Various techniques for exploring emerging design ideas

Assignment Help Basic Computer Science
Reference no: EM13926887

Outcomes addressed in this activity:

Unit Outcomes:
•Compare various techniques for exploring emerging design ideas.
•Apply heuristic evaluation to a physical design.

Course Outcome:
•IT302-2: Evaluate human-computer interaction principles and the discovery process.
GEL Outcome:
•GEL-1.1: Demonstrate college-level communication through the composition oforiginal materials in Standard American English.

Assignment Instructions and Requirements:

Heuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface.

Part of this assignment's value is to practice paraphrasing information; if you are unsure how to rewrite from source material, please visit the Writing Center or check for resources offered by your professor in the classroom. Make sure you follow APA style requirements as you prepare your Assignment.

Gathering Information Before Writing

Use the textbook and/or other suitable sources to learn about Jakob Nielsen's 10 Heuristics for User Interface Design. Pick one of the following interfaces to complete the assignment and use the same one for all heuristic evaluations in your paper. Approved choices:
•Word, Excel, or PowerPoint
•Photoshop, Dreamweaver, or Flash
•Your favorite email system
•An anti-virus software interface

•Quicken or another financial software application

The Assignment Itself
For each of the 10 heuristics:
•Write the heuristic itself as a paper subheading. These subheadings should be:
1.Visibility of system status
2.Match between system and the real world
3.User control and freedom
4.Consistency and standards

Unit 4 [IT302: Human-Computer Interaction]

5. Error prevention
6. Recognition rather than recall
7. Flexibility and efficiency of use
8. Aesthetic and minimalist design
9. Help users recognize, diagnose, and recover from errors
10. Help and documentation

• In a first paragraph under each heading, summarize or paraphrase what that heuristic means. Use source material and in-text citation at the end of this paragraph, but do not quote or copy from your sources.

• In a second paragraph under each heading, apply the heuristic to your chosen application, explaining if and/or how it meets expectations. If not, surmise why the developers did not consider the heuristic.

• Each heuristic's two paragraphs combined must be at least 45 words in length.
Provide a last page for properly-formatted APA reference entries.

Additional Requirements
• Your paper should show an understanding of the unit reading.
• Use the textbook and/or other sources appropriate for university work.
• Submit your work as a Word document in APA format. You must use 10- or 12-size Times New Roman or Arial font and meet other formatting requirements. Please note that an Abstract page and Table of Contents are not required.

• Cite your sources within the body of the paper and provide a list of references at the end in a separate References page. In-text citations and references should be properly formatted according to APA guidelines.

• Use subheadings as instructed so that your professor clearly sees where each of the parts begins.

Written work should be free of spelling, grammar, and APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor's discretion.

Please download the file "Writing Center Resources" from Doc Sharing to assist you with meeting APA expectations. Ensure that your work is not copied from any sources. Copying does not prove an understanding of the material, and plagiarism will not be tolerated.

Directions for Submitting Your Assignment:

• Use the following convention to name your Assignment: IT302-Unit4-LastName-FirstName, where your own name is typed (example: IT302-Unit4-Bhatt-Ajay). Submit the completed document as an attachment to the Unit 4 Assignment Dropbox before the deadline.

Requirements for the assignment continue following the badging information below.

Challenge Levels

Anyone up for a challenge? This course offers you the opportunity to go beyond the required course material. Two Challenge Levels are offered to supercharge your coursework: Design Whiz and Rock Star Professional.

Challenge Levels are a great way for you to learn more about the topic, better improve your existing skills and abilities, and/or highlight how knowledgeable you are in the unit material. These levels do not count for additional points or guarantee a higher grade.

Challenge Levels offer you an opportunity to stand out, learn more, and gain confidence.

To start, follow the rubric and project instructions as you normally would. If you choose to try it, supplement your project with the challenge levels. Reach out to your instructor and do some research for resources. The "Design Whiz" level adds to the basic level, and the "Rock-Star Professional" level adds more challenges to the "Design Whiz" level.

You must complete the "Design Whiz" level before you attempt the "Rock-Star Professional" level.
If you start a challenge level, but it becomes too difficult to handle, please stick with the basic project instructions as found in the rubric to calculate your grade.

Most importantly-have fun with it!

Your Challenge Levels for this week:
Design Whiz
Add an introductory paragraph (before your 10 heuristics) that explains the basic concept of heuristics and who is responsible for the ones used here. Include in-text citation - and a new reference entry if necessary.
Rock-Star Professional

Reference no: EM13926887

Questions Cloud

Calculate the effective rate of protection : a. Calculate the effective rate of protection if there is no duty on steel imports. b. Calculate the effective rate of protection if the importing country imposes a 20% tariff on steel imports. c. Suppose it also takes $4000 worth of copper (besides..
Amount of information before launching the attack : Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target's trash is know..
Sinusoidal wave is described by the equation v : Assume as sinusoidal wave is described by the equation v(t) = 100 v sin(200t + 0.52).    (a) From this expression, determine the peak voltage, the average voltage, and the angular frequency is rad/s.
Determine the net effect of plan on blawnoxs pretax profits : The company also expects its inventory investment to decrease by $1 million due to the anticipated decrease in sales. Determine the net effect of this plan on Blawnox's pretax profits.
Various techniques for exploring emerging design ideas : Heuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface.
Research methodology assignment : The primary purpose of this Research Methodology Assignment is to give you experience in determining appropriate research methods to be used with the research question and hypotheses you have posed and with the type data you would need to collect ..
Determine the eoq for shoelaces : Determine the EOQ for shoelaces, The total annual inventory costs of this policy and The frequency with which Allstar should place its orders for shoelaces.
Bounces back out of the basket : Go throw a basketball into a shallow basket that is tipped toward you. Whenever you throw the ball into the basket, it bounces back out of the basket and falls onto the floor. How could this rebound be minimized when it is thrown?
Spoofed packet to the broadcast address for a network : In a _____ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all the systems on that network.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the output of the following program

What is the output of the following program?

  About planning server image deployment

Planning Server Image Deployment

  The following is an access verification technique

10. The following is an access verification technique, listing several files and the access allowed for a single user. Identify the control technique used here, and for each, explain the type of access allowed. a. File_1   R-E-   b. File_12   RWE-   ..

  Show how many days are in the month

Complete the printMonth(int numDays, int startDay) method below to print a calendar month. The parameters numDays and startDay show how many days are in the month, and which day of the week the month starts on

  Check whether arrays are empty or not

Create a new student with valid first/last name, id, and status.

  Benefits of measures used to protect operating systems

Describe relative benefits and disadvantages of at least three different measures used to protect operating systems.

  Problem regarding the constrained optimization

A company produces and sells four grades of industrial solvents - A, B, C, and D. The selling price per gallon of each grade of solventis $6.40, $5.00, $4.20, and $3.50 respectively.  Because of demand limitations, the company can sell at most 100..

  Which of these two versions do you prefer and why

Redraw the ERD for this new situation using two entity types, and the redraw it again using one entity type. Which of these two versions do you prefer and why?

  Explain what his type of error message

Regards to a computer error. In Linux Lubuntu 15.04, there is a common error message that appears as "Reboot: System Halted" wondering if anyone can explain what his type of error message is and what it means.

  Explain how engineers be assigned to maximize sales

A sales manager has 3 areas and 5 sales engineers. If assignment of sales engineers to areas will result in expected sales as shown, how must engineers be assigned to maximize sales?

  Information security management and framework choice

What are the major perspectives to consider in information security management and framework choice

  Draw the state diagram of the soda vending machine

Exercise 1. Let's consider the old coin based soda machine behavior discussed in class. The following states were identified: Idle, Collecting Money, Testing & Computing Change, Making Change, and Dispensing Item. Draw the State Diagram of the Soda V..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd