Visual symbolic and iconic communication

Assignment Help Basic Computer Science
Reference no: EM132899351

Choose one of the logos above address the following points using the content from Module 6:

1. Describe the semiotic/symbolic visual elements in the logo design.

2. Discuss why having visual symbolic and iconic communication in a logo may be a good strategy to communicate visually with your targeted audience.

3. Discuss why drastically changing the visual elements in an established and successful logo such as Disney, Apple, or Nike, would have a negative effect on the emotion-based trust relationship clients have with the company.

Attachment:- Discussion Post.rar

Reference no: EM132899351

Questions Cloud

Explain which cloud services : Explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store
Explain most important environmental issues : What are several of the most important environmental issues now receiving worldwide attention? Should businesses and societies continue to focus on unlimited ec
Predicting interview questions : Predict 5 behavioral based interview questions from the job posting and write out your responses to the question using the STAR Methodology.
Find value of outstanding debt : "Consider a project with a single risky cash flow in one year. The CF will be either $20,000 (with probability 0.1) or $2,000 (with probability 0.9). All invest
Visual symbolic and iconic communication : Discuss why having visual symbolic and iconic communication in a logo may be a good strategy to communicate visually with your targeted audience.
Basics of creating attention-getting presentations : Preparing for a presentation can be an overwhelming experience if you allow it to be one. There is nothing more nerve-wracking than having a big presentation co
List the features of flexible order processing : 1. Enumerate and explain briefly Strategies to Speed up Your Order Fulfillment Process
Many mobile platform vulnerabilities : There are many mobile platform vulnerabilities. Which do you feel is the greatest threat to users?
Bsbinn 301 promote innovation in a team environment : 1>Name 3 aspects that you should look at when you make your evaluation.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What information do you need to be able to retrieve

What information do you need to be able to retrieve every record from a hashed file in ascending key order?

  Presentations and best practices

Choose a field (e.g., marketing, sales, teaching, etc.) where you believe presentations are important.

  Redundant network access paths

The storage solution should have redundant network access paths. Ensure that your storage system can support 5 years of archiving.

  Conduct your own social engineering experiments

While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk,

  Rare species of spiders

In South America, a rare species of spiders is discovered and is transplanted into a safe area. Once they are transported the population of the spider after t months is P(t) = 44( 1 + 0.7t ) / ( 3 + 0.03t )

  What is the probability that both adults dine out

What is the probability that both adults dine out more than once per week? rounded in three decimal places

  Challenges to achieving complete mediation

Which of the following are challenges to achieving complete mediation? (check all that apply).

  What classes should you use to implement it

They are paid their hourly rates for each hour worked; however, if they worked more than 40 hours per week, they are paid at 150 percent of their regular wage for those overtime hours.What classes should you use to implement it?

  Hearsay rule in legal proceedings

Do a bit of research on the hearsay rule in legal proceedings.

  Several parts of the nation financial infrastructure

In this scenario, hackers launch cyber attacks that affect several parts of the nation's financial infrastructure over the course of several weeks.

  Question regarding the hipaa privacy rule

The HIPAA privacy rule states, "An individual has the right to inspect and obtain a copy of the individual's protected health information (PHI) in a designated record set."

  Cloud computing and operational excellence

Reflect on the connection between knowledge or concepts from these courses and how those have been, or could be, applied in the work place .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd