Explain the concept of "mental model"

Assignment Help Basic Computer Science
Reference no: EM13952670

1) Use drawings where necessary.

(a) Explain the concept of "mental model" and say how this concept relates to Card, Moran and Newell's "Model Human Processor".

(b) Explain the concept of interactivity and say how it relates to the idea of an interface, using examples and referring to the translations in Abowd and Beale's "Interaction Framework".

(c) Apply the Interaction Framework to a typical scenario for using a mobile phone. Say how you think task context can affect design decisions about appropriate articulations.

(d) Based on your answers to parts (a), (b) and (c) of this question and examples of your own, explain why task context and interactivity must be considered together

Reference no: EM13952670

Questions Cloud

Develop an understanding of the fundamental concepts : Develop an understanding of the fundamental concepts of the finance discipline - Critically analyse complex contemporary business issues using appropriate models and make reasoned recommendations based on a synthesis of theory and evidence
Boxplot for height : Describe what happens when you vary the "Table/Graph" option for the Histogram, add more data (be sure to repeat some of the numbers and see what happens.  Use the Bar chart for number of phones, the Histogram and Boxplot for Height (do a Male and Fe..
George misconception about satish : Did Preet make a mistake by not intervening during the meeting and correct George's misconception about Satish? As an HR man, how would you define the character of George - bullying but later regretting? Does his attitude need to be corrected? Would..
What are the benefits of this budgeting or planning software : What are the benefits of this budgeting/planning software?
Explain the concept of "mental model" : Explain the concept of "mental model" and say how this concept relates to Card, Moran and Newell's "Model Human Processor".
Determine the order in which the following budgets : 1. Determine the order in which the following budgets are generally prepared.a. Material purchases budgetb. Sales budgetc. Budgeted income statementd. Production budget
What is the x coordinate of the object : What is the image distance? What is the x coordinate of the object? Keep in mind that a real image and a real object should be on opposite sides of the lens.
Determine the reliability factor : You are the auditor for a company and need to review the company's accounts receivable using probability proportional to size (PPS) sampling. In addition, the board of directors has requested that you and your team present an explanation of your P..
Answer each of jordan questions using the data given above : Answer each of Jordan's questions using the data given above. In each case, explain how you arrived at your answer.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  List the sequence in which all constructors

list the sequence in which all constructors and destructors are called. Also, provide the explanation for why they are called in this sequence.

  Research how media providers use cloud services

Please write a short paper on ONE of the investigation topics listed below. Your paper should be between one and two pages in length (single-spaced, Times New Roman, 12 point font) not counting the references. Please list all sources used for your in..

  Must the company use the ethernet or token ring protocol

XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it occupies. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate

  Explain can capabilities protect against all trojan horses

Can capabilities protect against all Trojan horses? Either show that they can or describe a Trojan horse process that C-Lists cannot protect against.

  Cost per server

cost per server

  Calculate and display the total income of the abc car shop

Write an algorithm in structured English (pseudocode) that describes the steps required to perform the task specified. Some examples of pseudocode can be found at http://www.unf.edu/~broggio/cop2221/2221pseu.htm.

  What happens when the federal reserve buys

Fill in the table below to show what happens when the Federal Reserve buys $200,000 in securities when the reserve rate is 5%.  Use appropriate labels and then explain each step below your entries.  Assume that all excess reserves are loaned out. NEE..

  Finding instruction format for indirect addressing

Determine the instruction format, considering that there is no bit for indirect addressing.

  Networks present of opportunities for security challenges

1. Networks present a lot of opportunities for security challenges. What type of network are you on, and what security elements are employed? Are they effective? Why or why not?

  Define about normalization and redundancy

Explain the key ways in which the business rules support the degree of normalization and the elements that can be denormalized

  Computer crimes directions

Computer Crimes Directions: Using the internet, research a specific case of a computer crime where a person was prosecuted for committing a computer crime. Write an essay about this crime. Your essay should include the following:Explain the computer ..

  Random string of 100,000 characters is written

A random string of 100,000 characters is written down, where each character is independently, equally likely to be any of the upper-case letters A through Z in English.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd