You are the new Chief Design Officer (CDO) of a new start-up, DTUI Inc. The project is to design a system for hospitals that will allow receptionists to check in people at the hospital faster. They wish to develop an interface that meets both the receptionist and patient's needs. Describe in detail a design methodology of 4 stages to facilitate proper design of such a system.
Write your answer in the form of a management plan for this project. For each stage, indicate the number of weeks that should be allocated. Hint: note the four phases of the design process:
1. Requirements analysis
2. Preliminary (conceptual) and detailed design
3. Build and implementation
4. Evaluation
What will be an ideal response?
Consider a wide range of acceptable answers, as long as a complete design methodology is present like those illustrated in Figure 4.1. See if the students utilize a design framework as discussed in the chapter, such as: user-centered design, participatory design, or agile interaction design.
Ensure that the answer is written as a true management plan, where there is a specific project title, overview, scope or mission of the development team, responsible individuals, duration, possible cost estimate, development facilities, milestone delivery dates, customer acceptance or sell-off process, etc., following a good project planning discipline.
You might also like to view...
A(n) ________ projector has hundreds of thousands of tiny swiveling mirrors that create an image
A) VRAM B) HDMI C) DLP D) DVI
To delete records on the one side of the relationship and related records on the many side, enable Referential Integrity and Cascade Delete Related Records properties
Indicate whether the statement is true or false
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
What will be an ideal response?
Match each item with an statement below:
A. standard network management protocol for wired networks. B. designed to stop an attack from occurring. C. most basic method for identifying and locating a rogue access point. D. device that can monitor the airwaves for traffic. E. designed to exclusively monitor the RF frequency for transmissions. F. gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses. G. false attack alerts. H. attempts to uncover and prevent an attack before it harms the WLAN. I. simplest wireless device discovery method.