Create table to evaluating websites-reasoning, Database Management System

Assignment Help:

Have a look around the site, and at some of the sites they have featured. These are all examples of bad design, and also offer an explanation about why they fall into this category.

This task should give you an idea of the things to look for when evaluating sites, and how other people evaluate them.

Task

You will be evaluating at least four websites from the domain of pet supplies, and producing a document to summarise the process you have undertaken.

Task 1

Have a look at Nielsen's or Schneiderman's heuristics (see the evaluation lecture) and consider which you feel to be most important when evaluating websites of this type (ecommerce sites).

Task 2

Create a table with criteria you are going to consider when evaluating your sites (these can be directly linked to particular heuristics found in task 1 but can also include other factors you feel are important).

Task 3

Search for websites for "pet supplies".

Evaluate at least four relevant pet supplies sites using the evaluation criteria you identified in task 2,and for each website enter your values in the table you created. Ensure you record the website URL in your results table.

Task 4

Decide which of the sites you would consider to be, in your opinion, the best. Explain your reasoning, and reflect on how closely this matches the results gathered in task 3.


Related Discussions:- Create table to evaluating websites-reasoning

What is conceptual schema, What is conceptual schema? The schemas at th...

What is conceptual schema? The schemas at the view level are known as subschema that describe dissimilar views of the database.

Shadow copy, why shadow copy technique is used?

why shadow copy technique is used?

Two phase locking (2pl), Two Phase Locking (2PL) The two-phase locking ...

Two Phase Locking (2PL) The two-phase locking protocol having of two phases: Phase 1 : The lock acquisition phase : If a transaction T needs to read an object, it wants to

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Farm management system, draw er diagram using entities crop,employee,depart...

draw er diagram using entities crop,employee,department,plot,cultivation plan,machinery,seed,fertilizer

Prepare entity relationship diagram for models your design, This project re...

This project requires you to perform a systems analysis and then design a system solution using database software. Ace Auto Dealers specializes in selling new vehicles from Subaru.

State the design of associations, State the Design of Associations Bef...

State the Design of Associations Before designing associations, it is essential to know the way they are used. For this, analysis of association traversals is required. It is

What is sql, What is SQL, and why is it important? SQL stands for Struc...

What is SQL, and why is it important? SQL stands for Structured Query Language, and is the most significant data processing language in use today. It is not a complete programm

Difference among a database schema and a database state, What is the differ...

What is the difference among a database schema and a database state? The collection of information stored in database at particular moment in time is known as database state a

How can we classify the operations on classes, How can we Classify the oper...

How can we Classify the operations on classes  This step fundamentally means all three models functional, object and dynamic (studied in last section) must be combined so that

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd