Five design principles, Computer Engineering

Assignment Help:

Visibility. Controls should be clearly visible, so users can see the controls that are available to them. Visual feedback should also be clearly visible, so users can understand what action has been done and what effect has been achieved, and hence what needs to be done next. For example, car indicators are often activated by lifting up or pressing down a stalk attached to the steering wheel. In some cars this stalk is partially obscured by the steering wheel, which suggests the visibility of this control could be improved. However, this is usually acceptable to drivers because most car dashboards are designed in this way, so drivers can apply their knowledge of other cars in order to overcome this problem- this is an example of consistency. In my car there are two warning lights which indicate whether the right or the left indicators are flashing. These are clearly visible to the driver, as they are at the centre of the dashboard, in frontofthe driver'sseat.

In complex interactive products it is often difficult to achieve good visibility for all of the controls and visual feedback, because there are too many controls and too much information. In such circumstances it is necessary to prioritise based upon user needs, and give the most important the best visibility. For example, in my car, the low-oil warning light is clearly visible, but the lever to open the petrol cap is hidden away on the floor beside the driver'sseat.

Feedback. This is the information sent back to the user to confirm what action has been done and what result has been accomplished. Feedback can be visual (e.g. text on a display, flashing alert messages), auditory (e.g. beeps, bells or other noises such as key clicks as you press keys on a keypad or keyboard) or tactile (e.g. a button can be felt to move as it is pressed). The better the feedback, the easier it is to perceive what is happening and hence interact with the device.

Constraints. Constraints are ways of restricting the kind of interaction that can take place at a given moment. For example, when menu options are greyed out they cannot be selected or the steering column of a car restricts the movement of the steering wheel so it can only be rotated.

Effective constraints can help guide users through the interaction, helping them to avoid errors. Consistency. This is where a user interface is designed to follow certain rules, such as always selecting objects by clicking the left mouse button or always having the Help menu at the right-hand end of the menu bar.

There are different types of consistency. For example, internal consistency means the user interface is consistent within itself. For example, on the dashboard of a particular car, every warning light would be red, as opposed to some being red and others being yellow. In contrast, external consistency means the user interface is consistent with the external world. For example, on the dashboard of a particular car, the icon used to indicate that the fog lights are on is the same icon used throughout the whole range of cars produced by the same manufacturer. Consistency often helps make user interfaces easier to learn and user errors less likely.


Related Discussions:- Five design principles

What are the types of pipeline hazards, What are the types of pipeline haza...

What are the types of pipeline hazards? The various pipeline hazards are:  1. Data hazard  2. Structural Hazard  3. Control Hazard.

List the major components of the keyboard, List the major components of the...

List the major components of the keyboard/Display interface. a. Keyboard section b. CPU interface section c. Display section d. Scan section

What is called that switch if switch capacity is full, When a switch capaci...

When a switch capacity is full, calls coming into that switch are said to be                 . (A)  open                                            (B)  shorted (C) bloc

How does the internet work, Every computer connected to Internet has a uniq...

Every computer connected to Internet has a unique address. Let's just say your IP address is 1.2.3.4 and you want to send a message to computer with IP address 5.6.7.8. Message you

Two ways for restricting the value range for a domain, What are the two way...

What are the two ways for restricting the value range for a domain? By specifying fixed values. By stipulating a value table.

What is enctype, ENCTYPE="application/x-www-form-urlencoded" and in its pl...

ENCTYPE="application/x-www-form-urlencoded" and in its place use ENCTYPE="text/plain". The subsequent illustration displays a general form which includes some of the commo

What are the different layers of tcp/ip protocol stack, What are the differ...

What are the different layers of TCP/IP protocol stack? Layers in the TCP/IP protocol architecture are:- o  Application Layer o   Host-to-Host Transport Layer,  o  Net

What is super scalar architecture, Super scalar architecture Pentium m...

Super scalar architecture Pentium microprocessor is organized with three execution units. One executes floating-point instructions and other two (U-pipe and V-pipe) execute in

Illustrate about probability of collision, Illustrate about probability of ...

Illustrate about probability of collision? Probability of collision: There is a triangle and on this let’s assume that there are three ants one on each corner and are free t

Information distribution, INFORMATION DISTRIBUTION: The organization and m...

INFORMATION DISTRIBUTION: The organization and management of any institution, be it an isolated lab or a large site with many labs, requires that information is managed. Methods o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd