This text in Figure 5-28 has a title, “A Great Time for Team Building,” a subtitle, “Considering the advantages and challenges of group work,” and details regarding the date and presenter.

Figure 5-28



a. According to the content analysis mentioned in the exercise, how many groups are there?

b. In the current version of the text layout, is there any visual indication of these groups?

c. Without changing the alignment, font, or font size, is there any way to create these groups visually? If so, what is it?

d. Photocopy Figure-28 and use scissors and tape to rearrange the text to show the groupings.




a.  It’s possible to analyze this one of two ways:  The first is to say there are three groups:  the title, the subtitle and the details of date and presenter.  The second is to say that there are two groups, which are the title and details, but the title group has two components:  the main title and the subtitle.
b.     Not really.
c.     Without using contrast (in font size or font type) or alignment, the only other option is proximity.
d.     Photocopy Figure-28 and use scissors and tape to rearrange the text to show the groupings.

a.   According to the content analysis mentioned in the exercise, how many groups are there?

(5 minutes) It’s possible to analyze this one of two ways:  The first is to say there are three groups:  the title, the subtitle and the details of date and presenter.  The second is to say that there are two groups, which are the title and details, but the title group has two components:  the main title and the subtitle.

b.   In the current version of the text layout, is there any visual indication of these groups?

(1 minute) Not really.

c.   Without changing the alignment, font, or font size, is there any way to create these groups visually? If so, what is it?

(2 minutes) Without using contrast (in font size or font type) or alignment, the only other option is proximity.

d.         Photocopy Figure-28 and use scissors and tape to rearrange the text to show the groupings

Computer Science & Information Technology

You might also like to view...

Which protocol is responsible for automatic assignment of IP addresses?

A. DNS B. DHCP C. FTP D. SNMP

Computer Science & Information Technology

Which of the following involves using various tools to find vulnerabilities in a system?

a. Port scanning b. Port blocking c. Enumeration d. Vulnerability assessment

Computer Science & Information Technology

Deleted files on a Mac computer are moved to the ________.

A. Garbage Can B. Recycle Bin C. Trash D. Wastepaper Basket

Computer Science & Information Technology

What term refers to the necessity of following the rules when it comes to using functions?

A. syntax B. formula C. arguments D. function logic

Computer Science & Information Technology