Combining goals and design principles, Computer Engineering

Assignment Help:

The Set Book assignment should enable you to begin talking about the usability of interactive products in terms of a variety of parameters. Instead of simply saying 'nice cell phone, lovely to use' or 'awful MP3 player, really bad design' you should now be equipped (having studied Unit 2) with a set of terms and concepts that can help you describe what is good and bad about an interactive product'sdesigninterms of usability.

However, it is still easy to fall into the trap of talking about usability at a fairly shallow level. For example, when asked to do this exercise, you may have just said 'product X is easy to use, remember and learn'. This may be the case, but you need to explain why. You need to explore in more depth why you think something is usable or not, in terms of A, B or C. In so doing, you may find that while the basic functions are easyt ol earn,m anyo ft hemoreadvancedfunctions arefiddlyor inefficient to learn how to use and remember. Hence, a product's usability will vary depending on the nature of the task, the context in which it is being used, and who is using it. Setting specific questions for each of the usability and user experience goals and the design concepts can help you to start articulating in more detail what is and isn't usable about a product (and why this is the case). In addition, asking someone else to try doing a range of tasks and observing them can be very revealing, showing you aspects that you would overlook yourself or take for granted.

You should also try to avoid seeing usability in terms of 'black and white', i.e. a product is either easy to use or not, it is efficient or inefficient to use. What is often much more interesting are the grey areas, where it may notbeobviousa t firstthattherei sap roblemb utonlyafter careful examination are you able to identify a specific usability problem (or set of problems).


Related Discussions:- Combining goals and design principles

What are the different methods used for handling, What are the different me...

What are the different methods used for handling the situation when multiple interrupts occurs? 1) Vectores interrupts 2) Interrupt nesting 3) Simultaneous Requests.

Wireless Networking, Suppose you work in a network security company, and yo...

Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wire

Working of compact disk - computer architecture, Working of compact disk: ...

Working of compact disk: A CD is built from 1.2 mm thick, approximately all-pure polycarbonate plastic and its weighs is approximately 15-20 grams. From the core outward compo

Explain bus interface unit, Q. Explain Bus Interface Unit? BIU (Bus Int...

Q. Explain Bus Interface Unit? BIU (Bus Interface Unit) mainly interacts with system bus. It executes nearly all the activities relating to fetch cycle like:  Computing

Assembler, Assembler: Typically a modern assembler makes object code b...

Assembler: Typically a modern assembler makes object code by translating assembly instruction into op codes, & by resolving symbolic names for memory locations and any other e

How do you turn off cookies for one page in your site, How do you turn off ...

How do you turn off cookies for one page in your site?  Use the Cookie. Discard Property which Gets or sets the discard flag set by the server. When true, this property initiat

What is micro operation, What is micro operation? A micro operation is ...

What is micro operation? A micro operation is an elementary operation performed with the data kept in registers.   1) Register transfer microoperation transfer binary inform

Final project, I need help coming with an idea for BSCE final project, whic...

I need help coming with an idea for BSCE final project, which is solvable in about a semester

What are the aspects of security policy, What are the aspects of security p...

What are the aspects of security policy The security policy should cover aspects such as network service access, physical access, limits of acceptable behaviour, company's pro

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd