Various techniques for exploring emerging design ideas

Assignment Help Basic Computer Science
Reference no: EM13926887

Outcomes addressed in this activity:

Unit Outcomes:
•Compare various techniques for exploring emerging design ideas.
•Apply heuristic evaluation to a physical design.

Course Outcome:
•IT302-2: Evaluate human-computer interaction principles and the discovery process.
GEL Outcome:
•GEL-1.1: Demonstrate college-level communication through the composition oforiginal materials in Standard American English.

Assignment Instructions and Requirements:

Heuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface.

Part of this assignment's value is to practice paraphrasing information; if you are unsure how to rewrite from source material, please visit the Writing Center or check for resources offered by your professor in the classroom. Make sure you follow APA style requirements as you prepare your Assignment.

Gathering Information Before Writing

Use the textbook and/or other suitable sources to learn about Jakob Nielsen's 10 Heuristics for User Interface Design. Pick one of the following interfaces to complete the assignment and use the same one for all heuristic evaluations in your paper. Approved choices:
•Word, Excel, or PowerPoint
•Photoshop, Dreamweaver, or Flash
•Your favorite email system
•An anti-virus software interface

•Quicken or another financial software application

The Assignment Itself
For each of the 10 heuristics:
•Write the heuristic itself as a paper subheading. These subheadings should be:
1.Visibility of system status
2.Match between system and the real world
3.User control and freedom
4.Consistency and standards

Unit 4 [IT302: Human-Computer Interaction]

5. Error prevention
6. Recognition rather than recall
7. Flexibility and efficiency of use
8. Aesthetic and minimalist design
9. Help users recognize, diagnose, and recover from errors
10. Help and documentation

• In a first paragraph under each heading, summarize or paraphrase what that heuristic means. Use source material and in-text citation at the end of this paragraph, but do not quote or copy from your sources.

• In a second paragraph under each heading, apply the heuristic to your chosen application, explaining if and/or how it meets expectations. If not, surmise why the developers did not consider the heuristic.

• Each heuristic's two paragraphs combined must be at least 45 words in length.
Provide a last page for properly-formatted APA reference entries.

Additional Requirements
• Your paper should show an understanding of the unit reading.
• Use the textbook and/or other sources appropriate for university work.
• Submit your work as a Word document in APA format. You must use 10- or 12-size Times New Roman or Arial font and meet other formatting requirements. Please note that an Abstract page and Table of Contents are not required.

• Cite your sources within the body of the paper and provide a list of references at the end in a separate References page. In-text citations and references should be properly formatted according to APA guidelines.

• Use subheadings as instructed so that your professor clearly sees where each of the parts begins.

Written work should be free of spelling, grammar, and APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor's discretion.

Please download the file "Writing Center Resources" from Doc Sharing to assist you with meeting APA expectations. Ensure that your work is not copied from any sources. Copying does not prove an understanding of the material, and plagiarism will not be tolerated.

Directions for Submitting Your Assignment:

• Use the following convention to name your Assignment: IT302-Unit4-LastName-FirstName, where your own name is typed (example: IT302-Unit4-Bhatt-Ajay). Submit the completed document as an attachment to the Unit 4 Assignment Dropbox before the deadline.

Requirements for the assignment continue following the badging information below.

Challenge Levels

Anyone up for a challenge? This course offers you the opportunity to go beyond the required course material. Two Challenge Levels are offered to supercharge your coursework: Design Whiz and Rock Star Professional.

Challenge Levels are a great way for you to learn more about the topic, better improve your existing skills and abilities, and/or highlight how knowledgeable you are in the unit material. These levels do not count for additional points or guarantee a higher grade.

Challenge Levels offer you an opportunity to stand out, learn more, and gain confidence.

To start, follow the rubric and project instructions as you normally would. If you choose to try it, supplement your project with the challenge levels. Reach out to your instructor and do some research for resources. The "Design Whiz" level adds to the basic level, and the "Rock-Star Professional" level adds more challenges to the "Design Whiz" level.

You must complete the "Design Whiz" level before you attempt the "Rock-Star Professional" level.
If you start a challenge level, but it becomes too difficult to handle, please stick with the basic project instructions as found in the rubric to calculate your grade.

Most importantly-have fun with it!

Your Challenge Levels for this week:
Design Whiz
Add an introductory paragraph (before your 10 heuristics) that explains the basic concept of heuristics and who is responsible for the ones used here. Include in-text citation - and a new reference entry if necessary.
Rock-Star Professional

Reference no: EM13926887

Questions Cloud

Calculate the effective rate of protection : a. Calculate the effective rate of protection if there is no duty on steel imports. b. Calculate the effective rate of protection if the importing country imposes a 20% tariff on steel imports. c. Suppose it also takes $4000 worth of copper (besides..
Amount of information before launching the attack : Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target's trash is know..
Sinusoidal wave is described by the equation v : Assume as sinusoidal wave is described by the equation v(t) = 100 v sin(200t + 0.52).    (a) From this expression, determine the peak voltage, the average voltage, and the angular frequency is rad/s.
Determine the net effect of plan on blawnoxs pretax profits : The company also expects its inventory investment to decrease by $1 million due to the anticipated decrease in sales. Determine the net effect of this plan on Blawnox's pretax profits.
Various techniques for exploring emerging design ideas : Heuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface.
Research methodology assignment : The primary purpose of this Research Methodology Assignment is to give you experience in determining appropriate research methods to be used with the research question and hypotheses you have posed and with the type data you would need to collect ..
Determine the eoq for shoelaces : Determine the EOQ for shoelaces, The total annual inventory costs of this policy and The frequency with which Allstar should place its orders for shoelaces.
Bounces back out of the basket : Go throw a basketball into a shallow basket that is tipped toward you. Whenever you throw the ball into the basket, it bounces back out of the basket and falls onto the floor. How could this rebound be minimized when it is thrown?
Spoofed packet to the broadcast address for a network : In a _____ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all the systems on that network.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd