Core Computing Flashcards

1
Q

What does HTML stand for?

A

HyperText Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CSS stand for ?

A

Cascading Style Sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does svg stand for?

A

Scalable Vector Graphics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does URL stand for?

A

Uniform resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a selector?

A

This is used to refer to an element that you will modify in your CSS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What format do we use when selecting an id in CSS ?

A

idname{

       css goes here
                             }
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What format do we use when selecting class in CSS?

A

if its just a class then .classname{css}

if its a element with a class e.g. <p class = lol> then
p.lol {css}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can we style in html?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we style in HTML?

A

We use style element. Then you type the CSS inside of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do we use CSS instead of just styling in HTML?

A

CSS provides better efficiency and saves memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What parts must a url always have?

A

. scheme/protocol
. host/domain name
. path (the /// part)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the port look like in the URL?

A

:123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do we create hyperlinks in HTML?

A

we use the a element and its attribute href.

E.g.

<a>An Example Website</a>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do we link CSS file or JavaScript file to html?

A

We make use of the script tag and the src attribute.
E.g.

<script>

</script>
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do we use images in HTML ?

A

We use the img element and its attributes src for the name of the image file.
We must also include the alt attribute

E.g.

<img></img>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why do we need the alt attribute when using the img element ?

A

Its a standard and the alt attribute helps people with screen reader know what the image is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is better to download the image?

A

It prevents hotlinking. This is when instead of putting a file in src you put a link to an image. This is bad because if the image from the link is changed or deleted so will yours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why is svg good for images?

A

It offers higher resolution images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name some markup languages ?

A

xml,html,svg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is svg?

A

It is a mark up language for images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do you need at the start of every html doc ?

A

<!DOCTYPE html>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Who created HTML ?

A

Tim Berners-Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What kinda markup do we prefer in HTML?

A

Descriptive not procedural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the difference between client and server?

A

Server operations are remote, whereas client operations are performed locally by a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is information security ?

A

Information security is the preservation of confidentiality, integrity and availability of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define confidentiality.

A

preventing the disclosure of information to anyone or anything that is not authorised to view or otherwise access that information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define integrity

A

Preserving the integrity of information is the safeguarding of its accuracy and completeness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define availability ?

A

if the information can be accessed by authorised entities on demand whenever they need it for legitimate purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Explain the trade that happens when trying to improve information security

A
  • Often in an attempt to improve confidentiality a trade-off is made in which integrity or availability is decreased/threatened and the same goes for the other 2
  • An example of this may be repeating credit card details during a phone purchase repeating the details in short integrity by authorised individuals may over here this information which threatens confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define an asset

A

An asset is anything of value to an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define a threat

A

A threat is a potential cause of an incident that may result in harm to system organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define vulnerability

A

vulnerabilities are weaknesses In an information asset or information system itself that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define impact

A

The result of an information security incident caused by threats which affects the assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define risk

A

The potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Must all information be protected ?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define business critical information

A

Info about the business without this information the business will not be able to function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define personal information

A

Info on employees and customers by law this needs to be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define strategic information

A

Info that provides organisations with a competitive advantage and directs their activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define high cost information

A

info whose gathering storage processing and transmission require a long time and involve a high cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Define business processes.

A
  • Business processes are the steps taken to Accomplish certain task that really should be considered In their own right
  • These can be processes protected as trade secrets or processes That ensure effective delivery Of business goals as well as the mission Of the organisation
  • Or they can be processes that ensure legal requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is network security?

A

Network security is the steps to both manage the network perimeter and protect the internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How do we protect the network perimeter?

A

by filtering and inspecting all traffic to the network perimeter. This can be done by :
Firewall - monitors and controls incoming and outgoing network traffic based on predetermined security rules
. Malware - prevents malicious content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How do we protect internal network ?

A

○ Segregate networks - This is done by identifying grouping and fascinating critical business systems and appropriate networks
. Secure WAPs
○ Enable secure administration
○ Configure the exception handling process
○ Monitor network
Assurance processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What should an organisation do to prevent its personnel from falling victim to social engineering?

A

. Security policy
. Induction process
. Make personnel aware of risks
. Have security training and see if it works
. promote incident reporting e.g. tfl see it say it sort it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What must security policies have to remain viable?

A

○ Individual responsible for the policy
○ A schedule reviews
○ Method for making recommendation for reviews
Specific policy insurance and revision date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Define policy

A

A principle or rule to guide decisions and achieve rational outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Define standards

A

A standard is a agreed way of doing something to a specific or measurable level of quality. It is an created by a recognised body and it is officially documented .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Define a guideline

A

A set of recommended actions to assist in complying with the policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Define procedure

A

A list of steps/instructions for performing some action or accomplishing the task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is authentication ?

A

Checking that only authorised individuals can view or modify protected information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are the 3 authentication mechanisms and give examples?

A

○ Something a supplicant knows e.g. password, pin or security questions
○ Something a supplicant has e.g. smart cards, bank card

. Something a supplicant is e.g. fingerprint, eye scan, voice, palmprint,boimetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Give some pros and cons on passwords?

A

Pro -They are simple for designers and users and can provide good protection if used correctly

Cons - Protection is often compromised by the user This is because users make them too short or personal so they’re easy to remember or They are also never changed and the same password is used for multiple systems making passwords weaker.

. People also forget passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is a way to protect passwords

A

. dont give them out
. To protect against password guessing we can lock people after three failed attempts

. However this enables a form of denial of service because attackers deliberately locked try lock out users which has an affect on availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is the acronym for the requirements for biometrics and define the words for each acroynm?

A

CAPCUPD

Collectability - It should be easy and harmless to collect

Acceptability - The trait should be accepted by the public

Performance - It should be fast and accurate regardless of the resources or environment

Circumvention - Using fraudulent methods should be difficult

Universality - Everyone should have this trait

Persistence - The trait shouldn’t change too much over time

Distinctiveness - The ability of the trait to change between 2 people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How is the effectiveness of biometrics evaluated ?

A

False reject rate (FRR) -the percentage of how many users that should have access are denied

False acceptance rate(FAR) - the percentage of how many users that shouldnt have access are accepted

Crossover error rate (CER) - Level at which the number of false rejections equals to false acceptances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Define identity?

A

The properties of an individual resource that can be used to identify uniquely one individual or resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is accounting ?

A

Ensures that user activities can be tracked back to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Define audit ?

A

Formal or informal review of actions processes, policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are the 4 access control policies ?

A

DAC) Discretionary Access Control - Controls access based upon identity. Straight forward to implement and flexible

MAC) Mandatory Access Control - controls access based upon security labels
Used when stronger security guarantees that is required, Centralised control of information

(RBAC) Role Based Access Control - controls access based upon roles

(ABAC) Attribute Based Access Control - controls access based upon attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is strong authentication?

A

The use of two or more authentication mechanisms from at least two different authentication factors. Sometimes called MFA or 2FA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is the difference between factor and mechanisms ?

A

factors are what we know,posses or is whereas the mechanisms are pins and etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What are the 3 file permissions

A

read write execute

62
Q

What are the 3 file permissions

A

Read,Write,Execute

63
Q

What kind of user will have greater access?

A

admins as they are responsible for removing users from groups or modifying the whole groups access rights

64
Q

What is cryptography ?

A

Cryptography is a way of turning plaintext (our secret message) into ciphertext (an unreadable version that can later be turned back into the plaintext

65
Q

What are the 4 principles of modern cryptography?

A
  1. Large enough key space to resist exhaustive search
  2. Resistant to frequency analysis
  3. Small change in plaintext results in large change in ciphertext
  4. Security depends only on secrecy of key, and not on secrecy of algorithm
66
Q

Give some info on symmetric encryption?

A

. Sometimes called private key encryption

. uses the same “secret key” to encipher and decipher message

  • Both sender and receiver must possess encryption key

If either copy of the key is compromised, a hacker can decrypt and read messages

67
Q

Give some info on asymmetric encryption?

A

. Sometimes called public key encryption

. uses two different but related keys to encrypt/decrypt messages

. Typically used to encrypt a symmetric session key rather than the plaintext message

68
Q

Name some encryption codes?

A
  • Caeser cipher
  • Exhaustive Search
    . Substitution and Transposition
69
Q

Name some example symmetric cryptosystems

A

Data Encryption Standard (DES)

Advanced Encryption Standard (AES)

70
Q

Name some example asymmetric cryptosystems

A

RSA(Have a look at how it works)

Elliptic curves

71
Q

What is the formula for risk?

A

Risk = likelihood x impact

72
Q

What elements of risk must be analysed when using component driven approaches?

A

threat,vulnerability and impact

73
Q

Define threat

A

the individual, group or circumstance which causes a given impact to occur, e.g., lone hacker and etc

74
Q

Name 2 Risk assessment methods/frameworks

A

Octave Allegro

NIST 800-30

75
Q

Name 2 information security assessment methods/frameworks

A

NIST CSF

ISO/IEC 270000 series

76
Q

What are the 4 control strategies for risk assessment?

A
  • Avoid
  • Accept
  • Reduce
  • Transfer
77
Q

What are the risk assessment steps

A

1.) Identify risk
2.) Analyse risk
3.) Treat Risk
4.) Monitor and review

78
Q

What is Qualitative risk analysis ?

A

Uses scale of qualifying attributes to describe magnitude of consequences/likelihood (VL,L,M,H,VH)

79
Q

Give some advantages and disadvantages of qualitative risk analysis ?

A

Advantage - ease of understanding by all relevant personnel

Disadvantage - Dependecnce on subjective choice of the scale

80
Q

What is quantitative risk analysis?

A

Uses scale of objective numerical values for consequences/likelihood

81
Q

Give some advantages and disadvantages of quantitative risk analysis

A

Advantage - related directly to info security objectives/concerns of organization

Disadvantage - Lack of data on new risks

. Accurate/missing data in general could create illusion of worth/accuracy of risk assessment

82
Q

What does CBA stand for

A

Cost Benefit Analysis

83
Q

What does ACS stand for

A

Annualized cost of safeguard

84
Q

What does ALE stand for

A

Annualized Loss Expectancy

85
Q

What does ARO stand for

A

Annualized Rate of Occurence

86
Q

What does SLE stand for?

A

Single Loss Expectancy

87
Q

What is the formula for ALE

A

ALE = SLE × ARO

88
Q

What is th formula for CBA

A

CBA = ALE(prior) - (ALE(post) + ACS)

89
Q

Name and explain the 4 risk treatment options?

A

Retain/Accept risk retention - organisation may tolerate (but not ignore) risk
* Avoid/Terminate risk avoidance - organisation may decide not to do the thing that incurs risk
* Share/Transfer risk sharing - transfer risk via an insurance policy or a third party
* Modify/Reduce risk modification - adopt controls to lower the current level of risk by reducing likelihood and impact

90
Q

When developing software what security should you also include?

A

. Defensive coding
. Testing
. Back ups
. Assurance of availability
. Compliance with legal requirements
. security of communication
. auditing

91
Q

What is cross site scripting (XSS)?

A

occurs when an attacker injects malicious code into a trusted website, which is then unknowingly executed by a user’s web browser.

92
Q

How do you prevent XSS?

A

Implement escapes in all your code

93
Q

What is sql injection ?

A

occurs when an attacker manipulates input fields on a website to execute unauthorized SQL commands on the website’s database

94
Q

What are some ways to secure the development environment?

A
  • Separate business and development functions
  • Consider your development environment compromised
  • Trust your developers, verify their actions
95
Q

Why is formal change control and 2 person control important ?

A

In formal change the Separation of duties ensures the person responsible for testing the code isn’t also responsible for its implementation

Two person control requires that an additional person signs off on the code changes, to reduce accidental or malicious flaws

96
Q

Give some info on patches

A

. Patches are updates that address security vulnerabilities within a program or product.

Patches should be rolled out at the earliest opportunity because attackers may already know vunerable spots or try to reverse engineer

. Patches should be tested

97
Q

Define certification

A

a certificate that the product, service or system in question meets specific requirements

98
Q

Define accreditation

A

A formal recognition by an independent body that a certification body operates according to international standards

99
Q

What does HCI stand for?

A

Human Computer Interaction

100
Q

What is HCI ?

A

HCI is the study of interaction between people and computers?

101
Q

What are the 2 major goals of HCI?

A
  • To improve the interactions between people and computers (machines?)
  • Making computers more usable and receptive to the user’s needs
102
Q

What are the 3 sub domains of HCI

A

Usability, User Experience(UX) and User centred design

103
Q

Describe Usability

A

Usability is making systems easy to learn, easy to use, limiting errors and the severity of errors.

104
Q

What vocab comes under usability?

A

. error rates
. time to complete tasks, task failures
. number of lookups made

105
Q

Define user experience

A

User experience is the user’s entire experience with a interface — not just how well the interface worked, but how they expected it to work, how they feel about using it, and how they feel about the system overall.

106
Q

What vocab comes under user experience?

A

satisfaction, intuitive, frustration, good experience, difficult, confusing.

107
Q

Describe user centered design

A

an iterative design process in which designers focus on the users and their needs in each phase of the design process. They do this via a variety of research and design techniques, to create highly usable and accessible products for them

108
Q

Why is HCI important?

A

. Bad interfaces can waste users time and cause fustration and errors
. Users often leave website or apps with bad interfaces in frustration

109
Q

Name the paradigms in HCI along with some examples

A

Command Line Interface(CLI) - Users control the computer by typing in commands.
Examples - command prompt app in Windows, and Terminal in macOS

Graphical User Interface (GUI) - Users directly manipulates graphical representations on a computer screen with a pointing device
Example - Apple 2

Natural user interface (NUI) - a system for human-computer interaction that a user operates via intuitive actions related to natural, everyday human behaviour like touch gesture or voice
Examples - Speech recognition(Sirri,Cortana), Touch screen, Gesture recognition(xbox kinect,wii),Eye tracker

Metaverse - the concept of a highly immersive virtual world where people gather to socialize, play, and work
Example VR

110
Q

Is user interface a subset of HCI ?

A

Yes

111
Q

Give some human forms of input?

A

Touch,sight,sound,smel,taste

112
Q

List Nielsen’s 10 Usability Heuristics

A

1.) Match between system and the real world - Systems should speak the users language
E.g. Computer science language: [0][0], [0][2] * Excel speaks users’ language: [A][1], [B][3]

2.) Consistency & standards - Users should not have to wonder whether different words, situations, or actions mean the same thing

3.) Visibility of system status E.g. loading bar

4.) User control and freedom - Users often choose system functions by mistake and will need a clearly marked “emergency exit” to leave the unwanted state E..g. Undo and redo

5.) Error prevention E.g. When you are about to delete a file you get a message asking are you sure before you delete it

6.) Help users recognize, diagnose, and recover from errors E.g if you type wrong password you get a message saying you chose the wrong password

7.) Recognition rather than recall E.g visited links in chrome are purple

8.) flexibility and efficiency of use

9.) Aesthetic and minimalist Design E.g when you search something on google the most relevant thing shows up

10.) Help and documentation E.g Manuals and online help

113
Q

Define Usability Testing ?

A

Evaluating usability of a web-page, app or other software by testing it with real users.

114
Q

Give some reasons for why usability testing cannot be done?

A

○ not enough time
○ not enough money
○ no expertise in doing it
○ no lab or location in which to perform it
○ don’t know how to interpret the results

115
Q

When should usability testing be performed?

A

Early in the software lifecycle and it should be done often/repeatedly.

116
Q

Give some info on Traditional testing

A

Its expensive and scientific

117
Q

Gibe some info on lost our lease testing.

A

. Tested cheaply and often
. Not scientific

118
Q

Give some info on multiple testing

A

More users can find many problems

. You test with many users

119
Q

Give some on Usability Study room set up

A

a quiet room where someone can interact with a interface
* Participant sits at computer and performs tasks with interface
* Moderator / facilitator guides the user through the process
. Others on dev team observe user, either from the side or from another room or hidden camera
. Record the user and watch later

120
Q

List some things about the user and what they should do for the test to run smoothly

A
  • Anybody with decent people skills can do it.
  • Be friendly.
  • Don’t lead the user or give them hints about what to do.
  • Probe; when they give feedback, ask for more details.
    . Ask user to do a specific thing and watch to see how they d
121
Q

What is an Exploratory/Formative test?

A

It looks to see if the user can actually do thnigs

122
Q

What happens in an Assessment/Summative test?

A

The user performs an actual task

123
Q

What happens in a comparison test?

A

match up different prototypes or designs

124
Q

What happens in a verification test?

A
  • verifies that UI is okay or that a fix works
125
Q

What should a usability test plan include?

A
  1. Type Of Test
  2. Purpose/Goals/Objectives
  3. Participant Characteristics
  4. Task List
    • Possibly have users try same tasks in different orders
  5. Test Environment / Equipment
  6. Moderator’s Role
  7. Evaluation Metrics And Data To Be Collected
  8. Report
126
Q

What data can be collected from a test?

A

Percentages and counts of task completed/failed and count errors

Tine required to access info for help,recover from errors and complete tasks

127
Q

What do performance goals do ?

A

Decide specific goals you want users to achieve.

128
Q

List some things that show if a user has failed

A
  • Don’t understand the point of the site.
    • They use different vocabulary than you, so they can’t find a word for the action to do.
    • Their notion of how to categorize is different.
    • Site is too busy / cluttered.
  • Not clear what the options are on the screen.
129
Q

List some limitations of usability testing

A
  • Test results don’t prove that a product/design/UI “works”
  • Testing may not be the best use of your time.
  • Doesn’t tell you if the market wants/needs a product like yours.
130
Q

What is accessibility?

A

Software accessibility means that websites, apps, tools and technologies are designed and developed so that people with
disabilities can perceive, understand and interact with the software technology with ease.

131
Q

What is impairment

A

Anything that has a major effect on people’s ability to carry out normal day to day activities

132
Q

List the 5 types of impairment and examples where possible.

A
  • Speech
    • Visual(blindness, low vision, colour blindness)
    • Motor(cerbral palsy, Parkinson’s disease, arthritis)
    • Cognitive (dyslexia, attention deficit disorder)
      Auditory (sound, hearing impaired audience)
133
Q

Why is accessibility important?

A

Limited accessibility reduces the Internet’s potential as an effective tool.

* Assistive/adaptive software will not work if web pages are coded incorrectly coded 

* The web is spreading rapidly in all things we do and we need to avoid digital isolation and social exclusion.  . The population is aging so the number of people with impairments are increasing
134
Q

When is a website said to be accessible ?

A

when anyone regardless of circumstance can access it

135
Q

What are the 2 approaches to designing for accessibiility?

A

Design for all

Inclusive design

136
Q

What is design for all?

A

AKA Universal design. This means going beyond only designing for user experience and accounts for everything

137
Q

What is inclusive design?

A

to design for accessibility based on 4 criteria:
- Varying ability
- If it works for those with disabilities
- Mental state
- Usability and aesthetics being compatible

138
Q

Define Percievable

A

Info and UI components must be presentable to users such that they are visible to all of their senses

139
Q

Define Operable?

A

This means that users must be able to operate the user interface and all its components

140
Q

Define understandable

A

This means that users must be able to understand the information as well as the operation of the user interface

141
Q

Define robust

A

This means that users must be able to access the content as technologies advance

142
Q

What is a standard ?

A

A standard is an agreed way of doing something to a specific or measurable level of quality. It is created by a recognised body and it is officially documented .

143
Q

Why do we need standards?

A

. Standards promote best practice
. Standards encourage consistency
. Standards are independent so a majority agree on them
. Standards ensure businesses are compliant

144
Q

Define a principle

A

an abstract design rule

144
Q

Define a guideline

A

advice on how to achieve a principle

145
Q

Give 2 benefits of guidelines

A
  • Guidelines provides a clear instruction on a range of issues that designers will encounter
    . Guidelines will help usability specialists evaluate the designs of their products
146
Q

What is evaluation?

A

the process by which the interface is tested against the needs and practices of the user.

147
Q

What can we lean from evaluation ?

A

We can get rid of problems to do wih functionalitiy, usability,user experience and etc

* Designers can learn about what users think and what makes a good system. 

.Find out how effective and efficient is the software being studied, and how much the users enjoy using it and how much it annoys and frustrates them, and where they “get stuck“

148
Q

Name the 5 types of evaluation

A

. Summative Evaluation
. Formative Evaluation
. Analytic Evaluation
. Empirical evaluation
. Lab - based Usability Evaluation

149
Q

Give some info on summarative evaluation.

A

○ Often happens at the end of the development process
○ Provides an evaluation or summary of the end product
. Matches system to requirements specification

150
Q

Give some info on formative evaluation

A

○ Happens during the development process
○ Used to inform the development process hence is applied to a prototype rather than a complete system
○ Takes account of users(knowledge, skills, gender, age, disability, etc.)
. Takes account of user tasks or goals

151
Q

Give some info on analytic evaluation

A

○ Consists of formal methods for analysing interfaces v Heuristic evaluation
. Cognitive Walkthrough – task related
. Goals Operations Methods Selection Rules (GOMS)- task related
. Aims to investigate existing situation, not envision new systems

152
Q

Give some info on empirical evaluation

A

○ users participate in trials of prototype interfaces
○ requires careful design of the trial’s content and conduct
○ may involve benchmark tasks
○ may involve collecting and processing subjective opinions
○ Evaluating with user participation
Field studies and controlled experiments