Human computer interaction, Computer Engineering

Assignment Help:

Preamble

The owner of the local shopping mall, MaxiMart, has contracted you to assist in the design of an interactive directory. The interactive directory is to be permanently located at the main entrance of the supermarket. The owner has provided you with the following information.

MaxiMart

MaxiMart is a shopping mall consisting of 87 shop outlets within its confines. 24 of the outlets are located on the ground floor, 30 on the second floor and 33 on the third floor. The goods and services offered by the outlets range from bookshops, home appliances, gardening, electronic entertainment, clothing to pets and many more.

Interactive Directory

The interactive directory should cater to as many types of visitors as possible. The directory should provide information on the location of specific shop outlet or outlets, and on what type of goods or services it has to offer. Other additional and relevant information should be provided whenever possible.

Hardware and Display Specification

Due to a very limited budget, the interactive directory can only be installed on hardware with the following limitations:

(1) It has one display monitor. The monitor is capable of displaying pictures and text (size: 30 x 25 cm), but not animated graphics or video.  

(2) The monitor can only display a selection of four different colours (not including black and white). However, these colours can be combined to render a picture. 

(3) A cluster of physical push-button keys is available that can be arranged in any configuration.  The available keys are: A, B, C, D, E, F, G, H, 0, 1, 2, 3, 4, 5, up arrow, down arrow, left arrow and right arrow. It also has the following symbols: '+',' -' and '#'.  Special function keys are the Shift and Enter keys.  

(4) The monitor is not touch-screen capable. There is no mouse support or any type of pointing device to perform point-and-select actions. Selection and navigation is mainly through the reliance on the physical keys listed above for cursor control.


Related Discussions:- Human computer interaction

What are compilers and interpreters, What are compilers and interpreters? ...

What are compilers and interpreters? Compiler and Interpreter: These are two types of language translators. A compiler changes the source program (user-written program) int

stores on each line a part number, Make a file "parts_inv.dat" that stores...

Make a file "parts_inv.dat" that stores on each line a part number, cost, and quantity in inventory, e.g.: 123 5.99 52 456 3.97 100 333 2.22 567 Use fscanf to read this infor

Define sr flip flop - sr latch with nor gate, Define SR Flip Flop - SR latc...

Define SR Flip Flop - SR latch with NOR Gate? The SR Flip flop neither is a circuit with two cross-coupled NOR gates or two cross-coupled NAND gates. SR

C program, a c program to implement multiple stack in a single array

a c program to implement multiple stack in a single array

Why did my jdbc code throw a rollback sqlexception, Your JDBC code may thro...

Your JDBC code may throw the following exception: "The coordinator has rolled back the transaction.No further JDBC access is permitted within this transaction." The WebLogic

Which one logic gate can generate any logic function, A universal logic gat...

A universal logic gate is one, which can be used to generate any logic function.  Which one is a universal logic gate? Ans. NAND gate is a universal logic gate; it can generate

What is event-based simulator, Event-based Simulator Digital  Logic  S...

Event-based Simulator Digital  Logic  Simulation  method  sacrifices  performance  for  rich  functionality:  each active signal  is  calculated  for  every  device  it  propa

By which all systems are identified, In a LAN network every system is ident...

In a LAN network every system is identified by? In a LAN network all systems are identified through IP Address.

Determine about the virtual private networks, Virtual Private Networks (VPN...

Virtual Private Networks (VPN) In order to encrypt/decrypt all the communication network traffic that passes through the Internet or Intranet, a VPN uses software or hardware.

Differentiate between public key and secret key encryption, What are the di...

What are the different between Public Key Encryption and Secret Key Encryption? Differentiate between Public Key Encryption and Secret Key Encryption: A cryptographic sys

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd