Discuss the kinds of design strategies

Assignment Help Basic Computer Science
Reference no: EM132368863

Designing for a Persona

One of the roles you identified while constructing your research plan was the restaurant customer or patron. When you identified this role, did you think about whether the patron would be likely to order only for themselves, or for a larger group? Might there be an event or occasion for some of the patrons to place their orders? What sorts of dietary restrictions or preferences would the ordering system need to address? Which customers may want to place their order in a different way when using this the online food ordering system, and would it make sense for the restaurant to provide this option?

Start your initial post by making a list of at least five demographic groups who might be regular patrons of the restaurant for which you are building the online food ordering system. Examples of demographic groups can be found in the unit readings.

When you have completed your list of five demographic groups of patrons, choose just one of these groups to explore more deeply. Address all of the following for this chosen demographic group:

Develop a persona for this group. Use the persona form you will be submitting as part of the unit assignment to develop your answer for this question. You do not need to upload the form itself in this discussion, but provide some of your key insights about the group based on what you wrote there.

Imagine the persona you have just described as they order a meal through an online food ordering system for your restaurant.

What is the process they prefer to take?

What do they want (or not want) to see?

What decisions will they make as they order the meal?

Discuss the kinds of design strategies you will need to employ in building an online food ordering system that meets this persona's needs and expectations. Be sure to mention key considerations such as information display, attention, memory and behavioral patterns, as described in the chapter readings in this unit.

Reference no: EM132368863

Questions Cloud

Calculate the count using loop and inside elseif statement : Calculate the count of (1,1),(1,0),(0,1),(0,0). But your program does not work and You don't know why. You need to use for loop and inside elseif statement.
Write a program that calculates and displays the take-home : CSC501C++ PROGRAMMING FOR ENGINEERS - Calculates and displays the Take-Home Payof different individuals - Exception-handling
What are the benefits of doing a pilot program : ITS-836: Data Science and Big Data Analytics - What are the benefits of doing a pilot program before a full-scale rollout of a new analytical methodology?
Firms competing in perfect competition markets : Comment on the impact on the market and economic agents for firms competing in perfect competition markets and less-than-perfect competition markets.
Discuss the kinds of design strategies : Discuss the kinds of design strategies you will need to employ in building an online food ordering system that meets this persona's needs and expectations.
How does your self-awareness support success as a leader : Why is understanding yourself important in PERSONAL career development and how can you ensure that an employer will realize that you have a clear grasp
Write a short program in python and view the output : How do you write a short program in Python and view the output, you want it to: Take two integers from the user. Save the lower number as x.
Discuss the issue of securing backups : Discuss the issue of securing backups. There have been several incidents lately in which backup media containing personal customer information
How to design for cross-cultural user experience : How to Design for a Cross-Cultural User Experience, describe how these dimensions may impact the user experience.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Flattening of the technological landscape

Determine security concerns that are raised by the flattening of the technological landscape. explain three ethical concerns that may be argued from flattening

  Branches of government work

Since "Separation of Powers" is not expressively stated in the Constitution, how do you think our three branches of government work and function under.

  Gradesaverage, which prompts user

Write a program called GradesAverage, which prompts user for the number of students, reads it from the keyboard, and saves it in an int variable called numStudents. It then prompts user for the grades of each of the students and saves them in an i..

  Draw a gantt chart showing utilization profiles

A system consists of three resources, called A, B, and C. The measured utilizations are shown in Table 10.3. A zero in a column indicates that the resource is not utilized. Draw a Gantt chart showing utilization profiles.

  The success of 24-bit digital audio technologies

3. A company noting the success of 24-bit digital audio technologies compared to earlier 16-bit digital audio technologies has decided to work on developing a 28-bit digital audio technology. a. Describe the type of signal conversion being utilized a..

  Basic keynesian formula multiplier

Generally, does the basic Keynesian formula multiplier (regardless of the model) tend to overstate, understate, or depict accurately the impact of fiscal.

  Whats the difference between public, private and protected

What's the difference between public, private and protected?

  Theory of absolute advantage

What are the benefits of using the theory of absolute advantage?

  What are major differences between IT and Project Management

What are the major differences between IT and Project Management, considering they were both part of the initial Risk Management pilot?

  Create two files edit your new file using gedit vi and chage

Create two files. • File1 has one line with the value of 5. • File2 has one line with the value of 100. Edit your new file using Gedit or VI and change it so it performs the following actions

  Result in the achievement of strategic fit

Explain how a matrix organization could result in the achievement of strategic fit.

  How aes achieves confusion and diffusion

How AES achieves confusion and diffusion. The degree to which you think AES is susceptible to each of the following attacks, a. Brute Force, b. Birthday attack, c. Timing attack, d. Algebraic attack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd