Combining goals and design principles, Computer Engineering

Assignment Help:

The Set Book assignment should enable you to begin talking about the usability of interactive products in terms of a variety of parameters. Instead of simply saying 'nice cell phone, lovely to use' or 'awful MP3 player, really bad design' you should now be equipped (having studied Unit 2) with a set of terms and concepts that can help you describe what is good and bad about an interactive product'sdesigninterms of usability.

However, it is still easy to fall into the trap of talking about usability at a fairly shallow level. For example, when asked to do this exercise, you may have just said 'product X is easy to use, remember and learn'. This may be the case, but you need to explain why. You need to explore in more depth why you think something is usable or not, in terms of A, B or C. In so doing, you may find that while the basic functions are easyt ol earn,m anyo ft hemoreadvancedfunctions arefiddlyor inefficient to learn how to use and remember. Hence, a product's usability will vary depending on the nature of the task, the context in which it is being used, and who is using it. Setting specific questions for each of the usability and user experience goals and the design concepts can help you to start articulating in more detail what is and isn't usable about a product (and why this is the case). In addition, asking someone else to try doing a range of tasks and observing them can be very revealing, showing you aspects that you would overlook yourself or take for granted.

You should also try to avoid seeing usability in terms of 'black and white', i.e. a product is either easy to use or not, it is efficient or inefficient to use. What is often much more interesting are the grey areas, where it may notbeobviousa t firstthattherei sap roblemb utonlyafter careful examination are you able to identify a specific usability problem (or set of problems).


Related Discussions:- Combining goals and design principles

The last character of the ldb name, The last character of the LDB name deno...

The last character of the LDB name denote?? Application

Explain essential loop in process scheduling, Explain essential loop in Pro...

Explain essential loop in Process Scheduling . The complex part of scheduling is to balance policy enforcement along with resource optimization so as to pick the best job to run

Define point-to-point communication, Q. Define Point-to-point Communication...

Q. Define Point-to-point Communication? The simplest form of message is a point to point communication. A message is sent from the transmitting processor to a receiving process

Detail explanation of cryptographic modules, Detail explanation of Cryptogr...

Detail explanation of Cryptographic modules Physical security of the cryptographic modules is also built in order to provide total security of the whole system and protect from

Describe about the protection features present in ms access, If a programme...

If a programmer doesn't wish to make modifies to the document he can lock the document data and its code from more changes by changing the extension of the file system to .MDE. Cha

Show matrix multiplication problem, Q. Show Matrix Multiplication Problem? ...

Q. Show Matrix Multiplication Problem? Let there be 2 matrices M1 and M2 of sizes a x b and b x c correspondingly. If we multiply M1 and M2 product matrix O will be of size a x

Aussie wine tours awt, Business Narrative Aussie Wine Tours (AWT) condu...

Business Narrative Aussie Wine Tours (AWT) conduct tours of the wineries of Victoria's Yarra Valley wine region. The tours take place on the last Sunday of each month. Currentl

What is an identification method, An identification method notifies Robot h...

An identification method notifies Robot how to recognize the values to compare during record and playback.

What are the type of internet connection, What are the type of Internet con...

What are the type of Internet connection When determining requirements for a VPN, carefully estimate the number of systems to be put behind the VPN, the number of concurrent u

What is the relation between response time and throughput, The Throughput g...

The Throughput graph represents the amount of data in bytes that the Vusers received from the server in a second. When we evaluate this with the transaction response time, we will

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd