Multi-touch screens vs. mouse-driven screens

Assignment Help Operating System
Reference no: EM132343204

Assignment 1: Multi-Touch Screens vs. Mouse-Driven Screens

The following resources may be helpful when completing this assignment.

Dearden, A. (2008). User-Centered Design Considered Harmful

Norman, D. (2007-2010). Activity-Centered Design: Why I like my Harmony Remote Control

Computer applications that run on desktop and laptop computers have, for a long time, been designed to be driven by dragging and clicking a mouse. With the introduction of tablet personal computers, the trend has shifted toward using touch-based screens. We now have access to touch-based TVs, touch-based monitors, touch-based laptops and touch-based tablets. Touch and multi-touch devices provide end users with the ability to interact physically with an application much more naturally.

Imagine that you are the Information Technology Director of a major chain restaurant, and you have been assigned to design a menu ordering application that can run on all devices. Examine whether using a touch-screen monitor, a tablet, or using a mouse to select menu items to place an order would be most efficient. Speculate how employees would interact with these devices and the type of emotional reaction that customers and employees will experience while placing a beverage, appetizer or entrée order.

Write a four to five (4-5) page paper in which you:

Differentiate between the interaction types and styles that apply to multi-touch screens and applications running on them.

Determine the conceptual model that you would use when designing a product for your restaurant.

Describe the key analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.

Determine one (1) utility / tool in an application for touch-based and mouse-drive screens that should be designed with memory retention / recall. Provide a rationale for your response.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing.

Format your assignment according to the following formatting requirements:

This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.

Typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required assignment page length.

Include a reference page. Citations and references must follow SWS format. The reference page is not included in the required page length.

Reference no: EM132343204

Questions Cloud

Diversity and commonality can help to prevent botnet attacks : iscuss how the security principles that we learned this week Diversity and Commonality can help to prevent Botnet attacks against EnergyA.
Diversity and commonality can help to prevent botnet attacks : iscuss how the security principles that we learned this week Diversity and Commonality can help to prevent Botnet attacks against EnergyA.
Draw the waveforms of the load voltage and thyristor voltage : Al-Ameeria Integrated Technical Education Cluster-BTEC Higher National Diploma in Electrical & Electronic Engineering-Draw the waveforms of the load voltage.
Digital asset management software products : Do research online to identify the capabilities of digital asset management software. What are the top rated digital asset management software products?
Multi-touch screens vs. mouse-driven screens : Computer applications that run on desktop and laptop computers have, for a long time, been designed to be driven by dragging and clicking a mouse.
Problems focus on the use of the gini index : This document was purposely created in Microsoft Word so you can enter your answers into the document. The problems focus on the use of the Gini Index.
Discuss how types of threats : Discuss how types of threats discussed in article referenced above could impact our economy and how implementing Diversity and Commonality could help mitigate
About the attack analysis : After collecting evidence and analyzing the attack, the third party was able to recreate the attack. The internal network utilized a flat architecture.
What are top rated digital asset management software product : Identify the capabilities of digital asset management software. What are the top rated digital asset management software products? Who uses this software?

Reviews

Write a Review

Operating System Questions & Answers

  Discuss about the different types of operating systems

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone.

  Creating hipo charts and decision tables

Now that you have a program design and a selected programming language for your assignment, you can start looking at the logical flow of the processes within your program and the data that is input,

  Assignment of parquet definetion

What is parquet definetion and repition level.

  Describe process of setting the seimens pid block

Explain the process of setting the Seimens S7-12000 PID Block's status manual, to automatic. Be specific

  Explian wired and wireless media

Discuss and explian wired and wireless media along with the drawbacks and benefits of each also Discuss the channel signaling systems used in voice communication along with the drawbacks and benefits of each.

  Draft a description of how it can be converted into a rdbms

Analyze samples of RoboBoys current Excel spreadsheets (click here to download) and draft a description of how it can be converted into a RDBMS.

  Security monitoring activities in it

Discuss and explain the security monitoring activities that should be conducted in an company with both internal IT and e commerce applications.

  Supporting multiple incoming requests via threads

The email database server is created to accept multiple incoming requests via a socket in order to locate a specific message and return it to the customer email browser

  Effects of spyware and adware

Describe the effects of spyware and adware. Discuss how has spyware and adware impacted the public's confidence in the security of internet?

  Create your own shell

The premise of Project 2 is to create your own shell. Your shell will be launchable from a terminal window and act similar to the existing shell.

  Create a page translation table that meets the requirements

Create a page translation table that meets the requirements of the virtual memory system shown below.

  Which of the following refers to the associative memory

Which of the following refers to the associative memory? A. the address of the data is generated by the CPU

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd