Explain the different usability data-gathering techniques

Assignment Help Basic Computer Science
Reference no: EM13869531

e-Activity required that you create a free SurveyMonkey® or QuestionPro online questionnaire account. If you did not create one, revisit the Week 5 e-Activity to create an account before attempting this assignment.

In this assignment you will create an online questionnaire. Prepare as follows:

1. Study Activity 7.2 in the class textbook.

2. Create an online questionnaire using your account on SurveyMonkey® or QuestionPro, depending on which one you selected during the Week 5 activity.

3. Insert the six (6) questions already provided in Activity 7.2 in your questionnaire. You may add additional questions if you wish.

4. Send an email to at least five (5) friends or participants and ask them to participate in the online questionnaire. Include the link to the online questionnaire in the email.

5. Give your participants a few days to complete the online questionnaire.

6. Use SurveyMonkey® or QuestionPro to analyze the collected data.

7. Download and save the report.

8. Attach your report to your assignment paper.

Write a four to five (4-5) page paper in which you:

1. Describe the easy and difficult aspects of creating and conducting an online questionnaire.

2. Assess the reliability of the collected data and include the survey report.

3. Assess the validity of the collected data and include the survey report.

4. Evaluate the usability of the online questionnaire Website.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

· Demonstrate the ability to select an appropriate user interface interaction style for a particular task.

· Explain the different usability data-gathering techniques

· Create a product evaluation through a formal framework.

· Use technology and information resources to research issues in human-computer interaction.

· Write clearly and concisely about human-computer interaction topics using proper writing mechanics and technical style conventions.

Reference no: EM13869531

Questions Cloud

Write a symbol table package consisting of two routines : Write a symbol table package consisting of two routines: enter(symbol, value) and lookup(symbol, value). The former enters new symbols in the table and the latter looks them up. Use some form of hash coding.
Explain and design an mssql solution for high availability : Explain and design an MSSQL solution for high availability
Is it necessary to have the page size be a power of two : Is it necessary to have the page size be a power of 2? Could a page of size, say, 4000 bytes be implemented in theory? If so, would it be practical?
Prepare the journal entry to record the recall : On March 4, 2010, the Hein Corporation issues 1,000 shares of $100 par preferred stock for $125 per share. The stock is not callable by the corporation until three years have expired. On April 7, 2013, all the stock is called by the corporation.
Explain the different usability data-gathering techniques : Explain the different usability data-gathering techniques
Discuss the different redundant array of independent disks : Discuss how you would use different RAIDs in the workplace.
Explain the characteristics of human-centered design methods : Explain the characteristics of human-centered design methods
Down payment was returned to the defaulting subscribers : On August 3, 2010, the date of incorporation, the Quinn Company accepts separate subscriptions for 1,000 shares of $100 par preferred stock at $104 per share and 9,000 shares of nopar, nostatedvalue common stock for $22 per share.
Find the final pressure : Water in a piston/cylinder is at 90?C, 100 kPa, and the piston loading is such that pressure is proportional to volume, P ??CV. Heat is now added until the temperature reaches 200?C. Find the final pressure and also the quality if in the two-phase..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What one characteristic about standard normal distribution

What one characteristic about the Standard Normal Distribution make it different from any normal distribution How do the standard deviation of 1 makes it diffenert. Can you plz explain? Do it some how throw the base answer off?

  Calculate the problem and stop after the condition

Use the information below to create a storyboard (which can be a text based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for you..

  Create a class named vehicle that acts as a super class for

Create a class named Vehicle that acts as a super class for vehicle types

  Consider a variant of cbc-mode encryption

Consider a variant of CBC-mode encryption where the sender simply increments the IV by 1 each time a message is encrypted (rather than choosing IV at random each time). Show that the resulting scheme is not CPA-secure.

  What window events can a program handle

What is the paintComponent method? How is it used in Java graphics? How does a program intentionally cause the paintComponent method to execute?

  Low enforcement agencies during an incident

Low enforcement agencies during an incident

  Recursive relationship between research methods and data

recursive relationship between research methods and data collection techniques

  What are the five different approaches to risk

What are the five different approaches to risk? What are the pros and cons of each strategy? Support your answer with solid reasoning class is cmgt 400

  Section on access controls

Refer to the section on Access Controls. What is the difference between "authorization" and "authentication"? What do we use to perform each of these access control functions? What are the advantages and limitations of the different approaches?

  Write a program that calculates a savings accounts yearly

Write a program that calculates a savings accounts yearly savings amount. The savings account pays an interest rate of 3% yearly.

  Managing cyber crime to protect business

Provide a scenario of a cyber crime by way of example that will demonstrate to your business a situation that might occur.

  Is it beneficial to give young children with computers

After reading information under heading Statuses, explain and provide the example of each of the following as each applies to you and your life.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd