Various techniques for exploring emerging design ideas

Assignment Help Basic Computer Science
Reference no: EM13926887

Outcomes addressed in this activity:

Unit Outcomes:
•Compare various techniques for exploring emerging design ideas.
•Apply heuristic evaluation to a physical design.

Course Outcome:
•IT302-2: Evaluate human-computer interaction principles and the discovery process.
GEL Outcome:
•GEL-1.1: Demonstrate college-level communication through the composition oforiginal materials in Standard American English.

Assignment Instructions and Requirements:

Heuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface.

Part of this assignment's value is to practice paraphrasing information; if you are unsure how to rewrite from source material, please visit the Writing Center or check for resources offered by your professor in the classroom. Make sure you follow APA style requirements as you prepare your Assignment.

Gathering Information Before Writing

Use the textbook and/or other suitable sources to learn about Jakob Nielsen's 10 Heuristics for User Interface Design. Pick one of the following interfaces to complete the assignment and use the same one for all heuristic evaluations in your paper. Approved choices:
•Word, Excel, or PowerPoint
•Photoshop, Dreamweaver, or Flash
•Your favorite email system
•An anti-virus software interface

•Quicken or another financial software application

The Assignment Itself
For each of the 10 heuristics:
•Write the heuristic itself as a paper subheading. These subheadings should be:
1.Visibility of system status
2.Match between system and the real world
3.User control and freedom
4.Consistency and standards

Unit 4 [IT302: Human-Computer Interaction]

5. Error prevention
6. Recognition rather than recall
7. Flexibility and efficiency of use
8. Aesthetic and minimalist design
9. Help users recognize, diagnose, and recover from errors
10. Help and documentation

• In a first paragraph under each heading, summarize or paraphrase what that heuristic means. Use source material and in-text citation at the end of this paragraph, but do not quote or copy from your sources.

• In a second paragraph under each heading, apply the heuristic to your chosen application, explaining if and/or how it meets expectations. If not, surmise why the developers did not consider the heuristic.

• Each heuristic's two paragraphs combined must be at least 45 words in length.
Provide a last page for properly-formatted APA reference entries.

Additional Requirements
• Your paper should show an understanding of the unit reading.
• Use the textbook and/or other sources appropriate for university work.
• Submit your work as a Word document in APA format. You must use 10- or 12-size Times New Roman or Arial font and meet other formatting requirements. Please note that an Abstract page and Table of Contents are not required.

• Cite your sources within the body of the paper and provide a list of references at the end in a separate References page. In-text citations and references should be properly formatted according to APA guidelines.

• Use subheadings as instructed so that your professor clearly sees where each of the parts begins.

Written work should be free of spelling, grammar, and APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor's discretion.

Please download the file "Writing Center Resources" from Doc Sharing to assist you with meeting APA expectations. Ensure that your work is not copied from any sources. Copying does not prove an understanding of the material, and plagiarism will not be tolerated.

Directions for Submitting Your Assignment:

• Use the following convention to name your Assignment: IT302-Unit4-LastName-FirstName, where your own name is typed (example: IT302-Unit4-Bhatt-Ajay). Submit the completed document as an attachment to the Unit 4 Assignment Dropbox before the deadline.

Requirements for the assignment continue following the badging information below.

Challenge Levels

Anyone up for a challenge? This course offers you the opportunity to go beyond the required course material. Two Challenge Levels are offered to supercharge your coursework: Design Whiz and Rock Star Professional.

Challenge Levels are a great way for you to learn more about the topic, better improve your existing skills and abilities, and/or highlight how knowledgeable you are in the unit material. These levels do not count for additional points or guarantee a higher grade.

Challenge Levels offer you an opportunity to stand out, learn more, and gain confidence.

To start, follow the rubric and project instructions as you normally would. If you choose to try it, supplement your project with the challenge levels. Reach out to your instructor and do some research for resources. The "Design Whiz" level adds to the basic level, and the "Rock-Star Professional" level adds more challenges to the "Design Whiz" level.

You must complete the "Design Whiz" level before you attempt the "Rock-Star Professional" level.
If you start a challenge level, but it becomes too difficult to handle, please stick with the basic project instructions as found in the rubric to calculate your grade.

Most importantly-have fun with it!

Your Challenge Levels for this week:
Design Whiz
Add an introductory paragraph (before your 10 heuristics) that explains the basic concept of heuristics and who is responsible for the ones used here. Include in-text citation - and a new reference entry if necessary.
Rock-Star Professional

Reference no: EM13926887

Questions Cloud

Calculate the effective rate of protection : a. Calculate the effective rate of protection if there is no duty on steel imports. b. Calculate the effective rate of protection if the importing country imposes a 20% tariff on steel imports. c. Suppose it also takes $4000 worth of copper (besides..
Amount of information before launching the attack : Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target's trash is know..
Sinusoidal wave is described by the equation v : Assume as sinusoidal wave is described by the equation v(t) = 100 v sin(200t + 0.52).    (a) From this expression, determine the peak voltage, the average voltage, and the angular frequency is rad/s.
Determine the net effect of plan on blawnoxs pretax profits : The company also expects its inventory investment to decrease by $1 million due to the anticipated decrease in sales. Determine the net effect of this plan on Blawnox's pretax profits.
Various techniques for exploring emerging design ideas : Heuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface.
Research methodology assignment : The primary purpose of this Research Methodology Assignment is to give you experience in determining appropriate research methods to be used with the research question and hypotheses you have posed and with the type data you would need to collect ..
Determine the eoq for shoelaces : Determine the EOQ for shoelaces, The total annual inventory costs of this policy and The frequency with which Allstar should place its orders for shoelaces.
Bounces back out of the basket : Go throw a basketball into a shallow basket that is tipped toward you. Whenever you throw the ball into the basket, it bounces back out of the basket and falls onto the floor. How could this rebound be minimized when it is thrown?
Spoofed packet to the broadcast address for a network : In a _____ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all the systems on that network.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Factoring is the problem of computing

Consider the one time pad encryption scheme to encrypt a 1-bit message. Replace the XOR operation with another operation X. For which X does the resulting scheme satisfy perfect secrecy?

  Explain global ubiquitous platform for online services

Recognize what you believe to be next set of core future service(s) to be offered via Internet over next 2 to 5 years based on current and evolving technologies.

  Find out product stream temperature and volume

Find out the product stream temperature and volume required to carry out reaction in a CSTR at 50 % conversion in adiabatic mode of operation.

  The value display style tells the browser not the element

The ____ value of the display style tells the browser not the display the element.

  Data mining powerpoint presentation with an example

Research the forms of data used in the system of your choice. This system could be your own health care organization, the Patton-Fuller Community Hospital found in the University of Phoenix Virtual Organizations, or an organization from the course..

  Why is the pages not showing up

why is the pages not showing up, they are on the side in the library part but when i click on each page they wont load into reader

  Research the major middleware providers

The language to use if need is Java. Make sure you cite references and adhere to the academic guidelines for writing a research paper.

  Use to create style sheets for your web pages

Write a 2-3 page essay that compares the features of two different CSS software packages and describe which you as a web designer might use to create style sheets for your Web pages and why. Explain the benefits of using CSS in developing your web..

  Protecting browsers from dns rebinding attacks

Write a Review/Critique paper of the following articles: Collin Jackson et al., "Protecting Browsers from DNS Rebinding Attacks", In Proceedings of ACM CCS, 2009.Robin Sommer and Vern Paxson, "Enhancing Byte-Level Network Intrusion Detection Signat..

  Project life cycle model to create game plan

Explain in scholarly detail how you would apply project life cycle model to create a game plan for developing different project.

  Use the ribbon instead of toolbars and menus

"APA and the Office Ribbon". View the American Psychological Association (APA) style report (6th edition). Next, review the APA requirements. Then, explain what you believe to be the most challenging aspect of APA formatting.

  Define a 1-d array named people types

Define a 1-D array named people Types that can store a maximum of 50 integer values that will be entered at the keyboard.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd