Identified users of the system

Assignment Help Basic Computer Science
Reference no: EM13694651

Part -1 Analysis of Application

Here you will introduce the product or system that you will be analysing. Find out:

1) Who are the intended users

2) What was the main tasks that the users are expected to accomplish

3) If the usability of the system meets certain criteria (you may refer to guidelines like Nielsen's Heuristics)

4) Your thoughts on whether the system was designed with the user's needs in mind.

Part 2: Survey and Report

Here you will create a brief survey of 5-8 questions (sample survey provided) that you will ask identified users of the system in order to gather data. You will then report on the data to see if the findings match your initial thoughts. You are not required to use statistics at this point.

Marks will be given for:

1) The correct identified users were the ones who were surveyed.

2) Survey participants were clearly described.

3) Survey results were rationally and intuitively grouped together.

4) Arguments were supported.

Part 3: Presentation of Entire Report

A total of twenty marks are allocated for written presentation. To achieve maximum marks your work must fulfil these criteria:

- Have good use of layout and space.

- Be a professional report and language used.

- Have proper colours, fonts, and sizes.

- Be no more than 10 pages long.

Reference no: EM13694651

Questions Cloud

Changes in the budget balance : The government has a budget surplus if: Changes in the budget balance:
Short-run macroeconomic equilibrium : If membership falls in labor unions and unions become less popular, then: If the short-run macroeconomic equilibrium is _________ of the economy's potential output, then there is a(n) ________ and the aggregate price level is expected to ________.
Profit per unit equals : The aggregate supply curve shows the relationship between the aggregate price level and: Profit per unit equals:
Acousto-optics modulator : Acousto-optics modulator in specific which is related in photonics
Identified users of the system : Who are the intended users and what was the main tasks that the users are expected to accomplish
Discuss what general rules are for agricultural activity : Review and discuss what the general rules are for agricultural activity using US GAAP and IFRS and determine the inventory valuation for TFI on June 30 using both US GAAP and IFRS.
What is special about the point where cp is a maximum : what position along the chord does the minimum pressure occur - what is special about the point where Cp is a maximum?
A decrease in aggregate demand is seen : A decrease in aggregate demand is seen as a(n): The economy is in a recession. Which of the following is a fiscal policy that the government should adopt to strengthen the economy?
Identify the tho most prominent formal elements : Write 2-3 descriptive sentences that identify the tho most prominent FORMAL ELEMENTS used in the artwork (Line: precise, gestural, etc, Shape-geometric or organic, Space - Identify the two most prominent FORMAL ELEMENTS

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Remove a table from the database in SQL

A large computer information system maintains many different computer files. Which amongst them is called a perpetual file?  Which command is used to remove a table from the database in SQL?

  Define or describe the database

1. Mention a database that you think is important or stood out to you. 2. Define or describe the database. 3. Discuss why the database is important or stood out to you. Cite personal experience with the topic if appropriate.

  Security and ethical concerns in web-based tool

How could you use a wiki to collaborate with fellow students to improve this course? What security and ethical concerns would you have to consider if you implemented this classroom wiki?

  Incorporate this method into an application

Incorporate this method into an application that inputs a series of pairs of integers (one pair at a time) and determines whether the second value in each pair is a multiple of the first

  Examine the current content management

Examine the current content management, determine the strengths and weaknesses, and define improvements.

  Show the risk mitigation strategy

Each member selects one of the highest risks. Explain why these are considered high risk, and explain their potential effect on the project and outline a risk mitigation strategy for the each of the selected high risks.

  Construct an fa (finite automata)

Construct an FA (finite automata) that accepts all binary strings with an even number of 0's and the number of 1's is a multiple of 3.

  Characterize a page fault rate using pure demand paging

Consider system which uses pure demand paging: When a process first start execution, how would you characterize a page fault rate?

  What is the copy constructor for a weighted digraph in c++

What is the copy constructor for a weighted digraph in c++?

  Design two level and-or and not circuit

Design a two level AND , OR ,NOT circuit for the following I/O priority circuit,when the ack input is true ack will be made true for the smallest j for which req is true.

  Windows active directory

A research paper on Windows Active Directory and User Access Controls with some additional info about Group Policy Objects and Microsoft Baseline Security Analyzer.

  What is the accuracy of a two-bit predictor

What is the accuracy of a two-bit predictor, assuming the predictor starts off in the bottom left state? What if the pattern repeats forever?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd