Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
(a) Shneiderman's eight golden rules for dialogue design are (1) strive for consistency, (2) enable frequent users to use shortcuts, (3) give informative feedback, (4) give dialog to yield closure, (5) error prevention and simple error handling, (6) permit easy reversal of actions, (7) make sure the user is in control, and (8) reduce Short Term Memory load. Explain each rule.
(b) You are working for a software development firm as a Systems Analyst/software developer. Your firm has been given the task of computerizing the Information Kiosk of Domaine Des Rois which is a leisure nature park that offers various activities to tourists and Mauritians which include trekking, Quad Bike, hunting, treasure hunts among others. You have been requested to develop a software, an online Information Kiosk, that will provide online information to clients who are interested to know about the activities being offered at Domaine Des Rois and about the fees. Clients can also register online and make booking as well as electronic payment for any activity in which they want to participate.Discuss how each rule can guide you in the design of the software.
How can an understanding of attention help you in the design of your interface? Name three techniques that can be used to guide the attention of students at the interface.
The world of ICT is full of metaphors. It is common for software designers to use metaphors in the design of menus. Explain how metaphors can enhance the interface of the information kiosk. Also, make a drawing of the menu of the kiosk. You may include two levels of menu.
Q. Explain Lines of code - Software Metrics? Lines of code (LOC) is a software metric used to measure the size of a software program by counting the number of lines in the te
What are the common approaches in debugging? Brute force method: The memory dumps and run-time tracks are checked and program with write statements is loaded to get clues to er
INFORMATION STORAGE AND RETRIEVAL SOFTWARE: IBM (International Business Machines Corporation) was one of the earliest to invest money to develop software packages intended fo
State Lehman's First law. A program that is used in true world environment essentially must change or become progressively less useful in that environment.
Define about the erroneous data - Test data Abnormal/erroneous data - This is data outside the limits of validity/acceptability and must cause an error message to be g
What is Big-bang waterfall model? Big bang Model of S/w development is based on the big bang theory. A huge quantity of people, money and time are put together, lot of energy
using a dfd and a processing narrative,describe computer based system that can distinct transform flow characteristics.Define flow boundaries map the dfd into a software architectu
Explain fan out and fan in with example.
Q. Use of Test file generators in software engineering? Test file generators This creates a file of information that is used as the program and does so based on comments give
Q. What do you mean by Core dumps? Core dumps are a repairing technique. A printout of all applicable memory locations is obtained and studied. All dumps must be well documente
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd