Create table to evaluating websites-reasoning, Database Management System

Assignment Help:

Have a look around the site, and at some of the sites they have featured. These are all examples of bad design, and also offer an explanation about why they fall into this category.

This task should give you an idea of the things to look for when evaluating sites, and how other people evaluate them.

Task

You will be evaluating at least four websites from the domain of pet supplies, and producing a document to summarise the process you have undertaken.

Task 1

Have a look at Nielsen's or Schneiderman's heuristics (see the evaluation lecture) and consider which you feel to be most important when evaluating websites of this type (ecommerce sites).

Task 2

Create a table with criteria you are going to consider when evaluating your sites (these can be directly linked to particular heuristics found in task 1 but can also include other factors you feel are important).

Task 3

Search for websites for "pet supplies".

Evaluate at least four relevant pet supplies sites using the evaluation criteria you identified in task 2,and for each website enter your values in the table you created. Ensure you record the website URL in your results table.

Task 4

Decide which of the sites you would consider to be, in your opinion, the best. Explain your reasoning, and reflect on how closely this matches the results gathered in task 3.


Related Discussions:- Create table to evaluating websites-reasoning

Basic concept of data base management system, INTRODUCTION Databases a...

INTRODUCTION Databases and database systems have become an essential part of our daily life. We encounter many activities that involve some interaction with a database almost

List some security violations, List some security violations (or) name any ...

List some security violations (or) name any forms of malicious access. A) Unauthorized reading of data B) Unauthorized modification of data C) Unauthorized destruction of

Explain how you can define an object model of a system, Explain how you can...

Explain how you can define an object model of a system. A list of terms that shall be used by end users to describe state and behaviour of objects in system.   Different use

Relation and relational schema, A relation has: Relational Schema ...

A relation has: Relational Schema Relation instance Relational Schema: A relational schema shows the relation's name, its attributes and the domain of every a

#title., WHY SHOULD NULL IN A RELATION BE AVOID AS possible?

WHY SHOULD NULL IN A RELATION BE AVOID AS possible?

Give the limitations of sql authorization, Give the limitations of SQL auth...

Give the limitations of SQL authorization. The code for checking authorization becomes intermixed with the rest of the application code. Implementing authorization by applic

Design a database table, A database named yourusernameFMA has been set up f...

A database named yourusernameFMA has been set up for you to use for this assignment.  For the FMA you must create the required tables and run the queries using this database.  If y

Explain the function of input controls, Explain the function of input contr...

Explain the function of input controls. Identify four types of input control and explain the function of each. Provide an example of a data integrity error that could occur i

Define canonical cover, Define canonical cover? A canonical cover Fc fo...

Define canonical cover? A canonical cover Fc for F is a set of dependencies like F logically implies all dependencies in FC and Fc logically shows all dependencies in F.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd