points or guarantee a higher grade.

Challenge Levels offer you an opportunity to stand out, learn more, and gain confidence.

To start, follow the rubric and project instructions as you normally would. If you choose to try it, supplement your project with the challenge levels. Reach out to your instructor and do some research for resources. The "Design Whiz" level adds to the basic level, and the "Rock-Star Professional" level adds more challenges to the "Design Whiz" level.

You must complete the "Design Whiz" level before you attempt the "Rock-Star Professional" level.
If you start a challenge level, but it becomes too difficult to handle, please stick with the basic project instructions as found in the rubric to calculate your grade.

Most importantly-have fun with it!

Your Challenge Levels for this week:
Design Whiz
Add an introductory paragraph (before your 10 heuristics) that explains the basic concept of heuristics and who is responsible for the ones used here. Include in-text citation - and a new reference entry if necessary.
Rock-Star Professional

Reference no: EM13926887

Questions Cloud

Calculate the effective rate of protection : a. Calculate the effective rate of protection if there is no duty on steel imports. b. Calculate the effective rate of protection if the importing country imposes a 20% tariff on steel imports. c. Suppose it also takes $4000 worth of copper (besides..
Amount of information before launching the attack : Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target's trash is know..
Sinusoidal wave is described by the equation v : Assume as sinusoidal wave is described by the equation v(t) = 100 v sin(200t + 0.52).    (a) From this expression, determine the peak voltage, the average voltage, and the angular frequency is rad/s.
Determine the net effect of plan on blawnoxs pretax profits : The company also expects its inventory investment to decrease by $1 million due to the anticipated decrease in sales. Determine the net effect of this plan on Blawnox's pretax profits.
Various techniques for exploring emerging design ideas : Heuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface.
Research methodology assignment : The primary purpose of this Research Methodology Assignment is to give you experience in determining appropriate research methods to be used with the research question and hypotheses you have posed and with the type data you would need to collect ..
Determine the eoq for shoelaces : Determine the EOQ for shoelaces, The total annual inventory costs of this policy and The frequency with which Allstar should place its orders for shoelaces.
Bounces back out of the basket : Go throw a basketball into a shallow basket that is tipped toward you. Whenever you throw the ball into the basket, it bounces back out of the basket and falls onto the floor. How could this rebound be minimized when it is thrown?
Spoofed packet to the broadcast address for a network : In a _____ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all the systems on that network.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write program print a business travel expenses attachment

Write a program to print a business travel expenses attachment for an income tax return.

  Telecommunications industry

What are the advantages and disadvantages of the various modulation techniques of analog signals

  How much objective function coefficient decreases

Implement the following LP model in a spreadsheet. Use Solver to solver the problem and create a Sensitivity Report. How much can objective function coefficient for variable X2 decrease before changing optimal solution?

  How to design a new isa

How to design a new ISA? What should take into consideration?

  Suppose a c++ compiler for the mips

Suppose a C++ compiler for the MIPS machine associates $s5 with array a and $s6 with variable i. How does it translate a[i] = a[i+1]; into MIPS assembly language?

  Find minimum associativity needed of level cache

Determine the minimum associativity needed of the level 1 cache for consistent performance independent of both arrays' position in memory?

  Variety of tools that use to prepare project

In this course, you looked at a variety of tools that you would use to prepare a project. Some areas you looked at included, but were not limited to?

  Three major information security threats

Write a 1,000- to 1,500-word essay on at least three major information security threats that a specific organization you choose faces today.

  Write a journal entry that reviews the process states

Write a journal entry that reviews the process states for your preferred operating system and prepares you for the process management requirements of your final project. First, research and then describe the scheduling algorithm used by your operatin..

  Organizing function of management

Discuss and explain the company function of management as it relates to at least two of the organizational resources:

  Synthesizing a picture of an area

Synthesizing a picture of an area, its relevance, structure and core ideas; and identifying what problems they are trying to solve and issues that need further exploration.

  Compare b-mac, z-mac and s-mac for wireless sensor networks

Compare B-MAC, Z-MAC and S-MAC for wireless sensor networks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd