Human–computer interaction: design rules
Designing for maximum usability. The essential characteristics of rules in the form of standards and guidelines in order to enhance the interactive properties of the system. Principles of flexibility and robustness. HCI design patterns and golden rules.
Подобные документы
Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.
статья, добавлен 13.07.2022A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
статья, добавлен 15.04.2014The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
статья, добавлен 04.10.2022- 80. ICARE model
Using the ICARE Format for Structuring Online Courses. Instructional design is a system of procedures for developing education and training programs in a consistent and reliable fashion. Model concentrates on the connection between content, context.
реферат, добавлен 06.02.2014 The choice of technologies for application development as an stage. The importance of the correct selection of a combination of technologies in ensuring comfortable work in the future at all stages of the program's existence. Scalable technology stack.
статья, добавлен 11.07.2022The theoretical workbench for real time network modeling. Implement different transition firing rules in A-nets. The Matlab as a Simulink block library. Execution time and facilitating model understanding. A-nets for message transmission modeling.
статья, добавлен 22.07.2014Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.
методичка, добавлен 11.10.2014Internet multimedia: media element such as sound, animation and video. File transfers: downloading (process of transferring the file from remote computer to your computer) and uploading (sending a copy of files from your computer to remote computer).
лекция, добавлен 15.04.2014Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.
статья, добавлен 01.12.2017The comparison of the computer development in the USA and Ukraine. At the time when the computer science was just uprising this two countries were one of the most noticeably influential. Howard Aiken's contributions to the development of the computer.
эссе, добавлен 13.09.2011The algorithm and program in MAPLE for the solution ordinary differential equations of IV order in the form of generalized power series. Some examples of the solution differential equations IV order. The singular regular points of differential equation.
статья, добавлен 01.02.2019Geometrical form of normal wear of die's working surface. Measuring system on base of threecoordinate machine-tool with numerical program control. Profile of natural wear of die is described by polynomial of third order with high degree of authenticity.
статья, добавлен 14.09.2016- 89. Database
Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.
контрольная работа, добавлен 14.05.2017 The design of a von Neumann architecture machine. A stored-program digital computer. Development of the stored-program concept. Early von Neumann-architecture computers. Von Neumann bottleneck. Features of Von Neumann Architecture. Arithmetic Logic Unit.
презентация, добавлен 25.10.2017Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.
дипломная работа, добавлен 01.12.2019Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.
статья, добавлен 12.05.2024Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.
статья, добавлен 19.07.2020Revolutionary changes in the intellectual development of mankind. The emergence of a second human signaling system, awareness of the nature of the formation of cognitive abilities of the human brain and the formation of highly intelligent neural networks.
статья, добавлен 15.04.2024The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.
презентация, добавлен 25.09.2016Introduction to Blind Signal Processing: Problems and Applications. Iterative Algorithms with Non-negativity Constraints. Basic Properties of PCA. Extraction of Principal Components. SOS Blind Identification Based on EVD. Computer Simulation Experiments.
книга, добавлен 25.11.2013An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014The main features and functions of the service Google Docs. Characteristics of the use of this service for teaching computer science to future teachers of mathematics in order to solve information problems. Analysis of the use of the student service.
статья, добавлен 05.04.2019Stages of the development of computer technologies for compilation of dictionaries. Determination of the prerequisites that led to the emergence of such a direction in linguistics as computer lexicography. The tasks of the Language and Information Fund.
статья, добавлен 04.09.2024Computer facilities and microprocessor systems and data manipulation. Digital automata synthesis. Programming of Intel microprocessors, generic architecture. Construction principles of telecommunications nodes. Initialization of purpose registers.
методичка, добавлен 11.10.2014