Multi-touch screens vs. mouse-driven screens

Assignment Help Operating System
Reference no: EM132343204

Assignment 1: Multi-Touch Screens vs. Mouse-Driven Screens

The following resources may be helpful when completing this assignment.

Dearden, A. (2008). User-Centered Design Considered Harmful

Norman, D. (2007-2010). Activity-Centered Design: Why I like my Harmony Remote Control

Computer applications that run on desktop and laptop computers have, for a long time, been designed to be driven by dragging and clicking a mouse. With the introduction of tablet personal computers, the trend has shifted toward using touch-based screens. We now have access to touch-based TVs, touch-based monitors, touch-based laptops and touch-based tablets. Touch and multi-touch devices provide end users with the ability to interact physically with an application much more naturally.

Imagine that you are the Information Technology Director of a major chain restaurant, and you have been assigned to design a menu ordering application that can run on all devices. Examine whether using a touch-screen monitor, a tablet, or using a mouse to select menu items to place an order would be most efficient. Speculate how employees would interact with these devices and the type of emotional reaction that customers and employees will experience while placing a beverage, appetizer or entrée order.

Write a four to five (4-5) page paper in which you:

Differentiate between the interaction types and styles that apply to multi-touch screens and applications running on them.

Determine the conceptual model that you would use when designing a product for your restaurant.

Describe the key analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.

Determine one (1) utility / tool in an application for touch-based and mouse-drive screens that should be designed with memory retention / recall. Provide a rationale for your response.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing.

Format your assignment according to the following formatting requirements:

This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.

Typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required assignment page length.

Include a reference page. Citations and references must follow SWS format. The reference page is not included in the required page length.

Reference no: EM132343204

Questions Cloud

Diversity and commonality can help to prevent botnet attacks : iscuss how the security principles that we learned this week Diversity and Commonality can help to prevent Botnet attacks against EnergyA.
Diversity and commonality can help to prevent botnet attacks : iscuss how the security principles that we learned this week Diversity and Commonality can help to prevent Botnet attacks against EnergyA.
Draw the waveforms of the load voltage and thyristor voltage : Al-Ameeria Integrated Technical Education Cluster-BTEC Higher National Diploma in Electrical & Electronic Engineering-Draw the waveforms of the load voltage.
Digital asset management software products : Do research online to identify the capabilities of digital asset management software. What are the top rated digital asset management software products?
Multi-touch screens vs. mouse-driven screens : Computer applications that run on desktop and laptop computers have, for a long time, been designed to be driven by dragging and clicking a mouse.
Problems focus on the use of the gini index : This document was purposely created in Microsoft Word so you can enter your answers into the document. The problems focus on the use of the Gini Index.
Discuss how types of threats : Discuss how types of threats discussed in article referenced above could impact our economy and how implementing Diversity and Commonality could help mitigate
About the attack analysis : After collecting evidence and analyzing the attack, the third party was able to recreate the attack. The internal network utilized a flat architecture.
What are top rated digital asset management software product : Identify the capabilities of digital asset management software. What are the top rated digital asset management software products? Who uses this software?

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd