Human to computer interface

Assignment Help Basic Computer Science
Reference no: EM132803604

Everything we touch that is electronic has a Human to Computer Interface (HCI). Some companies put a lot of effort into the user experience; some, not so much. Some are very complex with enormous functionality (computer operating systems and smartphones) and some are much simpler (ATMs, gas station pumps, lottery ticket machines, movie dispensing machines).

For this assignment, choose either a simple interface (one with a few options) or a singular function of a more complex item (like a singular function of your smartphone, such as to create and send an email). Remember that there are several options for many of these. Visit the interface that you chose.

Write a paper in which you address the following:

Research history and background of the HCI.

From your chosen HCI, describe all the steps and options that are available to use and complete the task.

Build an Activity Diagram such as those on pages 138 Figure 5-5 and 139 Figure 5-6 of the textbook. Use Visio, MS Word, or your choice of program that can create an activity diagram. You need to create the diagram, not take one from the internet.

Reflect on the experience. Do you feel the process you chose was well designed? Do you think it can be improved?

Use at least two quality resources.

Reference no: EM132803604

Questions Cloud

Influences implementation of innovation technologies : This journal article focuses on attribution theory and how it influences the implementation of innovation technologies.
Trustworthiness of data center for critical data : What are the criteria security decision-makers use to evaluate the trustworthiness of a data center for critical data?"
R-markdown replicating and working through code : Write your own program using R-Markdown replicating and working through the code described in all sections of chapter 5 Exploratory Data Analysis from the book.
Standard operating procedure : You are hired as a Jr cyber security consultant in a company and it is your first day. After being introduced to the Chief Information Officer
Human to computer interface : Everything we touch that is electronic has a Human to Computer Interface (HCI). Research history and background of the HCI.
Notify the individuals that were affected by the breach : Get confirmation of the breach and how that information was exposed. Notify the individuals that were affected by the breach.
Learn about creating good password security : Learn About creating good password security. An IT Security consultant has made three primary recommendations regarding passwords:
Work area recovery plan : Work Area Recovery Plan is a vital plan that establishes an adequate environment for people to work in the event of a disruptive incident.
Cyber foundation case analysis-the phoenix project : Describe the role of Information Technology Services (ITS) in fulfilling UVA's mission. When and how should the Phoenix Project be evaluated?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Implement the insertion sort algorithm

Implement the Insertion Sort algorithm for sorting an array of n elements. In this algorithm, the main loop index i runs from 1 to n-1. On the ith iteration, the element a[i] is "inserted" into its correct position among the subarray a[0..i].

  Which scheme is better and why

Also consider two different clustering schemes: (1) where Cluster1 contains records {1,2,3} and Cluster2 contains records {4,5,6} and (2) where Cluster1 contains records {1,6} and Cluster2 contains records {2,3,4,5}. Which scheme is better and why..

  What is this behavior called

Assuming the FIFO buffering memory can be redistributed freely, suggest a reshuffling of the buffers that avoids the above problem, and explain why it does so.

  Led paybyphone to switch to an ip-based network

What are the reasons that led PayByPhone to switch to an IP-based network?

  Explain how anti-viruses and anti-spyware software work

Explain how anti-viruses and anti-spyware software work. What is the importance of scanning regimes.

  Discuss at least two self-interested reasons

Discuss at least two self-interested reasons that a top earner might favor policies to redistribute income.

  Compute cos x correct to four decimal places

See how many terms are needed to get four-figure agreement with the MATLAB function cos. Don't make x too large; that could cause rounding error

  Purpose of each tier in n-tiered system architecture

Compare and contrast the design and purpose of each tier in an n-tiered system architecture:

  Global technology

Do you feel that countries and companies need explicit strategies for technology development,

  Alternative techniques

Choose one of the following alternative techniques, summarize it and provide examples of how your selected technique is used,

  Transmission control protocol

What are the differences between Transmission Control Protocol and User Datagram Protocol? Please, also why would you use one over the other?

  Largest employers with which you are familiar

What do you imagine are some of the greatest challenges facing them in terms of information management?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd