What is heuristic evaluation, Basic Computer Science

Assignment Help:

Question 1:

(a) How would you describe human reasoning?
(b) Describe the different types of human reasoning?

Question 2:

(a) What are the computational factors affecting the speed of an interactive program?

(b) Discuss how the effects of each of these factors can be limited.

Question 3:

In Norman's execution-evaluation cycle model, what is meant by the Gulf of Execution and the Gulf of Evaluation?

Question 4:

How would you group controls and displays on an interface to improve the interactivity of the interface?

Question 5:

Describe the 3 main approaches to prototyping.

Question 6:

(a) (i) Create a GOMS description of the task of retrieving Rs200 from an ATM machine. Assume the user has his debit card in his wallet.

(ii) Discuss any issue of closure that can occur in terms of your GOMS description.

Question 7:

(a) (i) What is Heuristic Evaluation?

(ii) What is essential in performing a heuristic evaluation?


Related Discussions:- What is heuristic evaluation

Outdoor patient department features - a patient registry, A Patient Regist...

A Patient Registry Name, Surname and Address  Sex  Caste  Contact Numbers  Area (Rural/Urban/Suburban)  City/District  State  General Examination deta

Sequential reading in fcb files, Earlier than anything we must describe the...

Earlier than anything we must describe the file transfer area or DTA. With the intention of sequentially read we use the 14H function of the 21Hinterruption.The register to be read

Electronic transmission frequency, Electronic  transmission Frequency: ...

Electronic  transmission Frequency: Frequency is the rate at which a wave or cycle alternates between high and low (analog mode) or on and off (digital mode). For example, the

Opening documents situated on different computers - network, Opening Docume...

Opening Documents Situated on Different Computers In order to work with documents situated on other computers, you need sufficient rights to access the folder in which it is

What are the three basic security provided by ssl, QUESTION (a) Can SSL...

QUESTION (a) Can SSL be used to encrypt email data? Justify your answer (b) What are the three basic security provided by SSL? (c) State the port number used by applicati

MIS, information system providors

information system providors

Networking, what is computer topology .

what is computer topology .

Logic and arithmetic functions, The instructions of the logic functions are...

The instructions of the logic functions are: and not, or and xor. These act on the bits of their operators. To make sure the result of the operations we revolve to the cmp and test

Write the function pop in c, QUESTION (a) Convert each of the following...

QUESTION (a) Convert each of the following expressions to prefix and postfix. (i) (A+B)*(C+D) (ii) A-B/(C*D^E) (^ denotes exponentiation) (b) The following algorithm c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd