The length and complexity of the interface specification (provides insight into learning effort required by user).

What will be an ideal response?


The number of user tasks specified and the number of user actions required to complete each (provide estimates of system efficiency). Number of tasks, actions, and states in the design model (imply the memory load imposed on the user).

Interface style, help facilities, and error handling protocol provide a general indication of complexity of the interface and its acceptance by the users.

Computer Science & Information Technology

You might also like to view...

The implementation of the TEA symmetric encryption algorithm given in Figure 11.8–11.10. is not portable between all machine architectures. Explain why. How could a message encrypted using the TEA implementation be transmitted to decrypt it correctly on all other architectures?

What will be an ideal response?

Computer Science & Information Technology

____ is the most widely used mail transfer agent (MTA) on UNIX/Linux systems.

A. Exchange B. Postfix C. Sendmail D. Gmail

Computer Science & Information Technology

Which of the following is not one of the four canons of the (ISC)2 code of ethics?

A. Avoid conflicts of interest that may jeopardize impartiality. B. Protect society, the common good, necessary public trust and confidence, and the infrastructure. C. Act honorably, honestly, justly, responsibly, and legally. D. Provide diligent and competent service to principals.

Computer Science & Information Technology

What email encryption technique is illustrated in this figure?

A. MD5 B. Thunderbird C. S/MIME D. PGP

Computer Science & Information Technology