Create table to evaluating websites-reasoning, Database Management System

Assignment Help:

Have a look around the site, and at some of the sites they have featured. These are all examples of bad design, and also offer an explanation about why they fall into this category.

This task should give you an idea of the things to look for when evaluating sites, and how other people evaluate them.

Task

You will be evaluating at least four websites from the domain of pet supplies, and producing a document to summarise the process you have undertaken.

Task 1

Have a look at Nielsen's or Schneiderman's heuristics (see the evaluation lecture) and consider which you feel to be most important when evaluating websites of this type (ecommerce sites).

Task 2

Create a table with criteria you are going to consider when evaluating your sites (these can be directly linked to particular heuristics found in task 1 but can also include other factors you feel are important).

Task 3

Search for websites for "pet supplies".

Evaluate at least four relevant pet supplies sites using the evaluation criteria you identified in task 2,and for each website enter your values in the table you created. Ensure you record the website URL in your results table.

Task 4

Decide which of the sites you would consider to be, in your opinion, the best. Explain your reasoning, and reflect on how closely this matches the results gathered in task 3.


Related Discussions:- Create table to evaluating websites-reasoning

Update anomaly-data redundancy, Update Anomaly : This anomaly is occurred d...

Update Anomaly : This anomaly is occurred due to data redundancy. Redundant information makes updates more complex since, for example, varying the name of the instructor of MCS-014

What is a name, What is a Name? A user-supplied name is used for identi...

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it

List the requirements needed to design a trigger, List the requirements nee...

List the requirements needed to design a trigger. The requirements are:- Specifying when a trigger is to be implemented. State the actions to be taken when the trigger im

EER models, Ask question #MinimThe Georgia Tech Library (GTL) has approxima...

Ask question #MinimThe Georgia Tech Library (GTL) has approximately 16,000 members, 100,000 titles, and 250,000 volumes (an average of 2.5 copies per book). About 10 percent of the

DBMS, give some example real life situation where DBMS are most suitable

give some example real life situation where DBMS are most suitable

Convert encrypted hsql database into csv format, Project Description: We...

Project Description: We have an encrypted HSQL Database which we want to change into csv format. HSQL DB . We have java application (jar file) which reads that database but n

When is update_statistics command used, When is UPDATE_STATISTICS command u...

When is UPDATE_STATISTICS command used? - When processing of large data is done, this command is used. - Whenever large number of modification, deletions or copy takes place

Express the properties of strings, Express the properties of Strings? ...

Express the properties of Strings? Strings can be case sensitive (or not) which can change the outcome of string operations. You can evaluate whole strings \ just part

What is a view in sql and when can views be updated, What is a view in SQL?...

What is a view in SQL? When can views be updated? A view is a virtual table which consists of columns from one or more tables. Through it is same to a table; it is stored in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd