Computers and Technology
Computers and Technology, 24.09.2019 11:30, jalst6084

1. which of the following do most designers believe should be designed first?
a. detailed user's guide
b. graphics and icons
c. underlying structure of the application
d. visual part of the application
2. designers should take into consideration the users' technical experience when designing an interface.
a. true
b. false
3. what do wysiwyg interfaces shield users from?
a. code
b. content
c. links
d. menu items
4. which of the following is a motto graphic designers follow when designing the underlying structure of an application?
a. application over decoration.
b. design is in the eye of the beholder.
c. form follows function.
d. interface is key.
5. what does knowing a user's understanding of technology a designer determine?
a. level of support the interface needs to provide
b. number of items included in the menu
c. number of links to provide
d. which codes should be provided for the user
6. poor interface design might cause the validity of an application's content to be questioned.
a. true
b. false
7. when should a designer perform an audience analysis?
a. after the user looks at the design
b. at the start of the design process
c. just before the design is complete
d. once the product is complete and is in use
8. which of the following id considered an interface?
a. the buttons on the screen of an atm
b. the code that builds a web page
c. the materials used to build a computer
d. the mechanical workings of an mp3 player
9. what is the most important thing a designer should be concerned about designing an interface?
a. how large the database is
b. how many menu options the interface has
c. how the interface design affects the product's user
d. whether the interface is visually appealing
10. what does the menu system on your dvd player illustrate?
a. interface
b. link
c. menu system
d. search engine

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:20, Masielovebug
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
image
Computers and Technology, 22.06.2019 09:40, Tyrant4life
It is vital to research each of the services you plan to disable before implementing any change, especially on critical machines such as the: a. servers in the test environment. b. domain controller and other infrastructure servers. c. desktops that have previously been attacked. d. desktops used by upper-level management.
Answers: 2
image
Computers and Technology, 22.06.2019 15:10, reycaden
David is in week 3 of his current ashford course and has a paper due by monday night at midnight. he has finished everything but the concluding paragraph. as he boots up his computer to work on it, he sees a flash across the screen and then the screen goes black. he begins to panic as he tries desperately to turn the laptop back on. david should have saved his work on what kind of portable device?
Answers: 2
image
Computers and Technology, 22.06.2019 21:30, mima851
Elements such as fonts colors visual structure graphics and the interface of a web page should complement each other to ensure blank
Answers: 3
Do you know the correct answer?
1. which of the following do most designers believe should be designed first?
a. detailed use...

Questions in other subjects:

Konu
Mathematics, 26.04.2021 04:50
Konu
Mathematics, 26.04.2021 04:50
Konu
Spanish, 26.04.2021 04:50