Design concept in terms of the usability of the design

Assignment Help Basic Computer Science
Reference no: EM13187940

Design Report

The Design Report is a single team report that describes the functionality of the application in its final form. You should include descriptions of all of your functions and sketch the storyboard associated with each function. The report should cover these main sections:

1. An introduction to the application that you would expect to find on the Apple AppStore or Android Market/Google Play website. These descriptions are typically less than 100 words in length and need to entice users into downloading and using the application. Some descriptions include a screen image. You are welcome to include this as well.

2. A description of the functionality of the application. You can present this as a small user manual or as a hierarchical task analysis. Each function should include a storyboard or annotated sketch that shows clearly how users interact and what interface changes occur as a result of that interaction.

3. A justification for the design concept in terms of the usability of the design. You should explain why your decisions make sense and why your interface concept works for the application. Any preliminary designs can be included as an Appendix to the report.

The design report should not be overly long. I would much rather you spend time on the design instead of the report. However, the report needs to make sure that I understand your design and can follow your design decisions. It is important that you think about your decisions as you are developing your design. It is very hard to justify decisions after the product is complete.

The Prototype

The application prototype is completed as a group presentation. The prototype can be presented in a number of forms. Within each form you should record a voice-over explanation of how the prototype works. The Prototype presentation does not have to be a fully-professional production. You can use whatever software package that you are comfortable with. The prototype presentation should have a length of about 3 to 4 minutes. You will need to think carefully about what you demonstrate and what you don't. YouTube contains a number of these presentations.

Submission Requirements

Your interface design will be submitted in a number of components some of which you complete as a group and some of which you complete as an individual. The following components are required to be submitted for this assignment:

1. The prototype of your interface completed as a short automated PowerPoint or video walkthrough. The walkthrough should provide the viewer with a demonstration of how the interface will provide the functionality required for the application. Weighting: 50% of the marks available for this assignment.

2. The design report which describes the functionality of the application and the justification of the design decisions during design of the application. Weighting: 40% of the marks available for this project.

3. A personal reflection (one per team member) providing details about your input into the project. What did you do? How did you do it?

What aspects of the design are you most proud of? Describe your contribution. Weighting: 10% of the marks available for this project.
The assignment can be submitted online using the CloudDeakin website OR in paper based form (depending on how you choose to present your submission). Paper based submissions must be submitted via Building L in the assignment drop box, and must include the Faculty Assignment Cover Sheet.

Reference no: EM13187940

Questions Cloud

Garlic expressions salad dressing : When LarMar Foods introduced Garlic Expressions salad dressing, it was concerned about locating and using the computer software needed to track orders and keep up with accounting records.
State silver nitrate when the system reaches equilibrium : silver iodide in grams will dissolve in a solution that is a 2.0 x 10^-4 M silver nitrate when the system reaches equilibrium
Explain why using hypothetical numbers to illustrate cases : Use a hypothetical example to illustrate whether you agree or disagree with the following statement, "Unemployment will go up more if the demand for labor is elastic, because the demand for labor will decrease more when you have elastic demand tha..
Examples of the actions and reactions of parliament : What are some detailed examples of the actions and reactions of Parliament and the Colonial Assemblies that led to open revolt in the Colonies.
Design concept in terms of the usability of the design : A justification for the design concept in terms of the usability of the design. You should explain why your decisions make sense and why your interface concept works for the application. Any preliminary designs can be included as an Appendix to th..
What is the volume of the resulting bead : a spherical wood bead is formed by taking a sphere of radius 5 mm and drilling out a cylindrical hole. The hole has a radius of 2 mm. What is the volume of the resulting bead? (Use Volume by slicing methord to solve this problem in Calculus.)
Explain the system reaches equilibrium : How much silver iodide, AgI, in grams will dissolve in 1200 ml of pure H2O at 25 degrees Celcius when the system reaches equilibrium
What is the shortest length of fence that rancher can use : A rancher wants to fence in a rectangular area of 124416 square feet and then divide the enclosed area in half with a fence down the middle parallel to one side. What is the shortest length of fence that the rancher can use?
Explain the equation to calculate the distance travelled : off with an initial velocity of u (at km/hr) and accelerates at a steady rate (a = km/hr2) for a time of t hours. Using the ‘area under the curve' method, derive and explain the equation to calculate the distance travelled: Distance travelled, s =..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Employees may work from home

Employees may work from home up to 15 hours per week. Each project leader needs a list of current means of contacting each member of the project team: home phone and home FAX number. To contact employees "on the road" the project leaders also need..

  Activity diagram of each step of ordering pizza

Draw an activity diagram representing each step of the process; from the moment you pick up the phone to the point where you are eating the pizza.

  User defined company class

Create a user defined Company class the class will include Company Name, Stock Symbol and stock value per share. Include a parameterized constructor and get methods for each of the instance variables. Also include a toString method.

  Techniques in discovering requirements for a system

What are some of the techniques in discovering requirements for a system? Which ones work best? Which ones are the most economical?

  Design a suitable source document for ads

Terrier News is a monthly newsletter devoted to various breeds of terriers and topics of interest to terrier owners and breeders. Design a suitable source document for ads that are telephoned or mailed in.

  Evaluate for risk management purposes

Choose three information assets that a typical organization has and evaluate for risk management purposes which vulnerability should be evaluated for additional controls first?

  Explain how rsa algorithm works

Use the example to illustrate how RSA algorithm works. Deciper following ciphertext, that was enciphered using Caesar cipher.

  How can we use both karnaugh maps

How can we use both Karnaugh maps and DeMorgan equivalences to better understand systems we build?

  Set of strings of balanced parentheses

Show that the set of strings of balanced parentheses is not defined by any regular expression. Hint: The proof is similar to the proof for the language E above. Suppose that the set of balanced strings had a deterministic finite automaton of m states

  What does it mean to spawn a process?

1. Process can be in different states to allocate the resources better. List the symbol and meaning for each of these states

  Encryrption of some unknown

Assume (A1,B1) is an encryrption of some unknown m1. Prove that (A1,B2g^(m2) mod p) is a valid  encryption of m1 + m2 mod p. More generally, if (A2,B2) is an encryption of m2, what is (A1A2  mod p,B1B2 mod p) an encryption of?

  Information assets to estimate for risk management purposes

If the organization has three information assets to estimate for risk management purposes which vulnerability must be estimated for additional controls first? Which vulnerability must be evaluated last?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd